References of "Reports"
     in
Bookmark and Share    
Full Text
See detailMachbarkeitsstudie "Betreuungsatlas Schweiz": Die Geographie betreuter Kindheit
Neumann, Sascha UL; Tinguely, Luzia; Hekel, Nicole UL et al

Report (2015)

Detailed reference viewed: 57 (3 UL)
See detailDeprivation and poverty among children in Tajikistan: A multiple overlapping deprivation analysis
Neubourg, Chris De; Karpati, Julia; Cebotari, Victor UL

Report (2015)

Detailed reference viewed: 32 (1 UL)
See detailCheat Sheet: Social Network Analysis for Humanists
During, Marten UL

Report (2015)

Social Network Analysis concepts and methods are extremely powerful ways to describe complex social relations. The field however has developed their own their concepts, some of which require a little bit ... [more ▼]

Social Network Analysis concepts and methods are extremely powerful ways to describe complex social relations. The field however has developed their own their concepts, some of which require a little bit of translation. This cheat sheet should help with the … Continue reading → [less ▲]

Detailed reference viewed: 130 (3 UL)
Full Text
See detailLocal Autonomy Index for the European countries (1990-2014): Luxembourg (LUX)
Kies, Raphaël UL; Nommesch, Kim

Report (2015)

Local autonomy index project 2015 (march 2015 – June 2015) is EU Commission funded project coordinated by the Graduate Institute of Public Administration at the University of Lausanne; The goal of the ... [more ▼]

Local autonomy index project 2015 (march 2015 – June 2015) is EU Commission funded project coordinated by the Graduate Institute of Public Administration at the University of Lausanne; The goal of the project is to create a Local Authority Index (LAI) which can be used to report and analyse changes in the amount of decentralisation in some 38 countries. Evaluation includes in depth research on relevant legislation, analyzing tendencies and conducting interviews with relevant stakeholders, communication and close team work with fellow collaborators and coordinators. [less ▲]

Detailed reference viewed: 267 (5 UL)
Full Text
See detailIDRL in Italy: A Study on Strengthening Legal Preparedness for International Disaster Response
Gatti, Mauro UL

Report (2015)

This report seeks to identify the main obstacles that existing rules create for international cooperation in the event of disasters in Italy: It does so by looking to the Guidelines for the Domestic ... [more ▼]

This report seeks to identify the main obstacles that existing rules create for international cooperation in the event of disasters in Italy: It does so by looking to the Guidelines for the Domestic Facilitation and Regulation of International Disaster Relief and Initial Recovery Assistance (hereinafter the IDRL Guidelines) and to the EU Host Nation Support Guidelines (HNSG). The analysis seeks to point out solutions (mostly legislative ones) that may contribute to enhancing international cooperation in response to disasters occurring in Italy. The report finds that Italy has developed advanced and flexible disaster response mechanisms. Furthermore, Italy’s participation in international cooperation arrangements, notably the European Union (EU) Civil Protection Mechanism, reinforces the country’s capacities and preparedness. As of today, the country has seldom relied on external assistance, and when it did, international cooperation did not prove problematic. Indeed, it would seem that Italian law is generally in line with the prescriptions of the IDRL Guidelines and the HNSG, especially as concerns assistance originating from other EU countries. However, the investigation has also indicated three main problems that need to be addressed in order to ensure effective and accountable assistance in the future. In the first place, the institutional framework is fragmented: Numerous organs with different resources and powers intervene in disaster response. In the second place, it is not always easy to say what rules apply: There is a multiplicity of instruments that regulate disaster response, and their identification and interpretation is often complex. And, in the third place, some of the rules may hinder incoming aid: There are cases in which the law may prevent the provision of assistance or may discourage it by imposing onerous procedures and financial obligations. These problems can be addressed by fixing the flaws identified in the report, that is, by clarifying existing law, repealing outdated provisions, and introducing specific norms designed to regulate and facilitate international cooperation. To this end, the report offers recommendations for the competent authorities. [less ▲]

Detailed reference viewed: 123 (0 UL)
Full Text
See detailLa mixité fonctionnelle à l’épreuve. Une perspective européenne : les expériences de Milan, Copenhaugue, Hamburg
Bricocoli, Massimo UL; Savoldi, Paola

Report (2014)

The report presents the outcomes of a research commissioned by the Plan Urbanisme Construction Architecture within the research program ""Mixité fonctionelle versus zoning : de noveaux enjeux?". The ... [more ▼]

The report presents the outcomes of a research commissioned by the Plan Urbanisme Construction Architecture within the research program ""Mixité fonctionelle versus zoning : de noveaux enjeux?". The Multidisciplinary Research group was coordinated by Massimo Bricocoli and Paola Savoldi and involved 3 research units investigating in 3 different European cities: Milano (Massimo Bricocoli, Paola Savoldi, Francesco Curci at Politecnico di Milano), Copenhagen (Jens Kvorning, Katrine Østergaard Bang, Bruno Tournay at Center for Urbanism, Royal Danish Academy for the Fine Arts), Hamburg (Ingrid Breckner, Nima Dafateri-Moghaddam at HafenCity University). The redevelopment of inner city urban areas has been a main concern for European cities dealing with post-industrial restructuring in the last decades. Large areas have been released from a manufacturing vocation and have been transformed through large-scale development projects. It is worth investigating how spatial and social organization processes are developing in these new urban areas which tend to display a significant role in supporting the attractiveness of cities and in hosting a consistent number of new economic activities as well as in housing those inhabitants who “return to the city” in a phase of re-urbanisation. In this respect, driving research questions have been: under which conditions, and with which expectations, do people decide to settle in the central city? What sort of city-space has been produced? How and why are uses influencing urban qualities? Which are the elements that allow and support a mix of functions and social groups in the face of prevalent tendencies towards separation and segregation? Along these questions, we have been analysing (through direct observation, intensive field work and interviewing, policy analysis and a photo reportage) three redevelopment projects which are emblematically documenting the transformation of productive areas into multifunctional urban areas with a residential core function: Bicocca/Milan, Islands Brygge/Copenhagen, HafenCity/Hamburg. [less ▲]

Detailed reference viewed: 393 (2 UL)
Full Text
See detailA Comprehensive Modeling Framework for Role-based Access Control Policies
Ben Fadhel, Ameni UL; Bianculli, Domenico UL; Briand, Lionel UL

Report (2014)

Prohibiting unauthorized access to critical resources and data has become a major requirement for enterprises. Access control (AC) mechanisms manage requests from users to access system resources; the ... [more ▼]

Prohibiting unauthorized access to critical resources and data has become a major requirement for enterprises. Access control (AC) mechanisms manage requests from users to access system resources; the access is granted or denied based on authorization policies defined within the enterprise. One of the most used AC paradigms is role-based access control (RBAC). In RBAC, access rights are determined based on the user's role, e.g., her job or function in the enterprise. Many different types of RBAC authorization policies have been proposed in the literature, each one accompanied by the corresponding extension of the original RBAC model. However, there is no unified framework that can be used to define all these types of RBAC policies in a coherent way, using a common model. Moreover, these types of policies and their corresponding models are scattered across multiple sources and sometimes the concepts are expressed ambiguously. This situation makes it difficult for researchers to understand the state of the art in a coherent manner; furthermore, practitioners may experience severe difficulties when selecting the relevant types of policies to be implemented in their systems based on the available information. There is clearly a need for organizing the various types of RBAC policies systematically, based on a unified framework, and to formalize them to enable their operationalization. In this paper we propose a model-driven engineering (MDE) approach, based on UML and the Object Constraint Language (OCL), to enable the precise specification and verification of such policies. More specifically, we first present a taxonomy of the various types of RBAC authorization policies proposed in the literature. We also propose the GemRBAC model, a generalized model for RBAC that includes all the entities required to define the classified policies. This model is a conceptual model that can also serve as data model to operationalize data collection and verification. Lastly, we formalize the classified RBAC policies as OCL constraints on the GemRBAC model. To facilitate such operationalization, we make publicly available online the ECore version of the GemRBAC model and the OCL constraints corresponding to the classified RBAC policies. [less ▲]

