References of "Doctoral thesis"      in Complete repository Arts & humanities   Archaeology   Art & art history   Classical & oriental studies   History   Languages & linguistics   Literature   Performing arts   Philosophy & ethics   Religion & theology   Multidisciplinary, general & others Business & economic sciences   Accounting & auditing   Production, distribution & supply chain management   Finance   General management & organizational theory   Human resources management   Management information systems   Marketing   Strategy & innovation   Quantitative methods in economics & management   General economics & history of economic thought   International economics   Macroeconomics & monetary economics   Microeconomics   Economic systems & public economics   Social economics   Special economic topics (health, labor, transportation…)   Multidisciplinary, general & others Engineering, computing & technology   Aerospace & aeronautics engineering   Architecture   Chemical engineering   Civil engineering   Computer science   Electrical & electronics engineering   Energy   Geological, petroleum & mining engineering   Materials science & engineering   Mechanical engineering   Multidisciplinary, general & others Human health sciences   Alternative medicine   Anesthesia & intensive care   Cardiovascular & respiratory systems   Dentistry & oral medicine   Dermatology   Endocrinology, metabolism & nutrition   Forensic medicine   Gastroenterology & hepatology   General & internal medicine   Geriatrics   Hematology   Immunology & infectious disease   Laboratory medicine & medical technology   Neurology   Oncology   Ophthalmology   Orthopedics, rehabilitation & sports medicine   Otolaryngology   Pediatrics   Pharmacy, pharmacology & toxicology   Psychiatry   Public health, health care sciences & services   Radiology, nuclear medicine & imaging   Reproductive medicine (gynecology, andrology, obstetrics)   Rheumatology   Surgery   Urology & nephrology   Multidisciplinary, general & others Law, criminology & political science   Civil law   Criminal law & procedure   Criminology   Economic & commercial law   European & international law   Judicial law   Metalaw, Roman law, history of law & comparative law   Political science, public administration & international relations   Public law   Social law   Tax law   Multidisciplinary, general & others Life sciences   Agriculture & agronomy   Anatomy (cytology, histology, embryology...) & physiology   Animal production & animal husbandry   Aquatic sciences & oceanology   Biochemistry, biophysics & molecular biology   Biotechnology   Entomology & pest control   Environmental sciences & ecology   Food science   Genetics & genetic processes   Microbiology   Phytobiology (plant sciences, forestry, mycology...)   Veterinary medicine & animal health   Zoology   Multidisciplinary, general & others Physical, chemical, mathematical & earth Sciences   Chemistry   Earth sciences & physical geography   Mathematics   Physics   Space science, astronomy & astrophysics   Multidisciplinary, general & others Social & behavioral sciences, psychology   Animal psychology, ethology & psychobiology   Anthropology   Communication & mass media   Education & instruction   Human geography & demography   Library & information sciences   Neurosciences & behavior   Regional & inter-regional studies   Social work & social policy   Sociology & social sciences   Social, industrial & organizational psychology   Theoretical & cognitive psychology   Treatment & clinical psychology   Multidisciplinary, general & others     Showing results 1101 to 1200 of 1270     7 8 9 10 11 12 13     Federated and scalable network overlay approaches for global-scale interactive applicationsEsch, Markus Doctoral thesis (2010)Detailed reference viewed: 120 (7 UL) Droits des contrats et droit des organismes de placement collectifDelagardelle, Pierre-Alexandre Doctoral thesis (2010)Detailed reference viewed: 97 (7 UL) André Gide "le romancier poète". La place de la poésie dans le projet littéraire gidien de 1890 à 1911Doub, Helene Doctoral thesis (2010)Detailed reference viewed: 45 (3 UL) Zu den Einflüssen der klimatischen Umgebungsbedingungen auf die Eigenschaften eines selbstverdichtenden BetonsWeisheit, Sandro Doctoral thesis (2010)Detailed reference viewed: 68 (1 UL) Werbediskurs in Luxemburg. Identitätsstiftendes und Vermittelndes Potential von Werbung im Multikulturellen RaumReddeker, Sebastian Doctoral thesis (2010)Detailed reference viewed: 90 (11 UL) CUBA: Artificial conviviality and user-behaviour analysis in web-feedsKaufmann, Sascha Doctoral thesis (2010)Conviviality is a concept of great depth that plays an important role in any social interaction. A convivial relation between individuals is one that allows the participating individuals to behave and ... [more ▼]Conviviality is a concept of great depth that plays an important role in any social interaction. A convivial relation between individuals is one that allows the participating individuals to behave and interact with each other following a set of conventions that are shared, commonly agreed upon, or at least understood. This presupposes an implicit or an explicit regulation mechanism based on consensus or social contracts and applies to the behaviours and interactions of participating individuals. With respect to an intelligent web-based system, an applicable social contribution is the give of assistance to other users in situations that are unclear and in guiding him to find the right decision whenever a conflict arises. Such a convivial social biotope deeply depends on both implicit and explicit co-operation and collaboration of natural users inside a community. Here, the individual conviviality may benefit from “The Wisdom of Crowds”, which fosters a dynamic understanding of the user’s behaviour and a strong influence of an individual’s well being to another person(s). The web-based system CUBA focus on such a behavioural analysis through profiling and demonstrates a convivial stay within a web-based feed system. [less ▲]Detailed reference viewed: 203 (92 UL) DT4BP: a Business Process Modelling Language for Dependable Time-Constrained Business ProcessesCapozucca, Alfredo Doctoral thesis (2010)Today, numerous organisations rely on information software systems to run their businesses. The effectiveness of the information software system then, depends largely on the degree to which the ... [more ▼]Today, numerous organisations rely on information software systems to run their businesses. The effectiveness of the information software system then, depends largely on the degree to which the organisation's business is accurately captured in the business model. The business model is an abstract description of the way an organisation's functions. Thus, the more precise the business model, the more accurate the requirement definition of the information software system to be engineered.There are an abundance of tools and notations available today to support the development of many types of business process. Many of these artifacts rely on the concept of a business process to describe a business model. A business process is commonly known as a set of one or more linked procedures or activities which collectively realise a business objective or policy goal, normally within the context of an organisational structure defining functional roles and relationships". This thesis is concerned with modelling business processes as a means to accurately capture an organisation's activities and thus, the requirements of the software system that supports these activities.Among the infinite set of possible business processes, this thesis targets only those characterized by the qualities of dependability, collaboration and time. Business processes having these specific dimensions are referred to as Dependable, Collaborative and Time-Constrained (DCTC) business processes. A dependable business process is one whose failures or the number of occurrences in which business process misses its goal are not unacceptably frequent or severe (from certain viewpoint). A collaborative business process is one that requires the interaction of multiple participants to attain its goal. A time-constrained business process is one that owns at least one property expressed in terms of an upper or lower time bound. This thesis investigates how DCTC business processes can be described such that the resulting model captures all the relevant aspects of each dimension of interest. In addition, the business model must be comprehensible to the stakeholders involved not only in its definition, but also in its further use throughout the software development life cycle.A revision and analysis of notations that exist for modelling business processes conducted in this thesis have revealed that today there does not exist any modelling language that provides comprehensible, suitable and sufficiently expressive support for the characteristics of dependability, collaboration and time in an integrated manner. Hence, a significant part of this thesis is devoted to the definition of a new business process modelling language named DT4BP. The aim of this new modelling language is to be comprehensible, suitable and expressive enough to describe DCTC business processes. The definition of this new modelling language implies that a concrete syntax, an abstract syntax, a semantic domain and a semantic mapping is provided. The definition of this new modelling language is given following the Model-Driven Engineering (MDE) approach, and in particular the metamodelling principles. Thus, meta-models and model transformations are used to precisely specify the abstract syntax and semantic mapping elements of the language definition, respectively. Since DT4BP is a textual modelling language, its concrete syntax is specified by a context-free grammar. The Coordinated Atomic Actions conceptual framework with real-time extensions (Timed-CaaFWrk) is used as the semantic domain as it covers a large part of the abstractions included in dependable collaborative time-constrained business processes. The formalisation of this semantic domain according to the metamodelling principles is also part of the material presented in this thesis. Since the business model is considered as a representation of the requirement document the software system to be developed, it is crucial to validate whether it captures the requirements as intended by the stakeholder before going further in the software development process. Hence, besides the comprehensibility, suitability and expressiveness of the modelling language with respect to the domain of interest, it is of special interest to provide a mechanism that allows modellers to ensure that the business model is correct with respect to the stakeholder's expectations. One way of achieving this goal is to provide the modelling language with an executable semantics. In this manner, any business model can be executed on sample input data, and its dynamic behaviour observed. The observation of the dynamic behaviour of the model may be considered as a simulation of the model based on the sample input data. By performing several simulations of the model, the modeller, in cooperation with the stakeholder, can judge whether the business model is correct. This thesis provides an executable semantics for Timed-CaaFWrk that, used in combination with the model transformation that defines the semantic mapping element of the language definition, allows DT4BP models to be validated by simulation. In this manner, the dynamic behaviour of a particular DT4BP model for a given sample input data can be observed by transforming it into a Timed-CaaFWrk model, which is then run thanks to the given executable semantics. [less ▲]Detailed reference viewed: 95 (6 UL) Co-construction de sens. Elaboration conjointe d'une production écrite. Etude du processus d'écritureArend, Béatrice Doctoral thesis (2010)Detailed reference viewed: 77 (2 UL) Adaptation cognitive et vieillissement : entre automatisme et flexibilitéTournier, Isabelle Doctoral thesis (2010)L'objectif général de cette thèse est d'étudier l'évolution au cours du vieillissement des processus automatiques et contrôlés, nécessaires à une bonne adaptation cognitive quotidienne. Nous nous ... [more ▼]L'objectif général de cette thèse est d'étudier l'évolution au cours du vieillissement des processus automatiques et contrôlés, nécessaires à une bonne adaptation cognitive quotidienne. Nous nous intéressons à l'influence de différentes variables cognitives (mémoire de travail, vitesse de traitement et vocabulaire) ainsi qu'aux préférences de routinisation sur l'expression de ce possible effet de l'âge. Des épreuves de fluidités sémantiques simples (Expérience 1) et alternées (Expériences 2 et 3) et des formats simples (Expériences 5a et 6a) et alternés (Expériences 5b et 6b) de la tâche de Hayling ont été réalisés par des adultes jeunes (18-30 ans), âgés (60-74 ans) et très âgés (75 ans et plus). Ces épreuves nous permettent d'étudier le processus automatique à travers la diffusion de l'activation en mémoire sémantique et les processus contrôlés par le biais de l'inhibition et de la flexibilité. L'activité cérébrale associée à l'exécution de fluidités simples et alternées est étudiée chez des participants âgés à l'aide de l'imagerie optique (Expérience 4). Les résultats obtenus sont en faveur d'une réduction avec l'âge de l'efficience des processus contrôlés alors que celle des processus automatiques semble conservée. Des phénomènes de compensation se mettraient en place au cours du vieillissement, s'appuyant sur les processus automatiques et les connaissances accumulées. [less ▲]Detailed reference viewed: 48 (5 UL) Inflammation-induced dedifferentiation of astrocytes and anti-inflammatory effects of undifferentiated neural cellsGabel, Sébastien Doctoral thesis (2010)Detailed reference viewed: 58 (7 UL) La mise en abyme chez Georges Perec. Avec application des résultats théoriques à un corpus d'écrivains francophones luxembourgeois: Jean Sorrente et Jean PortanteRaus, Tonia Doctoral thesis (2010)Detailed reference viewed: 65 (8 UL) Functions of hepatitis C virus non-structural protein 2Dentzer, Thomas Doctoral thesis (2010)An estimated 170 million people are infected with hepatitis C virus (HCV). 