References of "Paper published in a journal"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailContact-state modeling of robotic assembly tasks using Gaussian mixture models
Ibrahim, Jasim; Plapper, Peter UL

in Procedia CIRP (2014), 23

This article addresses the Contact-State (CS) modeling problem for the force-controlled robotic peg-in-hole assembly tasks. The wrench (Cartesian forces and torques) and pose (Cartesian position and ... [more ▼]

This article addresses the Contact-State (CS) modeling problem for the force-controlled robotic peg-in-hole assembly tasks. The wrench (Cartesian forces and torques) and pose (Cartesian position and orientation) signals, of the manipulated object, are captured for different phases of the robotic assembly task. Those signals are utilized in building a CS model for each phase. Gaussian Mixture Models (GMM) is employed in building the likelihood of each signal and Expectation Maximization (EM) is used in finding the GMM parameters. Experiments are performed on a KUKA Lightweight Robot (LWR) doing camshaft caps assembly of an automotive powertrain. Comparisons are also performed with the available assembly modeling schemes, and the superiority of the EM-GMM scheme is shown with a reduced computational time. [less ▲]

Detailed reference viewed: 152 (1 UL)
See detailConference report
Oesch, Lucas UL

in Crisyr (Carnet de recherche) (2014)

Detailed reference viewed: 72 (12 UL)
Full Text
See detailOnline Determination of Grid Impedance Spectrum through Pseudo-Random Excitation of a Pulse Width Modulator
Neshvad, Surena UL; Chatzinotas, Symeon UL; Sachau, Jürgen UL

in Renewable Energy and Power Quality Journal (2014)

The last decade has seen a dramatic rise in renewable energy converters connected to the grid, consisting mostly of intermittent distributed generators on the medium or low voltage grid. Due to this ... [more ▼]

The last decade has seen a dramatic rise in renewable energy converters connected to the grid, consisting mostly of intermittent distributed generators on the medium or low voltage grid. Due to this evolution in energy transmission, improved monitoring and control of the distribution grid is becoming mandatory in order to efficiently integrate the new power sources and guarantee power quality, efficiency and reliability. Our paper describes a reliable and precise power grid impedance estimation method using an innovative scheme to control the Pulse Width Modulator’s pulse pattern on the inverters, in order to inject broad spectrum identification patterns. The generated harmonics and inter-harmonics will allow the online computation of the complete spectrum of the grid impedance at the Point of Common Coupling during normal operation. Simulations in typical grid situations verify that the proposed algorithm is robust to a realistic environment and can be used for automated feedback control. [less ▲]

Detailed reference viewed: 327 (13 UL)
Full Text
Peer Reviewed
See detailFamily caregivers’ health capability: Contribution of, and relations between its dimensions
Bucki, Barbara UL; Baumann, Michèle UL

in European Health Psychologist (2014)

Background. Being family caregiver poses certain risks for physical, mental and social health. The health capability paradigm (Ruger, 2010) explores the capacity to achieve one’s optimal health. Family ... [more ▼]

Background. Being family caregiver poses certain risks for physical, mental and social health. The health capability paradigm (Ruger, 2010) explores the capacity to achieve one’s optimal health. Family caregivers’ health capability partly consists of 8 dimensions: physical and psychological functioning, lifestyle value, self-efficacy, family support, social capital, socio-economic conditions and access to health services. Which relations exist between these dimensions, and which ones contribute the most to health capability? Methods. Home-based structured interviews were led among 62 family caregivers living in Luxembourg 2 years after their relatives’ stroke. Twenty items measured the 8 dimensions of health capability. Using a Bayesian approach, a structural equation modelling was applied. Findings. Socio-economic conditions were positively correlated with all the other dimensions. Family caregivers’ fatigue and feeling abandoned by their families impeded their health capability the most. Discussion. Enhancing family caregivers’ well-being involves finding interventions relieving them physically and fostering family networking around the ill, giving priority to the socially disadvantaged. [less ▲]

Detailed reference viewed: 101 (7 UL)
Full Text
Peer Reviewed
See detailPOD-based model order reduction for the simulation of strong nonlinear evolutions in structures: Application to damage propagation
Kerfriden, P.; Gosselet, P.; Adhikari, S. et al

in IOP Conference Series: Materials Science and Engineering (2014), 10(1),

In this paper, we develop a bridge between POD-based model order reduction techniques and the classical Newton-Krylov solvers to derive an efficient solution procedure for highly nonlinear problems ... [more ▼]

In this paper, we develop a bridge between POD-based model order reduction techniques and the classical Newton-Krylov solvers to derive an efficient solution procedure for highly nonlinear problems undergoing strong topological changes. [less ▲]

Detailed reference viewed: 114 (0 UL)
Full Text
Peer Reviewed
See detailCountable intervals of partial clones
Haddad, Lucien; Schölzel, Karsten UL

in Multiple-Valued Logic (ISMVL), 2014 IEEE 44rd International Symposium on (2014)

Let $k \ge 2$ and $A$ be a $k$-element set. We construct countably infinite unrefinable chains of strong partial clones on $A$. This provides the first known examples of countably infinite intervals of ... [more ▼]

Let $k \ge 2$ and $A$ be a $k$-element set. We construct countably infinite unrefinable chains of strong partial clones on $A$. This provides the first known examples of countably infinite intervals of strong partial clones on a finite set with at least two elements. [less ▲]

Detailed reference viewed: 100 (1 UL)
Full Text
Peer Reviewed
See detailPartial R-clones
Schölzel, Karsten UL; Romov, Boris

in Multiple-Valued Logic (ISMVL), 2014 IEEE 44rd International Symposium on (2014)

In [Romov, ISMVL 2013] the first author introduced a type of partial clones as the intersection of some special infinite descending chains similar to I. Rosenberg (1972) in the case of total clones. We ... [more ▼]

In [Romov, ISMVL 2013] the first author introduced a type of partial clones as the intersection of some special infinite descending chains similar to I. Rosenberg (1972) in the case of total clones. We provide a characterization of these clones in terms of their invariants, and propose a generalization of such clones, which we will call partial R-clones. We show that there are only finitely many partial R-clones. Furthermore, we investigate some properties related to their position in the lattice of partial clones. [less ▲]

Detailed reference viewed: 42 (1 UL)
Full Text
Peer Reviewed
See detailEditorial: The Best Practice Principles for Proxy Advisor
Zetzsche, Dirk Andreas UL

in Ethical Boardroom (2014)

Detailed reference viewed: 88 (1 UL)
Full Text
Peer Reviewed
See detailSecurity@Runtime: A flexible MDE approach to enforce fine-grained security policies
Elrakaiby, Yehia UL; Amrani, Moussa UL; Le Traon, Yves UL

in Lecture Notes in Computer Science (2014), 8364 LNCS

In this paper, we present a policy-based approach for automating the integration of security mechanisms into Java-based business applications. In particular, we introduce an expressive Domain Specific ... [more ▼]

In this paper, we present a policy-based approach for automating the integration of security mechanisms into Java-based business applications. In particular, we introduce an expressive Domain Specific modeling Language (Dsl), called Security@Runtime, for the specification of security configurations of targeted systems. The Security@Runtime Dsl supports the expression of authorization, obligation and reaction policies, covering many of the security requirements of modern applications. Security requirements specified in security configurations are enforced using an application-independent Policy Enforcement Point Pep)-Policy Decision Point (Pdp) architecture, which enables the runtime update of security requirements. Our work is evaluated using two systems and its advantages and limitations are discussed. © 2014 Springer International Publishing Switzerland. [less ▲]

Detailed reference viewed: 196 (5 UL)
Full Text
Peer Reviewed
See detailRelation graphs and partial clones on a 2-element set.
Schölzel, Karsten UL; Couceiro, Miguel; Haddad, Lucien et al

in Multiple-Valued Logic (ISMVL), 2014 IEEE 44rd International Symposium on (2014)

In a recent paper, the authors show that the sublattice of partial clones that preserve the relation $\{(0,0),(0,1),(1,0)\}$ is of continuum cardinality on $\2$. In this paper we give an alternative proof ... [more ▼]

In a recent paper, the authors show that the sublattice of partial clones that preserve the relation $\{(0,0),(0,1),(1,0)\}$ is of continuum cardinality on $\2$. In this paper we give an alternative proof to this result by making use of a representation of relations derived from $\{(0,0),(0,1),(1,0)\}$ in terms of certain types of graphs. As a by-product, this tool brings some light into the understanding of the structure of this uncountable sublattice of strong partial clones. [less ▲]

Detailed reference viewed: 95 (3 UL)
Full Text
Peer Reviewed
See detailA Conceptual Framework to Study Socio-Technical Security
Ferreira, Ana UL; Huynen, Jean-Louis UL; Koenig, Vincent UL et al

in Lecture Notes in Computer Science (2014)

We propose an operational framework for a social, technical and contextual analysis of security. The framework provides guidelines about how to model a system as a layered set of interacting elements, and ... [more ▼]

We propose an operational framework for a social, technical and contextual analysis of security. The framework provides guidelines about how to model a system as a layered set of interacting elements, and proposes two methodologies to analyse technical and social vulnerabilities. We show how to apply the framework in a use case scenario. [less ▲]

Detailed reference viewed: 334 (48 UL)
Full Text
See detailAn Efficient 3D FEM - DEM Coupling for Granular Matter Applications
Michael, Mark UL; Peters, Bernhard UL; Vogel, Frank

in Coupled MBS-FE Applications: A New Trend in Simulation (2013, November)

The presented approach is relevant to almost all engineering applications that deal with granular matter such as off-road tire performance, transport on conveyor belts or displacement of granular material ... [more ▼]

The presented approach is relevant to almost all engineering applications that deal with granular matter such as off-road tire performance, transport on conveyor belts or displacement of granular material as in mixers or excavation of soil. For all these applications an engineering device is in contact with granular matter which causes responses due to the interaction forces. The proposed Extended Discrete Element Method (XDEM) as a combination of the Discrete Element Method (DEM) and the Finite Element Method (FEM) allows to sufficiently resolve the different domains involved in these engineering applications. Herein the motion of each grain is accounted for individually. Simultaneously, the finite element method accurately predicts the deformations experienced by the engineering device. Thus, the simulation domain occupied by the device is efficiently described as a continuous entity. The coupling of both methods is based on the interface shared by the two spatially separated domains. The interface coupling enables to apply a contact model suited to the particular contact behaviour between the grains and the surface material if the engineering device. In contact, forces develop at the interface and generate an responce in each domain. The coupling method enables to capture both responses simultaneously. Each grain in contact with the device surface generates a contact force to which it reacts repulsively. The contact forces sum up over the surface and cause deformations of device body. It further employs a fast contact detection algorithm to save valuable computation time. This concept is supported by the software tools of the Discrete Particle Method (DPM) and Diffpack. To exemplify the presented method, the tractive performance of different tire treads has been studied on a soil layer of the stony terrian. The simulation results are used to analyse the gross tractive effort, running resistance and drawbar pull of the different tread patterns. [less ▲]

