References of "Paper published in a journal"
     in
Bookmark and Share    
Full Text
See detailMethodological Aspects of Software Engineering, Assurance, Quality, and Reliability Engineering (MAS/AQR) 2019 Welcome from the Minitrack Co-Chairs
Tenbergen, Bastian; Ries, Benoît UL

in Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS) (2019, January)

Detailed reference viewed: 63 (2 UL)
Full Text
Peer Reviewed
See detailNovel Opportunities by Laser Welding of Dissimilar Materials
Schiry, Marc UL; Plapper, Peter UL

in Proceedings of International Conference on Competitive Manufacturing COMA'19 (2019, January)

The Laser Technology Competence Centre (LTCC) of the University of Luxembourg provides skills in joining material combinations, which are considered being non-weld able with traditional methods or at ... [more ▼]

The Laser Technology Competence Centre (LTCC) of the University of Luxembourg provides skills in joining material combinations, which are considered being non-weld able with traditional methods or at least challenging to join (e.g. Copper and Aluminium, Aluminium and Polyamide (PA), Titanium and PEEK, steel and tungsten hard alloy). Related accomplishments include minimal intermetallic compounds, convincing mechanical and superior electrical properties of the laser-welded specimen. With defined spatial and temporal modulation of the laser beam, an accurately defined temperature profile is created on the lower side of the upper material in the two dimensional directions, which enable joining of dissimilar materials in overlap configurations, despite challenging thermal properties. To weld butt-joint geometries with minimal heat affected volume, the temperature profiles were expanded in the third dimension, which can be achieved through controlled laser energy guidance. The scientific methods to accomplish these convincing results are explained, with selected industrial use cases ranging from automotive industry, energy storage, and medical implants. An outlook with unsolved challenges is intended to ignite discussions about upcoming research topics. [less ▲]

Detailed reference viewed: 132 (19 UL)
Full Text
Peer Reviewed
See detailElucidation of influencing parameters of the laser butt welding process of dissimilar steel to tungsten alloy sheets
Schiry, Marc UL; Plapper, Peter UL

in Proceedings of International Conference on Competitive Manufacturing COMA'19 (2019, January)

Laser welding of steel - tungsten alloy joints requires deep understanding of the impact of the laser parameters on the welding process. Due to the dissimilar thermal and metallurgical properties of both ... [more ▼]

Laser welding of steel - tungsten alloy joints requires deep understanding of the impact of the laser parameters on the welding process. Due to the dissimilar thermal and metallurgical properties of both materials, a defined heat input and a precise temperature control in the weld interface is required. In the presented work, the influence of different laser parameter (e.g. laser power, focal position, scanner speed etc.) on the joint quality of laser welded steel / tungsten alloy butt-joints were investigated. By using statistical methods, the influencing process parameters were defined and optimized. It is shown that the horizontal focal position is the main parameter for the welding process in a butt-joint configuration. Additionally, manipulation of the heat input leads to modifications of the weld bead profile. By obtaining vertical seam boundaries in the sheet metal, a homogenous temperature profile at the interface of the materials to be welded was achieved. Due to the complete bonding and low amount of intermetallic phases, high shear strength accompanied with a low variance were the result. [less ▲]

Detailed reference viewed: 111 (26 UL)
Full Text
Peer Reviewed
See detailInteroception in Bulimia Nervosa: Evidence at cortical and self-report levels
Lutz, Annika UL; Van Dyck, Zoé UL; Schulz, André UL et al

in Psychophysiology (2019), 56(S1), 117

Bulimia nervosa (BN) is characterized by recurrent episodes of binge eating and compensatory behaviors, such as self- induced vomiting. Body image disturbance is also prominent in BN. Current research is ... [more ▼]

Bulimia nervosa (BN) is characterized by recurrent episodes of binge eating and compensatory behaviors, such as self- induced vomiting. Body image disturbance is also prominent in BN. Current research is trying to determine which dimensions and sensory domains of body perception are affected in BN. Regarding heartbeat perception, findings are inconclusive, with some studies reporting reduced and others reporting unaltered interoceptive accuracy in BN. The current study contributes further data on heartbeat perception by using an indicator of the cortical processing of cardio- afferent signals (heartbeat evoked potentials, HEPs). We investigated 22 women with current or partially remitted BN (BMI 23.94[3.61]; age 31.86[11.20]) and 22 healthy women (HC; BMI 24.24[3.37]; age 31.00[10.15]). Participants performed a heartbeat perception task (according to Schandry) with concurrent 64- channel- EEG and ECG recording. HEPs were calculated as mean EEG amplitudes in the interval 455- 595ms after the R- peak of the ECG. Results show no significant differences between the BN and HC groups, neither for heartbeat perception, HEPs, or mean heartrate. These results confirm previous findings of intact heartbeat perception in BN. In addition, cortical processing of cardio- afferent signals is unaltered. Heartbeat perception is particularly relevant for emotion processing and regulation. The previously reported emotion- regulation deficits in BN appear not to be based on altered CNS processing of cardiac signals [less ▲]

Detailed reference viewed: 89 (14 UL)
Full Text
Peer Reviewed
See detailFRET Characterization of Hollow Plasmonic Nanoantennas
Maccaferri, Nicolò UL; Ponzellini, Paolo; Giovannini, Giorgia et al

in Proceedings of SPIE : The International Society for Optical Engineering (2019), 10894

We fabricated hollow nanoantennas with varying inner channels sizes on a gold-covered silicon nitride membrane. Our fabrication technique allowed us to narrow the size of the inner channels down to 15nm ... [more ▼]

We fabricated hollow nanoantennas with varying inner channels sizes on a gold-covered silicon nitride membrane. Our fabrication technique allowed us to narrow the size of the inner channels down to 15nm. We managed to exclusively decorate the tips of the antennas with thiol-conjugated dyes by creating a concentration gradient through the nanoantennas. Finally, we characterized the antennas in terms of their effect on the lifetime of dyes. We used Atto 520 and Atto 590 for the experiments. We carried out experiments with the antennas decorated with Atto 520, with Atto 590 as well as with the two Atto dyes at the same time. The experiments carried out with the antennas decorated with Atto 520 only and Atto 590 only yielded a lifetime reduction with respect to the confocal case. Interestingly, their lifetime reductions were significantly different. Then, we decorated the antennas with the two dyes at the same time. Even though we could not control the distance between the two dyes, FRET effects were clearly observed. The FRET effects were found to be dependent on the size of the inner channel. We believe that our tip decorated hollow nanoantennas could find application in FRET-based single molecule nanopore technologies. [less ▲]

Detailed reference viewed: 109 (0 UL)
Full Text
Peer Reviewed
See detailMaximum flow of complex manufacturing networks
Omar, Yamila UL; Plapper, Peter UL

in Procedia CIRP (2019)

Detailed reference viewed: 85 (6 UL)
Full Text
Peer Reviewed
See detailFabrication and Optical Characterization of Hyperbolic Nanoparticles on a Transparent Substrate
Iarossi, Marzia; Darvill, Daniel; Isoniemi, Tommi et al

in Proceedings of SPIE : The International Society for Optical Engineering (2019), 10927

We report on the fabrication and optical characterization of hyperbolic nanoparticles on a transparent substrate. These nanoparticles enable a separation of ohmic and radiative channels in the visible and ... [more ▼]

We report on the fabrication and optical characterization of hyperbolic nanoparticles on a transparent substrate. These nanoparticles enable a separation of ohmic and radiative channels in the visible and near-infrared frequency ranges. The presented architecture opens the pathway towards novel routes to exploit the light to energy conversion channels beyond what is offered by current plasmon-based nanostructures, possibly enabling applications spanning from thermal emission manipulation, theragnostic nano-devices, optical trapping and nano-manipulation, non-linear optical properties, plasmonenhanced molecular spectroscopy, photovoltaics and solar-water treatments, as well as heat-assisted ultra-dense and ultrafast magnetic recording. [less ▲]

Detailed reference viewed: 147 (2 UL)
Full Text
Peer Reviewed
See detailScalable Gaussian Process Inference with Finite-data Mean and Variance Guarantees
Huggins, Jonathan; Campbell, Trevor; Kasprzak, Mikolaj UL et al

in Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics (AISTATS) 2019 (2019)

Detailed reference viewed: 49 (9 UL)
See detailEvaluation of Stratified Condensation Models for a slightly inclined tube unsing ATHELT Code
Zhang, Yu; Moonesi Shabestary, Amir Hossein; Bieberle, Andre et al

in NURETH-18 (2019)

Detailed reference viewed: 98 (12 UL)
Full Text
Peer Reviewed
See detailTransaction Clustering Using Network Traffic Analysis for Bitcoin and Derived Blockchains
Biryukov, Alex UL; Tikhomirov, Sergei UL

in IEEE INFOCOM 2019 Workshop Proceedings (2019)

Bitcoin is a decentralized digital currency introduced in 2008 and launched in 2009. Bitcoin provides a way to transact without any trusted intermediary, but its privacy guarantees are questionable, and ... [more ▼]

Bitcoin is a decentralized digital currency introduced in 2008 and launched in 2009. Bitcoin provides a way to transact without any trusted intermediary, but its privacy guarantees are questionable, and multiple deanonymization attacks have been proposed. Cryptocurrency privacy research has been mostly focused on blockchain analysis, i.e., extracting information from the transaction graph. We focus on another vector for privacy attacks: network analysis. We describe the message propagation mechanics in Bitcoin and propose a novel technique for transaction clustering based on network traffic analysis. We show that timings of transaction messages leak information about their origin, which can be exploited by a well connected adversarial node. We implement and evaluate our method in the Bitcoin testnet with a high level of accuracy, deanonymizing our own transactions issued from a desktop wallet (Bitcoin Core) and from a mobile (Mycelium) wallet. Compared to existing approaches, we leverage the propagation information from multiple peers, which allows us to overcome an anti-deanonymization technique (“diffusion”) used in Bitcoin. [less ▲]

Detailed reference viewed: 429 (7 UL)
Full Text
Peer Reviewed
See detailUsing data from the HBSC study for evidence-based suicide prevention in Luxembourg
van Duin, Claire UL; Heinz, Andreas UL; Catunda, Carolina UL et al

in European Journal of Public Health (2019), 29

Detailed reference viewed: 112 (23 UL)
Full Text
Peer Reviewed
See detailVIEWS ON AGING: NEW PERSPECTIVES FOR THEORY AND RESEARCH
Klusmann, Verena; Kornadt, Anna Elena UL

in Innovation in Aging (2019), 3(Supplement_1), 786-786

Over the past 20 years, research on views on aging has substantiated their importance for successful development and sustained quality of life over the full length of the life span. However, a deep ... [more ▼]

Over the past 20 years, research on views on aging has substantiated their importance for successful development and sustained quality of life over the full length of the life span. However, a deep understanding of the origins of views on aging and the underlying processes of their lifespan development and manifestation is lacking. Since 2017, the scientific network “Images of Aging” funded by the German Research Foundation (http://www.health.uni-konstanz.de/images-of-aging) assembles national and international renowned experts in the field. The network engages in empirical clarifications on both the distinctness and validity of the construct (contribution of Klusmann et al.) as well as in critically reviewing terminology and measures of views on aging (contribution of Notthoff et al.). The network aims to help clarifying the dynamic interplay of determinants and outcomes in the context of health (contribution of Wolff et al.) as well as disentangling intra- and intergenerational stereotypic perceptions (contribution of Kornadt et al.). Both of these are understudied issues with highly practical implications for two of the largest demographic challenges: shaping the coexistence of generations as well as providing adequate health care supply. Integrating both pertinent theoretical approaches and empirical findings the network regards views on aging under a lifespan perspective. Recently, it suggested three core principles of views on aging regarding lifelong bio-psycho-social development, their multidimensional nature, and their impact across life. These considerations provide a background for an integrative discussion of the symposium’s contributions. [less ▲]

