![]() ; Mauw, Sjouke ![]() in European Navigation Conference (ENC 2012) (2012) Existing Global Navigation Satellite Systems offer no authentication of their satellite signals towards their civilian users. As a consequence, several types of GNSS-related attacks, including meaconing ... [more ▼] Existing Global Navigation Satellite Systems offer no authentication of their satellite signals towards their civilian users. As a consequence, several types of GNSS-related attacks, including meaconing, may be performed and remain undetected. In the scope of the project “Developing a prototype of Localisation Assurance Service Provider”, which is funded by ESA and realised by the company itrust consulting and the University of Luxembourg, a methodology to visualise the beginnings and the ends of meaconing attacks by monitoring the clock bias of an attacked receiver over time was developed. This paper presents an algorithm that is based on this attack visualisation technique and is capable of detecting meaconing attacks automatically. Experiments in a controlled environment confirmed that the chosen methodology works properly. In one of these tests, for example, six meaconing attacks were simulated by using a GNSS signal repeater. The algorithm was able to detect the beginnings and the ends of all six attacks, while resulting in no more than two false positives, even though the average delay introduced by the meaconing stations (repeater) was just 80 nanoseconds. [less ▲] Detailed reference viewed: 203 (1 UL)![]() Gribov, Vladislav ![]() ![]() in Abstract book of 5th International Workshop on Human-Friendly Robotics (HFR2012) (2012) Safe service and personal care robots became new exciting research topic over last few years. Physical segregation of the industrial robot and humans works fine [1], but for obvious reasons is not ... [more ▼] Safe service and personal care robots became new exciting research topic over last few years. Physical segregation of the industrial robot and humans works fine [1], but for obvious reasons is not possible if physical human-robot interaction (pHRI) is required. Autonomous robots and untrained humans sharing the operation space and cooperating with each other brings new kind of risks and requirements to robot safety. The wide deployment of service and personal care robots suggests limited costs for the robot development phase. The existing robots, both industrial and academic, are mostly designed from scratch without providing clear and safetyoriented engineering process for robot design. [less ▲] Detailed reference viewed: 277 (3 UL)![]() ; ; Hansen, Joachim ![]() in Proceedings of 26. Karlsruher Flockungstage‘ (2012) Detailed reference viewed: 88 (2 UL)![]() Lutz, Annika ![]() ![]() in Abstract book of 30. Symposium Klinische Psychologie und Psychotherapie der DGPS Fachgruppe Klinische Psychologie und Psychotherapie (2012) Detailed reference viewed: 176 (7 UL)![]() ; ; Decarli, Alessandro ![]() in Neuropsychiatrie de l'Enfance et de l'Adolescence (2012), 60 Detailed reference viewed: 108 (1 UL)![]() Pelt, Véronique ![]() ![]() in Papers on Social Representations (2012), 21 Detailed reference viewed: 66 (3 UL)![]() Khader, Dalia ![]() ![]() in Lecture Notes in Informatics (2012) Hao, Ryan, and Zieliński (2010) propose a two-round decentralized voting protocol that is efficient in terms of rounds, computation, and bandwidth. However, the protocol has two drawbacks. First, if some ... [more ▼] Hao, Ryan, and Zieliński (2010) propose a two-round decentralized voting protocol that is efficient in terms of rounds, computation, and bandwidth. However, the protocol has two drawbacks. First, if some voters abort then the election result cannot be announced, that is, the protocol is not robust. Secondly, the last voter can learn the election result before voting, that is, the protocol is not fair. Both drawbacks are typical of other decentralized e-voting protocols. This paper proposes a recovery round to enable the election result to be announced if voters abort, and we add a commitment round to ensure fairness. In addition, we provide a computational security proof of ballot secrecy. [less ▲] Detailed reference viewed: 305 (5 UL)![]() Jostock, Markus ![]() ![]() in Abstract book of 5th International Conference on Integration of Renewable and Distributed Energy Resources (2012) This paper presents a model to describe the mutual frequency disturbance of meshed and interconnected voltage source inverters during transient phases. The model provides a weighted mutual frequency ... [more ▼] This paper presents a model to describe the mutual frequency disturbance of meshed and interconnected voltage source inverters during transient phases. The model provides a weighted mutual frequency coupling matrix taking into account that the mutual frequency measurement disturbance decreases for increasing electric distance between the inverters (i.e. depend on the line admittance) and depends on the respective inverter’s rated power, meaning that stronger inverters have more influence than small ones on the other inverters frequency perception. [less ▲] Detailed reference viewed: 143 (7 UL)![]() Lanze, Fabian ![]() ![]() ![]() in Proceedings of the 55th International IEEE Global Communications Conference (IEEE GLOBECOM 2012) (2012) Detailed reference viewed: 245 (12 UL)![]() Leist, Anja ![]() in Gerontologist (2012), 52(S1), 676-677 Detailed reference viewed: 93 (4 UL)![]() ; ; et al in Proceedings - International Conference on Image Processing, ICIP (2012) We propose an extension of our previous work on spatial domain Time-of-Flight (ToF) data enhancement to the temporal domain. Our goal is to generate enhanced depth maps at the same frame rate of the 2-D ... [more ▼] We propose an extension of our previous work on spatial domain Time-of-Flight (ToF) data enhancement to the temporal domain. Our goal is to generate enhanced depth maps at the same frame rate of the 2-D camera that, coupled with a ToF camera, constitutes a hybrid ToF multi-camera rig. To that end, we first estimate the motion between consecutive 2-D frames, and then use it to predict their corresponding depth maps. The enhanced depth maps result from the fusion between the recorded 2-D frames and the predicted depth maps by using our previous contribution on ToF data enhancement. The experimental results show that the proposed approach overcomes the ToF camera drawbacks; namely, low resolution in space and time and high level of noise within depth measurements, providing enhanced depth maps at video frame rate. © 2012 IEEE. [less ▲] Detailed reference viewed: 201 (0 UL)![]() Song, Ju-Youn ![]() ![]() in Proceedings of the LINQ conference: The future of Learning Innovations and Learning quality: how do they fit together? (2012) The Web2LLP project (“Improving Internet strategies and maximizing the social media presence of Lifelong Learning Programme (LLP) projects”, http://www.web2llp.eu/ is a two-year project running from ... [more ▼] The Web2LLP project (“Improving Internet strategies and maximizing the social media presence of Lifelong Learning Programme (LLP) projects”, http://www.web2llp.eu/ is a two-year project running from January 2012 to December 2013. The partnership consists of six project members: University of Luxembourg, Web2Learn, ATiT, Coventry University Entreprises, Pixel and PAU Education. The original idea for the project stemmed from the need that we felt, as project managers and members involved in LLP projects for several years, for skills and competences that were missing - in both technical and communication terms - regarding the effective use of Internet social media tools, and their embeddedness in the communication strategies that are fundamental to the success of an LLP project. We realized, through informal exchanges with colleagues at EACEA Info days and other project meetings, that although the social web is a reality that cannot be disregarded, its communication potential for LLP projects has not so far been exploited, due to a) a lack of information and appropriation opportunities regarding ways of effectively using these tools as part of a communication strategy, and b) lack of visibility of good practice regarding what is reasonable and achievable in an LLP context. Moreover, although communication is a fundamental piece of every LLP project proposal (one of the required work packages and also a feature under which the project is evaluated both in the intermediary and final reports), there are no guidelines on how to set up a coherent Internet strategy featuring social media tools appropriate to the project. Our project was designed to respond to these needs and it has been selected for funding in 2012 in the highly selective (7% success rate) KA4 action. [less ▲] Detailed reference viewed: 83 (6 UL)![]() Elkateb, Donia ![]() ![]() ![]() in Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering (ICPE 2012) (2012) In order to facilitate managing authorization, access control architectures are designed to separate the business logic from an access control policy. To determine whether a user can access which ... [more ▼] In