Last 7 days
![]() Shirani, Arsalan ![]() ![]() in Fluid Dynamics & Material Processing (in press) The application of air-based heating systems as a possible approach to reduce the construction costs in highly efficient residential buildings is becoming popular. Air-based heating systems have been well ... [more ▼] The application of air-based heating systems as a possible approach to reduce the construction costs in highly efficient residential buildings is becoming popular. Air-based heating systems have been well-known for their usage in passive houses during the past three decades. Available studies on such systems tend mostly to focus only on comparing exhaust air heat pump technology with conventional systems in efficient buildings. Moreover, most of the existing studies ignore the usual presence of the electrical heaters as backup. Besides, a comprehensive study and comparison between different air-based heating system concepts is still missing. In this study, four different air-based heating system concepts separated by the type of heat source of heat pump for heating and domestic hot water are defined. These systems are compared to four conventional heating system, including floor heating and direct electrical system employing dynamic annual simulations. According to simulation results, the systems with floor heating have shown the best system efficiencies and the lowest energy demand in comparison to the other systems. The main reason for this was the lower supply temperatures of the floor heating systems. Between the air heating systems, the system equipped with an outdoor air heat pump showed a better energy performance than an exhaust air system. The main reason for this could be attributed to the power limitation of exhaust air heat pump systems. [less ▲] Detailed reference viewed: 72 (4 UL)![]() Abeles, Solal ![]() Book published by École française de Rome (in press) Detailed reference viewed: 26 (1 UL)![]() Belgacem, Hichem ![]() ![]() in ACM Transactions on Software Engineering and Methodology (in press) Users frequently interact with software systems through data entry forms. However, form filling is time-consuming and error-prone. Although several techniques have been proposed to auto-complete or pre ... [more ▼] Users frequently interact with software systems through data entry forms. However, form filling is time-consuming and error-prone. Although several techniques have been proposed to auto-complete or pre-fill fields in the forms, they provide limited support to help users fill categorical fields, i.e., fields that require users to choose the right value among a large set of options. In this paper, we propose LAFF, a learning-based automated approach for filling categorical fields in data entry forms. LAFF first builds Bayesian Network models by learning field dependencies from a set of historical input instances, representing the values of the fields that have been filled in the past. To improve its learning ability, LAFF uses local modeling to effectively mine the local dependencies of fields in a cluster of input instances. During the form filling phase, LAFF uses such models to predict possible values of a target field, based on the values in the already-filled fields of the form and their dependencies; the predicted values (endorsed based on field dependencies and prediction confidence) are then provided to the end-user as a list of suggestions. We evaluated LAFF by assessing its effectiveness and efficiency in form filling on two datasets, one of them proprietary from the banking domain. Experimental results show that LAFF is able to provide accurate suggestions with a Mean Reciprocal Rank value above 0.73. Furthermore, LAFF is efficient, requiring at most 317 ms per suggestion. [less ▲] Detailed reference viewed: 132 (30 UL)![]() Deprez, Laurens ![]() in European Journal of Operational Research (in press) We provide a data-driven framework to conduct a risk assessment, including data pre-processing, exploration, and statistical modeling, on a portfolio of full-service maintenance contracts. These contracts ... [more ▼] We provide a data-driven framework to conduct a risk assessment, including data pre-processing, exploration, and statistical modeling, on a portfolio of full-service maintenance contracts. These contracts cover all maintenance-related costs for a fixed, upfront fee during a predetermined horizon. Charging each contract a price proportional to its risk prevents adverse selection by incentivizing low risk (i.e., maintenance-light) profiles to not renege on their agreements. We borrow techniques from non-life insurance pricing and tailor them to the setting of maintenance contracts to assess the risk and estimate the expected maintenance costs under a full-service contract. We apply the framework on a portfolio of about 5 000 full-service contracts of industrial equipment and show how a data-driven analysis based on contract and machine characteristics, or risk factors, supports a differentiated, risk-based break-even tariff plan. We employ generalized additive models (GAMs) to predict the risk factors’ impact on the frequency (number of) and severity (cost) of maintenance interventions. GAMs are