Detailed reference viewed: 514 (14 UL)
Full Text
Peer Reviewed
See detailChildhood availability of books predicts later-life cognitive function
Leist, Anja UL; Avendano, Mauricio

in Gerontologist (2013, November), 53(S1), 605-605

Detailed reference viewed: 91 (1 UL)
Full Text
Peer Reviewed
See detailTime away from work predicts cognitive function - does education matter?
Leist, Anja UL; van Lenthe, Frank J.; Glymour, M. Maria et al

in Gerontologist (2013, November), 53(S1), 473-473

Detailed reference viewed: 79 (1 UL)
Full Text
Peer Reviewed
See detailOptimizing verification of structurally evolving algebraic petri nets
Khan, Yasir Imtiaz UL

in Lecture Notes in Computer Science (2013, September 08), 8166

System models are subject to evolve during the development life cycle, along which an initial version goes through a series of evolutions, generally aimed at progressively reaching all the requested ... [more ▼]

System models are subject to evolve during the development life cycle, along which an initial version goes through a series of evolutions, generally aimed at progressively reaching all the requested qualities (completeness, correctness etc.). Among the existing development methodologies the iterative and incremental one has been proved to be efficient for system development but lacks of support for an adequate verification process. When considering Algebraic Petri nets (APNs) for modeling and model checking for verification, all the proofs must be redone after each iteration which is impractical both in terms of time and space. In this work, we introduce an Algebraic Petri net slicing technique that optimizes the model checking of static or structurally evolving APN models. Furthermore, our approach is proposing a classification of evolutions dedicated to the improvement of model checking. [less ▲]

Detailed reference viewed: 156 (9 UL)
Full Text
Peer Reviewed
See detailCorrelation Matching Approach for Through-Wall Corner Detection
Lagunas, Eva UL; Amin, Moeness; Ahmad, Fauzia et al

in Proceedings of Int. Workshop on Compressive Sensing Applied to Radar (CoSeRa) (2013, September)

Detailed reference viewed: 55 (3 UL)
Full Text
Peer Reviewed
See detailHeart rate variability as an indicator of self-regulatory processes in restrained eating behaviour
Lutz, Annika UL; Van Dyck, Zoé UL; Vögele, Claus UL

in Psychophysiology (2013, September), 50(S1), 81

Detailed reference viewed: 159 (17 UL)
Full Text
Peer Reviewed
See detailAnalysis using higher-order XFEM: Implicit representation of geometrical features from a given parametric representation
Moumnassi, Mohammed; Bordas, Stéphane UL; Figueredo, Rémi et al

in Mécanique & Industries (2013, August 30)

We present a promising approach to reduce the difficulties associated with meshing complex curved domain boundaries for higher-order finite elements. In this work, higher-order XFEM analyses for strong ... [more ▼]

We present a promising approach to reduce the difficulties associated with meshing complex curved domain boundaries for higher-order finite elements. In this work, higher-order XFEM analyses for strong discontinuity in the case of linear elasticity problems are presented. Curved implicit boundaries are approximated inside an unstructured coarse mesh by using parametric information extracted from the parametric representation (the most common in Computer Aided Design CAD). This approximation provides local graded sub-mesh (GSM) inside boundary elements (i.e. an element split by the curved boundary) which will be used for integration purpose. Sample geometries and numerical experiments illustrate the accuracy and robustness of the proposed approach. [less ▲]

Detailed reference viewed: 383 (1 UL)
Full Text
Peer Reviewed
See detailRestrained eating predicts increased autonomic reactivity during food exposure in young women
Van Dyck, Zoé UL; Lutz, Annika UL; Vögele, Claus UL

in Psychology and Health (2013, August 02), 28

Detailed reference viewed: 136 (7 UL)
Full Text
Peer Reviewed
See detailDepressive symptoms of childless older men and women in Europe
Leist, Anja UL; Nosthoff-Horstmann, Laura

in Psychology and Health (2013, August), 28(SI 1), 119-119

Detailed reference viewed: 154 (13 UL)
Full Text
Peer Reviewed
See detailAttitudes towards ageing in elder care
Albert, Isabelle UL; Ferring, Dieter UL; Friser, Jean-Paul

in Psychology and Health (2013, July), 28(SI Supplement: 1), 58-58

Background: The present study examined if attitudes towards ageing depend on own experiences with old and frail persons. Methods: The sample comprised N = 127 participants in the Grand-Duchy of Luxembourg ... [more ▼]

Background: The present study examined if attitudes towards ageing depend on own experiences with old and frail persons. Methods: The sample comprised N = 127 participants in the Grand-Duchy of Luxembourg (85 female, 42 male; mean age: M = 46.49, SD = 18.61), subdivided in three groups: professional carers, informal carers, and individuals who had never provided old-age care. Participants were asked to indicate their views about age in general and their expectations about their own ageing by use of a semi-structured questionnaire. Findings: Professional and informal carers indicated a higher age as starting point of old age compared to non-carers. Further, professional carers mentioned more negative and less positive features of old age and had more concrete expectations about their own ageing compared to other participants. Discussion: Results are discussed with regard to the relevance of attitudes towards ageing for individuals’ well-being and for their caregiving for elderly persons. [less ▲]

Detailed reference viewed: 96 (6 UL)
Full Text
Peer Reviewed
See detailFeeder Protection Challenges with High Penetration of Inverter Based Distributed Generation
Margossian, Harag UL; Capitanescu, Florin UL; Sachau, Jürgen UL

in Proceedings of the EUROCON 2013 conference (2013, July)

The increasing proportion of inverter based distributed generation (DG) in the power system may limit the short circuit power available at distribution substations and consequently cause significant ... [more ▼]

The increasing proportion of inverter based distributed generation (DG) in the power system may limit the short circuit power available at distribution substations and consequently cause significant troubles for the protection of distribution feeders where DG are connected. In this paper, the current practices of distribution network operators in dealing with higher penetration levels of DG are investigated and evaluated using a realistic 31-node distribution network model with limited short circuit supply. The paper discusses the challenges for the protection system related to the integration of increasingly significant amounts of DG and highlights the need for more sophisticated protection systems. [less ▲]

Detailed reference viewed: 240 (35 UL)
Full Text
Peer Reviewed
See detailIntergenerational relations in the light of migration and ageing
Albert, Isabelle UL; Ferring, Dieter UL; Valsiner, Jaan

in Psychology and Health (2013, July), 28(SI Supplement: 1), 164

Ageing and migration constitute two current key issues in Europe. Regarding potential physical and functional impairments in old age, individuals have to rely on support and care from their families and ... [more ▼]

Ageing and migration constitute two current key issues in Europe. Regarding potential physical and functional impairments in old age, individuals have to rely on support and care from their families and/or on assistance from the public sector. As first generation immigrants now approach retirement age in many European countries, the question how their families will deal with issues of old-age care gains increasingly importance. In the present study, a cross-cultural comparison of altogether N = 120 Portuguese and Luxembourgish triads of older parents and their adult children, both living in the Grand-Duchy of Luxembourg, is envisaged. Firstly, we will examine similarities and differences in identity constructions of older parents and their adult children. Secondly, we will investigate how intergenerational relations are regulated in migrant compared to nonmigrant families. Finally, we will explore how these aspects influence subjective well-being (SWB) of older individuals. Qualitative and quantitative methods will be applied. [less ▲]

Detailed reference viewed: 138 (7 UL)
Full Text
Peer Reviewed
See detailDistributed Generator Status Estimation for Adaptive Feeder Protection in Active Distribution Grids
Margossian, Harag UL; Capitanescu, Florin UL; Sachau, Jürgen UL

in Proceedings of the CIRED2013 conference (2013, June)

This paper proposes a framework for adaptive feeder protection in distribution grids with a high amount of distributed generators (DGs) installed. The scheme adapts the feeder protection relay settings ... [more ▼]

This paper proposes a framework for adaptive feeder protection in distribution grids with a high amount of distributed generators (DGs) installed. The scheme adapts the feeder protection relay settings according to the changes in the connection status of those DGs that have a significant impact on the fault current. The core of the method consists in the identification of the connection status of the DGs using an iterative modified state estimation (SE) program. The approach is illustrated using a realistic 31-node distribution network model. [less ▲]

Detailed reference viewed: 184 (21 UL)
Full Text
Peer Reviewed
See detailIntersections with Slupecki Partial Clones on a Finite Set
Schölzel, Karsten UL; Haddad, Lucien

in Multiple-Valued Logic (ISMVL), 2013 IEEE 43rd International Symposium on (2013, May)

We study intersections of partial clones on the k-element set with k ≥ 2. More precisely we consider intersections of Slupecki partial clones with non-Slupecki maximal partial clones on k.

