<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:g-core="http://base.google.com/ns/1.0">
  <channel>
    <title>ORBi&lt;sup&gt;lu&lt;/sup&gt; Collection: Computer science</title>
    <link>http://hdl.handle.net/10993/85</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li resource="http://hdl.handle.net/10993/44035" />
        <rdf:li resource="http://hdl.handle.net/10993/44002" />
        <rdf:li resource="http://hdl.handle.net/10993/44001" />
        <rdf:li resource="http://hdl.handle.net/10993/44000" />
        <rdf:li resource="http://hdl.handle.net/10993/43999" />
        <rdf:li resource="http://hdl.handle.net/10993/43998" />
        <rdf:li resource="http://hdl.handle.net/10993/43997" />
        <rdf:li resource="http://hdl.handle.net/10993/43996" />
        <rdf:li resource="http://hdl.handle.net/10993/43995" />
        <rdf:li resource="http://hdl.handle.net/10993/43994" />
        <rdf:li resource="http://hdl.handle.net/10993/43988" />
        <rdf:li resource="http://hdl.handle.net/10993/43987" />
        <rdf:li resource="http://hdl.handle.net/10993/43985" />
        <rdf:li resource="http://hdl.handle.net/10993/43983" />
        <rdf:li resource="http://hdl.handle.net/10993/43981" />
        <rdf:li resource="http://hdl.handle.net/10993/43949" />
        <rdf:li resource="http://hdl.handle.net/10993/43948" />
        <rdf:li resource="http://hdl.handle.net/10993/43941" />
        <rdf:li resource="http://hdl.handle.net/10993/43900" />
        <rdf:li resource="http://hdl.handle.net/10993/43895" />
      </rdf:Seq>
    </items>
  </channel>
  <textInput>
    <title>The Collection's search engine</title>
    <description>Search this channel</description>
    <name>search</name>
    <link>https://orbilu.uni.lu/simple-search</link>
  </textInput>
  <item rdf:about="http://hdl.handle.net/10993/44035">
    <title>On Composability of Game-based Password Authenticated Key Exchange</title>
    <link>http://hdl.handle.net/10993/44035</link>
    <description>Title: On Composability of Game-based Password Authenticated Key Exchange
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Skrobot, Marjan; Lancrenon, Jean
&lt;br/&gt;
&lt;br/&gt;Abstract: It is standard practice that the secret key derived from an execution of a Password Authenticated Key Exchange (PAKE) protocol is used to authenticate and encrypt some data payload using a Symmetric Key Protocol (SKP). Unfortunately, most PAKEs of practical interest are studied using so-called game-based models, which – unlike simulation models – do not guarantee secure composition per se. However, Brzuska et al. (CCS 2011) have shown that middle ground is possible in the case of authenticated key exchange that relies on Public- Key Infrastructure (PKI): the game-based models do provide secure composition guarantees when the class of higher-level applications is restricted to SKPs. The question that we pose in this paper is whether or not a similar result can be exhibited for PAKE. Our work answers this question positively. More specifically, we show that PAKE protocols secure according to the game-based Real-or-Random (RoR) definition with the weak forward secrecy of Abdalla et al. (S&amp;P 2015) allow for safe composition with arbitrary, higher-level SKPs. Since there is evidence that most PAKEs secure in the Find-then-Guess (FtG) model are in fact secure according to RoR definition, we can conclude that nearly all provably secure PAKEs enjoy a certain degree of composition, one that at least covers the case of implementing secure channels.</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/44002">
