![]() Quintel, Teresa Alegra ![]() ![]() Report (2017) Detailed reference viewed: 287 (15 UL)![]() ; Voos, Holger ![]() Report (2017) This is the qualification document for the new team, and first team of Luxembourg, called “Luxembourg United”. This is also the team’s first attempt to qualify for a RoboCup competition. First, a general ... [more ▼] This is the qualification document for the new team, and first team of Luxembourg, called “Luxembourg United”. This is also the team’s first attempt to qualify for a RoboCup competition. First, a general description of the Luxembourg United team is presented, along with its members and the equipment owned by the team. Second, the mixed team option is considered and potential eventualities suggested. Third, the Luxembourg United team thankfully acknowledges its use of the B-Human code, and lists its original contributions to this code as well as to RoboCup 2017. Fourth, The activities of the team that contribute to Luxembourg United are outlined. Fifth, the impact of the team’s participation and research in RoboCup is described as it applies to the SPL community, to Luxembourg University and SnT Research Center, and to the whole country of Luxembourg. We conclude this document with considerations pertaining to the path that brought us to RoboCup, and present futur perspectives. [less ▲] Detailed reference viewed: 98 (1 UL)![]() Pavlik, Jennifer ![]() Report (2017) Detailed reference viewed: 521 (3 UL)![]() Le, Ha Thanh ![]() ![]() ![]() Report (2016) This technical report details our a semi-automated framework for the reverse-engineering and testing of access control (AC) policies for web-based applications. In practice, AC specifications are often ... [more ▼] This technical report details our a semi-automated framework for the reverse-engineering and testing of access control (AC) policies for web-based applications. In practice, AC specifications are often missing or poorly documented, leading to AC vulnerabilities. Our goal is to learn and recover AC policies from implementation, and assess them to find AC issues. Built on top of a suite of security tools, our framework automatically explores a system under test, mines domain input specifications from access request logs, and then, generates and executes more access requests using combinatorial test generation. We apply machine learning on the obtained data to characterise relevant attributes that influence access control to learn policies. Finally, the inferred policies are used for detecting AC issues, being vulnerabilities or implementation errors. We have evaluated our framework on three open-source applications with respect to correctness and completeness. The results are very promising in terms of the quality of inferred policies, more than 94% of them are correct with respect to implemented AC mechanisms. The remaining incorrect policies are mainly due to our unrefined permission classification. Moreover, a careful analysis of these policies has revealed 92 vulnerabilities, many of them are new. [less ▲] Detailed reference viewed: 306 (25 UL)![]() Appelt, Dennis ![]() ![]() ![]() Report (2016) Web application firewalls (WAF) are an indispensable mechanism to protect online systems from attacks. However, the fast pace at which new kinds of attacks appear and their increasing sophistication ... [more ▼] Web application firewalls (WAF) are an indispensable mechanism to protect online systems from attacks. However, the fast pace at which new kinds of attacks appear and their increasing sophistication require WAFs to be updated and tested regularly as otherwise they will be circumvented. In this paper, we focus our research on WAFs and SQL injection attacks, but the general principles and strategy could be adapted to other contexts. We present a machine learning-driven testing approach to automatically detect holes in WAFs that let SQL injection attacks bypass them. At the beginning, the approach can automatically generate diverse attacks (tests) and then submit them to a system that is protected by a WAF. Incrementally learning from the tests that are blocked or accepted by the WAF, our approach can then select tests that exhibit characteristics associated with bypassing the WAF and mutate them to efficiently generate new bypassing attacks. In the race against cyberattacks, time is vital. Being able to learn and anticipate more attacks that can circumvent a WAF in a timely manner is very important in order to quickly fix or fine-tune protection rules. We developed