Detailed reference viewed: 105 (3 UL)
Full Text
See detailAssessing the lower temperature limit for comfort in footwear
Havenith, George; Ouzzahra, Yacine UL; Gerrett, Nicola et al

in Proceedings of the 15th International Conference on Environmental Ergonomics (2013, February 11)

When selecting clothing and equipment for use in the cold, consumers often receive only limited guidance from product information provided by manufacturers. In the area of sleeping bags the introduction ... [more ▼]

When selecting clothing and equipment for use in the cold, consumers often receive only limited guidance from product information provided by manufacturers. In the area of sleeping bags the introduction of standards for their climatic range assessment, though often heavily debated by manufacturers, has undoubtedly provided consumers with guidance. Currently no such standards exist for outdoor footwear. Many manufacturers of footwear do claim certain lower temperature limits, going to -40ºC in some cases. No information is however provided on how this is tested and what criteria are applied. Kuklane et al. (1999) did several studies on the relation between footwear insulation and comfort range, but so far this has to our knowledge not led to the development of a standard. In the present study, following up on work by Kuklane, an attempt was made to collect physiological data that may be used in setting criteria for the lower temperature range of footwear. [less ▲]

Detailed reference viewed: 64 (4 UL)
Full Text
Peer Reviewed
See detailAccess Control Enforcement Testing
El Kateb, Donia; ElRakaiby, Yehia; Mouelhi, Tejeddine et al

in Abstract book of 2013 8TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST) (2013)

A policy-based access control architecture comprises Policy Enforcement Points (PEPs), which are modules that intercept subjects access requests and enforce the access decision reached by a Policy ... [more ▼]

A policy-based access control architecture comprises Policy Enforcement Points (PEPs), which are modules that intercept subjects access requests and enforce the access decision reached by a Policy Decision Point (PDP), the module implementing the access decision logic. In applications, PEPs are generally implemented manually, which can introduce errors in policy enforcement and lead to security vulnerabilities. In this paper, we propose an approach to systematically test and validate the correct enforcement of access control policies in a given target application. More specifically, we rely on a two folded approach where a static analysis of the target application is first made to identify the sensitive accesses that could be regulated by the policy. The dynamic analysis of the application is then conducted using mutation to verify for every sensitive access whether the policy is correctly enforced. The dynamic analysis of the application also gives the exact location of the PEP to enable fixing enforcement errors detected by the analysis. The approach has been validated using a case study implementing an access control policy. [less ▲]

Detailed reference viewed: 113 (1 UL)
Full Text
Peer Reviewed
See detailThe cortisol awakening response is unrelated to psychophysiological cold pressor stress reactivity
Kozik, B.; Larra, M.; Schilling, T. M. et al

in Psychophysiology (2013), 50(Supplement 1), 122

Detailed reference viewed: 93 (1 UL)
Full Text
Peer Reviewed
See detailLogic of Non-Monotonic Interactive Proofs
Kramer, Simon UL

in Lecture Notes in Computer Science (2013), 7750

We propose a monotonic logic of internalised non-monotonic or instant interactive proofs (LiiP) and reconstruct an existing monotonic logic of internalised monotonic or persistent interactive proofs (LiP ... [more ▼]

We propose a monotonic logic of internalised non-monotonic or instant interactive proofs (LiiP) and reconstruct an existing monotonic logic of internalised monotonic or persistent interactive proofs (LiP) as a minimal conservative extension of LiiP. Instant interactive proofs effect a fragile epistemic impact in their intended communities of peer reviewers that consists in the impermanent induction of the knowledge of their proof goal by means of the knowledge of the proof with the interpreting reviewer: If my peer reviewer knew my proof then she would at least then know that its proof goal is true. Their impact is fragile and their induction of knowledge impermanent in the sense of being the case possibly only at the instant of learning the proof. This accounts for the important possibility of internalising proofs of statements whose truth value can vary, which, as opposed to invariant statements, cannot have persistent proofs. So instant interactive proofs effect a temporary transfer of certain propositional knowledge (knowable ephemeral facts) via the transmission of certain individual knowledge (knowable non-monotonic proofs) in distributed systems of multiple interacting agents. [less ▲]

Detailed reference viewed: 94 (4 UL)
Full Text
Peer Reviewed
See detailRelaxing Behavioural Inheritance
Amalio, Nuno UL

in Electronic Proceedings in Theoretical Computer Science (2013), 115

Object-oriented (OO) inheritance allows the definition of families of classes in a hierarchical way. In behavioural inheritance, a strong version, it should be possible to substitute an object of a ... [more ▼]

Object-oriented (OO) inheritance allows the definition of families of classes in a hierarchical way. In behavioural inheritance, a strong version, it should be possible to substitute an object of a subclass for an object of its superclass without any observable effect on the system. Behavioural inheritance is related to formal refinement, but, as observed in the literature, the refinement constraints are too restrictive, ruling out many useful OO subclassings. This paper studies behavioural inheritance in the context of ZOO, an object-oriented style for Z. To overcome refinement's restrictions, this paper proposes relaxations to the behavioural inheritance refinement rules. The work is presented for Z, but the results are applicable to any OO language that supports design-by-contract. [less ▲]

Detailed reference viewed: 103 (3 UL)
Full Text
Peer Reviewed
See detailEquilibrium in capacitated network models with queueing delays, queue-storage, blocking back and control
Smith, Mike J.; Huang, Wei; Viti, Francesco UL

in Procedia Social and Behavioral Sciences (2013), 80

This paper considers a steady-state, link-based, fixed (or inelastic) demand equilibrium model with explicit link-exit capacities, explicit bottleneck or queuing delays and explicit bounds on queue ... [more ▼]

This paper considers a steady-state, link-based, fixed (or inelastic) demand equilibrium model with explicit link-exit capacities, explicit bottleneck or queuing delays and explicit bounds on queue storage capacities. The (spatial queueing) model at the heart of this equilibrium model takes account of the space taken up by queues both when there is no blocking back and also when there is blocking back. The paper shows in theorem 1 that a feasible traffic assignment model has an equilibrium solution provided prices are used to impose capacity restrictions and utilises this result to show that there is an equilibrium with the spatial queueing model, provided queue-storage capacities are sufficiently large. Other results are obtained by changing the variables and sets in theorem 1 suitably. These results include: (1) existence of equilibrium results (in both a steady state and a dynamic context) which allow signal green-times to respond to prices and (2) an existence of equilibrium result which allow signal green-times to respond to spatial queues; provided this response follows the P0 control policy in Smith (1979, 1987). These results show that under certain conditions the P0 control policy maximises network capacity. The spatial queueing model is illustrated on a simple network. Finally the paper includes elastic demand; this is necessary for long-run evaluations. Each of the steady state models here may be thought of as a stationary solution to the dynamic assignment problem either with or without blocking back. [less ▲]

Detailed reference viewed: 205 (4 UL)
Full Text
Peer Reviewed
See detailOptical Communications in a Legal Vacuum?
Hofmann, Mahulena UL

in Congress of the International Astronautical Federation (2013), 2012

The use of optical communication has many technical advantages. The thesis that it stands outside of any legal framework can, however, be hardly defended. Despite of the fact that the intensity of legal ... [more ▼]

The use of optical communication has many technical advantages. The thesis that it stands outside of any legal framework can, however, be hardly defended. Despite of the fact that the intensity of legal rules regulating the use of optical communication is lower that eg the use of radio frequences, both ITU basic texts and the UN space treaties contain binding rules which have to be respected. [less ▲]

Detailed reference viewed: 41 (1 UL)
Full Text
Peer Reviewed
See detailAn Online Platform as a Tool for Surveys by Patient Associations
Lygidakis, Charilaos UL; Vögele, Claus UL; Cambiaso, Silvio et al

in Global Telemedicine and eHealth Updates: Knowledge Resources (2013), 6

Patients are increasingly interested in sharing their experiences and learning about their conditions, their prevention and treatments, and are more frequently turning into advocates. The connectivity and ... [more ▼]

Patients are increasingly interested in sharing their experiences and learning about their conditions, their prevention and treatments, and are more frequently turning into advocates. The connectivity and the wide availability of data have been shown to support this development enabling patients to play an active role in healthcare. The “Lumos!” platform is a web-based solution that has been designed to facilitate teams of researchers conducting multicentre studies, especially in countries and contexts with low research capacity. Nevertheless, it can be modified and tailored as a tool for research studies carried out by patient organisations. The aim of this study is to assess the feasibility of an online platform as a tool for anonymous surveys conducted by a patient organisation. Methods: A questionnaire is currently being distributed in the Region of Emilia Romagna (Italy) by the Regional Federation of Diabetics with the aim to study the needs of patients that use self-check-up devices. This observational study has been designed online with the use of the “Lumos!” platform, which enables the creation of the questionnaire with adjustable fields and variables, using the expertise of the participants and the creation of reports. Furthermore, a URL and a QR code linking to the questionnaire are being published on Social Networks and websites inviting people to participate in the study. Several data will be retrieved from the logs of the platform, such as the time required to complete a questionnaire by a patient, the number and types of errors, and the percentage of completed items. These variables will be analysed taking into account the demographic characteristics of the patients. Conclusions: By studying the indicators of the implementation and the characteristics of the participants, it will be possible to optimise participation rates and achieve higher engagement from the participants in the future. We expect that with the help of the online platform, patient associations will be supported in their quest to conduct surveys and, as a secondary outcome; they will empower their members to play a more active role in healthcare. [less ▲]

Detailed reference viewed: 86 (5 UL)
Full Text
See detailA Study on Highway Traffic Flow Optimization using Partial Velocity Synchronization
Forster, Markus UL; Frank, Raphaël UL; Engel, Thomas UL

in Proceedings of the 1st GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2013) Technical Report CCS-2013-01 (2013)

In this paper we present a study of highway traffic flow optimization using Partial Velocity Synchronization (PVS). PVS is a Cellular Automaton (CA) model that is extended by a communication layer ... [more ▼]

In this paper we present a study of highway traffic flow optimization using Partial Velocity Synchronization (PVS). PVS is a Cellular Automaton (CA) model that is extended by a communication layer providing the ability to exchange relevant information between vehicles. We show that it is possible to enhance traffic flow on highways significantly with a small number of velocity recommendations computed from the traffic conditions ahead. Furthermore we show that only a limited number of hops in an information chain is necessary to reschedule the vehicles on a given highway segment to avoid the formation of shockwaves. Our results show that traffic flow will be increased while travel time and emissions will be reduced dramatically. [less ▲]

Detailed reference viewed: 482 (8 UL)
Full Text
Peer Reviewed
See detailLa délégation de fonctions dans la directive AIFM
Riassetto, Isabelle UL

in Revue Trimestrielle de Droit Financier (2013)

Detailed reference viewed: 198 (11 UL)
Full Text
Peer Reviewed
See detailThe Snippet Platform Architecture: Dynamic and Interactive Compound Documents
Kirsch, Laurent UL; Botev, Jean UL; Rothkugel, Steffen UL

in International Journal of Future Computer and Communication (2013), 3(3), 7

Detailed reference viewed: 156 (23 UL)
Full Text
Peer Reviewed
See detailHinweise auf veränderte interozeptiven Wahrnehmungsfähigkeit anhand der in Herzschlagwahrnehmung Herzschlagdetektionstests bei Patienten mit einem Depersonalisations-Derealisationssyndrom
Reuchlein, Bettina; Michal, Matthias; Köster, Susann et al

in Trierer Psychologische Berichte (2013), 38(1), 54

Patienten mit Depersonalisations/Derealisationssyndrom (DP) berichten häufig von einer Distanzierung der inneren Selbstwahrnehmung und einer dadurch entstandenen Beeinträchtigung der Emotionswahrnehmung ... [more ▼]

