References of "Paper published in a journal"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailThe cortisol awakening response is unrelated to psychophysiological cold pressor stress reactivity
Kozik, B.; Larra, M.; Schilling, T. M. et al

in Psychophysiology (2013), 50(Supplement 1), 122

Detailed reference viewed: 60 (1 UL)
Full Text
Peer Reviewed
See detailStudies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates
Ferreira, Ana UL; Giustolisi, Rosario UL; Huynen, Jean-Louis UL et al

in IEEE TrustCom (2013)

Authenticating web identities with TLS certificates is a typical problem whose security depends on both technical and human aspects, and that needs, to be fully grasped, a socio-technical analysis. We ... [more ▼]

Authenticating web identities with TLS certificates is a typical problem whose security depends on both technical and human aspects, and that needs, to be fully grasped, a socio-technical analysis. We performed such an analysis, and in this paper we comment on the tools and methodology we found appropriate. We first analysed the interaction ceremonies between users and the most used browsers in the market. Then we looked at user's understanding of those interactions. Our tools and our methodology depend on whether the user model has a non-deterministic or a realistic behaviour. We successfully applied formal methods in the first case. In the second, we had to define a security framework consistent with research methods of experimental cognitive science. [less ▲]

Detailed reference viewed: 179 (34 UL)
Full Text
Peer Reviewed
See detailAn Online Platform as a Tool for Surveys by Patient Associations
Lygidakis, Charilaos UL; Vögele, Claus UL; Cambiaso, Silvio et al

in Global Telemedicine and eHealth Updates: Knowledge Resources (2013), 6

Patients are increasingly interested in sharing their experiences and learning about their conditions, their prevention and treatments, and are more frequently turning into advocates. The connectivity and ... [more ▼]

Patients are increasingly interested in sharing their experiences and learning about their conditions, their prevention and treatments, and are more frequently turning into advocates. The connectivity and the wide availability of data have been shown to support this development enabling patients to play an active role in healthcare. The “Lumos!” platform is a web-based solution that has been designed to facilitate teams of researchers conducting multicentre studies, especially in countries and contexts with low research capacity. Nevertheless, it can be modified and tailored as a tool for research studies carried out by patient organisations. The aim of this study is to assess the feasibility of an online platform as a tool for anonymous surveys conducted by a patient organisation. Methods: A questionnaire is currently being distributed in the Region of Emilia Romagna (Italy) by the Regional Federation of Diabetics with the aim to study the needs of patients that use self-check-up devices. This observational study has been designed online with the use of the “Lumos!” platform, which enables the creation of the questionnaire with adjustable fields and variables, using the expertise of the participants and the creation of reports. Furthermore, a URL and a QR code linking to the questionnaire are being published on Social Networks and websites inviting people to participate in the study. Several data will be retrieved from the logs of the platform, such as the time required to complete a questionnaire by a patient, the number and types of errors, and the percentage of completed items. These variables will be analysed taking into account the demographic characteristics of the patients. Conclusions: By studying the indicators of the implementation and the characteristics of the participants, it will be possible to optimise participation rates and achieve higher engagement from the participants in the future. We expect that with the help of the online platform, patient associations will be supported in their quest to conduct surveys and, as a secondary outcome; they will empower their members to play a more active role in healthcare. [less ▲]

Detailed reference viewed: 72 (5 UL)
Full Text
Peer Reviewed
See detailSimulation Study of Bacteriological Pollution Load of Rivers by CSOs
Worreschk, S.; Schmitt, T.G.; Hobus, I. et al

in Proceedings 8th International Conference NOVATECH 2013 (2013)

Detailed reference viewed: 53 (6 UL)
Full Text
Peer Reviewed
See detailThe Effect of Soft Pre-Annealing of Differently Stacked Cu-Sn-Zn Precursors on the Quality of Cu2ZnSnSe4 Absorbers
Arasimowicz, Monika UL; Thevenin, Maxime UL; Dale, Phillip UL

in Materials Research Society Symposia Proceedings. (2013), 1538

Detailed reference viewed: 156 (11 UL)
Full Text
Peer Reviewed
See detailThe European Model Company Act (EMCA), chapter on Groups of companies
Conac, Pierre-Henri UL

in European Company and Financial Law Review (2013)

Detailed reference viewed: 253 (5 UL)
Full Text
Peer Reviewed
See detailMulti-frame super-resolution by enhanced shift & add
Al Ismaeil, Kassem UL; Aouada, D.; Ottersten, Björn UL et al

in International Symposium on Image and Signal Processing and Analysis, ISPA (2013)

A critical step in multi-frame super-resolution is the registration of frames based on their motion. We improve the performance of current state-of-the-art super-resolution techniques by proposing a more ... [more ▼]

A critical step in multi-frame super-resolution is the registration of frames based on their motion. We improve the performance of current state-of-the-art super-resolution techniques by proposing a more robust and accurate registration as early as in the initialization stage of the high resolution estimate. Indeed, we solve the limitations on scale and motion inherent to the classical Shift & Add approach by upsampling the low resolution frames up to the super-resolution factor prior to estimating motion or to median filtering. This is followed by an appropriate selective optimization, leading to an enhanced Shift & Add. Quantitative and qualitative evaluations have been conducted at two levels; the initial estimation and the final optimized superresolution. Results show that the proposed algorithm outperforms existing state-of-art methods. © 2013 University of Trieste and University of Zagreb. [less ▲]

Detailed reference viewed: 81 (1 UL)
Full Text
See detailMechanical Properties of Laser Braze-Welded Al-Cu connections
Solchenbach, Tobias UL; Plapper, Peter UL

in Mechanical Properties of Laser Braze-Welded Al-Cu connections (2012, November)

The paper describes an innovative, laser based joining method for dissimilar Al-Cu connections. The main objective is the improvement of the mechanical and electrical properties of the joints.

Detailed reference viewed: 111 (12 UL)
Full Text
Peer Reviewed
See detailLanguage Enrichment for Resilient MDE
Khan, Yasir Imtiaz UL; risoldi, matteo

in Software Engineering for Resilient Systems Lecture Notes in Computer Science (2012, September 27), 7527

n Model-Driven Engineering, as in many engineering approaches, it is desireable to be able to assess the quality of a system or model as it evolves. A resilient engineering practice systematically ... [more ▼]

n Model-Driven Engineering, as in many engineering approaches, it is desireable to be able to assess the quality of a system or model as it evolves. A resilient engineering practice systematically assesses whether evolutions improve on the capabilities of a system. We argue that to achieve a systematic resilient model-driven engineering practice, resilience concepts should be first-class citizens in models. This article discusses how DREF, a formal framework defining resilience concepts, can be integrated with other modeling languages in order to pursue a resilient development process. [less ▲]

Detailed reference viewed: 128 (2 UL)
Full Text
Peer Reviewed
See detailLes sanctions administratives en jurisprudence luxembourgeoise
Ravarani, Georges UL

in Publications du Benelux (2012, September), 35

Detailed reference viewed: 193 (10 UL)
Full Text
Peer Reviewed
See detailHash function generation by means of Gene Expression Programming
Varrette, Sébastien UL; Muszynski, Jakub UL; Bouvry, Pascal UL

in Intl. Conf. on Cryptography and Security System (CSS’12) (2012, September), XII(3), 37-53

Cryptographic hash functions are fundamental primitives in modern cryptography and have many security applications (data integrity checking, cryptographic protocols, digital signatures, pseudo random ... [more ▼]

Cryptographic hash functions are fundamental primitives in modern cryptography and have many security applications (data integrity checking, cryptographic protocols, digital signatures, pseudo random number generators etc.). At the same time novel hash functions are designed (for instance in the framework of the SHA-3 contest organized by the National Institute of Standards and Technology (NIST)), the cryptanalysts exhibit a set of statistical metrics (propagation criterion, frequency analysis etc.) able to assert the quality of new proposals. Also, rules to design "good" hash functions are now known and are followed in every reasonable proposal of a new hash scheme. This article investigates the ways to build on this experiment and those metrics to generate automatically compression functions by means of Evolutionary Algorithms (EAs). Such functions are at the heart of the construction of iterative hash schemes and it is therefore crucial for them to hold good properties. Actually, the idea to use nature-inspired heuristics for the design of such cryptographic primitives is not new: this approach has been successfully applied in several previous works, typically using the Genetic Programming (GP) heuristic [1]. Here, we exploit a hybrid meta-heuristic for the evolutionary process called Gene Expression Programming (GEP) [2] that appeared far more e?cient computationally speaking compared to the GP paradigm used in the previous papers. In this context, the GEPHashSearch framework is presented. As it is still a work in progress, this article focuses on the design aspects of this framework (individuals de?nitions, ?tness objectives etc.) rather than on complete implementation details and validation results. Note that we propose to tackle the generation of compression functions as a multi-objective optimization problem in order to identify the Pareto front i.e. the set of non-dominated functions over the four ?tness criteria considered. If this goal is not yet reached, the ?rst experimental results in a mono-objective context are promising and open the perspective of fruitful contributions to the cryptographic community [less ▲]

Detailed reference viewed: 180 (1 UL)
Full Text
Peer Reviewed
See detailDie Situation pflegender Angehöriger alter Menschen aus Sicht der Entwicklungspsychologie der Lebensspanne
Boll, Thomas UL; Ferring, Dieter UL

in Zeitschrift für Gerontologie und Geriatrie : Organ der Deutschen Gesellschaft für Gerontologie und Geriatrie; Supplement 1 (2012, September)

Familienangehörige sind die wichtigsten informellen Pflegepersonen alter Menschen. Bisherige Forschung hat v.a. aus stress-theoretischer Sicht die Belastungen und deren negative Folgen für die Gesundheit ... [more ▼]

