![]() Hansen, Joachim ![]() in Proceedings of the Conference ‚DWA-Energietage‘ (2010) Im Rahmen eines Projektes mit dem Titel ‚Energie- und Kostenoptimierung durch den Ein-satz von Semizentralen Schlammbehandlungscentern’ -Förderung durch das rheinland-pfälzische Ministerium für Umwelt ... [more ▼] Im Rahmen eines Projektes mit dem Titel ‚Energie- und Kostenoptimierung durch den Ein-satz von Semizentralen Schlammbehandlungscentern’ -Förderung durch das rheinland-pfälzische Ministerium für Umwelt, Forsten und Verbraucherschutz (2008-2009) - wurden Ansätze zum integrierten Betrieb räumlich nahe zueinander liegender aerober Stabilisierungs- und Faulungsanlagen entwickelt. In den Stabilisierungsanlagen wird das Schlammalter gezielt reduziert und somit auf das Ziel ‚aerobe Schlammstabilisierung’ verzichtet, der nicht stabilisierte Schlamm wird dem Faulbehälter der Faulungsanlage zugeführt. Die beschriebene Konzeption weist im Falle der untersuchten Anlagen Grolsheim und Welgesheim erhebliche energetische Vorteile auf. Eine Umsetzung der Konzeption auf andere Anwendungsfälle ist im Einzelfall zu prüfen. De nachfolgenden Ausführungen beruhen im Wesentlichen auf dem Vortrag ‚Energie- und Kostenoptimierung durch Schaffung von Semizentralen Schlammbehandlungscentern‘ (Hansen et al. 2009) [less ▲] Detailed reference viewed: 93 (1 UL)![]() Leist, Anja ![]() ![]() ![]() in Zeitschrift fuer Gerontologie und Geriatrie (2010), 43(S1), 88-88 Detailed reference viewed: 102 (5 UL)![]() Ferring, Dieter ![]() in Trends in Family Caregiving in European Countries. Invited Keynote at the 20th Alzheimer Europe Conference „Facing dementia together“. Luxembourg, Luxembourg. (2010) Detailed reference viewed: 41 (0 UL)![]() Schiltz, Jang ![]() in Proceedings of the Jangjeon Mathematical Society (2010) Detailed reference viewed: 24 (0 UL)![]() Perrouin, Gilles ![]() ![]() in International Conference on Software Test and Validation (2010) Detailed reference viewed: 348 (1 UL)![]() Leist, Anja ![]() ![]() in Gerontologist (2010), 50(S1), 15-15 Detailed reference viewed: 71 (2 UL)![]() Booth, Richard ![]() in Proceedings of the 19th European Conference on Artificial Intelligence (ECAI 2010) (2010) Detailed reference viewed: 44 (0 UL)![]() ; Gabbay, Dov M. ![]() in DEON (2010) This paper examines the deontic logic of the Talmud. We shall find, by looking at examples, that at first approximation we need deontic logic with several connectives: OTA Talmudic obligation FTA Talmudic ... [more ▼] This paper examines the deontic logic of the Talmud. We shall find, by looking at examples, that at first approximation we need deontic logic with several connectives: OTA Talmudic obligation FTA Talmudic prohibition FDA Standard deontic prohibition ODA Standard deontic obligation [less ▲] Detailed reference viewed: 129 (0 UL)![]() Ravarani, Georges ![]() in Publication de la Cour de Justice de l'Union européenne (2010) Detailed reference viewed: 60 (4 UL)![]() Bungard, Volker ![]() ![]() ![]() in Proceedings of the International Conference on Noise and Vibration Engineering, ISMA (2010) Detailed reference viewed: 97 (20 UL)![]() Schölzel, Karsten ![]() in Proceedings of The International Symposium on Multiple-Valued Logic (2010) All maximal partial clones on 4-element, 5-element, and 6-element sets have been found and are compared to the case of maximal clones of all total functions. Due to the large numbers of maximal partial ... [more ▼] All maximal partial clones on 4-element, 5-element, and 6-element sets have been found and are compared to the case of maximal clones of all total functions. Due to the large numbers of maximal partial clones other criteria to check for generating systems of all partial functions are analyzed. [less ▲] Detailed reference viewed: 94 (0 UL)![]() ; Schölzel, Karsten ![]() in Proceedings of The International Symposium on Multiple-Valued Logic (2010) We study intervals I(A) of partial clones whose total functions constitute a (total) clone A. In the Boolean case, we provide a complete classification of such intervals (according to whether the interval ... [more ▼] We study intervals I(A) of partial clones whose total functions constitute a (total) clone A. In the Boolean case, we provide a complete classification of such intervals (according to whether the interval is finite or infinite), and determine the size of each finite interval I(A). [less ▲] Detailed reference viewed: 102 (0 UL)![]() Leyer, Stephan ![]() in International Congress on Advances in Nuclear Power Plants 2010, ICAPP 2010 (2010), 2 KERENA™ (SWR1000) is an innovative boiling water reactor concept with passive safety systems. In order to verify the functionality of the passive components requiredfor the transient and accident ... [more ▼] KERENA™ (SWR1000) is an innovative boiling water reactor concept with passive safety systems. In order to verify the functionality of the passive components requiredfor the transient and accident management, the test facility INKA (Integral-Versuchstand Karlstein) is build in Karlstein (Germany). The key elements of the KERENA™ passive safety concept -the Emergency Condenser, the Containment Cooling Condenser, the Passive Core Flooding System and the Passive Pressure Pulse Transmitter - will be tested at INKA. The Emergency Condenser system transfer heaty form the reactor pressure vessel to the core flooding pools of the containment. The heat introduced into the containment during accidents will be transferred to the main heat sink for passive accident management (Shielding/Storage Pool) via the Containment Cooling Condensers. Therefore both systems are part of the passive cooling chain connecting the heat source RPV (Reactor Pressure Vessel) with the heat sink. At the INKA test facility both condensers are tested in full scale setup, in order to determine the heat transfer capacity as function of the main input parameters. For the EC these are the RPV pressure, the RPV water level, the containment pressure and the water temperature of the flooding pools. For the Containment Cooling Condenser the heat transfer capacity is a function of the containment pressure, the water temperature of the Shielding/Storage Pooland the fraction of non -condensable gases in the containment. The status of the test program and the available test data will be presented. An outlook of the future test of the passive core flooding system and the integral system test including also the passive pressure pulse transmitter will be given. [less ▲] Detailed reference viewed: 146 (10 UL)![]() Ravarani, Georges ![]() in Publication de la Cour de justice de l'Union européenne (2010) Detailed reference viewed: 54 (0 UL)![]() in Mutations. Mémoires et perspectives du Bassin minier (2010), 1 Detailed reference viewed: 10 (1 UL)![]() Albert, Isabelle ![]() ![]() in XIIth EARA Conference (2010) The concept of ambivalence describes dynamics of simultaneous attraction and repulsion in families. Especially transitions during the life span are likely to elicit ambivalence in intergenerational ... [more ▼] The concept of ambivalence describes dynamics of simultaneous attraction and repulsion in families. Especially transitions during the life span are likely to elicit ambivalence in intergenerational relations. Adolescence and emerging adulthood are phases of important transformations in parent-child relations entailing an array