    <title>Optimizing the Performance of an Unpredictable UAV Swarm for Intruder Detection</title>
    <link>http://hdl.handle.net/10993/44002</link>
    <description>Title: Optimizing the Performance of an Unpredictable UAV Swarm for Intruder Detection
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Stolfi Rosso, Daniel; Brust, Matthias R.; Danoy, Grégoire; Bouvry, Pascal
&lt;br/&gt;
&lt;br/&gt;Commentary: 1173</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/44001">
    <title>Competitive Evolution of a UAV Swarm for Improving Intruder Detection Rates</title>
    <link>http://hdl.handle.net/10993/44001</link>
    <description>Title: Competitive Evolution of a UAV Swarm for Improving Intruder Detection Rates
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Stolfi Rosso, Daniel; Brust, Matthias R.; Danoy, Grégoire; Bouvry, Pascal</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/44000">
    <title>IEEE Workshop on Parallel / Distributed Combinatorics and Optimization (PDCO 2020)</title>
    <link>http://hdl.handle.net/10993/44000</link>
    <description>Title: IEEE Workshop on Parallel / Distributed Combinatorics and Optimization (PDCO 2020)
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Danoy, Grégoire; Baz, Didier El; Boyer, Vincent; Dorronsoro, Bernabé; Yang, Laurence T.; Li, Keqin</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43999">
    <title>Automated design of efficient swarming behaviours: a Q-learning hyper-heuristic approach</title>
    <link>http://hdl.handle.net/10993/43999</link>
    <description>Title: Automated design of efficient swarming behaviours: a Q-learning hyper-heuristic approach
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Duflo, Gabriel; Danoy, Grégoire; Talbi, El-Ghazali; Bouvry, Pascal</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43998">
    <title>NGAP: a novel hybrid metaheuristic algorithm for round-trip carsharing fleet planning</title>
    <link>http://hdl.handle.net/10993/43998</link>
    <description>Title: NGAP: a novel hybrid metaheuristic algorithm for round-trip carsharing fleet planning
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Changaival, Boonyarit; Danoy, Grégoire; Kliazovich; Guinand, Frédéric; Brust, Matthias R.; Musial, Jedrzej; Lavangnananda, Kittichai; Bouvry, Pascal</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43997">
    <title>A Cooperative Coevolutionary Approach to Maximise Surveillance Coverage of UAV Swarms</title>
    <link>http://hdl.handle.net/10993/43997</link>
    <description>Title: A Cooperative Coevolutionary Approach to Maximise Surveillance Coverage of UAV Swarms
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Stolfi Rosso, Daniel; Brust, Matthias R.; Danoy, Grégoire; Bouvry, Pascal</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43996">
    <title>Design Challenges of Trustworthy Artificial Intelligence Learning Systems</title>
    <link>http://hdl.handle.net/10993/43996</link>
    <description>Title: Design Challenges of Trustworthy Artificial Intelligence Learning Systems
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Brust, Matthias R.; Bouvry, Pascal; Danoy, Grégoire; Talbi, El-Ghazali