Detailed reference viewed: 86 (1 UL)
Full Text
Peer Reviewed
See detailSUBJECTIVE AGING: SOMETHING UNIQUE OR JUST ANOTHER EXPRESSION OF GENERAL SELF-BELIEFS?
Klusmann, Verena; Spuling, Svenja M.; Bowen, Catherine E. et al

in Innovation in Aging (2019), 3(Supplement_1), 786-787

Using data from the German Ageing Survey (adults aged 40‒85), this study tested the convergent and discriminant validity of subjective aging measures by comparing three different measures of subjective ... [more ▼]

Using data from the German Ageing Survey (adults aged 40‒85), this study tested the convergent and discriminant validity of subjective aging measures by comparing three different measures of subjective aging with one another and relating them to established measures of general self-beliefs (optimism, self-efficacy, subjective health) and subjective well-being (depression, affect). Correlations between subjective aging measures ranged from ‒.61 (amongst general self-perceptions of aging measures) to ‒.09, with subjective age being least related to the other measures. The highest overlap was observed between optimism and global self-perceptions of aging (.69) and it was for these global self-perceptions that the highest amount of variance could be explained by correlates in a regression analysis (R-square=.55). In contrast, only 10% of variance could be explained for subjective age. Our results underline the merit of taking the multidimensional nature of subjective aging into account since global measures appear less distinct from general personality traits. [less ▲]

Detailed reference viewed: 69 (2 UL)
Full Text
Peer Reviewed
See detailSOCIAL ROLES AND PERSONALITY IN LATER LIFE
Kornadt, Anna Elena UL; Kornadt, Anna Elena UL

in Innovation in Aging (2019), 3(Supplement_1), 729-730

Despite considerable stability of the Big Five personality traits, there is evidence for personality plasticity and change across the lifespan. In younger years, the investment in social roles, such as ... [more ▼]

Despite considerable stability of the Big Five personality traits, there is evidence for personality plasticity and change across the lifespan. In younger years, the investment in social roles, such as entering worklife or starting a family has been shown to drive personality change. With regard to personality in later life, the investigation of social roles has so far been neglected. A questionnaire was developed to assess a large number of social roles that can be assumed in the second half of life. N = 306 participants aged 50 to 86 years reported on their social roles and rated their personality traits. Results show that assuming and investing in certain social roles (e.g. friend, retiree, volunteer) mediated the effects of age on the Big Five, especially for the oldest participants and in the domains openness and extraversion. The findings support the importance of social roles for personality also in later life. [less ▲]

Detailed reference viewed: 117 (2 UL)
Full Text
Peer Reviewed
See detailATTITUDES TOWARD OWN AGING AND PERSONALITY IN LATER LIFE: EXAMINATION OF BIDIRECTIONALITY OVER 20 YEARS
Kornadt, Anna Elena UL; Siebert, Jelena S.; Wahl, Hans-Werner

in Innovation in Aging (2019), 3(Supplement_1), 385-385

Big Five personality traits are assumed to be linked with attitudes toward own aging (ATOA). Both constructs have central importance for the aging process, it is thus important to comprehensively address ... [more ▼]

Big Five personality traits are assumed to be linked with attitudes toward own aging (ATOA). Both constructs have central importance for the aging process, it is thus important to comprehensively address their mutual connection over time. We used data from the ILSE study, a longitudinal study with four measurement occasions, spanning 20 years and including two participant cohorts (n = 501; born 1950-52 and n = 500; born 1930-32). Dual latent change score models showed that personality was longitudinally related to change in ATOA: Lower Neuroticism, higher Conscientiousness, and higher Openness predicted more positive attitudes; the effect for Extraversion varied by time. Furthermore, the role of personality seems to be confined to certain sensitive periods in midlife and early old age. ATOA had only marginal longitudinal impact on personality. Our results shed light on the developmental co-dynamics of personality and subjective perceptions of aging across the second half of life. [less ▲]

Detailed reference viewed: 70 (1 UL)
Full Text
Peer Reviewed
See detailDeanonymization and linkability of cryptocurrency transactions based on network analysis
Biryukov, Alex UL; Tikhomirov, Sergei UL

in Proceedings of 2019 IEEE European Symposium on Security and Privacy (EuroS&P) (2019)

Bitcoin, introduced in 2008 and launched in 2009, is the first digital currency to solve the double spending problem without relying on a trusted third party. Bitcoin provides a way to transact without ... [more ▼]

Bitcoin, introduced in 2008 and launched in 2009, is the first digital currency to solve the double spending problem without relying on a trusted third party. Bitcoin provides a way to transact without any trusted intermediary, but its privacy guarantees are questionable. Despite the fact that Bitcoin addresses are not linked to any identity, multiple deanonymization attacks have been proposed. Alternative cryptocurrencies such as Dash, Monero, and Zcash aim to provide stronger privacy by using sophisticated cryptographic techniques to obfuscate transaction data. Previous work in cryptocurrency privacy mostly focused on applying data mining algorithms to the transaction graph extracted from the blockchain. We focus on a less well researched vector for privacy attacks: network analysis. We argue that timings of transaction messages leak information about their origin, which can be exploited by a well connected adversarial node. For the first time, network level attacks on Bitcoin and the three major privacy-focused cryptocurrencies have been examined. We describe the message propagation mechanics and privacy guarantees in Bitcoin, Dash, Monero, and Zcash. We propose a novel technique for linking transactions based on transaction propagation analysis. We also unpack address advertisement messages (ADDR), which under certain assumptions may help in linking transaction clusters to IP addresses of nodes. We implement and evaluate our method, deanonymizing our own transactions in Bitcoin and Zcash with a high level of accuracy. We also show that our technique is applicable to Dash and Monero. We estimate the cost of a full-scale attack on the Bitcoin mainnet at hundreds of US dollars, feasible even for a low budget adversary. [less ▲]

Detailed reference viewed: 1071 (28 UL)
See detailField-resolved response of plasmonic antennas
Fischer, Marco P.; Maccaferri, Nicolò UL; Gallacher et al

in Proceedings 2019 Conference on Lasers and Electro-Optics Europe and European Quantum Electronics Conference (2019)

We introduce a new experimental strategy to investigate the transient resonant behavior of plasmonic nanostructures. Our approach allows to access their full-time field-resolved response in amplitude and ... [more ▼]

We introduce a new experimental strategy to investigate the transient resonant behavior of plasmonic nanostructures. Our approach allows to access their full-time field-resolved response in amplitude and phase. [less ▲]

Detailed reference viewed: 65 (1 UL)
Full Text
Peer Reviewed
See detailTime-Resolved Investigations and Biotechnological Applications of Plasmonic Nanostructures
Maccaferri, Nicolò UL

in Proceedings of 37th International Symposium on Dynamical Properties of Solids (DyProSo 2019) (2019), 26(1), 24

Plasmonics exploits the collective motion of conduction electrons in metals (plasmons), thus enabling light to couple with nanoscale objects, with the consequent generation of a plenty of novel and ... [more ▼]

Plasmonics exploits the collective motion of conduction electrons in metals (plasmons), thus enabling light to couple with nanoscale objects, with the consequent generation of a plenty of novel and unexpected optical effects and functionalities. Plasmonic nanostructures have been deeply studied in the last decade due to their crucial impact on several areas of nanoscience and nanotechnology. Their unrivalled capability to squeeze light well beyond its diffraction limit, leading to extremely confined and enhanced electromagnetic fields on the nanoscale at optical frequencies, is of great interest for the prospect of real-life applications, such as energy harvesting and photovoltaics, wave-guiding and lasing, optoelectronics, fluorescence emission enhancement, plasmon-assisted biointerfaces and nanomedicine. In this framework, traditional studies of the resonant behavior of plasmonic nanoantennas rely on standard intensity detection schemes. Up to date, the temporal dynamics of plasmonic nanoantennas remains challenging. In the first part of the talk we will show that, by combining femtosecond time-domain spectroscopy and high-resolution confocal microscopy, it is possible to measure full time- and field-resolved response of single plasmonic nanoantennas [1]. In the second part of the talk, we will then show practical applications of plasmonic nanostructures to single-molecule detection [2–4], enhanced spectroscopy on single-cells [5–7], optical trapping [8,9], enhanced Raman scattering [10–12] and resonant energy transfer [13]. [less ▲]

Detailed reference viewed: 110 (2 UL)
Full Text
Peer Reviewed
See detailYOUNG PEOPLE FEEL WISE, OLD PEOPLE FEEL ENERGETIC: COMPARING AGE STEREOTYPES AND SELF-EVALUATIONS ACROSS ADULTHOOD
Kornadt, Anna Elena UL; Bowen, Catherine E.; Spuling, Svenja M. et al

in Innovation in Aging (2019), 3(Supplement_1), 787-787

Using questionnaire data from the MIDUS study (N=6.325) we examined the extent to which people in their late 20s, 40s, and 60s think that positive stereotypic “old” and “young” characteristics describe ... [more ▼]

Using questionnaire data from the MIDUS study (N=6.325) we examined the extent to which people in their late 20s, 40s, and 60s think that positive stereotypic “old” and “young” characteristics describe themselves, their age peers, and other age groups. A constellation of “old” characteristics (e.g., wise, caring, calm) was seen as more descriptive of older adults, while a constellation of “young” characteristics (e.g., healthy, energetic) was seen as more descriptive of younger adults. Self-evaluations were highly positive and largely consistent across age groups. Compared to their age peers, younger adults saw themselves as having as many positive “young” characteristics but more positive “old” characteristics whereas older adults saw themselves as having more positive “young” characteristics but fewer positive “old” characteristics. The results support the stability of the aging self despite the existence of age stereotypes and the role of negative age stereotypes as a frame of reference for making self-evaluations. [less ▲]

Detailed reference viewed: 101 (1 UL)
Full Text
Peer Reviewed
See detailNegative Results on Mining Crypto-API Usage Rules in Android Apps
Gao, Jun UL; Kong, Pingfan UL; Li, Li et al

in Proceedings of the 16th International Conference on Mining Software Repositories (2019)

Android app developers recurrently use crypto-APIs to provide data security to app users. Unfortunately, misuse of APIs only creates an illusion of security and even exposes apps to systematic attacks. It ... [more ▼]

Android app developers recurrently use crypto-APIs to provide data security to app users. Unfortunately, misuse of APIs only creates an illusion of security and even exposes apps to systematic attacks. It is thus necessary to provide developers with a statically-enforceable list of specifications of crypto-API usage rules. On the one hand, such rules cannot be manually written as the process does not scale to all available APIs. On the other hand, a classical mining approach based on common usage patterns is not relevant in Android, given that a large share of usages include mistakes. In this work, building on the assumption that “developers update API usage instances to fix misuses”, we propose to mine a large dataset of updates within about 40 000 real-world app lineages to infer API usage rules. Eventually, our investigations yield negative results on our assumption that API usage updates tend to correct misuses. Actually, it appears that updates that fix misuses may be unintentional: the same misuses patterns are quickly re-introduced by subsequent updates. [less ▲]

Detailed reference viewed: 101 (10 UL)
Full Text
Peer Reviewed
See detailAccess Time Improvement Framework for Standardized IoT Gateways
Javed, Asad; Yousefnezhad, Narges; Robert, Jérémy UL et al

in Proceedings of IEEE International Conference on Pervasive Computing and Communications (2019)

