Results 21-40 of 5514.
Bookmark and Share    
See detailEU Executive Discretion and the Limits of Law
Mendes, Joana UL

Book published by Oxford University Press (in press)

Detailed reference viewed: 176 (8 UL)
Full Text
Peer Reviewed
See detailA stochastic Galerkin cell-based smoothed finite element method (SGCS-FEM)
Mathew, Tittu; Beex, Lars UL; Bordas, Stéphane UL et al

in International Journal of Computational Methods (in press)

In this paper, the cell based smoothed finite element method is extended to solve stochastic partial diff erential equations with uncertain input parameters. The spatial field of Young's moduli and the ... [more ▼]

In this paper, the cell based smoothed finite element method is extended to solve stochastic partial diff erential equations with uncertain input parameters. The spatial field of Young's moduli and the corresponding stochastic results are represented by Karhunen-Lo eve expansion and polynomial chaos expansion, respectively. The Young's Modulus of structure is considered to be random for stochastic static as well as free vibration problems. Mathematical expressions and the solution procedure are articulated in detail to evaluate the statistical characteristics of responses in terms of static displacements and free vibration frequencies. The feasibility and eff ectiveness of the proposed SGCS-FEM method in terms of accuracy and lower requirement on the mesh size in the solution domain over that of conventional FEM for stochastic problems are demonstrated by carefully chosen numerical examples. From the numerical study, it is inferred that the proposed framework is computationally less demanding without compromising accuracy. [less ▲]

Detailed reference viewed: 75 (0 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 102 (0 UL)
Full Text
Peer Reviewed
See detailMultiple Sets Exponential Concentration and Higher Order Eigenvalues
Gozlan, Nathael; Herry, Ronan UL

in Potential Analysis (in press)

On a generic metric measured space, we introduce a notion of improved concentration of measure that takes into account the parallel enlargement of k distinct sets. We show that the k-th eigenvalues of the ... [more ▼]

On a generic metric measured space, we introduce a notion of improved concentration of measure that takes into account the parallel enlargement of k distinct sets. We show that the k-th eigenvalues of the metric Laplacian gives exponential improved concentration with k sets. On compact Riemannian manifolds, this allows us to recover estimates on the eigenvalues of the Laplace-Beltrami operator in the spirit of an inequality of Chung, Grigor’yan & Yau, Upper bounds for eigenvalues of the discrete and continuous Laplace operators. Adv. Math. 117(2), 165–178 (1996). [less ▲]

Detailed reference viewed: 75 (4 UL)
Full Text
Peer Reviewed
See detailUsing crowdsourced data to explore the linguistic landscape of cities. Results from the participatory research project Lingscape
Purschke, Christoph UL

in Brunn, Stanley; Kehrein, Roland (Eds.) Handbook of the Changing World Language Map (in press)

Detailed reference viewed: 64 (1 UL)
See detailSklaverei war gestern? Menschenhandel im Europa des 21. Jahrhunderts
Veit, Charlotte UL; Nienaber, Birte UL

in Binsfeld, Andrea; Ghetta, Marcello (Eds.) Sklaverei und Identität (in press)

Detailed reference viewed: 64 (0 UL)
Full Text
Peer Reviewed
See detailCase Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in 3rd Central European Cybersecurity Conference (in press)

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples ... [more ▼]

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples by hand to discover whether they are malware does not scale, so antivirus companies automate the process e.g., using sand- boxes where samples can be run, observed, and classified. Malware authors are aware of this fact, and try to evade detection. In this paper we describe one of such evasion technique: unprecedented, we discovered it while analyzing a ransomware sample. Analyzed in a Cuckoo Sandbox, the sample was able to avoid triggering malware indicators, thus scoring significantly below the minimum severity level. Here, we discuss what strategy the sample follows to evade the analysis, proposing practical defense methods to nullify, in our turn, the sample’s furtive strategy. [less ▲]

Detailed reference viewed: 57 (8 UL)
Full Text
Peer Reviewed
See detailFescher als dein Schatten. Zur Präsenz des Deutschen in Österreich in der Alltagspraxis
Purschke, Christoph UL

in Hundt, Markus; Kleene, Andrea; Plewnia, Albrecht (Eds.) et al Regiolekte – Objektive Sprachdaten und subjektive Wahrnehmung (in press)

Detailed reference viewed: 48 (4 UL)
Full Text
Peer Reviewed
See detailAn efficient approach towards the source-target control of Boolean networks
Paul, Soumya UL; Su, Cui UL; Pang, Jun UL et al

in IEEE/ACM Transactions on Computational Biology and Bioinformatics (in press)

We study the problem of computing a minimal subset of nodes of a given asynchronous Boolean network that need to be perturbed in a single-step to drive its dynamics from an initial state to a target ... [more ▼]