Detailed reference viewed: 713 (178 UL)
Full Text
See detailEcho iTEO. Sprachräume
Kirsch, Claudine UL; Gretsch, Gérard UL

Report (2014)

Detailed reference viewed: 59 (2 UL)
Full Text
See detailExtension of 2D FEniCS implementation of Cosserat non-local elasticity to the 3D case
Sautot, Camille; Bordas, Stéphane UL; Hale, Jack UL

Report (2014)

The objective of the study is the extension of the existing 2D FEniCS implementation of Cosserat elasticity to the 3D case. The first step is the implementation of a patch-test for a simple problem in ... [more ▼]

The objective of the study is the extension of the existing 2D FEniCS implementation of Cosserat elasticity to the 3D case. The first step is the implementation of a patch-test for a simple problem in classical elasticity as a Timoshenko's beam - this study will show that DOLFIN could offer approximated solutions converging to the analytical solution. The second step is the computation of the stress in a plate with a circular hole. The stress concentration factors around the hole in classical and Cosserat elasticities will be compared, and a convergence study for the Cosserat case will be realised. The third step is the extension to the 3D case with the computation of the stress concentration factor around a spherical cavity in an infinite elastic medium. This computed value will be compare to the analytical solution described by couple-stress theory. [less ▲]

Detailed reference viewed: 237 (7 UL)
Full Text
See detailShape optimisation directly from CAD: an isogeometric boundary element approach
Lian, Haojie; Bordas, Stéphane UL; Kerfriden, Pierre

Report (2014)

Detailed reference viewed: 99 (4 UL)
Full Text
See detailError controlled adaptive multiscale method for fracture in polycrystalline materials
Akbari Rahimabadi, Ahmad; Kerfriden, Pierre; Bordas, Stéphane UL

Report (2014)

A lack of separation of scales is the major hurdle hampering predictive and computationally tractable simulations of fracture over multiple scales. In this thesis an adaptive multiscale method is ... [more ▼]

A lack of separation of scales is the major hurdle hampering predictive and computationally tractable simulations of fracture over multiple scales. In this thesis an adaptive multiscale method is presented in an attempt to address this challenge. This method is set in the context of FE2 Feyel and Chaboche [2000] for which computational homogenisation breaks down upon loss of material stability (softening). The lack of scale separation due to the coalescence of microscopic cracks in a certain zone is tackled by a full discretisation of the microstructure in this zone. Polycrystalline materials are considered with cohesive cracks along the grain boundaries as a model problem. Adaptive mesh re nement of the coarse region and adaptive initiation and growth of fully resolved regions are performed based on discretisation error and homogenisation error criteria, respectively. In order to follow sharp snap-backs in load-displacement paths, a local arc-length technique is developed for the adaptive multiscale method. The results are validated against direct numerical simulation [less ▲]

Detailed reference viewed: 89 (1 UL)
Full Text
See detailTriple Graph Grammars in the Large for Translating Satellite Procedures - Extended Version
Hermann, Frank UL; Gottmann, Susann UL; Nachtigall, Nico UL et al

Report (2014)

Software translation is a challenging task. Several requirements are important - including automation of the execution, maintainability of the translation patterns, and, most importantly, reliability ... [more ▼]

Software translation is a challenging task. Several requirements are important - including automation of the execution, maintainability of the translation patterns, and, most importantly, reliability concerning the correctness of the translation. Triple graph grammars (TGGs) have shown to be an intuitive, wellde ned technique for model translation. In this paper, we leverage TGGs for industry scale software translations. The approach is implemented using the Eclipse-based graph transformation tool Henshin and has been successfully applied in a large industrial project with the satellite operator SES on the translation of satellite control procedures. We evaluate the approach regarding requirements from the project and performance on a complete set of procedures of one satellite. [less ▲]

Detailed reference viewed: 266 (49 UL)
See detailConfronting the Represetantive Consumer with Household-Size Heterogeneity
Koulovatianos, Christos UL; Schroeder, Carsten; Schmidt, Ulrich

Report (2014)

Detailed reference viewed: 54 (5 UL)
See detailFormation des salaires et indexation automatique - Analyse comparative de quatre pays européens
Bourgain, Arnaud UL; Sneessens, Henri UL; Shadman, Fatemeh et al

Report (2014)

Automatic indexation mechanisms are often criticized for being a key source of inflexibility of actual real wages and thus responsible for a lack of adjustment to in the labour market and for a ... [more ▼]

Automatic indexation mechanisms are often criticized for being a key source of inflexibility of actual real wages and thus responsible for a lack of adjustment to in the labour market and for a deterioration of cost-competiveness. The aim of this study is to empirically assess whether this point of view is well founded. Statistical The Statistical and econometric research relates to four countries: two with institutionalized indexation of wages to consumer prices (Luxembourg and Belgium) and two without institutionalized indexation (Germany and France). this comparative econometric study, applied to four countries with or without indexation mechanisms, shows that the presence of institutionalized indexation does not significantly alter the process through which hourly wages are set, by observingas revealed by the long-term relationships or dynamic reactions to an exogenous shock. In other words, whilst differences in wage flexibility exist, their causes may be found elsewhere and not necessarily in automatic indexation mechanisms. Beyond the perimeter of this study, factors for the adjustment or inflexibility of wages might rather be sought in other directions, such as wages upon recruitment, inter-sector flexibility, the variable portion of remuneration, or changes in the composition of the labour force by sector, for example. [less ▲]

Detailed reference viewed: 97 (9 UL)
Full Text
See detailData Retention after the Judgement of the Court of Justice of the European Union
Cole, Mark UL; Boehm, Franziska

Report (2014)

Executive Summary This study analyses the Data Retention Directive Judgement of the Court of Justice of the European Union of 8 April 2014 and evaluates its impact on other data retention measures at ... [more ▼]

Executive Summary This study analyses the Data Retention Directive Judgement of the Court of Justice of the European Union of 8 April 2014 and evaluates its impact on other data retention measures at Member States as well as at EU level. [less ▲]

Detailed reference viewed: 241 (10 UL)
Full Text
See detailAutomatically Exploiting Potential Component Leaks in Android Applications
Li, Li UL; Bartel, Alexandre UL; Klein, Jacques UL et al

Report (2014)

We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform data-flow analysis on Android applications to find potential component leaks (e.g., another component ... [more ▼]

We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform data-flow analysis on Android applications to find potential component leaks (e.g., another component can potentially exploit the leak). To evaluate our approach, we run PCLeaks on 2000 apps, randomly selected from Google Play store. PCLeaks reports 986 potential component leaks in 185 apps. For each leak reported by PCLeaks, PCLeaksValidator automatically generates an Android app which tries to exploit the leak. By manually running a subset of the generated apps, we find that 75% of the reported leaks are exploitable leaks. [less ▲]

