References of "Reports"
     in
Bookmark and Share    
Full Text
See detailThe memory-hard Argon2 password hash function
Biryukov, Alex UL; Khovratovich, Dmitry UL; Dinu, Dumitru-Daniel UL et al

Report (2015)

This document describes the Argon2 memory-hard function for password hashing and other applications. We provide a implementer oriented description together with sample code and test vectors. The purpose ... [more ▼]

This document describes the Argon2 memory-hard function for password hashing and other applications. We provide a implementer oriented description together with sample code and test vectors. The purpose is to simplify adoption of Argon2 for Internet protocols. [less ▲]

Detailed reference viewed: 160 (6 UL)
Full Text
See detailIsogeometric boundary element methods for three dimensional fatigue crack growth
Peng, Xuan; Atroshchenko, Elena; Kerfriden, Pierre et al

Report (2015)

The isogeometric boundary element method (IGABEM) based on NURBS is adopted to model fracture problem in 3D. The NURBS basis functions are used in both crack representation and physical quantity ... [more ▼]

The isogeometric boundary element method (IGABEM) based on NURBS is adopted to model fracture problem in 3D. The NURBS basis functions are used in both crack representation and physical quantity approximation. A stable quadrature scheme for singular integration is proposed to enhance the robustness of the method in dealing with highly distorted element. The convergence study in crack opening displacement is performed for penny-shaped crack and elliptical crack. Two ways to extract stress intensity factors (SIFs), the contour $M$ integral and virtual crack closure integral, are implemented based on the framework of dual integral equations. An algorithm is outlined and validated to be stable for fatigue crack growth, thanks to the smoothness not only in crack geometry but also in stress/SIFs solution brought by IGABEM. [less ▲]

Detailed reference viewed: 456 (14 UL)
Full Text
See detailLean Model-Driven Development through Model-Interpretation: the CPAL design flow
Navet, Nicolas UL; Fejoz, Loïc; Havet, Lionel et al

Report (2015)

We introduce a novel Model-Driven Development (MDD) flow which aims at more simplicity, more intuitive programming, quicker turnaround time and real-time predictability by leveraging the use of model ... [more ▼]

We introduce a novel Model-Driven Development (MDD) flow which aims at more simplicity, more intuitive programming, quicker turnaround time and real-time predictability by leveraging the use of model-interpretation and providing the language abstractions needed to argue about the timing correctness on a high-level. The MDD flow is built around a language called Cyber-Physical Action Language (CPAL). CPAL serves to describe both the functional behaviour of activities (i.e., the code of the function itself) as well as the functional architecture of the system (i.e., the set of functions, how they are activated, and the data flows among the functions). CPAL is meant to support two use-cases. Firstly, CPAL is a development and design space exploration environment for CPS with main features being the formal description, the editing, graphical representation and simulation of CPS models. Secondly, CPAL is a real-time execution platform. The vision behind CPAL is that a model is executed and verified in simulation mode on a workstation and the same model can be later run on an embedded board with a timing-equivalent run-time time behaviour. [less ▲]

Detailed reference viewed: 144 (7 UL)
Full Text
See detailÉléments pour une évaluation de la réforme de la formation professionnelle : les principales critiques
Meyers, Raymond UL; Speltz, Fernand; Houssemand, Claude UL

Report (2015)

Une importante réforme de la formation professionnelle initiale est en cours au Luxembourg depuis 2008. Elle consiste en l'introduction systématique d'un enseignement par compétences pour l'ensemble des ... [more ▼]

Une importante réforme de la formation professionnelle initiale est en cours au Luxembourg depuis 2008. Elle consiste en l'introduction systématique d'un enseignement par compétences pour l'ensemble des 120 métiers et en la mise en œuvre des formations sous une forme modulaire et flexible. Ainsi, les principales modifications par rapport à l’ancien modèle sont la substitution des notations chiffrées de savoirs par des évaluations qualitatives de compétences, et les rattrapages à la carte des modules non réussis par l'élève jusqu'à réussite de ceux-ci, dans le cadre de la limite temporelle légale. Cette nouvelle procédure a buté sur un nombre important de difficultés, critiques et résistances. Une « réforme de la réforme » a été entreprise depuis 2014, aboutissant en février 2015 au dépôt d'un nouveau projet de loi (n° 6774) visant à réviser l'ancienne. Afin de préparer et d'accompagner cette révision et les discussions autour de ce travail législatif, l’Institut LifeLong Learning and Guidance (LLLG) de l’Université du Luxembourg a été chargé par le Service de la formation professionnelle (SFP) du ministère de l'Education nationale, de l’Enfance et de la Jeunesse (MENJE), de réaliser une étude qualitative d'évaluation de la formation professionnelle telle qu'elle se présente actuellement. Le présent document reprend certaines conclusions de cette étude. Il est à destination des commanditaires de celle-ci, mais également de la commission de l'Education nationale, de l'Enfance et de la Jeunesse de la Chambre des députés. [less ▲]

Detailed reference viewed: 113 (6 UL)
Full Text
See detailEcho iTEO. Co-languaging, collaborating, co-constructing
Kirsch, Claudine UL; Gretsch, Gérard

Report (2015)

Detailed reference viewed: 76 (4 UL)
Full Text
See detailBIX – Der Bibliotheksindex
Pausch, Marie-Pierre UL; Park, Beth Anne UL; Ourth, Annette UL

Report (2015)

Detailed reference viewed: 167 (70 UL)
Full Text
See detailEffective lifelong learning strategies and value creation at the enterprise level: Thematic report
Brandi, Ulrik; Iannone, Rosa Lisa UL

Report (2015)

This report describes and maps out effective lifelong learning strategies as they are employed at an enterprise level, including an analysis of how such strategies influence enterprises’ learning capacity ... [more ▼]

This report describes and maps out effective lifelong learning strategies as they are employed at an enterprise level, including an analysis of how such strategies influence enterprises’ learning capacity in their strive towards value creation and high performance. The empirical data triangulates three sources: 1) past empirical and theoretical work (1990-2012); 2) LLLight’in’Europe’s (FP7) empirical data; 3) 2009 and 2013 European Company Survey results. A key conjecture for the empirical analysis and conceptual model is that the ways in which different kinds of learning opportunities, understood as human resource practices (HRPs), are enacted in an enterprise is linked to available arrangements of specific systems, structures, values, processes and resources, mediated by learning. Similarities and differences in these factors create arrays of learning opportunities and potentials for attracting, sustaining and developing competences. The research and analytical synthesis address three interrelated areas of lifelong learning in enterprises, identified as imperatives in high-performance work systems: skills development; learning systems and incentives; and work design and the organisation of work. [less ▲]

Detailed reference viewed: 55 (6 UL)
Full Text
See detailTowards more secure and usable cloud storage for E-Health
Ghatpande, Sankalp; Gheorghe, Gabriela UL

Report (2015)

Secure storage for medical data when using cloud systems is a problem of high importance to healthcare institutions and cloud providers as well. This report investigates how safe is the storage provided ... [more ▼]

Secure storage for medical data when using cloud systems is a problem of high importance to healthcare institutions and cloud providers as well. This report investigates how safe is the storage provided by state of the art tools, discusses their limitations and proposes some solutions and techniques to improve confidentiality when storing medical data remotely. [less ▲]

Detailed reference viewed: 223 (24 UL)
Full Text
See detailHarvesting Fix Hints in the History of Bugs
Bissyande, Tegawendé François D Assise UL

Report (2015)

In software development, fixing bugs is an im- portant task that is time consuming and cost-sensitive. While many approaches have been proposed to automatically detect and patch software code, the ... [more ▼]

In software development, fixing bugs is an im- portant task that is time consuming and cost-sensitive. While many approaches have been proposed to automatically detect and patch software code, the strategies are limited to a set of identified bugs that were thoroughly studied to define their properties. They thus manage to cover a niche of faults such as infinite loops. We build on the assumption that bugs, and the associated user bug reports, are repetitive and propose a new approach of fix recommendations based on the history of bugs and their associated fixes. In our approach, once a bug is reported, it is automatically compared to all previously fixed bugs using information retrieval techniques and machine learning classification. Based on this comparison, we recommend top-k fix actions, identified from past fix examples, that may be suitable as hints for software developers to address the new bug [less ▲]

Detailed reference viewed: 46 (3 UL)
Full Text
See detailBuilding relationships between school, family and community to enhance students' school persistence and avoid Early School Leaving (ESL)
Poncelet, Débora UL; Billa, Jean; Schürnbrand, Carmen et al

Report (2015)

Dropout is a multidimensional phenomenon, resulting from a combination of personal, family and school factors that interact with each other. The combination of risk factors (or protective factors) is an ... [more ▼]