a tool that implements the approach and evaluated it on ModSecurity, a widely used WAF, and a proprietary WAF that protects a financial institution. Evaluation results indicate that our proposed technique is efficient at generating SQL injection attacks that can bypass a WAF and can be used to identify successful attack patterns. [less ▲] Detailed reference viewed: 875 (29 UL)![]() ; Wieneke, Lars ![]() ![]() Report (2016) Detailed reference viewed: 112 (16 UL)![]() Bollig, Sabine ![]() ![]() ![]() Report (2016) Kinder werden gemeinhin als Adressaten, aber weniger als Akteure von institutionellen Angeboten der Bildung und Betreuung in früher Kindheit wahrgenommen – und das obwohl sie ein komplexes Leben zwischen ... [more ▼] Kinder werden gemeinhin als Adressaten, aber weniger als Akteure von institutionellen Angeboten der Bildung und Betreuung in früher Kindheit wahrgenommen – und das obwohl sie ein komplexes Leben zwischen Familie, Kindertagesbetreuung und Vorschule führen. Das Forschungsprojekt "CHILD - Children in the Luxembourgian Day Care System" hat das Feld der frühen Bildung und Betreuung von der Position der Kinder aus betrachtet und in kindheitstheoretischer und praxisanalytischer Perspektive nach der Vielfalt betreuter Kindheiten gefragt. Vom Standpunkt der Kinder aus differenziert sich das Luxemburger Feld von Bildung und Betreuung in früher Kindheit in vielfältige Bildungs- und Betreuungsarrangements aus. Sie bestimmen nicht nur die Erfahrungen, die Kinder mit nichtfamilialer Bildung und Betreuung machen – und man muss hinzufügen: die nur Kinder machen –, sondern sie bedingen auch die strukturelle Position der Kinder als Mitgestalter von Bildungs- und Betreuungslandschaften früher Kindheit. Bildungs- und Betreuungsarrangements sind eine Domäne der Kinder, obwohl sie sich in einem Zusammenspiel vieler aufeinander bezogener Orte, Kontexte und Akteure realisieren. In diesem Forschungsbericht werden acht ethnographische Fallstudien präsentiert, welche die Multilokalität, Multikontextualität und Multiperspektivität der Bildungs- und Betreuungsarrangements zwei- bis vierjähriger Kinder im Lichte der Alltagspraxis der Kinder analysieren. Die acht Fallstudien zeigen daher nicht nur, dass und wie Kinder zur täglichen Herstellung des Feldes früher Bildung und Betreuung beitragen, sie machen auch die Vielfalt betreuter Kindheiten in Luxemburg sichtbar. [less ▲] Detailed reference viewed: 729 (35 UL)![]() ; ; et al Report (2016) Detailed reference viewed: 24 (0 UL)![]() Kirsch, Claudine ![]() Report (2015) Detailed reference viewed: 115 (4 UL)![]() Francis, Olivier ![]() Report (2015) Detailed reference viewed: 126 (11 UL)![]() Francis, Olivier ![]() Report (2015) Detailed reference viewed: 115 (16 UL)![]() Francis, Olivier ![]() Report (2015) Detailed reference viewed: 177 (24 UL)![]() Pierina Brustolin Spagnuelo, Dayana ![]() ![]() Report (2015) Detailed reference viewed: 252 (50 UL)![]() Vetterle, Tobias ![]() Report (2015) Detailed reference viewed: 96 (6 UL)![]() Pichou, Maria ![]() Report (2015) How can the general public participate in constitution-making and constitution-amending procedures? Are popular initiatives in constitutional change more desirable or feasible in European countries today ... [more ▼] How can the general public participate in constitution-making and constitution-amending procedures? Are popular initiatives in constitutional change more desirable or feasible in European countries today? The recent Roundtable ‘Constitutional Change and People’, organised by the University of Luxembourg and the International Association of Constitutional Law (Constitution-Making and Constitutional Change Research Group) on December 12th 2014, dealt with these issues. The discussion was prompted by ongoing developments in some European countries, which reveal a tendency to introduce elements of direct democracy, such as referendums, online petitions and citizens’ initiatives into the field of constitutional change. The introductory address by the President of the European Court of Justice Prof. Dr. Vasileios Skouris, underlined the difficulties that many European constitutions face in integrating the ‘European phenomenon’. The interaction between the European legal order and national constitutions is still a source of legal uncertainty. There is a movement towards strengthening the possibility of people contributing to constitutional changes around the world in general, and in Europe specifically, after the adoption of the Lisbon Treaty. The timeliness