Detailed reference viewed: 391 (30 UL)
Full Text
See detailA two-dimensional isogeometric boundary element method for linear elastic fracture
Peng, Xuan; Atroshchenko, Elena; Kulasegaram, Sivakumar et al

Report (2014)

Detailed reference viewed: 122 (5 UL)
Full Text
See detailMachine Learning-Based Malware Detection for Android Applications: History Matters!
Allix, Kevin UL; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL et al

Report (2014)

Machine Learning-based malware detection is a promis- ing scalable method for identifying suspicious applica- tions. In particular, in today’s mobile computing realm where thousands of applications are ... [more ▼]

Machine Learning-based malware detection is a promis- ing scalable method for identifying suspicious applica- tions. In particular, in today’s mobile computing realm where thousands of applications are daily poured into markets, such a technique could be valuable to guaran- tee a strong filtering of malicious apps. The success of machine-learning approaches however is highly de- pendent on (1) the quality of the datasets that are used for training and of (2) the appropriateness of the tested datasets with regards to the built classifiers. Unfortu- nately, there is scarce mention of these aspects in the evaluation of existing state-of-the-art approaches in the literature. In this paper, we consider the relevance of history in the construction of datasets, to highlight its impact on the performance of the malware detection scheme. Typ- ically, we show that simply picking a random set of known malware to train a malware detector, as it is done in most assessment scenarios from the literature, yields significantly biased results. In the process of assessing the extent of this impact through various experiments, we were also able to confirm a number of intuitive assump- tions about Android malware. For instance, we discuss the existence of Android malware lineages and how they could impact the performance of malware detection in the wild. [less ▲]

Detailed reference viewed: 627 (37 UL)
Full Text
See detailReport of the Chairman of the Best Practice Principles Group Developing the Best Practice Principles for Shareholder Voting Research & Analysis (“Proxy Advisers”)
Zetzsche, Dirk Andreas UL

Report (2014)

Following the publication of the ESMA Final Report and Feedback Statement on the Consultation Regarding the Role of the Proxy Advisory Industry in February 2013, a number of industry members formed a ... [more ▼]

Following the publication of the ESMA Final Report and Feedback Statement on the Consultation Regarding the Role of the Proxy Advisory Industry in February 2013, a number of industry members formed a committee under the independent chairmanship of Prof. Dr. Dirk Andreas Zetzsche, LL.M. (Toronto), to develop an industry code of conduct. The “Best Practice Principles for Providers of Shareholder Voting Research & Analysis” were published in April 2014. With this report, the chair aims to make the committee’s work and discussions transparent to facilitate the application of the provisions and enhance understanding of the reasoning behind their adoption. The report also aims to enhance transparency and understanding on the functioning of Providers of Shareholder Voting Research & Analysis (to which is commonly referred to as the proxy advisors) and their role in corporate governance and assist in creating a more informed discussion. The report is structured as follows: After an introduction (sub 1.), I describe the composition and work organization of the drafting committee for the Principles (sub 2.), before I explain the Committee’s as well as the Chair’s position on the certain provisions of the Principles (sub 3.). The report discusses, inter alia, the scope of the Principles, the Committee’s general approach, the delineation of responsibility between proxy advisors, institutional investors and issuers that forms the basis of the Principles, the attitude of the industry towards local governance standards, and how Signatories should deal with conflicts of interests. A major section of the report is devoted to the communication between issuers and Providers of Shareholder Voting Research & Analysis (sub 4.). In particular I explain why a mandatory distribution of research report to issuers would put the providers’ commitment vis-à-vis their clients (the investors) at risk. I further undertake to outline how the Principles may be enforced (sub 5.) and describe the next steps on the Committee’s agenda (sub 6.). Three further documents issued by the Committee are annexed to the report: I. The “Best Practice Principles for Providers of Shareholder Voting Research & Analysis” discussed in the report, II. The consultation document distributed by the Committee to stakeholders in fall 2013, and III. The Feedback Statement on the Consultation. [less ▲]

Detailed reference viewed: 73 (0 UL)
Full Text
See detailKevoree Modeling Framework (KMF): Efficient modeling techniques for runtime use
Fouquet, François UL; Nain, Grégory UL; Morin, Brice et al

Report (2014)

The creation of Domain Specific Languages(DSL) counts as one of the main goals in the field of Model-Driven Software Engineering (MDSE). The main purpose of these DSLs is to facilitate the manipulation of ... [more ▼]

The creation of Domain Specific Languages(DSL) counts as one of the main goals in the field of Model-Driven Software Engineering (MDSE). The main purpose of these DSLs is to facilitate the manipulation of domain specific concepts, by providing developers with specific tools for their domain of expertise. A natural approach to create DSLs is to reuse existing modeling standards and tools. In this area, the Eclipse Modeling Framework (EMF) has rapidly become the defacto standard in the MDSE for building Domain Specific Languages (DSL) and tools based on generative techniques. However, the use of EMF generated tools in domains like Internet of Things (IoT), Cloud Computing or Models@Runtime reaches several limitations. In this paper, we identify several properties the generated tools must comply with to be usable in other domains than desktop-based software systems. We then challenge EMF on these properties and describe our approach to overcome the limitations. Our approach, implemented in the Kevoree Modeling Framework (KMF), is finally evaluated according to the identified properties and compared to EMF. [less ▲]

Detailed reference viewed: 203 (32 UL)
Full Text
See detailI know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis
Li, Li UL; Bartel, Alexandre UL; Klein, Jacques UL et al

Report (2014)

Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-component data-flow analysis to detect privacy leaks between components of Android applications. Unlike ... [more ▼]

Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-component data-flow analysis to detect privacy leaks between components of Android applications. Unlike all current approaches, our tool, called IccTA, propagates the context between the components, which improves the precision of the analysis. IccTA outperforms all other available tools by reaching a precision of 95.0% and a recall of 82.6% on DroidBench. Our approach detects 147 inter-component based privacy leaks in 14 applications in a set of 3000 real-world applications with a precision of 88.4%. With the help of ApkCombiner, our approach is able to detect inter-app based privacy leaks. [less ▲]

Detailed reference viewed: 192 (20 UL)
Full Text
See detailInsights and Lessons Learned from Analyzing ICSE 2014 Survey and Review Data
Briand, Lionel UL; van der Hoek, André

Report (2014)

Detailed reference viewed: 3173 (43 UL)
Full Text
See detailSlicing High-level Petri nets
Khan, Yasir Imtiaz UL

Report (2014)

Detailed reference viewed: 73 (8 UL)
See detailLes professions juridiques et judiciaires en Europe / Fiche sur le regime en Grèce
Beka, Anthi UL

Report (2014)

This report has been written in the framework of a comparative project undertaken by the University of Bordeaux on behalf of the French public institution "Mission Droit et Justice". It answers the ... [more ▼]

This report has been written in the framework of a comparative project undertaken by the University of Bordeaux on behalf of the French public institution "Mission Droit et Justice". It answers the questionnaire that has been provided by the research group leading the project, with regard to certain aspects of the impact of European Union law on Greek law governing the legal profession. [less ▲]

