Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailCzechoslovak Jewish emigrants in the clutches of Luxembourg pre-war migration bureaucracy
Bronec, Jakub UL

in Malach Center for Visual History on its 10th Anniversary: Compendium of Papers of the Prague Visual History and Digital Humanities Conference 2020 (2020, January)

My contribution attempts to find answers to the following questions, among others: How did Luxembourg officials deal with Jewish refugees from Eastern European countries? Did the Luxembourgish authorities ... [more ▼]

My contribution attempts to find answers to the following questions, among others: How did Luxembourg officials deal with Jewish refugees from Eastern European countries? Did the Luxembourgish authorities distinguish or give priority to citizens of particular nations? Who was involved in the approval process? Who played the most active role and collected the most controversial information about Jewish immigrants? [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailWhat's in an Icon? Promises and Pitfalls of Data Protection Iconography
Rossi, Arianna UL; Palmirani, Monica

in Leenes, Ronald; Hallinan, Dara; Gutwirth, Serge (Eds.) et al Data Protection and Privacy: Data Protection and Democracy (2020)

Under the General Data Protection Regulation (GDPR), transparency of information becomes an obligation aimed at creating an ecosystem where data subjects understand and control what happens to their ... [more ▼]

Under the General Data Protection Regulation (GDPR), transparency of information becomes an obligation aimed at creating an ecosystem where data subjects understand and control what happens to their personal data. The definition of transparency stresses its user-centric nature, while design considerations to comply with this obligation assume central importance. This article focuses on the icons established by the GDPR Art. 12.7 to offer “a meaningful overview of the intended processing”. Existing attempts to represent data protection through icons have not met widespread adoption and reasons about the strengths and weaknesses of their creation and evaluation are here discussed. Building on this analysis, we present an empirical research proposing a new icon set that responds to GDPR requirements. The article also discusses the challenges of creating and evaluating such icon set and provides some future directions of research for effective an effective implementation and standardization. [less ▲]

Detailed reference viewed: 96 (10 UL)
Full Text
Peer Reviewed
See detailThe ATAD and the CCTB
Haslehner, Werner UL

in Bizioli, Gianluigi; Grandinetti, Mario; Parada, Leopoldo (Eds.) et al Corporate Taxation, Group Debt Funding and Base Erosion - New Perspectives on the EU Anti-Tax Avoidance Directive (2020)

This short chapter analyses the relationship between the interest limitation rules laid down in the Anti-Tax Avoidance Directive (ATAD) and the Proposed Directive on a Common Corporate Tax Base (CCTB ... [more ▼]

This short chapter analyses the relationship between the interest limitation rules laid down in the Anti-Tax Avoidance Directive (ATAD) and the Proposed Directive on a Common Corporate Tax Base (CCTB). Both are substantially congruent with very few differences in their content. Nevertheless, there are several aspects of the relationship between the two directives that raise fundamental questions as to their respective impacts on national law. Accordingly, this contribution aims to highlight, first, the general relationship between European Union (EU) directives, second, the specific relationship between the ATAD and the CCTB – if and when it is adopted – and, third, comments on the few variations in their respective provisions on interest limitation. [less ▲]

Detailed reference viewed: 38 (0 UL)
Full Text
Peer Reviewed
See detailBosonization for Fermions and Parafermions
Schmidt, Thomas UL

in European Physical Journal. Special Topics (2020), 229

Parafermions are fractional excitations which can be regarded as generalizations of Majorana bound states, but in contrast to the latter they require electron-electron interactions. Compared to Majorana ... [more ▼]

Parafermions are fractional excitations which can be regarded as generalizations of Majorana bound states, but in contrast to the latter they require electron-electron interactions. Compared to Majorana bound states, they offer richer non-Abelian braiding statistics, and have thus been proposed as building blocks for topologically protected universal quantum computation. In this review, we provide a pedagogical introduction to the field of parafermion bound states in one-dimensional systems. We present the necessary theoretical tools for their study, in particular bosonization and the renormalization-group technique, and show how those can be applied to study parafermions. [less ▲]

Detailed reference viewed: 27 (0 UL)
Full Text
Peer Reviewed
See detailIslamic Banking and Economic Growth
Kchouri, Bilal; Lehnert, Thorsten UL

in Rafay, Abdul (Ed.) Handbook of Research on Theory and Practice of Global Islamic Finance (2020)

Detailed reference viewed: 117 (10 UL)
Full Text
Peer Reviewed
See detailConditionality in the European Union External Migration Policy – A Critical Appraisal
Silga, Janine UL

Scientific Conference (2020, January)

Detailed reference viewed: 25 (3 UL)
Full Text
Peer Reviewed
See detailThe economic impact of cross-border work on the municipalities of residence: an example at the French–Luxembourgish border
Pigeron-Piroth, Isabelle UL; Belkacem, Rachid

in Wille, Christian; Nienaber, Birte (Eds.) Border Experiences in Europe. Everyday Life – Working Life – Communication – Languages (2020)

This chapter seeks to investigate whether the proximity of a border can be seen as an engine of regional development, or a disruptive element. The impacts of cross-border activity on demographic evolution ... [more ▼]