&lt;br/&gt;
&lt;br/&gt;Commentary: 1178</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43995">
    <title>Tackling Large-Scale and Combinatorial Bi-Level Problems With a Genetic Programming Hyper-Heuristic</title>
    <link>http://hdl.handle.net/10993/43995</link>
    <description>Title: Tackling Large-Scale and Combinatorial Bi-Level Problems With a Genetic Programming Hyper-Heuristic
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Kieffer, Emmanuel; Danoy, Grégoire; Brust, Matthias R.; Bouvry, Pascal; Nagih, Anass</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43994">
    <title>Bayesian optimisation to select Rössler system parameters used in Chaotic Ant Colony Optimisation for Coverage</title>
    <link>http://hdl.handle.net/10993/43994</link>
    <description>Title: Bayesian optimisation to select Rössler system parameters used in Chaotic Ant Colony Optimisation for Coverage
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Rosalie, Martin; Kieffer, Emmanuel; Brust, Matthias R.; Danoy, Grégoire; Bouvry, Pascal</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43988">
    <title>The search for the perfect match: Aligning power-trading products to the energy transition</title>
    <link>http://hdl.handle.net/10993/43988</link>
    <description>Title: The search for the perfect match: Aligning power-trading products to the energy transition
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Fridgen, Gilbert; Michaelis, Anne; Rinck, Maximilian; Schöpf, Michael; Weibelzahl, Martin
&lt;br/&gt;
&lt;br/&gt;Abstract: Given the growing share of uncertain renewable energy production, the energy transition challenges modern power systems and especially calls for increased flexibility. However, relevant information on the highly assetspecific flexibility potential is typically only known to plant operators themselves and not, e.g., to transmission system operators. Therefore, liberalized electricity markets use prices that set explicit monetary incentives to disclose the relevant private information about the market participants’ assets. In this way, information asymmetries may be reduced. Given the different challenges of an integration of renewables, we argue that the associated new forms of volatile power profiles require new forms of power-trading products. In particular, based on recent advances in technical power measurement and billing, individual and market participant-specific power profiles may be superior to the current trading of average volumes. Against this background, we first outline various evolutionary adjustments of existing power-trading products and their underlying product parameters&#xD;
including (1) strengthening local pricing, (2) finer temporal granularity, (3) smaller minimum volume, and (4) shorter gate-closure time. Second, we open up a new perspective in form of a more disruptive shift towards power-profile trade, where market participants define their trading product using the actual power profile as a new product parameter.</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43987">
    <title>Strukturierte Analyse von Nachfrageflexibilität im Stromsystem und Ableitung eines generischen Geschäftsmodells für (stromintensive) Unternehmen</title>
    <link>http://hdl.handle.net/10993/43987</link>