of analysing recent examples of people’s participation in constitutional changes in France, Greece, Iceland, Ireland, Luxembourg, Romania and Switzerland, therefore, becomes evident. [less ▲] Detailed reference viewed: 85 (9 UL)![]() Liu, Bing ![]() ![]() ![]() Report (2015) Debugging Simulink models presents a significant challenge in the embedded industry. In this work, we propose SimFL, a fault localization approach for Simulink models by combining statistical debugging ... [more ▼] Debugging Simulink models presents a significant challenge in the embedded industry. In this work, we propose SimFL, a fault localization approach for Simulink models by combining statistical debugging and dynamic model slicing. Simulink models, being visual and hierarchical, have multiple outputs at different hierarchy levels. Given a set of outputs to observe for localizing faults, we generate test execution slices, for each test case and output, of the Simulink model. In order to further improve fault localization accuracy, we propose iSimFL, an iterative fault localization algorithm. At each iteration, iSimFL increases the set of observable outputs by including outputs at lower hierarchy levels, thus increasing the test oracle cost but offsetting it with significantly more precise fault localization. We utilize a heuristic stopping criterion to avoid unnecessary test oracle extension. We evaluate our work on three industrial Simulink models from Delphi Automotive. Our results show that, on average, SimFL ranks faulty blocks in the top 8.9% in the list of suspicious blocks. Further, we show that iSimFL significantly improves this percentage down to 4.4% by requiring engineers to observe only an average of five additional outputs at lower hierarchy levels on top of high-level model outputs. [less ▲] Detailed reference viewed: 399 (29 UL)![]() Neumann, Sascha ![]() ![]() Report (2015) Detailed reference viewed: 101 (3 UL)![]() Kwok, Stephen ![]() ![]() ![]() Report (2015) Detailed reference viewed: 120 (14 UL)![]() Ryan, Peter ![]() Report (2015) The Snowden revelations have demonstrated that the US and other nations are amassing data about people's lives at an unprecedented scale. Furthermore, these revelations have shown that intelligence ... [more ▼] The Snowden revelations have demonstrated that the US and other nations are amassing data about people's lives at an unprecedented scale. Furthermore, these revelations have shown that intelligence agencies are not only pursuing passive surveillance over the world's communication systems, but are also seeking to facilitate such surveillance by undermining the security of the internet and communications technologies. Thus the activities of these agencies threatens not only the rights of individual citizens but also the fabric of democratic society. Intelligence services do have a useful role to play in protecting society and for this need the capabilities and authority to perform targeted surveillance. But the scope of such surveillance must be strictly limited by an understanding of its costs as well as benefits, and it should not impinge on the privacy rights of citizens any more than necessary. Here we report on a recent Dagstuhl Perspectives Workshop addressing these issues - a four-day gathering of experts from multiple disciplines connected with privacy and security. The meeting explored the scope of mass-surveillance and the deliberate undermining of the security of the internet, defined basic principles that should underlie needed reforms, and discussed the potential for technical, legal and regulatory means to help restore the security of the internet and stem infringement of human-rights by ubiquitous electronic surveillance. [less ▲] Detailed reference viewed: 305 (4 UL)![]() Mustafic, Maida ![]() ![]() Report (2015) Detailed reference viewed: 71 (5 UL)![]() Benzmüller, Christoph ![]() ![]() Report (2015) Detailed reference viewed: 64 (0 UL)![]() Matinnejad, Reza ![]() ![]() ![]() Report (2015) All engineering disciplines are founded and rely on models, al- though they may differ on purposes and usages of modeling. Inter- disciplinary domains such as Cyber Physical Systems (CPSs) seek approaches ... [more ▼] All engineering disciplines are founded and rely on models, al- though they may differ on purposes and usages of modeling. Inter- disciplinary domains such as Cyber Physical Systems (CPSs) seek approaches that incorporate different modeling needs and usages. Specifically, the Simulink modeling platform greatly