Familienangehörige sind die wichtigsten informellen Pflegepersonen alter Menschen. Bisherige Forschung hat v.a. aus stress-theoretischer Sicht die Belastungen und deren negative Folgen für die Gesundheit der Pflegenden thematisiert. Stress-theoretische Ansätze können aber die inzwischen gut dokumentierten positiven Erfahrungen und Entwicklungsgewinne pflegender Angehöriger nur unzureichend erklären. Der vorliegende Beitrag untersucht die weitergehenden heuristischen Vorzüge einer entwicklungspsychologischen Sicht. Methoden: Literaturrecherchen. Analyse der Situation pflegender Angehöriger mit Kernkonzepten der Lebensspannen-Entwicklungspsychologie (z.B. kritische Lebensereignisse, Entwicklungsziele, intentionale Selbstentwicklung). Ergebnisse: Eine entwicklungspsychologische Sicht erschließt (1) negative, positive und als ambivalent erlebte Aspekte des Pflegens, auch als Funktion von Alter und Phase im Lebenslauf, (2) wie die facettenreiche Pflegesituation diverse Wünsche und Ziele pflegender Angehöriger bzgl. eigener Entwicklung und der der Gepflegten teils frustriert, teils erfüllt, und wie daraus Emotionen und Handlungsbereitschaften erwachsen, (3) wie sich Wünsche, Ziele, Kompetenzen und Persönlichkeitsmerkmale pflegender Angehöriger durch Pflegeerfahrungen weiterentwickeln. Schlussfolgerungen: Kernkonzepte der Entwicklungspsychologie der Lebensspanne erlauben eine umfassendere Analyse der Situation pflegender Angehöriger als bisher und versprechen weitere Fortschritte. [less ▲]

Detailed reference viewed: 133 (10 UL)
Full Text
Peer Reviewed
See detailIntroducing Conviviality as a New Paradigm for Interactions among IT Objects
Moawad, Assaad UL; Efthymiou, Vasileios UL; Caire, Patrice UL et al

in Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments (2012, August), 907

The Internet of Things allows people and objects to seamlessly interact, crossing the bridge between real and virtual worlds. Newly created spaces are heterogeneous; social relations naturally extend to ... [more ▼]

The Internet of Things allows people and objects to seamlessly interact, crossing the bridge between real and virtual worlds. Newly created spaces are heterogeneous; social relations naturally extend to smart objects. Conviviality has recently been introduced as a social science concept for ambient intelligent systems to highlight soft qualitative requirements like user friendliness of systems. Roughly, more opportunities to work with other people increase the conviviality. In this paper, we first propose the conviviality concept as a new interaction paradigm for social exchanges between humans and Information Technology (IT) objects, and extend it to IT objects among themselves. Second, we introduce a hierarchy for IT objects social interactions, from low-level one-way interactions to high-level complex interactions. Then, we propose a mapping of our hierarchy levels into dependence networks-based conviviality classes. In particular, low levels without cooperation among objects are mapped to lower conviviality classes, and high levels with complex cooperative IT objects are mapped to higher conviviality classes. Finally, we introduce new conviviality measures for the Internet of Things, and an iterative process to facilitate cooperation among IT objects, thereby the conviviality of the system. We use a smart home as a running example. [less ▲]

Detailed reference viewed: 120 (9 UL)
Full Text
Peer Reviewed
See detailDNSSM: A large-scale Passive DNS Security Monitoring Framework
Marchal, Samuel UL; François, Jérôme UL; Wagner, Cynthia UL et al

in IEEE/IFIP Network Operations and Management Symposium (2012, April)

We present a monitoring approach and the supporting software architecture for passive DNS traffic. Monitoring DNS traffic can reveal essential network and system level activity profiles. Worm infected and ... [more ▼]

We present a monitoring approach and the supporting software architecture for passive DNS traffic. Monitoring DNS traffic can reveal essential network and system level activity profiles. Worm infected and botnet participating hosts can be identified and malicious backdoor communications can be detected. Any passive DNS monitoring solution needs to address several challenges that range from architectural approaches for dealing with large volumes of data up to specific Data Mining approaches for this purpose. We describe a framework that leverages state of the art distributed processing facilities with clustering techniques in order to detect anomalies in both online and offline DNS traffic. This framework entitled DSNSM is implemented and operational on several networks. We validate the framework against two large trace sets. [less ▲]

Detailed reference viewed: 196 (2 UL)
Full Text
Peer Reviewed
See detailLe principe de coopération loyale comme fondement identitaire de l’Union européenne
Neframi, Eleftheria UL

in Revue du Marché Commun et de l'Union Européenne (2012, March), (556), 197-203

The principle of loyal cooperation affects the balance between Member State autonomy and obligation to ensure the attainment of the objectives of the Union. Unity in the external representation is ... [more ▼]

The principle of loyal cooperation affects the balance between Member State autonomy and obligation to ensure the attainment of the objectives of the Union. Unity in the external representation is regulated by the principle of loyal cooperation. In the internal field, the principle has an autonomous identification function despite the interference with structural and conflict of norms related principles. [less ▲]

Detailed reference viewed: 665 (20 UL)
Full Text
Peer Reviewed
See detailLe concours de la responsabilité délictuelle et de la responsabilité contractuelle
Ancel, Pascal UL

in Responsabilité civile et assurance (2012, February)

Detailed reference viewed: 169 (2 UL)
Full Text
Peer Reviewed
See detailForeword from the Programme Chairs-STAST 2012
Ryan, Peter UL; Coles-Kemp, Lizzie

in Socio-Technical Aspects in Security and Trust (STAST), 2012 Workshop on (2012)

This volume comprises the proceedings of the second workshop on Socio-Technical Aspects of Security and Trust (STAST). The diversity of the topics covered in this proceedings reflect the vibrancy of the ... [more ▼]

This volume comprises the proceedings of the second workshop on Socio-Technical Aspects of Security and Trust (STAST). The diversity of the topics covered in this proceedings reflect the vibrancy of the socio-technical research community within information security. Contributions range from HCIoriented research through organizational process design and decision making. Twelve papers were submitted of which six papers were judged to be of high quality accepted for presentation and publication. We should like to offer our thanks for the professionalism of the authors, reviewers, sub-reviewers and the program committee members. All papers were reviewed by at least three reviewers from the program committee, with the help of external reviewers. [less ▲]

Detailed reference viewed: 101 (0 UL)
See detailNeubewertung von Kläranlagen mit anaerober Schlammfaulung vor dem Hintergrund veränderter energetischer Rahmenbedingungen
Hansen, Joachim UL

in Proceedings of ‚23. Magdeburger Abwassertage.‘ (2012)

Detailed reference viewed: 67 (0 UL)
See detailNARVAL SCILAB TOOLBOX: Network Analysis and Routing eVALuation
Melakessou, Foued UL; Engel, Thomas UL

in Abstract book of 2012 International Workshop on Scilab & OW2 (IWSO) (2012)

Network Analysis and Routing eVALuation 2.0 referenced as NARVAL has been designed on top of the Scilab environment. It has been created at the University of Luxembourg within the Interdisciplinary Centre ... [more ▼]

Network Analysis and Routing eVALuation 2.0 referenced as NARVAL has been designed on top of the Scilab environment. It has been created at the University of Luxembourg within the Interdisciplinary Centre for Security, Reliability and Trust (SnT). The Centre carries out interdisciplinary research and graduate education in secure, reliable, and trustworthy ICT systems and services. This module is focusing on the analysis of network protocols. The main goal of this toolbox is to provide a complete software environment enabling the understanding of available communication algorithms, but also the design of new schemes. NARVAL permits to generate random topologies in order to study the impact of routing algorithms on the effectiveness of transmission protocols used by data communications. The target audience includes academics, students, engineers and scientists. We put some efforts to build detailed help files. The description of each function has been carefully done in order to facilitate the end users' comprehension. The module is self-sufficient as it does not depend on other internal/external Scilab toolboxes. NARVAL is running on the current release Scilab 5.3.3. We decided to create a specific classification according to the goal of each function: NARVAL_D_* (topology Discovery), NARVAL_F_* (general Functions), NARVAL_G_* (Graph), NARVAL_IP_* (Image Processing), NARVAL_I_* ( Internet traffic), NARVAL_M_* (Mobility), NARVAL_P_* (Peer-to-Peer), NARVAL_R_* (Routing), NARVAL_S_* (Security), NARVAL_T_* (Topology generation) and NARVAL_W_* (Wireless Sensor Network). This work was carried out as part of the EU FP7 BUTLER project (http://www.iot-butler.eu). [less ▲]

Detailed reference viewed: 383 (8 UL)
Full Text
Peer Reviewed
See detailA force-based large increment method for 2D continuum solids and the mesh convergence study
Long, D.; Guo, Z.; Liu, X. et al

in AIP Conference Proceedings (2012), 1504

In this paper, a triangular plane stress element is implemented based on the large increment method (LIM) to solve 2D continuum mechanics problems. In the LIM, after the governing equations are ... [more ▼]

In this paper, a triangular plane stress element is implemented based on the large increment method (LIM) to solve 2D continuum mechanics problems. In the LIM, after the governing equations are established using the generalized elemental force variables as primary unknowns, an iteration procedure is employed to obtain an optimised approximate solution of the problem. Two numerical examples are investigated to study the mesh convergence of the proposed triangular LIM element. Structured meshes as well as unstructured meshes with different element densities are generated to illustrate the convergence of the total strain energy in both examples. The numerical results obtained from the LIM (including the total strain energy, the displacement and the stress) are compared with the analytical solutions as well as the results from the commercial FEM software ABAQUS. All the results show that the performance of the LIM is as good as the FEM in linear elastic problems. A simple elastoplastic example suggests that the LIM may obtain better result than the FEM. © 2012 American Institute of Physics. [less ▲]

Detailed reference viewed: 296 (5 UL)
Full Text
Peer Reviewed
See detailAnalyse of the semantic field of Social representation between teachers and parents of the School/Family relationship
Pelt, Véronique UL; Poncelet, Débora UL

in Papers on Social Representations = Textes sur les représentations sociales (2012), 21

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailImproving Performance and Anonymity in the Tor Network
Panchenko, Andriy UL; Lanze, Fabian UL; Engel, Thomas UL

in Abstract book of 31st IEEE International Performance Computing and Communications Conference (IEEE IPCCC 2012) (2012)

Detailed reference viewed: 174 (13 UL)
Full Text
Peer Reviewed
See detailStandardized Power-Efficient & Internet-Enabled Communication Stack for Capillary M2M Networks
Accettura, Nicola; Palattella, Maria Rita UL; Dohler, Mischa et al

in Proc. of WCNC2012 (2012)

