Last 7 days
Bookmark and Share    
Full Text
See detailDigital twinning for enhancing breast cancer surgery
Mazier, Arnaud UL

Presentation (2022, March 22)

Detailed reference viewed: 36 (6 UL)
Full Text
See detailDevelopment of data integration tools within functional genomics
Teixeira Queiros, Pedro UL

Doctoral thesis (2022)

Due to technological advances across all scientific domains, data is generated at an extremely fast pace. This is especially true in biology, where advances in computational and sequencing technologies ... [more ▼]

Due to technological advances across all scientific domains, data is generated at an extremely fast pace. This is especially true in biology, where advances in computational and sequencing technologies led to the necessity to develop automated methods for data analysis; thus the field of bioinformatics was born. This thesis focuses on one specific field within bioinformatics - functional genomics. To be precise, in the development of techniques and software for the integration of data to generate novel insights. Indeed, as the amount of knowledge increases, so does the need to integrate it systematically. In this context, the work described herein relates to the integration of multiple resources to improve the functional annotation of proteins, which led to the development of two bioinformatic tools - Mantis and UniFunc. For the downstream integration and analysis of functional predictions, a network annotation tool was developed - UniFuncNet, which, together with the previous tools, enables the efficient functional characterisation of individual organisms or communities. [less ▲]

Detailed reference viewed: 85 (14 UL)
Full Text
Peer Reviewed
See detailExplaining free will by rational capacities
Hofmann, Frank UL

in Ethical Theory and Moral Practice (2022), 25

Detailed reference viewed: 43 (4 UL)
Full Text
See detailVerifiable, Secure and Privacy-Preserving Computation
Soroush, Najmeh UL

Doctoral thesis (2022)

In this thesis, I present the research I conducted with my co-authors on numerous areas of verifiable, secure, and privacy-preserving computation during my doctoral studies at the University of Luxembourg ... [more ▼]

In this thesis, I present the research I conducted with my co-authors on numerous areas of verifiable, secure, and privacy-preserving computation during my doctoral studies at the University of Luxembourg, where Professor Peter Ryan advised me. In the first part, I study the functional encryption scheme. In the standard setting of functional encryption, it is assumed both the Central Authority (CA) and the encryptors to run their respective algorithms faithfully. However, in the case of dishonest parties, the security of the cryptosystem may be violated. It means that dishonest parties can cause inconsistent results which may not be detected. In the first part, we improve on this situation by considering Inner-Product Encryption (IPE), a special case of functional encryption and a primitive that has attracted wide interest from practitioners and researchers in the last decade. Specifically, we construct the first efficient verifiable Inner Product Encryption (VIPE) scheme according to the inner-product functionality. As the next step, we construct a verifiable IPE that satisfies unconditional verifiability, whereas privacy relies on the standard assumption. The second part of this thesis presents my research on e-voting protocols. I revisit the coercion-resistant e-voting protocol by Juels, Catalano and Jakobsson (JCJ) and, particularly, the attempts to make it usable and practical. In JCJ the user needs to handle cryptographic credentials and fake these in case of coercion. We present a hardware-independent protocol that can be implemented using a combination of a digitally stored cryptographic length key and a PIN only known by the voter. The long credential could be stored in several places or hidden via steganography. At the ballot casting phase, the software will input the digital key and the password to form the credential submitted with the vote. Depending on the level of coercion, the coerced voter can either fake the long credential or, for stronger levels of coercion, the voter can reveal the digitally stored credential to the coercer but fake the PIN. Due to our improved tally, the coercer will not know if he got faked credentials or PINs. On the other hand, since the voter memories the PIN is a high chance of users making a PIN typo error which will invalidate the vote and remain undetected. Note that naively giving feedback on the correctness of the PIN is not possible for coercion-resistance as it would allow the coercer to check whether he got a fake PIN or not. Instead, we will define a set of allowed PIN errors (e.g., chosen by the election administrator). We will consider a ballot valid if it has a correct PIN or an allowed PIN error but invalid for other PINs. At the tally phase, we construct protocols that secretly check whether a given PIN is in the set of allowed PINs and will sort out invalid ballots. We also design another End-to-End verifiable e-voting scheme achieving coercion-resistance via deniable vote updating. We propose a new e-voting system that enables voters with an intuitive mechanism to update their possibly coerced vote in a deniable way. What is more, our e-voting system does not introduce any additional trust assumptions for end-to-end verifiability and vote privacy besides the standards. Moreover, we demonstrate that our e-voting system can be instantiated efficiently for practical elections. With these properties, our e-voting system has the potential to close the gap between theory and practice in coercion-resistant e-voting. [less ▲]