Detailed reference viewed: 63 (18 UL)
Full Text
See detailD2.1 The Specification and Overall Requirements of the eGlasses Platform
McCall, Roderick UL; Louveton, Nicolas UL; Rumiński, Jacek

Report (2014)

The purpose of this document is to review the requirements of the platform in terms of human factors issues that to be addressed, provide an update on the state of the art in augmented reality ... [more ▼]

The purpose of this document is to review the requirements of the platform in terms of human factors issues that to be addressed, provide an update on the state of the art in augmented reality requirements and to provide an early technical specification. Addressing these issues will ensure that the platform can deliver its full potential when actually operated by the end-users. Indeed, a poorly designed system will not only reduce utility and acceptance of the platform but also induce discomfort and frustration. The document keeps the requirements at a general level as it does not support specific use-case implementations. Instead this document provides a list of general specifications and requirements that must be addressed in order for the eGlasses platform to be a success. [less ▲]

Detailed reference viewed: 156 (15 UL)
Full Text
See detailA Model-Driven Approach to Offline Trace Checking of Temporal Properties with OCL
Dou, Wei UL; Bianculli, Domenico UL; Briand, Lionel UL

Report (2014)

Offline trace checking is a procedure for evaluating requirements over a log of events produced by a system. The goal of this paper is to present a practical and scalable solution for the offline checking ... [more ▼]

Offline trace checking is a procedure for evaluating requirements over a log of events produced by a system. The goal of this paper is to present a practical and scalable solution for the offline checking of the temporal requirements of a system, which can be used in contexts where model-driven engineering is already a practice, where temporal specifications should be written in a domain-specific language not requiring a strong mathematical background, and where relying on standards and industry-strength tools for property checking is a fundamental prerequisite. The main contributions are: the TemPsy language, a domain-specific specification language based on common property specification patterns, and extended with new constructs; a model-driven offline trace checking procedure based on the mapping of requirements written in TemPsy into OCL (Object Constraint Language) constraints on a conceptual model on execution traces, which can be evaluated using an OCL checker; the implementation of this trace checking procedure in the TemPsy-Check tool; the evaluation of the scalability of TemPsy-Check and its comparison to a state-of-the-art alternative technology. The proposed approach has been applied to a case study developed in collaboration with a public service organization, active in the domain of business process modeling for eGovernment. [less ▲]

Detailed reference viewed: 481 (129 UL)
Full Text
See detailFinal report of the effectiveness study in Virtual Coach Reaches Out to me project
Aleksic, Gabrijela UL; Roelofsma, Peter

Report (2014)

One out of three persons in our society suffers from social or emotional loneliness. This percentage is even higher in the population of people who suffer from chronic diseases. Loneliness has pervasive ... [more ▼]

One out of three persons in our society suffers from social or emotional loneliness. This percentage is even higher in the population of people who suffer from chronic diseases. Loneliness has pervasive effects on mental health but it also has negative effects on physical well-being. The aim of this paper is to present a series of pilot studies evaluating the development of an ambient virtual coaching system. This system, called V2me (Virtual Coach reaches Out to Me) offers a friendship enrichment course for people in need for improving their social network. Several pilot studies were performed with about 50 participants in total who evaluated the system that was developed using a living lab approach. In this approach new health media was developed from a user-centered process that allows frequent iterations of user evaluation and involvement. The paper presents the results of the first five iterations. The reactions on receiving the system and experiences during instruction were increasingly positive over these iterations of the system development phase. Over time the system has passed the user’s choice selection criteria. Participants have been expressing a clear interest for choosing and wanting to use the system in their daily lives. However, the system did not pass the persistent use selection criteria when the system was brought and left for independent use. It appeared that participants did not use it very much during the day as expected. Moreover, participants did not perform all the tasks (i.e., messaging, Skyping) that they were asked to achieve on a daily basis. The final goal of the V2me system, i.e. establishing social relations between elderly persons, was not achieved as well, although this might be due to the limited time space of using the system and its facilities. Given these observation, it is concluded that more iterations in the system development are needed for the system in order to pass the habitual use criteria which is needed for its effectiveness. [less ▲]

Detailed reference viewed: 67 (1 UL)
Full Text
See detailMIGRANT ACCESS TO SOCIAL SECURITY: POLICIES AND PRACTICE IN LUXEMBOURG
Sommarribas, Adolfo UL; Besch, Sylvain; Baltes-Löhr, Christel UL

Report (2014)

The social security system in Luxembourg is in principle a contributory-based system different to other countries, which have a residence-based system. The social protection system is composed of three ... [more ▼]

The social security system in Luxembourg is in principle a contributory-based system different to other countries, which have a residence-based system. The social protection system is composed of three major branches: a) Social security: This branch comprehends healthcare, sick cash benefits, maternity and paternity leave benefits, accidents at work and occupational diseases, long-term care, invalidity benefits, old-age pensions, survivors’ pensions and family allowances. The social security benefits are financed by contributions paid either by the employer, the employee or the State. We include in this branch unemployment because the employee contributes to the system. The only requirements that the beneficiary has to fulfill are the objective criteria for granting each one of the benefits. b) Social assistance system: This branch comprehends the guaranteed minimum income (RMG), which is financed by general taxation and is paid from the general budget of the State. The persons have to prove that they do not have sufficient means to live when their income does not reach a certain threshold. c) Social aid: This is considered the safety net of the system. This aid allows people in need and their families to have a life in dignity. As the social assistance system it is financed by general taxation and in principle any person residing in Luxembourg can benefit from it if s/he fulfills the criteria. This benefit is granted and distributed by the social assistance offices of the municipalities. [less ▲]

Detailed reference viewed: 110 (11 UL)
Full Text
See detailCorrectness of source code extension for fault detection in openflow based networks
Hermann, Frank UL; Hommes, Stefan UL; State, Radu UL et al

Report (2014)

Software Defined Networks using OpenFlow have to provide a re- liable way to detect network faults and attacks. This technical report shows a formal analysis of correctness for an automated code extension ... [more ▼]

Software Defined Networks using OpenFlow have to provide a re- liable way to detect network faults and attacks. This technical report shows a formal analysis of correctness for an automated code extension technique used to extend OpenFlow networks with a logging mecha- nism that is used for the detection of faults and attacks. As presented in a companion paper, we applied the code extension techniques for a framework that can extend controller programs transparently, making possible on-line fault management, debugging as well as off-line and forensic analysis. [less ▲]

Detailed reference viewed: 162 (37 UL)
Full Text
See detailSentiment Barometer in Financial News
Schommer, Christoph UL

Report (2014)

This booklet is a collection of project reports written by graduate students, who have participated the course "Machine Learning" in Winter Term 2013/14. Here, we have concerned Financial News Documents ... [more ▼]

This booklet is a collection of project reports written by graduate students, who have participated the course "Machine Learning" in Winter Term 2013/14. Here, we have concerned Financial News Documents regarding the Irish Financial Crisis in the years of 2009 - 2013. We have studied different forms of sentiments, for example with StoryTakes, Alerts, Headlines, authors, and others. [less ▲]

Detailed reference viewed: 131 (12 UL)
Full Text
See detailEvaluating the HPC Performance and Energy-Efficiency of Intel and ARM-based systems with synthetic and bioinformatics workloads
Plugaru, Valentin UL; Varrette, Sébastien UL; Pinel, Frédéric UL et al

Report (2014)