Detailed reference viewed: 136 (1 UL)
Full Text
Peer Reviewed
See detailDu roi d’Yvetot au marquis de Carabas. Figures du pouvoir et de la noblesse d’Ancien Régime dans l’œuvre de Pierre-Jean de Béranger
Saintes, Laetitia UL

in Publications numériques du CEREdI (2019)

Venu à la chanson sous l'Empire, Pierre-Jean de Béranger est consacré suite à son succès dans les goguettes – lieu d'une parole engagée et opposée aux pouvoirs en place – comme le « chansonnier du peuple ... [more ▼]

Venu à la chanson sous l'Empire, Pierre-Jean de Béranger est consacré suite à son succès dans les goguettes – lieu d'une parole engagée et opposée aux pouvoirs en place – comme le « chansonnier du peuple ». Il n'en est pas moins prisé du public bourgeois, qui lit ses chansons comme de la poésie, véritable tour de force, qu’il accomplit en appariant en des termes uniques les vers recherchés du Caveau, société littéraire et épicurienne, au message politique de la chanson de goguette. Le présent article cherchera à déployer les modalités de la représentation par le chansonnier des pouvoirs d'Ancien Régime, mobilisés comme les symboles d'un arbitraire anachronique pour mieux mettre en garde l'opinion contre les dangers de la réaction cléricale et nobiliaire qui a cours dès les premières années de la Restauration. [less ▲]

Detailed reference viewed: 33 (2 UL)
Full Text
Peer Reviewed
See detailSafety Protocol for Collaborative Human-Robot Recycling Tasks
Medina, Angie C.; Mora, Juan F.; Martinez Luna, Carol UL et al

in IFAC-PapersOnLine (2019), 52(13), 2008--2013

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailRigor or rhetoric: Public philosopher and public in dialogue
Burks, Deven UL

in Perspectives: International Postgraduate Journal of Philosophy (2019), 9(1), 1-10

Brian Leiter (2016) throws down two gauntlets to philosophers engaged in dialogue with the broader public. If, with the first, public philosophers recognize that they cannot offer substantive answers but ... [more ▼]

Brian Leiter (2016) throws down two gauntlets to philosophers engaged in dialogue with the broader public. If, with the first, public philosophers recognize that they cannot offer substantive answers but only sophisticated method, they nevertheless fail to realize that said method does not resonate with the very public whom they purport to help. For, with the second, that method does not engage the emotivist and tribalist cast of contemporary public discourse: emotivist because a person’s moral and political beliefs are a function of emotional attitudes or affective responses for which she adduces reasons post hoc; tribalist because the person tracks not the inferential relation between beliefs but her similarity with interlocutors. In order to understand the full extent of this critique, it is necessary, first, to parse strands of public philosophy, distinct discursive sites, and pictures of philosophical practice and, then, to probe the critique’s empirical groundedness and intended scope. These elements in place, it is then possible to sketch public philosophy reconceived along Leiter’s lines as equal part rigor and rhetoric. That sketch may be somewhat filled out through two tactics employed in Jeffrey Stout’s (2004, 2010) work. These form part of a toolkit for philosophical dialogue whereby philosophers get a discursive grip on non-discursive factors underlying public discourse and push back on Leiter's dilemma. [less ▲]

Detailed reference viewed: 133 (5 UL)
Peer Reviewed
See detailEmotion regulation and sexual health: an online study protocol
Fischer, Vinicius; Andersson, gerhard; Billieux, Joël et al

in International Journal of Sexual Health (2019), 31

Detailed reference viewed: 35 (1 UL)
Full Text
Peer Reviewed
See detailRule-Based Supervisory Control-Extension for Automated Manufacturing Processes
Klecker, Sophie UL; Hichri, Bassem UL; Plapper, Peter UL

in International Journal of Mechanical Engineering and Robotics Research (2019)

Before performing a surface finishing process, human operators analyze the workpiece-conditions and react accordingly, i.e. they adapt the contact-situation of the tool with respect to the surface. This ... [more ▼]

Before performing a surface finishing process, human operators analyze the workpiece-conditions and react accordingly, i.e. they adapt the contact-situation of the tool with respect to the surface. This first step is ignored in most suggested automation concepts. Although their performance is satisfactory for the general process thanks to adaptive position- and force-/torque-control algorithms, they are unable to address specific problematic cases as often encountered in practice because of variations in workpiece-dimensions or -positioning. In this work, a human mimicking element is developed to overcome this limitation of current control concepts and to translate human expertise to the robotic manipulator. A rule-based system is designed where human knowledge is encoded as if-then rules. This system is integrated with a previously suggested control strategy in a hierarchical manner. The developed concept is experimentally validated on a KUKA LWR 4+-robotic manipulator. [less ▲]

Detailed reference viewed: 130 (14 UL)
Full Text
Peer Reviewed
See detailOn the Evolution of Mobile App Complexity
Gao, Jun UL; Li, ; Bissyande, Tegawendé François D Assise UL et al

in Proceedings of 2019 24th International Conference on Engineering of Complex Computer Systems (2019)

Android developers are known to frequently update their apps for fixing bugs and addressing vulnerabilities, but more commonly for introducing new features. This process leads a trail in the ecosystem ... [more ▼]

Android developers are known to frequently update their apps for fixing bugs and addressing vulnerabilities, but more commonly for introducing new features. This process leads a trail in the ecosystem with multiple successive app versions which record historical evolutions of a variety of apps. While the literature includes various works related to such evolutions, little attention has been paid to the research question on how quality evolves, in particular with regards to maintainability and code complexity. In this work, we fill this gap by presenting a largescale empirical study: we leverage the AndroZoo dataset to obtain a significant number of app lineages (i.e., successive releases of the same Android apps), and rely on six well-established, maintainability-related complexity metrics commonly accepted in the literature on app quality, maintainability etc. Our empirical investigation eventually reveals that, overall, while Android apps become bigger in terms of code size as time goes by, the apps themselves appear to be increasingly maintainable and thus decreasingly complex [less ▲]

Detailed reference viewed: 58 (14 UL)
Full Text
Peer Reviewed
See detailTRIDENT: A Three-Steps Strategy to Digitise an Industrial System for Stepping into Industry 4.0
Benedick, Paul-Lou UL; Robert, Jérémy UL; Le Traon, Yves UL

in Proceedings of 45th Annual Conference of the IEEE Industrial Electronics Society (2019)

Detailed reference viewed: 98 (11 UL)
Full Text
Peer Reviewed
See detailInfluence of Macro-Substrate Composition in Wastewater on Micropollutant Removal
Christen, Anne UL; Gallé, Tom; Köhler, Christian et al

in the mobile app "MICROPOL 2019" (2019)

Detailed reference viewed: 119 (17 UL)
Full Text
Peer Reviewed
See detailL'action extérieure de l'Union européenne à la lumière du Brexit
Neframi, Eleftheria UL

in ERPL/PEDP (2019), 31(1), 209-239

The withdrawal of the UK from the Union places the exiting Member State within the framework of the exernal action of the Union. The present contribution studies the two dimensions of the impact of Brexit ... [more ▼]

The withdrawal of the UK from the Union places the exiting Member State within the framework of the exernal action of the Union. The present contribution studies the two dimensions of the impact of Brexit on the external action of the European Union: on the one hand, in the relationships between the UK-third country and the EU; on the other hand, in the relationships between the EU and the third countries and in particular in what concerns the change in treaty relations. The principles that govern the Union’s external action are adapted to the specific process and to the unprecedented context of Brexit, without losing sight of the Union’s objective of affirming itself as an international credible player. A new dynamic of the external action of the Union could emerge from the opportunity that Brexit offers to reconsider the status of Member State and the Union’s objectives. [less ▲]

Detailed reference viewed: 146 (7 UL)
Full Text
Peer Reviewed
See detailBlockchain-based Micropayment Systems: Economic Impact
Khan, Nida UL; Ahmad, Tabrez; State, Radu UL

in ACM IDEAS '19 Proceedings of the 23rd International Database Engineering & Applications Symposium (2019)

The inception of blockchain catapulted the development of innovative use cases utilizing the trustless, decentralized environment, empowered by cryptocurrencies. The envisaged benefits of the technology ... [more ▼]

The inception of blockchain catapulted the development of innovative use cases utilizing the trustless, decentralized environment, empowered by cryptocurrencies. The envisaged benefits of the technology includes the divisible nature of a cryptocurrency, that can facilitate payments in fractions of a cent, enabling micropayments through the blockchain. Micropayments are a critical tool to enable financial inclusion and to aid in global poverty alleviation. The paper conducts a study on the economic impact of blockchain-based micropayment systems, emphasizing their significance for socioeconomic benefit and financial inclusion. The paper also highlights the contribution of blockchain-based micropayments to the cybercrime economy, indicating the critical need of economic regulations to curtail the growing threat posed by the digital payment mechanism. [less ▲]

Detailed reference viewed: 280 (15 UL)
Full Text
Peer Reviewed
See detailPopularity Tracking for Proactive Content Caching with Dynamic Factor Analysis
Mehrizi Rahmat Abadi, Sajad UL; Tsakmalis, Anestis; ShahbazPanahi, Shahram et al

in IEEE (2019)

Detailed reference viewed: 68 (5 UL)
Full Text
Peer Reviewed
See detailRobotic trajectory tracking: Bio-inspired position and torque control
Klecker, Sophie UL; Hichri, Bassem UL; Plapper, Peter UL

in Procedia CIRP (2019)

As far as complex contact-based manufacturing tasks are concerned, humans outperform machines. Indeed, conventionally controlled robotic manipulators are limited to basic applications in close to ideal ... [more ▼]

As far as complex contact-based manufacturing tasks are concerned, humans outperform machines. Indeed, conventionally controlled robotic manipulators are limited to basic applications in close to ideal circumstances. However, tedious work in hazardous environments, make some tasks unsuitable for humans. Therefore, the interest in expanding the application-areas of robots arose. This paper employs a bottom-up approach to develop robust and adaptive learning algorithms for trajectory tracking: position and torque control in the presence of uncertainties and switching constraints. The robotic manipulators mimicking the human behavior based on bio-inspired algorithms, take advantage of their know-how. Simulations and experiments validate the concept-performance. [less ▲]

Detailed reference viewed: 84 (4 UL)
Full Text
See detailReductions of elliptic curves
Perucca, Antonella UL

in Proceedings of the Roman Number Theory Association (2019), 4

Detailed reference viewed: 116 (9 UL)
Full Text
Peer Reviewed
See detailEffects of acute yohimbine administration on interoception in major depression and childhood adversity
Kuehl, L. K.; Deuter, C. E.; Breden, I.-H. et al

in Psychoneuroendocrinology (2019), 107(Supplement 1), 4

Acute stress, release of stress hormones and chronic stress can affect the processing of visceral-afferent neural signals at different brain levels, which are important for interoception. However, it ... [more ▼]