Dropout is a multidimensional phenomenon, resulting from a combination of personal, family and school factors that interact with each other. The combination of risk factors (or protective factors) is an event or a condition that increase (or reduce) the likelihood of an individual experience of emotional or behavioural problems, that may contribute to school dropout. The decision to stop school education is the result of a long evolutionary process that is characterized by an accumulation of frustrations, often induced by academic failures and difficult relationships with peers, teachers, and parents. Through involvement in educational aspects, families especially play an important role in student success and affect conditions that might lead to dropping out: positive impact on school performance, enhancing motivation and school involvement, improving well-being and school behaviours, building a constructive and efficient relationship between school and family could be an efficient way to avoid school dropout. In this session, our exchanges and reflections aim at comparing and analyzing issues, experiences, ideas, and questions from different interventions of European representatives. Through these different contributions, we try to highlight concrete policies for UE countries regarding the connections that we can do between school dropout and relationships between school, family and community. [less ▲]

Detailed reference viewed: 88 (12 UL)
Full Text
See detailBilateral comparison between the FG5X-216 and FG5-242
Francis, Olivier UL; Ullrich, Christian

Report (2015)

Detailed reference viewed: 106 (10 UL)
See detailGroup interest and subsidiary governance in Luxembourg
Conac, Pierre-Henri UL

Report (2015)

Detailed reference viewed: 132 (3 UL)
Full Text
See detailA Study of Potential Component Leaks in Android Apps
Li, Li UL; Allix, Kevin UL; Li, Daoyuan UL et al

Report (2015)

We discuss the capability of a new feature set for malware detection based on potential component leaks (PCLs). PCLs are defined as sensitive data-flows that involve Android inter-component communications ... [more ▼]

We discuss the capability of a new feature set for malware detection based on potential component leaks (PCLs). PCLs are defined as sensitive data-flows that involve Android inter-component communications. We show that PCLs are common in Android apps and that malicious applications indeed manipulate significantly more PCLs than benign apps. Then, we evaluate a machine learning-based approach relying on PCLs. Experimental validation show high performance with 95% precision for identifying malware, demonstrating that PCLs can be used for discriminating malicious apps from benign apps. By further investigating the generalization ability of this feature set, we highlight an issue often overlooked in the Android malware detection community: Qualitative aspects of training datasets have a strong impact on a malware detector’s performance. Furthermore, this impact cannot be overcome by simply increasing the Quantity of training material. [less ▲]

Detailed reference viewed: 195 (2 UL)
Full Text
See detailRelative gravity measurements in Ilulissat in July 2013
Francis, Olivier UL

Report (2015)

Detailed reference viewed: 153 (24 UL)
Full Text
See detailLes langues dans les offres d'emploi au Luxembourg (1984-2014)
Pigeron-Piroth, Isabelle UL; Fehlen, Fernand UL

Report (2015)

Cette étude propose une analyse des demandes linguistiques dans les offres d’emploi au Luxembourg dans deux médias différents : 1) À partir d’un échantillon d’offres du Luxemburger Wort portant sur la ... [more ▼]

Cette étude propose une analyse des demandes linguistiques dans les offres d’emploi au Luxembourg dans deux médias différents : 1) À partir d’un échantillon d’offres du Luxemburger Wort portant sur la période 1984-2014, elle décrit l’évolution des compétences linguistiques exigées ou souhaitées sur le marché du travail du Luxembourg. 2) Pour tenir compte de l’importance croissante des recrutements en ligne, une deuxième étude porte sur un corpus d’offres publiées sur le site Internet Jobs.lu. La prise en compte de ces deux sources permet de montrer une segmentation linguistique entre les différentes branches d’activité et une augmentation des demandes langagières explicites au fil des 30 dernières années. [less ▲]

Detailed reference viewed: 803 (138 UL)
Full Text
See detailDetermining labour shortages and the need for labour migration from third countries in the EU
Sommarribas, Adolfo UL; Becker, Fabienne UL; Nienaber, Birte UL

Report (2015)

Since almost 150 years, Luxembourg depends on two kinds of migration, qualified and non-qualified, in order to deal with the workforce needs of its economy. Compared to the other EU Member States ... [more ▼]

Since almost 150 years, Luxembourg depends on two kinds of migration, qualified and non-qualified, in order to deal with the workforce needs of its economy. Compared to the other EU Member States, Luxembourg is the country with the largest proportion of foreigners; however, this foreign population is mainly composed of EU citizens. Due to its size and geographic position, Luxembourg was able to have access to a very particular form of economic migration: cross-border workers. Globalisation has also played a decisive role in the development of economic migration for the Luxembourgish labour market. The financial centre was obliged to become highly specialised in order to remain competitive in regards to other financial centres and to maintain its volume of business. In order to maintain its competitive advantage, Luxembourg needs highly skilled personnel, which the country has found, up until now, within the Greater Region. This reality is even more pronounced with regards to the labour market: the number of actives (salaried and non-salaried) on 31 March 2014 shows that Luxembourgish nationals represented only 31%, EU citizens 65% and third-country nationals only 4%. Cross-border workers from Belgium, France and Germany represented 42% of the workforce and the resident migrant population (EU citizens and third-country nationals) 28%. Cross-border workers, which consist of skilled and highly skilled labour are substantially attracted for two reasons: 1) more competitive salaries on the Luxemburgish labour market ; and 2) a geographical location which allows the commuting of cross-border workers. The attitude of the successive governments was to adapt immigration to the economic needs of the country. The government policy intends to focus on attracting highly added value activities focussed on new technologies (biomedicine and information as well as communication technologies – focusing on IT security), logistics and research. However, being one of the smallest countries in the European Union, Luxembourg has limited human resources to guarantee the growth not only of the financial sector but also of the new technologies sectors. The government introduced the highly qualified worker residence permit in the bill on free movement of persons and immigration approved by law of 29 August 2008 almost a year before of the enactment of the Blue Card Directive to facilitate the entry of third-country national highly qualified workers. However, this reform was isolated and incomplete and took place without making a real evaluation of the workforce demand of the different sectors of the economy. Even though until now Luxembourg has been relying on the workforce from the Greater Region, for some socio-economic and political stakeholders, highly qualified workforces began to become scarce in the Greater region. In addition to the cross-border workers, the lifting of restrictions to access all the sectors of the labour market for citizens of the new Member States (EU-8) can be considered as a mitigating factor for the need to make an evaluation of the workforce demand, because the high salaries paid in Luxembourg became a real pull factor for the highly qualified workers. As a consequence, the political authorities did not foresee a systematic plan on how to address labour shortages in specific sectors of the economy, because there has not been a significant need for doing so. [less ▲]

Detailed reference viewed: 179 (9 UL)
Full Text
See detailModel-Driven Security based on A Unified System of Security Design Patterns
Nguyen, Phu Hong UL

Report (2015)

Model-Driven Security (MDS) for secure systems development still has limitations to be more applicable in practice. A recent systematic review of MDS shows that current MDS approaches have not dealt with ... [more ▼]

Model-Driven Security (MDS) for secure systems development still has limitations to be more applicable in practice. A recent systematic review of MDS shows that current MDS approaches have not dealt with multiple security concerns system- atically. Besides, catalogs of security patterns which can address multiple security concerns have not been applied efficiently. This paper presents an MDS approach based on a unified System of Security design Patterns (SoSPa). In SoSPa, security design patterns are collected, specified as reusable aspect models to form a coherent system of them that guides developers in systematically addressing multiple security concerns. SoSPa consists of not only interrelated security design patterns but also a refinement process towards their application. We applied SoSPa to design the security of crisis management systems. The result shows that multiple security concerns in the case study have been addressed by systematically integrating different security solutions. [less ▲]

Detailed reference viewed: 182 (15 UL)
See detailSchool transitions from primary to secondary school: development of intervention strategies to improve the quality of teachers´transition decisions
Krolak-Schwerdt, Sabine UL; Pit-Ten Cate, Ineke UL

Report (2015)

The TRANSINTER project focused on intervention modules to improve teachers’ diagnostic competence, especially in regards to decisions on students’ transition from primary to secondary education in ... [more ▼]

The TRANSINTER project focused on intervention modules to improve teachers’ diagnostic competence, especially in regards to decisions on students’ transition from primary to secondary education in Luxembourg. The main aims of the project were to investigate the effect of three different intervention / training modules, separately and in combination, as well as the influence of group constellation on decision making processes. In order to address the aims, several steps were taken. First, we conducted a thorough literature review, which provided a solid theoretical framework for the studies within the project. Second we developed materials and a criterion to evaluate changes in teachers’ decision making accuracy. At the individual level, we conducted 3 studies to investigate the short and long term effects of accountability, theoretical knowledge and the application of prediction rules on teachers’ decision accuracy. All 3 studies showed at the baseline that teachers’ general decision accuracy was of high standard but also that decision accuracy for ethnic majority students was significantly better than for ethnic minority students. Similarly, teachers were generally more accurate in decisions for students with typical academic profiles compared to mixed profiles. The study on the effects of accountability showed that increased accountability resulted in increased decision accuracy, especially in regards to decisions for ethnic minority students with typical profiles. The studies concerning the introduction of theoretical models of decision making and judgment formation and the application of SPRs resulted in an improvement of transition decisions for ethnic minority students only. Unfortunately, the differential intervention effects of increased accountability, the introduction of theoretical models, and the application of SPRs could not be maintained over time, that is, at follow up, the ethnicity bias reappeared. Interestingly, when we combined the intervention modules to investigate their combined effect on the accuracy of transition decisions, the training in the application of formal decision rules seemed most effective in reducing ethnicity bias. It should be noted that this training was delivered to preservice teachers whilst the intervention studies were conducted with experienced inservice teachers. At the inter-individual level, we investigated the effect of group constellation on the accuracy of transition decisions. In contrast to our hypothesis, we did neither detect a social loafing nor a social facilitation effect and decisions taken in groups did not differ from decisions taken alone. From these studies we can conclude that teachers’ transition decisions can be improved by providing experienced teachers with theoretical knowledge and by increasing accountability. Preservice teachers may profit most from training in the application of formal decision rules as part of a comprehensive training concerning diagnostic competence. [less ▲]