of developmental tasks, such as identity development and the dual process of individuation, which may give rise to ambivalences and tensions in family relations. Assuming different stages in the individuation process, parental control might be perceived differently by adolescents and emerging adults: while younger children may perceive parental control as kind of support and care, it may be experienced more as intrusion when autonomy demands of adolescents increase. The aims of the present study were to analyse a) the relation of perceived parenting and ambivalence towards parents with age, b) the interrelation of perceived parenting and feelings of ambivalence, as well as c) the moderating role developmental phase may have for the relation between perceived parenting and ambivalence. In the present study, a sample of N = 233 participants between the age of 14 and 25 (M = 19.00, SD = 2.69) living in Luxembourg were interviewed with regard to their relations towards their mothers and their fathers. The standardized questionnaire measured perceived parenting on three dimensions (maternal resp. paternal support, behavioural control and psychological control); further, ambivalence towards mothers and fathers was assessed with a newly developed questionnaire including contradictory emotional, motivational, and behavioural tendencies. Results showed that behavioural control was reduced with growing age; moreover, ambivalence was related positively to psychological control and behavioural control. Developmental phase moderated the relation between behavioural control and feelings of ambivalence towards mothers: This relation showed to be stronger for older participants. Results will be discussed with respect to intrafamilial processes underlying the regulation of ambivalence within the individuation process. [less ▲] Detailed reference viewed: 116 (4 UL)![]() Treleani, Matteo ![]() in Travaux en cours. Revue de l'UFR LAC. Université Paris Diderot (2010) Detailed reference viewed: 49 (0 UL)![]() Uhrmacher, Martin ![]() in Hemecht : Zeitschrift für Luxemburger Geschichte = Revue d'Histoire Luxembourgeoise (2010), 62(3/4), 463-492 Detailed reference viewed: 257 (5 UL)![]() Petersen, Sibylle ![]() in Biological Psychology (2010), 83(1), 71-71 Detailed reference viewed: 61 (0 UL)![]() Petersen, Sibylle ![]() in Zeitschrift für medizinische Psychologie (2010), 19 Detailed reference viewed: 48 (0 UL)![]() Petersen, Sibylle ![]() in Biological Psychology (2010), 83(1), 64-65 Detailed reference viewed: 66 (0 UL)![]() ; Gabbay, Dov M. ![]() in Proceedings of the 22th Belgian-Netherlands Conference on Artificial Intelligence (BNAIC'10) (2010) Argumentation networks are put forward by Dung considering only one kind of attack among argu- ments. In this paper, we propose to extend Dung’s argumentation framework with voluntary attacks in the ... [more ▼] Argumentation networks are put forward by Dung considering only one kind of attack among argu- ments. In this paper, we propose to extend Dung’s argumentation framework with voluntary attacks in the context of multiagent systems, characterized by the possibility of the attacker to decide whether to attack or not. Enabling voluntary attacks impacts on the acceptability of the arguments in the framework, and therefore it becomes subject of debate between the agents. Agents can negotiate about which subset of voluntary attacks can be raised, and they form coalitions after the negotiation process. [less ▲] Detailed reference viewed: 21 (1 UL)![]() ; ; et al in Proceedings of 29th Annual ACM Symposium on Principles of Distributed Computing (2010) Detailed reference viewed: 75 (1 UL)![]() ; Gabbay, Dov M. ![]() in Proceedings of the 13th International Workshop on Non-Monotonic Reasoning (NMR'10) (2010) The paper proposes a representation of the subsumption re- lation and of count as conditional in the context of argument ontologies. Starting from the weaker notion of classification represented by the ... [more ▼] The paper proposes a representation of the subsumption re- lation and of count as conditional in the context of argument ontologies. Starting from the weaker notion of classification represented by the subsumption relation towards the stronger notion of count as, we show how to reason whether an argu- ment is accepted in ontologies involving these two notions. We adopt the methodology of meta-argumentation in order to model the design decisions. Argumentation, being able to handle contradictory information, is proposed as technique to reason about count as for ontology interoperability. [less ▲] Detailed reference viewed: 32 (1 UL)![]() Beierlein, Nomathamsanqa Nonjabulo ![]() ![]() ![]() in Proceedings Venice 2010, Third International Symposium on energy from Biomass and Waste, 8-11.11.2010, Venice (2010) Detailed reference viewed: 109 (3 UL)![]() ; Pang, Jun ![]() in Proceedings of 6th IEEE/IFIP Symposium on Trusted Computing and Communications (2010) Detailed reference viewed: 138 (1 UL)![]() ; Pang, Jun ![]() in Proceedings of 15th IEEE International Conference on Engineering of Complex Computer Systems (2010) Detailed reference viewed: 102 (1 UL)![]() Boella, Guido ![]() ![]() ![]() in Proceedings of the 11th International Workshop on Coordination, Optimization, Institution and Norms in Multiagent Systems (COIN@MALLOW'10) (2010) An agent intends g if it has chosen to pursue goal g an is committed to pursuing g . How do groups decide on a common goal? Social epistemology offers two views on collective attitudes: according to the ... [more ▼] An agent intends g if it has chosen to pursue goal g an is committed to pursuing g . How do groups decide on a common goal? Social epistemology offers two views on collective attitudes: according to the summative approach, a group has attitude p if all or most of the group members have the attitude p; according to the non-summative approach, for a group to have attitude p it is required that the members together agree that they have attitude p. The summative approach is used extensively in multi-agent systems. We propose a formalization of non-summative group intentions, using social choice to determine the group goals. We use judgment aggregation as a decision-making mechanism and a multi-modal multi-agent logic to represent the collective attitudes, as well as the commitment and revision strategies for the groups intentions. [less ▲] Detailed reference viewed: 67 (1 UL)![]() Sorger, Ulrich ![]() in International Zurich Seminar on Communications (2010) Iterative decoding with message-passing is consid- ered. The message format is generalized from the classical, single probability value for each code symbol to a probability distribu- tion by introducing ... [more ▼] Iterative decoding with message-passing is consid- ered. The message format is generalized from the classical, single probability value for each code symbol to a probability distribu- tion by introducing an additional logarithmic probability mea- sure. Thereby, the representation of the probability distributions underlying the constituent code constraints by the messages is improved in terms of the Kullback-Leibler divergence. Simulation shows that this improvement can transfer to the error correcting performance. [less ▲] Detailed reference viewed: 78 (1 UL)![]() Steffgen, Georges ![]() ![]() in Proceedings of the XIV European Conference