Detailed reference viewed: 80 (2 UL)
Full Text
Peer Reviewed
See detailRapid Prototyping Framework for Visual Control of Autonomous Micro Aerial Vehicles
Mellado-Bataller, Ignacio; Campoy, Pascual; Olivares Mendez, Miguel Angel UL et al

in Advances in Intelligent Systems and Computing (2012), 193

Rapid prototyping environments can speed up the research of visual control algorithms. We have designed and implemented a software framework for fast prototyping of visual control algorithms for Micro ... [more ▼]

Rapid prototyping environments can speed up the research of visual control algorithms. We have designed and implemented a software framework for fast prototyping of visual control algorithms for Micro Aerial Vehicles (MAV). We have applied a combination of a proxy-based network communication architecture and a custom Application Programming Interface. This allows multiple experimental configurations, like drone swarms or distributed processing of a drones video stream. Currently, the framework supports a low-cost MAV: the Parrot AR.Drone. Real tests have been performed on this platform and the results show comparatively low figures of the extra communication delay introduced by the framework, while adding new functionalities and flexibility to the selected drone. This implementation is open-source and can be downloaded from www.vision4uav.com/?q=VC4MAV-FW [less ▲]

Detailed reference viewed: 97 (1 UL)
Full Text
Peer Reviewed
See detailWho’s that girl? Körperbild, Selbsterkennung und Selbstkonzept bei jungen Frauen mit und ohne Essstörungsrisiko
Lutz, Annika UL; Herbert, Cornelia; Vögele, Claus UL

in Abstract book of 30. Symposium Klinische Psychologie und Psychotherapie der DGPS Fachgruppe Klinische Psychologie und Psychotherapie (2012)

Detailed reference viewed: 135 (7 UL)
Full Text
Peer Reviewed
See detailA Supervised Verifiable Voting Protocol for the Victorian Electoral Commission
Burton, Craig Burton; Culnane, Chris; Heather, James et al

in EVOTE 2012 (2012)

This paper describes the design of a supervised verifiable voting protocol suitable for use for elections in the state of Victoria, Australia. We provide a brief overview of the style and nature of the ... [more ▼]

This paper describes the design of a supervised verifiable voting protocol suitable for use for elections in the state of Victoria, Australia. We provide a brief overview of the style and nature of the elections held in Victoria and associated challenges. Our protocol, based on Prêt à Voter, presents a new ballot overprinting front-end design, which assists the voter in completing the potentially complex ballot. We also present and analyse a series of modifications to the back-end that will enable it to handle the large number of candidates, 35+ , with ranking single transferable vote (STV), which some Victorian elections require. We conclude with a threat analysis of the scheme and a discussion on the impact of the modifications on the integrity and privacy assumptions of Prêt à Voter. [less ▲]

Detailed reference viewed: 173 (0 UL)
Full Text
Peer Reviewed
See detail“Where do we go from here?” – A preliminary evaluation of the EU Ambient Assisted Programs
Roelofsma, Peter; Ferring, Dieter UL; Aleksic, Gabrijela UL

in Abstract paper of the AAL Forum 2012 (2012)

Detailed reference viewed: 35 (3 UL)
Full Text
Peer Reviewed
See detailFrequency Coupling in Inverter Grids Modeling the Mutual Interference of Voltage Source Inverters in Island Grids
Jostock, Markus UL; Sachau, Jürgen UL

in Abstract book of 5th International Conference on Integration of Renewable and Distributed Energy Resources (2012)

This paper presents a model to describe the mutual frequency disturbance of meshed and interconnected voltage source inverters during transient phases. The model provides a weighted mutual frequency ... [more ▼]

This paper presents a model to describe the mutual frequency disturbance of meshed and interconnected voltage source inverters during transient phases. The model provides a weighted mutual frequency coupling matrix taking into account that the mutual frequency measurement disturbance decreases for increasing electric distance between the inverters (i.e. depend on the line admittance) and depends on the respective inverter’s rated power, meaning that stronger inverters have more influence than small ones on the other inverters frequency perception. [less ▲]

Detailed reference viewed: 110 (7 UL)
Full Text
Peer Reviewed
See detailXFEM coupling of granular flows interacting with surrounding fluids
Pasenow, F.; Zilian, Andreas UL; Dinkler, D.

in ECCOMAS 2012 - European Congress on Computational Methods in Applied Sciences and Engineering, e-Book Full Papers (2012)

In this paper, ideas for the simulation of sliding dry granular materials interacting with surrounding fluids are presented and first results are presented. The compressible granular material is modeled ... [more ▼]

In this paper, ideas for the simulation of sliding dry granular materials interacting with surrounding fluids are presented and first results are presented. The compressible granular material is modeled as a medium which can show solid-like and fluid-like characteristics. Therefore a weighted decomposition of stress tensors of a solid-like and a fluid-like phase is applied. The surrounding incompressible fluids are described with a Newtonian constitutive model. Interface dynamics are handled with the level-set method. The model equations are discretized with the space-time finite element method. Discontinuous solution characteristics across interfaces are captured numerically by the extended finite element method (XFEM). For all discontinuities the space of ansatz functions is enriched with Heaviside functions. [less ▲]

Detailed reference viewed: 92 (0 UL)
Full Text
Peer Reviewed
See detailEquilibrated patch recovery for accurate evaluation of upper error bounds in quantities of interest
González-Estrada, O. A.; Ródenas, J. J.; Nadal, E. et al

in ECCOMAS Thematic Conference - ADMOS 2011: International Conference on Adaptive Modeling and Simulation, An IACM Special Interest Conference (2012)

There is an increasing interest on the use of goal-oriented error estimates which help to measure and control the local error on a linear or non-linear quantity of interest (QoI) that might result ... [more ▼]

There is an increasing interest on the use of goal-oriented error estimates which help to measure and control the local error on a linear or non-linear quantity of interest (QoI) that might result relevant for design purposes (e.g. the mean stress value in a particular area, displacements, the stress intensity factor for fracture problems,⋯). In general, residual-based error estimators have been used to obtain upper and lower bounds of the error in quantities of interest for finite element approximations. In this work, we propose a novel a posteriori recovery technique to obtain an upper error bound of the QoI. We use a recovery procedure based on the superconvergent patch recovery (SPR) technique to obtain nearly statically admissible recovered stress fields for the primal and dual problems. This recovery technique was previously used to obtain upper bounds of the error in energy norm and has been used in this paper to obtain a computable version of the upper bound for the quantity of interest. [less ▲]

Detailed reference viewed: 240 (1 UL)
Full Text
Peer Reviewed
See detailError estimation and error bounding in quantities of interest based on equilibrated recovered displacement fields
Nadal, E.; González-Estrada, O. A.; Ródenas, J. J. et al

in ECCOMAS 2012 - European Congress on Computational Methods in Applied Sciences and Engineering, e-Book Full Papers (2012)

Over the last ten years there has been an increase on the use of goal-oriented error estimates aimed to quantify the local error on a (non)linear quantity of interest (QoI) that might result relevant for ... [more ▼]

Over the last ten years there has been an increase on the use of goal-oriented error estimates aimed to quantify the local error on a (non)linear quantity of interest (QoI) that might result relevant for design purposes. Residual-based error estimators have been used recursively to obtain upper and lower bounds of the error in quantities of interest for finite element approximations. In this paper, we present a recovery technique for 2D linear elasticity problems, based on the superconvergent patch recovery (SPR), which provides recovered displacement and stress fields that are then utilised to evaluate practical upper and lower error bounds in QoI. [less ▲]

Detailed reference viewed: 245 (2 UL)
Full Text
Peer Reviewed
See detailError estimation and error bounding in energy norm based on a displacement recovery technique
Nadal, E.; González-Estrada, O. A.; Ródenas, J. J. et al

in ECCOMAS 2012 - European Congress on Computational Methods in Applied Sciences and Engineering, e-Book Full Papers (2012)

Traditionally, recovery based error estimators in linear elasticity have considered the evaluation of an enhanced stress field obtained from the raw Finite Element (FE) stress solution. Instead of that ... [more ▼]

Traditionally, recovery based error estimators in linear elasticity have considered the evaluation of an enhanced stress field obtained from the raw Finite Element (FE) stress solution. Instead of that, one can also obtain a recovered displacement field from the FE displacements. Herein, we describe a superconvergent patch recovery of the displacement field which considers the local fulfilment of boundary and internal equilibrium equations, Dirichlet constraints and, for singular problems, the splitting of the displacement and stress fields into singular and smooth parts. Numerical tests using problems with known analytical solution have been carried out to validate the proposed technique for error estimation and error bounding in energy norm and quantities of interest. [less ▲]

Detailed reference viewed: 242 (2 UL)
Full Text
Peer Reviewed
See detailDoctor’s view on doctor-patient-communication in a multilingual and multicultural setting.
Bourkel, Elisabeth UL; Ferring, Dieter UL

in Psychology & Health (2012), 27(Sup1), 12-12

Detailed reference viewed: 66 (6 UL)
Full Text
Peer Reviewed
See detailParallelism and Concurrency of Stochastic Graph Transformations
Heckel, Reiko; Ehrig, Hartmut; Golas, Ulrike et al

in Graph Transformation, Lecture Notes in Computer Science (LNCS) (2012), 7562

Graph transformation systems (GTS) have been proposed for high-level stochastic modelling of dynamic systems and networks. The resulting systems can be described as semi-Markov processes with graphs as ... [more ▼]

Graph transformation systems (GTS) have been proposed for high-level stochastic modelling of dynamic systems and networks. The resulting systems can be described as semi-Markov processes with graphs as states and transformations as transitions. The operational semantics of such processes can be explored through stochastic simulation. In this paper, we develop the basic theory of stochastic graph transformation, including generalisations of the Parallelism and Concurrency Theorems and their application to computing the completion time of a concurrent process. [less ▲]

Detailed reference viewed: 91 (3 UL)
Full Text
Peer Reviewed
See detailValidating a Peer-to-Peer Evolutionary Algorithm
Jimenez Laredo, Juan Luis UL; Bouvry, Pascal UL; Mostaghim, Sanaz et al

in European Conference on the Applications of Evolutionary Computation (2012)