order to facilitate managing authorization, access control architectures are designed to separate the business logic from an access control policy. To determine whether a user can access which resources, a request is formulated from a component, called a Policy Enforcement Point (PEP) located in application code. Given a request, a Policy Decision Point (PDP) evaluates the request against an access control policy and returns its access decision (i.e., permit or deny) to the PEP. With the growth of sensitive information for protection in an application, an access control policy consists of a larger number of rules, which often cause a performance bottleneck. To address this issue, we propose to refactor access control policies for performance improvement by splitting a policy (handled by a single PDP) into its corresponding multiple policies with a smaller number of rules (handled by multiple PDPs). We define seven attribute-set-based splitting criteria to facilitate splitting a policy. We have conducted an evaluation on three subjects of reallife Java systems, each of which interacts with access control policies. Our evaluation results show that (1) our approach preserves the initial architectural model in terms of interaction between the business logic and its corresponding rules in a policy, and (2) our approach enables to substantially reduce request evaluation time for most splitting criteria. Copyright 2012 ACM. [less ▲] Detailed reference viewed: 159 (0 UL)![]() Jostock, Markus ![]() ![]() in Abstract book of 5th International Conference on Integration of Renewable and Distributed Energy Resources (2012) This paper presents a structured development of a compound state space model of an inverter driven power grid. It allows to perform stability investigations on power grids, depending on the inverter ... [more ▼] This paper presents a structured development of a compound state space model of an inverter driven power grid. It allows to perform stability investigations on power grids, depending on the inverter parameters influencing their dynamich behavior and on the grid structure. The general approach is to separate the active components, i.e. the inverters, from the passive components, i.e. the grid, and model them separately. A state space model of a single voltage source inverter is developed and then extended into a multi-inverter model. Based on the linearized power equations of one grid branch, a matrix representation of the grid is developed, based on the sorted node incidence matrix. The grid matrix model and the multi-inverter state space model are joined into one compound control model for inverter driven power grids. [less ▲] Detailed reference viewed: 184 (6 UL)![]() ; ; Voos, Holger ![]() in Proceedings of 24th Benelux Conference on Artificial Intelligence (2012) Detailed reference viewed: 118 (6 UL)![]() ; Thomas, Lijo ![]() in Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (2012) Access control policies in software systems can be implemented incorrectly for various reasons. This paper presents a model-based approach for automated testing of access control implementation. To feed ... [more ▼] Access control policies in software systems can be implemented incorrectly for various reasons. This paper presents a model-based approach for automated testing of access control implementation. To feed the model-based testing process, test models are constructed by integrating declarative access control rules and contracts (preconditions and post-conditions) of the associated activities. The access control tests are generated from the test models to exercise the interactions of access control activities. Test executability is obtained through a mapping of the modeling elements to implementation constructs. The approach has been implemented in an industry-adopted test automation framework that supports the generation of test code in a variety of languages, such as Java, C, C++, C#, and HTML/Selenium IDE. The full model-based testing process has been applied to two systems implemented in Java. The effectiveness is evaluated in terms of access-control fault detection rate using mutation analysis of access control implementation. The experiments show that the model-based tests killed 99.7% of the mutants and the remaining mutants caused no policy violations. [less ▲] Detailed reference viewed: 167 (0 UL)![]() El Rakaiby, Yehia ![]() ![]() ![]() in Proceedings of the 7th International Workshop on Mutation Analysis (associated to the Fifth International Conference on Software Testing, Verification, and Validation, ICST 2012) (2012) The support of obligations with access control policies allows the expression of more sophisticated requirements such as usage control, availability and privacy. In order to enable the use of these ... [more ▼] The support of obligations with access control policies allows the expression of more sophisticated requirements such as usage control, availability and privacy. In order to enable the use of these policies, it is crucial to ensure their correct enforcement and management in the system. For this reason, this paper introduces a set of mutation operators for obligation policies. The paper first identifies key elements in obligation policy management, then presents mutation operators which injects minimal errors which affect these aspects. Test cases are qualified w.r.t. their ability in detecting problems, simulated by mutation, in the interactions between policy management and the application code. The use of policy mutants as substitutes for real flaws enables a first investigation of testing obligation policies in a system. We validate our work by providing an implementation of the mutation process: the experiments conducted on a Java program provide insights for improving test selection. [less ▲] Detailed reference viewed: 158 (0 UL)![]() Slavkovik, Marija ![]() ![]() in Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, AAMAS2012 (2012) Detailed reference viewed: 59 (2 UL)![]() Elrakaiby, Yehia ![]() ![]() ![]() in Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012 (2012) The support of obligations with access control policies allows the expression of more sophisticated requirements such as usage control, availability and privacy. In order to enable the use of these ... [more ▼] The support of obligations with access control policies allows the expression of more sophisticated requirements such as usage control, availability and privacy. In order to enable the use of these policies, it is crucial to ensure their correct enforcement and management in the system. For this reason, this paper introduces a set of mutation operators for obligation policies. The paper first identifies key elements in obligation policy management, then presents mutation operators which injects minimal errors which affect these aspects. Test cases are qualified w.r.t. their ability in detecting problems, simulated by mutation, in the interactions between policy management and the application code. The use of policy mutants as substitutes for real flaws enables a first investigation of testing obligation policies in a system. We validate our work by providing an implementation of the mutation process: the experiments conducted on a Java program provide insights for improving test selection. © 2012 IEEE. [less ▲] Detailed reference viewed: 131 (0 UL)![]() ; Klein, Jacques ![]() in DSAL'12 - Proceedings of the 7th Workshop on Domain-Specific Aspect Languages (2012) In the construction industry an increasing number of buildings are designed using semantically rich three-dimensional models. In parallel, additional information is specified in a natural-language ... [more ▼] In the construction industry an increasing number of buildings are designed using semantically rich three-dimensional models. In parallel, additional information is specified in a natural-language document called a building specification. 