appeals to CPS engineers due to its seamless support for simulation and code generation. In this paper, we propose a test generation approach that is applicable to Simulink models built for both purposes of simulation and code generation. We define test inputs and outputs as signals that capture evolution of values over time. Our test gener- ation approach is implemented as a meta-heuristic search algorithm and is guided to produce test outputs with diverse shapes according to our proposed notion of diversity. Our evaluation, performed on industrial and public domain models, demonstrates that: (1) In con- trast to the existing tools for testing Simulink models that are only applicable to a subset of code generation models, our approach is applicable to both code generation and simulation Simulink mod- els. (2) Our new notion of diversity for output signals outperforms random baseline testing and an existing notion of signal diversity in revealing faults in Simulink models. (3) The fault revealing ability of our test generation approach outperforms that of the Simulink Design Verifier, the only testing toolbox for Simulink. [less ▲] Detailed reference viewed: 312 (28 UL)![]() Pausch, Marie-Pierre ![]() ![]() Report (2014) Detailed reference viewed: 234 (75 UL)![]() Pausch, Marie-Pierre ![]() ![]() Report (2014) Detailed reference viewed: 156 (47 UL)![]() ; Bordas, Stéphane ![]() ![]() Report (2014) The objective of the study is the extension of the existing 2D FEniCS implementation of Cosserat elasticity to the 3D case. The first step is the implementation of a patch-test for a simple problem in ... [more ▼] The objective of the study is the extension of the existing 2D FEniCS implementation of Cosserat elasticity to the 3D case. The first step is the implementation of a patch-test for a simple problem in classical elasticity as a Timoshenko's beam - this study will show that DOLFIN could offer approximated solutions converging to the analytical solution. The second step is the computation of the stress in a plate with a circular hole. The stress concentration factors around the hole in classical and Cosserat elasticities will be compared, and a convergence study for the Cosserat case will be realised. The third step is the extension to the 3D case with the computation of the stress concentration factor around a spherical cavity in an infinite elastic medium. This computed value will be compare to the analytical solution described by couple-stress theory. [less ▲] Detailed reference viewed: 293 (7 UL)![]() Allix, Kevin ![]() ![]() ![]() Report (2014) Machine Learning-based malware detection is a promis- ing scalable method for identifying suspicious applica- tions. In particular, in today’s mobile computing realm where thousands of applications are ... [more ▼] Machine Learning-based malware detection is a promis- ing scalable method for identifying suspicious applica- tions. In particular, in today’s mobile computing realm where thousands of applications are daily poured into markets, such a technique could be valuable to guaran- tee a strong filtering of malicious apps. The success of machine-learning approaches however is highly de- pendent on (1) the quality of the datasets that are used for training and of (2) the appropriateness of the tested datasets with regards to the built classifiers. Unfortu- nately, there is scarce mention of these aspects in the evaluation of existing state-of-the-art approaches in the literature. In this paper, we consider the relevance of history in the construction of datasets, to highlight its impact on the performance of the malware detection scheme. Typ- ically, we show that simply picking a random set of known malware to train a malware detector, as it is done in most assessment scenarios from the literature, yields significantly biased results. In the process of assessing the extent of this impact through various experiments, we were also able to confirm a number of intuitive assump- tions about Android malware. For instance, we discuss the existence of Android malware lineages and how they could impact the performance of malware detection in the wild. [less ▲] Detailed reference viewed: 688 (38 UL)![]() Codeca, Lara ![]() ![]() ![]() Report (2014) The vehicular traffic in the cities is increasing every year. The road infrastructure in many metropolitan areas is not able to sustain the rush-hour traffic demand and the extension of the road network ... [more ▼] The vehicular traffic in the cities is increasing every year. The