Detailed reference viewed: 132 (5 UL)
Full Text
Peer Reviewed
See detailSocial media use in old age: User profiles, effects, best practices
Leist, Anja UL; Aleksic, Gabrijela UL; Ferring, Dieter UL

in Gerontologist (2012), 52(S1), 563-564

Detailed reference viewed: 128 (8 UL)
Full Text
Peer Reviewed
See detailFluctuations and response from a Hatano and Sasa approach
Verley, Gatien UL; Lacoste, David

in Physica Scripta (2012), 86(5), 058505

In this commentary paper, we present some of the main ideas on deriving a modified fluctuation-dissipation theorem off equilibrium, which in the end can all be related to an approach based on a ... [more ▼]

In this commentary paper, we present some of the main ideas on deriving a modified fluctuation-dissipation theorem off equilibrium, which in the end can all be related to an approach based on a generalized Hatano-Sasa relation. This generalized Hatano?Sasa relation also contains an interesting inequality, which can be viewed as a generalization of the second law of thermodynamics to transitions between non-equilibrium states. [less ▲]

Detailed reference viewed: 80 (0 UL)
See detailCentral and Eastern European Member States of the EU and the European Convention on Human Rights
Hofmann, Mahulena UL

in European Convention on Human Rights (2012)

Detailed reference viewed: 72 (2 UL)
Full Text
Peer Reviewed
See detailInterdisciplinary System Model for Agent-based Mechatronic Design of Turbocharging Systems
Schmelcher, J.; Stetter, R.; Kaufmann, A. et al

in International Design Conference -DESIGN 2012 (2012)

The advances in technology and science lead to the creation of mechatronic systems with increasing complexity. Due to this rising complexity of the systems to be developed, the requirements towards the ... [more ▼]

The advances in technology and science lead to the creation of mechatronic systems with increasing complexity. Due to this rising complexity of the systems to be developed, the requirements towards the development processes are ascending in the same manner. As a result of the historical evolution of the involved domains (mechanical engineering, electrical engineering and computer science), the specific IT-Tools were not designed for interdisciplinary processes and can usually even barely exchange data among each other. This causes a lack of interoperability and results in ineffective development processes with drawbacks on the consistency of interdisciplinary model data. To deal with this situation, research and industry encouraged the idea of a domain-spanning system model, which contains the cross-domain information and important relations (e. g. Chen et al. 2009). One promising approach to survey these interdisciplinary information and relations and thus help the people participating in the design process is based on multi-agent systems. The basis on which a multi-agent system is able to make decisions concerning the cross-domain information and relations can be a model of the mechatronic system modelled with the modelling language SysML. This paper will present an approach how this system models can be developed using the modelling language SysML and furthermore it will expound a practical model of a real mechatronic system – a turbocharging system for a car engine. [less ▲]

Detailed reference viewed: 58 (2 UL)
Full Text
Peer Reviewed
See detailHistory of working-life non-employment spells predicts later cognitive function in middle- and older-aged Europeans
Leist, Anja UL; Avendano, M.; van Lenthe, F. J. et al

in Psychology & Health (2012), 27(S1), 79-79

Detailed reference viewed: 58 (3 UL)
Full Text
Peer Reviewed
See detailHow LLP projects use Internet and social media for communication purposes: a desktop research
Song, Ju-Youn UL; Zourou, Katerina UL

in In C. Stracke (Ed.) The future of Learning Innovations and Learning quality: how do they fit together? (2012)

The Web2LLP project (“Improving Internet strategies and maximizing the social media presence of Lifelong Learning Programme (LLP) projects”, http://www.web2llp.eu/ is a two-year project running from ... [more ▼]

The Web2LLP project (“Improving Internet strategies and maximizing the social media presence of Lifelong Learning Programme (LLP) projects”, http://www.web2llp.eu/ is a two-year project running from January 2012 to December 2013. The partnership consists of six project members: University of Luxembourg, Web2Learn, ATiT, Coventry University Entreprises, Pixel and PAU Education. The original idea for the project stemmed from the need that we felt, as project managers and members involved in LLP projects for several years, for skills and competences that were missing - in both technical and communication terms - regarding the effective use of Internet social media tools, and their embeddedness in the communication strategies that are fundamental to the success of an LLP project. We realized, through informal exchanges with colleagues at EACEA Info days and other project meetings, that although the social web is a reality that cannot be disregarded, its communication potential for LLP projects has not so far been exploited, due to a) a lack of information and appropriation opportunities regarding ways of effectively using these tools as part of a communication strategy, and b) lack of visibility of good practice regarding what is reasonable and achievable in an LLP context. Moreover, although communication is a fundamental piece of every LLP project proposal (one of the required work packages and also a feature under which the project is evaluated both in the intermediary and final reports), there are no guidelines on how to set up a coherent Internet strategy featuring social media tools appropriate to the project. Our project was designed to respond to these needs and it has been selected for funding in 2012 in the highly selective (7% success rate) KA4 action. [less ▲]

Detailed reference viewed: 40 (4 UL)
Full Text
Peer Reviewed
See detailGeneration of Realistic Mobility for VANETs Using Genetic Algorithms
Seredynski, Marcin UL; Danoy, Grégoire UL; Tabatabaei, Masoud UL et al

in Proceedings of the IEEE Congress on Evolutionary Computation (2012)

Detailed reference viewed: 136 (21 UL)
See detailEating disturbances in childhood and early adolescence: Screening in the general population
Van Dyck, Zoé UL; Bellwald, Laura; Dremmel, Daniela et al

in Psychology & Health (2012), 27

Detailed reference viewed: 76 (7 UL)
Full Text
Peer Reviewed
See detailTesting obligation policy enforcement using mutation analysis
Elrakaiby, Yehia UL; Mouelhi, Tejeddine UL; Le Traon, Yves UL

in Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012 (2012)

The support of obligations with access control policies allows the expression of more sophisticated requirements such as usage control, availability and privacy. In order to enable the use of these ... [more ▼]

The support of obligations with access control policies allows the expression of more sophisticated requirements such as usage control, availability and privacy. In order to enable the use of these policies, it is crucial to ensure their correct enforcement and management in the system. For this reason, this paper introduces a set of mutation operators for obligation policies. The paper first identifies key elements in obligation policy management, then presents mutation operators which injects minimal errors which affect these aspects. Test cases are qualified w.r.t. their ability in detecting problems, simulated by mutation, in the interactions between policy management and the application code. The use of policy mutants as substitutes for real flaws enables a first investigation of testing obligation policies in a system. We validate our work by providing an implementation of the mutation process: the experiments conducted on a Java program provide insights for improving test selection. © 2012 IEEE. [less ▲]

Detailed reference viewed: 99 (0 UL)
Full Text
Peer Reviewed
See detailTesting Obligation Policy Enforcement using Mutation Analysis
El Rakaiby, Yehia UL; Mouelhi, Tejeddine UL; Le Traon, Yves UL

in Proceedings of the 7th International Workshop on Mutation Analysis (associated to the Fifth International Conference on Software Testing, Verification, and Validation, ICST 2012) (2012)

The support of obligations with access control policies allows the expression of more sophisticated requirements such as usage control, availability and privacy. In order to enable the use of these ... [more ▼]

The support of obligations with access control policies allows the expression of more sophisticated requirements such as usage control, availability and privacy. In order to enable the use of these policies, it is crucial to ensure their correct enforcement and management in the system. For this reason, this paper introduces a set of mutation operators for obligation policies. The paper first identifies key elements in obligation policy management, then presents mutation operators which injects minimal errors which affect these aspects. Test cases are qualified w.r.t. their ability in detecting problems, simulated by mutation, in the interactions between policy management and the application code. The use of policy mutants as substitutes for real flaws enables a first investigation of testing obligation policies in a system. We validate our work by providing an implementation of the mutation process: the experiments conducted on a Java program provide insights for improving test selection. [less ▲]

Detailed reference viewed: 104 (0 UL)
Full Text
Peer Reviewed
See detailA Model-Based Approach to Automated Testing of Access Control Policies
Xu, Dianxiang; Thomas, Lijo UL; Kent, Michael et al

in Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (2012)

Access control policies in software systems can be implemented incorrectly for various reasons. This paper presents a model-based approach for automated testing of access control implementation. To feed ... [more ▼]

Access control policies in software systems can be implemented incorrectly for various reasons. This paper presents a model-based approach for automated testing of access control implementation. To feed the model-based testing process, test models are constructed by integrating declarative access control rules and contracts (preconditions and post-conditions) of the associated activities. The access control tests are generated from the test models to exercise the interactions of access control activities. Test executability is obtained through a mapping of the modeling elements to implementation constructs. The approach has been implemented in an industry-adopted test automation framework that supports the generation of test code in a variety of languages, such as Java, C, C++, C#, and HTML/Selenium IDE. The full model-based testing process has been applied to two systems implemented in Java. The effectiveness is evaluated in terms of access-control fault detection rate using mutation analysis of access control implementation. The experiments show that the model-based tests killed 99.7% of the mutants and the remaining mutants caused no policy violations. [less ▲]

Detailed reference viewed: 125 (0 UL)
Full Text
Peer Reviewed
See detailRefactoring Access Control Policies for Performance Improvement
Elkateb, Donia UL; Mouelhi, Tejeddine UL; Le Traon, Yves UL et al

in Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (ICPE 2012) (2012)

In order to facilitate managing authorization, access control architectures are designed to separate the business logic from an access control policy. To determine whether a user can access which ... [more ▼]

In order to facilitate managing authorization, access control architectures are designed to separate the business logic from an access control policy. To determine whether a user can access which resources, a request is formulated from a component, called a Policy Enforcement Point (PEP) located in application code. Given a request, a Policy Decision Point (PDP) evaluates the request against an access control policy and returns its access decision (i.e., permit or deny) to the PEP. With the growth of sensitive information for protection in an application, an access control policy consists of a larger number of rules, which often cause a performance bottleneck. To address this issue, we propose to refactor access control policies for performance improvement by splitting a policy (handled by a single PDP) into its corresponding multiple policies with a smaller number of rules (handled by multiple PDPs). We define seven attribute-set-based splitting criteria to facilitate splitting a policy. We have conducted an evaluation on three subjects of reallife Java systems, each of which interacts with access control policies. Our evaluation results show that (1) our approach preserves the initial architectural model in terms of interaction between the business logic and its corresponding rules in a policy, and (2) our approach enables to substantially reduce request evaluation time for most splitting criteria. Copyright 2012 ACM. [less ▲]

