References of "Paper published in a journal"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailTowards a full support of obligations in XACML
El Kateb, Donia UL; Elrakaiby, Yehia UL; Mouelhi, T. et al

in Lecture Notes in Computer Science (2015), 8924

Policy-based systems rely on the separation of concerns, by implementing independently a software system and its associated security policy. XACML (eXtensible Access Control Markup Language) proposes a ... [more ▼]

Policy-based systems rely on the separation of concerns, by implementing independently a software system and its associated security policy. XACML (eXtensible Access Control Markup Language) proposes a conceptual architecture and a policy language to reflect this ideal design of policy-based systems.However, while rights are well-captured by authorizations, duties, also called obligations, are not well managed by XACML architecture. The current version of XACML lacks (1) well-defined syntax to express obligations and (2) an unified model to handle decision making w.r.t. obligation states and the history of obligations fulfillment/ violation. In this work, we propose an extension of XACML reference model that integrates obligation states in the decision making process.We have extended XACML language and architecture for a better obligations support and have shown how obligations are managed in our proposed extended XACML architecture: OB-XACML. © Springer International Publishing Switzerland 2015. [less ▲]

Detailed reference viewed: 128 (4 UL)
Full Text
Peer Reviewed
See detailHow can we promote cognitive reserve during the life course? Social, behavioral, contextual factors
Leist, Anja UL

in Gerontologist (2015), 55(Suppl 2), 210

Detailed reference viewed: 92 (9 UL)
Full Text
Peer Reviewed
See detailTransitively Consistent and Unbiased Multi-Image Registration Using Numerically Stable Transformation Synchronisation
Bernard, Florian UL; Thunberg, Johan UL; Salamanca Mino, Luis UL et al

in MIDAS Journal (2015)

Abstract. Transitive consistency of pairwise transformations is a desir- able property of groupwise image registration procedures. The transfor- mation synchronisation method [4] is able to retrieve ... [more ▼]

Abstract. Transitive consistency of pairwise transformations is a desir- able property of groupwise image registration procedures. The transfor- mation synchronisation method [4] is able to retrieve transitively con- sistent pairwise transformations from pairwise transformations that are initially not transitively consistent. In the present paper, we present a numerically stable implementation of the transformation synchronisa- tion method for a ne transformations, which can deal with very large translations, such as those occurring in medical images where the coor- dinate origins may be far away from each other. By using this method in conjunction with any pairwise (a ne) image registration algorithm, a transitively consistent and unbiased groupwise image registration can be achieved. Experiments involving the average template generation from 3D brain images demonstrate that the method is more robust with re- spect to outliers and achieves higher registration accuracy compared to reference-based registration. [less ▲]

Detailed reference viewed: 144 (21 UL)
Full Text
Peer Reviewed
See detailRecessions, unemployment and the brain: Do individual and aggregate economic shocks prior to retirement leave a cognitive ‘scar’?
Hessel, Philipp; Leist, Anja UL; Riumallo-Herl, Carlos J. et al

in http://paa2015.princeton.edu (2015)

Based on a linkage of state unemployment rates and individual-level data from the Health and Retirement Study (HRS), we assess whether exposure to unfavorable macroeconomic conditions in the years leading ... [more ▼]

Based on a linkage of state unemployment rates and individual-level data from the Health and Retirement Study (HRS), we assess whether exposure to unfavorable macroeconomic conditions in the years leading up to retirement affect both levels as well as changes in cognitive functioning after retirement. Our results suggest that recessions experienced in the years prior to retirement can have substantial negative effects on cognitive function at age 65 and beyond. Our results are robust to various specifications and suggest that these effects are particularly strong for older workers with unstable careers who are hit by a recession, while they are similar for individuals from different race or educational level. [less ▲]

Detailed reference viewed: 215 (15 UL)
Full Text
Peer Reviewed
See detailPrediction of Photovoltaic Cu(In,Ga)Se2 p-n Device Performance by forward Bias Electrochemical Analysis of Only the p-Type Cu(In,Ga)Se2 Films
Colombara, Diego UL; Bertram, Tobias UL; Depredurand, Valérie UL et al

in Electrochemical Society Transactions (2015), 66(6), 19-25

This work is an attempt to rate the quality of Mo/Cu(In,Ga)Se2 films intended for fabrication of photovoltaic devices. The procedure is based on the simple current-voltage electrochemical analysis of the ... [more ▼]

This work is an attempt to rate the quality of Mo/Cu(In,Ga)Se2 films intended for fabrication of photovoltaic devices. The procedure is based on the simple current-voltage electrochemical analysis of the bilayer in a Eu2+/3+-containing electrolyte solution. Two series of bilayer samples were tested electrochemically, while sister samples were completed into Mo/Cu(In,Ga)Se2/CdS/i-ZnO/Al:ZnO/Ni-Al solid state devices and their current-voltage characteristics measured in the dark. A correlation was found between the reverse saturation current density of the solid state devices and an analogous parameter extracted from the electrochemical response in forward bias. While Eu2+ was found to be metastable in water posing restrictions to the application, reproducible measurements were achieved with a methanol-based solution. The intrinsic simplicity of the proposed methodology makes it particularly suitable for the implementation of a low-cost diagnostic tool. [less ▲]

Detailed reference viewed: 150 (8 UL)
Full Text
Peer Reviewed
See detailWillibrord et son action. Une historiographie entre ancrage local et perspectives nationales et internationales (début 19e-début 21e siècle)
Pettiau, Hérold UL

in Hemecht : Zeitschrift für Luxemburger Geschichte = Revue d'Histoire Luxembourgeoise (2014, December), 66(3/4), 317-336

This is an historiographical study of Willibrord, abbot of Echternach and bishop of Utrecht, focussing on the local, luxembourgian context at Echternach, set within a broader national and international ... [more ▼]

This is an historiographical study of Willibrord, abbot of Echternach and bishop of Utrecht, focussing on the local, luxembourgian context at Echternach, set within a broader national and international scholarly context, from the beginning of the 19th century and the beginning of the 21st century. [less ▲]

Detailed reference viewed: 85 (5 UL)
Full Text
Peer Reviewed
See detailHuman-Robot Collaboration: Twofold strategy algorithm to avoid collisions using ToF sensor
Ahmad, Rafiq UL; Plapper, Peter UL

in Applied Mechanics and Materials Journal (2014, December)

The importance of Human Robot Interaction to complement human skills in a manufacturing environment with industrial robots increases the concerns over safety of human and the robot. It is necessary to ... [more ▼]

The importance of Human Robot Interaction to complement human skills in a manufacturing environment with industrial robots increases the concerns over safety of human and the robot. It is necessary to identify collision risks and avoid them otherwise production stops may cost a huge amount to the industry. A robot working at manufacturing facility should be able to predict potential collisions and must be able to prevent i.e. react automatically for safe detour around obstacle/human. Currently, industrial robots are able to detect collisions after a real contact but the existing proposals for avoiding collisions are either computationally expensive or not very well adapted to human safety. The objective of this paper is to provide intelligence to the industrial robot to predict collision risks and react automatically without stopping the production in a static environment. The proposed approach using Time of Flight (TOF) camera, provides decision regarding trajectory correction and improvement by shifting robot to a secure position. The application presented in this paper is for safe KUKA robot trajectory generation in peg-in-hole assembly process in the laboratory context. [less ▲]

Detailed reference viewed: 213 (11 UL)
Full Text
Peer Reviewed
See detailAnt-Air self-learning algorithm for path planning in a cluttered environment
Ahmad, Rafiq UL; Plapper, Peter UL

in Applied Mechanics and Materials Journal (2014, December)

Path planning in unstructured area while dealing with narrow spaces is an area of research which is receiving extensive interest. Many existing algorithms are able to produce safe paths but the presented ... [more ▼]

Path planning in unstructured area while dealing with narrow spaces is an area of research which is receiving extensive interest. Many existing algorithms are able to produce safe paths but the presented concepts are either not adapted to narrow spaces or they are unable to learn from the past experience to improve repeated movements from the same agent or followed trajectories by other agents. This paper introduces an original concept based on Ant-Air phenomenon for safe path planning in a cluttered environment where narrow passages are treated. The algorithm presented is able to learn from the past experience and hence improve the already generated trajectory further by using some lessons learned from the past experience. The concept is applicable in various domains such as mobile robot path planning, manipulator trajectory generation and part movement in narrow passages in real or virtual assembly/disassembly process. [less ▲]

Detailed reference viewed: 164 (16 UL)
Full Text
Peer Reviewed
See detailWorkplace Relocation and Mobility Changes in a Transnational Metropolitan Area: The Case of the University of Luxembourg
Sprumont, François UL; Viti, Francesco UL; Caruso, Geoffrey UL et al

in Transportation Research Procedia (2014, December), 4

The aim of this paper is to study the utility variation related to the commuting mobility of University staff members due to their future workplace relocation. During the year 2012, a travel survey was ... [more ▼]

The aim of this paper is to study the utility variation related to the commuting mobility of University staff members due to their future workplace relocation. During the year 2012, a travel survey was completed by a total of 397 staff members, representing 36.4% of the university employees, who filled in a questionnaire which revealed complex decision making patterns due to the special traveling scenario involving four countries at once. A Multinomial Logit model has been used to anticipate the impact of university relocation from the capital city to a developing area in the south of the country which will happen between 2015 and 2018 and that will affect most of the employees. The effects of several Travel Demand Management measures are discussed based on the analysis of alternative scenarios [less ▲]

Detailed reference viewed: 261 (32 UL)
Full Text
Peer Reviewed
See detailSafe and Automated Tool-Path Generation for Multi-Axis Production Machines
Ahmad, Rafiq UL; Plapper, Peter UL

in Transactions of the American Society of Mechanical Engineers (2014, November 14), 2B(Advanced Manufacturing), 0202034-7

Multi-axis machines are growing rapidly their precision and complexity with the increasing importance of machine intelligence, automation, optimization and safety. It is necessary to identify collision ... [more ▼]

Multi-axis machines are growing rapidly their precision and complexity with the increasing importance of machine intelligence, automation, optimization and safety. It is necessary to identify collision risks and avoid them in manufacturing otherwise production stops may cost a huge amount to the manufacturing company. This study has focused on safe trajectory generation for CNC machines especially focusing on high risked non-functional trajectories. These machines should be able to see any unwilling situation (i.e. collisions) in their vicinity and must be able to detect and react automatically in real-time for safe tool movements. Currently CAM software and some multi-axis machines are able to detect collisions but they do not have any solution to avoid such collisions automatically. The main objective is to make multi-axis machine vision system effective enough that it can see all its activities regarding collisions and can react or command automatically online as well as off-line for real and virtual productions. In presence of obstacles during manufacturing, the proposed approach will provide decisions regarding trajectory correction and improvement automatically. The proposed vision concept is able to take into account the evolution of the scene i.e. the aspects of changes to the obstacle like shape, size or presence during production. The application presented in this paper is for 2D traversal safe online trajectories generation in virtual simulated dynamic environment, which will be adapted to the real-time real machining scenarios at shop-floor by integrating it with STEP-NC technology in future. [less ▲]