road infrastructure in many metropolitan areas is not able to sustain the rush-hour traffic demand and the extension of the road network cannot easily be done. There are some solution proposed to improve the traffic situation, among them, the optimization of the resources already available by means of collecting real time Floating Car Data (FCD) from the vehicles and use them to suggest dynamic routes in order to minimize travel delays. The centralized infrastructure able to achieve this goal has already been presented in ”Improving Traffic in Urban Environments applying the Wardrop Equilibrium” (Codeca, L. et al., 2013). In this extended abstract we present the decentralized version of the system and the preliminary results of its evaluation. [less ▲] Detailed reference viewed: 156 (15 UL)![]() Appelt, Dennis ![]() ![]() ![]() Report (2014) Web services are increasingly adopted in various domains, from finance and e-government to social media. As they are built on top of the web technologies, they suffer also an unprecedented amount of ... [more ▼] Web services are increasingly adopted in various domains, from finance and e-government to social media. As they are built on top of the web technologies, they suffer also an unprecedented amount of attacks and exploitations like the Web. Among the attacks, those that target SQL injection vulnerabilities have consistently been top-ranked for the last years. Testing to detect such vulnerabilities before making web services public is crucial. We present in this report an automated testing approach, namely μ4SQLi, and its underpinning set of mutation operators. μ4SQLi can produce effective inputs that lead to executable and harmful SQL statements. Executability is key as otherwise no injection vulnerability can be exploited. Our evaluation demonstrated that the approach outperforms contemporary known attacks in terms of vulnerability detection and the ability to get through an application firewall, which is a popular configuration in real world. [less ▲] Detailed reference viewed: 743 (59 UL)![]() Pavlik, Jennifer ![]() Report (2014) Detailed reference viewed: 42 (1 UL)![]() ; Rahli, Vincent ![]() Report (2014) Detailed reference viewed: 84 (2 UL)![]() ; ; et al Report (2013) Detailed reference viewed: 65 (1 UL)![]() ; ; et al Report (2013) Today’s smart phones are a ubiquitous source of private and confidential data. At the same time, smartphone users are plagued by malicious apps that exploit their given privileges to steal such sensitive ... [more ▼] Today’s smart phones are a ubiquitous source of private and confidential data. At the same time, smartphone users are plagued by malicious apps that exploit their given privileges to steal such sensitive data, or to track users without their consent or even the users noticing. Dynamic program analyses fail to discover such malicious activity because apps have learned to recognize the analyses as they execute. In this work we present FlowDroid, a novel and highly precise taint analysis for Android applications. A precise model of Android’s lifecycle allows the analysis to properly handle callbacks, while context, flow, field and objectsensitivity allows the analysis to track taints with a degree of precision unheard of from previous Android analyses. We also propose DroidBench, an open test suite for evaluating the e↵ectiveness and accuracy of taint-analysis tools specifically for Android apps. As we show through a set of experiments using SecuriBench Micro, DroidBench and a set of well-known Android test applications, our approach finds a very high fraction of data leaks while keeping the rate of false positives low. On DroidBench, our approach achieves 93% recall and 86% precision, greatly outperforming the commercial tools AppScan Source and Fortify SCA. [less ▲] Detailed reference viewed: 117 (1 UL)![]() ; Poncin, Norbert ![]() Report (2013) Abstracts and list of participants of the Workshop on "Higher Algebras and Lie Infinity Homotopy Theory" organized in June 2013 at the University of Luxembourg by Vladimir Dotsenko and Norbert Poncin Detailed reference viewed: 182 (14 UL)![]() Pavlik, Jennifer ![]() Report (2013) Detailed reference viewed: 319 (2 UL)![]() Pavlik, Jennifer ![]() Report (2013) Detailed reference viewed: 71 (0 UL)![]() Singh, Ajay ![]() Report (2013) Detailed reference viewed: 53 (1 UL)![]() Jubin, Benoît Michel ![]() ![]() Report (2013) Poster, abstracts, and list of participants of the International Workshop on Higher Lie Theory organized in December 