Detailed reference viewed: 111 (0 UL)
See detailEvaluation de la préparation aux pratiques professionnelles des Bacheliers en Sciences Sociales et Educatives au Luxembourg
Limbach-Reich, Arthur UL; Engelberg, Elisabeth; Amara, Marie-Emmanuelle UL

in Sommaire colloque international de l'ADMEE-Europe: L'évaluation des compétences en milieu scolaire et en milieu professionnel (2012)

Detailed reference viewed: 77 (2 UL)
Full Text
Peer Reviewed
See detailAn Nonparametric Evaluation of SysML-Based Mechatronic Conceptual Design
Chami, Mohammad; Bou Ammar, Haitham; Voos, Holger UL et al

in Proceedings, 24th Benelux Conference on Artificial Intelligence (2012)

Detailed reference viewed: 93 (4 UL)
Full Text
Peer Reviewed
See detailDepth enhancement by fusion for passive and active sensing
Garcia, F.; Aouada, D.; Abdella, H. K. et al

in Lecture Notes in Computer Science (2012), 7585 LNCS(PART 3), 506-515

This paper presents a general refinement procedure that enhances any given depth map obtained by passive or active sensing. Given a depth map, either estimated by triangulation methods or directly ... [more ▼]

This paper presents a general refinement procedure that enhances any given depth map obtained by passive or active sensing. Given a depth map, either estimated by triangulation methods or directly provided by the sensing system, and its corresponding 2-D image, we correct the depth values by separately treating regions with undesired effects such as empty holes, texture copying or edge blurring due to homogeneous regions, occlusions, and shadowing. In this work, we use recent depth enhancement filters intended for Time-of-Flight cameras, and adapt them to alternative depth sensing modalities, both active using an RGB-D camera and passive using a dense stereo camera. To that end, we propose specific masks to tackle areas in the scene that require a special treatment. Our experimental results show that such areas are satisfactorily handled by replacing erroneous depth measurements with accurate ones. © 2012 Springer-Verlag. [less ▲]

Detailed reference viewed: 128 (1 UL)
Full Text
Peer Reviewed
See detailLes attitudes comme indicateurs cognitifs et affectives des compétences relatives au développement durable
de Leeuw, Astrid UL; Valois, Pierre

in Abstract book du 24e Colloque International de l’ADMEE-Europe (2012)

Detailed reference viewed: 29 (1 UL)
Full Text
Peer Reviewed
See detailTrustworthy agent-based recommender system in a mobile P2P environment
Sahli, N.; Lenzini, Gabriele UL; Eertink, H.

in Lecture Notes in Computer Science (2012), 6573 LNAI

Current major P2P systems focus on PCs and do not provide services for the mobile environment. Compared to traditional P2P, characteristics of Mobile P2P include unreliable connections, limited bandwidth ... [more ▼]

Current major P2P systems focus on PCs and do not provide services for the mobile environment. Compared to traditional P2P, characteristics of Mobile P2P include unreliable connections, limited bandwidth and constraints of mobile devices. In addition, nomadic users demand applications and services that are context-aware, personalised, secure, and trustworthy. Recommender systems are one of these applications. In this paper, we aim at building a mobile P2P recommender system which dramatically reduces wireless traffic between peers, brings trustworthiness (each peer can choose to rely on opinions of peers whom he trusts), and ffers unobtrusiveness (the target system is mainly autonomous and requires a minimum user intervention). Our solution is based on multi-agent systems and is illustrated on a slow-food restaurant recommender system. © 2012 Springer-Verlag. [less ▲]

Detailed reference viewed: 105 (6 UL)
Full Text
Peer Reviewed
See detailType and duration of working-life non-employment spells predict cognitive function in old age
Leist, Anja UL; Avendano, Mauricio; van Lenthe, Frank J. et al

in Gerontologist (2012), 52(S1), 676-677

Detailed reference viewed: 55 (4 UL)
Full Text
Peer Reviewed
See detailSpatio-temporal ToF data enhancement by fusion
Garcia, F.; Aouada, D.; Mirbach, B. et al

in Proceedings - International Conference on Image Processing, ICIP (2012)

We propose an extension of our previous work on spatial domain Time-of-Flight (ToF) data enhancement to the temporal domain. Our goal is to generate enhanced depth maps at the same frame rate of the 2-D ... [more ▼]

We propose an extension of our previous work on spatial domain Time-of-Flight (ToF) data enhancement to the temporal domain. Our goal is to generate enhanced depth maps at the same frame rate of the 2-D camera that, coupled with a ToF camera, constitutes a hybrid ToF multi-camera rig. To that end, we first estimate the motion between consecutive 2-D frames, and then use it to predict their corresponding depth maps. The enhanced depth maps result from the fusion between the recorded 2-D frames and the predicted depth maps by using our previous contribution on ToF data enhancement. The experimental results show that the proposed approach overcomes the ToF camera drawbacks; namely, low resolution in space and time and high level of noise within depth measurements, providing enhanced depth maps at video frame rate. © 2012 IEEE. [less ▲]

Detailed reference viewed: 123 (0 UL)
Full Text
Peer Reviewed
See detailBewertung des Anwendungsbereiches der Schlammfaulung unter Berücksichtigung der Energieeffizienz kommunaler Kläranlagen
Schmitt, T.G.; Gretzschel, O.; Hansen, Joachim UL et al

in Proceedings of ‚26. Karlsruher Flockungstage‘ (2012)

Detailed reference viewed: 68 (1 UL)
Full Text
Peer Reviewed
See detailTraffic-Aware Time-Critical Scheduling In Heavily Duty-Cycled IEEE 802.15.4e For An Industrial IoT
Palattella, Maria Rita UL; Accettura, Nicola; Dohler, Mischa et al

in Proc. of IEEE Sensors 2012 (2012)

Detailed reference viewed: 257 (2 UL)
Full Text
Peer Reviewed
See detailTraffic Aware Scheduling Algorithm for Multi-Hop IEEE 802.15.4e Networks
Palattella, Maria Rita UL; Accettura, Nicola; Dohler, Mischa et al

in Proc. of PIMRC2012 (2012)

Detailed reference viewed: 119 (2 UL)
Full Text
Peer Reviewed
See detailBuilding specifications as a domain-specific aspect language
Kramer, Max E.; Klein, Jacques UL; Steel, Jim R. H.

in DSAL'12 - Proceedings of the 7th Workshop on Domain-Specific Aspect Languages (2012)

In the construction industry an increasing number of buildings are designed using semantically rich three-dimensional models. In parallel, additional information is specified in a natural-language ... [more ▼]

In the construction industry an increasing number of buildings are designed using semantically rich three-dimensional models. In parallel, additional information is specified in a natural-language document called a building specification. 1 As not all details are present in the model these specifications have to be interpreted whenever costs are estimated or other analyses are performed. In this paper, we argue that building specifications contain cross-cutting concerns. We also argue that domain experts should be given the ability to formulate building specifications using a domain-specific aspect language so that the corresponding details can automatically be integrated into the model. The language needs to support a multitude of domain-specific abstractions that are absent in the building meta-model. Therefore we propose to allow the domain experts to extend the language iteratively by defining interpretation patterns [1]. Such a model enriching specification will improve tasks requiring detailed information and will allow for earlier or even concurrent development of the building specification along with the model. © 2012 ACM. [less ▲]

Detailed reference viewed: 133 (0 UL)
Full Text
Peer Reviewed
See detailDetecting meaconing attacks by analysing the clock bias of GNSS receivers
Marnach, Daniel; Mauw, Sjouke UL; Martins, Miguel et al

in European Navigation Conference (ENC 2012) (2012)

Existing Global Navigation Satellite Systems offer no authentication of their satellite signals towards their civilian users. As a consequence, several types of GNSS-related attacks, including meaconing ... [more ▼]

Existing Global Navigation Satellite Systems offer no authentication of their satellite signals towards their civilian users. As a consequence, several types of GNSS-related attacks, including meaconing, may be performed and remain undetected. In the scope of the project “Developing a prototype of Localisation Assurance Service Provider”, which is funded by ESA and realised by the company itrust consulting and the University of Luxembourg, a methodology to visualise the beginnings and the ends of meaconing attacks by monitoring the clock bias of an attacked receiver over time was developed. This paper presents an algorithm that is based on this attack visualisation technique and is capable of detecting meaconing attacks automatically. Experiments in a controlled environment confirmed that the chosen methodology works properly. In one of these tests, for example, six meaconing attacks were simulated by using a GNSS signal repeater. The algorithm was able to detect the beginnings and the ends of all six attacks, while resulting in no more than two false positives, even though the average delay introduced by the meaconing stations (repeater) was just 80 nanoseconds. [less ▲]

Detailed reference viewed: 117 (1 UL)
See detailVerfahren der Abwasserreinigung
Hansen, Joachim UL

in Proceedings of seminar ‚Abwassertechnik und Gewässerschutz‘ (2012)

Detailed reference viewed: 68 (0 UL)
Full Text
Peer Reviewed
See detailTowards a Simple City Driving Simulator Based on Speed Dreams and OSM
Avanesov, Tigran UL; Louveton, Nicolas UL; McCall, Roderick UL et al

in Adjunct Proceedings of 4th International Conference on Automotive User Interfaces and Interactive Vehicular Applications (2012), 2

This paper presents an architecture and partially built simulation platform which is designed to offer a flexible open ended approach for conducting laboratory experiments. The emphasis is on supporting ... [more ▼]

This paper presents an architecture and partially built simulation platform which is designed to offer a flexible open ended approach for conducting laboratory experiments. The emphasis is on supporting multiple drivers and the ability to swap in and out different software components and devices. [less ▲]

Detailed reference viewed: 197 (20 UL)
Full Text
Peer Reviewed
See detailClock Skew Based Remote Device Fingerprinting Demystified
Lanze, Fabian UL; Panchenko, Andriy UL; Braatz, Benjamin UL et al

in Proceedings of the 55th International IEEE Global Communications Conference (IEEE GLOBECOM 2012) (2012)