Acute stress, release of stress hormones and chronic stress can affect the processing of visceral-afferent neural signals at different brain levels, which are important for interoception. However, it remains unclear if these effects are due to activation of the sympatho-adreno-medullary (SAM) axis or hypothalamicpituitary adrenocortical (HPA) axis. With this study, we aimed to investigate the selective effect of SAM axis activation on interoceptive accuracy. Central alpha2-adrenergic receptors represent a negative feedback mechanism of the SAM axis. For major depressive disorder (MDD) and adverse childhood experiences (ACE), alterations in the biological stress systems, including density and sensitivity of central alpha2-adrenergic receptors, have been shown. Healthy individuals without ACE (n = 46), healthy individuals with ACE (n = 23), patients with MDD and without ACE (n = 26) and patients with MDD with ACE (n = 22, all without antidepressant medication) were tested after oral administration of 10mg of yohimbine (alpha2-adrenergic receptors antagonist) and placebo administration in a repeated measures design. Interoceptive accuracy and sensibility were assessed in a heartbeat tracking task. Increases in systolic and diastolic blood pressure after yohimbine administration in all groups confirmed successful activation of the SAM axis. Interoceptive accuracy decreased after yohimbine intake only in the healthy group with ACE, but remained unchanged in all other groups. This ‘group’בdrug’ interaction effect may be due to selective up-regulation of alpha2- adrenergic receptors after experience of childhood trauma, which reduces capacity for attention focus on heartbeats. Suppressed processing of physical sensations in stressful situations may represent an adaptive response in healthy individuals with childhood adversity. [less ▲]

Detailed reference viewed: 94 (0 UL)
Full Text
Peer Reviewed
See detailPlasmonic Nanopore Prepared on MoS2 Membrane - Hybrid Nanostructures Based on Site Selective Deposition
Mosconi, Dario; Miele, Ermanno; Giovannini, Giovannini et al

in Proceedings of SPIE : The International Society for Optical Engineering (2019), 10894

Here, we propose easy and robust strategies for the versatile integration 2D material flakes on plasmonic nanoholes by means of site selective deposition of MoS2. The methods can be applied both to simple ... [more ▼]

Here, we propose easy and robust strategies for the versatile integration 2D material flakes on plasmonic nanoholes by means of site selective deposition of MoS2. The methods can be applied both to simple metallic flat nanostructures and to complex 3D metallic structures comprising nanoholes. The deposition methods allow the decoration of large ordered arrays of plasmonic structures with single or few layers of MoS2. We show that the plasmonic field generated by the nanohole can interact significantly with the 2D layer, thus representing an ideal system for hybrid 2DMaterial/ Plasmonic investigation. The controlled/ordered integration of 2D materials on plasmonic nanostructures opens a pathway towards new investigation of the following: enhanced light emission; strong coupling from plasmonic hybrid structures; hot electron generation; and sensors in general based on 2D materials. [less ▲]

Detailed reference viewed: 133 (0 UL)
Full Text
Peer Reviewed
See detailA Novel Data Packing Technique for QC-LDPC Decoder Architecture applied to NAND flash controller
Chou, Hung-Pu UL; Ma, Longyu; Sham, Chiu-Wing et al

in Global Conference on Consumer Electronics (2019)

Detailed reference viewed: 41 (9 UL)
See detailAll-Dielectric and Magnetoplasmonic Nanoantenna Surfaces for the Dynamic Chiroptics
Smetanina, Evgeniya; Zubritskaya, Irina; Pedrueza Villalmanzo, Esteban et al

in Proceedings 2019 Conference on Lasers and Electro-Optics Europe and European Quantum Electronics Conference (2019)

Optical platforms enabling the dynamic real-time control of the fundamental properties of light at visible and near-infrared wavelengths are the essential components for the future optical devices ... [more ▼]

Optical platforms enabling the dynamic real-time control of the fundamental properties of light at visible and near-infrared wavelengths are the essential components for the future optical devices. Combining magnetic materials with the metallic and all-dielectric nano-optics enables a simultaneous enhancement and mutual control of their magneto-optical and chiro-optical properties. Here we examine hybrid nanoantennas made of Si and ferromagnetic metal developing magnetically-controlled chiroptical surfaces. [less ▲]

Detailed reference viewed: 101 (0 UL)
Full Text
Peer Reviewed
See detailJSSJ rencontre RELOCAL – Mobilisations, sens et usages du concept de justice spatiale dans un projet de recherche européen
Blondel, Cyril UL; Evrard, Estelle UL; Németh, Sarolta et al

in Justice Spatiale - Spatial Justice (2019), 13(Espace public), 1-13

Detailed reference viewed: 68 (1 UL)
Full Text
Peer Reviewed
See detailPortrait of a Miner in a Landscape
Biryukov, Alex UL; Feher, Daniel UL

in IEEE INFOCOM 2019 Workshop Proceedings (2019)

Mining is one of the core elements of the proof-of-work based cryptocurrency economy. In this paper we investigate the generic landscape and hierarchy of miners on the example of Ethereum and Zcash, two ... [more ▼]

Mining is one of the core elements of the proof-of-work based cryptocurrency economy. In this paper we investigate the generic landscape and hierarchy of miners on the example of Ethereum and Zcash, two blockchains that are among the top 5 in terms of USD value of created coins. Both chains used ASIC resistant proofs-of-work which favors GPU mining in order to keep mining decentralized. This however has changed with recent introduction of ASIC miners for these chains. This transition allows us to develop methods that might detect hidden ASIC mining in a chain (if it exists), and to study how the introduction of ASICs effects the decentralization of mining power. Finally, we describe how an attacker might use public blockchain information to invalidate the privacy of miners, deducing the mining hardware of individual miners and their mining rewards. [less ▲]

Detailed reference viewed: 224 (13 UL)
Full Text
Peer Reviewed
See detailJSSJ Meets RELOCAL – Mobilizations, Meaning and Uses of the Concept of Spatial Justice in a European Research Project
Blondel, Cyril UL; Evrard, Estelle UL; Németh, Sarolta et al

in Justice Spatiale - Spatial Justice (2019), 13

Detailed reference viewed: 95 (4 UL)
Full Text
Peer Reviewed
See detailInfluence of stoichiometry and temperature on quasi Fermi level splitting of sulfide CIS absorber layers
Lomuscio, Alberto UL; Melchiorre, Michele UL; Siebentritt, Susanne UL

in 2018 IEEE 7th World Conference on Photovoltaic Energy Conversion, WCPEC 2018 - A Joint Conference of 45th IEEE PVSC, 28th PVSEC and 34th EU PVSEC (2018, November 29)

CuInS-based solar cells suffer from a low open circuit voltage. Absorbers grown under both Cu-excess and Cudeficiency have been used to fabricate record efficiency photovoltaic cells. In this work, we ... [more ▼]

CuInS-based solar cells suffer from a low open circuit voltage. Absorbers grown under both Cu-excess and Cudeficiency have been used to fabricate record efficiency photovoltaic cells. In this work, we present the influence of stoichiometry on the quality of absorbers by means of calibrated room temperature photoluminescence and quasi Fermi level splitting evaluation (qFLs). Deep defects-related photoluminescence decreases using higher Cu/In ratio, leading to a corresponding improvement in qFLs, with values above 900 meV for high copper rich absorbers. © 2018 IEEE. [less ▲]

Detailed reference viewed: 189 (8 UL)
Full Text
See detailConcrete-Filled Steel Tubular (CFTS) Columns Subjected to Eccentric Compressive Load
KEDZIORA, SLAWOMIR UL; Anwaar, Muhammad Omer

in AIP Conference Proceedings (2018, November 15)

Concrete-steel composite structures are very efficient in carrying high loads as they combine benefits of both materials concrete and steel. The combination of them can significantly improve the strength ... [more ▼]

Concrete-steel composite structures are very efficient in carrying high loads as they combine benefits of both materials concrete and steel. The combination of them can significantly improve the strength of the composite structure by taking advantage of high compression resistance of concrete and high strength of steel in tension. Recently, there has been renewed interest in the composite structures used in different forms, as beams, slabs, sandwich structures and columns and many methods of structural analyses were utilised. However, none of them was able to eliminate concrete material when it fractured. The presented work concerns circular composite columns CFST under eccentric compression. The principal objective of the project was to investigate a straightforward method based on a finite element analysis employed to estimate the load carrying capacity of columns. This study has also been set out to determine whether the Drucker-Prager material model of concrete without a crack capability could be used for analyses of the CFST columns with the additional elimination of the concrete material when concrete is damaged. The elaborated finite element model was verified with existing test data from the literature. The findings show that the correlation between the test results and the numerical analysis was excellent confirming the feasibility of usage of the proposed method for the assessment of complex cases of the CFST columns. A new part of the work is the employment of a death element feature to eliminate concrete material, which theoretically is not taking any load after reaching its tensile strength. A criterion to eliminate elements from the model is the maximum principal stress greater than tensile strength. The obtained results are excellent; the established goal was met entirely. [less ▲]

Detailed reference viewed: 185 (24 UL)
Full Text
Peer Reviewed
See detailFAST: A MapReduce Consensus for High Performance Blockchains
Khan, Nida UL

in ACM BlockSys'18 Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems (2018, November 04)

Blockchain platforms when used as a database for IoT systems can resolve data reliability fault-tolerance, consistency and non-repudiation issues. However, their inherent shortcomings related to their ... [more ▼]

Blockchain platforms when used as a database for IoT systems can resolve data reliability fault-tolerance, consistency and non-repudiation issues. However, their inherent shortcomings related to their throughput in terms of processed transactions, limit their applicability in such environments in a decentralized way as the underlying network is unable to sustain high workloads. In this paper a fully decentralized high performance consensus mechanism, named FAST, is proposed for a public blockchain. FAST is based on mapreduce paradigm for aggregating and adding transactions on blockchain blocks. FAST was implemented and evaluated in a basic blockchain prototype. A light client for FAST using IPFS, was developed to bring about a reduction in the data stored locally. The obtained results from tests conducted on the prototype depict that FAST exceeds the performance of not just other existing blockchain platforms but comes very close to the throughput of traditional electronic payment networks such as Visa. [less ▲]

Detailed reference viewed: 134 (19 UL)
See detailA survey: The usage of Augmented Reality in Industry
Gallala, Abir UL; Hichri, Bassem UL; Plapper, Peter UL

in Robotix-Academy Conference for Industrial Robotics 2018 (2018, November 01)

Human-Robot-Interaction technologies in industry 4.0 and modern manufacturing are more and more growing. Using off-line robot programming methods such as Augmented Reality (AR) could gain time and money ... [more ▼]

Human-Robot-Interaction technologies in industry 4.0 and modern manufacturing are more and more growing. Using off-line robot programming methods such as Augmented Reality (AR) could gain time and money as well as improve programming and repair tasks. This paper is a study of the use of AR in smart factories. [less ▲]

Detailed reference viewed: 128 (28 UL)
Full Text
Peer Reviewed
See detailDeterminants of cognitive decline in a large cross-national study using machine learning
Leist, Anja UL

in Innovation in Aging (2018, November), 2(S1), 244

Detailed reference viewed: 194 (10 UL)
Full Text
Peer Reviewed
See detailAssociations of wealth with frailty and memory impairment across the course of aging
Leist, Anja UL

in Innovation in Aging (2018, November), 2(S1), 906

Detailed reference viewed: 84 (1 UL)
Full Text
Peer Reviewed
See detailReflecting on teachers' practices as multimodally co-constructed in spatial reality
Arend, Béatrice UL

in Proceedings of ICERI2018 (2018, November)

Detailed reference viewed: 90 (7 UL)
See detailCFD Simulations of Adiabatic Boiling in Different Riser Geometries
M. Haag, Stephan Leyer

in NUTHOS-12 (2018, October 12)

Detailed reference viewed: 54 (15 UL)
Full Text
Peer Reviewed
See detailAre mutants really natural? A study on how “naturalness” helps mutant selection
Jimenez, Matthieu UL; Titcheu Chekam, Thierry UL; Cordy, Maxime UL et al

in Proceedings of 12th International Symposium on 
 Empirical Software Engineering and Measurement (ESEM'18) (2018, October 11)

Background: Code is repetitive and predictable in a way that is similar to the natural language. This means that code is ``natural'' and this ``naturalness'' can be captured by natural language modelling ... [more ▼]