Patienten mit Depersonalisations/Derealisationssyndrom (DP) berichten häufig von einer Distanzierung der inneren Selbstwahrnehmung und einer dadurch entstandenen Beeinträchtigung der Emotionswahrnehmung. Es wird davon ausgegangen, dass die Wahrnehmung von Köpersignalen für das subjektive Erleben von Emotionen eine entscheidende Rolle spielt. Ziel der vorliegenden Studie war es, zu untersuchen, ob sich diese DP-typischen Symptome in einer geringeren Fähigkeit zur Wahrnehmung interozeptiver Signale widerspiegeln. 14 Patienten mit DP (5 Frauen; Alter: 26,1 [6,0] Jahre) und 22 gesunde Kontrollprobanden (13 Frauen; Alter: 26,5 [1,8] Jahre) absolvierten zwei Herzschlagdetektionsaufgaben, deren Parameter als Indikatoren für kardiale Interozeptionsfähigkeit gelten. Probanden wurden zum einen angewiesen, in einem sich ändernden Zeitintervall ihre Herzschläge zu zählen (Schandry), zum anderen mussten sie entscheiden, ob Tonsequenzen synchron oder verzögert mit dem Herzschlag präsentiert wurden (Whitehead). Da die Parameter in beiden Verfahren dazu tendieren, sich bimodal zu verteilen, wurden beide Gruppen per Mediansplit in „gute“ (HBD+) und „schlechte Herzschlagwahrnehmer“ (HBD-) aufgeteilt. Zusätzlich wurden affektive Beeinträchtigung, Depersonalisationserlebnisse, Körperwahrnehmung, Alexithymie und Somatisierung erhoben (PHQ-15, KEKS, SCL-9, TAS-20, LEAS, BDI-II, STAI, CTQ, FDS, CDS). Im Gegensatz zur ursprünglichen Annahme zeigten DP-Patienten über beide Subgruppen hinweg höhere Leistung im Schandry-Test (p = ,02). Innerhalb der Gruppe HBD+ zeigten die DP-Patienten bessere Leistung im Whitehead-Test als die Kontrollprobanden, wohingegen in der Gruppe HBD- die DP-Patienten schlechtere Leistung zeigten (p = ,02). Diese Ergebnisse implizieren, dass DP-Patienten besser als Gesunde ihre Aufmerksamkeit lediglich auf Körperprozesse lenken können (Schandry). Wenn sie jedoch interozeptive und exterozeptive Signale integrieren müssen (Whitehead), zeigen sich zwei Subgruppen extrem guter und schlechter Herzwahrnehmer. Aus diesem Verteilungsmuster kann man schlussfolgern, dass die Verschaltung interozeptiver Signale beim DP-Syndrom dysfunktional sein könnte. [less ▲]

Detailed reference viewed: 388 (0 UL)
Full Text
Peer Reviewed
See detailStudies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates
Ferreira, Ana UL; Giustolisi, Rosario UL; Huynen, Jean-Louis UL et al

in IEEE TrustCom (2013)

Authenticating web identities with TLS certificates is a typical problem whose security depends on both technical and human aspects, and that needs, to be fully grasped, a socio-technical analysis. We ... [more ▼]

Authenticating web identities with TLS certificates is a typical problem whose security depends on both technical and human aspects, and that needs, to be fully grasped, a socio-technical analysis. We performed such an analysis, and in this paper we comment on the tools and methodology we found appropriate. We first analysed the interaction ceremonies between users and the most used browsers in the market. Then we looked at user's understanding of those interactions. Our tools and our methodology depend on whether the user model has a non-deterministic or a realistic behaviour. We successfully applied formal methods in the first case. In the second, we had to define a security framework consistent with research methods of experimental cognitive science. [less ▲]

Detailed reference viewed: 217 (34 UL)
Full Text
Peer Reviewed
See detailSimulation Study of Bacteriological Pollution Load of Rivers by CSOs
Worreschk, S.; Schmitt, T.G.; Hobus, I. et al

in Proceedings 8th International Conference NOVATECH 2013 (2013)

Detailed reference viewed: 70 (6 UL)
Full Text
Peer Reviewed
See detailMutation Testing Strategies using Mutant Classification
Papadakis, Mike UL; Le Traon, Yves UL

in Abstract book of 28th Symposium On Applied Computing (2013)

Detailed reference viewed: 212 (5 UL)
Full Text
Peer Reviewed
See detailASMATRA: Ranking ASs Providing Transit Service to Malware Hosters
Wagner, Cynthia UL; François, Jérôme UL; State, Radu UL et al

in IFIP/IEEE International Symposium on Integrated Network Management IM2013 (2013)

The Internet has grown into an enormous network offering a variety of services, which are spread over a multitude of domains. BGP-routing and Autonomous Systems (AS) are the key components for maintaining ... [more ▼]

The Internet has grown into an enormous network offering a variety of services, which are spread over a multitude of domains. BGP-routing and Autonomous Systems (AS) are the key components for maintaining high connectivity in the Internet. Unfortunately, Internet Service Providers (ISPs) operating ASs do not only host normal users and content, but also malicious content used by attackers for spreading malware, hosting phishing web-sites or performing any kind of fraudulent activity. Practical analysis shows that such malware-providing ASs prevent themselves from being de-peered by hiding behind other ASs, which do not host the malware themselves but simply provide transit service for malware. This paper presents a new method for detecting ASs that provide transit service for malware hosters, without being malicious themselves. A formal definition of the problem and the metrics are determined by using the AS graph. The PageRank algorithm is applied to improve the scalability and the completeness of the approach. The method is assessed on real and publicly available datasets, showing promising results. [less ▲]

Detailed reference viewed: 96 (1 UL)
Full Text
Peer Reviewed
See detailPrêt à Voter providing everlasting privacy
Ryan, Peter UL; Demirel, Denise; Henning, Maria et al

in Lecture Notes in Computer Science (2013)

This paper shows how Prêt à Voter can be adjusted in order to provide everlasting privacy. This is achieved by adapting the ballot generation and anonymisation process, such that only unconditional hiding ... [more ▼]

This paper shows how Prêt à Voter can be adjusted in order to provide everlasting privacy. This is achieved by adapting the ballot generation and anonymisation process, such that only unconditional hiding commitments and zero knowledge proofs are published for verification, thus ensuring privacy towards the public. This paper presents a security analysis carried out in a collaboration between computer scientists and legal researchers. On the technical side it is shown that the modified Prêt à Voter provides verifiability, robustness, and everlasting privacy towards the public. Everlasting privacy towards the authorities can be achieved by implementing several organisational measures. A legal evaluation of these measures demonstrates that the level of privacy achieved would be acceptable under German law. [less ▲]

Detailed reference viewed: 212 (4 UL)
Full Text
Peer Reviewed
See detailKurzzeitige Nahrungsdeprivation erhöht Herzschlag-evozierte Potenziale (HEPs) als Indikatoren für kortikale Verarbeitung kardial-interozeptiver Prozesse
Schulz, André UL; Ferreira de Sá, Diana S.; Strelzyk, Florian et al

in Trierer Psychologische Berichte (2013), 38(1), 52-53

Interozeption – die Wahrnehmung von Körpervorgängen – spielt bei der Regulation des Essverhaltens möglicherweise eine entscheidende Rolle. Nahrungsdeprivation hat eine Reihe von metabolischen und ... [more ▼]

Interozeption – die Wahrnehmung von Körpervorgängen – spielt bei der Regulation des Essverhaltens möglicherweise eine entscheidende Rolle. Nahrungsdeprivation hat eine Reihe von metabolischen und endokrinologischen Konsequenzen. Bei kurzzeitiger Nahrungsdeprivation zeigt sich eine Erhöhung des sympathischen Tonus, welche dafür verantwortlich sein könnte, dass sich die Interozeptionsgenauigkeit gegenüber kardialer Stimuli gleichzeitig erhöht. Die physiologischen Grundlagen von Interozeption sind die Übermittlung von viszeral-afferenten neuronalen Signalen, während die Wahrnehmung dieser Signale die Lenkung der Aufmerksamkeit auf diese Signale erfordert. Bisherige Ergebnisse gehen auf Leistungen in Herzschlagdetektionsaufgaben zurück. Obwohl diese Methoden mehrfach validiert wurden, sind sie wahrscheinlich ungeeignet dazu, die viszeral-afferente Signalübermittlung und Aufmerksamkeitslenkung auf diese Signale voneinander zu trennen. Daher hatte die vorliegende Studienreihe zum Ziel, den Einfluss von kurzzeitiger Nahrungsdeprivation auf Herzschlag-evozierte Potenziale (HEPs) in Ruhebedingung zu untersuchen. Die HEPs gelten als psychophysiologischer Indikator für die kortikale Verarbeitung kardial-interozeptiver Prozesse. Bislang ist unbekannt, ob metabolische und endokrinologische Prozesse HEPs modulieren können. In einer ersten Studie wurden 16 gesunden Männern (Alter: 23,8 [2,1] Jahre) intravenös sowohl das Stresshormon Cortisol, als auch eine Placebo-Substanz verabreicht. Es zeigte sich, dass Cortisol bei offenen Augen kurzfristig zu einer höheren HEP-Amplitude führte, als bei geschlossenen Augen (p = .03). Daraus kann man ableiten, dass endokrinologische Prozesse das Potenzial haben, die HEP-Amplitude zu modulieren. In der folgenden Studie wurden 16 gesunde Frauen (Alter: 22,6 [1,9] Jahre) sowohl nach standardisierter Nahrungsaufnahme, als auch nach 18-stündiger Nahrungsdeprivation getestet. Es zeigte sich eine Erhöhung der HEP-Amplitude nach Nahrungsdeprivation (p = .02). Gleichzeitig konnten keine Veränderungen der Herzrate, noch der Herzratenvariabilität beobachtet werden. Unsere Ergebnisse legen nahe, dass Nahrungsdeprivation die kortikale Verarbeitung afferenter Signale aus dem kardiovaskulären System intensiviert, was nicht durch eine höhere sympathische Aktivität erklärt werden kann. Mögliche physiologische Signalwege und Implikationen für die Ätiologie von Essstörungen werden diskutiert. [less ▲]

Detailed reference viewed: 185 (3 UL)
Full Text
See detailNewest Developments in Steel and Glass Engineering
Odenbreit, Christoph UL

in Journee Construction Acier 2013 (2013)

Detailed reference viewed: 29 (5 UL)
Full Text
Peer Reviewed
See detailMulti-frame super-resolution by enhanced shift & add
Al Ismaeil, Kassem UL; Aouada, D.; Ottersten, Björn UL et al

in International Symposium on Image and Signal Processing and Analysis, ISPA (2013)

A critical step in multi-frame super-resolution is the registration of frames based on their motion. We improve the performance of current state-of-the-art super-resolution techniques by proposing a more ... [more ▼]