15-30% of HCV-induced chronic hepatitis progresses to cirrhosis within years to decades after infection, and 3-4% of them will ... [more ▼]An estimated 170 million people are infected with hepatitis C virus (HCV). 15-30% of HCV-induced chronic hepatitis progresses to cirrhosis within years to decades after infection, and 3-4% of them will develop hepatocellular carcinoma. There is no vaccine available, and current HCV therapy of pegylated interferon-! in combination with ribavirin leads to a sustained response only in about 50% of infected patients. The HCV non-structural protein NS2 (MW 23 kDa) is a dimeric multifunctional hydrophobic protein with an essential but poorly understood role in infectious virus production. The N terminal region of NS2 interacts with membranes whereas the Cterminal region, together with the N-terminal third of NS3, forms the NS2-3 protease. NS2 is not required for RNA synthesis, although cleavage at the NS2/3 junction is necessary for replication. Further, NS2 has been shown to interact with a number of viral and host proteins; it has been reported to activate transcription factors, inhibit apoptosis, and is a substrate for host kinase phosphorylation and proteosomic degradation. NS2 determinants and their respective function in the HCV life cycle were investigated. Based on the crystal structure of the post-cleavage form of the NS2 protease domain, we mutated conserved features and analyzed the effects of these changes on polyprotein processing, replication, and infectious virus production. We found that mutations around the protease active site inhibit viral RNA replication by preventing NS2/3 cleavage. Supplementary assays indicated a dimerization defect for these mutant constructs, which prevented cleavage and RNA replication. In contrast, alterations in the dimer interface and at the C-terminal region did not affect replication, NS2 stability, or NS2 protease activity, but decreased infectious virus production. Analysis of the NS2/3 cleavage site revealed an additional function for several residues besides cleavage, notably in infectious virus production. A more comprehensive deletion and mutagenesis analysis of the C-terminal end of NS2 revealed the importance of its C-terminal residue in infectious particle production. Structural data suggests that the C-terminal leucine is locked in the active site, and mutation or deletion of this residue could therefore alter the NS2 folding and disrupt potential protein-protein interactions important for infectious particle production. Further, we established an NS2- 3 interaction model based on the solved NS2pro and NS3 crystal structures and assessed the importance of proximal residues for viral propagation. We were able to show genetic interactions between the viral proteins NS2 and E1 as well as NS2 and NS3. Additionally a pull down assay of strep-tagged NS2 followed by a mass spectrometry analysis divulged the physical interactions between NS2-E2, and NS2- NS3. Numerous host cell proteins could be identified to interact with NS2, involved in various pathways such as membrane trafficking, actin/myosin interactions or actin polymerization. In this study we dissected the residues of NS2 involved in its multiple essential roles and interactions in the HCV life cycle and established NS2 as a new viable target for HCV-specific inhibitors for future anti-viral therapeutics. [less ▲]Detailed reference viewed: 73 (4 UL) Identität und Sprache. Muster der sprachlichen Identitätsbildung und -zerstörung in ausgewählten Texten von Brian Friel, Roger Manderscheid, Heinrich Böll, Samuel Beckett, Tom Stoppard, Georges Perec und W.G. SebaldLippert, Sarah Doctoral thesis (2010)Detailed reference viewed: 95 (5 UL) Condition assessment of concrete structures and bridges using vibration monitoring in comparison to changes in their static propertiesBungard, Volker Doctoral thesis (2010)The thesis deals with the non-destructive condition assessment of civil engineering structures made of reinforced and prestressed concrete as well as bridges and concentrates on a comparison of static and ... [more ▼]The thesis deals with the non-destructive condition assessment of civil engineering structures made of reinforced and prestressed concrete as well as bridges and concentrates on a comparison of static and dynamic investigation methods. The main questions discuss the sensitivity of changes in static as well as in dynamic properties during the mechanical lifetime of those types of structures under laboratory conditions, the sensitivity of these changes when testing in-situ and the dimension of undesired environmental influences on the dynamic properties. Therefore, a gradually loaded laboratory reinforced concrete beam (cp. chapter 7) and a reinforced as well as a prestressed concrete slab (cp. chapter 8) are investigated for changes in their static and dynamic parameters until reaching their ultimate loads. Furthermore, a successively damaged and stepwise loaded laboratory reinforced concrete slab and a prestressed concrete slab (cp. also chapter 8) are under investigation and also compared in changes in their static as well as in dynamic properties during their lifetimes. By means of static and dynamic tests on a successively damaged and stepwise loaded prestressed concrete bridge (cp. chapter 9) it was possible to investigate the amount of changes in static and dynamic properties for a real in-situ object. A long-term measurement of a composite bridge (cp. chapter 10) demonstrates the environmental influences on the static and dynamic properties of a system which have to be considered when conducting comparative non-destructive condition assessment techniques on real objects. All tests are calculated respectively simulated by the method of the integration of stress (cp. chapter 6) or the finite element method by using the softwares ANSYS and SOFISTIK. Furthermore, measured eigenfrequencies and modeshapes are used to adapt finite element models with the aim to improve the model or to locate and quantify damaged areas. The work is a contribution to the application of non-destructive static and dynamic condition assessment methods on civil engineering structures made of concrete in the sector of civil engineering. [less ▲]Detailed reference viewed: 172 (14 UL) Conception, synthèse et évaluation biologique de dérivés coumariniques en tant qu'agents anticancéreux potentielsHemmer, Marc Doctoral thesis (2010)IK9 was recently reported to be a potent inhibitor of cancer cell invasion and angiogenesis. It markedly reduced in vitro invasion of human HT1080 fibrosarcoma cells through collagen-coated porous ... [more ▼]IK9 was recently reported to be a potent inhibitor of cancer cell invasion and angiogenesis. It markedly reduced in vitro invasion of human HT1080 fibrosarcoma cells through collagen-coated porous membranes (Boyden chamber assay) and in vivo tumour growth in athymic nude mice. It was furthermore able to decrease angiogenesis ex vivo in a rat aortic ring assay and in vivo in a choroidal neovascularisation mice model. It nevertheless presents some water solubility and stability problems, which should be taken into account for further investigations. In the first part of the project, we synthesized original IK9 derivatives, modulated at the 3- and 6-positions, by introducing functional groups able to improve water solubility and metabolic stability. Their in vitro anti-invasive potency was screened and the generated results highlighted some structure-activity relationships. A second part of the project was devoted to the elucidation of the actually unknown mechanism of action of IK9. Anti-invasive or anti-proliferative effects against endothelial cells, main actors of the angiogenic process, were not emphasised. We showed that IK9 acts likely not as an inhibitor of receptor tyrosine kinases (EGFR, PDGFR and VEGFR). The compound generates a weak decrease of mRNA coding for MMP 2 and 9, and on the other hand a substantial diminution of MMP 2 and 9 secretions by HT1080 fibrosarcoma cells. In conclusion, the consideration of anti-invasive properties together with the worked out solubility and stability profiles highlights several series, notably 6-hydroxycoumarins, 6-hydroxymethylcoumarins and coumarin-3-sulfonamides, whose interest as potential successors to IK9 is undeniable. [less ▲]Detailed reference viewed: 81 (2 UL) Methods for Extracting Meta-Information from bibliographic databasesBiryukov, Maria Doctoral thesis (2010)Due to intensive growth of the electronically available publications, bibliographic databases have become widespread. They cover a large variety of knowledge fields and provide a fast access to the wide ... [more ▼]Due to intensive growth of the electronically available publications, bibliographic databases have become widespread. They cover a large variety of knowledge fields and provide a fast access to the wide variety of data. At the same time they contain a wealth of hidden knowledge that requires steps of extra processing in order to infer it. In this work we focus on extraction of such meta knowledge from the research bibliographic databases by looking at them from sociolinguistic, text mining and bibliometric perspectives. We choose the Digital Library and Bibliographic Database as a testbed for our experiments. In the framework of the sociolinguistic analysis we build a statistical system for the language identification of personal names. We show also that extension of a purely statistical model with the co-authors network boosts the system's performance. In the text mining scenario, we perform a number of experiments that focus on topic identification and ranking. While our topic detection approach remains generic and can be used for any kind of textual data, the topic ranking metrics are built upon the information provided by the bibliographic databases. The goal of our bibliometric study is to create a researcher's profile on DBLP and analyze some of the research communities defined by the different conferences, in terms of the publication activity, interdisciplinarity of research, collaboration trends and population stability. We also aim at exploring to what extent these aspects correlate with the conference rank. Each of the above topics constitutes a method of meta information extraction from bibliographic databases and other similarly structured data sources. [less ▲]Detailed reference viewed: 294 (100 UL) Geometry and Stochastic Calculus on Wasserstein spacesSelinger, Christian Doctoral thesis (2010)P ([0, 1])) with respect to the Skorohod topology. In the last chapter we restrict ourselves to the space of histograms on the unit interval. We calculate the Wasserstein distances numerically and obtain ... [more ▼]P ([0, 1])) with respect to the Skorohod topology. In the last chapter we restrict ourselves to the space of histograms on the unit interval. We calculate the Wasserstein distances numerically and obtain a Riemannian metric on the simplex. We investigate explosion behaviour of the respective diffusion processes in dimension 1 and 2. [less ▲]Detailed reference viewed: 138 (15 UL) Working memory in kindergarten children: Its structure and relationship to fluid intelligence and mathematical abilitiesHornung, Caroline Doctoral thesis (2010)Detailed reference viewed: 49 (5 UL) Peer interactions in the primary classroomMeyer, Anne Doctoral thesis (2010)The present research focuses on peer interactions engaged with the accomplishment of learning activities in the primary classroom. It is driven by the interest and need to understand learning and social ... [more ▼]The present research focuses on peer interactions engaged with the accomplishment of learning activities in the primary classroom. It is driven by the interest and need to understand learning and social interaction taking place in peer group-s, and how the participants orient to the sequential organization of social interaction. The research draws on audio and video data stemming from the primary classroom in Luxembourg, and aims at 1) describing and analyzing the interactional organization of learning activities, 2) describing and analyzing the resources and methods, i.e. expert-novice-practices mobilized by young learners when orienting to the accomplishment of a learning activity, and 3) describing the opportunities for participation and for learning that may take place when learners orient to the accomplishment of a learning activity in peer interaction. Peer interaction is depicted as one form of a community of practice within which learning is situated and observable as learners in and through the deployment of expert-novice-practices orient to, and adapt to micro-shifts in the participation framework when accomplishing a learning activity. Results point to the fact that not only are expert-novice-practices deployed when young learners work in interaction, but these practices are also found to be inextricably linked to the constitution of expert-novice identities - this again has implications for how the learners orient to the accomplishment of a learning activity. [less ▲]Detailed reference viewed: 92 (1 UL) Identité sociale d'étudiant, employabilité et décrochage universitaire de jeunes belges, français, luxembourgeois et roumains, à l'heure de BologneAmara, Marie-Emmanuelle Doctoral thesis (2010)Detailed reference viewed: 36 (2 UL) Local Languaging: Literacy Products and Practices in Gambian SocietyJuffermans, Kasper Doctoral thesis (2010)Detailed reference viewed: 153 (1 UL) Toward an Integral Pluralism in Sociocultural Research-Theme analysis of research biographies and integrative frameworksMolz, Markus Doctoral thesis (2010)Detailed reference viewed: 68 (1 UL) Pain modulation induced by Heterotopic Noxious Counter-Stimulation (HNCS) : psychophysiological assessment of adequate stimulation paradigms and sex-related effectsStreff, Anouk Doctoral thesis (2010)This work comprises three studies whose main concern was to find a valid tonic pain model able to trigger a genuine diffuse noxious pain inhibition. All studies were performed in healthy, drug-free ... [more ▼]This work comprises three studies whose main concern was to find a valid tonic pain model able to trigger a genuine diffuse noxious pain inhibition. All studies were performed in healthy, drug-free volunteers and whereas the first two are validation studies, the third is an application study of the previous two. The aim of the first study was to characterize the cold pressor (CPT) and hot water immersion test (HIT) from a physiological and a psychophysical point of view. A second issue was to clarify the origin of potential autonomic responses during both tests; are they related to baroreflex activity or rather a consequence of the pain experience per se? The study was performed in 30 volunteers aged 19-57 (median 24) years, and consisted of a single session including one CPT (4 ± 0.2°C) and one HIT (47 ± 0.5°C) with a cut-off-point of 5 minutes. Participants were randomly assigned to sequence order (the sequence of both trials was alternated) and groups were paralleled with respect to gender. Cardiovascular, respiratory and electrodermal activities as well as subjective pain intensity were continuously monitored. Pain detection and tolerance thresholds as well as pain unpleasantness and nervous tension were assessed additionally. Both tests were found to be comparable with respect to intensity of subjective pain and time course, but a significantly higher blood pressure increase during CPT could be observed, compared to the HIT. In conclusion, the HIT appears to be less confounded with baroreflex activity and hence seems to be a more adequate tonic pain model. The second study tested the internal validity of inter-digital web pinching (IWP) with regard to its potential as DNIC-trigger. 24 gender-matched participants, aged 21-54 (median 25) years, volunteered for the controlled study. The protocol included the assessment of thermal and mechanical perceptual wind-up (WU) before and after a HIT (47.5 °C) or an IWP (15 N) of 2 minutes duration each. WU pain was induced by 10 repetitive (1 Hz) contact heat (max. 49°C; 5 5 mm thermode) or 10 ballistic impact stimuli (0.5 g at 9m/s) on the phalanges of the non-dominant hand. Cardiovascular and corrugator muscle activity as well as pain experience were permanently monitored. Both heterotopic noxious counter-stimulation (HNCS) types produced a similar pain experience, but a more pronounced cardiovascular activity was observed for the HIT. Painful water immersion is though accompanied by a stronger baroreceptor activity. WU pain was significantly reduced for both pain modalities, although the inhibition was somewhat stronger for the HIT than the IWP. The IWP, being practically uncontaminated by baroreflex sensitivity (BRS), proved its validity as DNIC-trigger. The third study investigated temporal characteristics of electrically elicited pain and nocifensive RIII-reflex activity in a gender-balanced sample of 28 volunteers aged 21-38 (median 27) years, using IWP as HNCS, a tonic pain model previously validated to be BRS-unrelated. Sex-related differences in the post HNCS time courses of pain perception were identified with women demonstrating a more rapid return to baseline compared to men. Interestingly, an opposite pattern was observed regarding nociceptive reflex activity with a steeper return rate of electromyographic responses in males, whereas those of women remained attenuated over the entire observation period. These findings may reflect a stronger defensive response to pain in women. [less ▲]Detailed reference viewed: 122 (5 UL) State Aid, Subsidy and Tax Incentives under EU and WTO LawMicheau, Claire Doctoral thesis (2010)Detailed reference viewed: 163 (10 UL) Robust Dominating Set based Virtual Backbones for Wireless Ad hoc NetworksSchleich, Julien Doctoral thesis (2010)Ad hoc networks are infrastructure-less spontaneous networks generally composed of wireless and mobile devices. From a practical point of view, ad hoc technologies offer solutions when infrastructure ... [more ▼]Ad hoc networks are infrastructure-less spontaneous networks generally composed of wireless and mobile devices. From a practical point of view, ad hoc technologies offer solutions when infrastructure-based network are too costly, damaged or not suitable. Despite a wide panel of scenarios and the huge number of ad hoc capable devices currently in use, this technology is not widely used because of technical considerations mainly related to the lack of a global coordinator. In this thesis, we propose two different approaches to create virtual backbones in order to organize ad hoc networks. In a first time, we propose a centralized algorithm based on DC programming and DCA to solve the Min m-Vertex Dominating Set Problem and in a second part, we develop distributed and asynchronous algorithms, relying on 2-hop knowledge only, to build k-Vertex Connected m-Vertex Dominating Set-based Virtual Backbones. A global overview of the domain is provided through an extensive state-of-the-art and a hierarchical classification. The efficiency of both approaches is demonstrated with a wide panels of simulations, from randomly generated graphs to more realistic scenarios. [less ▲]Detailed reference viewed: 79 (3 UL) Signaling legitimacy for small and medium-size enterprises in transition environments - The case of the Bulgarian IT sectorIvanova, Olga Doctoral thesis (2010)The process of institutional transition from one coordination mechanism to another one is an important period in the evolution of any society. Transitions are associated with fundamental political, legal ... [more ▼]The process of institutional transition from one coordination mechanism to another one is an important period in the evolution of any society. Transitions are associated with fundamental political, legal, economic and social changes (Danis et al. 2010) affecting all aspects of life (Peng 2003). The transition from planned to open-market economy that has taken place in Central and Eastern Europe (CEE), East Asia, and the newly independent states of the former Soviet Union represents an institutional transition. An environment that goes through transition is characterized by high level of vulnerability and uncertainty which impacts all actors evolving in it, including the organizations (Peng 2003). The dynamic relationship environment-organization is reflected in the concept of legitimacy. Legitimacy is a pertinent concept to study the transition stage since it exists on the borderline between the organization and its environment. In transition environments, the processes of deinstitutionalization of the old structures and the reinstitutionalization of the new ones coexist. This leads to a lack of institutional framework to guide behavior of actors or a situation called institutional vacuum. Since institutions regulate economic exchanges (North 1990), the lack of them leads to elevated costs for all actors due to the proliferation of opportunistic behavior (Meyer 2001). In such environments, demonstrating legitimacy becomes crucial for the survival of structures and actors. Legitimation is sought by new elites (Raychev and Stoichev 2008), the government (Peng 2000a), the new laws, decrees and regulations (Stark 1992), and the private organizations (Peng 2000a). The success of the transition directly depends on the strategies of organizations evolving in such environments (Peng 2000). Small and medium-size enterprises (SMEs) play an important role as catalysts of the process of change (McIntyre 2003: 1) since they are expected to spur economic growth and employment (Peng 2000a), and maintain social peace (McIntyre 2003: 1). Despite their central role in transition environments, little is known about the challenges SMEs face and the actions that can be undertaken in order to overcome them (Danis, Chaburu and Lyles 2010). One of the main challenges of SMEs in transition environments is to demonstrate that they are legitimate players implying that they comply with the expectations of relevant stakeholders’ groups. The main objective of this study is to shed some light on how SMEs in transition environments gain organizational legitimacy necessary for obtaining stakeholders’ support. The interest of the study lies in the fact that if organizational legitimacy is problematic for all organizations due to changing norms, beliefs, and stakeholders’ expectations over time (Ashforth and Gibbs 1990), it is even more problematic for small organizations in transition environments since the norms, beliefs and expectations are not clearly defined. In order to address the legitimacy needs of small organizations in transition environments, I propose a signaling theory of legitimacy, which postulates that the legitimacy-claiming entities can rely on valid signals in order to demonstrate (communicate) their adherence to the requirements of the evaluating audiences. In general, the signaling theory of legitimacy should hold for any organization facing a liability - the discount the evaluating audiences place on it in comparison to its potential competitors. Organizations in transition environments face liability of origin (Bartlett and Ghoshal 2000) – a discount that the evaluating audiences (both domestic and foreign) may place on them based on their context of origin. For small organizations , the challenges resulting from liability of origin are even bigger because of their size, they are more prone to import instability from the environment. The higher level of vulnerability of small firms encourages them to engage in opportunistic behavior. Hence, demonstrating their legitimacy is a key issue for SMEs operating in transition environments. Organizational legitimacy becomes especially important when organizations engage in long-term arrangements since this requires an assessment of the organization not only in terms of its products/services but also in terms of its ongoing access to resources and capabilities as well as its reliability as a partner. In order to address the legitimacy needs of small firms evolving in transition environments and trying to obtain long-term partnerships, a new legitimacy typology is proposed. It is comprised of two types – functional and relational legitimacy. Functional legitimacy represents the adherence to the evaluating audiences’ requirements regarding relevant resources and capabilities. Relational legitimacy is the conformity with the evaluating audiences’ expectations regarding the reliability of an organization as a partner. Hence, this study addresses two research questions: 1. What are the dimensions (and valid signals) of functional and relational legitimacy (for small organizations in transition environment)? 