Background: Code is repetitive and predictable in a way that is similar to the natural language. This means that code is ``natural'' and this ``naturalness'' can be captured by natural language modelling techniques. Such models promise to capture the program semantics and identify source code parts that `smell', i.e., they are strange, badly written and are generally error-prone (likely to be defective). Aims: We investigate the use of natural language modelling techniques in mutation testing (a testing technique that uses artificial faults). We thus, seek to identify how well artificial faults simulate real ones and ultimately understand how natural the artificial faults can be. %We investigate this question in a fault revelation perspective. Our intuition is that natural mutants, i.e., mutants that are predictable (follow the implicit coding norms of developers), are semantically useful and generally valuable (to testers). We also expect that mutants located on unnatural code locations (which are generally linked with error-proneness) to be of higher value than those located on natural code locations. Method: Based on this idea, we propose mutant selection strategies that rank mutants according to a) their naturalness (naturalness of the mutated code), b) the naturalness of their locations (naturalness of the original program statements) and c) their impact on the naturalness of the code that they apply to (naturalness differences between original and mutated statements). We empirically evaluate these issues on a benchmark set of 5 open-source projects, involving more than 100k mutants and 230 real faults. Based on the fault set we estimate the utility (i.e. capability to reveal faults) of mutants selected on the basis of their naturalness, and compare it against the utility of randomly selected mutants. Results: Our analysis shows that there is no link between naturalness and the fault revelation utility of mutants. We also demonstrate that the naturalness-based mutant selection performs similar (slightly worse) to the random mutant selection. Conclusions: Our findings are negative but we consider them interesting as they confute a strong intuition, i.e., fault revelation is independent of the mutants' naturalness. [less ▲]

Detailed reference viewed: 188 (22 UL)
Full Text
Peer Reviewed
See detailThe Levodopa Response Trial and the Parkinson Disease Digital Biomarker Challenge: Monitoring symptoms of Parkinson’s disease in the lab and home using wearable sensors
Daneault, J.; Vergara-Diaz, G.; Costante, G. et al

in Movement Disorders (2018, October 03), 33(S2), 525

Objective: To leverage a community of researchers and shared wearable data to develop algorithms to estimate the severity of PD specific symptoms. Background: People with Parkinson’s disease (PwPD) often ... [more ▼]

Objective: To leverage a community of researchers and shared wearable data to develop algorithms to estimate the severity of PD specific symptoms. Background: People with Parkinson’s disease (PwPD) often experience fluctuations in motor symptom severity. Wearable sensors have the potential to help clinicians monitor symptoms over time, outside the clinic. However, to gather accurate and clinically-relevant measures, there is a need to develop robust algorithms based on clinically- labelled data. Methods: The Levodopa Response Trial captured three-axis acceleration from two wrist-worn sensors and a smartphone located at the waist from 29 PwPD continuously over 4 days. On day 1, in an in-clinic visit, participants performed clinical assessments and motor tasks on their regular medication regimen. During these visits, a clinician also provided symptom severity scores for tremor, bradykinesia, and dyskinesia. On days 2 & 3, sensor data was collected while participants were at home. On day 4, participants returned to the clinic for the same assessments as day 1, but arrived without having taken their medication for at least 10 hours. Leveraging this dataset, Sage Bionetworks, the Michael J Fox Foundation and the Robert Wood Johnson Foundation launched the PD Digital Biomarker DREAM Challenge which made a subset of the data available to researchers to develop robust and accurate algorithms for the estimation of specific symptoms’ severity. Results: Teams participating in the challenge used several technical approaches, from signal processing to deep learning. 35 submissions were received for the estimation of action tremor severity. Teams achieved an area under the precision-recall curve (AUPR) of 0.444 to 0.75. As for dyskinesia during movement, 37 submissions were received and the teams achieved an AUPR of 0.175 to 0.477. Finally, 39 submissions were received for the estimation of bradykinesia and the teams achieved an AUPR of 0.413 to 0.95. Null expectations for the testing datasets were 0.432, 0.195, and 0.266, respectively. Conclusions: Making datasets available to the community leverages the creativity of different groups to develop robust and accurate algorithms for the estimation of PD symptom severity. This will lead to better quality and interpretability of data collected in unsupervised settings within the community. [less ▲]

Detailed reference viewed: 246 (10 UL)
Full Text
Peer Reviewed
See detailLightweight and Compliant Long Reach Aerial Manipulator for Inspection Operations
Suarez, Alejandro; Sanchez Cuevas, Pedro Jesus UL; Fernandez, Manuel et al

in 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (2018, October 01)

The proximity between the multirotor blades and the environmental obstacles restricts the application of aerial manipulators in inspection tasks due to the risk of impacts, the limitation in the reach of ... [more ▼]

The proximity between the multirotor blades and the environmental obstacles restricts the application of aerial manipulators in inspection tasks due to the risk of impacts, the limitation in the reach of the arm, and the physical interactions. This paper presents a long reach aerial manipulator consisting of a hexarotor platform equipped with a 2-DOF compliant joint arm attached at the tip of a one-meter-length link in passive pendulum configuration. The arm integrates magnetic encoders for force/torque estimation-control based on joint deflection, a range sensor in the forearm link for measuring the distance to the contact point, and a camera for visual inspection. A 2-DOF wearable exoskeleton interface has been developed, allowing the teleoperation of the arm with visual feedback in a more intuitive way. The paper also covers the kinematics and dynamics of the aerial manipulator, including the dynamics of the flexible long reach link. The developed system has been evaluated in test-bench and in outdoor flight tests. [less ▲]

Detailed reference viewed: 43 (3 UL)
Full Text
Peer Reviewed
See detailA17044 Community health workers for non-communicable disease interventions in the digital age
Mishra, Shiva Raj; Lygidakis, Charilaos UL; Neupane, Dinesh et al

in Journal of Hypertension (2018, October)

Objectives: In this study, we review the evidence and discuss how the digitalization affects the CHWs programs for tackling non-communicable diseases (NCDs) in low-and-middle income countries (LMICs ... [more ▼]

Objectives: In this study, we review the evidence and discuss how the digitalization affects the CHWs programs for tackling non-communicable diseases (NCDs) in low-and-middle income countries (LMICs). Methods: We conducted a review of literature covering two databases: PubMED and Embase. A total of 97 articles were abstracted for full text review of which 21 are included in the analysis. Existing theories were used to construct a conceptual framework for understanding how digitalization affects the prospects of CHW programs for NCDs. Results: We identified three benefits and three challenges of digitalization. Firstly, it will help improve the access and quality of services, notwithstanding its higher establishment and maintenance costs. Secondly, it will add efficiency in training and personnel management. Thirdly, it will leverage the use of data generated across grass-roots platforms to further research and evaluation. The challenges posed are related to funding, health literacy of CHWs, and systemic challenges related to motivating CHWs. More than 60 digital platforms were identified, including mobile based networking devices (used for behavioral change communication), Web-applications (used for contact tracking, reminder system, adherence tracing, data collection, and decision support), videoconference (used for decision support) and mobile applications (used for reminder system, supervision, patients’ management, hearing screening, and tele-consultation). Conclusion: The digitalization efforts of CHW programs are afflicted by many challenges, yet the rapid technological penetration and acceptability coupled with the gradual fall in costs constitute encouraging signals for the LMICs. Both CHWs interventions and digital technologies are not inexpensive, but they may provide better value for the money. [less ▲]

Detailed reference viewed: 172 (0 UL)
See detailInvestigation of Thermal Coupling in Condensation Process at COSMEA Facility with ATHLET Code
Zhang, Yu; Leyer, Stephan UL; Hampel, U

in Reactor engineering (2018, October)

Detailed reference viewed: 75 (16 UL)
Full Text
Peer Reviewed
See detailA Contribution to Cyber-Physical Systems Security: an Event-based Attack-tolerant Control Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Proceedings of 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2018 (2018, August 29)

In the present paper, a model-based fault/attack tolerant scheme is proposed to deal with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback ... [more ▼]

In the present paper, a model-based fault/attack tolerant scheme is proposed to deal with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback control based on an event-triggered framework is given with control synthesis and condition on the switching time. An event-based implementation is proposed in order to achieve novel security strategy. Observer and controller gains are deduced by solving su cient Bilinear Matrix Inequality (BMI) condition. Simulation results on a real-time laboratory three tank system are given to show the attack-tolerant control ability despite data deception attacks on both actuators and sensors. [less ▲]

Detailed reference viewed: 209 (22 UL)
Full Text
Peer Reviewed
See detailVisual emulation for Ethereum's virtual machine
Norvill, Robert UL; Fiz Pontiveros, Beltran UL; State, Radu UL et al

in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (2018, July 09)

In this work we present E-EVM, a tool that emulates and visualises the execution of smart contracts on the Ethereum Virtual Machine. By working with the readily available bytecode of smart contracts we ... [more ▼]

In this work we present E-EVM, a tool that emulates and visualises the execution of smart contracts on the Ethereum Virtual Machine. By working with the readily available bytecode of smart contracts we are able to display the program's control flow graph, opcodes and stack for each step of contract execution. This tool is designed to aid the user's understanding of the Etheruem Virtual Machine as well as aid the analysis of any given smart contract. As such, it functions as both an analysis and a learning tool. It allows the user to view the code in each block of a smart contract and follow possible control flow branches. It is able to detect loops and suggest optimisation candidates. It is possible to step through a contract one opcode at a time. E-EVM achieved an average of 85.6% code coverage when tested. [less ▲]

Detailed reference viewed: 112 (4 UL)
Full Text
Peer Reviewed
See detailAssessing the performance of coordinated predictive control strategies on urban-motorway networks
Rinaldi, Marco UL; Viti, Francesco UL

in IFAC-PapersOnLine (2018, July), 51(9), 285-290

Coordination and integration of different traffic control policies have been of considerable interest in research in the last decades and, recently, have been object of large scale implementation trials ... [more ▼]

Coordination and integration of different traffic control policies have been of considerable interest in research in the last decades and, recently, have been object of large scale implementation trials. In the setting of peri-urban motorway systems, coordination of various kinds of controllers must however be accompanied by accurate prediction of both propagation of flows and queues in the network, as well as the users’ response in terms of route choice. In this paper, we showcase through a real-life case study how coordination and prediction are both essential when performing hybrid urban-motorway control. Simulation results of a Model Predictive Control application are compared to simpler local control approaches, and the impact of coordinated intersection control and, additionally, Ramp Metering is evaluated. [less ▲]

Detailed reference viewed: 90 (1 UL)
Full Text
Peer Reviewed
See detailA Decoupling Approach to Design Observers for Polytopic Takagi-Sugeno Models Subject to Unknown Inputs
Bezzaoucha, Souad UL; Voos, Holger UL; Davila, Jorge et al

in Proceedings of the 2018 American Control Conference (2018, June 27)

A decoupling approach for state estimation of nonlinear systems represented in the polytopic Takagi-Sugeno with unmeasurable premise variables subject to unknown inputs is proposed in this paper. The idea ... [more ▼]

A decoupling approach for state estimation of nonlinear systems represented in the polytopic Takagi-Sugeno with unmeasurable premise variables subject to unknown inputs is proposed in this paper. The idea consists in defining a state and unknown input transformations in order to divide the state vector into two parts, a measurable part and an observable one (decoupled from the unknown input). A classical Luenberger observer to estimate the unmeasurable part is then designed and given in terms of Linear Matrix Inequalities (LMIs) conditions. A numerical example is also presented in order to illustrate the proposed approach. [less ▲]