A critical step in multi-frame super-resolution is the registration of frames based on their motion. We improve the performance of current state-of-the-art super-resolution techniques by proposing a more robust and accurate registration as early as in the initialization stage of the high resolution estimate. Indeed, we solve the limitations on scale and motion inherent to the classical Shift & Add approach by upsampling the low resolution frames up to the super-resolution factor prior to estimating motion or to median filtering. This is followed by an appropriate selective optimization, leading to an enhanced Shift & Add. Quantitative and qualitative evaluations have been conducted at two levels; the initial estimation and the final optimized superresolution. Results show that the proposed algorithm outperforms existing state-of-art methods. © 2013 University of Trieste and University of Zagreb. [less ▲]

Detailed reference viewed: 112 (1 UL)
Full Text
Peer Reviewed
See detailTowards optimal post-fault self-healing in future smart distribution grids
Capitanescu, Florin UL; Bilibin, Ilya UL; Sachau, Jürgen UL

in Renewable Energy and Power Quality Journal (2013)

This paper deals with a key functionality of the future distribution smart grids namely the automatic post-fault network self-healing. To this end we propose an optimization approach that aims finding the ... [more ▼]

This paper deals with a key functionality of the future distribution smart grids namely the automatic post-fault network self-healing. To this end we propose an optimization approach that aims finding the post-fault grid topology that minimizes the amount of unsupplied energy to consumers. The approach extends existing optimization models, developed in the context of losses minimization, for our particular application and proposes ways to overcome their limitations. We prove the interest of the approach on a 33-bus benchmark distribution system as well as on a 61-bus real-life distribution grid. [less ▲]

Detailed reference viewed: 270 (25 UL)
Full Text
Peer Reviewed
See detailThe Effect of Soft Pre-Annealing of Differently Stacked Cu-Sn-Zn Precursors on the Quality of Cu2ZnSnSe4 Absorbers
Arasimowicz, Monika UL; Thevenin, Maxime UL; Dale, Phillip UL

in Materials Research Society Symposia Proceedings. (2013), 1538

Detailed reference viewed: 175 (11 UL)
Full Text
Peer Reviewed
See detailDoctors' view on intercultural competence in the medical setting in Luxembourg
Bourkel, Elisabeth UL; Ferring, Dieter UL

in Psychology and Health (2013), 28(S1), 71

Detailed reference viewed: 114 (24 UL)
Full Text
Peer Reviewed
See detailBER analysis of Joint Network/Channel decoding in block Rayleigh fading channels
Vu, Thang Xuan UL; Di Renzo, Marco; Duhamel, Pierre

in Abstract book of 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) (2013)

Detailed reference viewed: 94 (3 UL)
Full Text
See detailLe paradoxe du passé. Pour une sémiotique de l'archive
Treleani, Matteo UL

in Site Internet de l'Association Française de Sémiotique (2013)

Detailed reference viewed: 85 (0 UL)
Full Text
Peer Reviewed
See detailSocio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names
Ferreira, Ana UL; Huynen, Jean-Louis UL; Koenig, Vincent UL et al

in Lecture Notes in Computer Science (2013), 8203

We study trust and context as factors influencing how people choose wireless network names. Our approach imagines the mindset of a hypothetical attacker whose goal is to ensnare unsuspecting victims into ... [more ▼]

We study trust and context as factors influencing how people choose wireless network names. Our approach imagines the mindset of a hypothetical attacker whose goal is to ensnare unsuspecting victims into accessing dishonest WiFi access points. For this purpose, we conducted an online survey. We used two separate forms. The first form asked a random group of participants to rate a list of wireless names according to their preferences (some real and others purposely made-up) and afterwards with implied trust in mind. The second form was designed to assess the effect of context and it asked a different set of respondents to rate the same list of wireless names in relation to four different contexts. Our results provide some evidence confirming the idea that trust and context can be exploited by an attacker by purposely, or strategically, naming WiFi access points with reference to trust or within certain contexts. We suggest, in certain cases, possible defence strategies. [less ▲]

Detailed reference viewed: 357 (21 UL)
Full Text
Peer Reviewed
See detailHigher spin AdS$_3$ supergravity and its CFT dual
Creutzig, Thomas; Hikida, Yasuaki; Roenne, Peter Browne UL

in International Journal of Modern Physics Conference Series (2013)

Detailed reference viewed: 118 (4 UL)
Full Text
Peer Reviewed
See detailAcoustic startle reflex in the processing of reward related food cues during food deprivation: evidence from men and women
Ferreira de Sá, D. S.; Plein, D. E.; Schulz, André UL et al

in Psychophysiology (2013), 50(Supplement 1), 121

Detailed reference viewed: 92 (3 UL)
Full Text
Peer Reviewed
See detailOn the Foundations and the Applications of Evolutionary Computing
Del Moral, Pierre; Tantar, Alexandru-Adrian UL; Tantar, Emilia UL

in Studies in Computational Intelligence (2013), 447

Genetic type particle methods are increasingly used to sample from complex high-dimensional distributions. They have found a wide range of applications in applied probability, Bayesian statistics ... [more ▼]

Genetic type particle methods are increasingly used to sample from complex high-dimensional distributions. They have found a wide range of applications in applied probability, Bayesian statistics, information theory, and engineering sciences. Understanding rigorously these new Monte Carlo simulation tools leads to fascinating mathematics related to Feynman-Kac path integral theory and their interacting particle interpretations. In this chapter, we provide an introduction to the stochastic modeling and the theoretical analysis of these particle algorithms. We also illustrate these methods through several applications. [less ▲]

Detailed reference viewed: 184 (3 UL)
Full Text
Peer Reviewed
See detailPsychomotor evidence for protection of cognitive processing
Schächinger, H.; Schilling, T. M.; Larra, M. et al

in Psychophysiology (2013), 50(Supplement 1), 6

Detailed reference viewed: 71 (0 UL)
Full Text
Peer Reviewed
See detailA Solution to a Problem of D. Lau: Complete Classification of Intervals in the Lattice of Partial Boolean Clones
Schölzel, Karsten UL; Couceiro, Miguel UL; Haddad, Lucien et al

in Multiple-Valued Logic (ISMVL), 2013 IEEE 43rd International Symposium on (2013)

The following natural problem, first considered by D. Lau, has been tackled by several authors recently: Let C be a total clone on 2 := {0, 1}. Describe the interval I(C) of all partial clones on 2 whose ... [more ▼]

The following natural problem, first considered by D. Lau, has been tackled by several authors recently: Let C be a total clone on 2 := {0, 1}. Describe the interval I(C) of all partial clones on 2 whose total component is C. We establish some results in this direction and combine them with previous ones to show the following dichotomy result: For every total clone C on 2, the set I(C) is either finite or of continuum cardinality. [less ▲]

Detailed reference viewed: 104 (2 UL)
Full Text
Peer Reviewed
See detailRandomised controlled non-inferiority trial of primary care based facilitated access to an alcohol reduction website (EFAR-FVG)
Wallace, Paul; Struzzo, Piero; della Vedova, Roberto et al

in Addiction Science and Clinical Practice (2013)

Introduction There is a strong body of evidence demonstrating effectiveness of brief interventions by primary care professionals for risky drinkers but implementation levels remain low. Facilitated access ... [more ▼]

Introduction There is a strong body of evidence demonstrating effectiveness of brief interventions by primary care professionals for risky drinkers but implementation levels remain low. Facilitated access to an alcohol reduction website constitutes an innovative approach to brief intervention, offering a time-saving alternative to face to face intervention, but it is not known whether it is as effective. Objective To determine whether facilitated access to an alcohol reduction website is equivalent to face to face intervention. Methods Randomised controlled non-inferiority trial for risky drinkers comparing facilitated access to a dedicated website with face to face brief intervention conducted in primary care settings in the Region of Friuli Venezia-Giulia, Italy. Adult patients are given a leaflet inviting them to log on to a website to complete the AUDIT-C alcohol screening questionnaire. Screen positives are requested to complete an online trial module including consent, baseline assessment and randomisation to either standard intervention by the practitioner or facilitated access to an alcohol reduction website. Follow up assessment of risky drinking is undertaken online at 1 month, 3 months and 1 year using the full AUDIT questionnaire. Proportions of risky drinkers in each group will be calculated and non-inferiority assessed against a specified margin of 10%. The trial is being undertaken as an initial pilot and a subsequent main trial. Results 12 practices have participated in the pilot, and more than 1300 leaflets have been distributed. 89 patients have been recruited to the trial with a one month follow-up rate of 79%. Discussion The findings of the pilot study suggest that the trial design is feasible, though modifications will be made to optimize performance in the main trial which will commence in January 2014. Plans are concurrently underway to replicate the trial in Australia, and potentially in the UK and Spain. [less ▲]

Detailed reference viewed: 104 (3 UL)
Full Text
Peer Reviewed
See detailThe European Model Company Act (EMCA), chapter on Groups of companies
Conac, Pierre-Henri UL

in European Company and Financial Law Review (2013)

Detailed reference viewed: 298 (5 UL)
Full Text
See detailMechanical Properties of Laser Braze-Welded Al-Cu connections
Solchenbach, Tobias UL; Plapper, Peter UL

in Mechanical Properties of Laser Braze-Welded Al-Cu connections (2012, November)

The paper describes an innovative, laser based joining method for dissimilar Al-Cu connections. The main objective is the improvement of the mechanical and electrical properties of the joints.