interpretable yet flexible statistical models that capture the effect of both continuous and categorical risk factors. Our predictive models quantify the impact of the contract and machine type, service history, and machine running hours on the contract cost. We additionally utilize the predictive cost distributions of our models to augment the break-even price with the appropriate risk margins to further protect against the inherently stochastic nature of the maintenance costs. The framework shows how maintenance intervention data can set up a differentiated tariff plan. [less ▲] Detailed reference viewed: 35 (0 UL)![]() Bongard, Kerstin ![]() ![]() in 2022 7th IEEE European Symposium on Security and Privacy Workshops (EuroSPW) (in press) App permission requests are a control mechanism meant to help users oversee and safeguard access to data and resources on their smartphones. To decide whether to accept or deny such requests and make this ... [more ▼] App permission requests are a control mechanism meant to help users oversee and safeguard access to data and resources on their smartphones. To decide whether to accept or deny such requests and make this consent valid, users need to understand the underlying reasons and judge the relevance of disclosing data in line with their own use of an app. This study investigates people’s certainty about app permission requests via an online survey with 400 representative participants of the UK population. The results demonstrate that users are uncertain about the necessity of granting app permissions for about half of the tested permission requests. This implies substantial privacy risks, which are discussed in the paper, resulting in a call for user-protecting interventions by privacy engineers. [less ▲] Detailed reference viewed: 95 (15 UL)![]() ; Fisch, Christian ![]() in Management Review Quarterly (in press) Replication studies are important for the empirical research process. Yet, while there is an increased awareness of the need for replication in management research, it appears that such studies are rarely ... [more ▼] Replication studies are important for the empirical research process. Yet, while there is an increased awareness of the need for replication in management research, it appears that such studies are rarely published in leading management journals. Importantly, we lack a comprehensive overview of replication studies in the top management journals that spans all sub-disciplines. Our systematic review closes this gap and provides an overview of the prevalence, types, outcomes, and impact of replication studies in management journals. We find that differences in the prevalence of replications between sub-disciplines exist and that most replications are wide replications. With regard to the replication outcome, our review shows that the share of non-confirming replications is low. Moreover, such replications are cited less often than confirming replications pointing towards a confirmation bias in management research. We discuss the implications of our results for authors, reviewers, and editors of management journals. [less ▲] Detailed reference viewed: 43 (2 UL)![]() ; Nguyen, van Dinh ![]() in IEEE Network (in press) The convergence of mobile edge computing (MEC) and blockchain is transforming the current computing services in wireless Internet-of-Things networks, by enabling task offloading with security enhancement ... [more ▼] The convergence of mobile edge computing (MEC) and blockchain is transforming the current computing services in wireless Internet-of-Things networks, by enabling task offloading with security enhancement based on blockchain mining. Yet the existing approaches for these enabling technologies are isolated, providing only tailored solutions for specific services and scenarios. To fill this gap, we propose a novel cooperative task offloading and blockchain mining (TOBM) scheme for a blockchain-based MEC system, where each edge device not only handles computation tasks but also deals with block mining for improving system utility. To address the latency issues caused by the blockchain operation in MEC, we develop a new Proof-of-Reputation consensus mechanism based on a lightweight block verification strategy. To accommodate the highly dynamic environment and high-dimensional system state space, we apply a novel distributed deep reinforcement learning-based approach by using a multi-agent deep deterministic policy gradient algorithm. Experimental results demonstrate the superior performance of the proposed TOBM scheme in terms of enhanced system reward, improved offloading utility with lower blockchain mining latency, and better system utility, compared to the existing cooperative and non-cooperative schemes. The paper concludes with key technical challenges and possible directions for future blockchain-based MEC research. [less ▲] Detailed reference viewed: 60 (10 UL)![]() Janz, Nina ![]() Speeches/Talks (2023) The military offensive launched by the Russian Federation against Ukraine in the early hours of 24 February 2022 and the ensuing war on Ukrainian territory have resulted in immense human suffering, a ... [more ▼] The military offensive launched by the