Detailed reference viewed: 146 (17 UL)
See detailScreening for Consensus : Delegation with Collective Principals
Anesi, Vincent UL; Buisseret, Peter

Presentation (2022, March 21)

A group of principals collectively and sequentially screen an agent. The principals hold heterogeneous values from the relationship that may evolve over time. At each date, the principals use a collective ... [more ▼]

A group of principals collectively and sequentially screen an agent. The principals hold heterogeneous values from the relationship that may evolve over time. At each date, the principals use a collective decision rule to propose a contract to the agent. We unearth circumstances in which every non-dictatorial decision rule yields inefficiency in the form of excessive learning: relative to a single-principal benchmark, collective principals screen the agent too aggressively. They do so in order to reduce uncertainty about the agent’s preferences, and alleviate dynamic conflicts of interest between the principals that exist regardless of their static alignment. [less ▲]

Detailed reference viewed: 27 (4 UL)
Full Text
Peer Reviewed
See detailSpectrum of Phenotypic, Genetic, and Functional Characteristics in Epilepsy Patients With KCNC2 Pathogenic Variants 10.1212/WNL.0000000000200660
Schwarz, Niklas; Seiffert, Simone; Pendziwiat, Manuela et al

in Neurology (2022)

Background: KCNC2 encodes Kv3.2, a member of the Shaw-related (Kv3) voltage-gated potassium channel subfamily, which is important for sustained high-frequency firing and optimized energy efficiency of ... [more ▼]

Background: KCNC2 encodes Kv3.2, a member of the Shaw-related (Kv3) voltage-gated potassium channel subfamily, which is important for sustained high-frequency firing and optimized energy efficiency of action potentials in the brain. The objective of this study was to analyse the clinical phenotype, genetic background, and biophysical function of disease-associated Kv3.2 variants.Methods: Individuals with KCNC2 variants detected by exome sequencing were selected for clinical, further genetic, and functional analysis. Cases were referred through clinical and research collaborations. Selected de novo variants were examined electrophysiologically in Xenopus laevis oocytes.Results: We identified novel KCNC2 variants in 18 patients with various forms of epilepsy including genetic generalized epilepsy (GGE), developmental and epileptic encephalopathy (DEE) including early-onset absence epilepsy (EOAE), focal epilepsy (FE), and myoclonic-atonic epilepsy (MAE). 10/18 variants were de novo and 8/18 variants were classified as modifying variants. 8 drug responsive cases became seizure-free using valproic acid as monotherapy or in combination including severe DEE cases. Functional analysis of four variants demonstrated gain-of-function in three severely affected DEE cases and loss-of-function in one case with a milder phenotype (GGE) as the underlying pathomechanisms.Conclusion: These findings implicate KCNC2 as a novel causative gene for epilepsy and emphasize the critical role of KV3.2 in the regulation of brain excitability. [less ▲]

Detailed reference viewed: 30 (0 UL)
See detailSeeking A Balanced Investment Protocol in the African Continental Free Trade Area (AfCTA)
Garcia Olmedo, Javier UL

Scientific Conference (2022, March 21)

Detailed reference viewed: 51 (4 UL)
Full Text
See detailClosing Keynote: Networks, governance and design. A journey through some historical case studies
Schafer, Valerie UL

Presentation (2022, March 18)

As famous as the quotation by Lawrence Lessing “Code is law”, the sentence by David Clark at a meeting at the IETF in 1992 “We reject kings, presidents and voting, we believe in rough consensus and ... [more ▼]