The increasing demand for High Performance Computing (HPC) paired with the higher power requirements of the ever-faster systems has led to the search for both performant and more energy-efficient ... [more ▼]

The increasing demand for High Performance Computing (HPC) paired with the higher power requirements of the ever-faster systems has led to the search for both performant and more energy-efficient architectures. This article compares and contrasts the performance and energy efficiency of two modern, traditional Intel Xeon and low power ARM-based clusters, which are tested with the recently developed High Performance Conjugate Gradient (HPCG) benchmark and the ABySS, FASTA and MrBayes bioinformatics applications. We show a higher Performance per Watt valuation of the ARM cluster, and lower energy usage during the tests, which does not offset the much faster job completion rate obtained by the Intel cluster, making the latter more suitable for the considered workloads given the disparity in the performance results. [less ▲]

Detailed reference viewed: 160 (23 UL)
Full Text
See detailOCLR: a More Expressive, Pattern-based Temporal Extension of OCL
Dou, Wei UL; Bianculli, Domenico UL; Briand, Lionel UL

Report (2014)

Modern enterprise information systems often require to specify their functional and non-functional (e.g., Quality of Service) requirements using expressions that contain temporal constraints ... [more ▼]

Modern enterprise information systems often require to specify their functional and non-functional (e.g., Quality of Service) requirements using expressions that contain temporal constraints. Specification approaches based on temporal logics demand a certain knowledge of mathematical logic, which is difficult to find among practitioners; moreover, tool support for temporal logics is limited. On the other hand, a standard language such as the Object Constraint Language (OCL), which benefits from the availability of several industrial-strength tools, does not support temporal expressions. In this paper we propose OCLR, an extension of OCL with support for temporal constraints based on well-known property specification patterns. With respect to previous extensions, we add support for referring to a specific occurrence of an event as well as for indicating a time distance between events and/or scope boundaries. The proposed extension defines a new syntax, very close to natural language, paving the way for a rapid adoption by practitioners. We show the application of the language in a case study in the domain of eGovernment, developed in collaboration with a public service partner. [less ▲]

Detailed reference viewed: 337 (87 UL)
Full Text
See detailImproving Traffic in Urban Environments
Codeca, Lara UL; Frank, Raphaël UL; Engel, Thomas UL

Report (2014)

The vehicular traffic in the cities is increasing every year. The road infrastructure in many metropolitan areas is not able to sustain the rush-hour traffic demand and the extension of the road network ... [more ▼]

The vehicular traffic in the cities is increasing every year. The road infrastructure in many metropolitan areas is not able to sustain the rush-hour traffic demand and the extension of the road network cannot easily be done. There are some solution proposed to improve the traffic situation, among them, the optimization of the resources already available by means of collecting real time Floating Car Data (FCD) from the vehicles and use them to suggest dynamic routes in order to minimize travel delays. The centralized infrastructure able to achieve this goal has already been presented in ”Improving Traffic in Urban Environments applying the Wardrop Equilibrium” (Codeca, L. et al., 2013). In this extended abstract we present the decentralized version of the system and the preliminary results of its evaluation. [less ▲]

Detailed reference viewed: 130 (15 UL)
Full Text
See detailBlack-box SQL Injection Testing
Appelt, Dennis UL; Alshahwan, Nadia UL; Nguyen, Duy Cu UL et al

Report (2014)

Web services are increasingly adopted in various domains, from finance and e-government to social media. As they are built on top of the web technologies, they suffer also an unprecedented amount of ... [more ▼]

Web services are increasingly adopted in various domains, from finance and e-government to social media. As they are built on top of the web technologies, they suffer also an unprecedented amount of attacks and exploitations like the Web. Among the attacks, those that target SQL injection vulnerabilities have consistently been top-ranked for the last years. Testing to detect such vulnerabilities before making web services public is crucial. We present in this report an automated testing approach, namely μ4SQLi, and its underpinning set of mutation operators. μ4SQLi can produce effective inputs that lead to executable and harmful SQL statements. Executability is key as otherwise no injection vulnerability can be exploited. Our evaluation demonstrated that the approach outperforms contemporary known attacks in terms of vulnerability detection and the ability to get through an application firewall, which is a popular configuration in real world. [less ▲]

Detailed reference viewed: 693 (59 UL)
See detailPrévention de la corruption des parlementaires, des juges et des procureurs- FRANCE
Poirier, Philippe UL

Report (2014)

le Groupe d’Etats contre la Corruption (GRECO) du Conseil de l'Europe salue diverses réformes récentes dans la prévention de la corruption en France, mais note qu’il reste des lacunes importantes dans la ... [more ▼]

le Groupe d’Etats contre la Corruption (GRECO) du Conseil de l'Europe salue diverses réformes récentes dans la prévention de la corruption en France, mais note qu’il reste des lacunes importantes dans la réglementation et le statut des parlementaires, juges et procureurs. Le GRECO conclue que députés et sénateurs ne font pas encore l’objet de règles adéquates sur les conflits d’intérêts, les cadeaux et autres avantages, les déclarations de patrimoine et les conséquences à tirer de manquements dans ces matières. Il préconise également des améliorations concernant les collaborateurs et assistants parlementaires (en raison de risques de lobbying déguisé et d’emplois fictifs), les indemnités représentatives de frais de mandat (pouvant être utilisées à d’autres fins) ou encore la réserve parlementaire qui concerne des fonds gérés par les parlementaires mais dont l’utilisation est laissée aux groupes politiques et membres du parlement. Le rapport souligne que la justice jouit globalement d’une réputation d’intégrité. La situation des tribunaux de commerce et du travail, composés de juges bénévoles sujets à peu de garde-fous efficaces, appelle néanmoins des réformes d’envergure. Il reste aussi des risques d’interventions du pouvoir exécutif dans le système disciplinaire et des carrières des juges et plus encore des procureurs. En 2013, le pouvoir du ministre de la Justice de donner des instructions aux procureurs dans des dossiers individuels a été définitivement aboli. Néanmoins, afin d’éviter les soupçons d’instructions déguisées, le GRECO appelle à mieux réglementer la faculté du Ministère de la Justice d’exiger des informations en temps réel dans les dossiers sensibles. Il appelle aussi à mettre en place des limites plus strictes au secret-défense, afin de limiter les risques d’abus du dispositif dans les affaires sensibles ou de grande corruption. La mise en œuvre des 11 recommandations adressées à la France sera examinée par le GRECO au cours du deuxième semestre 2015 par le biais d’une procédure de conformité spécifique. [less ▲]

Detailed reference viewed: 81 (1 UL)
See detailAdaptive Kompetenzen von Erwachsenen mit intellektueller Beeinträchtigung
Zurbriggen, Carmen UL; Orthmann Bless, D.; Estermann, v. et al

Report (2014)

Detailed reference viewed: 7 (0 UL)
Full Text
See detailStrain smoothing technique in 3D for nearly incompressible neo-Hookean material
Lee, Chang-Kye; Mihai, L. Angela; Kerfriden, Pierre et al

Report (2014)

Detailed reference viewed: 186 (12 UL)
See detailPérimètre RH et rôle(s) des line managers, Etat de l’art et recherche empirique
Constantinidis, Christina UL; Nils, Frédéric; Rousseau, Anne et al

Report (2014)

Detailed reference viewed: 41 (1 UL)
See detailInformaticaonderwijs aan Nederlandse Universiteiten in 2013 - State of the Art
Paredaens, Jan; Bijlsma, Lex; Boot, Peter et al