1 As not all details are present in the model these specifications have to be interpreted whenever costs are estimated or other analyses are performed. In this paper, we argue that building specifications contain cross-cutting concerns. We also argue that domain experts should be given the ability to formulate building specifications using a domain-specific aspect language so that the corresponding details can automatically be integrated into the model. The language needs to support a multitude of domain-specific abstractions that are absent in the building meta-model. Therefore we propose to allow the domain experts to extend the language iteratively by defining interpretation patterns [1]. Such a model enriching specification will improve tasks requiring detailed information and will allow for earlier or even concurrent development of the building specification along with the model. © 2012 ACM. [less ▲] Detailed reference viewed: 165 (0 UL)![]() ; ; et al in Lecture Notes in Computer Science (2012), 7585 LNCS(PART 3), 506-515 This paper presents a general refinement procedure that enhances any given depth map obtained by passive or active sensing. Given a depth map, either estimated by triangulation methods or directly ... [more ▼] This paper presents a general refinement procedure that enhances any given depth map obtained by passive or active sensing. Given a depth map, either estimated by triangulation methods or directly provided by the sensing system, and its corresponding 2-D image, we correct the depth values by separately treating regions with undesired effects such as empty holes, texture copying or edge blurring due to homogeneous regions, occlusions, and shadowing. In this work, we use recent depth enhancement filters intended for Time-of-Flight cameras, and adapt them to alternative depth sensing modalities, both active using an RGB-D camera and passive using a dense stereo camera. To that end, we propose specific masks to tackle areas in the scene that require a special treatment. Our experimental results show that such areas are satisfactorily handled by replacing erroneous depth measurements with accurate ones. © 2012 Springer-Verlag. [less ▲] Detailed reference viewed: 172 (1 UL)![]() ; Lenzini, Gabriele ![]() in Lecture Notes in Computer Science (2012), 6573 LNAI Current major P2P systems focus on PCs and do not provide services for the mobile environment. Compared to traditional P2P, characteristics of Mobile P2P include unreliable connections, limited bandwidth ... [more ▼] Current major P2P systems focus on PCs and do not provide services for the mobile environment. Compared to traditional P2P, characteristics of Mobile P2P include unreliable connections, limited bandwidth and constraints of mobile devices. In addition, nomadic users demand applications and services that are context-aware, personalised, secure, and trustworthy. Recommender systems are one of these applications. In this paper, we aim at building a mobile P2P recommender system which dramatically reduces wireless traffic between peers, brings trustworthiness (each peer can choose to rely on opinions of peers whom he trusts), and ffers unobtrusiveness (the target system is mainly autonomous and requires a minimum user intervention). Our solution is based on multi-agent systems and is illustrated on a slow-food restaurant recommender system. © 2012 Springer-Verlag. [less ▲] Detailed reference viewed: 150 (7 UL)![]() ; Zilian, Andreas ![]() in ECCOMAS 2012 - European Congress on Computational Methods in Applied Sciences and Engineering, e-Book Full Papers (2012) In this paper, ideas for the simulation of sliding dry granular materials interacting with surrounding fluids are presented and first results are presented. The compressible granular material is modeled ... [more ▼] In this paper, ideas for the simulation of sliding dry granular materials interacting with surrounding fluids are presented and first results are presented. The compressible granular material is modeled as a medium which can show solid-like and fluid-like characteristics. Therefore a weighted decomposition of stress tensors of a solid-like and a fluid-like phase is applied. The surrounding incompressible fluids are described with a Newtonian constitutive model. Interface dynamics are handled with the level-set method. The model equations are discretized with the space-time finite element method. Discontinuous solution characteristics across interfaces are captured numerically by the extended finite element method (XFEM). For all discontinuities the space of ansatz functions is enriched with Heaviside functions. [less ▲] Detailed reference viewed: 123 (0 UL)![]() de Leeuw, Astrid ![]() in Abstract book du 24e Colloque International de l’ADMEE-Europe (2012) Detailed reference viewed: 66 (1 UL)![]() Hofmann, Mahulena ![]() in European Convention on Human Rights (2012) Detailed reference viewed: 116 (4 UL)![]() Hansen, Joachim ![]() in Proceedings of seminar ‚Abwassertechnik und Gewässerschutz‘ (2012) Detailed reference viewed: 89 (0 UL)![]() Leist, Anja ![]() ![]() ![]() in Gerontologist (2012), 52(S1), 563-564 Detailed reference viewed: 162 (8 UL)![]() ; ; et al in International Design Conference -DESIGN 2012 (2012) The advances in technology and science lead to the creation of mechatronic systems with increasing complexity. Due to this rising complexity of the systems to be developed, the requirements towards the ... [more ▼] The advances in technology and science lead to the creation of mechatronic systems with increasing complexity. Due to this rising complexity of the systems to be developed, the requirements towards the development processes are ascending in the same manner. As a result of the historical evolution of the involved domains (mechanical engineering, electrical engineering and computer science), the specific IT-Tools were not designed for interdisciplinary processes and can usually even barely exchange data among each other. This causes a lack of interoperability and results in ineffective development processes with drawbacks on the consistency of interdisciplinary model data. To deal with this situation, research and industry encouraged the idea of a domain-spanning system model, which contains the cross-domain information and important relations (e. g. Chen et al. 2009). One promising approach to survey these interdisciplinary information and relations and thus help the people participating in the design process is based on multi-agent systems. The basis on which a multi-agent system is able to make decisions concerning the cross-domain information and relations can be a model of the mechatronic system modelled with the modelling language SysML. This paper will present an approach how this system models can be developed using the modelling language SysML and furthermore it will expound a practical model of a real mechatronic system – a turbocharging system for a car engine. [less ▲] Detailed reference viewed: 79 (2 UL)![]() Avanesov, Tigran ![]() ![]() ![]() in Adjunct Proceedings of 4th International Conference on Automotive User Interfaces and Interactive Vehicular Applications (2012), 2 This paper presents an architecture and partially built simulation platform which is designed to offer a flexible open ended approach for conducting laboratory experiments. The emphasis is on supporting ... [more ▼] This paper presents an architecture and partially built simulation platform which is designed to offer a flexible open ended approach for conducting laboratory experiments. The emphasis is on supporting multiple drivers and the ability to swap in and out different software components and devices. [less ▲] Detailed reference viewed: 278 (20 UL)![]() Ignac, Tomasz ![]() ![]() in Proceedings of the Ninth International Workshop on Computational Systems Biology (2012) We propose here a natural, but substantive, extension of the MIC. Defined for two variables, MIC has a distinct advance for detecting potentially complex dependencies. Our extension provides a similar ... [more ▼] We propose here a natural, but substantive, extension of the MIC. Defined for two variables, MIC has a distinct advance for detecting potentially complex dependencies. Our extension provides a similar means for dependencies among three variables. This itself is an important step for practical applications. We show that by merging two concepts, the interaction information, which is a generalization of the mutual information to three variables, and the normalized information distance, which measures informational sharing between two variables, we can extend the fundamental idea of MIC. Our results also exhibit some attractive properties that should be useful for practical applications in data analysis. Finally, the conceptual and mathematical framework presented here can be used to generalize the idea of MIC to the multi-variable case. [less ▲] Detailed reference viewed: 245 (9 UL)![]() ; ; et al in IEEE International Conference on Communications (2012) We consider the beamformer design for zero-forcing dirty paper coding (ZF-DPC), a suboptimal transmission technique for MISO broadcast channels (MISO BCs). Beamformers for ZF-DPC are designed to maximize ... [more ▼] We consider the beamformer design for zero-forcing dirty paper coding (ZF-DPC), a suboptimal transmission technique for MISO broadcast channels (MISO BCs). Beamformers for ZF-DPC are designed to maximize a performance measure, subject to some power constraints and zero-interference constraints. For the sum rate maximization problem under a total power constraint, the existing beamformer designs in the literature are based on the QR decomposition (QRD), which is used to satisfy the ZF constraints. However, the optimality of the QRD-based design is still unknown. First, we prove that the QRD-based design is indeed optimal for ZF-DPC for any performance measure under a sum power constraint. For the per-antenna power constraints, the QRD-based designs become suboptimal, and we propose an optimal design, using a convex optimization framework. Low-complexity suboptimal designs are also presented. © 2012 IEEE. [less ▲] Detailed reference viewed: 143 (0 UL)![]() Ryan, Peter ![]() in Socio-Technical Aspects in Security and Trust (STAST), 2012 Workshop on (2012) This volume comprises the proceedings of the second workshop on