Detailed reference viewed: 178 (6 UL)
Full Text
Peer Reviewed
See detailCyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Proceedings of the 2018 American Control Conference (2018, June 27)

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system ... [more ▼]

In the present paper, the problem of networked control system (NCS) cyber security is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The proposed results are about the so-called false data injection attacks and show how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 215 (9 UL)
Full Text
Peer Reviewed
See detailGene x Environment Interaction on Developmental Outcomes in Germany: What is the Environment that matters?
Gottschling, Juliana UL; Hahn, Elisabeth; Spinath, Frank M.

in Behavior Genetics (2018, June)

Detailed reference viewed: 71 (0 UL)
Full Text
Peer Reviewed
See detailIntrusion-Tolerant Autonomous Driving
Volp, Marcus UL; Verissimo, Paulo UL

in Proceedings of 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC) (2018, May 29)

Fully autonomous driving is one if not the killer application for the upcoming decade of real-time systems. However, in the presence of increasingly sophisticated attacks by highly skilled and well ... [more ▼]

Fully autonomous driving is one if not the killer application for the upcoming decade of real-time systems. However, in the presence of increasingly sophisticated attacks by highly skilled and well equipped adversarial teams, autonomous driving must not only guarantee timeliness and hence safety. It must also consider the dependability of the software concerning these properties while the system is facing attacks. For distributed systems, fault-and-intrusion tolerance toolboxes already offer a few solutions to tolerate partial compromise of the system behind a majority of healthy components operating in consensus. In this paper, we present a concept of an intrusion-tolerant architecture for autonomous driving. In such a scenario, predictability and recovery challenges arise from the inclusion of increasingly more complex software on increasingly less predictable hardware. We highlight how an intrusion tolerant design can help solve these issues by allowing timeliness to emerge from a majority of complex components being fast enough, often enough while preserving safety under attack through pre-computed fail safes. [less ▲]

Detailed reference viewed: 154 (22 UL)
Full Text
Peer Reviewed
See detailA UX Approach to Privacy and Security: the Impact of User, Contextual and System-Related Factors
Distler, Verena UL; Lallemand, Carine UL; Koenig, Vincent UL

in CHI Workshop Exploring Individual Diffferences in Privacy (2018, April)

This position paper lays out current and future studies which we conduct on the UX aspects of security and privacy, our goal being to understand which factors influence privacy-related decision-making. We ... [more ▼]

This position paper lays out current and future studies which we conduct on the UX aspects of security and privacy, our goal being to understand which factors influence privacy-related decision-making. We advocate using UX design methods in order to study interindividual differences, system-related and contextual factors involved in privacy and security attitudes and behaviors. These results will contribute to user-tailored and personalized privacy initiatives and guide the design of future technologies. [less ▲]

Detailed reference viewed: 367 (18 UL)
Full Text
Peer Reviewed
See detailAcceptability and Acceptance of Autonomous Mobility on Demand: The Impact of an Immersive Experience
Distler, Verena UL; Lallemand, Carine UL; Thierry, Bellet

in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (2018, April)

Autonomous vehicles have the potential to fundamentally change existing transportation systems. Beyond legal concerns, these societal evolutions will critically depend on user acceptance. As an emerging ... [more ▼]

Autonomous vehicles have the potential to fundamentally change existing transportation systems. Beyond legal concerns, these societal evolutions will critically depend on user acceptance. As an emerging mode of public transportation [7], Autonomous mobility on demand (AMoD) is of particular interest in this context. The aim of the present study is to identify the main components of acceptability (before first use) and acceptance (after first use) of AMoD, following a user experience (UX) framework. To address this goal, we conducted three workshops (N=14) involving open discussions and a ride in an experimental autonomous shuttle. Using a mixed-methods approach, we measured pre-immersion acceptability before immersing the participants in an on-demand transport scenario, and eventually measured post-immersion acceptance of AMoD. Results show that participants were reassured about safety concerns, however they perceived the AMoD experience as ineffective. Our findings highlight key factors to be taken into account when designing AMoD experiences. [less ▲]

Detailed reference viewed: 123 (13 UL)
Full Text
Peer Reviewed
See detailHigher Algebra over the Leibniz Operad
Poncin, Norbert UL

in Banach Center Publications (2018, March 18), 113

Detailed reference viewed: 298 (20 UL)
Full Text
Peer Reviewed
See detailInvestigating Siri as a virtual assistant in a learning context
Arend, Béatrice UL

in Proceedings of 12th annual International Technology, Education and Development Conference 2018 (2018, March)

Detailed reference viewed: 106 (5 UL)
Full Text
Peer Reviewed
See detailAdvancing flexible volatile compound sensors using liquid crystals encapsulated in polymer fibers
Reyes, Catherine UL; Lagerwall, Jan UL

in Proceedings of SPIE : The International Society for Optical Engineering (2018, February 08), 10555(105550O),

Until recently, organic vapor sensors using liquid crystals (LCs) have employed rigid glass substrates for confining the LC, and bulky equipment for vapor detection. Previously, we demonstrated that ... [more ▼]

Until recently, organic vapor sensors using liquid crystals (LCs) have employed rigid glass substrates for confining the LC, and bulky equipment for vapor detection. Previously, we demonstrated that coaxially electrospinning nematic LC within the core of polymer fibers provides an alternative and improved form factor for confinement. This enables ppm level sensitivity to harmful industrial organics, such as toluene, while giving the flexibility of textile-like sheets (imparted by polymer encapsulation). Moreover, toluene vapor responses of the LC-core fiber mats were visible macroscopically with the naked eye depending on the morphology of the fibers produced, and whether they were oriented in specific geometries (aligned, or random). We identified two types of responses: one corresponds to the LC transition from nematic to isotropic, and the other we suggest is due to an anchoring change at the LC-polymer interface that influences the alignment. While we need to study the presence that defects can have in more detail, we noted that fiber mat thickness is crucial in attempting to understand how and why we are able to visualize two responses in aligned LC-fiber mats. Ultimately, we noted that the response of the polymer sheath itself (softening) to organic vapor exposure affects the liquid crystal confinement in the core. From the microscopic point of view, this will influence the threshold concentration that fibers in a mat will overall respond to. In this paper we will discuss three findings the morphologies enabling LC-core fiber mat response to vapor seen both micro- and macroscopically, how thickness of the fiber mat can play a role in the visualization of the responses, and the effect that the polymer structure has in the mat’s sensitivity threshold. [less ▲]

Detailed reference viewed: 167 (23 UL)
Full Text
Peer Reviewed
See detailIdentification and Characterization of Variant Intolerant Sites across Human Protein 3-Dimensional Structures
Iqbal, Sumaiya; Berg Jespersen, Jakob; Perez-Palma, Eduardo et al

in Biophysical Journal (2018, February 02), 114(3, Suppl. 1), 664

The functional interpretation of genetic variation in disease-associated genes is far outpaced by data generation. Existing algorithms for prediction of variant consequences do not adequately distinguish ... [more ▼]

The functional interpretation of genetic variation in disease-associated genes is far outpaced by data generation. Existing algorithms for prediction of variant consequences do not adequately distinguish pathogenic variants from benign rare variants. This lack of statistical and bioinformatics analyses, accompanied by an ever-increasing number of identified variants in biomedical research and clinical applications, has become a major challenge. Established methods to predict the functional effect of genetic variation use the degree of amino acid conservation across species in linear protein sequence alignment. More recent methods include the spatial distribution pattern of known patient and control variants. Here, we propose to combine the linear conservation and spatial constrained based scores to devise a novel score that incorporates 3-dimensional structural properties of amino acid residues, such as the solvent-accessible surface area, degree of flexibility, secondary structure propensity and binding tendency, to quantify the effect of amino acid substitutions. For this study, we develop a framework for large-scale mapping of established linear sequence-based paralog and ortholog conservation scores onto the tertiary structures of human proteins. This framework can be utilized to map the spatial distribution of mutations on solved protein structures as well as homology models. As a proof of concept, using a homology model of the human Nav1.2 voltage-gated sodium channel structure, we observe spatial clustering in distinct domains of mutations, associated with Autism Spectrum Disorder (>20 variants) and Epilepsy (>100 variants), that exert opposing effects on channel function. We are currently characterizing all variants (>300k individuals) found in ClinVar, the largest disease variant database, as well as variants identified in >140k individuals from general population. The variant mapping framework and our score, informed with structural information, will be useful in identifying structural motifs of proteins associated with disease risk. [less ▲]

Detailed reference viewed: 130 (2 UL)
Full Text
Peer Reviewed
See detailRecycling Smart Contracts: Compression of the Ethereum Blockchain.
Fiz Pontiveros, Beltran UL; Norvill, Robert UL; State, Radu UL

in Proceedings of 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2018 (2018, February)

Detailed reference viewed: 206 (9 UL)
Full Text
Peer Reviewed
See detailFrequency Offset Locked, Dual Carrier Excitation of Phase modulated, Electro-optic Frequency Combs for Bandwidth Scaling and Nonlinear Spectral Broadening
Nagarjun, K. P.; Vikram, B. S.; Prakash, Roopa et al

in SPIE (2018, January 29)

DWDM with/without superchannel based photonic networks require the use of optical carriers with equalised amplitudes and frequency stabilization of adjacent carriers to realise reliable high bandwidth ... [more ▼]

DWDM with/without superchannel based photonic networks require the use of optical carriers with equalised amplitudes and frequency stabilization of adjacent carriers to realise reliable high bandwidth optical communication systems with high spectral efficiency and long reach. Cascading of electro-optic (EO) modulators is a versatile method for generating tuneable, high repetition rate frequency combs which can be used as sources for the carriers. However, the number of lines produced with this technique is limited by the number of phase modulators. Nonlinear spectral broadening is an attractive option for bandwidth scaling; however, bandwidth scaling of single carrier combs through four wave mixing suffers from unequal comb lines or power limitations due to Brillouin scattering. A simpler technique to increase the number of comb lines would involve using multicarrier excitations for comb generation which would result in a proportional increase in the comb lines. Further, dual-carrier excitation enables an excellent temporal profile for nonlinear spectral broadening. However, since the two carriers have uncorrelated drifts, the resultant frequency combs would be unsuitable for most applications. This issue can be overcome by frequency offset locking the two lasers. Here, we demonstrate frequency offset locking (MHz accuracy) of two diode lasers spaced by 100GHz by using an optical phase locked loop which locks one laser to a RF harmonic of the other. This allows for the generation of frequency comb lines locked to each other even post nonlinear broadening. Using this technique, we demonstrate a 25GHz frequency comb with >90 lines (2THz) in the C-band. [less ▲]

Detailed reference viewed: 46 (8 UL)
Full Text
Peer Reviewed
See detailA Model for Regulating of Ethical Preferences in Machine Ethics
Baniasadi, Zohreh UL; Parent, Xavier UL; Max, Charles UL et al

in Proceedings of International Conference on Human-Computer Interaction (2018)

Detailed reference viewed: 307 (45 UL)
Full Text
Peer Reviewed
See detailFDG-PET and metabolomics in PD-associated GBA variants
Greuel, Andrea; Trezzi, Jean-Pierre; Glaab, Enrico UL et al

in Movement Disorders (2018), 33(2), 599

Detailed reference viewed: 62 (0 UL)
Full Text
See detailChancen und Barrieren Inklusiver Bildung im Vergleich: Lernen von Anderen
Powell, Justin J W UL

in Schriftenreihe Eine für Alle — Die inklusive Schule für die Demokratie (2018), 3

Das Menschenrecht auf Inklusive Bildung als globale Norm – und als Thema der Bildungsforschung in Deutschland. Die hohe und gestiegene Bedeutung Inklusiver Bildung für Gesellschaften und Individuen wird ... [more ▼]