    <description>Title: Strukturierte Analyse von Nachfrageflexibilität im Stromsystem und Ableitung eines generischen Geschäftsmodells für (stromintensive) Unternehmen
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Haupt, Leon; Körner, Marc-Fabian; Schoepf, Michael; Schott, Paul; Fridgen, Gilbert
&lt;br/&gt;
&lt;br/&gt;Abstract: The expansion of renewable energy requires appropriate flexibility in the electricity system in order to maintain the balance between electricity generation and consumption at all times. The industrial sector plays a central role for a successful energy transition due to the power-intensive processes and the resulting high electricity demand. Industrial demand response may be a cost-effective alternative to other flexibility options. At the same time, companies can reduce electricity procurement costs by providing demand response. Nevertheless, due to a complex decision-making environment and a lack of planning security, only a few companies are currently exploiting the existing potential. To reach the goals of the energy transition, the potential used must still be raised significantly, i.e., companies must align their demand for electricity more closely to the existing supply of electricity. This article supports companies in this transformation process by illustrating dimensions and characteristics of a business model for demand response. Through a literature study and subsequent expert workshops, a generic business model for companies is derived that provides transparency regarding the necessary activities and resources for enabling and implementing demand response. The results were developed using the established Business Model Canvas. This supports companies that have not yet started to use demand response in their business model development and thus reduces barriers to entry. The results presented contribute to an increase in the demand response potential of the industry.</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43985">
    <title>3D SPARSE DEFORMATION SIGNATURE FOR DYNAMIC FACE RECOGNITION</title>
    <link>http://hdl.handle.net/10993/43985</link>
    <description>Title: 3D SPARSE DEFORMATION SIGNATURE FOR DYNAMIC FACE RECOGNITION
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Shabayek, Abd El Rahman; Aouada, Djamila; Cherenkova, Kseniya; Gusev, Gleb</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43983">
    <title>3D DEFORMATION SIGNATURE FOR DYNAMIC FACE RECOGNITION</title>
    <link>http://hdl.handle.net/10993/43983</link>
    <description>Title: 3D DEFORMATION SIGNATURE FOR DYNAMIC FACE RECOGNITION
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Shabayek, Abd El Rahman; Aouada, Djamila; Cherenkova, Kseniya; Gusev, Gleb; Ottersten, Björn</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43981">
    <title>A comprehensive study on software aging across android versions and vendors</title>
    <link>http://hdl.handle.net/10993/43981</link>
    <description>Title: A comprehensive study on software aging across android versions and vendors
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Iannillo, Antonio Ken; Cotroneo, Domenico; Natella, Roberto; Pietrantuono, Roberto</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43949">
    <title>Intrusion detection on robot cameras using spatio-temporal autoencoders: A self-driving car application</title>
    <link>http://hdl.handle.net/10993/43949</link>