Socio-Technical Aspects of Security and Trust (STAST). The diversity of the topics covered in this proceedings reflect the vibrancy of the ... [more ▼] This volume comprises the proceedings of the second workshop on Socio-Technical Aspects of Security and Trust (STAST). The diversity of the topics covered in this proceedings reflect the vibrancy of the socio-technical research community within information security. Contributions range from HCIoriented research through organizational process design and decision making. Twelve papers were submitted of which six papers were judged to be of high quality accepted for presentation and publication. We should like to offer our thanks for the professionalism of the authors, reviewers, sub-reviewers and the program committee members. All papers were reviewed by at least three reviewers from the program committee, with the help of external reviewers. [less ▲] Detailed reference viewed: 129 (1 UL)![]() ; ; van der Torre, Leon ![]() in Proceedings of the First International Conference on Agreement Technologies, AT 2012 (2012) Detailed reference viewed: 54 (0 UL)![]() Seredynski, Marcin ![]() ![]() ![]() in Proceedings of the IEEE Congress on Evolutionary Computation (2012) Detailed reference viewed: 184 (28 UL)![]() ; ; et al in Dagstuhl Reports (2012), 2(3), 23-49 Normative systems are systems in the behavior of which norms play a role and which need normative concepts in order to be described or specified. A normative multi-agent system combines models for ... [more ▼] Normative systems are systems in the behavior of which norms play a role and which need normative concepts in order to be described or specified. A normative multi-agent system combines models for normative systems (dealing for example with obligations, permissions and prohibitions) with models for multi-agent systems. Norms have been proposed in multi-agent systems and computer science to deal with issues of coordination, security, electronic commerce and institutions, agent organization. However, due to the lack of a unified theory, many multi-agent system researchers are presently developing their own ad hoc concepts and applications. The aim of this Dagstuhl Seminar was to formulate a collective appraisal of the current perspectives in the field and the most promising venues for future activity. In particular, the seminar has been conceived for the writing of a volume titled "A Prospective view of Normative Multi Agent Systems" aimed to become a standard reference in the field and to provide guidelines for future research in normative multi-agent systems. [less ▲] Detailed reference viewed: 111 (1 UL)![]() Tomaschek, Jörg ![]() in ESAIM: Proceedings and Surveys (2012), 36 We study the generalized Dhombres functional equation f(zf(z)) = ϕ(f(z)) in the complex domain. The function ϕ is given and we are looking for solutions f with f(0) = w0 and w0 is a primitive root of ... [more ▼] We study the generalized Dhombres functional equation f(zf(z)) = ϕ(f(z)) in the complex domain. The function ϕ is given and we are looking for solutions f with f(0) = w0 and w0 is a primitive root of unity of order l ≥ 2. All formal solutions for this case are described in this work, for the situation where ϕ can be transformed into a function which is linearizable and local analytic in a neighbourhood of zero we also show that we obtain local analytic solutions. We also discuss an example where it is possible to use other methods than we use in the general case. [less ▲] Detailed reference viewed: 92 (0 UL)![]() Palattella, Maria Rita ![]() in Proceedings of IEEE Sensors 2012 (2012) Detailed reference viewed: 290 (3 UL)![]() ; ; Amrani, Moussa ![]() in Workshop on Models And Evolution, co-located with MoDELS 2012 (2012) In a Model-Driven Development project, models are typically built iteratively to better satisfy a set of requirements. Therefore it is crucial to guarantee that one iteration of a model evolution does not ... [more ▼] In a Model-Driven Development project, models are typically built iteratively to better satisfy a set of requirements. Therefore it is crucial to guarantee that one iteration of a model evolution does not hinder the previous version. In this paper, we focus on invariant preservation of behavioral models expressed in Algebraic Petri Nets. The theory developed is applied to a Multi-Level Security File System modeled iteratively. We also discuss how this approach can be applied on Domain-Specific Languages that are translated to Algebraic Petri Nets. [less ▲] Detailed reference viewed: 105 (1 UL)![]() Leist, Anja ![]() ![]() in Verhaltenstherapie (2011, September), 21(S1), 14-14 Detailed reference viewed: 121 (1 UL)![]() Rienstra, Tjitze ![]() in Proceedings of the 1st International Workshop on the Theory and Applications of Formal Argumentation (TAFA 2011) (2011, July 16), 7132 In the theory of abstract argumentation, the acceptance status of arguments is normally determined for the complete set of arguments at once, under a single semantics. However, this is not always desired ... [more ▼] In the theory of abstract argumentation, the acceptance status of arguments is normally determined for the complete set of arguments at once, under a single semantics. However, this is not always desired. In this paper, we extend the notion of an argumentation framework to a multi-sorted argumentation framework, and we motivate this extension using an example which considers practical and epistemic arguments. In a multi-sorted argumentation framework, the arguments are partitioned into a number of cells, where each cell is associated with a semantics under which its arguments are evaluated. We prove the properties of the proposed framework, and we demonstrate our theory with a number of examples. Finally, we relate our theory to the theory of modal fibring of argumentation networks. [less ▲] Detailed reference viewed: 113 (0 UL)![]() Lang, J. ![]() ![]() ![]() in Actes des Cinquièmes Journées Francophones Modèles Formel de l'Interaction (MFI 11) (2011, July 12), XIII Many voting rules are based on some minimization principle. Likewise, in the field of logic-based knowledge representation and reasoning, many belief change or inconsistency handling operators also make ... [more ▼] Many voting rules are based on some minimization principle. Likewise, in the field of logic-based knowledge representation and reasoning, many belief change or inconsistency handling operators also make use of minimization. Surprisingly, minimization has not played a major role in the field of judgment aggregation, in spite of its proximity to voting theory and logic-based knowledge representation and reasoning. Here we make a step in this direction and study six judgment aggregation rules; two of them, based on distances, have been previously defined; the other four are new, and all inspired both by voting theory and knowledge representation and reasoning. We study the inclusion relationships between these rules and address some of their social choice theoretic properties. [less ▲] Detailed reference viewed: 139 (0 UL)![]() ; Odenbreit, Christoph ![]() in OCEANS 2011 IEEE - Spain (2011, June 06) In this paper, several reliability analyses of a sheet pile wall in a marine environment were performed, in which the influence of a wide range of corrosion models on its safety was assessed. The First ... [more ▼] In this paper, several reliability analyses of a sheet pile wall in a marine environment were performed, in which the influence of a wide range of corrosion models on its safety was assessed. The First Order Reliability Method (FORM) was used and the reliability analyses were performed using a combination of different programs. The effect that the variation of the coefficient of variation CoV of the probability distributions has on the measured level of safety is not linear. For certain ranges of CoV, the influence on the safety level is not very significant, whereas in other ranges it causes an abrupt reduction of the safety, meaning that the access to good quality data of the corrosion-rate is important to avoid erroneous conclusions about the safety. A design procedure to include the effect of corrosion in the safety of the structure was also developed. [less ▲] Detailed reference viewed: 36 (5 UL)![]() Ancel, Pascal ![]() in Les médiations: la justice autrement? (2011, June) Detailed reference viewed: 64 (6 UL)![]() Valois, Pierre ![]() ![]() in Procedia Social and Behavioral Sciences (2011, February), 15 Professionals of education are constantly developing new instruments of evaluation. Even though the use of all sorts of evaluation tools increased during the last decades, it is often difficult for ... [more ▼] Professionals of education are constantly developing new instruments of evaluation. Even though the use of all sorts of evaluation tools increased during the last decades, it is often difficult for teachers to verify the qualities of their instruments. To provide a solution to this problem, we have developed a free, user-friendly Excel add-in (EIRT), based on Classical Test Theory and Item Response Theory. Item analyses are performed without