Detailed reference viewed: 94 (4 UL)
Full Text
See detailDiagnostic des Besoins et des Demandes Spécifiques des Bénéficiaires de Pays Tiers du Contrat d’Accueil et d’Intégration
Baumann, Michèle UL; Bucki, Barbara

Report (2015)

Les buts du projet ont été : • Elaborer une photographie des profils sociodémographiques et économiques des 2547 signataires du CAI dont 1130 sont issus de pays tiers • Etablir un diagnostic quantitatif ... [more ▼]

Les buts du projet ont été : • Elaborer une photographie des profils sociodémographiques et économiques des 2547 signataires du CAI dont 1130 sont issus de pays tiers • Etablir un diagnostic quantitatif et qualitatif de leurs besoins spécifiques concernant le dispositif du CAI et ses prestations, de ses retombées sur l’intégration et la qualité de vie. Les objectifs du projet • Décrire le profil socioéconomique des signataires de PT au regard de celui des signataires issus de l’UE et des données sur les étrangers du recensement 2011 ainsi que leur participation aux prestations du dispositif du CAI ; • Analyser le profil socioéconomique des bénéficiaires ayant répondu au questionnaire de PT vs. EU ainsi que celui des volontaires de PT ayant participé aux consultations collectives ; • Examiner les difficultés rencontrées par les bénéficiaires PT dans leur intégration ainsi que leurs besoins et leurs demandes par rapport aux prestations existantes ; • Identifier les retombées du dispositif du CAI sur leur participation à la vie sociale, leur qualité de vie (emploi, formation, santé…) et leur utilisation des services ; • Déterminer les améliorations possibles qui pourraient renforcer le processus du dispositif du CAI afin de soutenir leur intégration. Méthode. Parmi les 452 bénéficiaires du Contrat d'Accueil et d'Intégartion, 233 personnes sont issues de Pays Tiers et ont répondu à un questionnaire. Parmi eux, 50 personnes ont été volontaires pour participer à l’une des 11 consultations collectives animées en français, anglais, espagnol, serbo-croate et chinois. [less ▲]

Detailed reference viewed: 335 (51 UL)
Full Text
See detailAn Extensive Systematic Review on Model-Driven Development of Secure Systems
Nguyen, Phu Hong UL

Report (2015)

Context: Model-Driven Security (MDS) is as a specialised Model-Driven Engineering research area for supporting the development of secure systems. Over a decade of research on MDS has resulted in a large ... [more ▼]

Context: Model-Driven Security (MDS) is as a specialised Model-Driven Engineering research area for supporting the development of secure systems. Over a decade of research on MDS has resulted in a large number of publications. Objective: To provide a detailed analysis of the state of the art in MDS, a systematic literature review (SLR) is essential. Method: We conducted an extensive SLR on MDS. Derived from our research questions, we designed a rigorous, extensive search and selection process to identify a set of primary MDS studies that is as complete as possible. Our three-pronged search process consists of automatic searching, manual searching, and snowballing. After discovering and considering more than thousand relevant papers, we identified, strictly selected, and reviewed 108 MDS publications. Results: The results of our SLR show the overall status of the key artefacts of MDS, and the identified primary MDS studies. E.g. regarding security modelling artefact, we found that developing domain-specific languages plays a key role in many MDS approaches. The current limitations in each MDS artefact are pointed out and corresponding potential research directions are suggested. Moreover, we categorise the identified primary MDS studies into 5 principal MDS studies, and other emerging or less common MDS studies. Finally, some trend analyses of MDS research are given. Conclusion: Our results suggest the need for addressing multiple security concerns more systematically and simultaneously, for tool chains supporting the MDS development cycle, and for more empirical studies on the application of MDS methodologies. To the best of our knowledge, this SLR is the first in the field of Software Engineering that combines a snowballing strategy with database searching. This combination has delivered an extensive literature study on MDS. [less ▲]

Detailed reference viewed: 107 (7 UL)
Full Text
See detailA Pobreza e a Mente: Perspectiva da Ciência Cognitiva
Engel de Abreu, Pascale UL; Tourinho, Carlos; Puglisi, Marina et al

Report (2015)

Nós procuramos entender por que a pobreza é um obstáculo para o desenvolvimento e o rendimento escolar das crianças. Munidos deste conhecimento, podemos oferecer evidências robustas que podem ser ... [more ▼]

Nós procuramos entender por que a pobreza é um obstáculo para o desenvolvimento e o rendimento escolar das crianças. Munidos deste conhecimento, podemos oferecer evidências robustas que podem ser utilizadas pelas autoridades educacionais em nossa sociedade para quebrar este vínculo. Este estudo utiliza dados multidimensionais de 355 brasileiros, alunos do 1° e 2° anos do Ensino Fundamental I, provenientes de diferentes origens e escolas. O objetivo foi verificar como as crianças adquirem as habilidades cognitivas que auxiliam na aprendizagem. Foram utilizados dados obtidos a partir de testes cognitivos, bem como entrevistas e questionários preenchidos por pais, professores e alunos. O estudo sugere que, embora o baixo nível socioeconômico exerça um forte impacto negativo sobre o desenvolvimento cognitivo de uma criança, uma educação de boa qualidade nos primeiros anos de vida pode contornar esse problema. Os resultados encontrados dão suporte à hipótese de que as experiências que as crianças têm no início da vida afetam o desenvolvimento do cérebro. Uma base cognitiva sólida é crucial para o aprendizado e é um fator fundamental para quebrar o ciclo da pobreza, para promover o desenvolvimento econômico e reduzir as desigualdades sociais. Assim, fazemos as seguintes sugestões para futuras pesquisas e elaboração de políticas públicas: - Investimento em Educação Infantil (creches e pré-escolas) pode ser a maneira mais eficaz para reduzir as desigualdades e promover a mobilidade social ascendente. - Capacitação de professores sobre aprendizagem com base nos preceitos da ciência cognitiva para dar-lhes uma maior consciência do porquê de alguns alunos apresentarem comportamento difícil e/ou dificuldades de aprendizagem. - Elaboração de políticas públicas baseadas em evidências científicas. Políticos e profissionais devem trabalhar em conjunto com cientistas no intuito de desenvolver programas com maiores probabilidades de sucesso. [less ▲]

Detailed reference viewed: 1414 (58 UL)
Full Text
See detail« De l’Empathie Pour Lutter Contre le Harcèlement à l’Ecole (EPLUCHE) »
Kerivel, Aude UL

Report (2015)

L’expérimentation évaluée consiste à proposer une éducation à l’empathie pendant deux années scolaires consécutives aux élèves de 20 classes de CM1 puis de CM2, afin de lutter contre le harcèlement à ... [more ▼]