on Developmental Psychology ECDP. (2010) Detailed reference viewed: 128 (9 UL)![]() ; Klein, Jacques ![]() in Abstract book of 13th IEEE/ACM International Conference on Model Driven Engineering Languages and Systems, MODELS 2010, LNCS (2010), 6395 LNCS(PART 2), 63-77 Aspect-Oriented Modeling techniques make it possible to use model transformation to achieve advanced separation of concerns within models. Applying aspects that introduce model elements into a base model ... [more ▼] Aspect-Oriented Modeling techniques make it possible to use model transformation to achieve advanced separation of concerns within models. Applying aspects that introduce model elements into a base model in the context of large, potentially composite models is nevertheless tricky: when a pointcut model matches several join points within the base model, it is not clear whether the introduced element should be instantiated once for each match, once within each composite, once for the whole model, or based on a more elaborate criteria. This paper argues that in order to enable a modeler to write semantically correct aspects for large, composite models, an aspect weaver must support a flexible instantiation policy for model element introduction. Example models highlighting the need for such a mechanism are shown, and details of how such policies can be implemented are presented. © 2010 Springer-Verlag. [less ▲] Detailed reference viewed: 137 (2 UL)![]() ; ; et al in Abstract book of 2010 IEEE International Ultrasonics Symposium (2010) High performance Brillouin microscopy has been used in order to directly measure the propagation losses of surface acoustic wave in Langasite substrate. The interdigital transducers (IDTs) were designed ... [more ▼] High performance Brillouin microscopy has been used in order to directly measure the propagation losses of surface acoustic wave in Langasite substrate. The interdigital transducers (IDTs) were designed to generate several harmonics leading to induce acoustic waves with different wavelengths. The induced phonons were detected and characterized at different frequencies and at different distance from IDTs leading to precisely determine the propagation losses for all the excited frequencies 681, 1267 and 1463 MHz. [less ▲] Detailed reference viewed: 135 (2 UL)![]() Dorronsoro, Bernabé ![]() ![]() in Lecture Notes in Computer Science (2010), 6114 The sequencing process of a DNA chain for reading its components supposes a complex process, since only small DNA fragments can be read nowadays. Therefore, the use of optimization algorithms is required ... [more ▼] The sequencing process of a DNA chain for reading its components supposes a complex process, since only small DNA fragments can be read nowadays. Therefore, the use of optimization algorithms is required to rebuild a single chain from all the small pieces. We address here a simplified version of the problem, in which no errors in the sequencing process are allowed. The methods typically used in the literature for this problem are not satisfactory when solving realistic size instances, so there is a need for new more efficient and accurate methods. We propose a new iterated local search algorithm, highly competitive with the best algorithms in the literature, and considerably faster. [less ▲] Detailed reference viewed: 141 (0 UL)![]() Genovese, Valerio ![]() ![]() in STAIRS 2010 (2010) We present and study a Modal Access Control Logic (M-ACL) to specify and reason about access control policies. We identify canonical properties of well-known access control axioms. We provide a Hilbert ... [more ▼] We present and study a Modal Access Control Logic (M-ACL) to specify and reason about access control policies. We identify canonical properties of well-known access control axioms. We provide a Hilbert-style proof-system and we prove soundness, completeness and decidability of the logic. We present a sound and complete embedding of Modal Access Control Logic into First-Order Logic. We show how to use SPASS theorem prover to reason about access control policies expressed as formulas of Modal Access Control Logic, and we compare our logic with existing ones. [less ▲] Detailed reference viewed: 60 (1 UL)![]() Boella, Guido ![]() ![]() ![]() in Proceedings of the Third International Conference on Computational Models of Argument (COMMA'10) (2010) n this paper, we consider two drawbacks of Cayrol and Lagasque-Schiex's meta-argumentation theory to model bipolar argumentation frameworks. We consider first the “lost of admissibility” in Dung's sense ... [more ▼] n this paper, we consider two drawbacks of Cayrol and Lagasque-Schiex's meta-argumentation theory to model bipolar argumentation frameworks. We consider first the “lost of admissibility” in Dung's sense and second, the definition of notions of attack in the context of a support relation. We show how to prevent these drawbacks by introducing support meta-arguments. Like the model of Cayrol and Lagasque-Schiex, our formalization confirms the use of meta-argumentation to reuse Dung's properties. We do not take a stance towards the usefulness of a support relation among arguments, though we show that if one would like to introduce them, it can be done without extending Dung's theory. Finally, we show how to use meta-argumentation to instantiate an argumentation framework to represent defeasible support. In this model of support, the support relation itself can be attacked. [less ▲] Detailed reference viewed: 214 (1 UL)![]() Aucher, Guillaume ![]() ![]() in DEON (2010) Privacy policies are often defined in terms of permitted messages. Instead, in this paper we derive dynamically the permitted messages from static privacy policies defined in terms of permitted and ... [more ▼] Privacy policies are often defined in terms of permitted messages. Instead, in this paper we derive dynamically the permitted messages from static privacy policies defined in terms of permitted and obligatory knowledge. With this new approach, we do not have to specify the permissions and prohibitions of all message combinations explicitly. To specify and reason about such privacy policies, we extend a multi-modal logic introduced by Cuppens and Demolombe with update operators modeling the dynamics of both knowledge and privacy policies. We show also how to determine the obligatory messages, how to express epistemic norms, and how to check whether a situation is compliant with respect to a privacy policy.We axiomatize and prove the decidability of our logic. [less ▲] Detailed reference viewed: 119 (0 UL)![]() Boella, Guido ![]() in KR 2010 (2010) If compliance with a norm does not achieve its purpose, then its applicability must dynamically be restricted or expanded. Legal interpretation is a mechanism from law allowing norms to be adapted to ... [more ▼] If compliance with a norm does not achieve its purpose, then its applicability must dynamically be restricted or expanded. Legal interpretation is a mechanism from law allowing norms to be adapted to unforeseen situations. We model this mechanism for norms regulating computer systems by representing the purpose of norms by social goals and by revising the constitutive rules defining the applicability of norms. We illustrate the interpretation mechanism by examples. [less ▲] Detailed reference viewed: 112 (0 UL)![]() Bungard, Volker ![]() ![]() in