Detailed reference viewed: 129 (12 UL)
Full Text
Peer Reviewed
See detailPhishScore: Hacking Phishers' Minds
Marchal, Samuel UL; François, Jérôme UL; State, Radu UL et al

in Proceedings of the 10th International Conference on Network and Service Management (2014, November)

Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This technique is inefficient due ... [more ▼]

Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This technique is inefficient due to the short lifetime of phishing Web sites, making recent approaches relying on real-time or proactive phishing URLs detection techniques more appropriate. In this paper we introduce PhishScore, an automated real-time phishing detection system. We observed that phishing URLs usually have few relationships between the part of the URL that must be registered (upper level domain) and the remaining part of the URL (low level domain, path, query). Hence, we define this concept as intra-URL relatedness and evaluate it using features extracted from words that compose a URL based on query data from Google and Yahoo search engines. These features are then used in machine learning based classification to detect phishing URLs from a real dataset. [less ▲]

Detailed reference viewed: 261 (6 UL)
Full Text
Peer Reviewed
See detailH2-Based Network Volatility Measures
Goncalves, Jorge UL; Huang, Qingqing; Yuan, Ye et al

in American Control Conference (2014, June)

Detailed reference viewed: 55 (0 UL)
Full Text
Peer Reviewed
See detailComparison of ODE-based models for reactive oxygen species regulation system
Ignatenko, Andrew UL; Kolodkin, Alexey UL; Peters, Bernhard UL et al

in Proceedings of ICCSA 2014 (2014, June)

Reactive oxygen species (ROS) play important role in the functioning of any cell and especially in the lifecycle of mitochondria. Since the action of ROS can be both positive and negative then the ... [more ▼]

Reactive oxygen species (ROS) play important role in the functioning of any cell and especially in the lifecycle of mitochondria. Since the action of ROS can be both positive and negative then the remarkable role can be played by ROS regulation system. We constructed three different ODE based kinetic models of different complexity for the ROS management system and shown the difference in the dynamics of these systems under different conditions. Using results of numerical simulation we showed that extraction of some subsystems can make the model more unstable. We also introduced the objective function for comparison of the models with structure of different complexity [less ▲]

Detailed reference viewed: 188 (35 UL)
See detailComparative study of the effect of untreated, silanized and grafted alumina nanoparticles on thermal and dynamic mechanical properties of the styrene-butadiene rubber
Sushko, Rymma UL; Baller, Jörg UL; Filimon, Marlena UL et al

in AIP Conferences Proceedings (2014, May 15), 1599

Elastomers filled with hard nanoparticles are of great technical importance for the rubber industry. In general, fillers improve mechanical properties of polymer materials, e.g. elastic moduli, tensile ... [more ▼]

Elastomers filled with hard nanoparticles are of great technical importance for the rubber industry. In general, fillers improve mechanical properties of polymer materials, e.g. elastic moduli, tensile strength etc. The smaller the size of the particles the larger is the interface where interactions between polymer molecules and fillers can generate new properties. Using Temperature Modulated Differential Scanning Calorimetry (TMDSC) and Dynamic Mechanical Analysis (DMA), we investigated the properties of the pure styrene-butadiene rubber (SBR), SBR/ alumina nanoparticles, SBR/silanized alumina and SBR/alumina grafted to polymer chains. Beside a general reinforcement effect seen in the complex elastic moduli, the studies revealed that: i) small concentrations of nanoparticles (of 1.5-2 wt%) lead to a minimum in the glass transition temperature as a function of nanoparticle content; ii) for the grafted nanocomposites increasing the nanoparticle concentration beyond 4 wt% yields an increase of Tg by 4 K; iii) DMA mastercurves showed that in case of untreated and silanized alumina mechanical behaviour of the composite systems is rather near to the one of the SBR matrix, but the grafting of elastomer molecules to the silanized fillers induces a quasi-solid like response of the system in the low frequency regime. [less ▲]

Detailed reference viewed: 113 (10 UL)
Full Text
Peer Reviewed
See detailRobust Primary User Identification using Compressive Sensing for Cognitive Radios
Lagunas, Eva UL; Najar, Montse

in IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP) (2014, May)

Detailed reference viewed: 38 (1 UL)
Full Text
Peer Reviewed
See detailSpecific language impairment in language minority children from low-income families
Engel de Abreu, Pascale UL; Cruz-Santos, Anabela; Puglisi, Marina

in Developmental Medicine & Child Neurology (2014, May), 56(S3), 7-23

Background: This study seeks to determine whether executive functioning represents an area of difficulty for bilingual children with SLI and if so, which specific executive processes are affected. Methods ... [more ▼]

Background: This study seeks to determine whether executive functioning represents an area of difficulty for bilingual children with SLI and if so, which specific executive processes are affected. Methods: The data from 81 eight-year-olds from the following groups was analyzed: (1) 15 Portuguese-Luxembourgish bilinguals from Luxembourg with an SLI diagnosis; (2) 33 typically developing Portuguese-Luxembourgish bilinguals from Luxembourg; (3) 33 typically developing Portuguese-speaking monolinguals from Portugal. Groups were matched on first language, ethnicity, chronological age, socioeconomic status, and nonverbal intelligence. Children completed tests tapping: expressive and receptive vocabulary, syntactic comprehension, verbal and visuospatial working memory, selective attention and interference suppression. Results: The bilingual SLI group performed equally well to their typically developing peers on measures of visuospatial working memory but had lower scores than both control groups on tasks of verbal working memory. On measures of selective attention and interference suppression, typically developing children who were bilingual outperformed their monolingual counterparts. For selective attention, performance of the bilingual SLI group did not differ significantly from the controls. For interference suppression the bilingual SLI group performed significantly less well than typically developing bilinguals but not monolinguals. Discussion: The study indicates that although bilingual children with SLI do not demonstrate the same advantages in selective attention and interference suppression as typically developing bilinguals, they do not lag behind typically developing monolinguals in these domains of executive functioning. This finding raises the possibility that bilingualism might represent a protective factor against some of the cognitive limitations that are associated with SLI in monolinguals. [less ▲]

Detailed reference viewed: 173 (6 UL)
Full Text
Peer Reviewed
See detailPrincipe d’intégration et pouvoir des Etats membres
Neframi, Eleftheria UL

in Revue des Affaires Européennes [= RAE] = Law & European Affairs (2014, April)

La fonction permissive du principe d'intégration permet de justifier le critère d'établissement de lien personnel en l'absence de lien économique ou malgré l'existence du lien économique. La fonction ... [more ▼]

La fonction permissive du principe d'intégration permet de justifier le critère d'établissement de lien personnel en l'absence de lien économique ou malgré l'existence du lien économique. La fonction limitative du principe d'intégration encadre la justification d'une mesure discriminatoire et couvre le rapport horizontal entre deux Etats membres en cas de dualité de rattachement. [less ▲]

Detailed reference viewed: 153 (14 UL)
Full Text
Peer Reviewed
See detailBenchmarX
Anjorin, Anthony; Cunha, Alcino; Giese, Holger et al

in CEUR Workshop Proceedings (2014, March 28), 1133

Bidirectional transformation (BX) is a very active area of research interest. There is not only a growing body of theory, but also a rich set of tools supporting BX. The problem now arises that there is ... [more ▼]

Bidirectional transformation (BX) is a very active area of research interest. There is not only a growing body of theory, but also a rich set of tools supporting BX. The problem now arises that there is no commonly agreed-upon suite of tests or benchmarks that shows either the conformance of tools to theory, or the performance of tools in particular BX scenarios. This paper sets out to improve the state of affairs in this respect, by proposing a template and a set of required criteria for benchmark descriptions, as well as guide- lines for the artifacts that should be provided for each included test. As a proof of concept, the paper additionally provides a detailed description of one concrete benchmark. [less ▲]

Detailed reference viewed: 64 (6 UL)
Full Text
Peer Reviewed
See detailPreparation and study of 2-D semiconductors with Dirac type bands due to the honeycomb nanogeometry
Kalesaki, Efterpi UL; Boneschanscher, M. P.; Geuchies, J. J. et al

in Proceedings of SPIE (2014, March 07), 8981

The interest in 2-dimensional systems with a honeycomb lattice and related Dirac-­type electronic bands has exceeded the prototype graphene [1]. Currently, 2-­dimensional atomic [2,3] and nanoscale [4-­8 ... [more ▼]

The interest in 2-dimensional systems with a honeycomb lattice and related Dirac-­type electronic bands has exceeded the prototype graphene [1]. Currently, 2-­dimensional atomic [2,3] and nanoscale [4-­8] systems are extensively investigated in the search for materials with novel electronic properties that can be tailored by geometry. The immediate question that arises is how to fabricate 2-­D semiconductors that have a honeycomb nanogeometry, and as a consequence of that, display a Dirac-­type band structure? Here, we show that atomically coherent honeycomb superlattices of rocksalt (PbSe, PbTe) and zincblende (CdSe, CdTe) semiconductors can be obtained by nanocrystal self-­assembly and facet-­to-­facet atomic bonding, and subsequent cation exchange. We present a extended structural analysis of atomically coherent 2-­D honeycomb structures that were recently obtained with self-assembly and facet-­to-­facet bonding [9]. We show that this process may in principle lead to three different types of honeycomb structures, one with a graphene type-­, and two others with a silicene-­type structure. Using TEM, electron diffraction, STM and GISAXS it is convincingly shown that the structures are from the silicene-­type. In the second part of this work, we describe the electronic structure of graphene-­type and silicene type honeycomb semiconductors. We present the results of advanced electronic structure calculations using the sp3d5s* atomistic tight-­binding method10. For simplicity, we focus on semiconductors with a simple and single conduction band for the native bulk semiconductor. When the 3-­D geometry is changed into 2-­D honeycomb, a conduction band structure transformation to two types of Dirac cones, one for S-­ and one for P-­orbitals, is observed. The width of the bands depends on the honeycomb period and the coupling between the nanocrystals. Furthermore, there is a dispersionless P-­orbital band, which also forms a landmark of the honeycomb structure. The effects of considerable intrinsic spin-­orbit coupling are briefly considered. For heavy-­element compounds such as CdTe, strong intrinsic spin-­‐orbit coupling opens a non-­trivial gap at the P-orbital Dirac point, leading to a quantum Spin Hall effect [10-­12]. Our work shows that well known semiconductor crystals, known for centuries, can lead to systems with entirely new electronic properties, by the simple action of nanogeometry. It can be foreseen that such structures will play a key role in future opto-­electronic applications, provided that they can be fabricated in a straightforward way. [less ▲]

Detailed reference viewed: 140 (1 UL)
Full Text
See detailCompatible systems of symplectic Galois representations and the inverse Galois problem
Arias De Reyna Dominguez, Sara UL

in Oberwolfach Reports (2014, February 05)

Detailed reference viewed: 60 (1 UL)
Full Text
Peer Reviewed
See detailMOBAQ-LUX8 – Elaboration of competence-oriented test items for 8year-old luxembourgish students
Scheuer, Claude UL; Bund, Andreas UL; Becker, Werner UL

in Journal of the International Federation of Physical Education (2014, February), 83