L’expérimentation évaluée consiste à proposer une éducation à l’empathie pendant deux années scolaires consécutives aux élèves de 20 classes de CM1 puis de CM2, afin de lutter contre le harcèlement à l’école. A partir du concept d’empathie, présenté par une équipe de recherche comme la capacité à reconnaître les émotions d’autrui, à assumer le point de vue d’autrui et à manifester de la sensibilité »1, chercheurs, artistes, sportifs, coordonnateurs ECLAIR et enseignants vont co-construire, expérimenter et proposer des séances de jeux sportifs, dansés, théâtre forum et jeux de rôle, toujours associés à des temps de verbalisation. La question que nous pose cette expérimentation est donc la suivante : de quelle manière l’éducation à l’empathie peut-elle permettre de prévenir, résoudre, voire éviter les situations de harcèlement entre pairs et plus largement de violence à l’école ? L’objectif de notre expérimentation est de mesurer l’impact de l’expérimentation sur la population visée, à savoir les élèves, mais aussi les parents et les enseignants de CM1 puis de CM2, de repérer les conditions de mise en œuvre et de transférabilité du dispositif. La choix d’une méthode mixte et innovante alliant observations, observations participantes, entretiens collectifs, questionnaires et questionnaire ludique au début et à la fin de la démarche (à destination des enfants), ainsi que le suivi régulier de l’expérimentation, nous permet de rendre un certain nombre de conclusions quant aux effets de l’expérimentation sur l’ensemble des populations. L’expérimentation, grâce au travail collaboratif et au va-et-vient entre théorie et pratique a su s’ajuster afin de faire en sorte que l’ensemble des enfants et que le plus grand nombre de parents bénéficient du dispositif. Parmi les principaux effets hypothétiques2 de l’expérimentation, nous pouvons repérer une baisse significative du nombre d’enfants concernés par les situations d’exclusion (passant de 47,6% en 2013 à 30,2% en 2014) et de harcèlement (passant de 24% à 12,3%). Au delà des situations de harcèlement, l’expérimentation semble impacter le climat scolaire de manière plus générale, puisqu’on observe par exemple une baisse de la peur dans les situations d’apprentissage telles que le passage au tableau. L’information transmise à la majorité des parents et leur participation, pour une partie, aux goûters, témoignent du fait que l’empathie n’entraine pas seulement l’adhésion des professionnels. Ces derniers, déterminants dans la mise en œuvre du dispositif, ont eux aussi été impactés par l’expérimentation, tant en ce qui concerne une sensibilisation à la notion de harcèlement et une capacité à repérer et agir en équipe en direction de ces situations, que dans la connaissance par le biais de « l’éprouvé » et la capacité à la transmission de l’empathie. Les conditions de réalisation de cette expérimentation tiennent à un ensemble d’éléments : - le soutien et la confiance de la hiérarchie, donnant la possibilité aux enseignants d’accéder à un nouveau concept, incarné par le chercheur à l’origine de la théorie ; - le travail à partir de ce concept permettant aux enseignants prise de recul et appropriation de théorie dont l’intérêt tient à la possibilité d’engagement dans la construction d’une mise en œuvre permise par le temps laissé ; - la possibilité d’expérimenter par le corps, mais aussi de dégager au fur et à mesure de nouvelles notions (émotions, rites...) enrichies par le croisement des différents regards et la rencontre. Enfin, ce que nous pouvons retenir de cette expérimentation, c’est le caractère positif et valorisant de la notion d’empathie, qui propose un autre point de départ que celui de la lutte contre le harcèlement par exemple. Une compétence sociale, qui peut aider au travail d’égalité entre filles et garçons et réconciliant rapport à soi et rapport aux autres. [less ▲]

Detailed reference viewed: 635 (6 UL)
Full Text
See detailAdmitting third-country nationals for business purposes
Sommarribas, Adolfo UL; Becker, Fabienne UL; Besch, Sylvain et al

Report (2015)

In Luxembourg, the amended law of 29 August 2008 on free movement of persons and immigration does not provide a definition for immigrant investors or immigrant business owners. A third-country national ... [more ▼]

In Luxembourg, the amended law of 29 August 2008 on free movement of persons and immigration does not provide a definition for immigrant investors or immigrant business owners. A third-country national investor can either receive a residence permit as a self-employed worker or a residence permit for private reasons. Which one of both residence permits the applicant receives is dependent of whether s/he wants to actively work in the company s/he invests in or whether s/he wants to be a passive investor. As the global economic growth is not located anymore in Europe and in the USA but in emerging economies (i.e. BRIC countries), the government is targeting investors and capital also from these countries. An interministerial working group was set up, which prepares two drafts bills to create a legal framework for attracting third-country national investors and business managers in Luxembourg. This working group is composed of the Ministry of Finance, the Ministry of Economy (General Directorate of Small and Medium-Sized enterpises) and the Ministry of Foreign and European Affairs (Directorate of Immigration). [less ▲]

Detailed reference viewed: 121 (10 UL)
Full Text
See detailComputational Mechanics Lab Report 2013-2014
Bordas, Stéphane UL

Report (2015)

This is the report of the Computational Mechanics Lab led by Prof. Stéphane Bordas

Detailed reference viewed: 1778 (187 UL)
Full Text
See detailElements of direct democracy in the recent practice of European countries: some thoughts à propos the Roundtable ‘Constitutional Change and People
Pichou, Maria UL

Report (2015)

How can the general public participate in constitution-making and constitution-amending procedures? Are popular initiatives in constitutional change more desirable or feasible in European countries today ... [more ▼]

How can the general public participate in constitution-making and constitution-amending procedures? Are popular initiatives in constitutional change more desirable or feasible in European countries today? The recent Roundtable ‘Constitutional Change and People’, organised by the University of Luxembourg and the International Association of Constitutional Law (Constitution-Making and Constitutional Change Research Group) on December 12th 2014, dealt with these issues. The discussion was prompted by ongoing developments in some European countries, which reveal a tendency to introduce elements of direct democracy, such as referendums, online petitions and citizens’ initiatives into the field of constitutional change. The introductory address by the President of the European Court of Justice Prof. Dr. Vasileios Skouris, underlined the difficulties that many European constitutions face in integrating the ‘European phenomenon’. The interaction between the European legal order and national constitutions is still a source of legal uncertainty. There is a movement towards strengthening the possibility of people contributing to constitutional changes around the world in general, and in Europe specifically, after the adoption of the Lisbon Treaty. The timeliness of analysing recent examples of people’s participation in constitutional changes in France, Greece, Iceland, Ireland, Luxembourg, Romania and Switzerland, therefore, becomes evident. [less ▲]

Detailed reference viewed: 68 (9 UL)
Full Text
See detailArgon and Argon2
Biryukov, Alex UL; Dinu, Dumitru-Daniel UL; Khovratovich, Dmitry UL

Report (2015)

This is a design specification for the functions Argon and Argon2 for the international password hashing competition (PHC), 2013-2015. Argon is our original submission to PHC. It is a multipurpose hash ... [more ▼]

This is a design specification for the functions Argon and Argon2 for the international password hashing competition (PHC), 2013-2015. Argon is our original submission to PHC. It is a multipurpose hash function, that is optimized for highest resilience against tradeoff attacks, so that any, even small memory reduction would lead to significant time and computational penalties. Argon can be used for password hashing, key derivation, or any other memory-hard computation (e.g., for cryptocurrencies). Argon2 summarizes the state of the art in the design of memory-hard functions. It is a streamlined and simple design. It aims at the highest memoryfilling rate and effective use of multiple computing units, while still providing defense against tradeoff attacks. Argon2 is optimized for the x86 architecture and exploits the cache and memory organization of the recent Intel and AMD processors. Argon2 has two variants: Argon2d and Argon2i. Argon2d is faster and uses data-depending memory access, which makes it suitable for cryptocurrencies and applications with no threats from side-channel timing attacks. Argon2i uses data-independent memory access, which is preferred for password hashing and password based key derivation. Argon2i is slower as it makes more passes over the memory to protect from tradeoff attacks. We recommend Argon for the applications that aim for the highest tradeoff resilience and want to guarantee prohibitive time and computational penalties on any memory-reducing implementation. According to our cryptanalytic algorithms, an attempt to use half of the requested memory (for instance, 64 MB instead of 128 MB) results in the speed penalty factor of 140 and in the penalty 218. The penalty grows exponentially as the available memory decreases, which effectively prohibits the adversary to use any smaller amount of memory. Such high computational penalties are a unique feature of Argon. We recommend Argon2 for the applications that aim for high performance. Both versions of Argon2 allow to fill 1 GB of RAM in a fraction of second, and smaller amounts even faster. It scales easily to the arbitrary number of parallel computing units. Its design is also optimized for clarity to ease analysis and implementation. [less ▲]

Detailed reference viewed: 376 (14 UL)
Full Text
See detailMachbarkeitsstudie "Betreuungsatlas Schweiz": Die Geographie betreuter Kindheit
Neumann, Sascha UL; Tinguely, Luzia; Hekel, Nicole UL et al

Report (2015)

Detailed reference viewed: 52 (3 UL)
See detailCivil Judicial Experts in the EU: Analysis of EU Legislation and Recommendations
Cuniberti, Gilles UL

Report (2015)

Upon request bythe JURI Committee, this study provides an analysis of existing EU legislation applicable to judicial expertise for the purpose of assessing whether cross-border expertise in the EU is ... [more ▼]

Upon request bythe JURI Committee, this study provides an analysis of existing EU legislation applicable to judicial expertise for the purpose of assessing whether cross-border expertise in the EU is hampered or restricted, and whether steps could be taken to facilitate it and to further develop a genuine European area of civil justice. It concludes that, while existing EU law is largely satisfactory, there are still major issues, and that EU action would be necessary to address them. [less ▲]

Detailed reference viewed: 28 (0 UL)
Full Text
See detailEine Bilanz zur Gesetzesreform Aide 'a l'Enfance et à la Famille (AEF)
Peters, Ulla UL; Jäger, Julia UL; Ministerium für nationale Bildung, Kindheit und Jugend Luxemburg

Report (2015)

Detailed reference viewed: 152 (23 UL)
Full Text
See detailComputational Metaphysics
Benzmüller, Christoph UL; Wisniewski, Max; Steen, Alexander UL

Report (2015)

Detailed reference viewed: 22 (0 UL)
Full Text
See detailDissemination of information on voluntary return: How to reach irregular migrants not in contact with the authorities - Luxembourg
Li, Lisa UL; Petry, David UL; Nienaber, Birte UL