Abstract book of 51. Forschungskolloquium des Deutschen Ausschusses für Stahlbetonbau (2010) Detailed reference viewed: 72 (13 UL)![]() ; Bordas, Stéphane ![]() in IUTAM Bookseries (2010), 19 This contribution presents two advances in the formulation of discontinuous approximations in finite elements. The first method relies on Schwarz-Christoffel mapping for integration on arbitrary polygonal ... [more ▼] This contribution presents two advances in the formulation of discontinuous approximations in finite elements. The first method relies on Schwarz-Christoffel mapping for integration on arbitrary polygonal domains [1]. When an element is split into two subdomains by a piecewise continuous discontinuity, each of these polygonal domains is mapped onto a unit disk on which cubature rules are utilized. This suppresses the need for the usual two-level isoparametric mapping. The second method relies on strain smoothing applied to discontinuous finite element approximations. By writing the strain field as a non-local weighted average of the compatible strain field, integration on the surface of the finite elements is transformed into boundary integration, so that the usual subdivision into integration cells is not required, an isoparametric mapping is not needed and the derivatives of the shape (enrichment) functions do not need to be computed. Results in fracture mechanics and composite materials are presented and both methods are compared in terms of accuracy and simplicity. The interested reader is referred to [1,6,13] for more details and should contact the authors to receive a version of the MATLAB codes used to obtain the results herein. © 2010 Springer Science+Business Media B.V. [less ▲] Detailed reference viewed: 231 (2 UL)![]() Boella, Guido ![]() ![]() ![]() in Bibliothèque(s) : revue de l'Association des bibliothécaires de France (2010) We introduce and study higher-order coalition logic, a multi modal monadic second-order logic with operators [{x}ψ]φ expressing that the coalition of all agents satisfying ψ(x) can achieve a state in ... [more ▼] We introduce and study higher-order coalition logic, a multi modal monadic second-order logic with operators [{x}ψ]φ expressing that the coalition of all agents satisfying ψ(x) can achieve a state in which φ holds. We use neighborhood semantics to model extensive games of perfect information with simultaneous actions and we provide a framework reasoning about agents in the same way as it is reasoning about their abilities. We illustrate higher-order coalition logic to represent and reason about coalition formation and cooperation, we show a more general and expressive way to quantify over coalitions than quantified coalition logic, we give an axiomatization and prove completeness. [less ▲] Detailed reference viewed: 59 (0 UL)![]() ![]() Samiei, Kasra ![]() ![]() in Abstract book of 81st Annual Meeting of the International Association of Applied Mathematics and Mechanics (2010), 10(1), 55-56 Detailed reference viewed: 130 (5 UL)![]() Kaufmann, Sascha ![]() ![]() in Abstract book of 2nd Conference on Agents and Artificial Intelligence (ICAART 2010) (2010) Detailed reference viewed: 57 (7 UL)![]() van der Torre, Leon ![]() in DEON (2010) To decide which norms can be removed from a system, we need to know when a norm is redundant. After shifting the focus of attention in deontic logic from detachment of obligations and permissions to ... [more ▼] To decide which norms can be removed from a system, we need to know when a norm is redundant. After shifting the focus of attention in deontic logic from detachment of obligations and permissions to deontic redundancy, I discuss in this paper five benchmark examples of deontic redundancy in reasoning about permissions, intermediate concepts and constitutive norms, deontic dilemmas, temporal deontic reasoning and contrary-to-duty reasoning. Then I discuss those benchmark examples in four formal approaches to deontic reasoning: traditional model logic, dynamic approaches, violation oriented or diagnostic systems, and imperativist or norm based approaches. [less ▲] Detailed reference viewed: 108 (2 UL)![]() Boella, Guido ![]() ![]() in Proceedings of the 4th Mahasarakham International Workshop on Artificial Intelligence (MIWAI'10) (2010) Detailed reference viewed: 61 (0 UL)![]() Schommer, Christoph ![]() in Abstract book of 2nd Conference on Agents and Artificial Intelligence (ICAART 2010) (2010) The following (position) paper follows the concept of the field of Artificial Life and argues that the (relational) management of data can be understood as a chemical model. Whereas each data itself is ... [more ▼] The following (position) paper follows the concept of the field of Artificial Life and argues that the (relational) management of data can be understood as a chemical model. Whereas each data itself is consistent with atomic entities, each combination of data corresponds to a (artificial) molecular structure. For example, an attribute D inside a relational system can be represented by a nucleus aD sharing a cloud of values, which consists of so-called valectrons (the values for the column D). By using reaction rules like the selection of tuples or projection of attributes, a retrieve of molecules can be achieved quite easily. Advantages of the chemical model are no data types, a fast data access, and the associative nature of the molecules: this automatically supports a direct identification of patterns in the sense of data mining. A disadvantage is the need for restructuring that must eventually be done, because the incoming data stream is allowed to influence the chemical model. With this position paper, we present our basic concept. [less ▲] Detailed reference viewed: 102 (5 UL)![]() Michels, Julien ![]() ![]() in Abstract book of 3rd Congress of the International Federation for Structural Concrete (fib) (2010) Detailed reference viewed: 87 (9 UL)![]() ; Boella, Guido ![]() ![]() in Proceedings of the 11th Symposium on Artificial Intelligence of the Italian Association for Artificial Intelligence (AIIA'10) (2010) Trust in multiagent systems is used for seeking to minimize the uncertainty in the interactions among the agents. In this paper, we discuss how to use argumentation to reason about trust. Using the ... [more ▼] Trust in multiagent systems is used for seeking to minimize the uncertainty in the interactions among the agents. In this paper, we discuss how to use argumentation to reason about trust. Using the methodology of meta-argumentation, first we represent the source of the information from which the argument is constructed in the abstract argumentation framework capturing the fact that b is attacked because b is from a particular source s. We show how a source of information can be attacked if it is not evaluated as trustworthy. Second, we provide a fine grained representation of the trust relationships between the information sources in which trust concerns not only the sources but also the single arguments and attack relations the sources propose. Moreover, we represent the evidences in support of the arguments which are put forward by the information sources and the agents can express arguments by referring to other agents’ arguments. Meta-argumentation allows us not to extend Dung’s abstract argumentation framework by introducing trust and to reuse those principles