Russian Federation against Ukraine in the early hours of 24 February 2022 and the ensuing war on Ukrainian territory have resulted in immense human suffering, a humanitarian tragedy and incalculable material damage. The violation of a country’s territorial integrity and sovereignty – an act in clear breach of the United Nations Charter – has shattered the shared framework of values and principles fostered by multilateralism after the Second World War in the hope of achieving world peace, while leading to an unprecedented outpouring of solidarity for Ukraine and the plight of its people from Western democracies and European and international organisations, including NATO, the UN, the European Union and the Council of Europe, and their Member States and private initiatives. As contemporary history is turned on its head, historians, driven by the duty of memory, are stepping up to explain the origins of the conflict, identify the various players, provide an objective analysis of the consequences, record the memories of eyewitnesses and victims – with oral history proving a precious tool –, preserve historical sources and, above all, reflect on the role that intellectual effort can play in paving the way for a return to peace in the new world order taking shape before our eyes. [less ▲] Detailed reference viewed: 46 (7 UL)![]() Nurunnabi, Abdul Awal Md ![]() ![]() Scientific Conference (2023, October 07) Detailed reference viewed: 28 (0 UL)![]() Kirsch, Claudine ![]() ![]() in Meier, Jörg; İnci, Dirim; Blaschitz, Verena (Eds.) Handbuch Mehrsprachigkeit (2023) Detailed reference viewed: 63 (6 UL)![]() Pascoal, Túlio ![]() in Proceedings on Privacy Enhancing Technologies (2023) Genome-wide Association Studies (GWASes) identify genomic variations that are statistically associated with a trait, such as a disease, in a group of individuals. Unfortunately, careless sharing of GWAS ... [more ▼] Genome-wide Association Studies (GWASes) identify genomic variations that are statistically associated with a trait, such as a disease, in a group of individuals. Unfortunately, careless sharing of GWAS statistics might give rise to privacy attacks. Several works attempted to reconcile secure processing with privacy-preserving releases of GWASes. However, we highlight that these approaches remain vulnerable if GWASes utilize overlapping sets of individuals and genomic variations. In such conditions, we show that even when relying on state-of-the-art techniques for protecting releases, an adversary could reconstruct the genomic variations of up to 28.6% of participants, and that the released statistics of up to 92.3% of the genomic variations would enable membership inference attacks. We introduce I-GWAS, a novel framework that securely computes and releases the results of multiple possibly interdependent GWASes. I-GWAS continuously releases privacy-preserving and noise-free GWAS results as new genomes become available. [less ▲] Detailed reference viewed: 54 (11 UL)![]() Sikk, Kaarel ![]() Doctoral thesis (2023) Despite research history spanning more than a century, settlement patterns still hold a promise to contribute to the theories of large-scale processes in human history. Mostly they have been presented as ... [more ▼] Despite research history spanning more than a century, settlement patterns still hold a promise to contribute to the theories of large-scale processes in human history. Mostly they have been presented as passive imprints of past human activities and spatial interactions they shape have not been studied as the driving force of historical processes. While archaeological knowledge has been used to construct geographical theories of evolution of settlement there still exist gaps in this knowledge. Currently no theoretical framework has been adopted to explore them as spatial systems emerging from micro-choices of small population units. The goal of this thesis is to propose a conceptual model of adaptive settlement systems based on complex adaptive systems framework. The model frames settlement system formation processes as an adaptive system containing spatial features, information flows, decision making population units (agents) and forming cross scale feedback loops between location choices of individuals and space modified by their aggregated choices. The goal of the model is to find new ways of interpretation of archaeological locational data as well as closer theoretical integration of micro-level choices and meso-level settlement structures. The thesis is divided into five chapters, the first chapter is dedicated to conceptualisation of the general model based on existing literature and shows that settlement systems are inherently complex adaptive systems and therefore require tools of complexity science for causal explanations. The following chapters explore both empirical and theoretical simulated settlement patterns based dedicated to studying selected information flows and feedbacks in the context of the whole system. Second and third chapters explore the case study of the Stone Age settlement in Estonia comparing residential location choice principles of different periods. In chapter 2 the relation between environmental conditions and