Detailed reference viewed: 201 (12 UL)
Full Text
Peer Reviewed
See detailA Fair and Robust Voting System by Broadcast
Khader, Dalia UL; Smyth, Ben; Ryan, Peter UL et al

in Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI) (2012)

Hao, Ryan, and Zieliński (2010) propose a two-round decentralized voting protocol that is efficient in terms of rounds, computation, and bandwidth. However, the protocol has two drawbacks. First, if some ... [more ▼]

Hao, Ryan, and Zieliński (2010) propose a two-round decentralized voting protocol that is efficient in terms of rounds, computation, and bandwidth. However, the protocol has two drawbacks. First, if some voters abort then the election result cannot be announced, that is, the protocol is not robust. Secondly, the last voter can learn the election result before voting, that is, the protocol is not fair. Both drawbacks are typical of other decentralized e-voting protocols. This paper proposes a recovery round to enable the election result to be announced if voters abort, and we add a commitment round to ensure fairness. In addition, we provide a computational security proof of ballot secrecy. [less ▲]

Detailed reference viewed: 158 (2 UL)
Full Text
Peer Reviewed
See detailEngineering Process for Safe Autonomous Robots
Gribov, Vladislav UL; Voos, Holger UL

in Abstract book of 5th International Workshop on Human-Friendly Robotics (HFR2012) (2012)

Safe service and personal care robots became new exciting research topic over last few years. Physical segregation of the industrial robot and humans works fine [1], but for obvious reasons is not ... [more ▼]

Safe service and personal care robots became new exciting research topic over last few years. Physical segregation of the industrial robot and humans works fine [1], but for obvious reasons is not possible if physical human-robot interaction (pHRI) is required. Autonomous robots and untrained humans sharing the operation space and cooperating with each other brings new kind of risks and requirements to robot safety. The wide deployment of service and personal care robots suggests limited costs for the robot development phase. The existing robots, both industrial and academic, are mostly designed from scratch without providing clear and safetyoriented engineering process for robot design. [less ▲]

Detailed reference viewed: 259 (3 UL)
Full Text
Peer Reviewed
See detailSome aspects of the local theory of generalized Dhombres functional equations in the complex domain
Tomaschek, Jörg UL

in ESAIM: Proceedings and Surveys (2012), 36

We study the generalized Dhombres functional equation f(zf(z)) = ϕ(f(z)) in the complex domain. The function ϕ is given and we are looking for solutions f with f(0) = w0 and w0 is a primitive root of ... [more ▼]

We study the generalized Dhombres functional equation f(zf(z)) = ϕ(f(z)) in the complex domain. The function ϕ is given and we are looking for solutions f with f(0) = w0 and w0 is a primitive root of unity of order l ≥ 2. All formal solutions for this case are described in this work, for the situation where ϕ can be transformed into a function which is linearizable and local analytic in a neighbourhood of zero we also show that we obtain local analytic solutions. We also discuss an example where it is possible to use other methods than we use in the general case. [less ▲]

Detailed reference viewed: 68 (0 UL)
Full Text
Peer Reviewed
See detailOn the optimality of beamformer design for zero-forcing DPC with QR decomposition
Tran, L.-N.; Juntti, M.; Bengtsson, M. et al

in IEEE International Conference on Communications (2012)

We consider the beamformer design for zero-forcing dirty paper coding (ZF-DPC), a suboptimal transmission technique for MISO broadcast channels (MISO BCs). Beamformers for ZF-DPC are designed to maximize ... [more ▼]

We consider the beamformer design for zero-forcing dirty paper coding (ZF-DPC), a suboptimal transmission technique for MISO broadcast channels (MISO BCs). Beamformers for ZF-DPC are designed to maximize a performance measure, subject to some power constraints and zero-interference constraints. For the sum rate maximization problem under a total power constraint, the existing beamformer designs in the literature are based on the QR decomposition (QRD), which is used to satisfy the ZF constraints. However, the optimality of the QRD-based design is still unknown. First, we prove that the QRD-based design is indeed optimal for ZF-DPC for any performance measure under a sum power constraint. For the per-antenna power constraints, the QRD-based designs become suboptimal, and we propose an optimal design, using a convex optimization framework. Low-complexity suboptimal designs are also presented. © 2012 IEEE. [less ▲]

Detailed reference viewed: 112 (0 UL)
Full Text
Peer Reviewed
See detailNew methods for finding associations in large data sets: Generalizing the maximal information coefficient (MIC)
Ignac, Tomasz UL; Sakhanenko, N. A.; Skupin, Alexander UL et al

in Proceedings of the Ninth International Workshop on Computational Systems Biology (2012)

We propose here a natural, but substantive, extension of the MIC. Defined for two variables, MIC has a distinct advance for detecting potentially complex dependencies. Our extension provides a similar ... [more ▼]

We propose here a natural, but substantive, extension of the MIC. Defined for two variables, MIC has a distinct advance for detecting potentially complex dependencies. Our extension provides a similar means for dependencies among three variables. This itself is an important step for practical applications. We show that by merging two concepts, the interaction information, which is a generalization of the mutual information to three variables, and the normalized information distance, which measures informational sharing between two variables, we can extend the fundamental idea of MIC. Our results also exhibit some attractive properties that should be useful for practical applications in data analysis. Finally, the conceptual and mathematical framework presented here can be used to generalize the idea of MIC to the multi-variable case. [less ▲]

Detailed reference viewed: 209 (9 UL)
Full Text
Peer Reviewed
See detailCompound Model of Inverter Driven Grids Stability Analysis of Island Power Grids Containing Only Voltage Source Inverters
Jostock, Markus UL; Sachau, Jürgen UL

in Abstract book of 5th International Conference on Integration of Renewable and Distributed Energy Resources (2012)

This paper presents a structured development of a compound state space model of an inverter driven power grid. It allows to perform stability investigations on power grids, depending on the inverter ... [more ▼]

This paper presents a structured development of a compound state space model of an inverter driven power grid. It allows to perform stability investigations on power grids, depending on the inverter parameters influencing their dynamich behavior and on the grid structure. The general approach is to separate the active components, i.e. the inverters, from the passive components, i.e. the grid, and model them separately. A state space model of a single voltage source inverter is developed and then extended into a multi-inverter model. Based on the linearized power equations of one grid branch, a matrix representation of the grid is developed, based on the sorted node incidence matrix. The grid matrix model and the multi-inverter state space model are joined into one compound control model for inverter driven power grids. [less ▲]

Detailed reference viewed: 152 (6 UL)
Full Text
Peer Reviewed
See detailInvariant Preservation In Iterative Modeling
Lucio, Levi; Syriani, Eugene; Amrani, Moussa UL et al

in Workshop on Models And Evolution, co-located with MoDELS 2012 (2012)

In a Model-Driven Development project, models are typically built iteratively to better satisfy a set of requirements. Therefore it is crucial to guarantee that one iteration of a model evolution does not ... [more ▼]

In a Model-Driven Development project, models are typically built iteratively to better satisfy a set of requirements. Therefore it is crucial to guarantee that one iteration of a model evolution does not hinder the previous version. In this paper, we focus on invariant preservation of behavioral models expressed in Algebraic Petri Nets. The theory developed is applied to a Multi-Level Security File System modeled iteratively. We also discuss how this approach can be applied on Domain-Specific Languages that are translated to Algebraic Petri Nets. [less ▲]

Detailed reference viewed: 74 (1 UL)
Full Text
Peer Reviewed
See detailChanging Agreements: Intention Reconsideration based on Assumptions and Reasons
Marosin, Diana; Proper, Alex Handrik; van der Torre, Leon UL

in Proceedings of the First International Conference on Agreement Technologies, AT 2012 (2012)

Detailed reference viewed: 39 (0 UL)
Full Text
Peer Reviewed
See detailQoE for spatial cognitive systems
Alodeh, Maha UL

in IEEE International Conference on Communications (2012)

Detailed reference viewed: 67 (6 UL)
Full Text
Peer Reviewed
See detailA longitudinal attachment study on adopted adolescents and their adoptive parents
Ongari, Barbara; Mocatti, Tiziana; Decarli, Alessandro UL

in Neuropsychiatrie de l'Enfance et de l'Adolescence (2012), 60

Detailed reference viewed: 72 (1 UL)
Full Text
Peer Reviewed
See detailNormative Multi-Agent Systems
Andrighetto, Giulia; Governatori, Guido; Noriega, Pablo et al

in Dagstuhl Reports (2012), 2(3), 23-49

Normative systems are systems in the behavior of which norms play a role and which need normative concepts in order to be described or specified. A normative multi-agent system combines models for ... [more ▼]

Normative systems are systems in the behavior of which norms play a role and which need normative concepts in order to be described or specified. A normative multi-agent system combines models for normative systems (dealing for example with obligations, permissions and prohibitions) with models for multi-agent systems. Norms have been proposed in multi-agent systems and computer science to deal with issues of coordination, security, electronic commerce and institutions, agent organization. However, due to the lack of a unified theory, many multi-agent system researchers are presently developing their own ad hoc concepts and applications. The aim of this Dagstuhl Seminar was to formulate a collective appraisal of the current perspectives in the field and the most promising venues for future activity. In particular, the seminar has been conceived for the writing of a volume titled "A Prospective view of Normative Multi Agent Systems" aimed to become a standard reference in the field and to provide guidelines for future research in normative multi-agent systems. [less ▲]

Detailed reference viewed: 81 (1 UL)
Full Text
Peer Reviewed
See detailHands-off the cookie-jar: Success and failure in the self-regulation of eating behaviour
Lutz, Annika UL; Vögele, Claus UL

in Psychology & Health (2012), 27(sup1), 20-20

Detailed reference viewed: 105 (5 UL)
Full Text
Peer Reviewed
See detailDistance-Based Rules for Weighted Judgment Aggregation (Extended Abstract)
Slavkovik, Marija UL; Jamroga, Wojciech UL

in Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, AAMAS2012 (2012)

Detailed reference viewed: 37 (2 UL)
See detailCondensation in horizontal heat exchanger tubes
Leyer, Stephan UL; Zacharias, T.; Maisberger, F. et al

in International Congress on Advances in Nuclear Power Plants 2012, ICAPP 2012 (2012), 4