    <description>Title: Intrusion detection on robot cameras using spatio-temporal autoencoders: A self-driving car application
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Amrouche, Faouzi; Lagraa, Sofiane; Frank, Raphaël; State, Radu
&lt;br/&gt;
&lt;br/&gt;Abstract: Robot Operating System (ROS) is becoming more&#xD;
and more important and is used widely by developers and&#xD;
researchers in various domains. One of the most important&#xD;
fields where it is being used is the self-driving cars industry.&#xD;
However, this framework is far from being totally secure, and&#xD;
the existing security breaches do not have robust solutions.&#xD;
In this paper we focus on the camera vulnerabilities, as it is&#xD;
often the most important source for the environment discovery&#xD;
and the decision-making process. We propose an unsupervised&#xD;
anomaly detection tool for detecting suspicious frames incoming&#xD;
from camera flows. Our solution is based on spatio-temporal&#xD;
autoencoders used to truthfully reconstruct the camera frames&#xD;
and detect abnormal ones by measuring the difference with the&#xD;
input. We test our approach on a real-word dataset, i.e. flows&#xD;
coming from embedded cameras of self-driving cars. Our solution&#xD;
outperforms the existing works on different scenarios.</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43948">
    <title>Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security</title>
    <link>http://hdl.handle.net/10993/43948</link>
    <description>Title: Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Distler, Verena; Lallemand, Carine; Koenig, Vincent
&lt;br/&gt;
&lt;br/&gt;Abstract: When communication about security to end users is ineffective, people frequently misinterpret the protection offered by a system. The discrepancy between the security users perceive a system to have and the actual system state can lead to potentially risky behaviors. It is thus crucial to understand how security perceptions are shaped by interface elements such as text-based descriptions of encryption. This article addresses the question of how encryption should be described to non-experts in a way that enhances perceived&#xD;
security. We tested the following within-subject variables in an online experiment (N=309): a) how to best word&#xD;
encryption, b) whether encryption should be described with a focus on the process or outcome, or both c) whether the objective of encryption should be mentioned d) when mentioning the objective of encryption, how to best describe it e) whether a hash should be displayed to the user. We also investigated the role of context (between subjects). The&#xD;
verbs “encrypt” and “secure” performed comparatively well at enhancing perceived security. Overall, participants stated that they felt more secure not knowing about the objective of encryption. When it is necessary to state the objective, positive wording of the objective of encryption worked best. We discuss implications and why using these results to design for perceived lack of security might be of interest as well. This leads us to discuss ethical concerns, and we give guidelines for the design of user interfaces where encryption should be communicated to end users.</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43941">
    <title>Blockchain-enabled Traceability and Immutability for Financial Applications</title>