2. Does using signals of specific types of legitimacy (depending on the liability faced) enhance organizational legitimacy? This doctoral research examines the legitimacy challenges of SMEs in transition environments trying to obtain long-term arrangements. In the first part of the study, the two types of legitimacy - functional and relational legitimacy - are constructed. Similar to organizational legitimacy (Deephouse and Carter 2005), functional and relational legitimacy are also multidimensional constructs comprised of different facets. In the second part, I examine whether the signals of functional and relational legitimacy help SMEs in transition environment gain organizational legitimacy. The research model is tested on data collected from the information technology (IT) sector in Bulgaria. Based on the data analysis and results, this research has several theoretical and methodological contributions. The results also have practical implications for the managers of small organizations in transition environments as well as the public policy agents. The theoretical contributions are associated mainly with the signaling theory of legitimacy. It looks at how organizations can overcome certain liabilities by communicating their adherence to the expectations of relevant stakeholders’ groups. Organizations can demonstrate their conformity to the evaluating audiences’ requirements by using valid signals – organizational characteristics that can be observed, are costly to imitate and are based on shared meaning between the sending and the receiving party. In addition, the study contributes to the literature on transition environments by looking at the particular case of SMEs and their attempt to demonstrate that they are legitimate players when trying to engage in long-term arrangements. The methodological contribution lies in the way the two types of legitimacy (functional and relational) are measured via formative measurement constructs (Diamantopoulos and Winklhofer 2001; Jarvis et al. 2003) under the partial least squares (PLS) technique. Formative constructs are associated with causality that goes from the manifest (directly observable) variable to the latent construct or in other words, the manifest variables cause/build the latent construct (Diamantopoulos 1999). This made possible to match the legitimacy claims of organizations from once side based on the functional and relational signals and the legitimacy granted by relevant stakeholders’ groups, on the other side. In addition, the research contributes to the growing number of studies in strategic management that use PLS as a structural equation modeling technique (Birkinshaw et al. 1995; Cool et al. 1989; Fornell et al. 1990; Johansson and Yip 1994; Tsang 2002). The practical implications of this research shed some light on which signals (organizational characteristics) are important for managers of small organizations in transition environments. Signals are costly and since all organizations (and especially small firms) have limited resources, managers have to know which signals to invest in. It is important to note that many managers disregard the relational aspect of their legitimacy claims which (based on the results of the study) are more important in the communication process between the legitimacy-claiming and legitimacy-granting entities. Overall, this study represents a fertile area for future research. Researchers can test the signaling theory of legitimacy in other contexts – i.e., other transition environments (Eastern Europe vs. China), as well as compare the signals used by organizations in transition environments and developed economies. Researchers can also test the signaling theory of legitimacy on organizations facing different liabilities (i.e. liability of market newness) and try to extend the existing legitimacy typologies. In addition, future studies can focus on issues of meaning construction (based on signals) in the communication process between organizations. [less ▲]Detailed reference viewed: 113 (3 UL) Une étude intégrative de la légitimité comme fondement des choix stratégiques des firmes face aux pressions institutionnelles et concurrentielles: Application au secteur viti-vinicole francais entre 1996 et 2007Castellano, Sylvaine Doctoral thesis (2010)Detailed reference viewed: 117 (0 UL) Die nationalsozialistische Kunst- und Kulturpolitik im Grossherzogtum Luxembourg 1934-1944Lorent, Catherine Doctoral thesis (2010)This study is about the art and history in Luxembourg from 1934-1944. This decade where Luxembourg was occupied by Nazi Germany from 1940 to 1944, has not yet been represented focusing on the visuals arts ... [more ▼]This study is about the art and history in Luxembourg from 1934-1944. This decade where Luxembourg was occupied by Nazi Germany from 1940 to 1944, has not yet been represented focusing on the visuals arts facing the national socialist oppressions and propaganda due to the tabooization of these years. After an incipient view about the development of the arts in Luxembourg during the 1930’s, the influence of the german propaganda through the Gesellschaft für Deutsche Literatur und Kunst and about the reception of the Nazi art politics in the Luxembourgish press, the national-socilalist politics of art culture and the effects on the Luxembourgish art scene are presented. during the occupation by the Hitler State. The aim is to gain a particular view about the germanisation of Luxembourgish art, artists and cultural institutions while Luxembourg had become a part of Gau Moselland. The themes pictured by the artists are analyzed in a way to show the propagandistic value of the caracteristics of a « regional » art for national-socialist art politics. Two Major questions are examined : How the artists dealed with the political and social upheavals in their country and : Were collaboration or resistance the only options to face the cultural oppressions of the Nazis ? [less ▲]Detailed reference viewed: 177 (8 UL) Die Personennamen der Stadt Luxembourg von 1388 bis 1500. Namenbuch und namenkundliche Analyse auf Basis der Rechnungsbücher der Stadt LuxemburgGniffke, Andreas Doctoral thesis (2010)Detailed reference viewed: 112 (21 UL) Personality and cognition: psychological rigidity and inhibition of dominant response tendenciesSteinmetz, Jean-Paul Doctoral thesis (2010)Detailed reference viewed: 74 (4 UL) Carbon Lock-in in der Automobilindustrie?Maier, Urs Doctoral thesis (2010)Detailed reference viewed: 52 (7 UL) Competition between Interfacial interactions and chemically-induced network formation in silicone rubber nanocompositesZielinski, Bartosz Doctoral thesis (2010)Detailed reference viewed: 45 (1 UL) Efficient Data Dissemination Techniques For Multi-Hop Wireless Networks Applied to Vehicular CommunicationsFrank, Raphaël Doctoral thesis (2010)Multi-Hop Wireless Networks (MHWN) are composed of devices called nodes, which communicate in an ad hoc fashion. Such networks allow the relaying of transmissions over multiple wireless hops to provide an ... [more ▼]Multi-Hop Wireless Networks (MHWN) are composed of devices called nodes, which communicate in an ad hoc fashion. Such networks allow the relaying of transmissions over multiple wireless hops to provide an extended service area. There are two main classes of MHWN. The first includes all networks that have a static network topology, e.g. Wireless Mesh Networks and Wireless Sensor Networks. The second specifies networks with a dynamic or mobile topology, e.g. Vehicular Networks. For both types, collaborative applications are of great importance. In such a scenario, information needs to be made available to multiple, or sometimes all nodes in the network. The trivial method, pure network flooding, is to retransmit the information at every hop exactly once. In previous studies it has been shown that such an approach considerably lowers the overall performance of the network by saturating the shared communication channel. In this thesis, we present two different approaches that perform efficient data dissemination among collaborative nodes in MHWNs. The primarily objective is to reduce the number of redundant retransmissions by selecting only a subset of nodes to be responsible for relaying the information without compromising global delivery. We propose one approach for each of the two classes using different methodologies. For static network topologies, we present a novel heuristic based on the Minimum Connected Dominating Set problem. This approach allows the election of a near-optimal set of relays that are able to reach every other node in the network, thus minimizing the number of retransmissions. We theoretically and experimentally validate our approach and compare it to other state-of-the-art dissemination techniques. For dynamic network topologies, we focus primarily on Vehicular Networks. We present a new routing protocol that makes use of an efficient dissemination technique to find robust communication paths between two vehicles. Strategic vehicles are elected as relays based on their position and on information about the local neighborhood. The protocol is evaluated using a novel simulation framework that takes into account specific characteristics of vehicular networks in urban environments, e.g. mobility of the vehicles and signal propagation. The performance evaluation shows that our protocol introduces only a low control overhead and provides robust communication paths that achieve high delivery ratios. [less ▲]Detailed reference viewed: 83 (16 UL) Analysis and modelling of the noise generation during vibratory pile driving and determination of the optimization potentialHanus, Vincent Doctoral thesis (2010)Impact driving, pressing and vibrodriving are the three main methods to drive sheet piles. The sound level generated during vibrodriving varies almost between the very high level of an impact driving and ... [more ▼]Impact driving, pressing and vibrodriving are the three main methods to drive sheet piles. The sound level generated during vibrodriving varies almost between the very high level of an impact driving and the lowest sound level of a pressing. In the first part of this doctoral thesis, sound measurements feasibility is thoroughly studied. Particular attention is paid to the measurement conditions on construction sites and to the measurement methods (sound power level, beamforming and thermography). These methods are outlined and the provided results are compared. In addition, the different causes of noise are analysed and the influence of various parameters is quantified. In the second part, the acceleration measurements of the full-scale experiments are used to calibrate a Finite Element model. A parametric study analyses how the most important mechanical parameters influence the noise level. This research has shown that a decrease of the noise generation on construction sites can be obtained by two ways: by recommendations for installation of sheet piles at the construction site, and by requirement of constructive measures that significantly reduce the noise level. [less ▲]Detailed reference viewed: 102 (11 UL) Understanding and leveraging the social web for information retrievalNoll, Michael Doctoral thesis (2010)Detailed reference viewed: 40 (1 UL) Tree-Based computation in probalistic modelsIgnac, Tomasz Doctoral thesis (2010)Detailed reference viewed: 48 (3 UL) Janus kinases as targets for small molecule inhibitorsKaczor, Jakub Doctoral thesis (2010)Many cytokines transduce signals by employing receptor/Janus kinase (Jak) complexes that, once activated, promote phosphorylation of several signaling proteins such as STAT transcription factors. The Jak ... [more ▼]Many cytokines transduce signals by employing receptor/Janus kinase (Jak) complexes that, once activated, promote phosphorylation of several signaling proteins such as STAT transcription factors. The Jak/STAT pathway is normally tightly modulated by regulatory mechanisms preventing its over-activation. However, a number of genetic alterations in Jak kinase genes have been found