Detailed reference viewed: 82 (9 UL)
Full Text
Peer Reviewed
See detailSpatial play effects in a tangible game with an f-formation of multiple players
Jungmann, Manuela UL; Cox, Richard; Fitzpatrick, Geraldine

in Proceedings of the Fifteenth Australasian User Interface Conference (2014, January), 150

Drawing on Kendon's F-formation framework of social interaction, we analysed the game-space activity of collocated players engaged in a tangible multiplayer game. Game input from groups of 3 players ... [more ▼]

Drawing on Kendon's F-formation framework of social interaction, we analysed the game-space activity of collocated players engaged in a tangible multiplayer game. Game input from groups of 3 players interacting competitively in a natural spatial arrangement via balance-boards requiring whole-body movements was logged and analysed quantitatively. The spatial analysis of a range of players' activities in game-space revealed synergistic effects combining perceptual-motor factors with game-strategy behaviour which were reflected in preferred game-board playing regions. The findings illustrate the importance for HCI designers of considering interactions between human spatial behaviour, physical space and virtual game-space as games become increasingly embodied and social. [less ▲]

Detailed reference viewed: 31 (3 UL)
Full Text
Peer Reviewed
See detailSocio-technical Security Analysis of Wireless Hotspots
Ferreira, Ana UL; Huynen, Jean-Louis UL; Koenig, Vincent UL et al

in Lecture Notes in Computer Science (2014)

We present a socio-technical analysis of security of Hotspot and Hotspot 2.0. The analysis focuses is user-centric, and aim at understanding which user action can compromise security in presence of a ... [more ▼]

We present a socio-technical analysis of security of Hotspot and Hotspot 2.0. The analysis focuses is user-centric, and aim at understanding which user action can compromise security in presence of a attacker. We identify research questions about possible factors that may affect user’s security decisions, and propose experiments to answer them. [less ▲]

Detailed reference viewed: 268 (28 UL)
Full Text
Peer Reviewed
See detailIsogeometric finite element analysis using polynomial splines over hierarchical T-meshes
Nguyen-Thanh, Nhon; Nguyen-Xuan, Hung; Bordas, Stéphane UL et al

in IOP Conference Series: Materials Science and Engineering (2014), 10(1),

Isogeometric finite element analysis has become a powerful alternative to standard finite elements due to their flexibility in handling complex geometries. One major drawback of NURBS based isogeometric ... [more ▼]

Isogeometric finite element analysis has become a powerful alternative to standard finite elements due to their flexibility in handling complex geometries. One major drawback of NURBS based isogeometric finite elements is their less effectiveness of local refinement. In this study, we present an alternative to NURBS based isogeometric finite elements that allow for local refinement. The idea is based on polynomial splines and exploits the flexibility of T-meshes for local refinement. The shape functions satisfy important properties such as non-negativity, local support and partition of unity. We will demonstrate the efficiency of the proposed method by two numerical examples. [less ▲]

Detailed reference viewed: 87 (0 UL)
Full Text
Peer Reviewed
See detailSocioeconomic inequalities in fatal opiate and cocaine related overdoses: Transgenerational baggage versus individual attainments
Origer, Alain UL; Bucki, Barbara UL; Baumann, Michèle UL

in European Health Psychologist (The) (2014)

Background. To determine socioeconomic inequalities in opiates and cocaine related Fatal OverDose (FOD) cases and their implications in terms of preventive measures. Methods. Cross-examination of law ... [more ▼]

Background. To determine socioeconomic inequalities in opiates and cocaine related Fatal OverDose (FOD) cases and their implications in terms of preventive measures. Methods. Cross-examination of law enforcement and healthcare data sources and of forensic evidence in a nested case-control study design. FOD cases were individually matched with 4 controls, according to sex, year of birth, drug administration route and duration of drug use. 272 cases vs. 1,056 controls were compared through conditional logistic regression. Findings. Being professionally active [OR=0.662 (95% CI 0.446–0.985)], reporting salary as main income source [OR=0.417 (95% CI 0.258–0.674)], and education attainment higher than primary school [OR=0.501 (95% CI 0.344-0.729)] revealed to be protective factors, whereas parental professional status was not associated to FOD. Discussion. Compared to their peers, drug users with lower socioeconomic profiles show increased odds of FOD. However, actual and self-referred socioeconomic characteristics of drug users, impacting on daily life quality, such as educational attainment, employment and revenue, appeared to be more predictive of FOD than transgenerational factors such as the parental socioeconomic status. Thus, motivational interventions aimed at socio-professional reintegration should be given due attention in dedicated harm prevention policies. [less ▲]

Detailed reference viewed: 68 (8 UL)
Full Text
Peer Reviewed
See detailIs Adult Education and Training Policy (1999-2011) in Portugal based on a Dilemma? The Critical Construction of the Employable Learner
Guimarães, Paula; Alves, Natália; Cavaco, Carmen et al

in Procedia Social and Behavioral Sciences (2014)

The concepts of competences and employability have been oftenly used in educational policy discourses. They have been based on a category, the employable learner both in the European Union and Portugal ... [more ▼]

The concepts of competences and employability have been oftenly used in educational policy discourses. They have been based on a category, the employable learner both in the European Union and Portugal. This paper set out to discuss how is the adult learner constructed within adult education and training policy, that is, under two programmes launched since 1999 in Portugal within the European Union's lifelong learning guidelines. A qualitative and interpretative approach was preferred for this paper. Two national policy discourses were subjected to content analysis. The conclusions state an ambiguous understanding of the employable learner. [less ▲]

Detailed reference viewed: 71 (0 UL)
Full Text
Peer Reviewed
See detail“School Means Nothing to me”. Vocationalism and School Disaffiliation in Education and Training Courses in Portugal
Alves, Natália; Guimarães, Paula; Marques, Marcelo UL et al

in Procedia Social and Behavioral Sciences (2014)

Education and Training Courses for young people have assumed great relevance in the Portuguese education system. Aimed at fighting school failure and dropout these courses fall within the compensatory ... [more ▼]

Education and Training Courses for young people have assumed great relevance in the Portuguese education system. Aimed at fighting school failure and dropout these courses fall within the compensatory education framework policies. Based on interviews, an analysis of the students attending Education and Training Courses, school pathways, experiences and representations on how this form of provision was achieved. Data collected pointed to a general feeling of disaffiliation towards school, seen as a necessary evil, as well as the understanding of Education and Training Courses as the last chance to conclude the 9 th year of basic education. [less ▲]

Detailed reference viewed: 84 (2 UL)
Full Text
Peer Reviewed
See detailSpatial Sparsity Based Direct Positioning for IR-UWB in IEEE 802.15.4a Channels
Lagunas, Eva UL; Najar, Montse; Navarro, Monica et al

in IEEE Int. Conf. UltraWide-Band (ICUWB) (2014)

Detailed reference viewed: 85 (2 UL)
Full Text
Peer Reviewed
See detailBuilding the social graph of the history of European integration: A pipeline for humanist-machine interaction in the digital humanities
Wieneke, Lars UL; Düring, M.; Silaume, G. et al

in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2014), 8359 LNCS

The breadth and scale of multimedia archives provides a tremendous potential for historical research that hasn't been fully tapped up to know. In this paper we want to discuss the approach taken by the ... [more ▼]

The breadth and scale of multimedia archives provides a tremendous potential for historical research that hasn't been fully tapped up to know. In this paper we want to discuss the approach taken by the History of Europe application, a demonstrator for the integration of human and machine computation that combines the power of face recognition technology with two distinctively different crowd-sourcing approaches to compute co-occurrences of persons in historical image sets. These co-occurrences are turned into a social graph that connects persons with each other and positions them, through information about the date and location of recording, in time and space. The resulting visualization of the graph as well as analytical tools can help historians to find new impulses for research and to un-earth previously unknown relationships. As such the integration of human expertise and machine computation enables a new class of applications for the exploration of multimedia archives with significant potential for the digital humanities. © 2014 Springer-Verlag. [less ▲]

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailEditorial: The Best Practice Principles for Proxy Advisor
Zetzsche, Dirk Andreas UL

in Ethical Boardroom (2014)

Detailed reference viewed: 57 (1 UL)
Full Text
Peer Reviewed
See detailSocial Interaction Based Audience Segregation for Online Social Networks.
van der Torre, Leon UL; Ahmed, Javed; Governatori, Guido et al

in Proceedings of the European Conference on Social Intelligence (2014)

Online social networking is the latest craze that has captured the attention of masses, people use these sites to communicate with their friends and family. These sites o er attractive means of social ... [more ▼]

Online social networking is the latest craze that has captured the attention of masses, people use these sites to communicate with their friends and family. These sites o er attractive means of social interac- tions and communications, but also raise privacy concerns. This paper examines user's abilities to control access to their personal information posted in online social networks. Online social networks lack common mechanism used by individuals in their real life to manage their privacy. The lack of such mechanism signi cantly a ects the level of user control over their self presentation in online social networks. In this paper, we present social interaction based audience segregation model for online so- cial networks. This model mimics real life interaction patterns and makes online social networks more privacy friendly. Our model uses type, fre- quency, and initiation factor of social interactions to calculate friendship strength. The main contribution of the model is that it considers set of all possible interactions among friends and assigns a numerical weight to each type of interaction in order to increase or decrease its contribu- tion in calculation of friendship strength based on its importance in the development of relationship ties. [less ▲]

Detailed reference viewed: 57 (4 UL)
Full Text
Peer Reviewed
See detailAn ASPIC-based legal argumentation framework for deontic reasoning
van der Torre, Leon UL; Villata, Serena

in Computational Models of Argument (2014)

In the last years, argumentation theory has been exploited to reason about norms, argue about enforced obligations and permissions, and establish the validity of norms seen as argumentative claims. In ... [more ▼]

In the last years, argumentation theory has been exploited to reason about norms, argue about enforced obligations and permissions, and establish the validity of norms seen as argumentative claims. In this paper, we start from the dynamic legal argumentation framework recently proposed by Prakken and Sartor, and we extend their ASPIC-based system by introducing deontic modalities, to include also normative concepts like factual and deontic detachment, and normative dynamics. Properties of the original and proposed legal argumentation system are presented and discussed, and related to deontic logic and logics of normative systems. [less ▲]

Detailed reference viewed: 64 (3 UL)
See detail""Au début, il n'y a rien" : L'origine du roman chez Queneau et Perec"
Raus, Tonia UL

in Cahiers Raymond Queneau (2014), 4

Detailed reference viewed: 1 (0 UL)
Full Text
See detailOrientare l'analisi. Una semiotica critica e materiale è possibile?
Treleani, Matteo UL

in STS Italia (2014)

Detailed reference viewed: 31 (0 UL)
Full Text
Peer Reviewed
See detailBreaking bad news in different medical conditions : exploring the physicians and patients perspectives
Muller, Laurent; Kretsch, Marina; Hannachi, Nawel et al

in European Health Psychologist (The) (2014)