    <link>http://hdl.handle.net/10993/43941</link>
    <description>Title: Blockchain-enabled Traceability and Immutability for Financial Applications
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Khan, Nida
&lt;br/&gt;
&lt;br/&gt;Abstract: 􏰔􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁The dissertation explores the efficacy of exploiting the transparency and immutability characteristics of blockchain platforms in a financial ecosystem. It elaborates on blockchain technology employing a succinct approach, which serves as the foundation to comprehend the contributions of the present research work. The dissertation gives a verified mathematical model, derived using Nash equilibrium, to function as a framework for blockchain governance. The work elucidates the design, implementation and evaluation of a management plane to monitor and manage blockchain-based decentralized applications. The dissertation also solves the problem of data privacy by the development and evaluation of a management plane for differential privacy preservation through smart contracts. Further, the research work discusses the compliance of the privacy management plane to GDPR using a permissioned blockchain platform. The dissertation is a pioneer in conducting an implementation-based, comparative and an exploratory analysis of tokenization of ethical investment certificates. The dissertation also verifies the utility of blockchain to solve some prevalent issues in social finance. It accomplishes this through the development and testing of a blockchain-based donation application. A qualitative review of the economic impact of blockchain-based micropayments has also been conducted. The discussion on the economic impact also includes a proposition for extending the access of blockchain-based financial services to the underbanked and unbanked people. The work concludes with a hypothetical model of a financial ecosystem, depicting the deployment of the major contributions of this dissertation. &#xD;
&#xD;
 􏰃􏰝􏰃􏰄􏰧􏰁􏰈􏰧􏰨 􏰞􏰇􏰉􏰈􏰏􏰆􏰅􏰁􏰇􏰈􏰆􏰕􏰨 􏰏􏰁􏰂􏰄􏰉􏰊􏰅􏰁􏰋􏰃 􏰅􏰃􏰖􏰓􏰈􏰇􏰕􏰇􏰧􏰛 􏰩􏰁􏰅􏰓 􏰅􏰓􏰃 􏰊􏰇􏰅􏰃􏰈􏰅􏰁􏰆􏰕 􏰅􏰇 􏰖􏰇􏰝􏰊􏰕􏰃􏰅􏰃􏰕􏰛 􏰇􏰋􏰃􏰄􏰓􏰆􏰉􏰕 􏰅􏰓􏰃 􏰃􏰪􏰁􏰂􏰅􏰁􏰈􏰧 􏰫􏰈􏰆􏰈􏰖􏰁􏰆􏰕 􏰁􏰈􏰞􏰄􏰆􏰂􏰅􏰄􏰉􏰖􏰅􏰉􏰄􏰃􏰍 􏰚􏰓􏰃 􏰫􏰈􏰆􏰈􏰖􏰃 􏰂􏰃􏰖􏰅􏰇􏰄 􏰁􏰂 􏰕􏰃􏰆􏰏􏰁􏰈􏰧 􏰁􏰈 􏰅􏰓􏰃 􏰏􏰃􏰊􏰕􏰇􏰛􏰝􏰃􏰈􏰅 􏰇􏰞 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈 􏰅􏰇 􏰄􏰃􏰂􏰇􏰕􏰋􏰃 􏰃􏰈􏰏􏰃􏰝􏰁􏰖 􏰁􏰂􏰂􏰉􏰃􏰂 􏰄􏰃􏰕􏰆􏰅􏰃􏰏 􏰅􏰇 􏰅􏰄􏰆􏰈􏰂􏰊􏰆􏰄􏰃􏰈􏰖􏰛􏰨 􏰅􏰓􏰁􏰄􏰏􏰘􏰊􏰆􏰄􏰅􏰛 􏰞􏰄􏰆􏰉􏰏 􏰆􏰂 􏰩􏰃􏰕􏰕 􏰆􏰂 􏰅􏰁􏰝􏰃􏰘 􏰖􏰇􏰈􏰂􏰉􏰝􏰁􏰈􏰧 􏰆􏰈􏰏 􏰃􏰪􏰊􏰃􏰈􏰂􏰁􏰋􏰃 􏰅􏰄􏰆􏰈􏰂􏰆􏰖􏰅􏰁􏰇􏰈􏰂􏰍 􏰚􏰓􏰃 􏰫􏰈􏰆􏰈􏰖􏰃 􏰂􏰃􏰖􏰅􏰇􏰄 􏰓􏰆􏰂 􏰈􏰇􏰅 􏰙􏰃􏰃􏰈 􏰆􏰙􏰕􏰃 􏰅􏰇 􏰂􏰃􏰄􏰋􏰃 􏰅􏰓􏰃 􏰉􏰈􏰏􏰃􏰄􏰙􏰆􏰈􏰗􏰃􏰏 􏰆􏰈􏰏 􏰉􏰈􏰙􏰆􏰈􏰗􏰃􏰏 􏰊􏰇􏰊􏰉􏰕􏰆􏰅􏰁􏰇􏰈􏰂 􏰇􏰞 􏰅􏰓􏰃 􏰩􏰇􏰄􏰕􏰏 􏰂􏰇 􏰞􏰆􏰄􏰍 􏰬􏰭􏰮􏰜􏰀􏰘􏰯􏰰 􏰁􏰈 􏰱􏰲􏰱􏰲 􏰓􏰆􏰂 􏰁􏰈􏰏􏰁􏰖􏰆􏰅􏰃􏰏 􏰅􏰓􏰆􏰅 􏰆 􏰂􏰅􏰄􏰇􏰈􏰧 􏰏􏰁􏰧􏰁􏰅􏰆􏰕 􏰁􏰈􏰞􏰄􏰆􏰂􏰅􏰄􏰉􏰖􏰅􏰉􏰄􏰃 􏰁􏰂 􏰈􏰃􏰃􏰏􏰃􏰏 􏰅􏰇 􏰙􏰃 􏰆􏰙􏰕􏰃 􏰅􏰇 􏰏􏰃􏰆􏰕 􏰙􏰃􏰅􏰅􏰃􏰄 􏰩􏰁􏰅􏰓 􏰏􏰁􏰂􏰄􏰉􏰊􏰅􏰁􏰇􏰈 􏰆􏰈􏰏 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈 􏰖􏰆􏰈 􏰊􏰕􏰆􏰛 􏰆 􏰊􏰁􏰋􏰇􏰅􏰆􏰕 􏰄􏰇􏰕􏰃 􏰁􏰈 􏰃􏰂􏰅􏰆􏰙􏰕􏰁􏰂􏰓􏰁􏰈􏰧 􏰅􏰓􏰁􏰂 􏰏􏰁􏰧􏰁􏰅􏰆􏰕 􏰁􏰈􏰞􏰄􏰆􏰂􏰅􏰄􏰉􏰖􏰅􏰉􏰄􏰃􏰍 􏰚􏰓􏰃 􏰏􏰁􏰂􏰂􏰃􏰄􏰅􏰆􏰅􏰁􏰇􏰈 􏰃􏰪􏰊􏰕􏰇􏰄􏰃􏰂 􏰅􏰓􏰃 􏰃􏰳􏰖􏰆􏰖􏰛 􏰇􏰞 􏰃􏰪􏰊􏰕􏰇􏰁􏰅􏰁􏰈􏰧 􏰅􏰓􏰃 􏰅􏰄􏰆􏰈􏰂􏰊􏰆􏰄􏰃􏰈􏰖􏰛 􏰆􏰈􏰏 􏰁􏰝􏰝􏰉􏰅􏰆􏰙􏰁􏰕􏰁􏰅􏰛 􏰖􏰓􏰆􏰄􏰆􏰖􏰅􏰃􏰄􏰁􏰂􏰅􏰁􏰖􏰂 􏰇􏰞 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈 􏰊􏰕􏰆􏰅􏰞􏰇􏰄􏰝􏰂 􏰁􏰈 􏰆 􏰫􏰈􏰆􏰈􏰖􏰁􏰆􏰕 􏰃􏰖􏰇􏰂􏰛􏰂􏰅􏰃􏰝􏰍&#xD;