and properties defined for Dung’s framework. [less ▲] Detailed reference viewed: 53 (0 UL)![]() Waldmann, Danièle ![]() ![]() in Abstract book of 3rd Congress of the International Federation for Structural Concrete (fib) (2010) Detailed reference viewed: 74 (6 UL)![]() ; ; et al in European Journal of Cancer Supplements (2010), 8(3), 91 Detailed reference viewed: 51 (6 UL)![]() ; ; et al in AIP Conference Proceedings (2010), 1233(PART 1), 489-493 Molecular dynamics simulations show that graphite will transform into a superhard phase under cold compression. Recent experiments show that there is a sp 3-rich hexagonal carbon polymorph (a 0=2.496 Å, c ... [more ▼] Molecular dynamics simulations show that graphite will transform into a superhard phase under cold compression. Recent experiments show that there is a sp 3-rich hexagonal carbon polymorph (a 0=2.496 Å, c 0=4.123Å) with a bulk modulus of 447 GPa and average density about 3.6g/cm 3, restricted to the space group of P-62c (No. 190), but the detailed atomic structure was not obtained [Wang et al., P. Natl. Acad. Sci. 101(38), 13699]. Here we set carbon atoms occupying P-62c 4f Wyckoff positions of P-62c, and calculate the total energy of the different structures changing the internal parameter z by first-principles calculations using geometry optimisation algorithm in CASTEP code, which shows that the stable structures in energy (at local minimum points) are hexagonal carbon (z=1/4) and hexagonal diamond (z=1/16). The calculated mechanical properties and lattice parameters of the structure P-62c 4f (z=1/4) are in good agreement with those of the new hexagonal carbon proposed by Wang et al., which indicates that the atomic structure is a possible candidate. © 2010 American Institute of Physics. [less ▲] Detailed reference viewed: 121 (0 UL)![]() ; ; et al in AIP Conference Proceedings (2010), 1233(PART 1), 1401-1405 This paper presents a new method for establishing the basic equations in the novel force-based large increment method (LIM) for continuum elastoplastic problems. In LIM, unlike traditional displacement ... [more ▼] This paper presents a new method for establishing the basic equations in the novel force-based large increment method (LIM) for continuum elastoplastic problems. In LIM, unlike traditional displacement methods, the (generalised) elemental force variables are adopted as system unknowns. The equilibrium equations can then be obtained directly at every nodal degree of freedom without physical equations (i.e., constitutive equations) involved. The generalised inverse of the non-square system of equations is employed to obtain the set of solutions of the non-square matrix equations directly. A conjugate gradient procedure is then used to find the correct solution from this set of solutions by optimising the compatibility of the solution based on the fact that the correct solution should also satisfy the constitutive equations and the compatibility equations. In this paper, the generalised elemental force variables are defined based on the element nodal forces. The LIM framework is therefore successfully applied to elements based on this definition. The efficiency and accuracy of the LIM are illustrated with a few benchmark problems and the results are compared with the analytical solution and the conventional displacement-based finite element method. [less ▲] Detailed reference viewed: 125 (0 UL)![]() Osório, P. ![]() ![]() in Reliability Analysis of Quay Walls with Steel Sheet Piles (2010) This paper shows the first results of the reliability analysis of a steel sheet pile wall located in the Port of Hamburg, North of Germany. The wall was designed according to EAU 2004 and the First Order ... [more ▼] This paper shows the first results of the reliability analysis of a steel sheet pile wall located in the Port of Hamburg, North of Germany. The wall was designed according to EAU 2004 and the First Order Reliability Moment (FORM) was used to perform the reliability analyses. Blum’s model of interaction soil/structure, which was used in the design of the wall, was also used in the reliability analyses. To have a basis of comparison, another model was used: the sub-grade reaction model, or beam in an elastic foundation model. The results show a fair approximation between both models in the outcome of the reliability analyses. The stochastic properties of the variables were based on the recommendations of the Joint Committee for Structural Safety (JCSS) and corrosion was also included in the analyses through a probabilistic model. The results show that the sheet pile wall has a probability of failure below the limit given by the Eurocode EN 1990 for a service life of 50 years. [less ▲] Detailed reference viewed: 92 (6 UL)![]() Peters, Bernhard ![]() in Abstract book of 10th International Conference Modern Building Materials, Structures and Techniques (2010) Detailed reference viewed: 123 (14 UL)![]() Albert, Isabelle ![]() ![]() in Proceedings of 5th Congress of the European Society of Family Relations 2010 (2010) The intergenerational transmission of values from one generation to the next is a crucial task of the family as primary socialization agent. Aspects that characterize the family context (such as parenting ... [more ▼] The intergenerational transmission of values from one generation to the next is a crucial task of the family as primary socialization agent. Aspects that characterize the family context (such as parenting, communication style, relationship quality) may serve as transmission belts enhancing (or hindering) the intrafamilial transfer of values. Although the importance of emotions of parents and their children has been acknowledged, their role in the transmission process has only rarely been addressed empirically. For several reasons one can assume that emotions have an essential function in the transfer of values from parents to their offspring. As demonstrated by cognitive psychology, contents that are linked to emotions are remembered more easily. Further, one can assume that the valence of emotions influences the internalization process: While positive emotions towards the transmitter should enhance attention to value messages and willingness of the recipient to take over these values, negative emotions should reduce the recipient’s readiness to take over specific values. The aim of the present study is to investigate in how far value similarity between mothers and adolescents is linked to their positive or negative emotions towards each other. A sample of N = 95 mother-adolescent dyads living in Luxembourg was studied by means of a standardized questionnaire measuring four general value orientations, namely self-direction, hedonism, conformism and benevolence as well as positive and negative emotions of both mothers and adolescents. Results indicate that positive emotions of adolescents towards their mothers were related with higher value similarity, whereas negative and ambivalent emotions were related to lower value similarity. Also for mothers, negative emotions were related to lower value similarity with their children. Results are discussed with respect to intrafamilial processes underlying the regulation of intergenerational relations and the transmission of values. [less ▲] Detailed reference viewed: 125 (13 UL)![]() ; Sorger, Ulrich ![]() in Proceedings of 4th International