in myeloproliferative neoplasms and leukemia that render the Jaks hyperactive and cytokine-independent. In the present thesis pharmacologic and genetic approaches were applied to study aspects of both the cytokine-dependent and -independent activation of the Jak/STAT pathway. We applied a chemical genetics approach to Janus kinases and generate analogue-sensitive Jak1 and Jak2 mutants. With these tools we could for the first time specifically inhibit either Jak1 or Jak2 and investigate their relative contributions in IFN signaling. Single inhibition of either Jak by an inhibitor analogue showed differential effects on IFN-mediated STAT1 phosphorylation, Jak2 inhibition having a stronger suppressive effect. Furthermore, we identified STAT1 and IRF1 as genes, whose increased expression upon IFN stimulation strongly depends on active Jak2 but not on Jak1. Most of the IFN-regulated genes, however, depend on both Jak1 and Jak2 activity. Exploiting this quick and reversible pharmacological inhibition of analogue-sensitive kinases we address the temporal requirement of Jak activity and the importance of different phases of the IFN response. Moreover, we further characterized constitutively active Jak2 mutants and show that SOCS proteins seem to be directly involved in their proteasome-mediated degradation. There is an increasing interest in developing small molecule inhibitors targeting Jaks and Jak mutants. We show that Erlotinib, an inhibitor targeting EGFR which is already used in the clinic to treat lung and pancreatic cancer, can have a beneficial additional effect if combined with a Jak-specific inhibitor on cell growth suppression and apoptosis of Jak2-V617F- or Jak3-A572V-positive leukemic cells. Erlotinib, in contrast to Jak inhibitors targeting Jaks directly affects the eIF2/ATF4 pathway in leukemic cells. This is of general interest since Erlotinib treatment in conjunction with other kinase inhibitors could be an interesting approach also in other kinase-dependant leukemias (e.g. BCR-ABL-positive CML). [less ▲]Detailed reference viewed: 114 (5 UL) Essays in international financeVermeulen, Robert John Gerard Doctoral thesis (2010)Detailed reference viewed: 67 (2 UL) Regulation of the neutrophil NADPH oxidase NOX2 by the Ca2+ -binding proteins S100A8 and S100A9 in neutrophil-like HL-60 cellsSchenten, Véronique Doctoral thesis (2010)Detailed reference viewed: 77 (8 UL) Optimal observers and optimal control: improving car efficiency with kalman and pontryaginSebesta, Kenneth Doctoral thesis (2010)Detailed reference viewed: 29 (4 UL) Compatibilités et incompatibilités liants cimentaires / superplastifiantsNicolas, Edwige Doctoral thesis (2010)Currently required concrete strength imposes a lower water/cement ratio and use of superplasticizer to make easier the fresh material implementation. Polycarboxylate type products are very effective in ... [more ▼]Currently required concrete strength imposes a lower water/cement ratio and use of superplasticizer to make easier the fresh material implementation. Polycarboxylate type products are very effective in the short term but can lead to a fast loss of workability in case of binder/superplasticizer incompatibility. The object of this work is the identification of cementitous phases involved in these rheological variations. Initially, flow of various superplasticized pastes is evaluated by a rheometer fitted with a ball measuring system. Compatible combinations flow like a Bingham’s fluid. An incompatibility results in an increase of yield stress and plastic viscosity or rheological properties evolution into Herschel-Bulkley’s fluid. Then, cement/superplasticizer combinations are characterized by rheological tests. Stiffening assessment of pastes and chemical characterisation of hydrated cements show that consistency is associated with amount and microstructure of formed ettringite. These parameters depend on initially present aluminate phase and calcium sulphates. Finally, study of synthetic cementitous systems states that calcium sulphates solubility, in presence of superplasticizer, is increased probably because Ca2+ ions complexation by polycarboxylates. As for the orthorhombic variety of aluminate phase, more reactive than cubic variety, it leads to a large amount of needle-shaped ettringite. [less ▲]Detailed reference viewed: 102 (4 UL) L'investisseur face aux réseaux de distribution d' OPCVMBorissova, Miroslava Andonova Doctoral thesis (2010)Detailed reference viewed: 67 (4 UL) Fremde Nähe. Judische Identität, literarische Zeugenschaft und die Dichtung Paul CelansBeljan, Daniela Doctoral thesis (2010)Detailed reference viewed: 35 (1 UL) Rosa Zeiten? Eine diskursanalytische Untersuchung zur Homosexualität in der BRD unter besonderer Berücksichtigung der 1970er und 1980er JahreBeljan, Magdalena Doctoral thesis (2010)Detailed reference viewed: 94 (1 UL) Idées, réseaux et politiques européennes dans la résistance et en exil (1940-1945) en Belgique, au Luxembourg et aux Pays-BasGrosbois, Thierry Christian Michel Doctoral thesis (2010)Detailed reference viewed: 49 (12 UL) New approaches to the cryptanalysis of symmetric primitivesKhovratovich, Dmitry Doctoral thesis (2010)Detailed reference viewed: 82 (5 UL) Zivilcourage in der Schule- Konzeption und Evaluation eines Zivilcourage-Trainings zur Prävention aggressiven Verhaltens unter SchülernPfetsch, Jan Doctoral thesis (2010)Detailed reference viewed: 181 (12 UL) Mechanische und thermische Untersuchungen zur Entwicklung eines Wärmedämmsteines aus LeichtbetonLeufgens, Nadine Doctoral thesis (2010)The current discussion about the necessity of sustainable reduction of primary energy for heating of housing structures and of CO2 – emissions led the University of Luxembourg to issue a project to ... [more ▼]The current discussion about the necessity of sustainable reduction of primary energy for heating of housing structures and of CO2 – emissions led the University of Luxembourg to issue a project to develop hybrid light-weight concrete blocks with high heat-insulating properties. Therefore, the demand for wall constructions limiting the heat flow through the outer wall was steadily growing. Because of the progressing standard of national and European Energy Saving Regulations for housing structures and office buildings in the past years, most of the producers of bricks and concrete masonry blocks were forced to develop new, innovative wall materials and constructions. For assessing the real actual state of the art of masonry blocks, 15 different bricks and blocks were taken from European free market as samples. It was shown, that especially for highly-heat insulating masonry lightweight concrete blocks (e.g. Vbl SW 2) with dry densities below 800 kg/m3 an optimization potential still exists. A relevant aspect for a critical estimation of a wall construction is the knowledge of mechanical and thermal lightweight aggregate concrete (LAC) parameters. The present work describes investigations for determining design limit values of the thermal and mechanical properties of LAC. Based on this, a mathematical approach to describe the strength, the thermal conductivity and for e.g. the stress-strain-relationship linked to the dry density in a range between 500 and 2000 kg/m3 was derived. For studying the material behavior of LAC, specimens were produced in laboratory tests as well as in the production line by fabricating solid lightweight concrete blocks without inner air holes. Due to the unsatisfying results of the market study, further investigations had to be done to determine the influence of size and slenderness effects on the strength of solid specimen and masonry blocks with inner air holes made of LAC. Additionally, combined influencing factors were studied on block sections cut out of hollow and solid masonry blocks. In the following, the experimental results were verified by simulations with the Finite-Element-Method using the commercial software ANSYS© for modeling different LAC-specimen geometries and the influence of the kind of load applications by a contact zone between steel plates and specimen. Subsequently, the results of these investigations and the achieved knowledge of the influencing factors on the load carrying capacity of the block structures lead to an analytical model approach for design purpose of masonry blocks based on the elasticity theory. This model allows quantitative predictions of the load bearing strength of hollow and solid masonry blocks with inner air holes arranged in a grid system. The analytical model is verified by comparison of experimental results of different block geometries. Finally, the knowledge of the load carrying behavior of different LAC specimen geometries achieved by various experimental and numerical results contribute to the construction of new prototypes of heat insulating masonry blocks made of LAC. Based on the results of the market study and numerical parameter studies, it is revealed that it is suggestive to separate the load bearing from the thermal function of the block by developing 3-layered Sandwich and composite blocks made of an insulating and load bearing part. [less ▲]Detailed reference viewed: 71 (4 UL) Hydrological effects on gravity at the station of Walferdange, LuxembourgLampitelli, Carmine Doctoral thesis (2010)In this study, we look at the physical relationship between water storage variations driven by local precipitation events and local gravity changes at Walferdange, in the Grand Duchy of Luxembourg. A ... [more ▼]In this study, we look at the physical relationship between water storage variations driven by local precipitation events and local gravity changes at Walferdange, in the Grand Duchy of Luxembourg. A synthesis of the different approaches that can be found in recent literature is proposed. Then, a new and simple scheme is provided to remove the effects of precipitation events in the gravity observations, For the gravity observations, we use the data collected by the superconducting gravimeter CT040 (SG) located in the Walferdange Underground Laboratory for Geodynamics (WULG), which provides high resolution relative gravity measurements from December 2003. In addition, a statistical analysis is presented to determine the correlation between the gravity signal variations registered by the SG and the water level of the nearby flowing Alzette River. The idea is that the gravity variation due to the precipitation should appear before the change in river level. Contrarily to the simple precipitation data, the gravity observation should also contain information on the degree of soil saturation, which depends on processes having a seasonal variability, as evapotranspiration, and on hydrogeological parameters like hydraulic conductivity. Understanding the relationship and temporal dependence between the observed precipitation and the gravity changes might improve the capacity to predict extreme events like flooding. [less ▲]Detailed reference viewed: 139 (11 UL) Le transfert des sûretésWestendorf, Hannes Doctoral thesis (2010)Detailed reference viewed: 106 (1 UL) Law-aware access control for international financial environmentsStieghahn, Michael Doctoral thesis (2010)Detailed reference viewed: 88 (1 UL) Sustainability of biomass resources for the use in decentralized biomass energy systemsKonig, Stefan Doctoral thesis (2010)Detailed reference viewed: 37 (2 UL) Hedge funds and higher-order comoment equity risk premiumsLambert, Marie Michele Annie G. Doctoral thesis (2010)Detailed reference viewed: 49 (0 UL) Adaptive high-gain extended kalman filter and applicationsBoizot, Nicolas Doctoral thesis (2010)The work concerns the observability problem” --- the reconstruction of a dynamic process's full state from a partially measured state--- for nonlinear dynamic systems. The Extended Kalman Filter (EKF ... [more ▼]The work concerns the observability problem” --- the reconstruction of a dynamic process's full state from a partially measured state--- for nonlinear dynamic systems. The Extended Kalman Filter (EKF) is a widely-used observer for such nonlinear systems. However it suffers from a lack of theoretical justifications and displays poor performance when the estimated state is far from the real state, e.g. due to large perturbations, a poor initial state estimate, etc… We propose a solution to these problems, the Adaptive High-Gain (EKF). Observability theory reveals the existence of special representations characterizing nonlinear systems having the observability property. Such representations are called observability normal forms. A EKF variant based on the usage of a single scalar parameter, combined with an observability normal form, leads to an observer, the High-Gain EKF, with improved performance when the estimated state is far from the actual