Detailed reference viewed: 143 (13 UL)
Full Text
Peer Reviewed
See detailLanguage Enrichment for Resilient MDE
Khan, Yasir Imtiaz UL; risoldi, matteo

in Lecture Notes in Computer Science (2012, September 27), 7527

n Model-Driven Engineering, as in many engineering approaches, it is desireable to be able to assess the quality of a system or model as it evolves. A resilient engineering practice systematically ... [more ▼]

n Model-Driven Engineering, as in many engineering approaches, it is desireable to be able to assess the quality of a system or model as it evolves. A resilient engineering practice systematically assesses whether evolutions improve on the capabilities of a system. We argue that to achieve a systematic resilient model-driven engineering practice, resilience concepts should be first-class citizens in models. This article discusses how DREF, a formal framework defining resilience concepts, can be integrated with other modeling languages in order to pursue a resilient development process. [less ▲]

Detailed reference viewed: 165 (4 UL)
Full Text
Peer Reviewed
See detailLes sanctions administratives en jurisprudence luxembourgeoise
Ravarani, Georges UL

in Publications du Benelux (2012, September), 35

Detailed reference viewed: 290 (10 UL)
Full Text
Peer Reviewed
See detailDie Situation pflegender Angehöriger alter Menschen aus Sicht der Entwicklungspsychologie der Lebensspanne
Boll, Thomas UL; Ferring, Dieter UL

in Zeitschrift für Gerontologie und Geriatrie : Organ der Deutschen Gesellschaft für Gerontologie und Geriatrie; Supplement 1 (2012, September)

Familienangehörige sind die wichtigsten informellen Pflegepersonen alter Menschen. Bisherige Forschung hat v.a. aus stress-theoretischer Sicht die Belastungen und deren negative Folgen für die Gesundheit ... [more ▼]

Familienangehörige sind die wichtigsten informellen Pflegepersonen alter Menschen. Bisherige Forschung hat v.a. aus stress-theoretischer Sicht die Belastungen und deren negative Folgen für die Gesundheit der Pflegenden thematisiert. Stress-theoretische Ansätze können aber die inzwischen gut dokumentierten positiven Erfahrungen und Entwicklungsgewinne pflegender Angehöriger nur unzureichend erklären. Der vorliegende Beitrag untersucht die weitergehenden heuristischen Vorzüge einer entwicklungspsychologischen Sicht. Methoden: Literaturrecherchen. Analyse der Situation pflegender Angehöriger mit Kernkonzepten der Lebensspannen-Entwicklungspsychologie (z.B. kritische Lebensereignisse, Entwicklungsziele, intentionale Selbstentwicklung). Ergebnisse: Eine entwicklungspsychologische Sicht erschließt (1) negative, positive und als ambivalent erlebte Aspekte des Pflegens, auch als Funktion von Alter und Phase im Lebenslauf, (2) wie die facettenreiche Pflegesituation diverse Wünsche und Ziele pflegender Angehöriger bzgl. eigener Entwicklung und der der Gepflegten teils frustriert, teils erfüllt, und wie daraus Emotionen und Handlungsbereitschaften erwachsen, (3) wie sich Wünsche, Ziele, Kompetenzen und Persönlichkeitsmerkmale pflegender Angehöriger durch Pflegeerfahrungen weiterentwickeln. Schlussfolgerungen: Kernkonzepte der Entwicklungspsychologie der Lebensspanne erlauben eine umfassendere Analyse der Situation pflegender Angehöriger als bisher und versprechen weitere Fortschritte. [less ▲]

Detailed reference viewed: 162 (10 UL)
Full Text
Peer Reviewed
See detailHash function generation by means of Gene Expression Programming
Varrette, Sébastien UL; Muszynski, Jakub UL; Bouvry, Pascal UL

in Intl. Conf. on Cryptography and Security System (CSS’12) (2012, September), XII(3), 37-53

Cryptographic hash functions are fundamental primitives in modern cryptography and have many security applications (data integrity checking, cryptographic protocols, digital signatures, pseudo random ... [more ▼]

Cryptographic hash functions are fundamental primitives in modern cryptography and have many security applications (data integrity checking, cryptographic protocols, digital signatures, pseudo random number generators etc.). At the same time novel hash functions are designed (for instance in the framework of the SHA-3 contest organized by the National Institute of Standards and Technology (NIST)), the cryptanalysts exhibit a set of statistical metrics (propagation criterion, frequency analysis etc.) able to assert the quality of new proposals. Also, rules to design "good" hash functions are now known and are followed in every reasonable proposal of a new hash scheme. This article investigates the ways to build on this experiment and those metrics to generate automatically compression functions by means of Evolutionary Algorithms (EAs). Such functions are at the heart of the construction of iterative hash schemes and it is therefore crucial for them to hold good properties. Actually, the idea to use nature-inspired heuristics for the design of such cryptographic primitives is not new: this approach has been successfully applied in several previous works, typically using the Genetic Programming (GP) heuristic [1]. Here, we exploit a hybrid meta-heuristic for the evolutionary process called Gene Expression Programming (GEP) [2] that appeared far more e?cient computationally speaking compared to the GP paradigm used in the previous papers. In this context, the GEPHashSearch framework is presented. As it is still a work in progress, this article focuses on the design aspects of this framework (individuals de?nitions, ?tness objectives etc.) rather than on complete implementation details and validation results. Note that we propose to tackle the generation of compression functions as a multi-objective optimization problem in order to identify the Pareto front i.e. the set of non-dominated functions over the four ?tness criteria considered. If this goal is not yet reached, the ?rst experimental results in a mono-objective context are promising and open the perspective of fruitful contributions to the cryptographic community [less ▲]

Detailed reference viewed: 202 (1 UL)
Full Text
Peer Reviewed
See detailIntroducing Conviviality as a New Paradigm for Interactions among IT Objects
Moawad, Assaad UL; Efthymiou, Vasileios UL; Caire, Patrice UL et al

in Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments (2012, August), 907

The Internet of Things allows people and objects to seamlessly interact, crossing the bridge between real and virtual worlds. Newly created spaces are heterogeneous; social relations naturally extend to ... [more ▼]

The Internet of Things allows people and objects to seamlessly interact, crossing the bridge between real and virtual worlds. Newly created spaces are heterogeneous; social relations naturally extend to smart objects. Conviviality has recently been introduced as a social science concept for ambient intelligent systems to highlight soft qualitative requirements like user friendliness of systems. Roughly, more opportunities to work with other people increase the conviviality. In this paper, we first propose the conviviality concept as a new interaction paradigm for social exchanges between humans and Information Technology (IT) objects, and extend it to IT objects among themselves. Second, we introduce a hierarchy for IT objects social interactions, from low-level one-way interactions to high-level complex interactions. Then, we propose a mapping of our hierarchy levels into dependence networks-based conviviality classes. In particular, low levels without cooperation among objects are mapped to lower conviviality classes, and high levels with complex cooperative IT objects are mapped to higher conviviality classes. Finally, we introduce new conviviality measures for the Internet of Things, and an iterative process to facilitate cooperation among IT objects, thereby the conviviality of the system. We use a smart home as a running example. [less ▲]

Detailed reference viewed: 168 (12 UL)
Full Text
Peer Reviewed
See detailDNSSM: A large-scale Passive DNS Security Monitoring Framework
Marchal, Samuel UL; François, Jérôme UL; Wagner, Cynthia UL et al

in IEEE/IFIP Network Operations and Management Symposium (2012, April)

We present a monitoring approach and the supporting software architecture for passive DNS traffic. Monitoring DNS traffic can reveal essential network and system level activity profiles. Worm infected and ... [more ▼]

We present a monitoring approach and the supporting software architecture for passive DNS traffic. Monitoring DNS traffic can reveal essential network and system level activity profiles. Worm infected and botnet participating hosts can be identified and malicious backdoor communications can be detected. Any passive DNS monitoring solution needs to address several challenges that range from architectural approaches for dealing with large volumes of data up to specific Data Mining approaches for this purpose. We describe a framework that leverages state of the art distributed processing facilities with clustering techniques in order to detect anomalies in both online and offline DNS traffic. This framework entitled DSNSM is implemented and operational on several networks. We validate the framework against two large trace sets. [less ▲]

Detailed reference viewed: 230 (2 UL)
Full Text
Peer Reviewed
See detailLe principe de coopération loyale comme fondement identitaire de l’Union européenne
Neframi, Eleftheria UL

in Revue du Marché Commun et de l'Union Européenne (2012, March), (556), 197-203

The principle of loyal cooperation affects the balance between Member State autonomy and obligation to ensure the attainment of the objectives of the Union. Unity in the external representation is ... [more ▼]

The principle of loyal cooperation affects the balance between Member State autonomy and obligation to ensure the attainment of the objectives of the Union. Unity in the external representation is regulated by the principle of loyal cooperation. In the internal field, the principle has an autonomous identification function despite the interference with structural and conflict of norms related principles. [less ▲]

Detailed reference viewed: 877 (22 UL)
Full Text
Peer Reviewed
See detailLe concours de la responsabilité délictuelle et de la responsabilité contractuelle
Ancel, Pascal UL

in Responsabilité civile et assurance (2012, February)

Detailed reference viewed: 259 (2 UL)
See detailEating disturbances in childhood and early adolescence: Screening in the general population
Van Dyck, Zoé UL; Bellwald, Laura; Dremmel, Daniela et al

in Psychology and Health (2012), 27

Detailed reference viewed: 108 (8 UL)
Full Text
Peer Reviewed
See detailNormative Multi-Agent Systems
Andrighetto, Giulia; Governatori, Guido; Noriega, Pablo et al

in Dagstuhl Reports (2012), 2(3), 23-49

Normative systems are systems in the behavior of which norms play a role and which need normative concepts in order to be described or specified. A normative multi-agent system combines models for ... [more ▼]

Normative systems are systems in the behavior of which norms play a role and which need normative concepts in order to be described or specified. A normative multi-agent system combines models for normative systems (dealing for example with obligations, permissions and prohibitions) with models for multi-agent systems. Norms have been proposed in multi-agent systems and computer science to deal with issues of coordination, security, electronic commerce and institutions, agent organization. However, due to the lack of a unified theory, many multi-agent system researchers are presently developing their own ad hoc concepts and applications. The aim of this Dagstuhl Seminar was to formulate a collective appraisal of the current perspectives in the field and the most promising venues for future activity. In particular, the seminar has been conceived for the writing of a volume titled "A Prospective view of Normative Multi Agent Systems" aimed to become a standard reference in the field and to provide guidelines for future research in normative multi-agent systems. [less ▲]

Detailed reference viewed: 110 (1 UL)
Full Text
Peer Reviewed
See detailStandardized Power-Efficient & Internet-Enabled Communication Stack for Capillary M2M Networks
Accettura, Nicola; Palattella, Maria Rita UL; Dohler, Mischa et al

in Proceedings of WCNC2012 (2012)

Detailed reference viewed: 115 (3 UL)
Full Text
Peer Reviewed
See detailA longitudinal attachment study on adopted adolescents and their adoptive parents
Ongari, Barbara; Mocatti, Tiziana; Decarli, Alessandro UL

in Neuropsychiatrie de l'Enfance et de l'Adolescence (2012), 60

Detailed reference viewed: 107 (1 UL)
Full Text
Peer Reviewed
See detailQoE for spatial cognitive systems
Alodeh, Maha UL

in IEEE International Conference on Communications (2012)

Detailed reference viewed: 86 (6 UL)
Full Text
Peer Reviewed
See detailXFEM coupling of granular flows interacting with surrounding fluids
Pasenow, F.; Zilian, Andreas UL; Dinkler, D.

in ECCOMAS 2012 - European Congress on Computational Methods in Applied Sciences and Engineering, e-Book Full Papers (2012)