the requirement of being a computer expert. The objective of this paper is to present this new item analysis program aimed to verify the psychometric properties of an evaluation tool. [less ▲] Detailed reference viewed: 158 (2 UL)![]() Panchenko, Andriy ![]() in Abstract book of 17th Conference on Communication in Distributed Systems (KiVS'11), Kiel, Germany (2011) Detailed reference viewed: 102 (3 UL)![]() Leist, Anja ![]() ![]() in Gerontologist (2011), 51(S2), 356-357 Detailed reference viewed: 186 (5 UL)![]() Garcia, Guadalupe Clara ![]() in BMC Neuroscience (2011), 12 Detailed reference viewed: 128 (3 UL)![]() Kolodkin, Alexey ![]() in Toxicology (2011), 290(2-3), 131-132 Detailed reference viewed: 123 (7 UL)![]() ; Zilian, Andreas ![]() in Proceedings of the 4th International Conference on Computational Methods for Coupled Problems in Science and Engineering, COUPLED PROBLEMS 2011 (2011) A monolithic approach to fluid-structure interactions based on the space-time finite element method (STFEM) is presented. The method is applied to the investigation of stress states in silos filled with ... [more ▼] A monolithic approach to fluid-structure interactions based on the space-time finite element method (STFEM) is presented. The method is applied to the investigation of stress states in silos filled with granular material during discharge. The thin-walled siloshell is modeled in a continuum approach as elastic solid material, whereas the flowing granular material is described by an enhanced viscoplastic non-Newtonian fluid model. The weak forms of the governing equations are discretized by STFEM for both solid and fluid domain. To adapt the matching mesh nodes of the fluid domain to the structural deformations, a mesh-moving scheme using a neo-Hookean pseudo-solid is applied. The finite element approximation of non-smooth solution characteristics is enhanced by the extended finite element method (XFEM). The proposed methodology is applied to the 4D (space-time) investigation of deformation-dependent loading conditions during silo discharge. [less ▲] Detailed reference viewed: 121 (1 UL)![]() Janssen-Bennynck, Clemence ![]() in L'indépendance de la justice, Actes de la journée d'étude de l'Institut d'études de droit public (IEDP) du 19 novembre 2010 (2011) Detailed reference viewed: 100 (19 UL)![]() Pinel, Frédéric ![]() ![]() in Proceedings of the Second International Conference on Parallel, Distributed, Grid and Cloud Computing for Engineering (2011) This paper exposes the mismatch between the classic problem representation in the scheduling problem of independent task mapping and the reality of multi-core proces- sors, operating system driven power ... [more ▼] This paper exposes the mismatch between the classic problem representation in the scheduling problem of independent task mapping and the reality of multi-core proces- sors, operating system driven power management and time sharing for overlapping I/O with computation. A new, simple, model is proposed to address this gap. The model, along with a scheduling heuristic, are applied to the evaluation of software pipelin- ing in the context of the recent millicomputing initiative. [less ▲] Detailed reference viewed: 157 (12 UL)![]() Le Coz, Glenn-Marie ![]() ![]() ![]() in European Journal of Pain (2011), 5(1), 53 Detailed reference viewed: 65 (2 UL)![]() Albert, Isabelle ![]() ![]() in Abstractband EPSY (2011) Die Erforschung von Ambivalenz in intergenerationalen Beziehungen hat sich in den letzten Jahren schwerpunktmäßig mit Übergängen in Eltern-Kind-Beziehungen im Erwachsenenalter befasst. Frühere Phasen in ... [more ▼] Die Erforschung von Ambivalenz in intergenerationalen Beziehungen hat sich in den letzten Jahren schwerpunktmäßig mit Übergängen in Eltern-Kind-Beziehungen im Erwachsenenalter befasst. Frühere Phasen in Eltern-Kind-Beziehungen wurden hingegen seltener unter diesem Gesichtspunkt betrachtet. Gerade der Prozess der Individuation im Jugend- und jungen Erwachsenenalter ist jedoch von Dynamiken der gleichzeitigen Suche nach Nähe und Abgrenzung bestimmt, die mit widersprüchlichen Emotionen und Handlungstendenzen einhergehen können. Die innerfamiliale Regulation unterschiedlicher Bedürfnisse sollte dabei nicht zuletzt auch vom elterlichen Erziehungsverhalten abhängen. Ziel der vorliegenden Studie ist es, die erlebte Ambivalenz von Jugendlichen und jungen Erwachsenen im Zusammenhang mit dem wahrgenommenen elterlichen Erziehungsverhalten zu untersuchen und zwar unter Berücksichtigung der Frage, ob das Alter der Befragten einen Moderator dieses Zusammenhangs darstellt. Die Stichprobe besteht aus N = 233 luxemburgischen Jugendlichen und jungen Erwachsenen im Alter zwischen 14 und 25 Jahren, die mittels eines standardisierten Fragebogens das wahrgenommene elterliche Erziehungsverhalten (Wärme, psychologische Kontrolle und Verhaltenskontrolle) und ihre erlebte Ambivalenz zu Vater und Mutter einschätzten. Die Analysen zeigten insbesondere einen starken positiven Zusammenhang zwischen elterlicher psychologischer Kontrolle und Ambivalenz über alle Altersgruppen hinweg, wohingegen elterliche Wärme durchweg einen negativen Zusammenhang zum Erleben von Ambivalenz gegenüber beiden Eltern aufzeigte. Hingegen war die mütterliche Verhaltenskontrolle nur bei älteren Jugendlichen und jungen Erwachsenen mit dem Erleben von Ambivalenz gegenüber den eigenen Müttern verbunden; in den Beziehungen zum Vater zeigten sich keine Altersunterschiede im positiven Zusammenhang zwischen Verhaltenskontrolle und Ambivalenz. Die vorliegende Studie liefert damit einen wichtigen Beitrag zur Erforschung von Ambivalenz in früheren Abschnitten der Entwicklung sowie einen weiteren Hinweis darauf, dass insbesondere die mütterliche Verhaltenskontrolle je nach Alter des Jugendlichen unterschiedliche Bedeutungen haben kann. Die Ergebnisse werden vor dem Hintergrund der intrafamilialen Regulation von Beziehungen im Individuationsprozess diskutiert. [less ▲] Detailed reference viewed: 333 (4 UL)![]() Fourneret, Elizabeta ![]() in Proceedings of 6th International Conference on Availability, Reliability and Security (ARES 2011) (2011) Model-Based Testing (MBT) is a widely used methodology for generating tests aiming to ensure that the system behaviour conforms to its specification. Recently, it has been successfully applied for testing ... [more ▼] Model-Based Testing (MBT) is a widely used methodology for generating tests aiming to ensure that the system behaviour conforms to its specification. Recently, it has been successfully applied for testing certain security properties. However, for the success of this approach, it is an important prerequisite to consider the correctness of test models with respect to the given security property. In this paper we present an approach for smart-card specific security properties that permits to validate the system with MBT from test schemas. We combine this MBT approach with UMLsec security verification technique, by using UMLsec stereotypes to verify the model w.r.t. given security properties and gain more confidence in the model. We then define an automatic procedure to generate security test from the UMLsec model via so-called "test schemas". We validate this approach on a fragment of the Global Platform specification and report on available tool support. [less ▲] Detailed reference viewed: 88 (2 UL)![]() Yuan, Qixia ![]() ![]() ![]() in Proceedings of the 3rd Workshop on Computational Models for Cell Processes (2011), EPTCS 67 Detailed reference viewed: 169 (13 UL)![]() Bungard, Volker ![]() ![]() ![]() in CD-Proceedings, Paper ID: 358 (2011) Detailed reference viewed: 120 (29 UL)![]() van Deursen, Ton ![]() in Privacy and Identity Management for Life (2011), 352 Detailed reference viewed: 68 (0 UL)![]() ; Waldmann, Danièle ![]() in RF2B 2011 – 12ème édition des Journées scientifiques du Regroupement francophone pour la recherche et la formation sur le béton (2011) Detailed reference viewed: 106 (22 UL)![]() Schölzel, Karsten ![]() in Proceedings - 41st IEEE International Symposium on Multiple-Valued Logic, ISMVL 2011 (2011) A Galois connection between partial clones and a new variant of relation algebras is established. We introduce a new elementary operation on relations which captures the difference between total and ... [more ▼] A Galois connection between partial clones and a new variant of relation algebras is established. We introduce a new elementary operation on relations which captures the difference between total and partial clones and allows us to adapt the proof of the Galois connection from the total case to the partial case. This Galois connection is able to capture all partial clones and is not restricted to strong partial clones as in previous work. [less ▲] Detailed reference viewed: 85 (0 UL)![]() Mauw, Sjouke ![]() in Proceedings of 19th Security Protocols Workshop (2011), 7114 Detailed reference viewed: 104 (1 UL)![]() Jostock, Markus ![]() ![]() in Abstract paper of 2011 Grande Region Security and Reliability Day (2011) The purpose of this paper is to present the capabilities of the new NetPower DemoLab of the Interdisciplinary Centre for