Report (2014)

Detailed reference viewed: 29 (0 UL)
See detail“Protecting Victims’ Rights in the EU: the theory and practice of diversity of treatment during the criminal trial. National Report: France”
Tricot, Juliette; Binard, Clément; Iliadou, Rita et al

Report (2014)

Detailed reference viewed: 118 (3 UL)
See detailLe management humain face à la distanciation – Etat de l’art théorique et empirique
Constantinidis, Christina UL; Rousseau, Anne; Taskin, Laurent

Report (2014)

Detailed reference viewed: 59 (0 UL)
Full Text
See detailNational intelligence authorities and surveillance in the EU: Fundamental rights safeguards and remedies
Vysotskaya, Volha UL; Ramires Campino, Ana Rita

Report (2014)

Given the present state of law, Luxembourgish legislation does not provide any legal basis for mass surveillance. Nonetheless, various social and political developments compelled the state to develop them ... [more ▼]

Given the present state of law, Luxembourgish legislation does not provide any legal basis for mass surveillance. Nonetheless, various social and political developments compelled the state to develop them in the interests of national protection. During the cold war, Luxembourg had prepared to protect the country from the Soviet Union threats. Under such circumstances, it created the State Intelligence Service SIS (Service de renseignement de l'état, SREL) whose mission of that time was to protect national secrets externally and secrets of the United States with whom Luxembourg was united by common defense agreements [less ▲]

Detailed reference viewed: 59 (5 UL)
Full Text
See detailBook II - Administrative Rulemaking
Mendes, Joana UL; Curtin, Deirdre; Hoffman, Herwig C. H. et al

Report (2014)

Book II aims to fill a gap in the existing legal system of the EU. It links the provisions, general principles of law and values arising from primary law with the procedure for adoption of non-legislative ... [more ▼]

Book II aims to fill a gap in the existing legal system of the EU. It links the provisions, general principles of law and values arising from primary law with the procedure for adoption of non-legislative acts of general application. Progressively over the past decades, a set of constitutional values emerged as general principles of law both in the case law of the CJ and in (incremental) Treaty amendments. Such principles have until now mainly shaped the EU’s institutional structures and decision-making procedures with regard to the EU’s formalised legislative procedure. Rule-making outside of legislative procedures, the subject matter of this book, has arguably been much less influenced by these constitutional principles. The implementation of such principles is, in any event, scattered across single provisions in some but not all policy areas. The provisions of this book are designed to ensure their systematic infusion into non-legislative rule-making more generally [less ▲]

Detailed reference viewed: 62 (3 UL)
See detailReNEUAL model rules on EU administrative procedure
Mendes, Joana UL; Hofmann, Herwig UL; Schneider, Jens-Peter et al

Report (2014)

Detailed reference viewed: 90 (8 UL)
Full Text
See detailOn the verifiability of (electronic) exams
Dreier, Jannik; Giustolisi, Rosario; Kassem, Ali et al

Report (2014)

The main concern for institutions that organize exams is to detect when students cheat. Actually more frauds are possible and even authorities can be dishonest. If institutions wish to keep exams a ... [more ▼]

The main concern for institutions that organize exams is to detect when students cheat. Actually more frauds are possible and even authorities can be dishonest. If institutions wish to keep exams a trustworthy business, anyone and not only the authorities should be allowed to look into an exam’s records and verify the presence or the absence of frauds. In short, exams should be verifiable. However, what verifiability means for exams is unclear and no tool to analyze an exam’s verifiability is available. In this paper we address both issues: we formalize several individual and universal verifiability properties for traditional and electronic exams, so proposing a set of verifiability properties and clarifying their meaning, then we implement our framework in ProVerif, so making it a tool to analyze exam verifiability. We validate our framework by analyzing the verifiability of two existing exam systems – an electronic and a paper-and-pencil system. [less ▲]

Detailed reference viewed: 127 (3 UL)
Full Text
See detailAccessibility to Healthcare
Limbach-Reich, Arthur UL

Report (2014)

Detailed reference viewed: 36 (0 UL)
Full Text
See detailFunctional Alloy Modules
Gammaitoni, Loïc UL; Kelsen, Pierre UL

Report (2014)

The Alloy language was developed as a lightweight modelling language that allows fully automatic analysis of software design models via SAT solving. The practical application of this type of analysis is ... [more ▼]

The Alloy language was developed as a lightweight modelling language that allows fully automatic analysis of software design models via SAT solving. The practical application of this type of analysis is hampered by two limitations: first, the analysis itself can become quite time consuming when the scopes become even moderately large; second, determining minimal scopes for the entity types (limiting the number of entities of each type) to achieve better running times is itself a non-trivial problem. In this paper we show that for the special case of Alloy modules specifying transformations we may be able to circumvent these limitations. We define the corresponding notion of functional module and define precise conditions under which such functional modules can be efficiently interpreted rather than analysed via SAT solving and we also explain how interpretation of functional Alloy modules can be seamlessly integrated with the SAT-based analysis of other modules. We provide evidence that for complex transformations interpreting functional modules may result in significant time savings. [less ▲]

Detailed reference viewed: 155 (48 UL)
Full Text
See detailTowards a Formally Verified Proof Assistant (technical report)
Anand, Abhishek; Rahli, Vincent UL

Report (2014)

Detailed reference viewed: 61 (2 UL)
See detailEducation and Social Progress in Switzerland
Samuel, Robin UL; Bergman, Manfred Max

Report (2014)

Detailed reference viewed: 31 (0 UL)
Full Text
See detailEine Single-Item-Skala zur Erfassung von Risikobereitschaf: Die Kurzskala Risikobereitschaft-1 (R-1)
Beierlein, C.; Kovaleva, A.; Kemper, Christoph UL et al

Report (2014)

Detailed reference viewed: 114 (1 UL)
Full Text
See detailBericht zur Reform der Aide à l'Enfance et à la Famille (AEF)
Peters, Ulla UL; Jäger, Julia UL; Ministerium für nationale Bildung, Kindheit und Jugend Luxemburg

Report (2014)

Detailed reference viewed: 84 (7 UL)
Full Text
See detailStandards für die stationären Hilfen in der Kinder- und Jugendhilfe - Fachliche Hintergründe und wissenschaftliche Erkenntnisse
Peters, Ulla UL; Jäger, Julia UL; Ministère de l'Education nationale, de l'Enfance et de la Jeunesse

Report (2014)

Detailed reference viewed: 216 (7 UL)
Full Text
See detailCountry studies for the project ‘Protection against discrimination on grounds of sexual orientation, gender identity and sex characteristics in the EU, Comparative legal analysis, Update 2015
Vysotskaya, Volha UL

Report (2014)

The Employment Directive was transposed into the “Equal Treatment Law” of 28 November 2006 on equal treatment (the “Law”). 1 The law’s definitions of direct and indirect discrimination includes all the ... [more ▼]