Background: We aim to explore factors influencing the breaking bad news process in different medical contexts with irreversible conditions (others than cancer). Methods: 23 patients and 18 physicians ... [more ▼]

Background: We aim to explore factors influencing the breaking bad news process in different medical contexts with irreversible conditions (others than cancer). Methods: 23 patients and 18 physicians concerned by different chronic diseases were interviewed by psychologists. They received/broke bad news in the few months preceding the interview. Findings: Thematic analysis of interviews allowed to identify higher-order themes, and more specific themes for both, patients and physicians. The main topics covered by physicians concerned the determinants of the strategies to communicate with patients, the encountered difficulties, the initial training, the information, interpersonal relationships, emotional reactions, perception of its role, the specifics of the disease. The discourse of patients referred to three stages including specifics topics: the communication of bad news, the health care pathways, and the life with disease. Discussion: Data analysis highlight importance of patient and physician’s profiles, and specifics of disease, in the breaking bad news process. Recommendations to build tailored intervention for physicians by using formative self-assessment will be exposed. [less ▲]

Detailed reference viewed: 120 (1 UL)
Full Text
See detailApplying modular Galois representations to the Inverse Galois Problem
Wiese, Gabor UL

in Oberwolfach Reports (2014), 11(1), 305-309

For many finite groups, the Inverse Galois Problem can be approached through modular/automorphic Galois representations. This is a report explaining the basic strategy, ideas and methods behind some ... [more ▼]

For many finite groups, the Inverse Galois Problem can be approached through modular/automorphic Galois representations. This is a report explaining the basic strategy, ideas and methods behind some recent results. It focusses mostly on the 2-dimensional case and underlines in particular the importance of understanding coefficient fields. [less ▲]

Detailed reference viewed: 64 (2 UL)
Full Text
Peer Reviewed
See detailFamily caregivers’ health capability: Contribution of, and relations between its dimensions
Bucki, Barbara UL; Baumann, Michèle UL

in European Health Psychologist (The) (2014)

Background. Being family caregiver poses certain risks for physical, mental and social health. The health capability paradigm (Ruger, 2010) explores the capacity to achieve one’s optimal health. Family ... [more ▼]

Background. Being family caregiver poses certain risks for physical, mental and social health. The health capability paradigm (Ruger, 2010) explores the capacity to achieve one’s optimal health. Family caregivers’ health capability partly consists of 8 dimensions: physical and psychological functioning, lifestyle value, self-efficacy, family support, social capital, socio-economic conditions and access to health services. Which relations exist between these dimensions, and which ones contribute the most to health capability? Methods. Home-based structured interviews were led among 62 family caregivers living in Luxembourg 2 years after their relatives’ stroke. Twenty items measured the 8 dimensions of health capability. Using a Bayesian approach, a structural equation modelling was applied. Findings. Socio-economic conditions were positively correlated with all the other dimensions. Family caregivers’ fatigue and feeling abandoned by their families impeded their health capability the most. Discussion. Enhancing family caregivers’ well-being involves finding interventions relieving them physically and fostering family networking around the ill, giving priority to the socially disadvantaged. [less ▲]

Detailed reference viewed: 68 (6 UL)
Full Text
Peer Reviewed
See detailFinite-time road grade computation for a vehicle platoon
Yang, Tao; Yuan, Ye; Li, Kezhi et al

in IEEE (2014)

Given a platoon of vehicles traveling uphill, this paper considers the finite-time road grade computation problem. We propose a decentralized algorithm for an arbitrarily chosen vehicle to compute the ... [more ▼]

Given a platoon of vehicles traveling uphill, this paper considers the finite-time road grade computation problem. We propose a decentralized algorithm for an arbitrarily chosen vehicle to compute the road grade in a finite number of time-steps by using only its own successive velocity measurements. Simulations then illustrate the theoretical results. These new results can be applied to real-world vehicle platooning problems to reduce fuel consumption and carbon dioxide emissions. [less ▲]

Detailed reference viewed: 423 (6 UL)
Peer Reviewed
See detailDining Cryptographers with 0.924 Verifiable Collision Resolution
Franck, Christian UL

in Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica (2014), 14(1), 49-59

The dining cryptographers protocol implements a multiple access channel in which senders and recipients are anonymous. A problem is that a malicious participant can disrupt communication by deliberately ... [more ▼]

The dining cryptographers protocol implements a multiple access channel in which senders and recipients are anonymous. A problem is that a malicious participant can disrupt communication by deliberately creating collisions. We propose a computationally secure dining cryptographers protocol with collision resolution that achieves a maximum stable throughput of 0.924 messages per round and which allows to easily detect disruptors. [less ▲]

Detailed reference viewed: 112 (7 UL)
Full Text
See detailDistribution Grid Monitoring through Pilot Injection and Successive Interference Cancellation
Neshvad, Surena UL; Chatzinotas, Symeon UL; Sachau, Jürgen UL

in IAEE Conference Proceedings (2014)

Due to the push for renewable energy in the last decades, European countries have witnessed an exponential growth of Distributed Generation (DG) on the Medium Voltage (MV) network. An increasingly large ... [more ▼]

Due to the push for renewable energy in the last decades, European countries have witnessed an exponential growth of Distributed Generation (DG) on the Medium Voltage (MV) network. An increasingly large portion of the electricity demand is fed in through the distribution grid, whose good health and operational status will be important for guaranteeing grid stability. In Luxembourg, the distribution network is sparsely monitored and controlled, thus instabilities arising due to line overvoltage or DG malfunctioning are not rapidly detected and resolved. This research discusses a novel and low infrastructure methodology for online monitoring of the distribution grid. Such a tool will be increasingly necessary in order to guarantee the stability, reliability and security of the power network, as a larger and larger portion of the energy demand will be satisfied by DG in future years. In this research, advanced system identification techniques utilized in communications, such as Pseudo-Random Binary Sequences, Successive Interference Cancellation are applied to estimate the transfer function of power network propagation paths. The developed method proposes an online monitoring tool that computes grid parameters in real time during operation, without extensive infrastructure addition, by utilizing the PWM based inverters on the grid for active system identification. [less ▲]

Detailed reference viewed: 111 (9 UL)
Full Text
Peer Reviewed
See detailIn-Se surface treatment of Cu-rich grown CuInSe2
Bertram, Tobias UL; Depredurand, Valérie UL; Siebentritt, Susanne UL

in Proceedings of the IEEE Photovoltaic Specialist Conference 2014 (2014)

Detailed reference viewed: 171 (23 UL)
Full Text
Peer Reviewed
See detailPOD-based model order reduction for the simulation of strong nonlinear evolutions in structures: Application to damage propagation
Kerfriden, P.; Gosselet, P.; Adhikari, S. et al

in IOP Conference Series: Materials Science and Engineering (2014), 10(1),

In this paper, we develop a bridge between POD-based model order reduction techniques and the classical Newton-Krylov solvers to derive an efficient solution procedure for highly nonlinear problems ... [more ▼]

In this paper, we develop a bridge between POD-based model order reduction techniques and the classical Newton-Krylov solvers to derive an efficient solution procedure for highly nonlinear problems undergoing strong topological changes. [less ▲]

Detailed reference viewed: 81 (0 UL)
Full Text
Peer Reviewed
See detailAsymmetric quadratic landscape approximation model
Tantar, Alexandru-Adrian UL; Tantar, Emilia UL; Schütze, O.

in GECCO 2014 - Proceedings of the 2014 Genetic and Evolutionary Computation Conference (2014)

This work presents an asymmetric quadratic approximation model and an ε-archiving algorithm. The model allows to construct, under local convexity assumptions, descriptors for local optima points in ... [more ▼]

This work presents an asymmetric quadratic approximation model and an ε-archiving algorithm. The model allows to construct, under local convexity assumptions, descriptors for local optima points in continuous functions. A descriptor can be used to extract confidence radius information. The ε-archiving algorithm is designed to maintain and update a set of such asymmetric descriptors, spaced at some given threshold distance. An in-depth analysis is conducted on the stability and performance of the asymmetric model, comparing the results with the ones obtained by a quadratic polynomial approximation. A series of different applications are possible in areas such as dynamic and robust optimization. © 2014 ACM. [less ▲]

Detailed reference viewed: 111 (4 UL)
Full Text
Peer Reviewed
See detailLocal solutions of the generalized Dhombres functional equation in a neighbourhood of infinity
Tomaschek, Jörg UL; Reich, Ludwig

in ESAIM: Proceedings and Surveys (2014), 46

Detailed reference viewed: 70 (0 UL)
See detailPassive integral LOCA accident testing at Karlstein test facility
Drescher, R.; Wagner, T.; Prasser, H.-M. et al

in International Congress on Advances in Nuclear Power Plants, ICAPP 2014 (2014), 3

KERENA is an innovative boiling water reactor concept with passive safety systems (Generation III+) of AREVA . In order to verify the functionality and performance of the concept required for the ... [more ▼]

KERENA is an innovative boiling water reactor concept with passive safety systems (Generation III+) of AREVA . In order to verify the functionality and performance of the concept required for the transient and accident management, the test facility "Integral Teststand Karlstein" (INKA) was built in Karlstein (Germany). It is a mockup of the KERENA boiling water reactor containment, with integrated pressure suppression system. The complete chain of passive safety components is available. While the scaling of the passive components and the levels match the original values, the volume scaling of the containment compartments is approximately 1:24. The reactor pressure vessel (RPV) is simulated via the steam accumulator of the Karlstein Large Valve Test Facility (GAP). This vessel provides an energy storage capacity of approximately 1/6 of the KERENA RPV and is supplied by a Benson boiler with a thermal power of 22 MW. With respect to the available power supply, the containment- and system-sizing of the facility is by far the largest one of its kind worldwide. On March 21, 2013 the worldwide first large-scale, only passively managed, integral accident test of a boiling water reactor was simulated at INKA. The integral test measured the combined response of the KERENA passive safety systems to the postulated initiating event "Main Steam Line Break" (MSLB) inside the Containment with decay heat simulation. The main goals were to show the performance and the interaction of the KERENA passive safety systems, the ability to keep the core covered, to discharge the decay heat via the appropriate pathway under all circumstances and to maintain the containment within defined limits, i.e. to bring the plant to a controlled state. The performed integral test (MSLB) was being initiated via the opening of the leak at original RPV boundary conditions (75 bar reactor pressure). The leak causes a mass and energy flow from the reactor pressure vessel into the containment. The resulting drop in the RPV water level activates the Emergency Condenser, so that an additional path for energy transfer out of the RPV in parallel to the leak is opened. The pressure increase in the containment is limited via the containment pressure suppression system (short term) and the containment cooling condensers (long term). The results of the test showed that the passive safety systems alone are capable to bring the plant to stable conditions meeting all required safety targets with sufficient margins. Therefore the test verified the function of those components and the interplay between them as response to an anticipated accident scenario. The test provided evidence that the INKA is worldwide the first large scale test facility to perform integral verification tests of passive safety concepts under plant-like scaling and thermodynamic conditions. [less ▲]