This chapter seeks to investigate whether the proximity of a border can be seen as an engine of regional development, or a disruptive element. The impacts of cross-border activity on demographic evolution but also on unemployment or economic activity at the French–Luxembourgish border will be identified. Quantitative data from the municipal level (French census for 2014) will be used, with a special focus on the French border municipality of Longwy (formerly one of the main steel-producing areas in France). [less ▲]

Detailed reference viewed: 21 (4 UL)
Peer Reviewed
See detailWie Zeki zu Göhte kommt : Eine Lehrerkonstruktion der besonderen Art
Arend, Béatrice UL

in Rauh, Bernhard; Weber, Jean-Marie (Eds.) Lehrkräftebildung mit Fack ju Göhte : Junge Lehrerinnen und Lehrer zwischen Adoleszenz und Verantwortung (2020)

Detailed reference viewed: 19 (1 UL)
Full Text
Peer Reviewed
See detailSpillovers to small business credit risk
Wolff, Christian UL

in Small Business Economics (2020)

Do large credit risk shocks spill over to small businesses and affect their real economic activity? Using information on small business credit risk, we find that small businesses show increased default ... [more ▼]

Do large credit risk shocks spill over to small businesses and affect their real economic activity? Using information on small business credit risk, we find that small businesses show increased default and bankruptcy rates following a shock to a customer industry. On an industry level, the shock to a customer industry is followed by a decrease in industry markups, disproportionate closure of firms, and cutbacks in inventories. Our analysis quantifies the elevated credit risk among small businesses and suggests a non-negligible 0.83% increase in expected losses on a diversified loan portfolio following a credit risk shock. This study provides banks and supervisors with greater clarity on timing and on the extent of elevated small business credit risk. It also allows them to assess the exposure of a bank portfolio to fluctuations in small business default rate. Such improved default prediction reduces credit rationing to the small business economy. [less ▲]

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailThe Potential Short- and Long-Term Disruptions and Transformative Impacts of 5G and Beyond Wireless Networks: Lessons Learnt from the Development of a 5G Testbed Environment
PATWARY, MOHMAMMAD; NAWAZ, SYED JUNAID; RAHMAN, MD. ABDUR et al

in IEEE Access (2020)

The capacity and coverage requirements for 5th generation (5G) and beyond wireless connectivity will be significantly different from the predecessor networks. To meet these requirements, the anticipated ... [more ▼]

The capacity and coverage requirements for 5th generation (5G) and beyond wireless connectivity will be significantly different from the predecessor networks. To meet these requirements, the anticipated deployment cost in the United Kingdom (UK) is predicted to be between £30bn and £50bn, whereas the current annual capital expenditure (CapEX) of the mobile network operators (MNOs) is £2.5bn. This prospect has vastly impacted and has become one of the major delaying factors for building the 5G physical infrastructure, whereas other areas of 5G are progressing at their speed. Due to the expensive and complicated nature of the network infrastructure and spectrum, the second-tier operators, widely known as mobile virtual network operators (MVNO), are entirely dependent on the MNOs. In this paper, an extensive study is conducted to explore the possibilities of reducing the 5G deployment cost and developing viable business models. In this regard, the potential of infrastructure, data, and spectrum sharing is thoroughly investigated. It is established that the use of existing public infrastructure (e.g., streetlights, telephone poles, etc.) has a potential to reduce the anticipated cost by about 40% to 60%. This paper also reviews the recent Ofcom initiatives to release location-based licenses of the 5G-compatible radio spectrum. Our study suggests that simplification of infrastructure and spectrum will encourage the exponential growth of scenario-specific cellular networks (e.g., private networks, community networks, micro-operators) and will potentially disrupt the current business models of telecommunication business stakeholders – specifically MNOs and TowerCos. Furthermore, the anticipated dense device connectivity in 5G will increase the resolution of traditional and non-traditional data availability significantly. This will encourage extensive data harvesting as a business opportunity and function within small and medium-sized enterprises (SMEs) as well as large social networks. Consequently, the rise of new infrastructures and spectrum stakeholders is anticipated. This will fuel the development of a 5G data exchange ecosystem where data transactions are deemed to be high-value business commodities. The privacy and security of such data, as well as definitions of the associated revenue models and ownership, are challenging areas – and these have yet to emerge and mature fully. In this direction, this paper proposes the development of a unified data hub with layered structured privacy and security along with blockchain and encrypted off-chain based ownership/royalty tracking. Also, a data economy-oriented business model is proposed. The study found that with the potential commodification of data and data transactions along with the low-cost physical infrastructure and spectrum, the 5G network will introduce significant disruption in the Telco business ecosystem. [less ▲]

Detailed reference viewed: 69 (4 UL)
Peer Reviewed
See detailSoft law, effectiveness of fundamental rights and migration: how effective are migrants’ fundamental rights in an era of European governance
Mavrouli, Roila UL

in Current Challenges in Migration Policy and Law, Edited by Emília Lana de Freitas Castro and Sergio Maia Tavares, Published in London, England, ISBN: 978-1-910781-77-7 (2020)