Report (2015)

The focus of this study lies with irregular migrants who are not in contact with the authorities. Due to their irregular situation, it is difficult to provide information on the numbers of persons that ... [more ▼]

The focus of this study lies with irregular migrants who are not in contact with the authorities. Due to their irregular situation, it is difficult to provide information on the numbers of persons that are irregularly staying in Luxembourg. Several actors were able to provide some estimations on the scale of irregular migrants, but these estimations can only ever be partial. Statistics are available concerning the assisted voluntary return and reintegration from Luxembourg programme that is operated by the International Organization for Migration (IOM) as well as concerning the counselling services offered by different non-governmental organisations and associations. However, most of these numbers refer to migrants that are known to the authorities, mainly because they are rejected applicants for international protection. [less ▲]

Detailed reference viewed: 110 (16 UL)
See detailMehrsprachigkeit in Luxemburgischen Primarschulen
Weth, Constanze UL

Report (2015)

Detailed reference viewed: 201 (23 UL)
Full Text
See detailESPON on the road - Bringing closer ESPON evidence for decision making
Breuer, Ina; Radvanski, Adam; Schön, Karl Peter et al

Report (2015)

The ESPONontheRoad project was a Transnational Networking Activity (TNA) of nineteen ESPON Contact Points (ECPs) with the aim to bring ESPON results closer for decision-making and thus increase the ... [more ▼]

The ESPONontheRoad project was a Transnational Networking Activity (TNA) of nineteen ESPON Contact Points (ECPs) with the aim to bring ESPON results closer for decision-making and thus increase the capitalisation of the ESPON Programme. During a year, participating ECPs brought ESPON closer to the local and regional level, and to citizens in physical and virtual forms. The project built a bridge between the issues on a local level and scientific evidence on EU territorial development policy themes. After taking stock of the most recent policy issues in each national context, ECPs formed transnational working groups to have a common understanding of the messages coming from ESPON results. These working groups designed the most appropriate and efficient form of communication for their target groups. In this way ESPON results were put into the macroregional context of West, South, North and Central-Eastern areas, and both the content-related and the organisational tasks were organised in a balanced way. The activity report summaries the goals of the project, presents how they were implemented and what are the lessons learnt. It concludes with recommendations for the future. [less ▲]

Detailed reference viewed: 236 (2 UL)
See detailPrivacy and Data Protection by Design-from policy to engineering
Danezis, George; Domingo-Ferrer, Josep; Hansen, Marit et al

Report (2015)

Detailed reference viewed: 58 (1 UL)
Full Text
See detailConsultations citoyennes et réformes constitutionnelles
Kies, Raphaël UL

Report (2015)

The report was commissioned by the Chamber of Deputies for preparing the campaign around the constitutional referendum that was held in June 2015. It has two objectives. The first is to assess the ... [more ▼]

The report was commissioned by the Chamber of Deputies for preparing the campaign around the constitutional referendum that was held in June 2015. It has two objectives. The first is to assess the citizens’ opinion and awareness on the four referendum issues. The evaluation was made on the basis of four citizen consultations composed by a representative panel of citizens resident in Luxembourg. In addition of providing an overview of the state of citizens’ knowledge and opinions (and their evolution), that analysis allows to assess how participants perceive the consultation process itself. The second objective is to present and discuss concrete proposals to include citizen’s in the process of the constitutional reform and the referendum. This last part is based on the teachings of the consultation carried out in Luxembourg as well as three case studies where people were fully involved in the constitutional reform process: the case of Iceland, Ireland and the State of Oregon (USA). [less ▲]

Detailed reference viewed: 166 (24 UL)
Full Text
See detailMedia pluralism monitor 2015: Luxembourg
Kies, Raphaël UL; Schall, Céline UL; Nommesch, Kim

Report (2015)

Detailed reference viewed: 324 (35 UL)
Full Text
See detailAutomated Test Suite Generation for Time-Continuous Simulink Models
Matinnejad, Reza UL; Nejati, Shiva UL; Briand, Lionel UL

Report (2015)

All engineering disciplines are founded and rely on models, al- though they may differ on purposes and usages of modeling. Inter- disciplinary domains such as Cyber Physical Systems (CPSs) seek approaches ... [more ▼]

All engineering disciplines are founded and rely on models, al- though they may differ on purposes and usages of modeling. Inter- disciplinary domains such as Cyber Physical Systems (CPSs) seek approaches that incorporate different modeling needs and usages. Specifically, the Simulink modeling platform greatly appeals to CPS engineers due to its seamless support for simulation and code generation. In this paper, we propose a test generation approach that is applicable to Simulink models built for both purposes of simulation and code generation. We define test inputs and outputs as signals that capture evolution of values over time. Our test gener- ation approach is implemented as a meta-heuristic search algorithm and is guided to produce test outputs with diverse shapes according to our proposed notion of diversity. Our evaluation, performed on industrial and public domain models, demonstrates that: (1) In con- trast to the existing tools for testing Simulink models that are only applicable to a subset of code generation models, our approach is applicable to both code generation and simulation Simulink mod- els. (2) Our new notion of diversity for output signals outperforms random baseline testing and an existing notion of signal diversity in revealing faults in Simulink models. (3) The fault revealing ability of our test generation approach outperforms that of the Simulink Design Verifier, the only testing toolbox for Simulink. [less ▲]

Detailed reference viewed: 261 (28 UL)
Full Text
See detailPrivacy and Security in an Age of Surveillance
Ryan, Peter UL; Preneel, Bart; Rogaway, Phillip et al

Report (2015)

The Snowden revelations have demonstrated that the US and other nations are amassing data about people's lives at an unprecedented scale. Furthermore, these revelations have shown that intelligence ... [more ▼]

The Snowden revelations have demonstrated that the US and other nations are amassing data about people's lives at an unprecedented scale. Furthermore, these revelations have shown that intelligence agencies are not only pursuing passive surveillance over the world's communication systems, but are also seeking to facilitate such surveillance by undermining the security of the internet and communications technologies. Thus the activities of these agencies threatens not only the rights of individual citizens but also the fabric of democratic society. Intelligence services do have a useful role to play in protecting society and for this need the capabilities and authority to perform targeted surveillance. But the scope of such surveillance must be strictly limited by an understanding of its costs as well as benefits, and it should not impinge on the privacy rights of citizens any more than necessary. Here we report on a recent Dagstuhl Perspectives Workshop addressing these issues - a four-day gathering of experts from multiple disciplines connected with privacy and security. The meeting explored the scope of mass-surveillance and the deliberate undermining of the security of the internet, defined basic principles that should underlie needed reforms, and discussed the potential for technical, legal and regulatory means to help restore the security of the internet and stem infringement of human-rights by ubiquitous electronic surveillance. [less ▲]

Detailed reference viewed: 207 (2 UL)
Full Text
See detailScience Productivity, Higher Education Development and the Knowledge Society (SPHERE Project) Final Report
Baker, David P.; Crist, John T.; Zhang, Liang et al

Report (2015)

This project created and analyzed a new, large global dataset on scientific journal articles, published between 1900 and 2011, and a series of case studies to examine how systems of higher education ... [more ▼]

This project created and analyzed a new, large global dataset on scientific journal articles, published between 1900 and 2011, and a series of case studies to examine how systems of higher education developed and grew nations’ capacity for scientific research. The analysis resulted in a series of new insights about global scientific production that were only possible with a consideration of long-term trends. First, despite predictions as early as the 1960s that the growth rate of “big science” would slow, the dataset shows in fact that “big science” started a phase of exponential growth in the early 1960s that has continued unabated for decades. “Big science” has transformed into “mega-global science” and the trends of global diffusion and regional differentiation began much earlier in the 20th century than is commonly understood. Second, the analysis of rates of regional journal article production also depicts clear shifts in the competition for ascendancy in scientific production. For the first half of the 20th century, global competition for scientific impact was primarily an Atlantic battle between the top producers of Europe (Germany, France, and the U.K.) and the United States. The locus of competition shifted by the, end of the 20th century to a contest between the current research “superpower, ” the United States, and the fast-growing producer, China, along with the many less populous countries of Western Europe with their highly productive science systems. With the contributions of other East Asian, high volume producers such as Japan and South Korea in the later decades of the 20th century, and simultaneous slowing of research production in U.S. science, the center of gravity for research production has been pulled eastward for the past two decades. Third, while science may indeed be an inherently global and collaborative enterprise, the trend toward global collaboration of authors is a relatively recent one. Historically, one-third of all research articles worldwide result from international collaboration, and less than 26 percent are the product of one researcher alone. In 1980 however only about 2 percent of all SCIE publications involved a collaboration across international lines. Three decades later this proportion is eleven times what it was in 1980. Finally, the study also concluded that overall volume of production is not a sufficient measure of scientific capacity by itself. When adjusting for the size of population and the economy the proportion of GDP spent on R&D or the number of researchers some smaller countries (especially in Europe) are more productive on a per capita basis than mid-sized or even larger ones. Similarly the ratio of investment in science to scientific production is much higher in the high volume producers than it is in some small states. While output is smaller in these states, they have maximized R&D investments more efficiently than their larger competitors. [less ▲]