Detailed reference viewed: 139 (9 UL)
Full Text
Peer Reviewed
See detailA Survey on Stability and Rigidity Results for Lie algebras
Crainic, Marius; Struchiner, Ivan; Schatz, Florian UL

in Indagationes Mathematicae (2014), 25(5), 957-976

We give simple and unified proofs of the known stability and rigidity results for Lie algebras, Lie subalgebras and Lie algebra homomorphisms. Moreover, we investigate when a Lie algebra homomorphism is ... [more ▼]

We give simple and unified proofs of the known stability and rigidity results for Lie algebras, Lie subalgebras and Lie algebra homomorphisms. Moreover, we investigate when a Lie algebra homomorphism is stable under all automorphisms of the codomain (including outer automorphisms). [less ▲]

Detailed reference viewed: 92 (4 UL)
Full Text
Peer Reviewed
See detailInternationalisation in Romanian higher education: between the race for rankings and re-building historical partnerships
Deca, Ligia UL

in EAIE Conference Conversation Starter 3: Stepping into a new era: New voices and perspectives on Central and Eastern European higher education (2014)

Detailed reference viewed: 35 (5 UL)
See detailA Toolchain for Model-Based Design and Testing of Access Control Systems
Daoudagh, Said; El Kateb, Donia UL; Lonetti, Francesca et al

in MODELSWARD 2015 (2014)

In access control systems, aimed at regulating the accesses to protected data and resources, a critical component is the Policy Decision Point (PDP), which grants or denies the access according to the ... [more ▼]

In access control systems, aimed at regulating the accesses to protected data and resources, a critical component is the Policy Decision Point (PDP), which grants or denies the access according to the defined policies. Due to the complexity of the standard language, it is recommended to rely on model-driven approaches which allow to overcome difficulties in the XACML policy definition. We provide in this paper a toolchain that involves a model-driven approach to specify and generate XACML policies and also enables automated testing of the PDP component. We use XACML-based testing strategies for generating appropriate test cases which are able to validate the functional aspects, constraints, permissions and prohibitions of the PDP. An experimental assessment of the toolchain and its use on a realistic case study are also presented. [less ▲]

Detailed reference viewed: 111 (5 UL)
Full Text
Peer Reviewed
See detailContact-state modeling of robotic assembly tasks using Gaussian mixture models
Ibrahim, Jasim; Plapper, Peter UL

in Procedia CIRP (2014), 23

This article addresses the Contact-State (CS) modeling problem for the force-controlled robotic peg-in-hole assembly tasks. The wrench (Cartesian forces and torques) and pose (Cartesian position and ... [more ▼]

This article addresses the Contact-State (CS) modeling problem for the force-controlled robotic peg-in-hole assembly tasks. The wrench (Cartesian forces and torques) and pose (Cartesian position and orientation) signals, of the manipulated object, are captured for different phases of the robotic assembly task. Those signals are utilized in building a CS model for each phase. Gaussian Mixture Models (GMM) is employed in building the likelihood of each signal and Expectation Maximization (EM) is used in finding the GMM parameters. Experiments are performed on a KUKA Lightweight Robot (LWR) doing camshaft caps assembly of an automotive powertrain. Comparisons are also performed with the available assembly modeling schemes, and the superiority of the EM-GMM scheme is shown with a reduced computational time. [less ▲]

Detailed reference viewed: 125 (1 UL)
Peer Reviewed
See detailThe frequency of acute medication intake relates to its perceived effectiveness in chronic headache patients
Van Ryckeghem, Dimitri UL; Wens, T.; Paemeleire, K. et al

in JOURNAL OF HEADACHE AND PAIN (2014), 15(1),

Detailed reference viewed: 40 (4 UL)
Full Text
Peer Reviewed
See detailCoverage-based Test Cases Selection for XACML Policies
Bertolino, Antonia; Le Traon, Yves UL; Lonetti, Francesca et al

in IEEE International Conference on Software Testing Verification and Validation Workshops (2014)

XACML is the de facto standard for implementing access control policies. Testing the correctness of policies is a critical task. The test of XACML policies involves running requests and checking manually ... [more ▼]

XACML is the de facto standard for implementing access control policies. Testing the correctness of policies is a critical task. The test of XACML policies involves running requests and checking manually the correct response. It is therefore important to reduce the manual test effort by automatically selecting the most important requests to be tested. This paper introduces the XACML smart coverage selection approach, based on a proposed XACML policy coverage criterion. The approach is evaluated using mutation analysis and is compared on the one side with a not-reduced test suite, on the other with random and greedy optimal test selection approaches. We performed the evaluation on a set of six real world policies. The results show that our selection approach can reach good mutation scores, while significantly reducing the number of tests to be run. [less ▲]

Detailed reference viewed: 108 (1 UL)
Full Text
Peer Reviewed
See detailCountable intervals of partial clones
Haddad, Lucien; Schölzel, Karsten UL

in Multiple-Valued Logic (ISMVL), 2014 IEEE 44rd International Symposium on (2014)

Let $k \ge 2$ and $A$ be a $k$-element set. We construct countably infinite unrefinable chains of strong partial clones on $A$. This provides the first known examples of countably infinite intervals of ... [more ▼]

Let $k \ge 2$ and $A$ be a $k$-element set. We construct countably infinite unrefinable chains of strong partial clones on $A$. This provides the first known examples of countably infinite intervals of strong partial clones on a finite set with at least two elements. [less ▲]

Detailed reference viewed: 81 (1 UL)
Full Text
Peer Reviewed
See detailPartial R-clones
Schölzel, Karsten UL; Romov, Boris

in Multiple-Valued Logic (ISMVL), 2014 IEEE 44rd International Symposium on (2014)

In [Romov, ISMVL 2013] the first author introduced a type of partial clones as the intersection of some special infinite descending chains similar to I. Rosenberg (1972) in the case of total clones. We ... [more ▼]

In [Romov, ISMVL 2013] the first author introduced a type of partial clones as the intersection of some special infinite descending chains similar to I. Rosenberg (1972) in the case of total clones. We provide a characterization of these clones in terms of their invariants, and propose a generalization of such clones, which we will call partial R-clones. We show that there are only finitely many partial R-clones. Furthermore, we investigate some properties related to their position in the lattice of partial clones. [less ▲]

Detailed reference viewed: 33 (1 UL)
Full Text
Peer Reviewed
See detailSecurity@Runtime: A flexible MDE approach to enforce fine-grained security policies
Elrakaiby, Yehia UL; Amrani, Moussa UL; Le Traon, Yves UL

in Lecture Notes in Computer Science (2014), 8364 LNCS

In this paper, we present a policy-based approach for automating the integration of security mechanisms into Java-based business applications. In particular, we introduce an expressive Domain Specific ... [more ▼]

In this paper, we present a policy-based approach for automating the integration of security mechanisms into Java-based business applications. In particular, we introduce an expressive Domain Specific modeling Language (Dsl), called Security@Runtime, for the specification of security configurations of targeted systems. The Security@Runtime Dsl supports the expression of authorization, obligation and reaction policies, covering many of the security requirements of modern applications. Security requirements specified in security configurations are enforced using an application-independent Policy Enforcement Point Pep)-Policy Decision Point (Pdp) architecture, which enables the runtime update of security requirements. Our work is evaluated using two systems and its advantages and limitations are discussed. © 2014 Springer International Publishing Switzerland. [less ▲]

Detailed reference viewed: 169 (5 UL)
Full Text
Peer Reviewed
See detailOn complex analytic 1|3-dimensional supermanifolds associated with CP^1
Vishnyakova, Elizaveta UL

in Proceedings of the XXXII Workshop on Geometric Methods in Physics (2014)

Detailed reference viewed: 36 (1 UL)
Full Text
Peer Reviewed
See detailA survey on sustainability in ICT a computing perspective
Tantar, Alexandru-Adrian UL; Tantar, Emilia UL

in GECCO 2014 - Companion Publication of the 2014 Genetic and Evolutionary Computation Conference (2014)

The rise of the data centers industry, together with the emergence of large cloud computing that require large quantities of resources to be maintained, brought the need of providing a sustainable ... [more ▼]

The rise of the data centers industry, together with the emergence of large cloud computing that require large quantities of resources to be maintained, brought the need of providing a sustainable development process. Through this paper we aim to provide an introductory insight on the status and tools available to tackle this perspective within the evolutionary and genetic algorithms community. Existing advancement are also emphasized and perspectives outlined. [less ▲]

Detailed reference viewed: 69 (5 UL)
Full Text
Peer Reviewed
See detailRelation graphs and partial clones on a 2-element set.
Schölzel, Karsten UL; Couceiro, Miguel; Haddad, Lucien et al

in Multiple-Valued Logic (ISMVL), 2014 IEEE 44rd International Symposium on (2014)

In a recent paper, the authors show that the sublattice of partial clones that preserve the relation $\{(0,0),(0,1),(1,0)\}$ is of continuum cardinality on $\2$. In this paper we give an alternative proof ... [more ▼]

In a recent paper, the authors show that the sublattice of partial clones that preserve the relation $\{(0,0),(0,1),(1,0)\}$ is of continuum cardinality on $\2$. In this paper we give an alternative proof to this result by making use of a representation of relations derived from $\{(0,0),(0,1),(1,0)\}$ in terms of certain types of graphs. As a by-product, this tool brings some light into the understanding of the structure of this uncountable sublattice of strong partial clones. [less ▲]

Detailed reference viewed: 76 (3 UL)
See detailConference report
Oesch, Lucas UL

in Crisyr (Carnet de recherche) (2014)

Detailed reference viewed: 48 (9 UL)
Full Text
Peer Reviewed
See detailSemiconductors for Photovoltaic Devices: Electrochemical Approaches using Ionic Liquids
Dale, Phillip UL; Malaquias, Joao Corujo Branco UL; Steichen, Marc UL

in ECS Transactions (2014), 58(18), 1-12

Can electrodeposition be used to create high quality p-type inorganic compound semiconductors for photovoltaic applications? Thin film photovoltaic devices offer similar power conversion efficiencies to ... [more ▼]