We study the problem of computing a minimal subset of nodes of a given asynchronous Boolean network that need to be perturbed in a single-step to drive its dynamics from an initial state to a target steady state (or attractor), which we call the source-target control of Boolean networks. Due to the phenomenon of state-space explosion, a simple global approach that performs computations on the entire network, may not scale well for large networks. We believe that efficient algorithms for such networks must exploit the structure of the networks together with their dynamics. Taking this view, we derive a decomposition-based solution to the minimal source-target control problem which can be significantly faster than the existing approaches on large networks. We then show that the solution can be further optimised if we take into account appropriate information about the source state. We apply our solutions to both real-life biological networks and randomly generated networks, demonstrating the efficiency and efficacy of our approach. [less ▲]

Detailed reference viewed: 55 (8 UL)
Full Text
Peer Reviewed
See detailCoercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme
Roenne, Peter UL; Atashpendar, Arash UL; Kristian, Gjøsteen et al

in Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (in press)

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE ... [more ▼]

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The pairwise comparison-based approach of JCJ using plaintext equivalence tests leads to a quadratic blow-up in the number of votes, which makes the tallying process rather impractical in realistic settings with a large number of voters. We show how the removal of invalid votes can be done in linear time via a solution based on recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE. We conclude by touching upon some of the advantages and challenges of such an approach, followed by a discussion of further security and post-quantum considerations. [less ▲]

Detailed reference viewed: 260 (70 UL)
Full Text
Peer Reviewed
See detailThe Effect of Rating Scale on Response Style: Experimental Evidence for Job Satisfaction
Joxhe, Majlinda UL; Corrado, Luisa

in Journal of Well-Being Assessment (in press)

This paper explores the relationship between rating scales and response style using experimental data from a sample of 1500 households of the Innovation Panel (2008) which is part of the Understanding ... [more ▼]

This paper explores the relationship between rating scales and response style using experimental data from a sample of 1500 households of the Innovation Panel (2008) which is part of the Understanding Society database. Two random groups of individuals are being asked about their level of job satisfaction using a self-assessment questionnaire through two (7 and 11 points) rating options. By comparing the two groups, we explore the effects of the different rating scales on Extreme Response Style (ERS). The experimental design of the data enables us to show that both high and low Extreme Response Style (ERS) are correlated with personal and demographic characteristics. In addition, when comparing the shorter to a longer scale, we show that the survey design may generates tendency to choose responses at the extreme values of the distribution. [less ▲]

Detailed reference viewed: 63 (2 UL)
Full Text
Peer Reviewed
See detailInternationale Disability Studies
Biermann, Julia; Powell, Justin J W UL

in Waldschmidt, Anne (Ed.) Handbuch Disability Studies (in press)

Der Beitrag zeichnet internationale Entwicklungen in den Disability Studies nach. Aufgrund der Bedeutung für die Entstehung und weltweite Verbreitung des multidisziplinären Forschungsfelds liegt der Fokus ... [more ▼]

Der Beitrag zeichnet internationale Entwicklungen in den Disability Studies nach. Aufgrund der Bedeutung für die Entstehung und weltweite Verbreitung des multidisziplinären Forschungsfelds liegt der Fokus auf den englischsprachigen Diskursen. Skizziert werden drei historische Phasen: die Etablierung der Disability Studies in den 1970er und 1980er Jahren, die Ausdifferenzierung in den 1990er und 2000er Jahren sowie die Pluralisierung seit den 2010er Jahren. [less ▲]

Detailed reference viewed: 44 (3 UL)
Full Text
Peer Reviewed
See detailA Note on Stein’s Overreaction Puzzle
Lin, Yuehao; Lehnert, Thorsten UL

in Decisions in Economics and Finance (in press)

Recently, Christoffersen et al. (2013) argue that the overreaction puzzle of Stein (1989) can be explained by a variance-dependent pricing kernel. In this note, we challenge this view. Our theoretical ... [more ▼]

Recently, Christoffersen et al. (2013) argue that the overreaction puzzle of Stein (1989) can be explained by a variance-dependent pricing kernel. In this note, we challenge this view. Our theoretical results are in line with their argument that the variance under risk-neutral measure is more persistent than the variance under physical measure due to a negative variance risk premium. But our results do not support their argument that the more persistent variance is able to qualitatively explain Stein’s findings. We show theoretically that the persistence of the volatility cannot amplify the movements of long-term variance to short-term fluctuations in variance, and, therefore, conclude that Stein’s overreaction puzzle is still unsolved. [less ▲]

Detailed reference viewed: 76 (1 UL)
Full Text
See detailThe ICO Goldrush - A challenge for Regulators
Zetzsche, Dirk Andreas UL; Buckley, R; Arner, D. et al

in Harvard International Law Journal (in press)