residential choice is explored statistically. The results confirm that the relation is significant but varies between different archaeological phenomena. In the third chapter hunter-fisher-gatherer and early agrarian Corded Ware settlement systems were compared spatially using inductive models. The results indicated a large difference in their perception of landscape regarding suitability for habitation. It led to conclusions that early agrarian land use significantly extended land use potential and provided a competitive spatial benefit. In addition to spatial differences, model performance was compared and the difference was discussed in the context of proposed adaptive settlement system model. Last two chapters present theoretical agent-based simulation experiments intended to study effects discussed in relation to environmental model performance and environmental determinism in general. In the fourth chapter the central place foragingmodel was embedded in the proposed model and resource depletion, as an environmental modification mechanism, was explored. The study excluded the possibility that mobility itself would lead to modelling effects discussed in the previous chapter. The purpose of the last chapter is the disentanglement of the complex relations between social versus human-environment interactions. The study exposed non-linear spatial effects expected population density can have on the system and the general robustness of environmental inductive models in archaeology to randomness and social effect. The model indicates that social interactions between individuals lead to formation of a group agency which is determined by the environment even if individual cognitions consider the environment insignificant. It also indicates that spatial configuration of the environment has a certain influence towards population clustering therefore providing a potential pathway to population aggregation. Those empirical and theoretical results showed the new insights provided by the complex adaptive systems framework. Some of the results, including the explanation of empirical results, required the conceptual model to provide a framework of interpretation. [less ▲] Detailed reference viewed: 127 (17 UL)![]() Norouzian, Mohammadhossein ![]() in Advanced joining processes (2023), 7 Laser beam welding of miscellaneous material combinations is an effective joining technology useful for diverse industrial applications because it can provide high speed, flexibility, and precision ... [more ▼] Laser beam welding of miscellaneous material combinations is an effective joining technology useful for diverse industrial applications because it can provide high speed, flexibility, and precision. However, welding defects like solidification cracking are some of the challenges in the joining process. The past decade has seen an extended effort to deal with this issue in many studies. However, there remains to be more comprehensive research regarding preventive procedures for solidification cracking by changing the grain structure. Following a thorough understanding of the solidification crack mechanism theories, we reviewed recent research on the critical role of metallurgical factors in the solidification cracks during laser welding. It considers the influence of the grain structure, intermetallic compounds, and laser welding parameters to propose preventive procedures to suppress the solidification cracks. Recent achievements show grain refiners, laser beam oscillation, ultrasonic vibration, and implementation of double laser sources are the main strategies that suppress or minimize solidification cracks. Furthermore, in laser beam welding of dissimilar materials, like steel-hard metal and copper-aluminum, brittle intermetallic compounds are recognized as one of the main reasons for the solidification crack susceptible increment. Recent approaches to overcome the formation or reduce the number of intermetallic compounds through various laser parameters and setups are discussed. [less ▲] Detailed reference viewed: 32 (8 UL)![]() Pantazatou, Aikaterini ![]() in Harris, Peter; de Cogan, Dominic; Brassey, Alexis (Eds.) Tax Law in Times of Crisis and Recovery (2023) Detailed reference viewed: 28 (1 UL)![]() Zaagsma, Gerben ![]() Presentation (2023, April 28) This paper will explore a key question for historians today: what are the politics of cultural heritage digitisation and its implications for historical research? What are the benefits and opportunities ... [more ▼] This paper will explore a key question for historians today: what are the politics of cultural heritage digitisation and its implications for historical research? What are the benefits and opportunities afforded by digitisation and what challenges arise? How do digital resources shape the historical themes, topics, and debates that can be researched, and how might they influence research agendas more broadly? In what ways can they enable us to ask new research questions or open avenues of inquiry that challenge existing master narratives? Can digital resources facilitate research into transnational histories when most digitization projects are still nationally framed? In short, what biases might