Reliability and Trust at the University of Luxembourg, operated by the Systems and ... [more ▼] The purpose of this paper is to present the capabilities of the new NetPower DemoLab of the Interdisciplinary Centre for Reliability and Trust at the University of Luxembourg, operated by the Systems and Control group, and to stimulate potential public or private collaborations in the area of SCADA security and reliability investigations. [less ▲] Detailed reference viewed: 169 (11 UL)![]() Louveton, Nicolas ![]() in Perception (2011) Detailed reference viewed: 71 (5 UL)![]() Albert, Isabelle ![]() ![]() in Von der Forschung zur Praxis: 13. Kongress der DGVM (2011) Die Frage nach Zuständigkeiten für Pflege und Unterstützung im Alter ist in den letzten Jahren im Zuge des demographischen Wandels immer mehr in das Zentrum des öffentlichen Interesses gerückt und hat ... [more ▼] Die Frage nach Zuständigkeiten für Pflege und Unterstützung im Alter ist in den letzten Jahren im Zuge des demographischen Wandels immer mehr in das Zentrum des öffentlichen Interesses gerückt und hat zahlreiche Forschungsaktivitäten angeregt. Insbesondere die Erforschung von Eltern-Kind-Beziehungen im Erwachsenenalter hat dabei stark an Bedeutung gewonnen, da ein Großteil an intergenerationeller Unterstützung innerhalb der Familie geleistet wird. In Anlehnung an das Modell der intergenerationalen Solidarität sensu Bengtson (z.B. Bengtson & Roberts, 1991) als theoretischer Bezugsrahmen werden in der vorliegenden Studie unterschiedliche Dimensionen der Solidarität umschrieben und Korrelate intergenerationeller Unterstützung zwischen erwachsenen Kindern und ihren Müttern analysiert. Die Stichprobe bestand aus insgesamt N = 123 Personen im mittleren Erwachsenenalter (davon 31.1% männlich) zwischen 32 und 64 (M = 44.99, SD = 6.68) Jahren, die anhand eines standardisierten Fragebogens über Aspekte der Beziehungen zu ihren Müttern (gegebene und erhaltene Unterstützung, internalisierte Familiennormen, emotionale Beziehungsqualität zur Mutter, Gefühle der Ambivalenz gegenüber der Mutter) befragt wurden. Es lagen demnach Auskünfte über Mütter im Alter zwischen 54 und 93 Jahren (M = 72.58, M = 7.99) vor, von denen die meisten nach Angaben ihrer Kinder über einen relativ guten oder im mittleren Bereich liegenden Gesundheitszustand verfügten, in 16 Fällen war jedoch eine Pflegebedürftigkeit gegeben. Die Ergebnisse zeigten, dass vor allem die emotionale Beziehungsqualität sowie internalisierte Familiennormen den Austausch von Unterstützung bedingen, wohingegen Kontextmerkmale (wie Familienstand, Gesundheitszustand der Mutter; Berufstätigkeit des Kindes) weniger stark mit Aspekten der Solidarität zusammenhingen. Ferner wurde das Auftreten ambivalenter Gefühle im Zusammenhang mit der Unterstützung für Mütter durch eine internalisierte Familienorientierung moderiert: Respondenten, die bei starker Familienorientierung hohe Unterstützungsleistungen erbrachten, berichteten über weniger ambivalente Gefühle als Personen, die bei niedriger Familienorientierung hohe Unterstützungsleistungen erbrachten. Die Ergebnisse werden mit Blick auf mögliche Voraussagen für Situationen späterer Pflegebedürftigkeit und unter Berücksichtigung intrafamilialer Prozesse der intergenerationellen Beziehungsregulation diskutiert. [less ▲] Detailed reference viewed: 197 (0 UL)![]() Waldmann, Danièle ![]() ![]() ![]() in Federation for Structural Concrete (fib) (2011) Detailed reference viewed: 104 (29 UL)![]() Albert, Isabelle ![]() ![]() in Vortrag beim 2. Werkstattgespräch „Ambivalenz“ (2011) Detailed reference viewed: 57 (2 UL)![]() Dorronsoro, Bernabé ![]() ![]() in Nature Inspired Distributed Computing (NIDISC) sessions of the International Parallel and Distributed Processing Symposium (IPDPS) 2011 Workshop (2011) Detailed reference viewed: 123 (1 UL)![]() Bertholon, Benoit ![]() ![]() ![]() in RenPar'20 2011 (2011) La sécurité des Clouds est un aspect essentiel qui n'est pas forcément abordé selon le point de vue de l'utilisateur. En particulier, sur une plate-forme de type IaaS, il est actuellement impossible pour ... [more ▼] La sécurité des Clouds est un aspect essentiel qui n'est pas forcément abordé selon le point de vue de l'utilisateur. En particulier, sur une plate-forme de type IaaS, il est actuellement impossible pour un utilisateur de certifier de manière fiable et sécurisée que l'environnement qu'il a déployé (typiquement sous forme d'une machine virtuelle) est toujours dans un état qu'il juge intègre et opérationnel. Cet article s'attelle à cette tâche en proposant CertiCloud, une plate-forme Cloud de type IaaS qui exploite les concepts développés dans le cadre du TCG mais aussi les éléments matériels que sont les TPM pour offrir à l'utilisateur un environnement sécurisé et sécurisant. Ces deux aspects sont garantis par les deux protocoles TCRR et VerifMyVM qui sont à la base de CertiCloud. Quand le premier permet de certifier l'intégrité d'une machine distante et d'échanger une clef de chiffrement symétrique, le second permet à l'utilisateur de s'assurer dynamiquement et à la demande de l'intégrité de sa machine virtuelle exécutée sur les ressources de \CertiC. Ces deux protocoles étant les briques de base de notre plate-forme, une attention toute particulière a été apportée à leurs élaborations. A cet effet, ils ont été validés avec succès par AVISPA et Scyther, deux outils de référence dans le domaine de la vérification automatique des protocoles de sécurité (cette analyse est présentée dans cet article). Ensuite, la plate-forme CertiCloud est détaillée: outre les protocoles TCRR et VerifMyVM, elle propose le stockage sécurisé des environnements utilisateurs et leurs exécutions à travers un framework de virtualisation reprenant l'hyperviseur Xen. Quand les ressources physiques sont certifiées par TCRR, l'utilisateur peut utiliser à la demande le protocole VerifMyVM pour s'assurer de l'intégrité de son environnement déployé. Un prototype de CertiCloud a été réalisé et nous présentons les premiers résultats expérimentaux qui démontrent de la faisabilité et du faible surcoût de notre approche sur des scénarios classiquement rencontrés sur les infrastructures Cloud de type IaaS. [less ▲] Detailed reference viewed: 162 (7 UL)![]() Ouzzahra, Yacine ![]() in The Fourth International Conference on Human-Environment System (2011) Detailed reference viewed: 41 (1 UL)![]() ; Slavkovik, Marija ![]() in Works-in-progress track - 3rd International Conference on Social Robotics (2011) Cooperative anchoring is the sharing of associations between symbols and sensor data across multi robot systems. We apply the solution of Judgment Aggregation, a logic based collective-decision making ... [more ▼] Cooperative anchoring is the sharing of associations between symbols and sensor data across multi robot systems. We apply the solution of Judgment Aggregation, a logic based collective-decision making framework from social choice theory to the problem of cooperative anchoring in terms of information fusion. We model a multi-agent system comprising of nao robots on a search exercise using its vision and audition sensor into this framework and fuse them by means of aggregation rules and compare them on a truth-tracking basis. [less ▲] Detailed reference viewed: 59 (0 UL)![]() ; ; et al in Proceedings of 12th Int. Conf. on Thermal, Mechanical and Multi-Physics Simulation and Experiments in Microelectronics and Microsystems, EuroSimE 2011 (2011) Predicting the lifetime of solder joints undergoing thermal cycling is crucial for the electronics industry in order to guarantee a certain performance of their products in the field. Semi-empirical ... [more ▼] Predicting the lifetime of solder joints undergoing thermal cycling is crucial for the electronics industry in order to guarantee a certain performance of their products in the field. Semi-empirical methods are often used to predict the average lifetime of the critical joints. However, to get a reliable failure probability the standard deviation must also be addressed. The deviation of the lifetime from the mean value is a consequence of the variation in microstructure found in actual joints. We therefore propose a new methodology that calculates crack growth based on microstructural features of the joint. A series of random microstructures is generated. Crack growth calculations are performed for each of these structures. The structural problem is solved numerically with the extended finite element method which allows a complete automation of the process. The mean crack length and standard deviation are calculated from the crack growth simulations and the result is compared to experimental data. [less ▲] Detailed reference viewed: 103 (1 UL)![]() Bartel, Alexandre ![]() in 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops (2011) Dynamically Adaptive Systems modify their behavior and structure in response to changes in their surrounding environment and according to an adaptation logic. Critical systems increasingly incorporate ... [more ▼] Dynamically Adaptive Systems modify their behavior and structure in response to changes in their surrounding environment