Many innovative reactor concepts for Generation III nuclear power plants use passive safety equipment for residual heat removal. These systems use two phase natural circulation. Heat transfer to the ... [more ▼]

Many innovative reactor concepts for Generation III nuclear power plants use passive safety equipment for residual heat removal. These systems use two phase natural circulation. Heat transfer to the coolant results in a density difference providing the driving head for the required mass flow. By balancing the pressure drop the system finds its operational mode. Therefore the systems depend on a strong link between heat transfer and pressure drop determining the mass flow through the system. In order to be able to analyze these kind of systems with the help of state of the art computer codes the implemented numerical models for heat transfer, pressure drop or two phase flow structure must be able to predict the system performance in a wide parameter range. Goal of the program is to optimize the numerical models and therefore the performance of computer codes analyzing passive systems. Within the project the heat transfer capacity of a heat exchanger tube will be investigated. Therefore the tube will be equipped with detectors, both temperature and pressure, in several directions perpendicular to the tube axis to be able to resolve the angular heat transfer. In parallel the flow structure of a two phase flow inside and along the tube will be detected with the help of x-ray tomography. The water cooling outside of the tube will be realized by forced convection. It will be possible to combine the flow structure measurement with an angular resolved heat transfer for a wide parameter range. The test rig is set up at the TOPLFOW facility at the Helmholtz-Zentrum Dresden-Rossendorf (HZDR), so that it will be possible to vary the pressure between 5 and 70 bar. The steam mass content will be varied between 0 and 100 percent. The results will be compared to the large scaled Emergency Condenser Tests performed at the INKA test facility in Karlstein (Germany). The paper will explain the test setup and the status of the project will be presented. [less ▲]

Detailed reference viewed: 94 (6 UL)
Full Text
Peer Reviewed
See detailSubjektive Ressourcen und Defizite in der Pflege des Ehepartners mit Demenz (Subjective resources and deficits in spousal dementia caregiving)
Leist, Anja UL; Kaiser-Hylla, Catherine; Ferring, Dieter UL

in Verhaltenstherapie (2011, September), 21(S1), 14-14

Detailed reference viewed: 81 (1 UL)
Full Text
Peer Reviewed
See detailMulti-sorted Argumentation
Rienstra, Tjitze UL; Perotti, Alan; Villata, Serena et al

in Proceedings of the 1st International Workshop on the Theory and Applications of Formal Argumentation (TAFA 2011) (2011, July 16), 7132

In the theory of abstract argumentation, the acceptance status of arguments is normally determined for the complete set of arguments at once, under a single semantics. However, this is not always desired ... [more ▼]

In the theory of abstract argumentation, the acceptance status of arguments is normally determined for the complete set of arguments at once, under a single semantics. However, this is not always desired. In this paper, we extend the notion of an argumentation framework to a multi-sorted argumentation framework, and we motivate this extension using an example which considers practical and epistemic arguments. In a multi-sorted argumentation framework, the arguments are partitioned into a number of cells, where each cell is associated with a semantics under which its arguments are evaluated. We prove the properties of the proposed framework, and we demonstrate our theory with a number of examples. Finally, we relate our theory to the theory of modal fibring of argumentation networks. [less ▲]

Detailed reference viewed: 90 (0 UL)
Full Text
Peer Reviewed
See detailJudgment aggregation rules based on minimization.
Lang, J. UL; Pigozzi, Gabriella UL; Slavkovik, Marija UL et al

in Actes des Cinquièmes Journées Francophones Modèles Formel de l'Interaction (MFI 11) (2011, July 12), XIII

Many voting rules are based on some minimization principle. Likewise, in the field of logic-based knowledge representation and reasoning, many belief change or inconsistency handling operators also make ... [more ▼]

Many voting rules are based on some minimization principle. Likewise, in the field of logic-based knowledge representation and reasoning, many belief change or inconsistency handling operators also make use of minimization. Surprisingly, minimization has not played a major role in the field of judgment aggregation, in spite of its proximity to voting theory and logic-based knowledge representation and reasoning. Here we make a step in this direction and study six judgment aggregation rules; two of them, based on distances, have been previously defined; the other four are new, and all inspired both by voting theory and knowledge representation and reasoning. We study the inclusion relationships between these rules and address some of their social choice theoretic properties. [less ▲]

Detailed reference viewed: 108 (0 UL)
See detailLa médiation parmi les modes de règlement des différends civils et commerciaux
Ancel, Pascal UL

in Les médiations: la justice autrement? (2011, June)

Detailed reference viewed: 37 (6 UL)
Full Text
Peer Reviewed
See detailAn open source tool to verify the psychometric properties of an evaluation instrument
Valois, Pierre UL; Houssemand, Claude UL; Germain, Stéphane et al

in Procedia Social and Behavioral Sciences (2011, February), 15

Professionals of education are constantly developing new instruments of evaluation. Even though the use of all sorts of evaluation tools increased during the last decades, it is often difficult for ... [more ▼]

Professionals of education are constantly developing new instruments of evaluation. Even though the use of all sorts of evaluation tools increased during the last decades, it is often difficult for teachers to verify the qualities of their instruments. To provide a solution to this problem, we have developed a free, user-friendly Excel add-in (EIRT), based on Classical Test Theory and Item Response Theory. Item analyses are performed without the requirement of being a computer expert. The objective of this paper is to present this new item analysis program aimed to verify the psychometric properties of an evaluation tool. [less ▲]

Detailed reference viewed: 106 (2 UL)
Full Text
Peer Reviewed
See detailDessiner des cartes pour trouver des hôpitaux
Pauly, Michel UL

in Annales de l'Est (2011), n° spécial 2010

Detailed reference viewed: 32 (1 UL)
Full Text
See detailL'impossible authenticité. La pédagogie prise au piège entre histoire, mémoire et souvenir
Kmec, Sonja UL

in Histoire & Mémoire Cahiers du CDREF (2011), 3

Detailed reference viewed: 61 (1 UL)
Full Text
Peer Reviewed
See detailChildren Participating in Armed Conflict and International Criminal Law
Happold, Matthew UL

in Human Rights and International Legal Discourse (2011), 5

Detailed reference viewed: 126 (4 UL)
Full Text
Peer Reviewed
See detailShifts of spatial attention cued by irrelevant numbers: electrophysiological evidence.
Schuller, Anne-Marie UL

in Journal of Cognitive Neuroscience (2011)

Detailed reference viewed: 42 (5 UL)
See detail„Wann werde ich alt sein?“ Zur Bedeutung wahrgenommener Restlebenszeit und subjektivem Alter für das Bewusstsein des Älterwerdens.
Ferring, Dieter UL

in In E.-M. Kessler, & H.-W. Wahl (Chairs), Subjektive Repräsentationen von normalem und pathologischem Altern. (2011)

Detailed reference viewed: 55 (2 UL)
See detailAcculturation of Portuguese immigrants in Luxembourg: Do value orientations of Portuguese and Luxembourgish mothers and daughters converge or diverge?
Albert, Isabelle UL; Michels, Tom UL; Ferring, Dieter UL

in IACCP Regional Conference (2011)

In acculturation research, the convergence/divergence in value orientations of immigrants and host nationals as well as the question of an acculturation gap between first- and second generation immigrants ... [more ▼]

In acculturation research, the convergence/divergence in value orientations of immigrants and host nationals as well as the question of an acculturation gap between first- and second generation immigrants are important issues. The present study examines similarities and differences between first- and second generation immigrants compared to host nationals in a sample of n = 51 Luxembourgish and Portuguese mother-daughter dyads living in Luxembourg who were interviewed with a standardized questionnaire regarding (a) value orientations, (b) family norms, and (c) self-construal. Controlling for the psychometric properties of the national groups, mean comparisons indicated an acculturation gap regarding family norms with Portuguese daughters being more similar to their Luxembourgish counterparts than to their mothers, whereas both Portuguese generations rated conservation values higher and an independent self-construal lower than Luxembourgish participants. Results are discussed in a theoretical framework of value change in acculturation considering the role of salience of different value contents. [less ▲]

Detailed reference viewed: 114 (9 UL)
See detailAmbivalenz in Eltern-Kind-Beziehungen im Jugend- und jungen Erwachsenenalter: Welche Rolle spielt das elterliche Erziehungsverhalten?
Albert, Isabelle UL; Ferring, Dieter UL

in Abstractband EPSY (2011)

Die Erforschung von Ambivalenz in intergenerationalen Beziehungen hat sich in den letzten Jahren schwerpunktmäßig mit Übergängen in Eltern-Kind-Beziehungen im Erwachsenenalter befasst. Frühere Phasen in ... [more ▼]

Die Erforschung von Ambivalenz in intergenerationalen Beziehungen hat sich in den letzten Jahren schwerpunktmäßig mit Übergängen in Eltern-Kind-Beziehungen im Erwachsenenalter befasst. Frühere Phasen in Eltern-Kind-Beziehungen wurden hingegen seltener unter diesem Gesichtspunkt betrachtet. Gerade der Prozess der Individuation im Jugend- und jungen Erwachsenenalter ist jedoch von Dynamiken der gleichzeitigen Suche nach Nähe und Abgrenzung bestimmt, die mit widersprüchlichen Emotionen und Handlungstendenzen einhergehen können. Die innerfamiliale Regulation unterschiedlicher Bedürfnisse sollte dabei nicht zuletzt auch vom elterlichen Erziehungsverhalten abhängen. Ziel der vorliegenden Studie ist es, die erlebte Ambivalenz von Jugendlichen und jungen Erwachsenen im Zusammenhang mit dem wahrgenommenen elterlichen Erziehungsverhalten zu untersuchen und zwar unter Berücksichtigung der Frage, ob das Alter der Befragten einen Moderator dieses Zusammenhangs darstellt. Die Stichprobe besteht aus N = 233 luxemburgischen Jugendlichen und jungen Erwachsenen im Alter zwischen 14 und 25 Jahren, die mittels eines standardisierten Fragebogens das wahrgenommene elterliche Erziehungsverhalten (Wärme, psychologische Kontrolle und Verhaltenskontrolle) und ihre erlebte Ambivalenz zu Vater und Mutter einschätzten. Die Analysen zeigten insbesondere einen starken positiven Zusammenhang zwischen elterlicher psychologischer Kontrolle und Ambivalenz über alle Altersgruppen hinweg, wohingegen elterliche Wärme durchweg einen negativen Zusammenhang zum Erleben von Ambivalenz gegenüber beiden Eltern aufzeigte. Hingegen war die mütterliche Verhaltenskontrolle nur bei älteren Jugendlichen und jungen Erwachsenen mit dem Erleben von Ambivalenz gegenüber den eigenen Müttern verbunden; in den Beziehungen zum Vater zeigten sich keine Altersunterschiede im positiven Zusammenhang zwischen Verhaltenskontrolle und Ambivalenz. Die vorliegende Studie liefert damit einen wichtigen Beitrag zur Erforschung von Ambivalenz in früheren Abschnitten der Entwicklung sowie einen weiteren Hinweis darauf, dass insbesondere die mütterliche Verhaltenskontrolle je nach Alter des Jugendlichen unterschiedliche Bedeutungen haben kann. Die Ergebnisse werden vor dem Hintergrund der intrafamilialen Regulation von Beziehungen im Individuationsprozess diskutiert. [less ▲]