Das Menschenrecht auf Inklusive Bildung als globale Norm – und als Thema der Bildungsforschung in Deutschland. Die hohe und gestiegene Bedeutung Inklusiver Bildung für Gesellschaften und Individuen wird global, national, regional und lokal von verschiedensten Akteur*innen hervorgehoben und medial sehr breit rezipiert—und zunehmend auch wissenschaftlich multidisziplinär diskutiert. Durch Initiativen wie „Education for All“ (UNESCO, 2015), die Konvention über die Rechte von Menschen mit Behinderung der Vereinten Nationen (UN-BRK, seit 2006), welche inklusive Bildung als Menschenrecht verankert, oder die UN Millennium Development Goals (www.un.org/millenniumgoals) wird das Thema Inklusion verstärkt in Bildungspolitik und -praxis aufgegriffen. Innerhalb einer Dekade haben über 170 Länder die UN-BRK ratifiziert (United Nations, 2017). Artikel 24 definiert Inklusive Bildung als Menschenrecht: „Die Vertragsstaaten (sichern)... den Zugang zu einem inklusiven, hochwertigen und unentgeltlichen Unterricht“ (Art. 24, UN-BRK). Damit wird inklusive Bildung zur globalen Norm und zum einklagbaren Recht entlang des Lebenslaufs. In diesem Beitrag wird anhand ausgewählter Vergleiche aufgezeigt, wie sich die Expansion und Persistenz der schulischen Segregation anstatt der Ausweitung der Inklusion vollzieht. Dabei wurde ein langsamer Wandel statt Transformation dieser komplexen Bildungssysteme konstatiert. Im Ländervergleich wurden immer wieder markante Divergenzen festgestellt, wonach die unterschiedlichen „institutionellen Logiken“ dieser Systeme sichtbar wurden. Abschließend lässt sich festhalten, dass die Förderquote wohl weiter steigen wird wegen größerem Bedarf (oder wahrgenommenen Förderbedarfs), erhöhter Standards und gesteigerter Rechenschaftspflicht als Teile der Governance von Bildung. Sonderpädagogische Förderung nimmt seit Jahrzehnten weltweit zu, oft in Sonderschulen oder -klassen. Es mag paradox erscheinen, dass gleichzeitig sowohl segregierende als auch inklusive Lernumwelten expandieren. Der Grund: Die Verflechtung und Wechselwirkungen zwischen sonderpädagogischen Fördersystemen, allgemeiner Bildung und anderen Institutionen sowie die Interessen der beteiligten Professionen verhindern die Transformation hin zur schulischen Inklusion für alle. Gleichzeitig schreitet dennoch auch in den Bildungssystemen, die hochgradig selektiv und segregiert sind, Inklusive Bildung voran. Vergleichende Forschung verdeutlicht vielfältige Grenzen, aber auch Facilitatoren der Inklusion auf unterschiedlichen Ebenen. Die Ratifizierung der UN-BRK in Deutschland hat die Notwendigkeit unterstrichen, die Bildungssysteme auf Länder- und lokaler Ebene umzubauen und den Wandel zu erforschen. Die UN-BRK stärkt Advokaten der Inklusiven Bildung nachhaltig. Auch aufgrund des Bil- dungsföderalismus wird die Implementierung weiterhin ein schrittweiser, pfadabhängiger Prozess und keine fundamentale Transformation sein. Gerade in föderalen Ländern wie Deutschland und den USA gibt es eine Persistenz einzelstaatlicher Disparitäten trotz (inter-)nationaler Ziele, Normen und völkerrechtlicher Verträge, die es weiter zu untersuchen und zu implementieren gilt. Die Chance, die solche Systeme bieten, ist die Kontrastierung der diversen Pfade hin zur Inklusiven Bildung und die Chance zur Politik der Vielfalt, die zu einer Schule für alle und zur Pädagogik der Vielfalt passt. [less ▲]

Detailed reference viewed: 517 (12 UL)
Full Text
See detailLocally-confined electrodeposition of Cu(In,Ga)Se2micro islands for micro-concentrator solar cells.
Correa, David; Siopa, Daniel UL; Salomé, Pedro M.P. et al

in IEEE (2018)

Detailed reference viewed: 190 (6 UL)
Full Text
Peer Reviewed
See detailLegal Design Patterns for Privacy
Haapio, Helena; Hagan, Margaret; Palmirani, Monica et al

in Data Protection / LegalTech Proceedings of the 21st International Legal Informatics Symposium IRIS 2018 (2018)

Fulfilling the legal requirements of mandated disclosure is a challenge in many contexts. Privacy communication is no exception, especially for those who seek to effectively inform individuals about the ... [more ▼]

Fulfilling the legal requirements of mandated disclosure is a challenge in many contexts. Privacy communication is no exception, especially for those who seek to effectively inform individuals about the use of their data. Lawyers across countries and industries are facing recurring problems when (re)writing privacy notices and terms. Visual and interactive design patterns have been suggested as the solution, yet our analysis shows that they are lacking on most privacy policies. This indicates the need for standardization and an actionable pattern library, which we propose in this paper. [less ▲]

Detailed reference viewed: 230 (7 UL)
Full Text
Peer Reviewed
See detailDevelopment of a Data-Driven Approach based on Kalman filtering for CFD Reactor Analysis
Introini, Carolina; Cammi, Antonio; Lorenzi, Stefano et al

in PHYSOR 2018 (2018)

In the last several years, computer-based simulation has become an important analysis and design tool in many engineering fields. The common practice involves the use of low-fidelity models, which in most ... [more ▼]

In the last several years, computer-based simulation has become an important analysis and design tool in many engineering fields. The common practice involves the use of low-fidelity models, which in most cases are able to provide fairly accurate results while maintaining a low computational cost. However, for complex systems such as nuclear reactors, more detailed models are required for the in-depth analysis of the problem at hand, due for example to the complex geometries of the physical domain. Nevertheless, such models are affected by potentially critical uncertainties and inaccuracies. In this context, the use of data assimilation methods such as the Kalman filter to integrate local experimental data witihin the numerical model looks very promising as a high-fidelity analysis tool. In this work, the focus is the application of such methods to the problem of fluid-dynamics analysis of the reactor. Indeed, in terms of nuclear reactor investigation, a detailed characterization of the coolant behaviour within the reactor core is of manda- tory importance in order to understand, among others, the operating conditions of the system, and the potential occurrence of accident scenarios. In this context, the use of data assimilation methods allows the extraction of information of the thermo-dynamics state of the system in a benchmarked transitory in order to increase the fidelity of the com- putational model. Conversely to the current application of control-oriented black-box in the nuclear energy community, in this work the integration of the data-driven paradigm into the numerical formulation of the CFD problem is proposed. In particular, the al- gorithm outlined embeds the Kalman filter into a segregated predictor-corrector formu- lation, commonly adopted for CFD analysis. Due to the construction of the developed method, one of the main challenges achieved is the preservation of mass-conservation for the thermo-dynamics state during each time instant. As a preliminary verification, the proposed methodology is validated on a benchmark of the lid-driven cavity. The obtained results highlight the efficiency of the proposed method with respect to the state-of-art low fidelity approach. [less ▲]

Detailed reference viewed: 117 (3 UL)
Full Text
Peer Reviewed
See detailGender Norms and Relative Working Hours: Why Do Women Suffer More than Men from Working Longer Hours than their Partner?
Fleche, Sarah; Lepinteur, Anthony UL; Powdthavee, Nattavudh

in American Economic Association - Papers and Proceedings (2018)

Detailed reference viewed: 40 (4 UL)
Full Text
Peer Reviewed
See detailThe low-dimensional algebraic cohomology of the Witt and the Virasoro algebra
Ecker, Jill Marie-Anne UL; Schlichenmaier, Martin UL

in Journal of Physics. Conference Series (2018)

Detailed reference viewed: 116 (8 UL)
Full Text
Peer Reviewed
See detailTowards a Management Plane for Smart Contracts: Ethereum Case Study
Khan, Nida UL; Lahmadi, Abdelkader; Francois, Jerome et al

in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (2018)

Blockchain is an emerging foundational technology with the potential to create a novel economic and social system. The complexity of the technology poses many challenges and foremost amongst these are ... [more ▼]

Blockchain is an emerging foundational technology with the potential to create a novel economic and social system. The complexity of the technology poses many challenges and foremost amongst these are monitoring and management of blockchain-based decentralized applications. In this paper, we design, implement and evaluate a novel system to enable management operations in smart contracts. A key aspect of our system is that it facilitates the integration of these operations through dedicated ’managing’ smart contracts to provide data filtering as per the role of the smart contract-based application user. We evaluate the overhead costs of such data filtering operations after post-deployment analyses of five categories of smart contracts on the Ethereum public testnet, Rinkeby. We also build a monitoring tool to display public blockchain data using a dashboard coupled with a notification mechanism of any changes in private data to the administrator of the monitored decentralized application. [less ▲]

Detailed reference viewed: 181 (14 UL)
See detailTombeaux monumentaux d’Arlon/Orolaunum vicus
Ruppert, Christine UL

in Signa (2018), 7

Detailed reference viewed: 97 (3 UL)
Full Text
See detailLe droit commun et l'avenir du droit luxembourgeois
Kinsch, Patrick UL

in Actes de la section des sciences morales et politiques de l'Institut grand-ducal (2018), XXI

Le droit commun est un ensemble de règles ordinaires, censées être équilibrées, qui évite le spectaculaire, l’exorbitant, les privilèges. En droit privé, c’est (pour faire bref et un peu inexact) le droit ... [more ▼]

Le droit commun est un ensemble de règles ordinaires, censées être équilibrées, qui évite le spectaculaire, l’exorbitant, les privilèges. En droit privé, c’est (pour faire bref et un peu inexact) le droit du Code civil ; au-delà du droit civil, il existe du droit commun dans toutes les branches du droit, même en droit fiscal. Ne sous-estimons pas le droit commun ; il est précieux. Mais a-t-il un véritable avenir au Luxembourg ? Il a quelques alliés, il est vrai : le contrôle de la constitutionnalité des lois, et le contrôle des clauses abusives dans les contrats. Deux puissants facteurs jouent cependant contre lui : 1° le manque, paradoxal mais réel, de ressources qui permettraient de faire évoluer le droit commun, en particulier sur le plan législatif ; 2° le souhait de le remplacer par du droit dérogatoire (et compétitif dans le marché international des normes), qui n’a aucune des caractéristiques, rappelées ci-dessus, du droit commun. [less ▲]

Detailed reference viewed: 284 (32 UL)
See detailFractionation of cellulose nanocrystals enhances liquid crystal ordering without promoting gelation
Honorato, C.; Lehr, Claudius Moritz UL; Schutz, C. et al

in Abstracts of Papers of the American Chemical Society (2018), 256

Detailed reference viewed: 47 (5 UL)
Full Text
Peer Reviewed
See detailCognitive biases in pain: current challenges, future directions and treatment opportunities
Van Ryckeghem, Dimitri UL

in Canadian Journal of Pain (2018)

Cognitive biases are a core component of contemporary cognitive-affective models that try to explain pain experience, distress and disability in children and adults experiencing pain. The idea that ... [more ▼]

Cognitive biases are a core component of contemporary cognitive-affective models that try to explain pain experience, distress and disability in children and adults experiencing pain. The idea that children and adults with pain show cognitive biases for pain-related information, i.e. they selectively attend to pain-related information at the cost of other information (attentional bias), interpret ambiguous stimuli as pain-related (interpretation bias) or have biased memories for painful events (memory bias), has been particularly influential in this context. Notwithstanding the considerable progress made in the understanding of cognitive biases related to pain and threat, a number of questions remains unanswered and future challenges linger. A first challenge is to further delineate the characteristics of cognitive biases, including their content specificity and dynamics. A second challenge relates to the understanding of how cognitive biases interrelate with each other and possibly reinforce one another. A third challenge relates to the translation of findings on cognitive biases for pain into clear strategies and recommendations to optimize and evaluate pain treatment programs. Presenters in this symposium will address each of the above-mentioned lingering challenges by both critically reviewing the available evidence on cognitive biases in children and/ or adults experiencing pain and presenting novel research using innovative study set-ups and unique methods for assessing and modifying cognitive biases in children and adults experiencing pain. [less ▲]

Detailed reference viewed: 109 (12 UL)
Full Text
Peer Reviewed
See detailJames Bond's Most Secret Weapon
Leprévost, Franck UL

in Proceedings of the 3rd International Conference on Applications in Information Technology (2018)

This conference presents in a non-conventional way secret-key and public-key cryptology from its origins to the present days.