Detailed reference viewed: 294 (23 UL)
Full Text
See detailLocal Autonomy Index for the European countries (1990-2014): Luxembourg (LUX)
Kies, Raphaël UL; Nommesch, Kim

Report (2015)

Local autonomy index project 2015 (march 2015 – June 2015) is EU Commission funded project coordinated by the Graduate Institute of Public Administration at the University of Lausanne; The goal of the ... [more ▼]

Local autonomy index project 2015 (march 2015 – June 2015) is EU Commission funded project coordinated by the Graduate Institute of Public Administration at the University of Lausanne; The goal of the project is to create a Local Authority Index (LAI) which can be used to report and analyse changes in the amount of decentralisation in some 38 countries. Evaluation includes in depth research on relevant legislation, analyzing tendencies and conducting interviews with relevant stakeholders, communication and close team work with fellow collaborators and coordinators. [less ▲]

Detailed reference viewed: 257 (5 UL)
See detailCheat Sheet: Social Network Analysis for Humanists
During, Marten UL

Report (2015)

Social Network Analysis concepts and methods are extremely powerful ways to describe complex social relations. The field however has developed their own their concepts, some of which require a little bit ... [more ▼]

Social Network Analysis concepts and methods are extremely powerful ways to describe complex social relations. The field however has developed their own their concepts, some of which require a little bit of translation. This cheat sheet should help with the … Continue reading → [less ▲]

Detailed reference viewed: 121 (1 UL)
Full Text
See detailSimulink Fault Localization: an Iterative Statistical Debugging Approach
Liu, Bing UL; Lucia, Lucia UL; Nejati, Shiva UL et al

Report (2015)

Debugging Simulink models presents a significant challenge in the embedded industry. In this work, we propose SimFL, a fault localization approach for Simulink models by combining statistical debugging ... [more ▼]

Debugging Simulink models presents a significant challenge in the embedded industry. In this work, we propose SimFL, a fault localization approach for Simulink models by combining statistical debugging and dynamic model slicing. Simulink models, being visual and hierarchical, have multiple outputs at different hierarchy levels. Given a set of outputs to observe for localizing faults, we generate test execution slices, for each test case and output, of the Simulink model. In order to further improve fault localization accuracy, we propose iSimFL, an iterative fault localization algorithm. At each iteration, iSimFL increases the set of observable outputs by including outputs at lower hierarchy levels, thus increasing the test oracle cost but offsetting it with significantly more precise fault localization. We utilize a heuristic stopping criterion to avoid unnecessary test oracle extension. We evaluate our work on three industrial Simulink models from Delphi Automotive. Our results show that, on average, SimFL ranks faulty blocks in the top 8.9% in the list of suspicious blocks. Further, we show that iSimFL significantly improves this percentage down to 4.4% by requiring engineers to observe only an average of five additional outputs at lower hierarchy levels on top of high-level model outputs. [less ▲]

Detailed reference viewed: 318 (29 UL)
Full Text
See detailMediennutzung Jugendlicher in Luxemburg
König, Andreas; Steffgen, Georges UL

Report (2015)

Im vorliegenden Bericht werden die Ergebnisse einer empirischen Untersuchung an luxemburgischen Jugendlichen zu deren Nutzungsverhalten von Computerspielen und des Internets vorgestellt. Ziel der Studie ... [more ▼]

Im vorliegenden Bericht werden die Ergebnisse einer empirischen Untersuchung an luxemburgischen Jugendlichen zu deren Nutzungsverhalten von Computerspielen und des Internets vorgestellt. Ziel der Studie war zum einen, einen diesbezüglich aktualisierten Überblick, und zum anderen, bislang für Luxemburg noch fehlende Prävalenzdaten zur dysfunktionalen Nutzung zu gewinnen. Ausgehend von einem für die luxemburgische Stichprobe modifizierten Fragebogen, der im Rahmen der EU NET ADB Studie (Tsitsika et al., 2013) zum gleichen doppelten Zweck in sieben europäischen Ländern eingesetzt wurde, wurden n=362 Kinder und Jugendliche im Alter von 10 bis 21 Jahren in Papierform bzw. Online befragt, von denen n=265 den Fragebogen vollständig beantworteten (Papierversion: n=50, Online-Version: n=215). Erfasst wurden neben für den Internetzugang verwendeten Geräten und gewählten Orten vor allem das zeitliche Ausmaß der Nutzung von Computerspielen und Internet allgemein, sowie spezifisch die Häufigkeit, mit der bestimmten Online-Aktivitäten nachgegangen wird. Die Ergebnisse lassen deutlich werden, dass Computerspiele und das Internet einen großen Teil der Freizeit der befragten Kinder und Jugendlichen einnehmen. Eine umfassende deskriptive und statistische Auswertung der erhobenen Daten zeigt auf, dass sich alle relevanten Parameter im Rahmen der zum Vergleich vorliegenden Daten aus anderen europäischen Ländern (Tsitsika et al., 2013) bewegen. Dies schließt allerdings auch die Feststellung eines vergleichbaren Handlungsbedarfs ein. Dieser betrifft neben präventiven und pädagogischen Maßnahmen der Hinführung zu einem verantwortungsvollen Umgang mit den Computerspielen und Internet allgemein, sowie im Speziellen mit altersinadäquaten Inhalten, insbesondere die Versorgung des Anteils an Jugendlichen, die bereits ein klinisch auffälliges pathologisches Nutzungsverhalten zeigen. [less ▲]

Detailed reference viewed: 553 (21 UL)
Full Text
See detailGradient Smoothing in Finite Elasticity: near-incompressibility
Lee, Chang-Kye; Bordas, Stéphane UL; Kerfriden, Pierre

Report (2015)

Detailed reference viewed: 120 (9 UL)
See detailDeprivation and poverty among children in Tajikistan: A multiple overlapping deprivation analysis
Neubourg, Chris De; Karpati, Julia; Cebotari, Victor UL

Report (2015)

Detailed reference viewed: 29 (0 UL)
Full Text
See detailPolicy Report on Migration and Asylum 2014 - Luxembourg
Li, Lisa UL; Petry, David UL; Nienaber, Birte UL et al

Report (2015)

The structure of the political system and the institutional context of Luxembourg were described in detail in the previous policy reports on migration and asylum. Important changes related to the national ... [more ▼]

The structure of the political system and the institutional context of Luxembourg were described in detail in the previous policy reports on migration and asylum. Important changes related to the national elections of 2014 can be found in the Policy Report. [less ▲]

Detailed reference viewed: 156 (31 UL)
See detailShould I do Social Network Analysis?
During, Marten UL

Report (2015)

Network theories and methods have recently gained wide-spread attention. Graph visualizations look great and will easily grab the attention of any audience. However for those who are new to the field ... [more ▼]

Network theories and methods have recently gained wide-spread attention. Graph visualizations look great and will easily grab the attention of any audience. However for those who are new to the field, there is a steep learning curve. Novices need to … Continue reading → [less ▲]

Detailed reference viewed: 78 (5 UL)
Full Text
See detailIDRL in Italy: A Study on Strengthening Legal Preparedness for International Disaster Response
Gatti, Mauro UL

Report (2015)

This report seeks to identify the main obstacles that existing rules create for international cooperation in the event of disasters in Italy: It does so by looking to the Guidelines for the Domestic ... [more ▼]

This report seeks to identify the main obstacles that existing rules create for international cooperation in the event of disasters in Italy: It does so by looking to the Guidelines for the Domestic Facilitation and Regulation of International Disaster Relief and Initial Recovery Assistance (hereinafter the IDRL Guidelines) and to the EU Host Nation Support Guidelines (HNSG). The analysis seeks to point out solutions (mostly legislative ones) that may contribute to enhancing international cooperation in response to disasters occurring in Italy. The report finds that Italy has developed advanced and flexible disaster response mechanisms. Furthermore, Italy’s participation in international cooperation arrangements, notably the European Union (EU) Civil Protection Mechanism, reinforces the country’s capacities and preparedness. As of today, the country has seldom relied on external assistance, and when it did, international cooperation did not prove problematic. Indeed, it would seem that Italian law is generally in line with the prescriptions of the IDRL Guidelines and the HNSG, especially as concerns assistance originating from other EU countries. However, the investigation has also indicated three main problems that need to be addressed in order to ensure effective and accountable assistance in the future. In the first place, the institutional framework is fragmented: Numerous organs with different resources and powers intervene in disaster response. In the second place, it is not always easy to say what rules apply: There is a multiplicity of instruments that regulate disaster response, and their identification and interpretation is often complex. And, in the third place, some of the rules may hinder incoming aid: There are cases in which the law may prevent the provision of assistance or may discourage it by imposing onerous procedures and financial obligations. These problems can be addressed by fixing the flaws identified in the report, that is, by clarifying existing law, repealing outdated provisions, and introducing specific norms designed to regulate and facilitate international cooperation. To this end, the report offers recommendations for the competent authorities. [less ▲]