2013 at the University of Luxembourg by Benoît Jubin and Norbert Poncin Detailed reference viewed: 170 (13 UL)![]() Carr, Constance ![]() ![]() Report (2013) Detailed reference viewed: 159 (10 UL)![]() Carr, Constance ![]() ![]() Report (2013) Detailed reference viewed: 177 (9 UL)![]() Carr, Constance ![]() ![]() Report (2013) The project, SUSTAIN_GOV, aims at investigating sustainable spatial development policies in the context of governance, both with respect to Luxembourg and, as a comparative ap-proach, to the Swiss ... [more ▼] The project, SUSTAIN_GOV, aims at investigating sustainable spatial development policies in the context of governance, both with respect to Luxembourg and, as a comparative ap-proach, to the Swiss planning system and urban transformation processes in the Glattal-Stadt. SUSTAIN_GOV builds directly from the strong conceptual and empirical foundations estab-lished by the “SUSTAINLUX Project” (CO9/SR/01) that has thus far shown that despite the intense urbanization pressure, the strong strains on land resources and infrastructure, and the political dilemmas these issues raise, policy, planning and governance practices in the Grand Duchy remain underdeveloped, particularly in the domain citizen involvement in public deci-sion-making. SUSTAIN_GOV brings into sharper focus a more nuanced scientific under-standing of participation, governance, and integrated sustainable spatial development, and an in-depth evaluation of existing spatial planning, policy, and governance patterns in the Grand Duchy. The proposed research is informed by a robust and contemporary set of conceptual approach, that shape current urban and regional literatures. The research design follows a qualitative methodological approach. [less ▲] Detailed reference viewed: 292 (20 UL)![]() ; ; et al Report (2013) For sustainable growth, job creation and innovation, Luxembourg has chosen to rapidly develop high quality university and public research infrastructures and transition to a knowledge society. Europe ... [more ▼] For sustainable growth, job creation and innovation, Luxembourg has chosen to rapidly develop high quality university and public research infrastructures and transition to a knowledge society. Europe, through its "Digital Agenda" has chosen to maximise the social and economic potential of ICT. In order to achieve these goals, high quality knowledge in all fields must be available not only for University and Research Centers but for the whole population. Lifelong learning and cultural commons need to be promoted actively. This was one of the motivations to modernise the library sector and to invest in new built infrastructures for the National Library and the University of Luxembourg. Though printed material will not disappear, a rapidly increasing amount will be in exclusively digital format (the focus of this document) either licensed from publishers, made accessible under Open Access regimes or through digitisation of printed originals. The internet continues to have a big impact on knowledge creation and cultural creativity through vastly facilitated networking and availability of very large amounts of information. The organisations endorsing this document have taken up the challenge to respond pro-actively to this evolution. This document is a guide to help readers understand a number of current challenges and opportunities for digital culture and science, relevant to libraries, research organisations as well as research and library funders. [less ▲] Detailed reference viewed: 130 (28 UL)![]() Carr, Constance ![]() ![]() Report (2013) Detailed reference viewed: 149 (17 UL)![]() Ancel, Pascal ![]() Report (2013) Detailed reference viewed: 75 (1 UL)![]() ; Caire, Patrice ![]() Report (2012) Detailed reference viewed: 86 (0 UL)![]() Francis, Olivier ![]() Report (2012) Detailed reference viewed: 60 (4 UL)![]() Francis, Olivier ![]() Report (2012) Detailed reference viewed: 57 (2 UL)![]() ; Hertel, Frank ![]() Report (2012) Detailed reference viewed: 53 (2 UL)![]() Bartel, Alexandre ![]() ![]() Report (2012) In this paper we claim that a widely applicable and efficient means to fight against malicious mobile Android applications is: 1) to perform runtime monitoring 2) by instrumenting the application bytecode ... [more ▼] In this paper we claim that a widely applicable and efficient means to fight against malicious mobile Android applications is: 1) to perform runtime monitoring 2) by instrumenting the application bytecode and 3) in-vivo, i.e. directly on