􏰚􏰓􏰃 􏰏􏰁􏰂􏰂􏰃􏰄􏰅􏰆􏰅􏰁􏰇􏰈 􏰃􏰕􏰆􏰙􏰇􏰄􏰆􏰅􏰃􏰂 􏰇􏰈 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈 􏰅􏰃􏰖􏰓􏰈􏰇􏰕􏰇􏰧􏰛 􏰃􏰝􏰊􏰕􏰇􏰛􏰁􏰈􏰧 􏰆 􏰂􏰉􏰖􏰖􏰁􏰈􏰖􏰅 􏰆􏰊􏰊􏰄􏰇􏰆􏰖􏰓􏰨 􏰩􏰓􏰁􏰖􏰓 􏰂􏰃􏰄􏰋􏰃􏰂 􏰆􏰂 􏰅􏰓􏰃 􏰞􏰇􏰉􏰈􏰏􏰆􏰅􏰁􏰇􏰈 􏰅􏰇 􏰖􏰇􏰝􏰊􏰄􏰃􏰓􏰃􏰈􏰏 􏰅􏰓􏰃 􏰖􏰇􏰈􏰅􏰄􏰁􏰙􏰉􏰅􏰁􏰇􏰈􏰂 􏰇􏰞 􏰅􏰓􏰃 􏰊􏰄􏰃􏰂􏰃􏰈􏰅 􏰄􏰃􏰂􏰃􏰆􏰄􏰖􏰓 􏰩􏰇􏰄􏰗􏰍 􏰔􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈 􏰧􏰇􏰋􏰘 􏰃􏰄􏰈􏰆􏰈􏰖􏰃 􏰁􏰂 􏰆􏰈 􏰉􏰈􏰄􏰃􏰂􏰇􏰕􏰋􏰃􏰏 􏰞􏰆􏰖􏰃􏰅 􏰇􏰞 􏰅􏰓􏰃 􏰅􏰃􏰖􏰓􏰈􏰇􏰕􏰇􏰧􏰛􏰨 􏰁􏰈 􏰅􏰓􏰃 􏰆􏰙􏰂􏰃􏰈􏰖􏰃 􏰇􏰞 􏰩􏰓􏰁􏰖􏰓􏰨 􏰅􏰓􏰃 􏰏􏰁􏰂􏰅􏰄􏰁􏰙􏰉􏰅􏰃􏰏 􏰈􏰃􏰅􏰩􏰇􏰄􏰗 􏰖􏰆􏰈 􏰞􏰆􏰁􏰕 􏰅􏰇 􏰞􏰉􏰈􏰖􏰅􏰁􏰇􏰈 􏰇􏰊􏰅􏰁􏰝􏰆􏰕􏰕􏰛 􏰇􏰄 􏰃􏰋􏰃􏰈 􏰂􏰅􏰆􏰕􏰕􏰍 􏰚􏰓􏰃 􏰏􏰁􏰂􏰂􏰃􏰄􏰅􏰆􏰅􏰁􏰇􏰈 􏰧􏰁􏰋􏰃􏰂 􏰆 􏰋􏰃􏰄􏰁􏰫􏰃􏰏 􏰝􏰆􏰅􏰓􏰃􏰝􏰆􏰅􏰁􏰖􏰆􏰕 􏰝􏰇􏰏􏰃􏰕􏰨 􏰏􏰃􏰘 􏰄􏰁􏰋􏰃􏰏 􏰉􏰂􏰁􏰈􏰧 􏰑􏰆􏰂􏰓 􏰃􏰴􏰉􏰁􏰕􏰁􏰙􏰄􏰁􏰉􏰝􏰨 􏰅􏰇 􏰞􏰉􏰈􏰖􏰅􏰁􏰇􏰈 􏰆􏰂 􏰆 􏰞􏰄􏰆􏰝􏰃􏰩􏰇􏰄􏰗 􏰞􏰇􏰄 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈 􏰧􏰇􏰋􏰃􏰄􏰈􏰆􏰈􏰖􏰃􏰍 􏰚􏰓􏰃 􏰉􏰂􏰆􏰧􏰃 􏰇􏰞 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈 􏰁􏰈 􏰫􏰈􏰆􏰈􏰖􏰁􏰆􏰕 􏰇􏰄􏰧􏰆􏰈􏰁􏰵􏰆􏰅􏰁􏰇􏰈􏰂 􏰃􏰈􏰅􏰆􏰁􏰕􏰂 􏰅􏰓􏰃 􏰄􏰃􏰴􏰉􏰁􏰄􏰃􏰝􏰃􏰈􏰅 􏰇􏰞 􏰆 􏰂􏰇􏰉􏰈􏰏 􏰝􏰆􏰈􏰆􏰧􏰃􏰝􏰃􏰈􏰅 􏰂􏰅􏰄􏰆􏰅􏰃􏰧􏰛 􏰅􏰇 􏰇􏰙􏰘 􏰞􏰉􏰂􏰖􏰆􏰅􏰃 􏰅􏰓􏰃 􏰖􏰇􏰝􏰊􏰕􏰃􏰪􏰁􏰅􏰁􏰃􏰂 􏰇􏰞 􏰅􏰓􏰃 􏰅􏰃􏰖􏰓􏰈􏰇􏰕􏰇􏰧􏰛 􏰆􏰈􏰏 􏰄􏰃􏰊􏰕􏰁􏰖􏰆􏰅􏰃 􏰅􏰓􏰃 􏰆􏰏􏰝􏰁􏰈􏰁􏰂􏰅􏰄􏰆􏰅􏰁􏰋􏰃 􏰞􏰉􏰈􏰖􏰅􏰁􏰇􏰈􏰂 􏰃􏰪􏰁􏰂􏰅􏰁􏰈􏰧 􏰁􏰈 􏰕􏰃􏰧􏰆􏰖􏰛 􏰂􏰛􏰂􏰅􏰃􏰝􏰂􏰍 􏰚􏰓􏰃 􏰄􏰃􏰂􏰃􏰆􏰄􏰖􏰓 􏰩􏰇􏰄􏰗 􏰃􏰕􏰉􏰖􏰁􏰏􏰆􏰅􏰃􏰂 􏰅􏰓􏰃 􏰏􏰃􏰂􏰁􏰧􏰈􏰨 􏰁􏰝􏰊􏰕􏰃􏰝􏰃􏰈􏰅􏰆􏰅􏰁􏰇􏰈 􏰆􏰈􏰏 􏰃􏰋􏰆􏰕􏰉􏰆􏰅􏰁􏰇􏰈 􏰇􏰞 􏰆 􏰝􏰆􏰈􏰆􏰧􏰃􏰝􏰃􏰈􏰅 􏰊􏰕􏰆􏰈􏰃 􏰅􏰇 􏰝􏰇􏰈􏰁􏰅􏰇􏰄 􏰆􏰈􏰏 􏰝􏰆􏰈􏰆􏰧􏰃 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈􏰘􏰙􏰆􏰂􏰃􏰏 􏰏􏰃􏰖􏰃􏰈􏰅􏰄􏰆􏰕􏰁􏰵􏰃􏰏 􏰆􏰊􏰊􏰕􏰁􏰖􏰆􏰅􏰁􏰇􏰈􏰂􏰍 􏰶􏰄􏰁􏰋􏰆􏰖􏰛 􏰇􏰞 􏰫􏰈􏰆􏰈􏰖􏰁􏰆􏰕 􏰏􏰆􏰅􏰆 􏰁􏰂 􏰃􏰪􏰅􏰄􏰃􏰝􏰃􏰕􏰛 􏰁􏰝􏰊􏰇􏰄􏰅􏰆􏰈􏰅 􏰞􏰇􏰄 􏰆􏰈􏰛 􏰫􏰈􏰆􏰈􏰖􏰁􏰆􏰕 􏰇􏰄􏰧􏰆􏰈􏰁􏰵􏰆􏰅􏰁􏰇􏰈 􏰙􏰉􏰅 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈􏰨 􏰙􏰛 􏰋􏰁􏰄􏰅􏰉􏰃 􏰇􏰞 􏰁􏰅􏰂 􏰁􏰈􏰓􏰃􏰄􏰃􏰈􏰅 􏰁􏰈􏰞􏰄􏰆􏰂􏰘 􏰅􏰄􏰉􏰖􏰅􏰉􏰄􏰃􏰨 􏰊􏰇􏰂􏰃􏰂 􏰆 􏰖􏰓􏰆􏰕􏰕􏰃􏰈􏰧􏰃 􏰁􏰈 􏰅􏰓􏰁􏰂 􏰄􏰃􏰂􏰊􏰃􏰖􏰅􏰍 􏰚􏰓􏰁􏰂 􏰁􏰂 􏰆􏰕􏰂􏰇 􏰇􏰈􏰃 􏰇􏰞 􏰅􏰓􏰃 􏰇􏰋􏰃􏰄􏰆􏰄􏰖􏰓􏰁􏰈􏰧 􏰞􏰆􏰖􏰅􏰇􏰄􏰂 􏰅􏰓􏰆􏰅 􏰝􏰆􏰗􏰃􏰂 􏰉􏰂􏰆􏰧􏰃 􏰇􏰞 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈 􏰴􏰉􏰃􏰂􏰅􏰁􏰇􏰈􏰆􏰙􏰕􏰃 􏰞􏰄􏰇􏰝 􏰅􏰓􏰃 􏰷􏰉􏰄􏰇􏰊􏰃􏰆􏰈 􏰸􏰀􏰶􏰎 􏰊􏰃􏰄􏰂􏰊􏰃􏰖􏰅􏰁􏰋􏰃􏰍 􏰶􏰄􏰁􏰋􏰆􏰖􏰛􏰘􏰊􏰄􏰃􏰂􏰃􏰄􏰋􏰁􏰈􏰧 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈 􏰊􏰕􏰆􏰅􏰞􏰇􏰄􏰝􏰂 􏰓􏰆􏰋􏰃 􏰆􏰕􏰂􏰇 􏰊􏰄􏰇􏰋􏰃􏰏 􏰅􏰇 􏰙􏰃 􏰋􏰉􏰕􏰈􏰃􏰄􏰆􏰙􏰕􏰃 􏰅􏰇 􏰏􏰆􏰅􏰆 􏰙􏰄􏰃􏰆􏰖􏰓􏰃􏰂􏰍 􏰚􏰓􏰃 􏰏􏰁􏰂􏰂􏰃􏰄􏰅􏰆􏰅􏰁􏰇􏰈 􏰂􏰇􏰕􏰋􏰃􏰂 􏰅􏰓􏰁􏰂 􏰊􏰄􏰇􏰙􏰕􏰃􏰝 􏰙􏰛&#xD;
􏰁􏰋&#xD;
􏰀􏰁􏰂􏰂􏰃􏰄􏰅􏰆􏰅􏰁􏰇􏰈 􏰂􏰉􏰊􏰃􏰄􏰋􏰁􏰂􏰇􏰄􏰌 􏰀􏰄􏰍 􏰎􏰆􏰏􏰉 􏰐􏰅􏰆􏰅􏰃 􏰑􏰁􏰏􏰆 􏰒􏰓􏰆􏰈&#xD;
􏰅􏰓􏰃 􏰏􏰃􏰋􏰃􏰕􏰇􏰊􏰝􏰃􏰈􏰅 􏰆􏰈􏰏 􏰃􏰋􏰆􏰕􏰉􏰆􏰅􏰁􏰇􏰈 􏰇􏰞 􏰆 􏰝􏰆􏰈􏰆􏰧􏰃􏰝􏰃􏰈􏰅 􏰊􏰕􏰆􏰈􏰃 􏰞􏰇􏰄 􏰏􏰁􏰹􏰃􏰄􏰃􏰈􏰅􏰁􏰆􏰕 􏰊􏰄􏰁􏰋􏰆􏰖􏰛 􏰊􏰄􏰃􏰂􏰃􏰄􏰋􏰆􏰅􏰁􏰇􏰈 􏰅􏰓􏰄􏰇􏰉􏰧􏰓 􏰂􏰝􏰆􏰄􏰅 􏰖􏰇􏰈􏰅􏰄􏰆􏰖􏰅􏰂􏰍 􏰚􏰓􏰃 􏰄􏰃􏰂􏰃􏰆􏰄􏰖􏰓 􏰩􏰇􏰄􏰗 􏰏􏰁􏰂􏰖􏰉􏰂􏰂􏰃􏰂 􏰅􏰓􏰃 􏰖􏰇􏰝􏰊􏰕􏰁􏰆􏰈􏰖􏰃 􏰇􏰞 􏰅􏰓􏰃 􏰊􏰄􏰁􏰋􏰆􏰖􏰛 􏰝􏰆􏰈􏰆􏰧􏰃􏰝􏰃􏰈􏰅 􏰊􏰕􏰆􏰈􏰃 􏰅􏰇 􏰸􏰀􏰶􏰎 􏰉􏰂􏰁􏰈􏰧 􏰆 􏰊􏰃􏰄􏰝􏰁􏰂􏰂􏰁􏰇􏰈􏰃􏰏 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈 􏰊􏰕􏰆􏰅􏰞􏰇􏰄􏰝􏰍&#xD;
􏰚􏰓􏰃 􏰈􏰃􏰩 􏰃􏰖􏰇􏰈􏰇􏰝􏰁􏰖 􏰊􏰆􏰄􏰆􏰏􏰁􏰧􏰝 􏰃􏰈􏰞􏰇􏰄􏰖􏰃􏰏 􏰙􏰛 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈􏰨 􏰏􏰃􏰖􏰃􏰈􏰅􏰄􏰆􏰕􏰁􏰵􏰃􏰏 􏰫􏰈􏰆􏰈􏰖􏰃􏰨 􏰊􏰄􏰃􏰂􏰃􏰈􏰅􏰂 􏰈􏰇􏰋􏰃􏰕 􏰖􏰓􏰆􏰕􏰘 􏰕􏰃􏰈􏰧􏰃􏰂 􏰆􏰈􏰏 􏰉􏰈􏰊􏰄􏰃􏰖􏰃􏰏􏰃􏰈􏰅􏰃􏰏 􏰂􏰅􏰄􏰆􏰅􏰃􏰧􏰁􏰖 􏰆􏰏􏰋􏰆􏰈􏰅􏰆􏰧􏰃􏰂􏰍 􏰚􏰓􏰃 􏰏􏰁􏰂􏰂􏰃􏰄􏰅􏰆􏰅􏰁􏰇􏰈 􏰁􏰂 􏰆 􏰊􏰁􏰇􏰈􏰃􏰃􏰄 􏰁􏰈 􏰖􏰇􏰈􏰏􏰉􏰖􏰅􏰁􏰈􏰧 􏰆􏰈 􏰁􏰝􏰊􏰕􏰃􏰝􏰃􏰈􏰅􏰆􏰅􏰁􏰇􏰈􏰘􏰙􏰆􏰂􏰃􏰏􏰨 􏰖􏰇􏰝􏰊􏰆􏰄􏰆􏰅􏰁􏰋􏰃 􏰆􏰈􏰏 􏰆􏰈 􏰃􏰪􏰊􏰕􏰇􏰄􏰆􏰅􏰇􏰄􏰛 􏰆􏰈􏰆􏰕􏰛􏰂􏰁􏰂 􏰇􏰞 􏰅􏰇􏰗􏰃􏰈􏰁􏰵􏰆􏰅􏰁􏰇􏰈 􏰇􏰞 􏰃􏰅􏰓􏰁􏰖􏰆􏰕 􏰁􏰈􏰋􏰃􏰂􏰅􏰝􏰃􏰈􏰅 􏰖􏰃􏰄􏰅􏰁􏰫􏰖􏰆􏰅􏰃􏰂􏰍 􏰐􏰇􏰖􏰁􏰆􏰕 􏰫􏰈􏰆􏰈􏰖􏰃 􏰝􏰆􏰄􏰗􏰃􏰅􏰂 􏰓􏰆􏰋􏰃 􏰙􏰃􏰃􏰈 􏰏􏰃􏰋􏰃􏰕􏰇􏰊􏰁􏰈􏰧 􏰁􏰈 􏰷􏰉􏰄􏰇􏰊􏰃 􏰆􏰈􏰏 􏰆􏰄􏰃 􏰋􏰁􏰃􏰩􏰃􏰏 􏰆􏰂 􏰂􏰉􏰂􏰅􏰆􏰁􏰈􏰆􏰙􏰕􏰃 􏰫􏰘 􏰈􏰆􏰈􏰖􏰃 􏰙􏰛 􏰅􏰓􏰃 􏰷􏰉􏰄􏰇􏰊􏰃􏰆􏰈 􏰬􏰇􏰝􏰝􏰁􏰂􏰂􏰁􏰇􏰈􏰍 􏰚􏰓􏰃 􏰄􏰃􏰂􏰃􏰆􏰄􏰖􏰓 􏰩􏰇􏰄􏰗 􏰋􏰃􏰄􏰁􏰫􏰃􏰂 􏰅􏰓􏰃 􏰉􏰅􏰁􏰕􏰁􏰅􏰛 􏰇􏰞 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈 􏰅􏰇 􏰂􏰇􏰕􏰋􏰃 􏰂􏰇􏰝􏰃 􏰊􏰄􏰃􏰋􏰆􏰕􏰃􏰈􏰅 􏰁􏰂􏰂􏰉􏰃􏰂 􏰁􏰈 􏰂􏰇􏰖􏰁􏰆􏰕 􏰫􏰈􏰆􏰈􏰖􏰃􏰍 􏰚􏰓􏰃 􏰩􏰇􏰄􏰗 􏰆􏰖􏰖􏰇􏰝􏰊􏰕􏰁􏰂􏰓􏰃􏰂 􏰅􏰓􏰁􏰂 􏰅􏰓􏰄􏰇􏰉􏰧􏰓 􏰅􏰓􏰃 􏰏􏰃􏰋􏰃􏰕􏰇􏰊􏰝􏰃􏰈􏰅 􏰆􏰈􏰏 􏰅􏰃􏰂􏰅􏰁􏰈􏰧 􏰇􏰞 􏰆 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈􏰘􏰙􏰆􏰂􏰃􏰏 􏰏􏰇􏰈􏰆􏰅􏰁􏰇􏰈 􏰆􏰊􏰊􏰕􏰁􏰖􏰆􏰅􏰁􏰇􏰈􏰍 􏰠 􏰴􏰉􏰆􏰕􏰁􏰅􏰆􏰅􏰁􏰋􏰃 􏰄􏰃􏰋􏰁􏰃􏰩 􏰇􏰞 􏰅􏰓􏰃 􏰃􏰖􏰇􏰈􏰇􏰝􏰁􏰖 􏰁􏰝􏰊􏰆􏰖􏰅 􏰇􏰞 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈􏰘􏰙􏰆􏰂􏰃􏰏 􏰝􏰁􏰖􏰄􏰇􏰊􏰆􏰛􏰝􏰃􏰈􏰅􏰂 􏰓􏰆􏰂 􏰆􏰕􏰂􏰇 􏰙􏰃􏰃􏰈 􏰖􏰇􏰈􏰏􏰉􏰖􏰅􏰃􏰏􏰍 􏰚􏰓􏰃 􏰏􏰁􏰂􏰖􏰉􏰂􏰂􏰁􏰇􏰈 􏰇􏰈 􏰅􏰓􏰃 􏰃􏰖􏰇􏰈􏰇􏰝􏰁􏰖 􏰁􏰝􏰊􏰆􏰖􏰅 􏰆􏰕􏰂􏰇 􏰁􏰈􏰖􏰕􏰉􏰏􏰃􏰂 􏰆 􏰊􏰄􏰇􏰊􏰇􏰂􏰁􏰅􏰁􏰇􏰈 􏰞􏰇􏰄 􏰃􏰪􏰅􏰃􏰈􏰏􏰁􏰈􏰧 􏰅􏰓􏰃 􏰆􏰖􏰖􏰃􏰂􏰂 􏰇􏰞 􏰙􏰕􏰇􏰖􏰗􏰖􏰓􏰆􏰁􏰈􏰘􏰙􏰆􏰂􏰃􏰏 􏰫􏰈􏰆􏰈􏰖􏰁􏰆􏰕 􏰂􏰃􏰄􏰋􏰁􏰖􏰃􏰂 􏰅􏰇 􏰅􏰓􏰃 􏰉􏰈􏰘 􏰏􏰃􏰄􏰙􏰆􏰈􏰗􏰃􏰏 􏰆􏰈􏰏 􏰉􏰈􏰙􏰆􏰈􏰗􏰃􏰏 􏰊􏰃􏰇􏰊􏰕􏰃􏰍&#xD;
􏰚􏰓􏰃 􏰩􏰇􏰄􏰗 􏰖􏰇􏰈􏰖􏰕􏰉􏰏􏰃􏰂 􏰩􏰁􏰅􏰓 􏰆 􏰓􏰛􏰊􏰇􏰅􏰓􏰃􏰅􏰁􏰖􏰆􏰕 􏰝􏰇􏰏􏰃􏰕 􏰇􏰞 􏰆 􏰫􏰈􏰆􏰈􏰖􏰁􏰆􏰕 􏰃􏰖􏰇􏰂􏰛􏰂􏰅􏰃􏰝􏰨 􏰏􏰃􏰊􏰁􏰖􏰅􏰁􏰈􏰧 􏰅􏰓􏰃 􏰏􏰃􏰊􏰕􏰇􏰛􏰝􏰃􏰈􏰅 􏰇􏰞 􏰅􏰓􏰃 􏰝􏰆􏰺􏰇􏰄 􏰖􏰇􏰈􏰅􏰄􏰁􏰙􏰉􏰅􏰁􏰇􏰈􏰂 􏰇􏰞 􏰅􏰓􏰁􏰂 􏰏􏰁􏰂􏰂􏰃􏰄􏰅􏰆􏰅􏰁􏰇􏰈􏰍</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43900">
    <title>Leveraging Natural-language Requirements for Deriving Better Acceptance Criteria from Models</title>
    <link>http://hdl.handle.net/10993/43900</link>
    <description>Title: Leveraging Natural-language Requirements for Deriving Better Acceptance Criteria from Models
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Veizaga Campero, Alvaro Mario; Alferez, Mauricio; Torre, Damiano; Sabetzadeh, Mehrdad; Briand, Lionel; Pitskhelauri, Elene
&lt;br/&gt;