state. Its convergence for any initial estimated state is proven. Unfortunately, and contrary to the EKF, this latter observer is very sensitive to measurement noise. Our observer combines the behaviors of the EKF and of the high-gain EKF. Our aim is to take advantage of both efficiency with respect to noise smoothing and reactivity to large estimation errors. In order to achieve this, the parameter that is the heart of the high-gain technique is made adaptive. \textit{Voila}, the Adaptive High-Gain EKF. A measure of the quality of the estimation is needed in order to drive the adaptation. We propose such an index and prove the relevance of its usage. We provide a proof of convergence for the resulting observer, and the final algorithm is demonstrated via both simulations and a real-time implementation. Finally, extensions to multiple output and to continuous-discrete systems are given. [less ▲]Detailed reference viewed: 108 (9 UL) Tolérance aux fautes et reconfiguration dynamique pour les applications distribuées à grande échelleBesseron, Xavier Doctoral thesis (2010)This work deals with high performance computing on large scale platforms like computing grids. Computing grids are characterized by (1) frequent changes in execution context and, especially, by (2) a high ... [more ▼]This work deals with high performance computing on large scale platforms like computing grids. Computing grids are characterized by (1) frequent changes in execution context and, especially, by (2) a high failure probability caused by the large number of components. Running an application efficiently in such an environment requires to consider these parameters. Our research work is based on the abstract representation of the application as a data flow graph from the parallel and distributed programming model Athapascan/Kaapi. This abstract representation is used to provide solutions for (1) dynamic reconfiguration and (2) fault tolerance issues. - First, we propose a dynamic reconfiguration mechanism that manages, transparently for the reconfiguration programmer, concurrent operations on the application state and mutual consistency of states for distributed reconfiguration. - Secondly, we present an original fault tolerance protocol that allows partial rollback of the application in case of failure. For this purpose, the set of strictly required computation tasks to recover is computed. These contributions are evaluated through the Kaapi and X-Kaapi software on the Grid'5000 computing platform. [less ▲]Detailed reference viewed: 18 (3 UL) PRISMA: A Software Product Line-oriented Process for the Requirements Engineering of Flexible Transaction ModelsGallina, Barbara Doctoral thesis (2010)Engineering the requirements of the right transaction model (right with respect to the business goals of the application to be supported) is a hard task since it involves the critical choice of the right ... [more ▼]Engineering the requirements of the right transaction model (right with respect to the business goals of the application to be supported) is a hard task since it involves the critical choice of the right degree of ACIDity, that is the right selection of requirements in terms of Atomicity, Consistency, Isolation and Durability, which altogether are fundamental to ensure dependability and, more specifically, reliability. Up to now, this task is definitively not supported by a process. This thesis provides a novel process, called PRISMA. PRISMA is a Process for Requirements Identification, Specification and Machine-supported Analysis that targets transaction models. PRISMA is helpful as a prism in the identification of fundamental and constituting properties of transaction models to achieve, as a result of the PRISMA process, a correct and valid requirements specification. The main idea behind PRISMA is that transaction models may be considered as a product line and that variabilities and commonalities may be identified to distinguish similarities and differences among "products". Specifically, PRISMA is conceived for engineering the specification of a transaction model by placing the effort in revealing its Atomicity, Consistency, Isolation and Durability requirements, which represent the variabilities of the product line. PRISMA contributes on one hand in increasing quality, in particular dependability, and on the other hand in reducing time to market and cost by intensifying reusability. [less ▲]Detailed reference viewed: 116 (2 UL) Reliable information acquisition in the presence of malicious sourcesStaab, Eugen Valentin Doctoral thesis (2010)In distributed systems in which autonomous entities exchange information with each other, these entities have the freedom to provide incorrect information. This becomes especially relevant in scenarios ... [more ▼]In distributed systems in which autonomous entities exchange information with each other, these entities have the freedom to provide incorrect information. This becomes especially relevant in scenarios where entities have incentives to do so, e.g., in peer-to-peer networks or volunteer computing systems. Cryptographic mechanisms can help to ensure data integrity and authenticity. However, while these mechanisms achieve a reliable transmission of information, they do not prevent the creation of incorrect information in the first place. Therefore, additional mechanisms are necessary to enable an entity to assess the correctness of acquired information. In specific applications, the correctness of acquired information can be verified, or be assessed by means of plausibility checks. This is not possible in general, though. Often the explicit verification of information is infeasible, for instance due to high costs. In this thesis, we investigate different generic approaches to ensure the correctness of information without explicitly verifying it. More precisely, we propose three mechanisms, each of which is suitable for certain scenarios and tasks: a spot-checking mechanism that uses known facts to ensure the correctness of acquired information; an evidence-based trust model that learns – based on past experience – to exclusively select trustworthy sources; and a collusion detection algorithm that addresses the main threat to mechanisms that ensure the correctness of information by means of redundancy. The proposed mechanisms are validated, theoretically and/or experimentally, against plausible attack strategies of malicious sources. We show that our mechanisms are able to deal with different kinds of attack strategies, and that our trust model and the collusion detection algorithm successfully identify malicious sources. [less ▲]Detailed reference viewed: 115 (2 UL) Contribution à l'étude de la notion de crime organisé en Europe: L'exemple de la France et de la GrèceRodopoulos, Ioannis Doctoral thesis (2010)The presented study examines the juridical, socio-political and epistemological implications, caused by the insertion of the concept of organised crime into the European penal legislations, precisely the ... [more ▼]The presented study examines the juridical, socio-political and epistemological implications, caused by the insertion of the concept of organised crime into the European penal legislations, precisely the French and Greek ones. Firstly, the study concerns the process by which the preexistent legal notions concerning criminal participation and group-based offenses have gradually been replaced by an allegedly univocal notion of organised crime, as well as the consequences of this substitution for the concerned juridical systems. This study of the “sein” of contemporary policy towards organised crime, invites us to think also about its “sollen”. The serious legal-dogmatic problems and the semantic entropy inherent to the concept, combined with the justified worries about the politico-philosophical orientations of contemporary criminal policy systems, lead us to rethink not only the utility of the juridicisation of a concept which is ontologically inappropriate for scientific treatment, but also the latent manichean tendencies behind this process; tendencies which, much more than organised crime itself, threaten the declared values of our societies and our justice systems. [less ▲]Detailed reference viewed: 72 (7 UL) New tools for conviviality. Masks, norms, ontology, requirements and measures. Bridging the conviviality gap between policy and informaticsCaire, Patrice Doctoral thesis (2010)The notion of conviviality has an intuitive meaning for human society, which is to feel welcome in a community and at ease with its members. We believe it also has particular significance for the design ... [more ▼]The notion of conviviality has an intuitive meaning for human society, which is to feel welcome in a community and at ease with its members. We believe it also has particular significance for the design of artificial social systems. Traditionally conviviality has been shown to be useful in human interactions, thus the abundance of artificial social systems is likely to benefit from its application. In this thesis, we explore the possibility of developing the concept of conviviality in artificial social systems in depth. We provide a number of tools to help designers of artificial social systems to include conviviality at the onset of their design. First, we identify what we believe to constitute a promising field of research. Second, we abstract the notion of conviviality. Starting from the philosophical notion proposed by Illich, “individual freedom realized in personal interdependence”. Using Taylor’s intuition about a conviviality mask, we advance a formalization in terms of interdependence of agents and their goals, and the social norms that determine that interdependence. Third, we operationalize conviviality for the development of artificial social systems. We establish correspondence between software engineering and social science domains. We formalize the interdependence between members of a group with dependence networks, and use the stakeholder-agent concept to pro- vide individual agents’ points of view. Fourth, we propose a way to elicit conviviality requirements during the early phase of the development of artificial social systems, using the Tropos agent methodology. Finally, we provide a glimpse of the type of conviviality properties that can be measured in artificial social systems, and thus define the convivial quality of the system. Throughout this thesis we illustrate our arguments with two running examples, one from Second Life, the other from the city of Luxembourg. [less ▲]Detailed reference viewed: 145 (10 UL) Algorithms mapping into elliptic curves and applicationsIcart, Thomas Doctoral thesis (2010)Detailed reference viewed: 103 (7 UL) K-Anonymity in Mobile Ad-Hoc NetworksSpiewak, Dagmara Doctoral thesis (2010)Detailed reference viewed: 62 (4 UL) Analyse harmonique sur certains groupes de Lie à croissance polynomialeLahiani, Raza Doctoral thesis (2010)Detailed reference viewed: 49 (1 UL) Approaches for collaborative filtering in distributed environmentsGratz, Patrick Doctoral thesis (2010)Detailed reference viewed: 43 (3 UL) On capturing vital properties of denial of service attacks using metaheuristic approachesOstaszewski, Marek Doctoral thesis (2010)Detailed reference viewed: 88 (13 UL) Konzepte intergenerationeller Beziehungen in Gesellschaft und Familie: Konstruktvergleiche und untersuchungsmethodische ZugängeMichels, Tom Doctoral thesis (2010)Detailed reference viewed: 43 (5 UL) Topology dynamics and secure routing for predictable mobile networksFischer, Daniel Doctoral thesis (2010)Detailed reference viewed: 260 (3 UL) Social Spatial Difference Delimiting Borders in BerlinCarr, Constance Doctoral thesis (2010)Detailed reference viewed: 97 (7 UL) An analysis of productive user contributions in digital media applications for museums and cultural heritageWieneke, Lars Doctoral thesis (2010)Detailed reference viewed: 33 (3 UL) La médiation de l’archéologie à la télévision : la construction d’une relation au passé.Schall, Céline Doctoral thesis (2010)À l’heure actuelle, les occasions de « rencontrer » des hommes du passé (ou du moins leurs représentants) se multiplient : l’exposition d’archéologie ne présente plus seulement des objets, mais fait ... [more ▼]À l’heure actuelle, les occasions de « rencontrer » des hommes du passé (ou du moins leurs représentants) se multiplient : l’exposition d’archéologie ne présente plus seulement des objets, mais fait découvrir au visiteur le mode de vie des anciens habitants d’un lieu ; les reconstitutions historiques font « revivre » des hommes du passé et mettent en scène courses de chars, artisanat et autres gestes « ancestraux » devant les yeux du public ; et enfin, les guides de monuments historiques prennent les traits de