Detailed reference viewed: 15 (4 UL)
Full Text
See detailKatrin Becker, Was tun Sie?
Becker, Katrin UL

in forum für Politik, Gesellschaft und Kultur (2020), 402

Detailed reference viewed: 18 (0 UL)
Full Text
Peer Reviewed
See detailA Multi-Hop Broadcast Wave Approach for Floating Car Data Collection in Vehicular Networks
Turcanu, Ion UL; Salvo, Pierpaolo; Baiocchi, Andrea et al

in Vehicular Communications (2020)

Inter-Vehicle Communication (IVC) is bringing connected and cooperative mobility closer to reality. Vehicles today are able to produce huge amounts of information, known in the literature as Floating Car ... [more ▼]

Inter-Vehicle Communication (IVC) is bringing connected and cooperative mobility closer to reality. Vehicles today are able to produce huge amounts of information, known in the literature as Floating Car Data (FCD), containing status information gathered from sensing the internal condition of the vehicle and the external environment. Adding networking capabilities to vehicles allows them to share this information among themselves and with the infrastructure. Collecting real-time FCD information from vehicles opens up the possibility of having access to an enormous amount of useful information that can boost the development of innovative services and applications in the domain of Intelligent Transportation System (ITS). In this paper we propose several solutions to efficiently collect real-time FCD information in Dedicated Short-Range Communication (DSRC)-enabled Vehicular Ad Hoc Networks (VANETs). The goal is to improve the efficiency of the FCD collection operation while keeping the impact on the DSRC communication channel as low as possible. We do this by exploiting a slightly modified version of a standardized data dissemination protocol to create a backbone of relaying vehicles that, by following local rules, generate a multi-hop broadcast wave of collected FCD messages. The proposed protocols are evaluated via realistic simulations under different vehicular densities and urban scenarios. [less ▲]

Detailed reference viewed: 21 (2 UL)
Full Text
Peer Reviewed
See detailIdentification of pathogenic variant enriched regions across genes and gene families
Perez-Palma, Eduardo; May, Patrick UL; Iqbal, Sumaiya et al

in Genome Research (2020), 30(1), 62-71

Missense variant interpretation is challenging. Essential regions for protein function are conserved among gene family members, and genetic variants within these regions are potentially more likely to ... [more ▼]

Missense variant interpretation is challenging. Essential regions for protein function are conserved among gene family members, and genetic variants within these regions are potentially more likely to confer risk to disease. Here, we generated 2,871 gene family protein sequence alignments involving 9,990 genes and performed missense variant burden analyses to identify novel essential protein regions. We mapped 2,219,811 variants from the general population into these alignments and compared their distribution with 76,153 missense variants from patients. With this gene family approach, we identified 465 regions enriched for patient variants spanning 41,463 amino acids in 1,252 genes. As a comparison, testing the same genes individually we identified less patient variant enriched regions involving only 2,639 amino acids and 215 genes. Next, we selected de novo variants from 6,753 patients with neurodevelopmental disorders and 1,911 unaffected siblings, and observed an 8.33-fold enrichment of patient variants in our identified regions (95% C.I.=3.90-Inf, p-value = 2.72x10-11). Using the complete ClinVar variant set, we found that missense variants inside the identified regions are 106-fold more likely to be classified as pathogenic in comparison to benign classification (OR = 106.15, 95% C.I = 70.66-Inf, p-value < 2.2 x 10-16). All pathogenic variant enriched regions (PERs) identified are available online through the “PER viewer” a user-friendly online platform for interactive data mining, visualization and download. In summary, our gene family burden analysis approach identified novel pathogenic variant enriched regions in protein sequences. This annotation can empower variant interpretation. [less ▲]

Detailed reference viewed: 190 (2 UL)
See detailComportement suicidaire des adolescents au Luxembourg
Catunda, Carolina UL

Conference given outside the academic context (2020)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailChronique Principes du droit administrative européen
Neframi, Eleftheria UL

in Revue Française d'Administration Publique (2020)

Detailed reference viewed: 9 (0 UL)
Full Text
See detailKölner Kommentar zum Aktiengesetz
Zetzsche, Dirk Andreas UL; Noack, Ulrich

Book published by Carl Heymanns - 4. Auflage (2020)

Detailed reference viewed: 7 (0 UL)
See detailReading the history of society through the lens of a history of sexuality
De Silva, Adrian UL

in Andererseits: yearbook of transatlantic German studies (2020), 7/8(2018/2019), 393-396

Detailed reference viewed: 75 (14 UL)
Full Text
Peer Reviewed
See detailCoercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme
Roenne, Peter UL; Atashpendar, Arash UL; Kristian, Gjøsteen et al

in Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (2020)

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE ... [more ▼]

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The pairwise comparison-based approach of JCJ using plaintext equivalence tests leads to a quadratic blow-up in the number of votes, which makes the tallying process rather impractical in realistic settings with a large number of voters. We show how the removal of invalid votes can be done in linear time via a solution based on recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE. We conclude by touching upon some of the advantages and challenges of such an approach, followed by a discussion of further security and post-quantum considerations. [less ▲]

Detailed reference viewed: 277 (76 UL)