Symposium on Communications, Control and Signal Processing (ISCCSP) (2010) Detailed reference viewed: 169 (10 UL)![]() Glaab, Enrico ![]() in Osteoarthritis and Cartilage (2010), 18(2), 169 Detailed reference viewed: 93 (0 UL)![]() ; ; et al in Proceedings of Infrared Millimeter and Terahertz Waves (IRMMW-THz) Conf. (2010) Raman microspectroscopy of human sperm cells and nearfield infrared microscopy of nanoscale biomaterials like nanografted DNA have been performed. A newly developed station for the ANKA-IR2 beamline ... [more ▼] Raman microspectroscopy of human sperm cells and nearfield infrared microscopy of nanoscale biomaterials like nanografted DNA have been performed. A newly developed station for the ANKA-IR2 beamline combines several techniques to study the same sample at the same position. [less ▲] Detailed reference viewed: 134 (2 UL)![]() Hansen, Joachim ![]() in Proceedings of the conference ‚Bauen – Bewahren – Bewerten‘ (2010) Detailed reference viewed: 90 (5 UL)![]() Albert, Isabelle ![]() ![]() in Proceedings of the XIV European Conference on Developmental Psychology ECDP. Bologna, Italy: Medimond. (2010) Detailed reference viewed: 85 (1 UL)![]() ; Garcia, Guadalupe Clara ![]() in Journal of Physiology (2010), 104(3-4), 118-27 Encoding of amplitude modulated (AM) acoustical signals is one of the most compelling tasks for the mammalian auditory system: environmental sounds, after being filtered and transduced by the cochlea ... [more ▼] Encoding of amplitude modulated (AM) acoustical signals is one of the most compelling tasks for the mammalian auditory system: environmental sounds, after being filtered and transduced by the cochlea, become narrowband AM signals. Despite much experimental work dedicated to the comprehension of auditory system extraction and encoding of AM information, the neural mechanisms underlying this remarkable feature are far from being understood (Joris et al., 2004). One of the most accepted theories for this processing is the existence of a periodotopic organization (based on temporal information) across the more studied tonotopic axis (Frisina et al., 1990b). In this work, we will review some recent advances in the study of the mechanisms involved in neural processing of AM sounds, and propose an integrated model that runs from the external ear, through the cochlea and the auditory nerve, up to a sub-circuit of the cochlear nucleus (the first processing unit in the central auditory system). We will show that varying the amount of inhibition in our model we can obtain a range of best modulation frequencies (BMF) in some principal cells of the cochlear nucleus. This could be a basis for a synchronicity based, low-level periodotopic organization. [less ▲] Detailed reference viewed: 113 (2 UL)![]() Jamroga, Wojciech ![]() in Proceedings of EUMAS2010 (2010) Detailed reference viewed: 40 (1 UL)![]() Aucher, Guillaume ![]() in Proceedings of Dagstuhl Seminar (2009, November 03), 09121 Building on a simple modal logic of context, the paper presents a dynamic logic characterizing operations of contraction and expansion on theories. We investigate the mathematical properties of the logic ... [more ▼] Building on a simple modal logic of context, the paper presents a dynamic logic characterizing operations of contraction and expansion on theories. We investigate the mathematical properties of the logic, and use it to develop an axiomatic and semantic analysis of norm change in normative systems. The proposed analysis advances the state of the art by providing a formal semantics of norm-change which, at the same time, takes into account several different aspects of the phenomenon, such as permission and obligation dynamics, as well as the dynamics of classificatory rules. [less ▲] Detailed reference viewed: 50 (3 UL)![]() Dunlop, Dominic ![]() ![]() ![]() in Proceedings of 8th Intl. conf. on Parallel Processing and Applied Mathematics (PPAM 2009) (2009, September), 6068(LNCS), 102--114 The High-Performance Linpack (HPL) benchmark is the ac- cepted standard for measuring the capacity of the world’s most powerful computers, which are ranked twice yearly in the Top 500 List. Since just a ... [more ▼] The High-Performance Linpack (HPL) benchmark is the ac- cepted standard for measuring the capacity of the world’s most powerful computers, which are ranked twice yearly in the Top 500 List. Since just a small deficit in performance can cost a computer several places, it is impor- tant to tune the benchmark to obtain the best possible result. However, the adjustment of HPL’s seventeen configuration parameters to obtain maximum performance is a time-consuming task that must be performed by hand. In a previous paper, we provided a preliminary study that proposed the tuning of HPL parameters by means of an Evolutionary Algorithm. The approach was validated on a small cluster hosted at the University of Luxembourg. In this article, we extend this initial work by describing Acbea, a fully-automatic benchmark tuning tool that performs both the configuration and installation of HPL followed by an automatic search for optimized parameters that will lead to the best benchmark results. Experiments have been conducted to validate this tool on several clusters, exploiting in particular the Grid’5000 infrastructure. [less ▲] Detailed reference viewed: 120 (2 UL)![]() Lygidakis, Charilaos ![]() in European Journal of General Practice (2009, July), 15(1), 42-43 Detailed reference viewed: 77 (1 UL)![]() Aguilera Gonzalez, Adriana ![]() in International Symposium on Advanced Control of Chemical Processes, ADCHEM 2009 (2009) In this paper we present a high-gain observer implemented in its discrete and continuous-discrete versions in order to compare the performance of both algorithms. The comparison is made considering the ... [more ▼] In this paper we present a high-gain observer implemented in its discrete and continuous-discrete versions in order to compare the performance of both algorithms. The comparison is made considering the sampling time used to perform the observer’s correction stage in order to establish that the continuous-discrete observer is the best option when a low sampling time is used. Under this condition the continuous discrete observer can process data performing a reliable on-line estimation of the system (a slow dynamics of the process is required). We apply both algorithms to a distillation column that uses the Ethanol-Water binary mixture. [less ▲] Detailed reference viewed: 75 (10 UL)![]() ; Mizera, Andrzej ![]() in Lecture Notes in Computer Science (2009), 5635 Detailed reference viewed: 172 (0 UL)![]() van Deursen, Ton ![]() ![]() in Electronic Notes in Theoretical Computer Science (2009), 244 Detailed reference viewed: 107 (1 UL)![]() Klein, Jacques ![]() in Abstract book of 12th IEEE/ACM International Conference on Model Driven Engineering Languages and Systems, MODELS 2009, (2009), 5795 LNCS Since software systems need to be continuously available, their ability to evolve at runtime is a key issue. The emergence of models@runtime, combined with Aspect-Oriented Modeling techniques, is a ... [more ▼] Since software systems need to be continuously available, their ability to evolve at runtime is a key issue. The emergence of models@runtime, combined with Aspect-Oriented Modeling techniques, is a promising approach to tame the