The Employment Directive was transposed into the “Equal Treatment Law” of 28 November 2006 on equal treatment (the “Law”). 1 The law’s definitions of direct and indirect discrimination includes all the elements in the definitions of the concept given in the Employment Directive, in particular less favourable treatment because of an individual’s sexual orientation as grounds for a finding of direct or indirect discrimination. The Equal treatment law amends the Labour and Criminal Codes, following very closely the provisions of the Employment Directive. By transposing both the Employment Directive and the Racial Equality Directive in the same piece of legislation, the Law broadens the Employment Directive’s material scope of the application, the “Equal Treatment Law” . The law also provides for the establishment of a Centre for Equal Treatment (CET) (Centre pour l’égalité de traitement, CET), which began to set up the elements necessary for its operation at the end of 2007. The CET has emphasised that its mission provides it with no binding powers over institutions or private persons that do not wish to collaborate with it; and believes that its investigative powers should be strengthened. [less ▲]

Detailed reference viewed: 61 (9 UL)
Full Text
See detailEine Single-Item-Skala zur Erfassung der Allgemeinen Lebenszufriedenheit: Die Kurzskala Lebenszufriedenheit-1 (L-1)
Beierlein, C.; Kovaleva, A.; László, Z. et al

Report (2014)

Detailed reference viewed: 154 (1 UL)
See detailReport on the results of the UGC Thematic Task Force
Wieneke, Lars UL; Hazan, Susan

Report (2014)

The Europeana UGC Thematic Task Force was instigated as an initiative of Europeana network members to provide a deeper understanding about the current practices of user generated content (UGC) and to ... [more ▼]

The Europeana UGC Thematic Task Force was instigated as an initiative of Europeana network members to provide a deeper understanding about the current practices of user generated content (UGC) and to identify inter‐project services and practices that could become shared building blocks for the creation of a Europeana UGC ecosystem. [less ▲]

Detailed reference viewed: 28 (1 UL)
See detailPrivacy and Data Protection by Design-from policy to engineering
Le Métayer, Daniel; Danezis, George; Hansen, Marit et al

Report (2014)

Detailed reference viewed: 50 (0 UL)
Full Text
See detailLes oeuvres complètes de Laurent Menager
Sagrillo, Damien UL; Nitschké, Alain UL

Report (2013)

Detailed reference viewed: 53 (1 UL)
Full Text
See detailGlobal energy minimization for multiple fracture growth
Sutula, Danas; Bordas, Stéphane UL

Report (2013)

Detailed reference viewed: 198 (5 UL)
Full Text
See detailSuburbaner Raum im Lebenszyklus
Reicher, Christa; Hesse, Markus UL

Report (2013)

The central part of the study deals with the question of how to approach the temporarily differentiated development dynamics of suburban spaces within a systematic, conceptual analysis framework. The ... [more ▼]

The central part of the study deals with the question of how to approach the temporarily differentiated development dynamics of suburban spaces within a systematic, conceptual analysis framework. The temporal variation and trajectory analysis however remains descriptive in this study, as the method still has not been developed into an autonomous explanatory system. The study concentrates on the integration of the particular phases and cycles into a broader context of the suburban system and - as far as possible - to describe interdependencies of trigger factors as well as of the local and regional framework. This makes the approach different to a static spatial analysis. Those phases contain, in most cases, the Growth, Maturity, Transition and Resiliency. The latter describes the capability of a system to encounter decline or even to reach a development turn. The phases develop into cycles when temporal periodic changes occur, following a certain logic determined by definable factors and strategies. [less ▲]

Detailed reference viewed: 122 (2 UL)
See detailLes Épreuves Standardisées vues par les acteurs du terrain. Étude exploratoire.
Milmeister, Marianne UL; Milmeister, Paul UL; Weis, Christiane UL

Report (2013)

Afin de dépasser le stade des hypothèses, il a été décidé de récolter des informations quantitatives (au moyen d'un questionnaire à large échelle) et qualitatives (au travers de focus groups) quant à la ... [more ▼]

Afin de dépasser le stade des hypothèses, il a été décidé de récolter des informations quantitatives (au moyen d'un questionnaire à large échelle) et qualitatives (au travers de focus groups) quant à la façon dont sont perçues et utilisées les Épreuves Standardisées. Le but en est de mieux comprendre comment les différents acteurs concernés (directeurs, inspecteurs, enseignants, élèves et parents) perçoivent le dispositif des Épreuves Standardisées et tiennent compte des informations qui leur sont envoyées en retour (rapport NATIONAL, rapport ECOLE, rapport CLASSE, rapports ELEVE). Une attention particulière est portée à la compréhension et l'usage des rapports mis à disposition ainsi qu'aux éventuelles pistes d'amélioration de l'outil proposées par les acteurs concernés. Le présent document synthétise la phase exploratoire de l'étude qualitative (menée en 2013) en présentant (1) les guides d'entretien utilisés (et leur modification) et (2) une première analyse quant aux contenus développés par les personnes interrogées. [less ▲]

Detailed reference viewed: 47 (12 UL)
Full Text
See detailWolfgang Suppan und die Blasmusikforschung
Sagrillo, Damien UL

Report (2013)

Detailed reference viewed: 177 (6 UL)
Full Text
See detailResearch & Innovation: Which priorities for structural funds in Luxembourg
Evrard, Estelle UL; Hachmann, Verena UL; Schulz, Christian UL

Report (2013)

It is a key aim of the EU2020 strategy and of the Luxembourg government to promote research and innovation (“smart growth”). The 2014-2020 programming period of the Structural Funds offers an opportunity ... [more ▼]

It is a key aim of the EU2020 strategy and of the Luxembourg government to promote research and innovation (“smart growth”). The 2014-2020 programming period of the Structural Funds offers an opportunity to support projects in this field at national, cross-border and transnational levels. This leaflet synthesises the results of a consultation process organised by the ESPON Contact Point of Luxembourg in summer and autumn 2013 in the framework of the USESPON project. First, it aimed at analysing the relevance of ESPON results in the field of research, development and innovation (RDI) in Luxembourg. Second, this process reflected on possible priorities for the future operational programmes of the structural funds. This process involved either experts in the field of RDI or those responsible for drafting operational programmes. The consultation process has been framed by a Delphi technique. First, participants received “support material” presenting the situation of Luxembourg according to the ESPON results. Second, they participated in a workshop on 11th July 2013. Third, a synthesis based on the results of the workshop was provided together with a questionnaire giving the experts the opportunity to deepen and concretise their contribution. By summarising this consultation process, this leaflet aims at 1) working out a profile of Luxembourg on the basis of ESPON results in the field of RDI and 2) developing recommendations of how future-oriented innovation strategies can be implemented in the context of European Territorial Cooperation. The final version of this document was published on the ECP Luxembourg website in autumn 2013. [less ▲]

Detailed reference viewed: 64 (4 UL)
Full Text
See detailRefinement of AADL models using early-stage analysis methods : An avionics example
Brau, Guillaume UL; Hugues, Jérôme; Navet, Nicolas UL

Report (2013)

Model-Driven Engineering (MDE) is a relevant approach to support the engineering of distributed embedded systems with performance and dependability constraints. MDE involves models definitions and ... [more ▼]

Model-Driven Engineering (MDE) is a relevant approach to support the engineering of distributed embedded systems with performance and dependability constraints. MDE involves models definitions and transformations to cover most of the system life-cycle: design, implementation and Verifi cation & Validation activities towards system quali fication. Still, few works evaluate the early integration of performance evaluation based on architectural models. In this report, we investigate the early-stage use of analysis in AADL modeling. Precisely, we exemplify on an avionics case study how to dimension the data flows for an application distributed over an AFDX network. Based on the insight from this study, we suggest a simple framework and associated techniques to e fficiently support analysis activities in the early-stage design phases. [less ▲]