Can electrodeposition be used to create high quality p-type inorganic compound semiconductors for photovoltaic applications? Thin film photovoltaic devices offer similar power conversion efficiencies to polycrystalline silicon devices and have the inherent advantages of consisting of less material and requiring less energy expenditure during processing. Thin film devices consist of a semiconductor pn heterojunction with front and back contacts to extract the excited charge carriers. The materials properties of the p-type layer are the most stringent, and determine the overall performance of the device. Common p-type semiconductors are CdTe, Cu(In,Ga)Se2, and Cu2ZnSn(S,Se)4. Typically the p-type semiconductor must form a continuous dense single phase layer two micron thick over metre squared areas. Most commercial producers of thin film photovoltaic modules choose evaporation or sputtering methods to deposit this layer. Of importance is the speed, cost, and quality of deposition. Electrodeposition offers the ability to deposit thin films over large areas with high materials usage, potentially at high speed. Can electrodeposition be used to create high quality p-type inorganic compound semiconductors? This talk will show that it is possible to directly deposit a working p-type semiconductor, but that a two step approach of depositing metals and then annealing them in a reactive atmosphere is a simpler, easier, and more robust approach. Both approaches can lead to semiconductors which provide working photovoltaic devices. However, improvements to the electrodepostion process are still required and the main challenges are outlined below. Challenges in directly electrodepositing a p-type semiconductor are (i) the inherent lack of electrons necessary for a reductive deposition process and (ii) the low thermal energy available at normal deposition temperatures to create micron sized well ordered crystals. Challenges for directly electrodepositing the metal alloys CuInGa or CuSnZn from aqueous solution are (iii) competition with hydrogen reduction leading to inefficient deposition, embrittlement, and dendritic growth (iv) control of the alloy composition over the micrometer and centimeter length scales due to the different reduction potentials, nucleation densities, and diffusion coefficients. In this talk it will be shown how these challenges can be met by using ionic liquids to replace aqueous solvents. Ionic liquids offer larger electrochemical windows, higher processing temperatures, and the choice of new forms of starting reagent. Furthermore, task specific ionic liquids or liquid metal salts, may even be employed to allow extremely high speed deposition. [less ▲]

Detailed reference viewed: 138 (2 UL)
Full Text
Peer Reviewed
See detailPosition identification in force-guided peg-in-hole assembly tasks
Ibrahim, Jasim; Plapper, Peter UL; Voos, Holger UL

in Procedia CIRP (2014), 23

Position uncertainty is inevitable in many force-guided robotic assembly tasks. Such uncertainty can cause a significant delay, extra energy expenditure, and may even results in detriments to the mated ... [more ▼]

Position uncertainty is inevitable in many force-guided robotic assembly tasks. Such uncertainty can cause a significant delay, extra energy expenditure, and may even results in detriments to the mated parts or the robot itself. This article suggests a strategy for identifying the accurate hole position in force-guided robotic peg-in-hole assembly tasks through employing only the captured wrench (the Cartesian forces and torques) signals of the manipulated. In the framework of using the Contact-State (CS) modeling for such robotic tasks, the identification of the hole position is realized through detecting the CS that corresponds for the phase of the peg-on-hole, that is the phase in which the peg is located precisely on the hole. Expectation Maximization-based Gaussian Mixtures Model (EM-GMM) CS modeling scheme is employed in detecting the CS corresponding for the peg-on-hole phase. Only the wrench signals are used in modeling and detecting the phases of the assembly process. The considered peg-in-hole assembly process starts from free space and as soon as the peg touches the environment with missing the hole, a spiral search path is followed that would survey the whole environment surface. When the CS of the peg-on-hole is detected, the hole position is identified. Experiments are conducted on a KUKA Lightweight Robot (LWR) doing typical peg-in-hole assembly tasks. Multiple hole positions are considered and excellent performance of the proposed identification strategy is shown. [less ▲]

Detailed reference viewed: 83 (0 UL)
Full Text
Peer Reviewed
See detailA Conceptual Framework to Study Socio-Technical Security
Ferreira, Ana UL; Huynen, Jean-Louis UL; Koenig, Vincent UL et al

in Lecture Notes in Computer Science (2014)

We propose an operational framework for a social, technical and contextual analysis of security. The framework provides guidelines about how to model a system as a layered set of interacting elements, and ... [more ▼]

We propose an operational framework for a social, technical and contextual analysis of security. The framework provides guidelines about how to model a system as a layered set of interacting elements, and proposes two methodologies to analyse technical and social vulnerabilities. We show how to apply the framework in a use case scenario. [less ▲]

Detailed reference viewed: 279 (48 UL)
Full Text
Peer Reviewed
See detailThe extended discrete element method (XDEM) applied to drying of a packed bed
Peters, Bernhard UL; Besseron, Xavier UL; Estupinan Donoso, Alvaro Antonio UL et al

in Industrial Combustion (2014), 14

A vast number of engineering applications involve physics not solely of a single domain but of several physical phenomena, and therefore are referred to as multi-physical. As long as the phenomena ... [more ▼]

A vast number of engineering applications involve physics not solely of a single domain but of several physical phenomena, and therefore are referred to as multi-physical. As long as the phenomena considered are to be treated by either a continuous (i.e. Eulerian) or discrete (i.e. Lagrangian) approach, numerical solution methods may be employed to solve the problem. However, numerous challenges in engineering exist and evolve; those include modelling a continuous and discrete phase simultaneously, which cannot be solved accurately by continuous or discrete approaches only. Problems that involve both a continuous and a discrete phase are important in applications as diverse as the pharmaceutical industry, the food processing industry, mining, construction, agricultural machinery, metals manufacturing, energy production and systems biology. A novel technique referred to as Extended Discrete Element Method (XDEM) has been developed that offers a significant advancement for coupled discrete and continuous numerical simulation concepts. XDEM extends the dynamics of granular materials or particles as described through the classical discrete element method (DEM) to include additional properties such as the thermodynamic state or stress/strain for each particle coupled to a continuous phase such as a fluid flow or a solid structure. Contrary to a continuum mechanics concept, XDEM aims at resolving the particulate phase through the various processes attached to particles. While DEM predicts the spatial-temporal position and orientation for each particle, XDEM additionally estimates properties such as the internal temperature and/or species distribution during drying, pyrolysis or combustion of solid fuel material such as biomass in a packed bed. These predictive capabilities are further extended by an interaction with fluid flow by heat, mass and momentum transfer and the impact of particles on structures. © International Flame Research Foundation, 2014. [less ▲]

Detailed reference viewed: 89 (6 UL)
Full Text
See detailOnline Determination of Grid Impedance Spectrum through Pseudo-Random Excitation of a Pulse Width Modulator
Neshvad, Surena UL; Chatzinotas, Symeon UL; Sachau, Jürgen UL

in Renewable Energy & Power Quality Journal (2014)

The last decade has seen a dramatic rise in renewable energy converters connected to the grid, consisting mostly of intermittent distributed generators on the medium or low voltage grid. Due to this ... [more ▼]

The last decade has seen a dramatic rise in renewable energy converters connected to the grid, consisting mostly of intermittent distributed generators on the medium or low voltage grid. Due to this evolution in energy transmission, improved monitoring and control of the distribution grid is becoming mandatory in order to efficiently integrate the new power sources and guarantee power quality, efficiency and reliability. Our paper describes a reliable and precise power grid impedance estimation method using an innovative scheme to control the Pulse Width Modulator’s pulse pattern on the inverters, in order to inject broad spectrum identification patterns. The generated harmonics and inter-harmonics will allow the online computation of the complete spectrum of the grid impedance at the Point of Common Coupling during normal operation. Simulations in typical grid situations verify that the proposed algorithm is robust to a realistic environment and can be used for automated feedback control. [less ▲]

Detailed reference viewed: 271 (12 UL)
Full Text
Peer Reviewed
See detailHow independent are public audit oversight systems? An interdisciplinary approach to accounting regulation. (forthcoming)
Löhlein, Lukas UL

in SIBR Conference Proceedings (2014)

The independence of audit oversight systems is the most essential prerequisite for restoring public confidence in audits after the past accounting scandals and financial crisis. Thus, over the last years ... [more ▼]

The independence of audit oversight systems is the most essential prerequisite for restoring public confidence in audits after the past accounting scandals and financial crisis. Thus, over the last years, the European Union passed various provisions to strengthen the independence of European oversight systems. However, a systematic and encompassing comparison of the reform outcomes across the European Member States is still missing. This study is the first that provides insights into the question as to how independent the “independent” audit oversight boards are. Their independence is measured both in terms of their institutional composition (e.g. appointment procedures of the board members) and regulatory competencies (e.g. the way audit firms are inspected). The results are visualized by a Partial Order Scalogram Analysis (POSAC), which allows conclusions about the similarities of various countries and their relative levels of independence. Both measurements are then equally combined into one value of material independence and to a rank order of all European oversight systems and the U.S. PCAOB is set up. The study shows that, while the oversight of financial reporting is conducted by securities regulators in most European Member States, the field of auditing still has a long way to go to achieve regulatory harmonization. The analysis reveals considerable diversity with regard to the way the various European oversight systems are organized and operate. While countries such as Luxembourg, Italy, Latvia and the UK possess relatively independent oversight systems, the systems of Ireland, Portugal and Slovakia show low levels of independence. Since the different systems are strongly interrelated with the accounting profession, I point out that these countries have focused on creating “independent” oversight entities rather than on implementing truly independent regulation. The paper also questions the role of the PCAOB as regulatory “benchmark”: Although the PCAOB shows the most independent values in terms of regulatory competencies, the institutional independence of the PCAOB from the accounting profession seems to be less strong than the literature suggests. [less ▲]

Detailed reference viewed: 156 (11 UL)
Full Text
See detailAn Efficient 3D FEM - DEM Coupling for Granular Matter Applications
Michael, Mark UL; Peters, Bernhard UL; Vogel, Frank

in Coupled MBS-FE Applications: A New Trend in Simulation (2013, November)

The presented approach is relevant to almost all engineering applications that deal with granular matter such as off-road tire performance, transport on conveyor belts or displacement of granular material ... [more ▼]

The presented approach is relevant to almost all engineering applications that deal with granular matter such as off-road tire performance, transport on conveyor belts or displacement of granular material as in mixers or excavation of soil. For all these applications an engineering device is in contact with granular matter which causes responses due to the interaction forces. The proposed Extended Discrete Element Method (XDEM) as a combination of the Discrete Element Method (DEM) and the Finite Element Method (FEM) allows to sufficiently resolve the different domains involved in these engineering applications. Herein the motion of each grain is accounted for individually. Simultaneously, the finite element method accurately predicts the deformations experienced by the engineering device. Thus, the simulation domain occupied by the device is efficiently described as a continuous entity. The coupling of both methods is based on the interface shared by the two spatially separated domains. The interface coupling enables to apply a contact model suited to the particular contact behaviour between the grains and the surface material if the engineering device. In contact, forces develop at the interface and generate an responce in each domain. The coupling method enables to capture both responses simultaneously. Each grain in contact with the device surface generates a contact force to which it reacts repulsively. The contact forces sum up over the surface and cause deformations of device body. It further employs a fast contact detection algorithm to save valuable computation time. This concept is supported by the software tools of the Discrete Particle Method (DPM) and Diffpack. To exemplify the presented method, the tractive performance of different tire treads has been studied on a soil layer of the stony terrian. The simulation results are used to analyse the gross tractive effort, running resistance and drawbar pull of the different tread patterns. [less ▲]

Detailed reference viewed: 410 (14 UL)
Full Text
Peer Reviewed
See detailChildhood availability of books predicts later-life cognitive function
Leist, Anja UL; Avendano, Mauricio

in Gerontologist (2013, November), 53(S1), 605-605

Detailed reference viewed: 56 (1 UL)
Full Text
Peer Reviewed
See detailTime away from work predicts cognitive function - does education matter?
Leist, Anja UL; van Lenthe, Frank J.; Glymour, M. Maria et al

in Gerontologist (2013, November), 53(S1), 473-473

Detailed reference viewed: 46 (1 UL)
Full Text
Peer Reviewed
See detailOptimizing verification of structurally evolving algebraic petri nets
Khan, Yasir Imtiaz UL

in Software Engineering for Resilient Systems Lecture Notes in Computer Science Volume (2013, September 08), 8166