the smartphone. We present a tool chain to do this and present experimental results showing that this tool chain can run on smartphones in a reasonable amount of time and with a realistic effort. Our findings also identify challenges to be addressed before running powerful runtime monitoring and instrumentations directly on smartphones. We implemented two use-cases leveraging the tool chain: FineGPolicy, a fine-grained user centric permission policy system and AdRemover an advertisement remover. Both prototypes improve the privacy of Android systems thanks to in-vivo bytecode instrumentation. [less ▲] Detailed reference viewed: 282 (26 UL)![]() ; Swan, Yvik ![]() Report (2012) Detailed reference viewed: 93 (1 UL)![]() ; Hertel, Frank ![]() Report (2012) Detailed reference viewed: 45 (3 UL)![]() ; Hertel, Frank ![]() Report (2012) Detailed reference viewed: 52 (0 UL)![]() Carr, Constance ![]() Report (2012) Detailed reference viewed: 110 (6 UL)![]() Cebotari, Victor ![]() Report (2012) Detailed reference viewed: 31 (0 UL)![]() Covolo, Tiffany ![]() ![]() Report (2012) Abstracts and list of participants of the Workshop on "Graded Algebra and Geometry" organized in December 2012 at the University of Luxembourg by Tiffany Covolo, Valentin Ovsienko, and Norbert Poncin Detailed reference viewed: 157 (8 UL)![]() Park, Beth Anne ![]() ![]() ![]() Report (2012) Pour la première fois, la Bibliothèque de l'Université du Luxembourg publie des chiffres disponibles relatifs à ses activités, à ses services et collections, ainsi qu'à l'usage de ceux-ci. Detailed reference viewed: 116 (25 UL)![]() ; Cebotari, Victor ![]() Report (2012) Detailed reference viewed: 33 (1 UL)![]() Carr, Constance ![]() Report (2012) Detailed reference viewed: 105 (11 UL)![]() Carr, Constance ![]() Report (2011) Detailed reference viewed: 135 (16 UL)![]() Cebotari, Victor ![]() Report (2011) Detailed reference viewed: 42 (0 UL)![]() Poncin, Norbert ![]() Report (2011) Detailed reference viewed: 119 (6 UL)![]() ; Swan, Yvik ![]() Report (2011) Detailed reference viewed: 42 (0 UL)![]() Francis, Olivier ![]() ![]() Report (2010) Detailed reference viewed: 131 (3 UL)![]() ; Kmiotek-Meier, Emilia Alicja ![]() Report (2010) Detailed reference viewed: 43 (2 UL)![]() Goncalves Almeida Antunes, Michel ![]() Report (2010) Detailed reference viewed: 101 (14 UL)![]() Pavlik, Jennifer ![]() Report (2010) Detailed reference viewed: 87 (1 UL)![]() ; ; et al Report (2010) Detailed reference viewed: 88 (4 UL)![]() Carr, Constance ![]() ![]() ![]() Report (2010) Detailed reference viewed: 180 (7 UL)![]() Fridgen, Gilbert ![]() Report (2010) Detailed reference viewed: 18 (0 UL)![]() Carr, Constance ![]() ![]() ![]() Report (2010) Detailed reference viewed: 180 (1 UL)![]() Carr, Constance ![]() ![]() ![]() Report (2010) Detailed reference viewed: 234 (17 UL)![]() ; ; Decieux, Jean Philippe Pierre ![]() Report (2009) Die vorliegende Befragungsstudie ‚Lebensqualität der Bürgerinnen und Bürger der Stadt Luxemburg’ ist Teil eines Gesamtprojektes, das im Auftrag der Stadt Luxemburg durchgeführt wurde und an dem drei ... [more ▼] Die vorliegende Befragungsstudie ‚Lebensqualität der Bürgerinnen und Bürger der Stadt Luxemburg’ ist Teil eines Gesamtprojektes, das im Auftrag der Stadt Luxemburg durchgeführt wurde und an dem drei Institutionen mitgewirkt haben: FOREG (Projektleitung: Dr. Manfred Schenk), CEPS (Leiter der Abteilung GEODE: Patrick Bousch) und die Universität Trier (Teilprojekt Bürgerbefragung: PD Dr. Waldemar Vogelgesang). Ziel der Befragung ist es, aus der Sicht der in der Stadt lebenden Menschen die Stärken und Schwächen ihres urbanen Lebensraums aufzuzeigen. Ein besonderer Schwerpunkt der Studie liegt dabei auf dem Wohnumfeld, der Familien- und Betreuungssituation und auf den sozialen Beziehungen der Bewohnerinnen und Bewohner untereinander. Die auf diese Weise gewonnenen Erkenntnisse über die Lebens- und Wohnverhältnisse bilden eine wichtige Informationsgrundlage für einen Sozialplan, der für die Stadt Luxemburg erstellt wird. [less ▲] Detailed reference viewed: 622 (18 UL)![]() ; ; Affolderbach, Julia ![]() Report (2009) Detailed reference viewed: 95 (0 UL)![]() Francis, Olivier ![]() Report (2008) Detailed reference viewed: 58 (1 UL)![]() Poncin, Norbert ![]() Report (2008) Detailed reference viewed: 71 (3 UL)![]() Affolderbach, Julia ![]() Report (2008) Detailed reference viewed: 51 (1 UL)![]() Affolderbach, Julia ![]() Report (2008) Detailed reference viewed: 58 (0 UL)![]() Francis, Olivier ![]() Report (2007) Detailed reference viewed: 71 (2 UL)![]() Poncin, Norbert ![]() Report (2007) Detailed reference viewed: 57 (2 UL)![]() Poncin, Norbert ![]() Report (2007) Abstracts of the ESF Conference 'Algebraic Aspects in Geometry' chaired by Norbert Poncin Detailed reference viewed: 76 (18 UL)![]() ; ; et al Report (2006) Detailed reference viewed: 108 (3 UL)![]() Francis, Olivier ![]() Report (2006) Detailed reference viewed: 70 (1 UL)![]() Bernard, Nicolas ![]() Report (2006) Datagram Transport Layer Security (DTLS) is a recent prococol. It provides a cryptographical layer on the top of UDP. This protocol is implemented in the OpenSSL library but its use is not documented ... [more ▼] Datagram Transport Layer Security (DTLS) is a recent prococol. It provides a cryptographical layer on the top of UDP. This protocol is implemented in the OpenSSL library but its use is not documented. This document aims to show how to use this implementation, by providing examples. [less ▲] Detailed reference viewed: 90 (1 UL)![]() Francis, Olivier ![]() Report (2006) Detailed reference viewed: 86 (2 UL)![]() Zetzsche, Dirk Andreas ![]() Report (2005) This paper analyses the rules regarding the internet-based exercise of shareholder rights for public corporations incorporated in Canada, France, Germany, the U.S. (DelGCL & RMBCA), the UK and Switzerland ... [more ▼] This paper analyses the rules regarding the internet-based exercise of shareholder rights for public corporations incorporated in Canada, France, Germany, the U.S. (DelGCL & RMBCA), the UK and Switzerland. The traditional doctrine associates information, communication and voting with shareholder meetings. In addition, shareholder meetings regularly prompt reviews of management's activities exercised on behalf of shareholders by accountants or the judiciary. The analysis reveals that the current regimes of shareholder meetings merely provide for voting and information in the context of a digital environment, while communication and review is usually not replicated. The lack of all functions of traditional shareholder meetings is one reason of why exclusively virtual shareholder meetings have not gained widely spread acceptance across jurisdictions. Another reason is that a well-fitting design for the web-based exercise of shareholder rights does not yet exist. Thus, the paper develops an advisable design of Virtual Shareholder Meetings that replicates all for functions of traditional shareholder meetings, while it is likely to reduce shareholder apathy at the same time. It argues that enabling more frequent opportunities for voting is the logical consequence of the developments of continuous disclosure requirements and continuous buy/hold/sell-decisions by market participants. Therefore, the virtual exercise of shareholder rights should be achieved through (1) liberalizing currently existing legislative and practical barriers, and in particular, time and place restrictions on shareholder meetings; (2) re-integrating analyst and institutional investor meetings in the process of shareholder meetings, and (3) substituting for the traditional face-to-face accountability of managers to shareholders through specific electronic means. The latter involves, specifically, the use of RSS-Feed and XBRL-technologies for gathering and evaluating information, the use of the company's website as the central communication platform for management to shareholders and shareholders to shareholders, and the election of an independent shareholder rights manager (firm) by the shareholder body with procedural, technical, and organizational authority for organizing the exercise of shareholder rights. Ideally, the blueprint presented herein achieves the harmonization of voting behavior and market reactions, thereby furthering market efficiency. [less ▲] Detailed reference viewed: 153 (5 UL)![]() Juffermans, Kasper ![]() Report (2005) Detailed reference viewed: 58 (0 UL)![]() Francis, Olivier ![]() Report (2004) Detailed reference viewed: 112 (5 UL)![]() Poncin, Norbert ![]() Report (2004) Speakers' abstracts and list of participants of the International Conference on 'Poisson Geometry and related fields' organized in June 2004 at the University of Luxembourg by Norbert Poncin Detailed reference viewed: 83 (12 UL)![]() Bernard, Nicolas ![]() Report (2002) Detailed reference viewed: 48 (1 UL)![]() During, Marten ![]() Report (n.d.) Detailed reference viewed: 58 (1 UL)![]() Willems, Helmut ![]() ![]() Report (n.d.) Detailed reference viewed: 95 (7 UL) |
||