In this paper, ideas for the simulation of sliding dry granular materials interacting with surrounding fluids are presented and first results are presented. The compressible granular material is modeled ... [more ▼]

In this paper, ideas for the simulation of sliding dry granular materials interacting with surrounding fluids are presented and first results are presented. The compressible granular material is modeled as a medium which can show solid-like and fluid-like characteristics. Therefore a weighted decomposition of stress tensors of a solid-like and a fluid-like phase is applied. The surrounding incompressible fluids are described with a Newtonian constitutive model. Interface dynamics are handled with the level-set method. The model equations are discretized with the space-time finite element method. Discontinuous solution characteristics across interfaces are captured numerically by the extended finite element method (XFEM). For all discontinuities the space of ansatz functions is enriched with Heaviside functions. [less ▲]

Detailed reference viewed: 119 (0 UL)
Full Text
Peer Reviewed
See detailChanging Agreements: Intention Reconsideration based on Assumptions and Reasons
Marosin, Diana; Proper, Alex Handrik; van der Torre, Leon UL

in Proceedings of the First International Conference on Agreement Technologies, AT 2012 (2012)

Detailed reference viewed: 51 (0 UL)
Full Text
Peer Reviewed
See detailTraffic Aware Scheduling Algorithm for Multi-Hop IEEE 802.15.4e Networks
Palattella, Maria Rita UL; Accettura, Nicola; Dohler, Mischa et al

in Proceedings of PIMRC2012 (2012)

Detailed reference viewed: 144 (3 UL)
Full Text
Peer Reviewed
See detailRapid Prototyping Framework for Visual Control of Autonomous Micro Aerial Vehicles
Mellado-Bataller, Ignacio; Campoy, Pascual; Olivares Mendez, Miguel Angel UL et al

in Advances in Intelligent Systems and Computing (2012), 193

Rapid prototyping environments can speed up the research of visual control algorithms. We have designed and implemented a software framework for fast prototyping of visual control algorithms for Micro ... [more ▼]

Rapid prototyping environments can speed up the research of visual control algorithms. We have designed and implemented a software framework for fast prototyping of visual control algorithms for Micro Aerial Vehicles (MAV). We have applied a combination of a proxy-based network communication architecture and a custom Application Programming Interface. This allows multiple experimental configurations, like drone swarms or distributed processing of a drones video stream. Currently, the framework supports a low-cost MAV: the Parrot AR.Drone. Real tests have been performed on this platform and the results show comparatively low figures of the extra communication delay introduced by the framework, while adding new functionalities and flexibility to the selected drone. This implementation is open-source and can be downloaded from www.vision4uav.com/?q=VC4MAV-FW [less ▲]

Detailed reference viewed: 123 (1 UL)
Full Text
Peer Reviewed
See detailGeneration of Realistic Mobility for VANETs Using Genetic Algorithms
Seredynski, Marcin UL; Danoy, Grégoire UL; Tabatabaei, Masoud UL et al

in Proceedings of the IEEE Congress on Evolutionary Computation (2012)

Detailed reference viewed: 176 (25 UL)
Full Text
Peer Reviewed
See detailBewertung des Anwendungsbereiches der Schlammfaulung unter Berücksichtigung der Energieeffizienz kommunaler Kläranlagen
Schmitt, T.G.; Gretzschel, O.; Hansen, Joachim UL et al

in Proceedings of 26. Karlsruher Flockungstage‘ (2012)

Detailed reference viewed: 86 (2 UL)
Full Text
Peer Reviewed
See detailCompound Model of Inverter Driven Grids Stability Analysis of Island Power Grids Containing Only Voltage Source Inverters
Jostock, Markus UL; Sachau, Jürgen UL

in Abstract book of 5th International Conference on Integration of Renewable and Distributed Energy Resources (2012)

This paper presents a structured development of a compound state space model of an inverter driven power grid. It allows to perform stability investigations on power grids, depending on the inverter ... [more ▼]

This paper presents a structured development of a compound state space model of an inverter driven power grid. It allows to perform stability investigations on power grids, depending on the inverter parameters influencing their dynamich behavior and on the grid structure. The general approach is to separate the active components, i.e. the inverters, from the passive components, i.e. the grid, and model them separately. A state space model of a single voltage source inverter is developed and then extended into a multi-inverter model. Based on the linearized power equations of one grid branch, a matrix representation of the grid is developed, based on the sorted node incidence matrix. The grid matrix model and the multi-inverter state space model are joined into one compound control model for inverter driven power grids. [less ▲]

Detailed reference viewed: 178 (6 UL)
Full Text
Peer Reviewed
See detailDetecting meaconing attacks by analysing the clock bias of GNSS receivers
Marnach, Daniel; Mauw, Sjouke UL; Martins, Miguel et al

in European Navigation Conference (ENC 2012) (2012)

Existing Global Navigation Satellite Systems offer no authentication of their satellite signals towards their civilian users. As a consequence, several types of GNSS-related attacks, including meaconing ... [more ▼]

Existing Global Navigation Satellite Systems offer no authentication of their satellite signals towards their civilian users. As a consequence, several types of GNSS-related attacks, including meaconing, may be performed and remain undetected. In the scope of the project “Developing a prototype of Localisation Assurance Service Provider”, which is funded by ESA and realised by the company itrust consulting and the University of Luxembourg, a methodology to visualise the beginnings and the ends of meaconing attacks by monitoring the clock bias of an attacked receiver over time was developed. This paper presents an algorithm that is based on this attack visualisation technique and is capable of detecting meaconing attacks automatically. Experiments in a controlled environment confirmed that the chosen methodology works properly. In one of these tests, for example, six meaconing attacks were simulated by using a GNSS signal repeater. The algorithm was able to detect the beginnings and the ends of all six attacks, while resulting in no more than two false positives, even though the average delay introduced by the meaconing stations (repeater) was just 80 nanoseconds. [less ▲]

Detailed reference viewed: 198 (1 UL)
Full Text
Peer Reviewed
See detailTowards a Simple City Driving Simulator Based on Speed Dreams and OSM
Avanesov, Tigran UL; Louveton, Nicolas UL; McCall, Roderick UL et al

in Adjunct Proceedings of 4th International Conference on Automotive User Interfaces and Interactive Vehicular Applications (2012), 2

This paper presents an architecture and partially built simulation platform which is designed to offer a flexible open ended approach for conducting laboratory experiments. The emphasis is on supporting ... [more ▼]

This paper presents an architecture and partially built simulation platform which is designed to offer a flexible open ended approach for conducting laboratory experiments. The emphasis is on supporting multiple drivers and the ability to swap in and out different software components and devices. [less ▲]

Detailed reference viewed: 275 (20 UL)
Full Text
Peer Reviewed
See detailInvariant Preservation In Iterative Modeling
Lucio, Levi; Syriani, Eugene; Amrani, Moussa UL et al

in Workshop on Models And Evolution, co-located with MoDELS 2012 (2012)

In a Model-Driven Development project, models are typically built iteratively to better satisfy a set of requirements. Therefore it is crucial to guarantee that one iteration of a model evolution does not ... [more ▼]

In a Model-Driven Development project, models are typically built iteratively to better satisfy a set of requirements. Therefore it is crucial to guarantee that one iteration of a model evolution does not hinder the previous version. In this paper, we focus on invariant preservation of behavioral models expressed in Algebraic Petri Nets. The theory developed is applied to a Multi-Level Security File System modeled iteratively. We also discuss how this approach can be applied on Domain-Specific Languages that are translated to Algebraic Petri Nets. [less ▲]

Detailed reference viewed: 101 (1 UL)
Full Text
Peer Reviewed
See detailEquilibrated patch recovery for accurate evaluation of upper error bounds in quantities of interest
González-Estrada, O. A.; Ródenas, J. J.; Nadal, E. et al

in ECCOMAS Thematic Conference - ADMOS 2011: International Conference on Adaptive Modeling and Simulation, An IACM Special Interest Conference (2012)

There is an increasing interest on the use of goal-oriented error estimates which help to measure and control the local error on a linear or non-linear quantity of interest (QoI) that might result ... [more ▼]

There is an increasing interest on the use of goal-oriented error estimates which help to measure and control the local error on a linear or non-linear quantity of interest (QoI) that might result relevant for design purposes (e.g. the mean stress value in a particular area, displacements, the stress intensity factor for fracture problems,⋯). In general, residual-based error estimators have been used to obtain upper and lower bounds of the error in quantities of interest for finite element approximations. In this work, we propose a novel a posteriori recovery technique to obtain an upper error bound of the QoI. We use a recovery procedure based on the superconvergent patch recovery (SPR) technique to obtain nearly statically admissible recovered stress fields for the primal and dual problems. This recovery technique was previously used to obtain upper bounds of the error in energy norm and has been used in this paper to obtain a computable version of the upper bound for the quantity of interest. [less ▲]

Detailed reference viewed: 271 (1 UL)
Full Text
Peer Reviewed
See detailError estimation and error bounding in quantities of interest based on equilibrated recovered displacement fields
Nadal, E.; González-Estrada, O. A.; Ródenas, J. J. et al

in ECCOMAS 2012 - European Congress on Computational Methods in Applied Sciences and Engineering, e-Book Full Papers (2012)

Over the last ten years there has been an increase on the use of goal-oriented error estimates aimed to quantify the local error on a (non)linear quantity of interest (QoI) that might result relevant for ... [more ▼]

Over the last ten years there has been an increase on the use of goal-oriented error estimates aimed to quantify the local error on a (non)linear quantity of interest (QoI) that might result relevant for design purposes. Residual-based error estimators have been used recursively to obtain upper and lower bounds of the error in quantities of interest for finite element approximations. In this paper, we present a recovery technique for 2D linear elasticity problems, based on the superconvergent patch recovery (SPR), which provides recovered displacement and stress fields that are then utilised to evaluate practical upper and lower error bounds in QoI. [less ▲]

Detailed reference viewed: 269 (2 UL)
Full Text
Peer Reviewed
See detailError estimation and error bounding in energy norm based on a displacement recovery technique
Nadal, E.; González-Estrada, O. A.; Ródenas, J. J. et al

in ECCOMAS 2012 - European Congress on Computational Methods in Applied Sciences and Engineering, e-Book Full Papers (2012)

Traditionally, recovery based error estimators in linear elasticity have considered the evaluation of an enhanced stress field obtained from the raw Finite Element (FE) stress solution. Instead of that ... [more ▼]