Detailed reference viewed: 216 (10 UL)
Full Text
See detailPerformance tuning of applications for HPC systems employing Simulated Annealing optimization
Plugaru, Valentin UL; Georgatos, Fotis UL; Varrette, Sébastien UL et al

Report (2013)

Building fast software in an HPC environment raises great challenges as software used for simulation and modelling is generally complex and has many dependencies. Current approaches involve manual tuning ... [more ▼]

Building fast software in an HPC environment raises great challenges as software used for simulation and modelling is generally complex and has many dependencies. Current approaches involve manual tuning of compilation parameters in order to minimize the run time, based on a set of predefined defaults, but such an approach involves expert knowledge, is not scalable and can be very expensive in person-hours. In this paper we propose and develop a modular framework called POHPC that uses the Simulated Annealing meta-heuristic algorithm to automatically search for the optimal set of library options and compilation flags that can give the best execution time for a library-application pair on a selected hardware architecture. The framework can be used in modern HPC clusters using a variety of batch scheduling systems as execution backends for the optimization runs, and will discover optimal combinations as well as invalid sets of options and flags that result in failed builds or application crashes. We demonstrate the optimization of the FFTW library working in conjunction with the high- profile community codes GROMACS and QuantumESPRESSO, whereby the suitability of the technique is validated. [less ▲]

Detailed reference viewed: 176 (32 UL)
Full Text
See detailIn-vehicle communication networks - a historical perspective and review
Navet, Nicolas UL; Simonot-Lion, Françoise

Report (2013)

The use of networks for communications between the Electronic Control Units (ECU) of a vehicle in production cars dates from the beginning of the 90s. The specific requirements of the different car ... [more ▼]

The use of networks for communications between the Electronic Control Units (ECU) of a vehicle in production cars dates from the beginning of the 90s. The specific requirements of the different car domains have led to the development of a large number of automotive networks such as LIN, CAN, CAN FD, FlexRay, MOST, automotive Ethernet AVB, etc.. This report first introduces the context of in-vehicle embedded systems and, in particular, the requirements imposed on the communication systems. Then, a review of the most widely used, as well as the emerging automotive networks is given. Next, the current efforts of the automotive industry on middleware technologies which may be of great help in mastering the heterogeneity, are reviewed, with a special focus on the proposals of the AUTOSAR consortium. Finally, we highlight future trends in the development of automotive communication systems. [less ▲]

Detailed reference viewed: 548 (32 UL)
See detailAn empirical analysis of heavy-tails behavior of financial data: the case for power laws
Champagnat, Nicolas; Deaconu, Madalina; Lejay, Antoine et al

Report (2013)

This work aims at underlying the importance of a correct modelling of the heavy-tail behavior of extreme values of financial data for an accurate risk estimation. Many financial models assume that prices ... [more ▼]

This work aims at underlying the importance of a correct modelling of the heavy-tail behavior of extreme values of financial data for an accurate risk estimation. Many financial models assume that prices follow normal distributions. This is not true for real market data, as stock (log-)returns show heavy-tails. In order to overcome this, price variations can be modeled using stable distribution, but then, as shown in this study, we observe that it over-estimates the Value-at-Risk. To overcome these empirical inconsistencies for normal or stable distributions, we analyze the tail behavior of price variations and show further evidence that power-law distributions are to be considered in risk models. Indeed, the efficiency of power-law risk models is proved by comprehensive backtesting experiments on the Value-at-Risk conducted on NYSE Euronext Paris stocks over the period 2001-2011. [less ▲]

Detailed reference viewed: 48 (0 UL)
Full Text
See detailThe Node-Based Smoothed Finite Element Method in nonlinear elasticity
Lee, Chang-Kye; Mihai, Angela; Bordas, Stéphane UL

Report (2013)

Detailed reference viewed: 159 (12 UL)
See detailAccess to Electoral Rights: Luxembourg
Scuto, Denis UL

Report (2013)

Detailed reference viewed: 84 (7 UL)
Full Text
See detailGreen growth in the Benelux: Indicators of local transition to a low-carbon economy in cross-border regions
Bruyninckx, Hans; Martinez-Fernandez; Sharpe, Samantha et al

Report (2013)

This paper discusses the results of a study of measuring green growth in the Benelux countries (Belgium, The Netherlands and Luxembourg). The study paid particular attention to the challenges of measuring ... [more ▼]

This paper discusses the results of a study of measuring green growth in the Benelux countries (Belgium, The Netherlands and Luxembourg). The study paid particular attention to the challenges of measuring the transition to a low-carbon economy in cross-border areas as they have additional levels of complexity when it comes to measuring and monitoring their low-carbon transition. In cross- regions data collection hardly ever coincide with any single data gathering ‘institution’. Moreover, Belgium (Flanders, Brussels, Wallonia), the Netherlands, and Luxembourg have different indicator systems at the national level, and even more so at the more decentralised level which creates problems of data availability, data (in)consistency, and hence comparability. Progress is already noticeable in the two crossborder areas analysed in the study. In Ghent-Terneuzen the bio-base economy is contributing to the value of turnover and growth in employment in the environmental goods and services (EGS) sectors. In Alzette-Belval the construction industry is engaging in resource-efficient building design and certification. In other aspects there is evidence of progress, but this evidence is anecdotal, or patchy in its collection, and not able to be included in the dashboard metrics developed during the study and discussed in the paper. [less ▲]

Detailed reference viewed: 125 (14 UL)
Full Text
See detailEvaluative Gespräche 2012 zur Arbeit mit der Herkunftsfamilie in der Heimerziehung
Peters, Ulla UL; Jäger, Julia UL; Lellinger, Danielle

Report (2013)

Detailed reference viewed: 143 (11 UL)
Full Text
See detailMapping the Social Economy in British Columbia and Alberta - Final Report
Gismondi, Mike; Ross, Lynda; Marois, Juanita et al

Report (2013)

Detailed reference viewed: 41 (1 UL)
Full Text
See detailHighly precise taint analysis for Android applications
Fritz, Christian; Arzt, Steven; Rasthofer, Siegfried et al

Report (2013)

Today’s smart phones are a ubiquitous source of private and confidential data. At the same time, smartphone users are plagued by malicious apps that exploit their given privileges to steal such sensitive ... [more ▼]

Today’s smart phones are a ubiquitous source of private and confidential data. At the same time, smartphone users are plagued by malicious apps that exploit their given privileges to steal such sensitive data, or to track users without their consent or even the users noticing. Dynamic program analyses fail to discover such malicious activity because apps have learned to recognize the analyses as they execute. In this work we present FlowDroid, a novel and highly precise taint analysis for Android applications. A precise model of Android’s lifecycle allows the analysis to properly handle callbacks, while context, flow, field and objectsensitivity allows the analysis to track taints with a degree of precision unheard of from previous Android analyses. We also propose DroidBench, an open test suite for evaluating the e↵ectiveness and accuracy of taint-analysis tools specifically for Android apps. As we show through a set of experiments using SecuriBench Micro, DroidBench and a set of well-known Android test applications, our approach finds a very high fraction of data leaks while keeping the rate of false positives low. On DroidBench, our approach achieves 93% recall and 86% precision, greatly outperforming the commercial tools AppScan Source and Fortify SCA. [less ▲]

Detailed reference viewed: 91 (1 UL)