Detailed reference viewed: 123 (5 UL)
Full Text
Peer Reviewed
See detailComparison of Several RANS Modelling for the Pavia TRIGA Mark II Research Reactor
Introini, Carolina; Cammi, Antonio; Lorenzi, Stefano et al

in Journal of Nuclear Engineering and Radiation Science (2018)

Aim of this work is the comparison of different turbulent models based on the Reynolds Averaged Navier-Stokes (RANS) equations in order to find out which model is the most suitable for the study of the ... [more ▼]

Aim of this work is the comparison of different turbulent models based on the Reynolds Averaged Navier-Stokes (RANS) equations in order to find out which model is the most suitable for the study of the channel thermal-hydraulics of the TRIGA Mark II reactor. Only the steady state behaviour (i.e. the full power stationary operational conditions) of the reactor has been considered. To this end, the RAS (Reynolds-Averaged Simulation) models available in the open source CFD software OpenFOAM have been applied to the most internal channel of the TRIGA and assessed against a Large Eddy Simulation (LES) model. The results of the latter approach, expressed in terms of axial velocity, turbulent viscosity, turbulent kinetic energy, and temperature have been compared with the results obtained by the RAS models available in OpenFOAM (k − ε, k − ω and Reynolds Stress Transport). Heat transfer is taken into account as well by means of the turbulent energy diffusivity parameter. The simulation results demonstrate how, amongst the RAS models, the k − ω SST is the one whose results are closer to the LES simulation. This model seems to be the best one for the treatment of turbulent flow within the TRIGA subchannel, offering a good compromise between accuracy and computational requirements. Since it is much less expensive than an LES model, it can be applied even to full core calculation, in order to obtain accurate results with less computational effort. [less ▲]

Detailed reference viewed: 125 (8 UL)
Full Text
Peer Reviewed
See detailMonitoring the transaction selection policy of Bitcoin mining pools
Fiz Pontiveros, Beltran UL; Norvill, Robert UL; State, Radu UL

in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (2018)

Mining pools are collection of workers that work together as a group in order to collaborate in the proof of work and reduce the variance of their rewards when mining. In order to achieve this, Mining ... [more ▼]

Mining pools are collection of workers that work together as a group in order to collaborate in the proof of work and reduce the variance of their rewards when mining. In order to achieve this, Mining pools distribute amongst the workers the task of finding a block so that each worker works on a different subset of the candidate solutions. In most mining pools the selection of transactions to be part of the next block is performed by the pool manager and thus becomes more centralized. A mining Pool is expected to give priority to the most lucrative transactions in order to increase the block reward however changes to the transaction policy done without notification of workers would be difficult to detect. In this paper we treat the transaction selection policy performed by miners as a classification problem; for each block we create a dataset, separate them by mining pool and apply feature selection techniques to extract a vector of importance for each feature. We then track variations in feature importance as new blocks arrive and show using a generated scenario how a change in policy by a mining pool could be detected. [less ▲]

Detailed reference viewed: 217 (10 UL)
Full Text
Peer Reviewed
See detailHelical light emission from plasmonic vortices via magnetic tapered tip
Maccaferri, Nicolò UL; Gorodetski, Yuri; Garoli, Denis

in Journal of Physics. Conference Series (2018), 961

We investigate an architecture where a plasmonic vortex excited in a gold surface propagates on an adiabatically tapered magnetic tip and detaches to the far-field while carrying a well-defined optical ... [more ▼]

We investigate an architecture where a plasmonic vortex excited in a gold surface propagates on an adiabatically tapered magnetic tip and detaches to the far-field while carrying a well-defined optical angular momentum. We analyze the out-coming light and show that, despite generally high losses of flat magnetic surface, our 3D structure exhibits high energy throughput. Moreover, we show that once a magneto-optical activity is activated inside the magnetic tip a modulation of the total power transmittance is possible. [less ▲]

Detailed reference viewed: 113 (1 UL)
Full Text
Peer Reviewed
See detailAre we post-justification? Stout's case for self-knowledge, political justification and public philosophy
Burks, Deven UL

in Ethics, Politics and Society (2018), 1

Must the participant to public discourse have knowledge of her beliefs, attitudes and reasons as well as belief-formation processes to have justified political belief? In this paper, we test this question ... [more ▼]

Must the participant to public discourse have knowledge of her beliefs, attitudes and reasons as well as belief-formation processes to have justified political belief? In this paper, we test this question with reference to Jeffrey Stout’s (2004) approach to public discourse and public philosophy. After defining self- knowledge and justification along the lines of James Pryor (2004), we map thereon Stout’s view of public discourse and public philosophy as democratic piety, earnest storytelling and Brandomian expressive rationality. We then lay out Brian Leiter’s (2016) naturalistic critique of public philosophy as “discursive hygiene” to see whether Stoutian public philosophy survives the former’s emotivist-tribalist gauntlet. Lastly, we find that Leiter’s critique proves less radical than it may appear and requires the moderating influence of a public philosophy like Stout’s. All in all, Stoutian public discourse and public philosophy powerfully illustrates a strong, necessary connection between self-knowledge and political justification. Post-truth is not post-justification. [less ▲]

Detailed reference viewed: 170 (3 UL)
Full Text
Peer Reviewed
See detailDirectionality of Attacks in Natural Language Argumentation
Cramer, Marcos UL; Guillaume, Mathieu UL

in CEUR Workshop Proceedings (2018)

In formal (abstract and structured) argumentation theory, a central notion is that of an attack between a counterargument and the argument that it is challenging. Unlike the notion of an inconsistency ... [more ▼]

In formal (abstract and structured) argumentation theory, a central notion is that of an attack between a counterargument and the argument that it is challenging. Unlike the notion of an inconsistency between two statements in classical logic, this notion of an attack between arguments can be asymmetric, i.e. an argument A can attack an argument B without B attacking A. While this property of the formal systems studied by argumentation theorist has been motivated by considerations about the human practice of argumentation in natural language, there have not been any systematic studies on the connection between the directionality of attacks in argumentation-theoretic formalisms and the way humans actually interpret conflicts between arguments in a non-symmetric way. In this paper, we report on the result of two empirical cognitive studies that aim at filling this gap, one study with ordinary adults (undergraduate students) and one study with adult experts in formal argumentation theory. We interpret the results in light of the notions and distinctions defined in the ASPIC+ framework for structured argumentation, and discuss the relevance of our findings to past and future empirical studies about the link between human argumentation and formal argumentation theory. [less ▲]

Detailed reference viewed: 77 (0 UL)
Full Text
Peer Reviewed
See detailEmpirical Cognitive Study on Abstract Argumentation Semantics
Cramer, Marcos UL; Guillaume, Mathieu UL

in Frontiers in Artificial Intelligence and Applications (2018)

In abstract argumentation theory, multiple argumentation semantics have been proposed that allow to select sets of jointly acceptable arguments from a given set of arguments based on the attack relation ... [more ▼]

In abstract argumentation theory, multiple argumentation semantics have been proposed that allow to select sets of jointly acceptable arguments from a given set of arguments based on the attack relation between arguments. The existence of multiple argumentation semantics raises the question which of these semantics predicts best how humans evaluate arguments, possibly depending on the thematic con- text of the arguments. In this study we report on an empirical cognitive study in which we tested how humans evaluate sets of arguments de- pending on the abstract structure of the attack relation between them. Two pilot studies were performed to validate the intended link between argumentation frameworks and sets of natural language arguments. The main experiment involved a group deliberation phase and made use of three different thematic contexts of the argument sets involved. The data strongly suggest that independently of the thematic contexts that we have considered, strong acceptance and strong rejection according to the CF2 and preferred semantics are a better predictor for human argument acceptance than the grounded semantics (which is identical to strong acceptance/rejection with respect to complete semantics). Furthermore, the data suggest that CF2 semantics predicts human argument acceptance better than preferred semantics, but the data for this comparison is limited to a single thematic context. [less ▲]

Detailed reference viewed: 122 (2 UL)
Full Text
Peer Reviewed
See detailEditionsphilologie und inszenierende Typographie: eine praxeologische Perspektive auf die 'Mein-Kampf'-Edition des Instituts für Zeitgeschichte
Busch, Christopher UL; Ahrens, Moritz

in Editio: Internationales Jahrbuch für Editionswissenschaft (2018), 32

Detailed reference viewed: 141 (1 UL)
See detailUnderstanding human need fulfilment to support the design of secure experiences
Distler, Verena UL

in Proceedings of NordiCHI' 18 Doctoral Consortium (2018)

Detailed reference viewed: 71 (21 UL)
Full Text
See detailBinge-watching engagement as determined by motivations, impulsivity and emotional reactivity: A cluster analytic approach.
Flayelle, Maèva UL; Maurage, Pierre; Vögele, Claus UL et al

in Alcoholism, Clinical and Experimental Research (2018), 42 (Suppl. 2)

Detailed reference viewed: 106 (4 UL)
Full Text
Peer Reviewed
See detailA Parallel Multiscale DEM-VOF Method For Large-Scale Simulations Of Three-Phase Flows
Pozzetti, Gabriele UL; Besseron, Xavier UL; Rousset, Alban UL et al

in Proceedings of ECCM-ECFD 2018 (2018)

A parallel dual-grid multiscale DEM-VOF coupling is here investigated. Dual- grid multiscale couplings have been recently used to address different engineering problems involving the interaction between ... [more ▼]

A parallel dual-grid multiscale DEM-VOF coupling is here investigated. Dual- grid multiscale couplings have been recently used to address different engineering problems involving the interaction between granular phases and complex fluid flows. Nevertheless, previous studies did not focus on the parallel performance of such a coupling and were, therefore, limited to relatively small applications. In this contribution, we propose an insight into the performance of the dual-grid multiscale DEM-VOF method for three- phase flows when operated in parallel. In particular,we focus on a famous benchmark case for three-phase flows and assess the influence of the partitioning algorithm on the scalability of the dual-grid algorithm. [less ▲]

Detailed reference viewed: 153 (40 UL)
Full Text
Peer Reviewed
See detailElliptic Curves Discrete Logarithm Problem over a Finite Field Fp and p-adic Approximations
Leprévost, Franck UL; Bernard, Nicolas UL; Bouvry, Pascal UL

in Proceedings of the 3rd International Conference on Applications in Information Technology (ICAIT-2018) (2018)

These notes summarize some computations conducted around the Elliptic Curves Discrete Logarithm Problem (ECDLP) over a finite field Fp.

Detailed reference viewed: 120 (1 UL)