Traditionally, recovery based error estimators in linear elasticity have considered the evaluation of an enhanced stress field obtained from the raw Finite Element (FE) stress solution. Instead of that, one can also obtain a recovered displacement field from the FE displacements. Herein, we describe a superconvergent patch recovery of the displacement field which considers the local fulfilment of boundary and internal equilibrium equations, Dirichlet constraints and, for singular problems, the splitting of the displacement and stress fields into singular and smooth parts. Numerical tests using problems with known analytical solution have been carried out to validate the proposed technique for error estimation and error bounding in energy norm and quantities of interest. [less ▲]

Detailed reference viewed: 284 (2 UL)
Full Text
Peer Reviewed
See detailEngineering Process for Safe Autonomous Robots
Gribov, Vladislav UL; Voos, Holger UL

in Abstract book of 5th International Workshop on Human-Friendly Robotics (HFR2012) (2012)

Safe service and personal care robots became new exciting research topic over last few years. Physical segregation of the industrial robot and humans works fine [1], but for obvious reasons is not ... [more ▼]

Safe service and personal care robots became new exciting research topic over last few years. Physical segregation of the industrial robot and humans works fine [1], but for obvious reasons is not possible if physical human-robot interaction (pHRI) is required. Autonomous robots and untrained humans sharing the operation space and cooperating with each other brings new kind of risks and requirements to robot safety. The wide deployment of service and personal care robots suggests limited costs for the robot development phase. The existing robots, both industrial and academic, are mostly designed from scratch without providing clear and safetyoriented engineering process for robot design. [less ▲]

Detailed reference viewed: 276 (3 UL)
Full Text
Peer Reviewed
See detailType and duration of working-life non-employment spells predict cognitive function in old age
Leist, Anja UL; Avendano, Mauricio; van Lenthe, Frank J. et al

in Gerontologist (2012), 52(S1), 676-677

Detailed reference viewed: 89 (4 UL)
Full Text
Peer Reviewed
See detailNew methods for finding associations in large data sets: Generalizing the maximal information coefficient (MIC)
Ignac, Tomasz UL; Sakhanenko, N. A.; Skupin, Alexander UL et al

in Proceedings of the Ninth International Workshop on Computational Systems Biology (2012)

We propose here a natural, but substantive, extension of the MIC. Defined for two variables, MIC has a distinct advance for detecting potentially complex dependencies. Our extension provides a similar ... [more ▼]

We propose here a natural, but substantive, extension of the MIC. Defined for two variables, MIC has a distinct advance for detecting potentially complex dependencies. Our extension provides a similar means for dependencies among three variables. This itself is an important step for practical applications. We show that by merging two concepts, the interaction information, which is a generalization of the mutual information to three variables, and the normalized information distance, which measures informational sharing between two variables, we can extend the fundamental idea of MIC. Our results also exhibit some attractive properties that should be useful for practical applications in data analysis. Finally, the conceptual and mathematical framework presented here can be used to generalize the idea of MIC to the multi-variable case. [less ▲]

Detailed reference viewed: 241 (9 UL)
Full Text
Peer Reviewed
See detailOn the optimality of beamformer design for zero-forcing DPC with QR decomposition
Tran, L.-N.; Juntti, M.; Bengtsson, M. et al

in IEEE International Conference on Communications (2012)

We consider the beamformer design for zero-forcing dirty paper coding (ZF-DPC), a suboptimal transmission technique for MISO broadcast channels (MISO BCs). Beamformers for ZF-DPC are designed to maximize ... [more ▼]

We consider the beamformer design for zero-forcing dirty paper coding (ZF-DPC), a suboptimal transmission technique for MISO broadcast channels (MISO BCs). Beamformers for ZF-DPC are designed to maximize a performance measure, subject to some power constraints and zero-interference constraints. For the sum rate maximization problem under a total power constraint, the existing beamformer designs in the literature are based on the QR decomposition (QRD), which is used to satisfy the ZF constraints. However, the optimality of the QRD-based design is still unknown. First, we prove that the QRD-based design is indeed optimal for ZF-DPC for any performance measure under a sum power constraint. For the per-antenna power constraints, the QRD-based designs become suboptimal, and we propose an optimal design, using a convex optimization framework. Low-complexity suboptimal designs are also presented. © 2012 IEEE. [less ▲]

Detailed reference viewed: 139 (0 UL)
Full Text
Peer Reviewed
See detailForeword from the Programme Chairs-STAST 2012
Ryan, Peter UL; Coles-Kemp, Lizzie

in Socio-Technical Aspects in Security and Trust (STAST), 2012 Workshop on (2012)

This volume comprises the proceedings of the second workshop on Socio-Technical Aspects of Security and Trust (STAST). The diversity of the topics covered in this proceedings reflect the vibrancy of the ... [more ▼]

This volume comprises the proceedings of the second workshop on Socio-Technical Aspects of Security and Trust (STAST). The diversity of the topics covered in this proceedings reflect the vibrancy of the socio-technical research community within information security. Contributions range from HCIoriented research through organizational process design and decision making. Twelve papers were submitted of which six papers were judged to be of high quality accepted for presentation and publication. We should like to offer our thanks for the professionalism of the authors, reviewers, sub-reviewers and the program committee members. All papers were reviewed by at least three reviewers from the program committee, with the help of external reviewers. [less ▲]

Detailed reference viewed: 125 (1 UL)
Full Text
Peer Reviewed
See detailParallelism and Concurrency of Stochastic Graph Transformations
Heckel, Reiko; Ehrig, Hartmut; Golas, Ulrike et al

in Graph Transformations (2012), 7562

Graph transformation systems (GTS) have been proposed for high-level stochastic modelling of dynamic systems and networks. The resulting systems can be described as semi-Markov processes with graphs as ... [more ▼]

Graph transformation systems (GTS) have been proposed for high-level stochastic modelling of dynamic systems and networks. The resulting systems can be described as semi-Markov processes with graphs as states and transformations as transitions. The operational semantics of such processes can be explored through stochastic simulation. In this paper, we develop the basic theory of stochastic graph transformation, including generalisations of the Parallelism and Concurrency Theorems and their application to computing the completion time of a concurrent process. [less ▲]

Detailed reference viewed: 121 (8 UL)
Full Text
Peer Reviewed
See detailHow LLP projects use Internet and social media for communication purposes: a desktop research
Song, Ju-Youn UL; Zourou, Katerina UL

in Proceedings of the LINQ conference: The future of Learning Innovations and Learning quality: how do they fit together? (2012)

The Web2LLP project (“Improving Internet strategies and maximizing the social media presence of Lifelong Learning Programme (LLP) projects”, http://www.web2llp.eu/ is a two-year project running from ... [more ▼]

The Web2LLP project (“Improving Internet strategies and maximizing the social media presence of Lifelong Learning Programme (LLP) projects”, http://www.web2llp.eu/ is a two-year project running from January 2012 to December 2013. The partnership consists of six project members: University of Luxembourg, Web2Learn, ATiT, Coventry University Entreprises, Pixel and PAU Education. The original idea for the project stemmed from the need that we felt, as project managers and members involved in LLP projects for several years, for skills and competences that were missing - in both technical and communication terms - regarding the effective use of Internet social media tools, and their embeddedness in the communication strategies that are fundamental to the success of an LLP project. We realized, through informal exchanges with colleagues at EACEA Info days and other project meetings, that although the social web is a reality that cannot be disregarded, its communication potential for LLP projects has not so far been exploited, due to a) a lack of information and appropriation opportunities regarding ways of effectively using these tools as part of a communication strategy, and b) lack of visibility of good practice regarding what is reasonable and achievable in an LLP context. Moreover, although communication is a fundamental piece of every LLP project proposal (one of the required work packages and also a feature under which the project is evaluated both in the intermediary and final reports), there are no guidelines on how to set up a coherent Internet strategy featuring social media tools appropriate to the project. Our project was designed to respond to these needs and it has been selected for funding in 2012 in the highly selective (7% success rate) KA4 action. [less ▲]

Detailed reference viewed: 82 (6 UL)
Full Text
Peer Reviewed
See detailWho’s that girl? Körperbild, Selbsterkennung und Selbstkonzept bei jungen Frauen mit und ohne Essstörungsrisiko
Lutz, Annika UL; Herbert, Cornelia; Vögele, Claus UL

in Abstract book of 30. Symposium Klinische Psychologie und Psychotherapie der DGPS Fachgruppe Klinische Psychologie und Psychotherapie (2012)

Detailed reference viewed: 173 (7 UL)
Full Text
Peer Reviewed
See detailFrequency Coupling in Inverter Grids Modeling the Mutual Interference of Voltage Source Inverters in Island Grids
Jostock, Markus UL; Sachau, Jürgen UL

in Abstract book of 5th International Conference on Integration of Renewable and Distributed Energy Resources (2012)

This paper presents a model to describe the mutual frequency disturbance of meshed and interconnected voltage source inverters during transient phases. The model provides a weighted mutual frequency ... [more ▼]

This paper presents a model to describe the mutual frequency disturbance of meshed and interconnected voltage source inverters during transient phases. The model provides a weighted mutual frequency coupling matrix taking into account that the mutual frequency measurement disturbance decreases for increasing electric distance between the inverters (i.e. depend on the line admittance) and depends on the respective inverter’s rated power, meaning that stronger inverters have more influence than small ones on the other inverters frequency perception. [less ▲]

Detailed reference viewed: 141 (7 UL)
Full Text
Peer Reviewed
See detailAn Nonparametric Evaluation of SysML-Based Mechatronic Conceptual Design
Chami, Mohammad; Bou Ammar, Haitham; Voos, Holger UL et al

in Proceedings of 24th Benelux Conference on Artificial Intelligence (2012)

Detailed reference viewed: 117 (6 UL)
Full Text
Peer Reviewed
See detailA Fair and Robust Voting System by Broadcast
Khader, Dalia UL; Smyth, Ben; Ryan, Peter UL et al

in Lecture Notes in Informatics (2012)

Hao, Ryan, and Zieliński (2010) propose a two-round decentralized voting protocol that is efficient in terms of rounds, computation, and bandwidth. However, the protocol has two drawbacks. First, if some ... [more ▼]

Hao, Ryan, and Zieliński (2010) propose a two-round decentralized voting protocol that is efficient in terms of rounds, computation, and bandwidth. However, the protocol has two drawbacks. First, if some voters abort then the election result cannot be announced, that is, the protocol is not robust. Secondly, the last voter can learn the election result before voting, that is, the protocol is not fair. Both drawbacks are typical of other decentralized e-voting protocols. This paper proposes a recovery round to enable the election result to be announced if voters abort, and we add a commitment round to ensure fairness. In addition, we provide a computational security proof of ballot secrecy. [less ▲]

Detailed reference viewed: 286 (5 UL)