and according to an adaptation logic. Critical systems increasingly incorporate dynamic adaptation capabilities, examples include disaster relief and space exploration systems. In this paper, we focus on mutation testing of the adaptation logic. We propose a fault model for adaptation logics that classifies faults into environmental completeness and adaptation correctness. Since there are several adaptation logic languages relying on the same underlying concepts, the fault model is expressed independently from specific adaptation languages. Taking benefit from model-driven engineering technology, we express these common concepts in a metamodel and define the operational semantics of mutation operators at this level. Mutation is applied on model elements and model transformations are used to propagate these changes to a given adaptation policy in the chosen formalism. Preliminary results on an adaptive web server highlight the difficulty of killing mutants for adaptive systems, and thus the difficulty of generating efficient tests. [less ▲] Detailed reference viewed: 233 (7 UL)![]() Beierlein-Sibisi, N. ![]() ![]() in Microbes in Wastewater and waste Treatment, Bioremediation, and Energy Production (2011) Detailed reference viewed: 52 (1 UL)![]() Bourkel, Elisabeth ![]() ![]() in Psychology and Health (2011), 26(Sup2), 256-256 Detailed reference viewed: 78 (8 UL)![]() ; ; Ferring, Dieter ![]() in Proceedings of In R. Wichert, K. van Learhoven, & J. Gelissen (Eds.) (2011) With Europes aging population and an increasing number of older people living alone or geographically distant from kin, loneliness is turning into a prevalent issue. This might involve deleterious ... [more ▼] With Europes aging population and an increasing number of older people living alone or geographically distant from kin, loneliness is turning into a prevalent issue. This might involve deleterious consequences for both the older person and society, such as depression and increased use of healthcare services. Virtual coaches that act as friend in a para-social relationship but also as mentor that helps the elderly end- user to create meaningful relationships in his actual social environment are a powerful method to overcome loneliness and increase the quality of life in the elderly population.The AAL Joint Programme projects A2E2 (AAL-2008-1-071) and V2me (AAL-2009-2-107) are exploring virtual coaches and their application in AAL scenarios, including the use of user avatars, virtual self-representations that allow the user to be represented in communication scenarios. Other European research projects that focus on social integration of the elderly are e.g. ALICE (AAL-2009-2-091) or WeCare (AAL-2009-2-026). Outside the European Union the negative implications of population aging can be observed in Japan, having an even larger proportion of senior citizens, using individual-centred devices, such as robot pets,1 to improve the quality of life of lonely elderly persons. The user groups involved often are not acquainted with modern ICT systems and therefore it is a challenge to create intuitive, adaptive platforms that cater to the individual needs and allow the user to interact easily. [less ▲] Detailed reference viewed: 109 (2 UL)![]() Weber, Jean-Marie ![]() in Actes du congrès : AREF 2010 Congrès international: Actualité de la recherche en sciences de l'éducation (2011) Dans l’approche de leur futur métier, les jeunes enseignants-stagiaires sont souvent menés par différents fantasmes par rapport à la réalité en classe et la transmission du savoir. À ce sujet, un ... [more ▼] Dans l’approche de leur futur métier, les jeunes enseignants-stagiaires sont souvent menés par différents fantasmes par rapport à la réalité en classe et la transmission du savoir. À ce sujet, un dispositif d’analyse des pratiques a été mis en place à l’Université du Luxembourg en 2005 dans le cadre de la formation des enseignants du secondaire. Ma visée pour ce genre de travail était d’aider les stagiaires à s’ouvrir à l’altérité de l’autre et à savoir trouer leurs propres croyances et représentations, à savoir se considérer partie prenante dans leur observation et jugements et à se découvrir à une place de sachant et de supposé savoir. Le travail sur le transfert devra permettre de voir comment le rapport au savoir et à la vérité est en jeu dans la relation avec les élèves. À ce sujet je me demandais : quels peuvent être les effets et les limites et défis de cette démarche ? Premières conclusions : ? grâce à ce dispositif les stagiaires peuvent confronter le manque de savoir, la différence entre savoir et vérité, trouer certaines positions imaginaires et développer de nouveaux signifiants ; ? l’analyse de mes propres contre-transferts m’a aidé à développer le dispositif. [less ▲] Detailed reference viewed: 98 (1 UL)![]() Ferring, Dieter ![]() in Proceedings In E.-M. Kessler, & H.-W. Wahl (Chairs), Subjektive Repräsentationen von normalem und pathologischem Altern. (2011) Detailed reference viewed: 80 (4 UL)![]() Schuller, Anne-Marie ![]() in Journal of Cognitive Neuroscience (2011) Detailed reference viewed: 72 (5 UL)![]() Schumacher, Anette ![]() in The Asian Conference on Cultural Studies 2011 - Official Conference Proceedings (2011) In 2005 a new concept of institutional childcare called "Maison Relais pour Enfants" (MRE) was established in Luxembourg. That can be considered as a flexible answer to an increasingly complex society ... [more ▼] In 2005 a new concept of institutional childcare called "Maison Relais pour Enfants" (MRE) was established in Luxembourg. That can be considered as a flexible answer to an increasingly complex society. The MRE aims to facilitate the reconciliation of work and private life, especially for parents with children aged between 3 and 48 months. This study accompanies the establishment of MRE for members of the University of Luxembourg and the neighborhood around the MRE. As a first step, we interviewed 45 persons (parents, staff and politicians) driven by the need to understand their expectations of the varied functions of the new MRE. The special situation in Luxembourg, a small European country with a highly developed economy, a trilingual education system and one of the ten highest net migration rates in the world, results in many different social environments. First results indicate that there are different ideas about the role of the MRE for giving satisfaction to the children and their parents. Results also show that mothers and fathers handle their Work-Life-Balance depending on their (cross) cultural background; parents often feel "guilty" and they are confronted with a whole range of conflicting thoughts and ideologies of their social environments and related party. [less ▲] Detailed reference viewed: 64 (4 UL)![]() Albert, Isabelle ![]() ![]() in Abstract book of 15th European Conference on Developmental Psychology (2011) Referring to gender role models of socialization, the intergenerational transmission of values within families should generally be higher in same-gender compared to mixed dyads. However, empirical studies ... [more ▼] Referring to gender role models of socialization, the intergenerational transmission of values within families should generally be higher in same-gender compared to mixed dyads. However, empirical studies have not always supported this assumption. Recent research has suggested that different results might be expected depending on the specific value content. The aim of the present study is to investigate the influence of the parent-child gender constellation on value similarities in families with adolescents in Luxembourg, focusing on gender-related and general family values. A sample of N = 46 family triads, i.e. adolescents (n=22 boys, n=24 girls) between age 15 and 20 together with their mothers and fathers, were interviewed on values about hierarchical gender roles as well as obligations towards family members. Analyses showed that both daughters and sons were more similar to mothers compared to fathers in their respective value profiles. Analyzing the similarities between the adolescent and parent generation showed that daughters were more similar to the typical female and sons more similar to the typical male value profile. Regarding specific value contents, fathers’ and sons’ values about obligations towards family members were related to each other. Moreover, similarities in values about hierarchical gender roles were showed for both mother-daughter and mother-son dyads. This finding was further specified, given that sons agreed more than mothers with values about hierarchical gender roles, indicating thus a relative (not absolute) mother-son value transmission. Results are discussed from theoretical perspectives of gender role socialization as well as gender specific salience of value orientations. [less ▲] Detailed reference viewed: 167 (1 UL)![]() Liu, Zhiyuan ![]() ![]() ![]() in Proceedings of the 3rd Workshop on Harnessing Theories for Tool Support in Software (2011), ENTCS 274 Detailed reference viewed: 114 (4 UL)![]() van Deursen, Ton ![]() ![]() ![]() in Abstract book of 20th USENIX