complexity of adaptive systems. However, with no support for aspect unweaving, these approaches are not agile enough in an adaptive system context. In case of small modifications, the adapted model has to be generated by again weaving all the aspects, even those unchanged. This paper shows how aspects can be unwoven, based on a precise traceability metamodel dedicated to aspect model weaving. We analyze traceability models, which describe how aspects were woven into a base, to determine the extent to which an aspect has affected the woven model in order to determine how it can be unwoven. Aspect unweaving is finally performed by applying inverse operations of a sub-sequence of the weaving operations in opposite order. © 2009 Springer Berlin Heidelberg. [less ▲] Detailed reference viewed: 97 (4 UL)![]() Hoffmann, Martine ![]() ![]() in Final Conference of the CARERS Project, Liaison Office Brussels. Brussels ,Belgium (2009) Detailed reference viewed: 44 (1 UL)![]() ; ; et al in Proceedings of the 23rd Conference on Human Computer Interaction (HCI) ’09 in collaboration with ACM. Cambridge, UK (2009) Detailed reference viewed: 91 (0 UL)![]() ; ; et al in Abstract Book of the 6th International conference on LCA the Agri-food sector. (2009) Detailed reference viewed: 76 (1 UL)![]() Hoffmann, Martine ![]() ![]() in Annual Conference of the Canadian Association of Psychosocial Oncology. Vancouver, Canada (2009) Detailed reference viewed: 58 (0 UL)![]() Schulz, André ![]() in Psychophysiology (2009), 46(Supplement 1), 77-77 Detailed reference viewed: 52 (0 UL)![]() Golkowska, Katarzyna ![]() ![]() in Internationale Wissenschaftstagung Biogas Science 2009 (2009) Poster presentation at Internationale Wissenschaftstagung Biogas Science 2009 Detailed reference viewed: 44 (2 UL)![]() ; Schulz, André ![]() in Frontiers in Behavioral Neuroscience (2009) Detailed reference viewed: 64 (0 UL)![]() Schölzel, Karsten ![]() in Proceedings of The International Symposium on Multiple-Valued Logic (2009) A partial function f on a κ-element set Eκ is a partial Sheffer function if every partial function on Eκ is definable in terms of f. Since this holds if and only if f belongs to no maximal partial clone ... [more ▼] A partial function f on a κ-element set Eκ is a partial Sheffer function if every partial function on Eκ is definable in terms of f. Since this holds if and only if f belongs to no maximal partial clone on Eκ, a characterization of partial Sheffer functions reduces to finding families of minimal coverings of maximal partial clones on Eκ. It is shown that. [less ▲] Detailed reference viewed: 105 (1 UL)![]() Schiltz, Jang ![]() in Bulletin of the Transilvania University of Brasov. Series III: Mathematics, Informtics, Physics (2009), 2(51), 59-74 We describe two applications of statistical shape analysis. For the differentiation of the different kidney tumours appearing in early childhood we use shape analysis of two-dimensionnal MRI images. For ... [more ▼] We describe two applications of statistical shape analysis. For the differentiation of the different kidney tumours appearing in early childhood we use shape analysis of two-dimensionnal MRI images. For the analysis of odours in biogas plants, we use shape analysis to interpret the data provided by electronic noses. [less ▲] Detailed reference viewed: 29 (1 UL)![]() Mauw, Sjouke ![]() ![]() in Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF'09) (2009) Detailed reference viewed: 98 (0 UL)![]() Bungard, Volker ![]() ![]() ![]() in Proceedings of the International Conference on Experimental Vibration Analysis for Civil Engineering Structures (2009) Detailed reference viewed: 93 (15 UL)![]() ; Pang, Jun ![]() in Proceedings of 3rd IEEE Symposium on Theoretical Aspects of Software Engineering (2009) Detailed reference viewed: 133 (2 UL)![]() Albert, Isabelle ![]() ![]() in Abstract paper of the XIXth IAGG World Congress of Gerontology and Geriatrics. Paris, France (2009) Detailed reference viewed: 65 (3 UL)![]() Ignac, Tomasz ![]() ![]() in Proceedings of the International Multiconference on Computer Science and Information Technology IMCSIT 2009 (2009) Detailed reference viewed: 179 (2 UL)![]() Baumann, Michèle ![]() in Psychology and Health (2009) Domestic accidents are a public health problem. This study assessed the disparities between socioeconomic positions and the confounding role of gender, age, education, living alone, income, poor health ... [more ▼] Domestic accidents are a public health problem. This study assessed the disparities between socioeconomic positions and the confounding role of gender, age, education, living alone, income, poor health, obesity, current tobacco use, alcohol abuse, fatigue/sleep disorders, and physical, sensorial and cognitive disabilities. Methods: 6,198 people aged ≥15, randomly selected in north-eastern France completed a post-mailed questionnaire including domestic accident(s) during the last two years. The data were analyzed via logistic models. Findings: Domestic accidents affected 3.1% of subjects. Manual workers and clerks had higher risks (age-gender adjusted OR 1.6, 95%CI 1.1-2.6 and 1.5, 1.0-2.4) compared with the other socioeconomic groups. These differences became non significant when controlling for all covariates of which those significant were: sex, current tobacco use, alcohol abuse, and fatigue/sleep disorders (adjusted odds ratios 1.48-1.88). Discussion: There are social disparities in domestic accidents, and they are confounded by sex, substance use, and fatigue/sleep disorders. [less ▲] Detailed reference viewed: 98 (1 UL)![]() Waldmann, Danièle ![]() in Concrete 21st Century Superhero (2009) Detailed reference viewed: 58 (9 UL)![]() ; ; Schulz, André ![]() in Psychophysiology (2009), 46(Supplement 1), 77-78 Detailed reference viewed: 49 (1 UL)![]() ; ; Schulz, André ![]() in Frontiers in Behavioral Neuroscience (2009) Detailed reference viewed: 109 (0 UL)![]() ; Hansen, Joachim ![]() in SmallWat07 (2009) Detailed reference viewed: 123 (9 UL)![]() Schölzel, Karsten ![]() in Proceedings of The International Symposium on Multiple-Valued Logic (2009) A partial function f on a κ-element set Eκ is a partial Sheffer function if every partial function on Eκ is definable in terms of f. Since this holds if and only if f belongs to no maximal partial clone ... [more ▼] A partial function f on a κ-element set Eκ is a partial Sheffer function if every partial function on Eκ is definable in terms of f. Since this holds if and only if f belongs to no maximal partial clone on Eκ, a characterization of partial Sheffer functions reduces to finding families of minimal coverings of maximal partial clones on Eκ. We show that for each κ ≥ 3 there exists a unique minimal covering. [less ▲] Detailed reference viewed: 88 (0 UL)![]() Leyer, Stephan ![]() in International Congress on Advances in Nuclear Power Plants 2009, ICAPP 2009 (2009), 2 The SWR 1000 fuel pool coolers are tubular heat exchangers. They are installed on the fuel pool wall around the spent fuel storage racks. Fuel pool water is cooled by means of natural convection. Forced ... [more ▼] The SWR 1000 fuel pool coolers are tubular heat exchangers. They are installed on the fuel pool wall around the spent fuel storage racks. Fuel pool water is cooled by means of natural convection. Forced circulation flow of closed-cooling water exists on