Detailed reference viewed: 111 (0 UL)
Full Text
See detailLa mixité fonctionnelle à l’épreuve. Une perspective européenne : les expériences de Milan, Copenhaugue, Hamburg
Bricocoli, Massimo UL; Savoldi, Paola

Report (2014)

The report presents the outcomes of a research commissioned by the Plan Urbanisme Construction Architecture within the research program ""Mixité fonctionelle versus zoning : de noveaux enjeux?". The ... [more ▼]

The report presents the outcomes of a research commissioned by the Plan Urbanisme Construction Architecture within the research program ""Mixité fonctionelle versus zoning : de noveaux enjeux?". The Multidisciplinary Research group was coordinated by Massimo Bricocoli and Paola Savoldi and involved 3 research units investigating in 3 different European cities: Milano (Massimo Bricocoli, Paola Savoldi, Francesco Curci at Politecnico di Milano), Copenhagen (Jens Kvorning, Katrine Østergaard Bang, Bruno Tournay at Center for Urbanism, Royal Danish Academy for the Fine Arts), Hamburg (Ingrid Breckner, Nima Dafateri-Moghaddam at HafenCity University). The redevelopment of inner city urban areas has been a main concern for European cities dealing with post-industrial restructuring in the last decades. Large areas have been released from a manufacturing vocation and have been transformed through large-scale development projects. It is worth investigating how spatial and social organization processes are developing in these new urban areas which tend to display a significant role in supporting the attractiveness of cities and in hosting a consistent number of new economic activities as well as in housing those inhabitants who “return to the city” in a phase of re-urbanisation. In this respect, driving research questions have been: under which conditions, and with which expectations, do people decide to settle in the central city? What sort of city-space has been produced? How and why are uses influencing urban qualities? Which are the elements that allow and support a mix of functions and social groups in the face of prevalent tendencies towards separation and segregation? Along these questions, we have been analysing (through direct observation, intensive field work and interviewing, policy analysis and a photo reportage) three redevelopment projects which are emblematically documenting the transformation of productive areas into multifunctional urban areas with a residential core function: Bicocca/Milan, Islands Brygge/Copenhagen, HafenCity/Hamburg. [less ▲]

Detailed reference viewed: 352 (2 UL)
Full Text
See detailA Comprehensive Modeling Framework for Role-based Access Control Policies
Ben Fadhel, Ameni UL; Bianculli, Domenico UL; Briand, Lionel UL

Report (2014)

Prohibiting unauthorized access to critical resources and data has become a major requirement for enterprises. Access control (AC) mechanisms manage requests from users to access system resources; the ... [more ▼]

Prohibiting unauthorized access to critical resources and data has become a major requirement for enterprises. Access control (AC) mechanisms manage requests from users to access system resources; the access is granted or denied based on authorization policies defined within the enterprise. One of the most used AC paradigms is role-based access control (RBAC). In RBAC, access rights are determined based on the user's role, e.g., her job or function in the enterprise. Many different types of RBAC authorization policies have been proposed in the literature, each one accompanied by the corresponding extension of the original RBAC model. However, there is no unified framework that can be used to define all these types of RBAC policies in a coherent way, using a common model. Moreover, these types of policies and their corresponding models are scattered across multiple sources and sometimes the concepts are expressed ambiguously. This situation makes it difficult for researchers to understand the state of the art in a coherent manner; furthermore, practitioners may experience severe difficulties when selecting the relevant types of policies to be implemented in their systems based on the available information. There is clearly a need for organizing the various types of RBAC policies systematically, based on a unified framework, and to formalize them to enable their operationalization. In this paper we propose a model-driven engineering (MDE) approach, based on UML and the Object Constraint Language (OCL), to enable the precise specification and verification of such policies. More specifically, we first present a taxonomy of the various types of RBAC authorization policies proposed in the literature. We also propose the GemRBAC model, a generalized model for RBAC that includes all the entities required to define the classified policies. This model is a conceptual model that can also serve as data model to operationalize data collection and verification. Lastly, we formalize the classified RBAC policies as OCL constraints on the GemRBAC model. To facilitate such operationalization, we make publicly available online the ECore version of the GemRBAC model and the OCL constraints corresponding to the classified RBAC policies. [less ▲]

Detailed reference viewed: 691 (177 UL)
Full Text
See detailEcho iTEO. Sprachräume
Kirsch, Claudine UL; Gretsch, Gérard UL

Report (2014)

Detailed reference viewed: 57 (2 UL)
Full Text
See detailExtension of 2D FEniCS implementation of Cosserat non-local elasticity to the 3D case
Sautot, Camille; Bordas, Stéphane UL; Hale, Jack UL

Report (2014)

The objective of the study is the extension of the existing 2D FEniCS implementation of Cosserat elasticity to the 3D case. The first step is the implementation of a patch-test for a simple problem in ... [more ▼]

The objective of the study is the extension of the existing 2D FEniCS implementation of Cosserat elasticity to the 3D case. The first step is the implementation of a patch-test for a simple problem in classical elasticity as a Timoshenko's beam - this study will show that DOLFIN could offer approximated solutions converging to the analytical solution. The second step is the computation of the stress in a plate with a circular hole. The stress concentration factors around the hole in classical and Cosserat elasticities will be compared, and a convergence study for the Cosserat case will be realised. The third step is the extension to the 3D case with the computation of the stress concentration factor around a spherical cavity in an infinite elastic medium. This computed value will be compare to the analytical solution described by couple-stress theory. [less ▲]

Detailed reference viewed: 226 (7 UL)
Full Text
See detailShape optimisation directly from CAD: an isogeometric boundary element approach
Lian, Haojie; Bordas, Stéphane UL; Kerfriden, Pierre

Report (2014)

Detailed reference viewed: 95 (4 UL)
Full Text
See detailError controlled adaptive multiscale method for fracture in polycrystalline materials
Akbari Rahimabadi, Ahmad; Kerfriden, Pierre; Bordas, Stéphane UL

Report (2014)

A lack of separation of scales is the major hurdle hampering predictive and computationally tractable simulations of fracture over multiple scales. In this thesis an adaptive multiscale method is ... [more ▼]

A lack of separation of scales is the major hurdle hampering predictive and computationally tractable simulations of fracture over multiple scales. In this thesis an adaptive multiscale method is presented in an attempt to address this challenge. This method is set in the context of FE2 Feyel and Chaboche [2000] for which computational homogenisation breaks down upon loss of material stability (softening). The lack of scale separation due to the coalescence of microscopic cracks in a certain zone is tackled by a full discretisation of the microstructure in this zone. Polycrystalline materials are considered with cohesive cracks along the grain boundaries as a model problem. Adaptive mesh re nement of the coarse region and adaptive initiation and growth of fully resolved regions are performed based on discretisation error and homogenisation error criteria, respectively. In order to follow sharp snap-backs in load-displacement paths, a local arc-length technique is developed for the adaptive multiscale method. The results are validated against direct numerical simulation [less ▲]

Detailed reference viewed: 87 (1 UL)
Full Text
See detailTriple Graph Grammars in the Large for Translating Satellite Procedures - Extended Version
Hermann, Frank UL; Gottmann, Susann UL; Nachtigall, Nico UL et al

Report (2014)

Software translation is a challenging task. Several requirements are important - including automation of the execution, maintainability of the translation patterns, and, most importantly, reliability ... [more ▼]

Software translation is a challenging task. Several requirements are important - including automation of the execution, maintainability of the translation patterns, and, most importantly, reliability concerning the correctness of the translation. Triple graph grammars (TGGs) have shown to be an intuitive, wellde ned technique for model translation. In this paper, we leverage TGGs for industry scale software translations. The approach is implemented using the Eclipse-based graph transformation tool Henshin and has been successfully applied in a large industrial project with the satellite operator SES on the translation of satellite control procedures. We evaluate the approach regarding requirements from the project and performance on a complete set of procedures of one satellite. [less ▲]

Detailed reference viewed: 264 (49 UL)
See detailConfronting the Represetantive Consumer with Household-Size Heterogeneity
Koulovatianos, Christos UL; Schroeder, Carsten; Schmidt, Ulrich

Report (2014)

Detailed reference viewed: 53 (5 UL)
See detailFormation des salaires et indexation automatique - Analyse comparative de quatre pays européens
Bourgain, Arnaud UL; Sneessens, Henri UL; Shadman, Fatemeh et al

Report (2014)

Automatic indexation mechanisms are often criticized for being a key source of inflexibility of actual real wages and thus responsible for a lack of adjustment to in the labour market and for a ... [more ▼]