&lt;br/&gt;Abstract: In many software and systems development projects, analysts specify requirements using a combination of modeling and natural language (NL). In such situations, systematic acceptance testing poses a challenge because defining the acceptance criteria (AC) to be met by the system under test has to account not only for the information in the (requirements) model but also that in the NL requirements. In other words, neither models nor NL requirements per se provide a complete picture of the information content relevant to AC. Our work in this paper is prompted by the observation that a reconciliation of the information content in NL requirements and models is necessary for obtaining precise AC. We perform such reconciliation by devising an approach that automatically extracts AC-related information from NL requirements and helps modelers enrich their model with the extracted information. An existing AC derivation technique is then applied to the model that has now been enriched by the information extracted from NL requirements. Using a real case study from the financial domain, we evaluate the usefulness of the AC-related model enrichments recommended by our approach. Our evaluation results are very promising: Over our case study system, a group of five domain experts found 89% of the recommended enrichments relevant to AC and yet absent from the original model (precision of 89%). Furthermore, the experts could not pinpoint any additional information in the NL requirements which was relevant to AC but which had not already been brought to their attention by our approach (recall of 100%)</description>
  </item>
  <item rdf:about="http://hdl.handle.net/10993/43895">
    <title>Metaheuristics for the Online Printing Shop Scheduling Problem</title>
    <link>http://hdl.handle.net/10993/43895</link>
    <description>Title: Metaheuristics for the Online Printing Shop Scheduling Problem
&lt;br/&gt;
&lt;br/&gt;Author, co-author: Tessaro Lunardi, Willian; Birgin, Ernesto G.; Ronconi, Débora P.; Voos, Holger
&lt;br/&gt;
&lt;br/&gt;Abstract: In this work, the online printing shop scheduling problem introduced in (Lunardi et al., Mixed Integer Linear Programming and Constraint Programming Models for the Online Printing Shop Scheduling Problem, Computers &amp; Operations Research, to appear) is considered. This challenging real scheduling problem, that emerged in the nowadays printing industry, corresponds to a flexible job shop scheduling problem with sequencing flexibility; and it presents several complicating specificities such as resumable operations, periods of unavailability of the machines, sequence-dependent setup times, partial overlapping between operations with precedence constraints, and fixed operations, among others. A local search strategy and metaheuristic approaches for the problem are proposed and evaluated. Based on a common representation scheme, trajectory and populational metaheuristics are considered. Extensive numerical experiments with large-sized instances show that the proposed methods are suitable for solving practical instances of the problem; and that they outperform a half-heuristic-half-exact off-the-shelf solver by a large extent. Numerical experiments with classical instances of the flexible job shop scheduling problem show that the introduced methods are also competitive when applied to this particular case.</description>
  </item>
</rdf:RDF>