the tube side of each heat exchanger. The penetrations of the cooling water supply lines through the fuel pool liner are all located above the pool water surface. This ensures that the fuel pool cannot lose water in the event of a pipe break. Integration of the cooling components inside the fuel pool ensures only noncontaminated piping within the reactor building. The fuel pool cooling system consists of two redundant cooling trains. Each cooling train comprises four heat exchangers connected in parallel. The system must ensure adequate heat removal both during normal plant operation and in the event of any postulated accident. To verify proper functioning of the component, full-scale, steadystate tests were performed at the INKA (Integral Teststand Karlstein) test facility in Karlstein Germany. The characteristic diagram for heat transfer capacity of the component as a function of cooling water temperature and fuel pool water temperature obtained from these experiments will be presented in this paper. [less ▲] Detailed reference viewed: 100 (1 UL)![]() ; Schulz, André ![]() in Psychophysiology (2009), 46(Supplement 1), 64-64 Detailed reference viewed: 88 (0 UL)![]() ; Sorger, Ulrich ![]() in Proceedings of IEEE International Symposium on Information Theory ISIT (2009) The convergence of iterative decoding schemes utilizing belief propagation is considered. A quantitative bound for the output L-values of a Turbo decoder is given that only depends on the received word ... [more ▼] The convergence of iterative decoding schemes utilizing belief propagation is considered. A quantitative bound for the output L-values of a Turbo decoder is given that only depends on the received word and thus is independent from the decoder iterations. Further, it is shown that the exponential increase of the L-values in each iteration within an LDPC decoder is limited by the degree of the variable nodes. [less ▲] Detailed reference viewed: 144 (3 UL)![]() ; Anton, Fernand ![]() ![]() in European Journal of Pain (2009), 13(1), 74-75 Detailed reference viewed: 123 (3 UL)![]() Gabbay, Dov M. ![]() in Logic, Games and Philosophy: Foundational Perspectives (2009) In its recent attention to reasoning that is agent-based and target-driven, logic has re-taken the practical turn and recovered something of its historic mission. In so doing, it has taken on in a quite ... [more ▼] In its recent attention to reasoning that is agent-based and target-driven, logic has re-taken the practical turn and recovered something of its historic mission. In so doing, it has taken on in a quite general way a game-theoretic character, precisely as it was with the theory of syllogistic refutation in the Topics and On Sophistical Refutations, where Aristotle develops winning strategies for disputations. The approach that the present authors take toward the logic of practical reasoning is one in which cognitive agency is inherently strategic in its orientation. In particular, as is typically the case, individual agents set cognitive targets for themselves opportunistically, that is, in such ways that the attainment of those targets can be met with resources currently or forseeably at their disposal. This not to say that human reasoning is so game-like as to be utterly tendentious. But it does make the point that the human player of the cognitive game has no general stake in accepting undertakings that he has no chance of making good on. Throughout its long history, the traditional fallacies have been characterized as mistakes that are attractive, universal and incorrigible. In the present essay, we want to begin developing an alternative understanding of the fallacies. We will suggest that, when they are actually employed by beings like us, they are defensible strategies in game-theoretically describable pursuit of cognitive (and other) ends. [less ▲] Detailed reference viewed: 84 (0 UL)![]() Filimon, Marlena ![]() in Biophysical Journal (2009), 96(3), 639 A near field microscope incorporating vibrational spectroscopy as a contrast mechanism would allow chemical mapping in the so called “fingerprint region”, with the high spatial resolution of SNOM [2-4 ... [more ▼] A near field microscope incorporating vibrational spectroscopy as a contrast mechanism would allow chemical mapping in the so called “fingerprint region”, with the high spatial resolution of SNOM [2-4]. Using a scattering scanning near-field microscope (s-SNIM) allows us to simultaneously record topography and frequency-dependent near-field signal of organic and biological samples with sub-diffraction limited resolution of up to 90 nm. [less ▲] Detailed reference viewed: 107 (1 UL)![]() Adedjouma, Morayo ![]() in Proceedings of the REFSQ 2011 Workshops REEW, EPICAL and RePriCo, the REFSQ 2011 Empirical Track (Empirical Live Experiment and Empirical Research Fair), and the REFSQ 2011 Doctoral Symposium (2009) Detailed reference viewed: 52 (1 UL)![]() ; Jamroga, Wojciech ![]() in Proceedings of AAMAS'09 (2009) Detailed reference viewed: 43 (3 UL)![]() ; Bordas, Stéphane ![]() in Proceedings of 10th International Conference on Thermal, Mechanical and Multi-Physics Simulation and Experiments in Microelectronics and Microsystems, EuroSimE 2009 (2009) The lifetime of a solder joint is mainly determined by its creep behaviour. Creep arises from the stresses inside the solder joints as a consequence of the thermomechanical mismatch of the board and the ... [more ▼] The lifetime of a solder joint is mainly determined by its creep behaviour. Creep arises from the stresses inside the solder joints as a consequence of the thermomechanical mismatch of the board and the substrate. The stress state is heavily influenced by the anisotropy of tin. To understand the damage process in solder joints, the influence of the anisotropic microstructure must be understood. In this paper the influence of different grain sizes, shapes and orientations on the stress state is evaluated, based on numerical experiments. [less ▲] Detailed reference viewed: 67 (2 UL)![]() Parent, Xavier ![]() ![]() in Abstract book of 9th De Morgan Workshop on Deontic Logic (2009) In a range of contexts, one comes across processes resembling inference, but where input propositions are not in general included among outputs, and the operation is not in any way reversible. Exa mples ... [more ▼] In a range of contexts, one comes across processes resembling inference, but where input propositions are not in general included among outputs, and the operation is not in any way reversible. Exa mples arise in contexts of conditional obligations, goals, ideals, preferences , actions, and beliefs. Our purpose is to develop a theory of such input/output operations . Four are singled out: simple- minded, basic (making intelligent use of disjunctiv e inputs), simple-minded reusable (in which outputs may be recycled as inputs), and b asic reusable. They are defined semantically and characterised by derivation rules, as well as in terms of relabeling procedures and modal operators. Their behaviour is studied on both semantic and syntactic levels [less ▲] Detailed reference viewed: 75 (7 UL)![]() Lygidakis, Charilaos ![]() in Swiss Medical Weekly (2009), 139(33-34), 35--35 Detailed reference viewed: 66 (5 UL)![]() Schulz, André ![]() in Psychophysiology (2009), 46(Supplement 1), 17-17 Detailed reference viewed: 77 (0 UL) |
||