Detailed reference viewed: 122 (9 UL)
Full Text
Peer Reviewed
See detailThe Identity Challenge in Finance: From Analogue Identity to Digitized Identification to Digital KYC Utilities
Zetzsche, Dirk Andreas UL; Arner, Douglas W.; Buckley, Ross P. et al

in European Business Organization Law Review (in press)

Detailed reference viewed: 146 (5 UL)
Full Text
Peer Reviewed
See detailAn Agile Approach to Validate a Formal Representation of the GDPR
Bartolini, Cesare UL; Lenzini, Gabriele UL; Santos, Cristiana

in New Frontiers in Artificial Intelligence (in press)

Modelling in a knowledge base of logic formulæ the articles of the GDPR enables a semi-automatic reasoning of the Regulation. To be legally substantiated, it requires that the formulæ express validly the ... [more ▼]

Modelling in a knowledge base of logic formulæ the articles of the GDPR enables a semi-automatic reasoning of the Regulation. To be legally substantiated, it requires that the formulæ express validly the legal meaning of the Regulation's articles. But legal experts are usually not familiar with logic, and this calls for an interdisciplinary validation methodology that bridges the communication gap between formal modelers and legal evaluators. We devise such a validation methodology and exemplify it over a knowledge base of articles of the GDPR translated into Reified I/O (RIO) logic and encoded in LegalRuleML. A pivotal element of the methodology is a human-readable intermediate representation of the logic formulæ that preserves the formulæ's meaning, while rendering it in a readable way to non-experts. After being applied over a use case, we prove that it is possible to retrieve feedback from legal experts about the formal representation of Art. 5.1a and Art. 7.1. What emerges is an agile process to build logic knowledge bases of legal texts, and to support their public trust, which we intend to use for a logic model of the GDPR, called DAPRECO knowledge base. [less ▲]

Detailed reference viewed: 151 (23 UL)
Full Text
Peer Reviewed
See detailCan the Plight of the European Banking Structural Reforms be a Blessing in Disguise?
Nabilou, Hossein UL

in European Business Organization Law Review (in press)

One of the problems perceived to be at the heart of the global financial crisis was an amalgamation of various commercial and investment banking activities under one entity, as well as the ... [more ▼]

One of the problems perceived to be at the heart of the global financial crisis was an amalgamation of various commercial and investment banking activities under one entity, as well as the interconnectedness of the banking entities with other financial institutions, investment funds, and the shadow banking system. This paper focuses on various measures that aim to structurally separate the banking entities and their core functions from riskier financial activities such as (proprietary) trading or investments in alternative investment funds. Although banking structural reforms in the EU, UK, and the US have taken different forms, their common denominator is the separation of core banking functions from certain trading or securities market activities. Having reviewed the arguments for and against banking structural reforms and their varieties in major jurisdictions, including the EU, UK, US, France, and Germany, the paper argues that a more nuanced approach to introducing such measures at the EU level is warranted. Given the different market structures across the Atlantic and the lack of conclusive evidence on the beneficial impact of banking structural reforms, the paper concludes that the withdrawal of the banking structural reforms proposal by the European Commission has been a prudent move. It seems that in the absence of concrete evidence, experimenting with structural reforms at the Member-State level would be less costly and would provide for opportunities for learning from smaller mistakes that could pave the way for a more optimal approach to introducing banking structural reforms at the European level in the future. [less ▲]

Detailed reference viewed: 72 (6 UL)
Full Text
Peer Reviewed
See detailRegional foreign banks and financial inclusion: Evidence from Africa
Leon, Florian UL; Zins, Alexandra

in Economic Modelling (in press)

Regional foreign banks expanded quickly over the past decade in developing and emerging countries and have a growing influence in banking systems. We question whether the development of African regional ... [more ▼]

Regional foreign banks expanded quickly over the past decade in developing and emerging countries and have a growing influence in banking systems. We question whether the development of African regional foreign banks, also called Pan-African banks, influences financial inclusion of firms and households. To this end, we combine the World Bank Global Findex database and the World Bank Enterprise Surveys with a hand-collected database on the presence of regional foreign banks. We find that Pan-African banks presence increases firms’ access to credit and limited evidence that they favor financial access of the middle class by restoring confidence in banks. We suggest that this impact is related to the adoption of an aggressive strategy aiming at gaining market shares rather than through the exploitation of informational and technological advantages. [less ▲]

Detailed reference viewed: 87 (3 UL)
Peer Reviewed
See detailCommentary on the authorization of investment firms under MiFID
Zetzsche, Dirk Andreas UL; Nast, Dominik

in Lehmann, Mathias; Kumpan, Christoph (Eds.) European Financial Services Law (in press)

Detailed reference viewed: 53 (1 UL)