digital archives introduce in our work and how does that differ from issues of bias and selection in the ‘paper’ archive? To address questions such as these, I will discuss several key parameters of the politics of digitisation set within a broader historical and global context. [less ▲] Detailed reference viewed: 30 (0 UL)![]() Mingo Ndiwago, Damian ![]() ![]() Scientific Conference (2023, April 24) Detailed reference viewed: 49 (3 UL)![]() Dawes, Joshua ![]() ![]() in Dawes, Joshua; Shin, Donghwan; Bianculli, Domenico (Eds.) Towards Log Slicing (2023, April) This short paper takes initial steps towards developing a novel approach, called log slicing, that aims to answer a practical question in the field of log analysis: Can we automatically identify log ... [more ▼] This short paper takes initial steps towards developing a novel approach, called log slicing, that aims to answer a practical question in the field of log analysis: Can we automatically identify log messages related to a specific message (e.g., an error message)? The basic idea behind log slicing is that we can consider how different log messages are "computationally related" to each other by looking at the corresponding logging statements in the source code. These logging statements are identified by 1) computing a backwards program slice, using as criterion the logging statement that generated a problematic log message; and 2) extending that slice to include relevant logging statements. The paper presents a problem definition of log slicing, describes an initial approach for log slicing, and discusses a key open issue that can lead towards new research directions. [less ▲] Detailed reference viewed: 31 (5 UL)![]() Yilma, Bereket Abera ![]() ![]() in Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (CHI ’23) (2023, April) Artwork recommendation is challenging because it requires understanding how users interact with highly subjective content, the complexity of the concepts embedded within the artwork, and the emotional and ... [more ▼] Artwork recommendation is challenging because it requires understanding how users interact with highly subjective content, the complexity of the concepts embedded within the artwork, and the emotional and cognitive reflections they may trigger in users. In this paper, we focus on efficiently capturing the elements (i.e., latent semantic relationships) of visual art for personalized recommendation. We propose and study recommender systems based on textual and visual feature learning techniques, as well as their combinations. We then perform a small-scale and a large-scale user-centric evaluation of the quality of the recommendations. Our results indicate that textual features compare favourably with visual ones, whereas a fusion of both captures the most suitable hidden semantic relationships for artwork recommendation. Ultimately, this paper contributes to our understanding of how to deliver content that suitably matches the user's interests and how they are perceived. [less ▲] Detailed reference viewed: 193 (42 UL)![]() ; Lallemand, Carine ![]() Scientific Conference (2023, April) An ever-increasing amount of sensor technologies surrounds our work environment, collecting data about workers? activity and wellbeing ? often without them having any say in this. This datafication of the ... [more ▼] An ever-increasing amount of sensor technologies surrounds our work environment, collecting data about workers? activity and wellbeing ? often without them having any say in this. This datafication of the workplace can help find novel ways to stimulate healthy behaviors or increase productivity. However, the ubiquitous usage of data collectors in the workplace can also put employees in a position of power imbalance, where management is frequently aiming at ?optimizing? employees towards normative and more-than-often problematic standards of productivity and wellbeing. Yet, data-tracking practices might not only seek an optimum but also can be interpreted towards self-enhancement (Meissner, 2016). In this sense, optimization is not per se an improvement on previous goals, but rather allows ?the discovery of new opportunities?. Indeed, data can be a means of giving space for users to be curious about their own subjective work experiences. Personal Informatics research has mostly focused on leisure and health-related topics but it takes on different forms, requirements, and ethical considerations for a work context. To explore how such considerations emerge from material practices, we conducted a field study, deploying a research probe called Habilyzer at a workplace (N=5). Findings show that users explored aspects meaningful to them yet highlight discrepancies between the envisioned self-tracking goals and participants? practices. Regarding sensors? open-endedness, a balance between the burden of data collection and the value derived from it appeared critical. We contribute new insights into how open-ended sensor technologies can be designed to support self-tracking practices in the workplace. [less ▲] Detailed reference viewed: 72 (1 UL)![]() ; ; Lallemand, Carine ![]() in CHI'23 Extended Abstracts (2023, April) Detailed reference viewed: 15 (0 UL) |
||