Security Symposium (2011) Detailed reference viewed: 40 (1 UL)![]() Cicotti, Claudio ![]() in PRISMI (2011) Detailed reference viewed: 57 (2 UL)![]() Fourneret, Elizabeta ![]() in Proceedings of 4th IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW 2011) (2011) We present in this paper the implementation of a model-based testing technique for evolving systems. These latters are described in UML using class/object diagrams and state charts, augmented with OCL ... [more ▼] We present in this paper the implementation of a model-based testing technique for evolving systems. These latters are described in UML using class/object diagrams and state charts, augmented with OCL constraints. Based on two versions of a given model, an automated process deduces the impact of model evolutions on the existing tests. Our methodology then classifies tests into different test suites to test evolution, regression, stagnation and deletion on the concrete system. We introduce the notion of tests and test suites life cycles that help defining the purpose of each test at a given step of the system evolution, and thus, their classification in different test suites. The approach is illustrated on a realistic case study, and the improvements w.r.t. other regression testing techniques are discussed. [less ▲] Detailed reference viewed: 81 (1 UL)![]() Ouzzahra, Yacine ![]() in Fourteenth International Conference on Environmental Ergonomics (2011) Detailed reference viewed: 42 (3 UL)![]() Ancel, Pascal ![]() in Verjährungsrecht in Europa zwischen Bewährung und Reform (2011) Detailed reference viewed: 73 (2 UL)![]() Albert, Isabelle ![]() ![]() ![]() in Proceedings of IACCP Regional Conference (2011) In acculturation research, the convergence/divergence in value orientations of immigrants and host nationals as well as the question of an acculturation gap between first- and second generation immigrants ... [more ▼] In acculturation research, the convergence/divergence in value orientations of immigrants and host nationals as well as the question of an acculturation gap between first- and second generation immigrants are important issues. The present study examines similarities and differences between first- and second generation immigrants compared to host nationals in a sample of n = 51 Luxembourgish and Portuguese mother-daughter dyads living in Luxembourg who were interviewed with a standardized questionnaire regarding (a) value orientations, (b) family norms, and (c) self-construal. Controlling for the psychometric properties of the national groups, mean comparisons indicated an acculturation gap regarding family norms with Portuguese daughters being more similar to their Luxembourgish counterparts than to their mothers, whereas both Portuguese generations rated conservation values higher and an independent self-construal lower than Luxembourgish participants. Results are discussed in a theoretical framework of value change in acculturation considering the role of salience of different value contents. [less ▲] Detailed reference viewed: 158 (10 UL)![]() Pauly, Michel ![]() in Annales de l'Est (2011), n° spécial 2010 Detailed reference viewed: 58 (1 UL)![]() Boella, Guido ![]() ![]() ![]() in Proceedings of the 13th International Workshop on Coordination, Organization, Institutions and Norms (COIN@WI-IAT) (2011) Satisficing, the concept proposed by Herbert Simon, as an approach to reaching agreements is little explored. We propose a model for satisficing agreement reaching for an adaptive collaborative group of ... [more ▼] Satisficing, the concept proposed by Herbert Simon, as an approach to reaching agreements is little explored. We propose a model for satisficing agreement reaching for an adaptive collaborative group of agents. The group consists of one human agent familiar with the problem and arbitrarily many artificial agents. Our model raises to the team level the recognition-primed decision model constructed in the field of cognitive decision-making by using social choice for reaching group opinions. [less ▲] Detailed reference viewed: 114 (0 UL)![]() Happold, Matthew ![]() in Human Rights and International Legal Discourse (2011), 5 Detailed reference viewed: 180 (6 UL)![]() ; Schulz, André ![]() in Psychophysiology (2011), 48(Supplement 1), 88-88 Detailed reference viewed: 51 (1 UL)![]() Kmec, Sonja ![]() in Histoire & Mémoire. Les cahiers du CDREF (2011), 3 Detailed reference viewed: 103 (6 UL)![]() Capozucca, Alfredo ![]() ![]() in Comparing Modeling Approaches (CMA) International Workshop affiliated with ACM/IEEE 14th International Conference on Model Driven Engineering Languages and Systems (CMA@MODELS2011) (2011) Detailed reference viewed: 102 (3 UL)![]() Jasim, Ibrahim ![]() in Abstract book of 1st International Conference on Energy, Power, and Control (2010, December) The control problem for a class of nonlinear systems that contain the coupling of unmeasured states and unknown parameters is addressed. The system actuation is assumed to suffer from unknown dead zone ... [more ▼] The control problem for a class of nonlinear systems that contain the coupling of unmeasured states and unknown parameters is addressed. The system actuation is assumed to suffer from unknown dead zone nonlinearity. The parameters bounds of the unknown dead zone to be considered are unknown. Adaptive sliding mode controller, unmeasured states observer, and unknown parameters estimators are suggested such that global stability is achieved. Simulation for a single link mechanical system with unknown dead zone and friction torque is implemented for proving the efficacy of the suggested scheme. [less ▲] Detailed reference viewed: 47 (5 UL)![]() Jasim, Ibrahim ![]() in Abstract book of 1st International Conference on Energy, Power, and Control (2010, November) This paper presents a new strategy for controlling induction motors with unknown parameters. Using a simple linearized model of induction motors, we design robust adaptive controllers and unknown ... [more ▼] This paper presents a new strategy for controlling induction motors with unknown parameters. Using a simple linearized model of induction motors, we design robust adaptive controllers and unknown parameters update laws. The control design and parameters estimators are proved to have global stable performance against sudden load variations. All closed loop signals are guaranteed to be bounded. Simulations are performed to show the efficacy of the suggested scheme. [less ▲] Detailed reference viewed: 115 (6 UL)![]() Pinel, Frédéric ![]() ![]() ![]() in Proceedings of the Second International Workshop on Green Computing (2010, September 16) Contention on shared resources such as cache and main memory slows down the execution of the applications affecting not only application performance but also induces inefficient use of energy. Therefore ... [more ▼] Contention on shared resources such as cache and main memory slows down the execution of the applications affecting not only application performance but also induces inefficient use of energy. Therefore, in this paper we deal with the contention problem and energy optimization on shared resources multicore-based machines. Our main contribution is a memory-aware resource allocation algorithm that minimize energy consumption by reducing contention conflicts and maximizing performance. We design a heuristic that includes in its objective function the impact of the contention on the application performance. Experimental results emphasize the interest of the provided solution. [less ▲] Detailed reference viewed: 125 (1 UL)![]() Moein, Mahsa ![]() in IEEE (2010, September), 1 Detailed reference viewed: 129 (4 UL)![]() Goncalves, Jorge ![]() in American Control Conference (2010, July) Detailed reference viewed: 55 (0 UL)![]() ; Jamroga, Wojciech ![]() ![]() in Proceedings of EUMAS2010 (2010) Detailed reference viewed: 78 (2 UL)![]() ; ; Hansen, Joachim ![]() in Proceedings of the Conference "Water and Energy" (2010) In Germany sewage treatment plants with serving sizes from 5,000 to 40,000 PE are usually designed with simultaneous aerobic sludge stabilisation. Main advantages of this approach are the simple operation ... [more ▼] In Germany sewage treatment plants with serving sizes from 5,000 to 40,000 PE are usually designed with simultaneous aerobic sludge stabilisation. Main advantages of this approach are the simple operation and easy technical design of the biological stage. But the balance of the turnover of the organic load shows an increased energy consumption of these sewage plants compared to plants with separate anaerobic sludge stabilisation. In order to optimize the energy consumption omitting the implementation of a digester on every plant, an interconnected operational approach for sludge stabilisation was developed. In this concept the aerobic stabilisation plants are operated at reduced sludge ages providing nutrient removal without sludge stabilization. The unstabilised sludge of these plants is transported to a central digestion plant with corresponding aggregates like digester, CHPP, dewatering. [less ▲] Detailed reference viewed: 71 (2 UL) |
||