System models are subject to evolve during the development life cycle, along which an initial version goes through a series of evolutions, generally aimed at progressively reaching all the requested ... [more ▼]

System models are subject to evolve during the development life cycle, along which an initial version goes through a series of evolutions, generally aimed at progressively reaching all the requested qualities (completeness, correctness etc.). Among the existing development methodologies the iterative and incremental one has been proved to be efficient for system development but lacks of support for an adequate verification process. When considering Algebraic Petri nets (APNs) for modeling and model checking for verification, all the proofs must be redone after each iteration which is impractical both in terms of time and space. In this work, we introduce an Algebraic Petri net slicing technique that optimizes the model checking of static or structurally evolving APN models. Furthermore, our approach is proposing a classification of evolutions dedicated to the improvement of model checking. [less ▲]

Detailed reference viewed: 121 (8 UL)
Full Text
Peer Reviewed
See detailCorrelation Matching Approach for Through-Wall Corner Detection
Lagunas, Eva UL; Amin, Moeness; Ahmad, Fauzia et al

in Int. Workshop on Compressive Sensing Applied to Radar (CoSeRa) (2013, September)

Detailed reference viewed: 35 (1 UL)
Full Text
Peer Reviewed
See detailHeart rate variability as an indicator of self-regulatory processes in restrained eating behaviour
Lutz, Annika UL; Van Dyck, Zoé UL; Vögele, Claus UL

in Psychophysiology (2013, September), 50(S1), 81

Detailed reference viewed: 127 (15 UL)
Full Text
Peer Reviewed
See detailAnalysis using higher-order XFEM: Implicit representation of geometrical features from a given parametric representation
Moumnassi, Mohammed; Bordas, Stéphane UL; Figueredo, Rémi et al

in Mécanique & Industries (2013, August 30)

We present a promising approach to reduce the difficulties associated with meshing complex curved domain boundaries for higher-order finite elements. In this work, higher-order XFEM analyses for strong ... [more ▼]

We present a promising approach to reduce the difficulties associated with meshing complex curved domain boundaries for higher-order finite elements. In this work, higher-order XFEM analyses for strong discontinuity in the case of linear elasticity problems are presented. Curved implicit boundaries are approximated inside an unstructured coarse mesh by using parametric information extracted from the parametric representation (the most common in Computer Aided Design CAD). This approximation provides local graded sub-mesh (GSM) inside boundary elements (i.e. an element split by the curved boundary) which will be used for integration purpose. Sample geometries and numerical experiments illustrate the accuracy and robustness of the proposed approach. [less ▲]

Detailed reference viewed: 353 (0 UL)
Full Text
Peer Reviewed
See detailDepressive symptoms of childless older men and women in Europe
Leist, Anja UL; Nosthoff-Horstmann, Laura

in Psychology & Health (2013, August), 28(SI 1), 119-119

Detailed reference viewed: 121 (11 UL)
Full Text
Peer Reviewed
See detailAttitudes towards ageing in elder care
Albert, Isabelle UL; Ferring, Dieter UL; Friser, Jean-Paul

in Psychology & Health (2013, July), 28(SI Supplement: 1), 58-58

Background: The present study examined if attitudes towards ageing depend on own experiences with old and frail persons. Methods: The sample comprised N = 127 participants in the Grand-Duchy of Luxembourg ... [more ▼]

Background: The present study examined if attitudes towards ageing depend on own experiences with old and frail persons. Methods: The sample comprised N = 127 participants in the Grand-Duchy of Luxembourg (85 female, 42 male; mean age: M = 46.49, SD = 18.61), subdivided in three groups: professional carers, informal carers, and individuals who had never provided old-age care. Participants were asked to indicate their views about age in general and their expectations about their own ageing by use of a semi-structured questionnaire. Findings: Professional and informal carers indicated a higher age as starting point of old age compared to non-carers. Further, professional carers mentioned more negative and less positive features of old age and had more concrete expectations about their own ageing compared to other participants. Discussion: Results are discussed with regard to the relevance of attitudes towards ageing for individuals’ well-being and for their caregiving for elderly persons. [less ▲]

Detailed reference viewed: 67 (4 UL)
Full Text
Peer Reviewed
See detailFeeder Protection Challenges with High Penetration of Inverter Based Distributed Generation
Margossian, Harag UL; Capitanescu, Florin UL; Sachau, Jürgen UL

in Proceedings of the EUROCON 2013 conference (2013, July)

The increasing proportion of inverter based distributed generation (DG) in the power system may limit the short circuit power available at distribution substations and consequently cause significant ... [more ▼]

The increasing proportion of inverter based distributed generation (DG) in the power system may limit the short circuit power available at distribution substations and consequently cause significant troubles for the protection of distribution feeders where DG are connected. In this paper, the current practices of distribution network operators in dealing with higher penetration levels of DG are investigated and evaluated using a realistic 31-node distribution network model with limited short circuit supply. The paper discusses the challenges for the protection system related to the integration of increasingly significant amounts of DG and highlights the need for more sophisticated protection systems. [less ▲]

Detailed reference viewed: 208 (35 UL)
Full Text
Peer Reviewed
See detailIntergenerational relations in the light of migration and ageing
Albert, Isabelle UL; Ferring, Dieter UL; Valsiner, Jaan

in Psychology & Health (2013, July), 28(SI Supplement: 1), 164

Ageing and migration constitute two current key issues in Europe. Regarding potential physical and functional impairments in old age, individuals have to rely on support and care from their families and ... [more ▼]

Ageing and migration constitute two current key issues in Europe. Regarding potential physical and functional impairments in old age, individuals have to rely on support and care from their families and/or on assistance from the public sector. As first generation immigrants now approach retirement age in many European countries, the question how their families will deal with issues of old-age care gains increasingly importance. In the present study, a cross-cultural comparison of altogether N = 120 Portuguese and Luxembourgish triads of older parents and their adult children, both living in the Grand-Duchy of Luxembourg, is envisaged. Firstly, we will examine similarities and differences in identity constructions of older parents and their adult children. Secondly, we will investigate how intergenerational relations are regulated in migrant compared to nonmigrant families. Finally, we will explore how these aspects influence subjective well-being (SWB) of older individuals. Qualitative and quantitative methods will be applied. [less ▲]

Detailed reference viewed: 93 (5 UL)
Full Text
Peer Reviewed
See detailDistributed Generator Status Estimation for Adaptive Feeder Protection in Active Distribution Grids
Margossian, Harag UL; Capitanescu, Florin UL; Sachau, Jürgen UL

in Proceedings of the CIRED2013 conference (2013, June)

This paper proposes a framework for adaptive feeder protection in distribution grids with a high amount of distributed generators (DGs) installed. The scheme adapts the feeder protection relay settings ... [more ▼]

This paper proposes a framework for adaptive feeder protection in distribution grids with a high amount of distributed generators (DGs) installed. The scheme adapts the feeder protection relay settings according to the changes in the connection status of those DGs that have a significant impact on the fault current. The core of the method consists in the identification of the connection status of the DGs using an iterative modified state estimation (SE) program. The approach is illustrated using a realistic 31-node distribution network model. [less ▲]

Detailed reference viewed: 158 (21 UL)
Full Text
Peer Reviewed
See detailIntersections with Slupecki Partial Clones on a Finite Set
Schölzel, Karsten UL; Haddad, Lucien

in Multiple-Valued Logic (ISMVL), 2013 IEEE 43rd International Symposium on (2013, May)

We study intersections of partial clones on the k-element set with k ≥ 2. More precisely we consider intersections of Slupecki partial clones with non-Slupecki maximal partial clones on k.

Detailed reference viewed: 87 (1 UL)
Full Text
See detailAssessing the lower temperature limit for comfort in footwear
Havenith, George; Ouzzahra, Yacine UL; Gerrett, Nicola et al

in Proceedings of the 15th International Conference on Environmental Ergonomics (2013, February 11)

When selecting clothing and equipment for use in the cold, consumers often receive only limited guidance from product information provided by manufacturers. In the area of sleeping bags the introduction ... [more ▼]

When selecting clothing and equipment for use in the cold, consumers often receive only limited guidance from product information provided by manufacturers. In the area of sleeping bags the introduction of standards for their climatic range assessment, though often heavily debated by manufacturers, has undoubtedly provided consumers with guidance. Currently no such standards exist for outdoor footwear. Many manufacturers of footwear do claim certain lower temperature limits, going to -40ºC in some cases. No information is however provided on how this is tested and what criteria are applied. Kuklane et al. (1999) did several studies on the relation between footwear insulation and comfort range, but so far this has to our knowledge not led to the development of a standard. In the present study, following up on work by Kuklane, an attempt was made to collect physiological data that may be used in setting criteria for the lower temperature range of footwear. [less ▲]

Detailed reference viewed: 43 (2 UL)
Full Text
Peer Reviewed
See detailAcoustic startle reflex in the processing of reward related food cues during food deprivation: evidence from men and women
Ferreira de Sá, D. S.; Plein, D. E.; Schulz, André UL et al

in Psychophysiology (2013), 50(Supplement 1), 121

Detailed reference viewed: 56 (3 UL)
Full Text
Peer Reviewed
See detailMulti-frame super-resolution by enhanced shift & add
Al Ismaeil, Kassem UL; Aouada, D.; Ottersten, Björn UL et al

in International Symposium on Image and Signal Processing and Analysis, ISPA (2013)

A critical step in multi-frame super-resolution is the registration of frames based on their motion. We improve the performance of current state-of-the-art super-resolution techniques by proposing a more ... [more ▼]

A critical step in multi-frame super-resolution is the registration of frames based on their motion. We improve the performance of current state-of-the-art super-resolution techniques by proposing a more robust and accurate registration as early as in the initialization stage of the high resolution estimate. Indeed, we solve the limitations on scale and motion inherent to the classical Shift & Add approach by upsampling the low resolution frames up to the super-resolution factor prior to estimating motion or to median filtering. This is followed by an appropriate selective optimization, leading to an enhanced Shift & Add. Quantitative and qualitative evaluations have been conducted at two levels; the initial estimation and the final optimized superresolution. Results show that the proposed algorithm outperforms existing state-of-art methods. © 2013 University of Trieste and University of Zagreb. [less ▲]

Detailed reference viewed: 81 (1 UL)
Full Text
Peer Reviewed
See detailDoctors' view on intercultural competence in the medical setting in Luxembourg
Bourkel, Elisabeth UL; Ferring, Dieter UL

in Psychology & Health (2013), 28(S1), 71

Detailed reference viewed: 86 (23 UL)
Full Text
See detailA Study on Highway Traffic Flow Optimization using Partial Velocity Synchronization
Forster, Markus UL; Frank, Raphaël UL; Engel, Thomas UL

in Proceedings of the 1st GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2013) Technical Report CCS-2013-01 (2013)