Automatic indexation mechanisms are often criticized for being a key source of inflexibility of actual real wages and thus responsible for a lack of adjustment to in the labour market and for a deterioration of cost-competiveness. The aim of this study is to empirically assess whether this point of view is well founded. Statistical The Statistical and econometric research relates to four countries: two with institutionalized indexation of wages to consumer prices (Luxembourg and Belgium) and two without institutionalized indexation (Germany and France). this comparative econometric study, applied to four countries with or without indexation mechanisms, shows that the presence of institutionalized indexation does not significantly alter the process through which hourly wages are set, by observingas revealed by the long-term relationships or dynamic reactions to an exogenous shock. In other words, whilst differences in wage flexibility exist, their causes may be found elsewhere and not necessarily in automatic indexation mechanisms. Beyond the perimeter of this study, factors for the adjustment or inflexibility of wages might rather be sought in other directions, such as wages upon recruitment, inter-sector flexibility, the variable portion of remuneration, or changes in the composition of the labour force by sector, for example. [less ▲]

Detailed reference viewed: 93 (7 UL)
Full Text
See detailData Retention after the Judgement of the Court of Justice of the European Union
Cole, Mark UL; Boehm, Franziska

Report (2014)

Executive Summary This study analyses the Data Retention Directive Judgement of the Court of Justice of the European Union of 8 April 2014 and evaluates its impact on other data retention measures at ... [more ▼]

Executive Summary This study analyses the Data Retention Directive Judgement of the Court of Justice of the European Union of 8 April 2014 and evaluates its impact on other data retention measures at Member States as well as at EU level. [less ▲]

Detailed reference viewed: 235 (10 UL)
Full Text
See detailAutomatically Exploiting Potential Component Leaks in Android Applications
Li, Li UL; Bartel, Alexandre UL; Klein, Jacques UL et al

Report (2014)

We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform data-flow analysis on Android applications to find potential component leaks (e.g., another component ... [more ▼]

We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform data-flow analysis on Android applications to find potential component leaks (e.g., another component can potentially exploit the leak). To evaluate our approach, we run PCLeaks on 2000 apps, randomly selected from Google Play store. PCLeaks reports 986 potential component leaks in 185 apps. For each leak reported by PCLeaks, PCLeaksValidator automatically generates an Android app which tries to exploit the leak. By manually running a subset of the generated apps, we find that 75% of the reported leaks are exploitable leaks. [less ▲]

Detailed reference viewed: 388 (30 UL)
Full Text
See detailA two-dimensional isogeometric boundary element method for linear elastic fracture
Peng, Xuan; Atroshchenko, Elena; Kulasegaram, Sivakumar et al

Report (2014)

Detailed reference viewed: 119 (5 UL)
Full Text
See detailMachine Learning-Based Malware Detection for Android Applications: History Matters!
Allix, Kevin UL; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL et al

Report (2014)

Machine Learning-based malware detection is a promis- ing scalable method for identifying suspicious applica- tions. In particular, in today’s mobile computing realm where thousands of applications are ... [more ▼]

Machine Learning-based malware detection is a promis- ing scalable method for identifying suspicious applica- tions. In particular, in today’s mobile computing realm where thousands of applications are daily poured into markets, such a technique could be valuable to guaran- tee a strong filtering of malicious apps. The success of machine-learning approaches however is highly de- pendent on (1) the quality of the datasets that are used for training and of (2) the appropriateness of the tested datasets with regards to the built classifiers. Unfortu- nately, there is scarce mention of these aspects in the evaluation of existing state-of-the-art approaches in the literature. In this paper, we consider the relevance of history in the construction of datasets, to highlight its impact on the performance of the malware detection scheme. Typ- ically, we show that simply picking a random set of known malware to train a malware detector, as it is done in most assessment scenarios from the literature, yields significantly biased results. In the process of assessing the extent of this impact through various experiments, we were also able to confirm a number of intuitive assump- tions about Android malware. For instance, we discuss the existence of Android malware lineages and how they could impact the performance of malware detection in the wild. [less ▲]

Detailed reference viewed: 624 (37 UL)
Full Text
See detailReport of the Chairman of the Best Practice Principles Group Developing the Best Practice Principles for Shareholder Voting Research & Analysis (“Proxy Advisers”)
Zetzsche, Dirk Andreas UL

Report (2014)

Following the publication of the ESMA Final Report and Feedback Statement on the Consultation Regarding the Role of the Proxy Advisory Industry in February 2013, a number of industry members formed a ... [more ▼]

Following the publication of the ESMA Final Report and Feedback Statement on the Consultation Regarding the Role of the Proxy Advisory Industry in February 2013, a number of industry members formed a committee under the independent chairmanship of Prof. Dr. Dirk Andreas Zetzsche, LL.M. (Toronto), to develop an industry code of conduct. The “Best Practice Principles for Providers of Shareholder Voting Research & Analysis” were published in April 2014. With this report, the chair aims to make the committee’s work and discussions transparent to facilitate the application of the provisions and enhance understanding of the reasoning behind their adoption. The report also aims to enhance transparency and understanding on the functioning of Providers of Shareholder Voting Research & Analysis (to which is commonly referred to as the proxy advisors) and their role in corporate governance and assist in creating a more informed discussion. The report is structured as follows: After an introduction (sub 1.), I describe the composition and work organization of the drafting committee for the Principles (sub 2.), before I explain the Committee’s as well as the Chair’s position on the certain provisions of the Principles (sub 3.). The report discusses, inter alia, the scope of the Principles, the Committee’s general approach, the delineation of responsibility between proxy advisors, institutional investors and issuers that forms the basis of the Principles, the attitude of the industry towards local governance standards, and how Signatories should deal with conflicts of interests. A major section of the report is devoted to the communication between issuers and Providers of Shareholder Voting Research & Analysis (sub 4.). In particular I explain why a mandatory distribution of research report to issuers would put the providers’ commitment vis-à-vis their clients (the investors) at risk. I further undertake to outline how the Principles may be enforced (sub 5.) and describe the next steps on the Committee’s agenda (sub 6.). Three further documents issued by the Committee are annexed to the report: I. The “Best Practice Principles for Providers of Shareholder Voting Research & Analysis” discussed in the report, II. The consultation document distributed by the Committee to stakeholders in fall 2013, and III. The Feedback Statement on the Consultation. [less ▲]

Detailed reference viewed: 68 (0 UL)
Full Text
See detailKevoree Modeling Framework (KMF): Efficient modeling techniques for runtime use
Fouquet, François UL; Nain, Grégory UL; Morin, Brice et al

Report (2014)

The creation of Domain Specific Languages(DSL) counts as one of the main goals in the field of Model-Driven Software Engineering (MDSE). The main purpose of these DSLs is to facilitate the manipulation of ... [more ▼]

The creation of Domain Specific Languages(DSL) counts as one of the main goals in the field of Model-Driven Software Engineering (MDSE). The main purpose of these DSLs is to facilitate the manipulation of domain specific concepts, by providing developers with specific tools for their domain of expertise. A natural approach to create DSLs is to reuse existing modeling standards and tools. In this area, the Eclipse Modeling Framework (EMF) has rapidly become the defacto standard in the MDSE for building Domain Specific Languages (DSL) and tools based on generative techniques. However, the use of EMF generated tools in domains like Internet of Things (IoT), Cloud Computing or Models@Runtime reaches several limitations. In this paper, we identify several properties the generated tools must comply with to be usable in other domains than desktop-based software systems. We then challenge EMF on these properties and describe our approach to overcome the limitations. Our approach, implemented in the Kevoree Modeling Framework (KMF), is finally evaluated according to the identified properties and compared to EMF. [less ▲]

Detailed reference viewed: 203 (32 UL)
Full Text
See detailI know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis
Li, Li UL; Bartel, Alexandre UL; Klein, Jacques UL et al

Report (2014)

Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-component data-flow analysis to detect privacy leaks between components of Android applications. Unlike ... [more ▼]

Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-component data-flow analysis to detect privacy leaks between components of Android applications. Unlike all current approaches, our tool, called IccTA, propagates the context between the components, which improves the precision of the analysis. IccTA outperforms all other available tools by reaching a precision of 95.0% and a recall of 82.6% on DroidBench. Our approach detects 147 inter-component based privacy leaks in 14 applications in a set of 3000 real-world applications with a precision of 88.4%. With the help of ApkCombiner, our approach is able to detect inter-app based privacy leaks. [less ▲]

Detailed reference viewed: 188 (20 UL)
Full Text
See detailInsights and Lessons Learned from Analyzing ICSE 2014 Survey and Review Data
Briand, Lionel UL; van der Hoek, André

Report (2014)

Detailed reference viewed: 3158 (43 UL)
Full Text
See detailSlicing High-level Petri nets
Khan, Yasir Imtiaz UL

Report (2014)

Detailed reference viewed: 72 (8 UL)
See detailLes professions juridiques et judiciaires en Europe / Fiche sur le regime en Grèce
Beka, Anthi UL

Report (2014)

This report has been written in the framework of a comparative project undertaken by the University of Bordeaux on behalf of the French public institution "Mission Droit et Justice". It answers the ... [more ▼]

This report has been written in the framework of a comparative project undertaken by the University of Bordeaux on behalf of the French public institution "Mission Droit et Justice". It answers the questionnaire that has been provided by the research group leading the project, with regard to certain aspects of the impact of European Union law on Greek law governing the legal profession. [less ▲]

Detailed reference viewed: 62 (18 UL)