personnages-types, favorisant l’immersion et l’attachement au lieu. De la même manière, les émissions de télévision sur l’archéologie semblent de plus en plus effacer le scientifique et les vestiges du dispositif ; proposant ainsi une relation plus directe au passé et à l’homme du passé (c’est le cas par exemple de docufictions comme Homo Sapiens de Jacques Malaterre). Cette recherche questionne ainsi la relation au passé, proposée par les émissions de télévision sur l’archéologie. Comment ces films peuvent-ils créer une relation à la fois scientifique et symbolique au passé et à « l’autre » ? Quels sont les effets de cette nouvelle forme de médiation qui feint de s’effacer ? À l’inverse, quels sont les effets de l’affirmation du dispositif de médiation (dans les documentaires et les reportages) ? Pour répondre à ces questions, nous avons adopté une démarche « feuilletée », en « entonnoir ». Un corpus de référence réunit d’abord toutes les émissions sur l’archéologie diffusées entre 1995 et 2008, sur la télévision hertzienne française. Son analyse statistique permet de dégager des tendances générales quant à la représentation de l’archéologie à la télévision. Ensuite, l’analyse sémiopragmatique d’un corpus test de 13 émissions sur Pompéi, mène à la constitution d’un modèle d’analyse de la médiation du passé et d’un outil permettant la systématisation du recueil de données sur un grand nombre d’émissions. Enfin, un troisième corpus de 51 émissions permet la vérification de ce modèle et aboutit à l’identification de quatre types de construction de la relation au passé. L’apport de l’étude est triple : 1) elle génère des connaissances sur l’objet de recherche lui-même, c’est-à-dire sur les représentations les plus courantes de l’archéologie à la télévision ; 2) elle propose une méthodologie et un modèle d’analyse de la médiation fondés sur des outils issus de la sémiopragmatique ; 3) enfin, d’un point de vue théorique, la recherche permet d’envisager la médiation, non comme un lien sociétal ou un « entre-deux », mais comme une stratégie de modulation de la distance, possible notamment grâce à l’intervention de « figures » de médiation. Ces figures sont des éléments référentiels qui cristallisent des représentations sociales et qui ont des rôles à jouer dans l’énonciation et la narrativité de l’émission. [less ▲]Detailed reference viewed: 33 (1 UL) Experts going transnational: education at world exhibitions during the second half of the nineteenth centuryDittrich, Klaus Doctoral thesis (2010)This thesis investigates the educational sections of the great international exhibitions of the latter half of the nineteenth century. This thesis takes into account the participation of actors from ... [more ▼]This thesis investigates the educational sections of the great international exhibitions of the latter half of the nineteenth century. This thesis takes into account the participation of actors from France, Germany, Japan and the United States. Focusing on education experts, this thesis is a contribution to a sociocultural history of an intellectual and administrative elite in an age of early globalisation. World exhibitions were one of the major media for the transnational circulation of educational knowledge. The central question is why education experts from these four countries invested so many resources in order to prepare and visit world exhibitions. Why did they go transnational? The thesis proposes two answers. Firstly, education experts used world exhibitions in order to appropriate the most advanced pedagogical models for their own institutional contexts. The concept of cultural transfers is a useful tool to analyse these appropriations. Knowledge circulation at world exhibitions made a crucial contribution to the institutionalisation of primary education and technical education. Secondly, education experts used world exhibitions to stage their own institutions on an international stage. The proud representation of the educational achievements of one’s own context was the final phase of successful cultural transfers. Educational displays became increasingly embedded in nationalist discourses. During the 1870s pedagogical know-how circulated relatively easily. Towards the turn of the century the self-representation of institutions became predominant. This original approach aims at furthering the understanding of globalisation in the nineteenth century. Still, the thesis argues that world exhibitions were in a large measure media for transnational professional discourses in many fields, including education. [less ▲]Detailed reference viewed: 330 (18 UL) Centrality in Strategic Transportation Network Design – An application to less-than-truckload networks.Paul, Anne Doctoral thesis (2010)Detailed reference viewed: 48 (4 UL) Conflicting Demands in Ethnically Diverse Societies: Ethnopolitical Contention and Identity Values in EuropeCebotari, Victor Doctoral thesis (2010)Detailed reference viewed: 30 (1 UL) Semiotik der digitalen Medienkunst: Eine funktionale KunstbetrachtungHuemer, Birgit Doctoral thesis (2010)Art-forms, which use digital technologies for production and design and which reflect these technologies critically, are becoming increasingly popular. Caused by technological development, art production ... [more ▼]Art-forms, which use digital technologies for production and design and which reflect these technologies critically, are becoming increasingly popular. Caused by technological development, art production and design has changed considerably during the last years. Nowadays digital artworks are generated multimodally and integrate the visitor and the environment as represented and interactive participants into their work. In order to explore the meaning making potential of these artworks, I develop a systemic functional framework of analysis. This framework combines a sociological and a formal approach and offers an alternative perspective to enrich our knowledge and perception when engaging with art. It enables researchers to relate art and culture with communicative events and to analyse the interaction and exchange going on between artist, artwork, visitor and environment by describing semiotic resources that are used to generate digital artworks. The developed framework is a multimodal approach, based on semiotics and functional theory, which applies a sociological concept and functional categories to the analysis of multimodal texts. This multimodal approach enables researchers to explain how different semiotic systems or modes (language, image, sound, body language, facial expression and three-dimensional spaces, etc.) are related to each other in different genres such as every day language, scientific texts and art to realise meanings. Hitherto multimodal analysis has basically focused on the combination and relation of only two modes in a text (i.e. language and image). By analysing artworks that are generated of verbal, visual and acoustic modes of communication as well as physical objects in three-dimensional space the multimodal approach is extended in this thesis. Thus this work will contribute to multimodal research and art and media theory. With this framework of analysis major principles of design in digital art, that have become significant within the last years, can be explained. Principles that are addressed in this thesis are: transformation, modification and translation from one mode into another, virtual environments and telepresence, creating new visitor perspectives and interactive concepts as well as cohesion in digital art. [less ▲]Detailed reference viewed: 78 (2 UL) Bearing capacity of steel fiber reinforced concrete flat slabsMichels, Julien Doctoral thesis (2009)Detailed reference viewed: 194 (9 UL) Rupture et altérité: de l'interruption comme condition éthique et politique. Une lecture d' Emmanuel LevinasAntenat, Nicolas Doctoral thesis (2009)Detailed reference viewed: 108 (3 UL) Jeunesses et respect dans une société fragmentée En quoi respect et reconnaissance sont au cœur des constructions identitaires des jeunes et de leur intégration dans la société ?Kerivel, Aude Doctoral thesis (2009)La société s’interroge sur les actes irrespectueux de certains jeunes et ces derniers demandent du respect. Un paradoxe qui nous amène à donner la parole aux jeunes afin de comprendre le sens qu’ils ... [more ▼]La société s’interroge sur les actes irrespectueux de certains jeunes et ces derniers demandent du respect. Un paradoxe qui nous amène à donner la parole aux jeunes afin de comprendre le sens qu’ils donnent au respect. D’un point de vue théorique et empirique, le respect se caractérise par sa pluralité de sens (dans la forme et le fond) et se définit souvent par son contraire : l’irrespect. Les deux sont directement liés : agir de manière irrespectueuse peut être un moyen de tenir l’autre en respect. L’irrespect subit par les jeunes nous conduit alors à considérer ces expériences en tant que relation intersubjective au travers de l’identité de l’offenseur et de l’offensé. Perçue comme égalitaire et réciproque, la relation de respect implique dans les discours des jeunes une hiérarchie ; celle ci nous amenant à interroger la notion d’autorité. L’autorité, autrefois inhérente au rapport entre adultes et jeunes, est aujourd’hui tantôt contestée, tantôt perçue comme une nécessité. Dans le contexte d’une société que l’on peut qualifier de fragmentée, la quête de respect nous semble au cœur des constructions identitaires des jeunes et de leur intégration. Les jeunes se trouvent au centre de multiples paradoxes : une liberté restreinte parmi des possibles déterminés, une égalité inaccessible dans la distribution de l’estime et une fraternité remise en cause par la lutte des places. Pour les jeunes, le respect serait le langage de la reconnaissance permettant la mobilité dans l’espace-temps. Une mobilité conditionnée par le fait d’avoir été considéré comme valable dans le regard de l’Autre et donc la possibilité de se percevoir comme respectable. [less ▲]Detailed reference viewed: 100 (5 UL) Nichtgleichgewichtsphänomene, Strukturbildung und Grenzflächeneinflüsse in netzwerkbildenden Systemen aus optischer und akustischer Sicht.Philipp, Martine Doctoral thesis (2009)Isostructural phase transitions occurring under non-equilibrium conditions are investigated using technologically relevant epoxies. The evolution of the hypersonic and optical properties during the ... [more ▼]Isostructural phase transitions occurring under non-equilibrium conditions are investigated using technologically relevant epoxies. The evolution of the hypersonic and optical properties during the genesis of the polymeric network leads to deeper insight into the chemically induced sol-gel transition and glass transition, as demonstrated e.g. by the elastic anharmonicity and the generalised Cauchy relation. During gelation the refractive index versus chemical conversion behaves in an unexpected manner, indicating that in addition to the mass density an excess polarisability seems to contribute to the optical polarisability. The clarification of the isostructural phase transitions is impeded by the demixing tendency of the epoxy components which leads to different types of epoxy inhomogeneities on the nano- to mesoscopic scale. Taking benefit from a sample arrangement where both epoxy components are layered, the spatio-temporal evolution of acoustic properties gives supplementary information about trans-interfacial transport and structure formation processes. Of special technological relevance, but also of fundamental interest, is the influence of nanoscopic disturbances placed into the epoxy matrix. So-called interphases surrounding the nanoparticles modify and complicate the epoxy network formation, leading to long-lived metastable morphologies and properties. The role of the mixing sequence of the epoxy resin, the hardener and the nanoparticles for the polymerised epoxy state and the transient states during network formation, as well as the isostructural phase transitions is further elucidated. [less ▲]Detailed reference viewed: 89 (1 UL) Zur Rotationskapazität von Verbundanschlüssen bei der Bemessung nach dem FließgelenkverfahrenHahn, Christoph Doctoral thesis (2009)The present work deals with the load bearing and rotational behaviour of composite connections in steel and concrete constructions. For typical buildings, composite connections are assumed to be rigid or ... [more ▼]The present work deals with the load bearing and rotational behaviour of composite connections in steel and concrete constructions. For typical buildings, composite connections are assumed to be rigid or pinned. This assumption can lead to uneconomic structures. A design concept for the estimation of the available rotation capacity, the initial stiffness and