In this paper we present a study of highway traffic flow optimization using Partial Velocity Synchronization (PVS). PVS is a Cellular Automaton (CA) model that is extended by a communication layer ... [more ▼]

In this paper we present a study of highway traffic flow optimization using Partial Velocity Synchronization (PVS). PVS is a Cellular Automaton (CA) model that is extended by a communication layer providing the ability to exchange relevant information between vehicles. We show that it is possible to enhance traffic flow on highways significantly with a small number of velocity recommendations computed from the traffic conditions ahead. Furthermore we show that only a limited number of hops in an information chain is necessary to reschedule the vehicles on a given highway segment to avoid the formation of shockwaves. Our results show that traffic flow will be increased while travel time and emissions will be reduced dramatically. [less ▲]

Detailed reference viewed: 395 (8 UL)
Full Text
Peer Reviewed
See detailTowards optimal post-fault self-healing in future smart distribution grids
Capitanescu, Florin UL; Bilibin, Ilya UL; Sachau, Jürgen UL

in Renewable Energy & Power Quality Journal (2013)

This paper deals with a key functionality of the future distribution smart grids namely the automatic post-fault network self-healing. To this end we propose an optimization approach that aims finding the ... [more ▼]

This paper deals with a key functionality of the future distribution smart grids namely the automatic post-fault network self-healing. To this end we propose an optimization approach that aims finding the post-fault grid topology that minimizes the amount of unsupplied energy to consumers. The approach extends existing optimization models, developed in the context of losses minimization, for our particular application and proposes ways to overcome their limitations. We prove the interest of the approach on a 33-bus benchmark distribution system as well as on a 61-bus real-life distribution grid. [less ▲]

Detailed reference viewed: 245 (24 UL)
Full Text
Peer Reviewed
See detailThe cortisol awakening response is unrelated to psychophysiological cold pressor stress reactivity
Kozik, B.; Larra, M.; Schilling, T. M. et al

in Psychophysiology (2013), 50(Supplement 1), 122

Detailed reference viewed: 60 (1 UL)
Full Text
Peer Reviewed
See detailHigher spin AdS$_3$ supergravity and its CFT dual
Creutzig, Thomas; Hikida, Yasuaki; Roenne, Peter Browne UL

in International Journal of Modern Physics: Conference Series (2013)

Detailed reference viewed: 92 (3 UL)
Full Text
Peer Reviewed
See detailOn the Foundations and the Applications of Evolutionary Computing
Del Moral, Pierre; Tantar, Alexandru-Adrian UL; Tantar, Emilia UL

in Studies in Computational Intelligence (2013), 447

Genetic type particle methods are increasingly used to sample from complex high-dimensional distributions. They have found a wide range of applications in applied probability, Bayesian statistics ... [more ▼]

Genetic type particle methods are increasingly used to sample from complex high-dimensional distributions. They have found a wide range of applications in applied probability, Bayesian statistics, information theory, and engineering sciences. Understanding rigorously these new Monte Carlo simulation tools leads to fascinating mathematics related to Feynman-Kac path integral theory and their interacting particle interpretations. In this chapter, we provide an introduction to the stochastic modeling and the theoretical analysis of these particle algorithms. We also illustrate these methods through several applications. [less ▲]

Detailed reference viewed: 155 (3 UL)
Full Text
Peer Reviewed
See detailLogic of Non-Monotonic Interactive Proofs
Kramer, Simon UL

in Lecture Notes in Computer Science (2013), 7750

We propose a monotonic logic of internalised non-monotonic or instant interactive proofs (LiiP) and reconstruct an existing monotonic logic of internalised monotonic or persistent interactive proofs (LiP ... [more ▼]

We propose a monotonic logic of internalised non-monotonic or instant interactive proofs (LiiP) and reconstruct an existing monotonic logic of internalised monotonic or persistent interactive proofs (LiP) as a minimal conservative extension of LiiP. Instant interactive proofs effect a fragile epistemic impact in their intended communities of peer reviewers that consists in the impermanent induction of the knowledge of their proof goal by means of the knowledge of the proof with the interpreting reviewer: If my peer reviewer knew my proof then she would at least then know that its proof goal is true. Their impact is fragile and their induction of knowledge impermanent in the sense of being the case possibly only at the instant of learning the proof. This accounts for the important possibility of internalising proofs of statements whose truth value can vary, which, as opposed to invariant statements, cannot have persistent proofs. So instant interactive proofs effect a temporary transfer of certain propositional knowledge (knowable ephemeral facts) via the transmission of certain individual knowledge (knowable non-monotonic proofs) in distributed systems of multiple interacting agents. [less ▲]

Detailed reference viewed: 73 (3 UL)
Full Text
Peer Reviewed
See detailPsychomotor evidence for protection of cognitive processing
Schächinger, H.; Schilling, T. M.; Larra, M. et al

in Psychophysiology (2013), 50(Supplement 1), 6

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailASMATRA: Ranking ASs Providing Transit Service to Malware Hosters
Wagner, Cynthia UL; François, Jérôme UL; State, Radu UL et al

in IFIP/IEEE International Symposium on Integrated Network Management IM2013 (2013)

The Internet has grown into an enormous network offering a variety of services, which are spread over a multitude of domains. BGP-routing and Autonomous Systems (AS) are the key components for maintaining ... [more ▼]

The Internet has grown into an enormous network offering a variety of services, which are spread over a multitude of domains. BGP-routing and Autonomous Systems (AS) are the key components for maintaining high connectivity in the Internet. Unfortunately, Internet Service Providers (ISPs) operating ASs do not only host normal users and content, but also malicious content used by attackers for spreading malware, hosting phishing web-sites or performing any kind of fraudulent activity. Practical analysis shows that such malware-providing ASs prevent themselves from being de-peered by hiding behind other ASs, which do not host the malware themselves but simply provide transit service for malware. This paper presents a new method for detecting ASs that provide transit service for malware hosters, without being malicious themselves. A formal definition of the problem and the metrics are determined by using the AS graph. The PageRank algorithm is applied to improve the scalability and the completeness of the approach. The method is assessed on real and publicly available datasets, showing promising results. [less ▲]

Detailed reference viewed: 67 (1 UL)
Full Text
Peer Reviewed
See detailAccess Control Enforcement Testing
El Kateb, Donia; ElRakaiby, Yehia; Mouelhi, Tejeddine et al

in Abstract book of 2013 8TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST) (2013)

A policy-based access control architecture comprises Policy Enforcement Points (PEPs), which are modules that intercept subjects access requests and enforce the access decision reached by a Policy ... [more ▼]

A policy-based access control architecture comprises Policy Enforcement Points (PEPs), which are modules that intercept subjects access requests and enforce the access decision reached by a Policy Decision Point (PDP), the module implementing the access decision logic. In applications, PEPs are generally implemented manually, which can introduce errors in policy enforcement and lead to security vulnerabilities. In this paper, we propose an approach to systematically test and validate the correct enforcement of access control policies in a given target application. More specifically, we rely on a two folded approach where a static analysis of the target application is first made to identify the sensitive accesses that could be regulated by the policy. The dynamic analysis of the application is then conducted using mutation to verify for every sensitive access whether the policy is correctly enforced. The dynamic analysis of the application also gives the exact location of the PEP to enable fixing enforcement errors detected by the analysis. The approach has been validated using a case study implementing an access control policy. [less ▲]

Detailed reference viewed: 90 (1 UL)
Full Text
See detailLe paradoxe du passé. Pour une sémiotique de l'archive
Treleani, Matteo UL

in Site Internet de l'Association Française de Sémiotique (2013)

Detailed reference viewed: 70 (0 UL)
Full Text
Peer Reviewed
See detailCost sensitive credit card fraud detection using bayes minimum risk
Bahnsen, A. C.; Stojanovic, Aleksandar UL; Aouada, D. et al

in Proceedings - 2013 12th International Conference on Machine Learning and Applications, ICMLA 2013 (2013), 1

Credit card fraud is a growing problem that affects card holders around the world. Fraud detection has been an interesting topic in machine learning. Nevertheless, current state of the art credit card ... [more ▼]

Credit card fraud is a growing problem that affects card holders around the world. Fraud detection has been an interesting topic in machine learning. Nevertheless, current state of the art credit card fraud detection algorithms miss to include the real costs of credit card fraud as a measure to evaluate algorithms. In this paper a new comparison measure that realistically represents the monetary gains and losses due to fraud detection is proposed. Moreover, using the proposed cost measure a cost sensitive method based on Bayes minimum risk is presented. This method is compared with state of the art algorithms and shows improvements up to 23% measured by cost. The results of this paper are based on real life transactional data provided by a large European card processing company. © 2013 IEEE. [less ▲]

Detailed reference viewed: 295 (1 UL)
Full Text
Peer Reviewed
See detailLa délégation de fonctions dans la directive AIFM
Riassetto, Isabelle UL

in Revue Trimestrielle de Droit Financier= Corporate Finance and Capital Markets Law Review (2013)

Detailed reference viewed: 151 (10 UL)
Full Text
Peer Reviewed
See detailAn Online Platform as a Tool for Surveys by Patient Associations
Lygidakis, Charilaos UL; Vögele, Claus UL; Cambiaso, Silvio et al

in Global Telemedicine and eHealth Updates: Knowledge Resources (2013), 6

Patients are increasingly interested in sharing their experiences and learning about their conditions, their prevention and treatments, and are more frequently turning into advocates. The connectivity and ... [more ▼]

Patients are increasingly interested in sharing their experiences and learning about their conditions, their prevention and treatments, and are more frequently turning into advocates. The connectivity and the wide availability of data have been shown to support this development enabling patients to play an active role in healthcare. The “Lumos!” platform is a web-based solution that has been designed to facilitate teams of researchers conducting multicentre studies, especially in countries and contexts with low research capacity. Nevertheless, it can be modified and tailored as a tool for research studies carried out by patient organisations. The aim of this study is to assess the feasibility of an online platform as a tool for anonymous surveys conducted by a patient organisation. Methods: A questionnaire is currently being distributed in the Region of Emilia Romagna (Italy) by the Regional Federation of Diabetics with the aim to study the needs of patients that use self-check-up devices. This observational study has been designed online with the use of the “Lumos!” platform, which enables the creation of the questionnaire with adjustable fields and variables, using the expertise of the participants and the creation of reports. Furthermore, a URL and a QR code linking to the questionnaire are being published on Social Networks and websites inviting people to participate in the study. Several data will be retrieved from the logs of the platform, such as the time required to complete a questionnaire by a patient, the number and types of errors, and the percentage of completed items. These variables will be analysed taking into account the demographic characteristics of the patients. Conclusions: By studying the indicators of the implementation and the characteristics of the participants, it will be possible to optimise participation rates and achieve higher engagement from the participants in the future. We expect that with the help of the online platform, patient associations will be supported in their quest to conduct surveys and, as a secondary outcome; they will empower their members to play a more active role in healthcare. [less ▲]

Detailed reference viewed: 72 (5 UL)