Detailed reference viewed: 191 (4 UL)
See detailZur psychometrischen Abbildung und Erfassung von Ambivalenz in Generationenbeziehungen.
Albert, Isabelle UL; Ferring, Dieter UL

in Vortrag beim 2. Werkstattgespräch „Ambivalenz“ (2011)

Detailed reference viewed: 26 (2 UL)
Full Text
Peer Reviewed
See detailKorrelate intergenerationaler familiärer Unterstützung im Erwachsenenalter.
Albert, Isabelle UL; Ferring, Dieter UL

in Von der Forschung zur Praxis: 13. Kongress der DGVM (2011)

Die Frage nach Zuständigkeiten für Pflege und Unterstützung im Alter ist in den letzten Jahren im Zuge des demographischen Wandels immer mehr in das Zentrum des öffentlichen Interesses gerückt und hat ... [more ▼]

Die Frage nach Zuständigkeiten für Pflege und Unterstützung im Alter ist in den letzten Jahren im Zuge des demographischen Wandels immer mehr in das Zentrum des öffentlichen Interesses gerückt und hat zahlreiche Forschungsaktivitäten angeregt. Insbesondere die Erforschung von Eltern-Kind-Beziehungen im Erwachsenenalter hat dabei stark an Bedeutung gewonnen, da ein Großteil an intergenerationeller Unterstützung innerhalb der Familie geleistet wird. In Anlehnung an das Modell der intergenerationalen Solidarität sensu Bengtson (z.B. Bengtson & Roberts, 1991) als theoretischer Bezugsrahmen werden in der vorliegenden Studie unterschiedliche Dimensionen der Solidarität umschrieben und Korrelate intergenerationeller Unterstützung zwischen erwachsenen Kindern und ihren Müttern analysiert. Die Stichprobe bestand aus insgesamt N = 123 Personen im mittleren Erwachsenenalter (davon 31.1% männlich) zwischen 32 und 64 (M = 44.99, SD = 6.68) Jahren, die anhand eines standardisierten Fragebogens über Aspekte der Beziehungen zu ihren Müttern (gegebene und erhaltene Unterstützung, internalisierte Familiennormen, emotionale Beziehungsqualität zur Mutter, Gefühle der Ambivalenz gegenüber der Mutter) befragt wurden. Es lagen demnach Auskünfte über Mütter im Alter zwischen 54 und 93 Jahren (M = 72.58, M = 7.99) vor, von denen die meisten nach Angaben ihrer Kinder über einen relativ guten oder im mittleren Bereich liegenden Gesundheitszustand verfügten, in 16 Fällen war jedoch eine Pflegebedürftigkeit gegeben. Die Ergebnisse zeigten, dass vor allem die emotionale Beziehungsqualität sowie internalisierte Familiennormen den Austausch von Unterstützung bedingen, wohingegen Kontextmerkmale (wie Familienstand, Gesundheitszustand der Mutter; Berufstätigkeit des Kindes) weniger stark mit Aspekten der Solidarität zusammenhingen. Ferner wurde das Auftreten ambivalenter Gefühle im Zusammenhang mit der Unterstützung für Mütter durch eine internalisierte Familienorientierung moderiert: Respondenten, die bei starker Familienorientierung hohe Unterstützungsleistungen erbrachten, berichteten über weniger ambivalente Gefühle als Personen, die bei niedriger Familienorientierung hohe Unterstützungsleistungen erbrachten. Die Ergebnisse werden mit Blick auf mögliche Voraussagen für Situationen späterer Pflegebedürftigkeit und unter Berücksichtigung intrafamilialer Prozesse der intergenerationellen Beziehungsregulation diskutiert. [less ▲]

Detailed reference viewed: 138 (0 UL)
Full Text
Peer Reviewed
See detailLe développement d’un regard clinique à travers un dispositif d’analyse de pratiques
Weber, Jean-Marie UL

in Actes du congrès : AREF 2010 Congrès international: Actualité de la recherche en sciences de l'éducation (2011)

Dans l’approche de leur futur métier, les jeunes enseignants-stagiaires sont souvent menés par différents fantasmes par rapport à la réalité en classe et la transmission du savoir. À ce sujet, un ... [more ▼]

Dans l’approche de leur futur métier, les jeunes enseignants-stagiaires sont souvent menés par différents fantasmes par rapport à la réalité en classe et la transmission du savoir. À ce sujet, un dispositif d’analyse des pratiques a été mis en place à l’Université du Luxembourg en 2005 dans le cadre de la formation des enseignants du secondaire. Ma visée pour ce genre de travail était d’aider les stagiaires à s’ouvrir à l’altérité de l’autre et à savoir trouer leurs propres croyances et représentations, à savoir se considérer partie prenante dans leur observation et jugements et à se découvrir à une place de sachant et de supposé savoir. Le travail sur le transfert devra permettre de voir comment le rapport au savoir et à la vérité est en jeu dans la relation avec les élèves. À ce sujet je me demandais : quels peuvent être les effets et les limites et défis de cette démarche ? Premières conclusions : ? grâce à ce dispositif les stagiaires peuvent confronter le manque de savoir, la différence entre savoir et vérité, trouer certaines positions imaginaires et développer de nouveaux signifiants ; ? l’analyse de mes propres contre-transferts m’a aidé à développer le dispositif. [less ▲]

Detailed reference viewed: 60 (1 UL)
Full Text
Peer Reviewed
See detailModel-based security verification and testing for smart-cards
Fourneret, Elizabeta UL; Ochoa, Martìn; Bouquet, Fabrice et al

in Proceedings of 6th International Conference on Availability, Reliability and Security (ARES 2011) (2011)

Model-Based Testing (MBT) is a widely used methodology for generating tests aiming to ensure that the system behaviour conforms to its specification. Recently, it has been successfully applied for testing ... [more ▼]

Model-Based Testing (MBT) is a widely used methodology for generating tests aiming to ensure that the system behaviour conforms to its specification. Recently, it has been successfully applied for testing certain security properties. However, for the success of this approach, it is an important prerequisite to consider the correctness of test models with respect to the given security property. In this paper we present an approach for smart-card specific security properties that permits to validate the system with MBT from test schemas. We combine this MBT approach with UMLsec security verification technique, by using UMLsec stereotypes to verify the model w.r.t. given security properties and gain more confidence in the model. We then define an automatic procedure to generate security test from the UMLsec model via so-called "test schemas". We validate this approach on a fragment of the Global Platform specification and report on available tool support. [less ▲]

Detailed reference viewed: 73 (2 UL)
Full Text
Peer Reviewed
See detailOO-SPL modelling of the focused case study
Capozucca, Alfredo UL; Cheng, Betty; Guelfi, Nicolas UL et al

in Comparing Modeling Approaches (CMA) International Workshop affiliated with ACM/IEEE 14th International Conference on Model Driven Engineering Languages and Systems (CMA@MODELS2011) (2011)

Detailed reference viewed: 80 (3 UL)
See detailPassing through a moving traffic gap: Drivers’ perceptual control of approach to an intersection
Louveton, Nicolas UL; Montagne, Gilles; Berthelon, Catherine et al

in Perception -- ECVP Abstract Supplement (2011)

Detailed reference viewed: 53 (1 UL)
Full Text
Peer Reviewed
See detailDesign principles of nuclear receptor signalling: How complex networking improves signal transduction
Kolodkin, Alexey UL; Bruggeman, Frank J.; Plant, Nick et al

in Toxicology (2011), 290(2-3), 131-132

Detailed reference viewed: 94 (7 UL)
Full Text
Peer Reviewed
See detailSelective Test Generation Method for Evolving Critical Systems
Fourneret, Elizabeta UL; Bouquet, Fabrice; Dadeau, Frédéric et al

in Proceedings of 4th IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW 2011) (2011)

We present in this paper the implementation of a model-based testing technique for evolving systems. These latters are described in UML using class/object diagrams and state charts, augmented with OCL ... [more ▼]

We present in this paper the implementation of a model-based testing technique for evolving systems. These latters are described in UML using class/object diagrams and state charts, augmented with OCL constraints. Based on two versions of a given model, an automated process deduces the impact of model evolutions on the existing tests. Our methodology then classifies tests into different test suites to test evolution, regression, stagnation and deletion on the concrete system. We introduce the notion of tests and test suites life cycles that help defining the purpose of each test at a given step of the system evolution, and thus, their classification in different test suites. The approach is illustrated on a realistic case study, and the improvements w.r.t. other regression testing techniques are discussed. [less ▲]

Detailed reference viewed: 61 (1 UL)
Full Text
Peer Reviewed
See detailEnhanced memory consolidation by post-learning autonomic activation in response to stress
Larra y Ramirez, M.; Schulz, André UL; Naumann, E. et al

in Psychophysiology (2011), 48(Supplement 1), 88-88

Detailed reference viewed: 33 (1 UL)
Full Text
Peer Reviewed
See detailInfluence of environmental changes on modal characteristics
Waldmann, Danièle UL; Bungard, Volker UL; Mahowald, Jean UL et al

in Federation for Structural Concrete (fib) (2011)

Detailed reference viewed: 77 (23 UL)