the moment bearing capacity of semi-rigid connections is presented. On the basis of the plastic hinge theory diagrams were developed to prove the load carrying capacity and the serviceability of composite beams with semi-rigid connections. The presented design model is based on the evaluation of 9 self conducted tests and on the evaluation of 74 tests on composite connections from all over Europe. The availability of the model was proved by intensive nonlinear finite element simulations. [less ▲]Detailed reference viewed: 81 (8 UL) Optimierung der Tragfähigkeit von antibiotikabeladenen PMMA-hüftinterimsprothesenThielen, Thomas Doctoral thesis (2009)Detailed reference viewed: 76 (15 UL) Obligations d'information des sociétés cotées en droit communautaireSotiropoulou, Anastasia Doctoral thesis (2009)Detailed reference viewed: 76 (6 UL) La théorie rawlsienne de la justice et les relations internationalesNoumbissie Tchamo, Daniel Doctoral thesis (2009)Detailed reference viewed: 67 (8 UL) On the physical security of cryptographic implementationsRivain, Matthieu Doctoral thesis (2009)In modern cryptography, an encryption system is usually studied in the so-called black-box model. In this model, the cryptosystem is seen as an oracle replying to message encryption (and/or decryption ... [more ▼]In modern cryptography, an encryption system is usually studied in the so-called black-box model. In this model, the cryptosystem is seen as an oracle replying to message encryption (and/or decryption) queries according to a secret value: the key. The security of the cryptosystem is then defined following a simple game. An adversary questions the oracle about the encryption (and/or decryption) of messages of its choice and, depending on the answers, attempts to recover the value of the secret key (or to encrypt/decrypt a message for which he did not query the oracle). If by following an optimal strategy the adversary only has a negligible chance of winning, the system is considered as secure. Several cryptosystems have been proved secure in the black-box model. However, this model is not always sufficient to ensure the security of a cryptosystem in practice. Let us consider the example of smart cards which are used as platforms for cryptosystems in various applications such as banking, access control, mobile telephony, pay TV, or electronic passport. By the very nature of these applications, a cryptosystem embedded on a smart card is physically accessible to potential attackers. This physical access invalidates the modeling of the cryptosystem as a simple encryption oracle since it allows the adversary to observe and disrupt its physical behavior. New attacks then become possible which are known as physical cryptanalysis. Physical cryptanalysis includes two main families of attacks: side channel attacks and fault attacks. The purpose of side channel attacks is to analyze the different physical leakages of a cryptographic implementation during its computation. Chief among these rank timing, power consumption, and electromagnetic radiation. Observing these so-called side channels provides sensitive information about the cryptographic computation. The secret key value can then be easily recovered by statistical treatment although the cryptosystem is secure in the black-box model. The access to a cryptographic implementation enables more than a simple observation of its physical behavior; it is also possible to disrupt its computation. Working on this assumption, fault attacks consist in corrupting cryptographic computations so that they produce erroneous results. Surprisingly, these results can be used in order to recover information about the secret key. This thesis focuses on physical cryptanalysis as well as on the secure implementation of cryptographic primitives. We examine in the first part side channel attacks from a theoretical viewpoint. Various techniques of attack based on different statistical tools are addressed. We analyze their success rate, we compare their efficiency and we propose some improvements. Our analyses are illustrated by results of simulated attacks as well as practical attacks on smart cards. The second part of this thesis is devoted to one of the most widely used countermeasures to side channel attacks: data masking. Our investigations concentrate on generic masking schemes for block ciphers such as the encryption standards DES and AES. We analyze existing schemes, exhibiting some attacks against certain of them and we propose new designs. The third and last part of this thesis deals with fault attacks. First, we describe a new attack on the DES cipher which exhibits some requirements to its secure implementation. We then provide a case study based on the RSA cryptosystem where we propose a new countermeasure which can also be applied to secure any exponentiation algorithm. We finally address an important issue for practical security: the implementation of coherence checks. [less ▲]Detailed reference viewed: 175 (5 UL) Security matters: Privacy in Voting and Fairness in Digital ExchangeJonker, Hugo Doctoral thesis (2009)Detailed reference viewed: 49 (8 UL) Interregionale Lernprozesse als Antwort auf den Strukturwandel in Süd-LuxemburgHülz, Martina Doctoral thesis (2009)Detailed reference viewed: 37 (3 UL) Memoria- Gedächtnis und Erinnerung in Theodor Fontanes Roman "Unwiederbringlich"Welte, Marika Doctoral thesis (2009)Detailed reference viewed: 70 (2 UL) Medikament, Placebo und Psychologie: Integrative Studien zur Modulierbarkeit der SchmerzverarbeitungErpelding, Nathalie Doctoral thesis (2009)Detailed reference viewed: 37 (3 UL) Etude in vivo des altérations de l’axe hypothalamo-hypophysaire adrénergique sur la douleur inflammatoire : approches comportementales et immunohistochimiques chez le rat Juif, Pierre-Eric Doctoral thesis (2009)Detailed reference viewed: 48 (3 UL) La contribution du pluralisme constitutionnel à la constitutionnalisation de l’Union Européenne: Plaidoyer pour un renouveau théoriqueGiorgi, Florence Doctoral thesis (2009)Detailed reference viewed: 76 (10 UL) Two approaches to a deformation complex of courant algebroids and their deformation quantizationKeller, Frank Doctoral thesis (2009)Detailed reference viewed: 75 (1 UL) Anonymity and Unlinkability in Electronic CommunicationsFusenig, Volker Doctoral thesis (2009)Imagine a set of communication partners wants to keep their communication links secret. Consider the case where untrustworthy parties are able to observe every communication, which implies not only that ... [more ▼]Imagine a set of communication partners wants to keep their communication links secret. Consider the case where untrustworthy parties are able to observe every communication, which implies not only that they can detect the content of the communication, but also who is communicating and who is listening. Using this information, the untrustworthy parties try to link communicating parties. This, in a nutshell, is the problem of anonymous and unlinkable communication in computer networks. By use of encryption techniques the content of messages can be kept private. However, the communication links can still be detected. Since the addresses of sending and receiving parties are contained in the header of every message sent over the network, an untrustworthy party needs only to eavesdrop a single message of the communication in order to link sender and receiver. Additional techniques have to be used to hide this information. We address this problem in this thesis. We define measures for anonymity and unlinkability that are based on the information theoretic notion of entropy. These measures are used first to evaluate different approaches for anonymous and unlinkable communication and second, to show the effectiveness of attacks on these protocols. We present existing techniques for anonymous and unlinkable communication and highlight weak points of these techniques by applying attacks to them. In these attacks, known as traffic analysis attacks, the attacker basically tries to collect as much information about the communication as possible and then makes deductions concerning the communication links. We show that these traffic analysis attacks are applicable to many existing techniques. Furthermore, we introduce a new traffic analysis attack, namely the slotted packet-counting attack. Motivated by these findings, we present a protocol for unlinkable communication in computer networks. We prove that this protocol leaks no information on communication links in the case where attackers are able to observe any communication in the network. By this means, the protocol guarantees a user-defined degree of unlinkability. We also show that the protocol generates a minimal amount of extra messages for achieving a given degree of receiver anonymity, i.e. where an attacker is not able to detect the receiver of a message. [less ▲]Detailed reference viewed: 86 (3 UL) Damage Assessment of civil engineering structures and bridges using nonlinear dynamic characteristicsWaltering, Markus Doctoral thesis (2009)Detailed reference viewed: 100 (25 UL) On noncommutative deformations, cohomology of color-commutative algebras and formal smoothnessGohr, Aron Samuel Doctoral thesis (2009)The main topic under study in the present work is the deformation theory of color algebras. Color algebras are generalized analogues of associative superalgebras, where the underlying grading can be over ... [more ▼]The main topic under study in the present work is the deformation theory of color algebras. Color algebras are generalized analogues of associative superalgebras, where the underlying grading can be over an arbitrary abelian group and the Koszul sign is replaced by a bicharacter from the group into the base ring. A special case of particular interest are color-commutative algebras, which satisfy a commutation identity similar to (but much more general than) supercommutative algebras. Examples of color-commutative algebras include commutative and supercommutative superalgebras, the quaternions and para-quaternions, full matrix algebras over suitable base rings, Clifford algebras, and group rings over certain nonabelian groups. In the present work, Gerstenhaber-type formal deformations of these algebras are studied. In doing so, we extend previous work by Scheunert and provide a different approach to noncommutative deformation theory as introduced by Pinczon and Nadaud. In preparation of developing deformation theory for color algebras, we adapt a number of tools from ungraded Hochschild theory to our setting: among them, we derive an adapted Ext-functor, a color Gerstenhaber bracket, twisted graded versions of pre-Lie-algebras and pre-Lie-systems and colored analogs of the classical results linking infinitesimal deformations and obstructions to extension of deformations to second and third Hochschild cohomology. Additionally, we discuss the impact of some decisions in the construction of the trivial deformation object (color power series rings of given degree) on the resulting deformation theory. Finally, color-commutative deformations of color-commutative algebras are discussed and a suitable version of Harrison cohomology is developed. Also, the problem of classifying the color-commutative structures compatible with a given ungraded algebra is discussed and one nontrivial example is studied in detail. In support of all of these efforts, a number of structure theorems about color-commutative algebras are shown. [less ▲]Detailed reference viewed: 124 (7 UL) SESAME: a Model-Driven Process for the Test Selection of Small-size Safety-related Embedded SoftwareRies, Benoît Doctoral thesis (2009)Embedded software applications are part of our daily lives, some of which have safety implications on human beings. It is thus important to trust this type of software. In our industrial context, testing ... [more ▼]Embedded software applications are part of our daily lives, some of which have safety implications on human beings. It is thus important to trust this type of software. In our industrial context, testing is the most widely-spread technique used for that purpose. The state of practice is divided in two main categories. Explicit test selection techniques that enumerate the test cases to be exercised, but do not offer large coverage of the system’s behavior; and implicit techniques that encompass fully automated test generation techniques, which tend to hide the test selection information from engineers. The problem that we aim at solving in this thesis is the definition of a test selection approach that is capable of helping test engineers to better reach a delimited and verifiable test set with respect to some given test requirements and project specificities taking into account different test stakeholders.