As famous as the quotation by Lawrence Lessing “Code is law”, the sentence by David Clark at a meeting at the IETF in 1992 “We reject kings, presidents and voting, we believe in rough consensus and running code” became a “motto for Internet standardization” (Russell, 2006) that invites us to have a look at the past relationships and intertwinements between networks design and governance. From the 1970s topics related to distribution and openness have become key in networks infrastructures, while complementary issues related to asymmetries and multi-stakeholderism (Raymond and DeNardis 2015) have been emphasized in the 1990s and 2000s, and notably during the WSIS in Tunis and Geneva. Research related to Internet governance (Mueller and Badiei, 2020; Musiani, Schafer, 2021) has also brought to the table strong issues related to agencies, privacy, and many others that have strongly followed the development of networks and their uses as well as controversies related to net neutrality or information flows for example (DeNardis, 2020). This presentation will go through several historical case studies and rethink them through the lens of infrastructure design and governance, from Arpanet in the 1970s, XNS and then the OSI (Russell, 2014), to web archives (Schafer, Winters 2021) and research infrastructures today, through past designs and attempts, related to the Web and Xanadu, the Minitel (Schafer, Thierry, 2012; Mailland, Driscoll, 2017), platforms like Wuala (Musiani, 2022) and Wikipedia (Cardon and Levrel, 2009). This will allow us to explore some notions and approach related to closure, secret, incentives, empowerment, while finally moving from “governance” to “good governance” and its challenges. [less ▲]

Detailed reference viewed: 72 (3 UL)
Full Text
See detail"But you know you won't be back"
Scuto, Denis UL

Article for general public (2022)

Detailed reference viewed: 28 (2 UL)
Peer Reviewed
See detailWorkers rights and human rights: toward a new fundamental principle?
Yusifli, Zahra UL; Fenwick, Colin

in Elliott, Kimberly A. (Ed.) Handbook on Globalisation and Labour Standards (2022)

Detailed reference viewed: 41 (3 UL)
Full Text
Peer Reviewed
See detailTo Kill or Not to Kill – An experimental test of moral Decision-Making in gaming
Holl, Elisabeth UL; Steffgen, Georges UL; Melzer, André UL

in Entertainment Computing (2022)

Commercial video game titles with meaningful and morally relevant storylines are becoming increasingly popular and an intensely researched topic for entertainment scholars. In line with this research, the ... [more ▼]

Commercial video game titles with meaningful and morally relevant storylines are becoming increasingly popular and an intensely researched topic for entertainment scholars. In line with this research, the current study investigates behavioral, emotional, and personality patterns of moral decision-making in gaming with a special emphasis on selected contextual factors. In the current laboratory experiment, a total of N = 101 participants played four chapters of Detroit: Become Human for approx. 55 min. A maximum of 13 moral decisions had to be made either under time pressure or not. Before playing, participants were assigned to one of three conditions (i.e., playing morally vs. immorally framed character vs. no framing/control condition). As expected, players generally preferred to act morally regardless of character framing. Time pressure further increased the proportion of moral (vs. immoral) decision-making. Our results underline that moral decision-making is dependent on specific contexts and that morality theories can be applied to virtual gaming scenarios. [less ▲]

Detailed reference viewed: 40 (8 UL)
Full Text
Peer Reviewed
See detailExploring the use of self-sovereign identity for event ticketing systems
Feulner, Simon; Sedlmeir, Johannes UL; Schlatt, Vincent et al

in Electronic Markets (2022), 32

This position paper discusses the challenges of blockchain applications in businesses and the public sector related to an excessive degree of transparency. We first point out the types of sensitive data ... [more ▼]

This position paper discusses the challenges of blockchain applications in businesses and the public sector related to an excessive degree of transparency. We first point out the types of sensitive data involved in different patterns of blockchain use cases. We then argue that the implications of blockchains’ information exposure caused by replicated transaction storage and execution go well beyond the often-mentioned conflicts with the GDPR’s “right to be forgotten” and may be more problematic than anticipated. In particular, we illustrate the trade-off between protecting sensitive information and increasing process efficiency through smart contracts. We also explore to which extent permissioned blockchains and novel applications of cryptographic technologies such as self-sovereign identities and zero-knowledge proofs can help overcome the transparency challenge and thus act as catalysts for blockchain adoption and diffusion in organizations. [less ▲]

Detailed reference viewed: 21 (0 UL)
See detailTemporary Protection in the EU - State of Play
Mellinger, Lukas UL; Sommarribas, Adolfo UL

Report (2022)

On 24 February 2022, the armed forces of the Russian Federation launched an unprovoked full-scale invasion of Ukraine. This was an unprecedented act of aggression against a sovereign and independent ... [more ▼]

On 24 February 2022, the armed forces of the Russian Federation launched an unprovoked full-scale invasion of Ukraine. This was an unprecedented act of aggression against a sovereign and independent country and goes against fundamental principles of international law. It has been strongly condemned by the international community, including the European Union. As of mid-March, over three million Ukrainian and international refugees are fleeing the war to neighbouring EU and third countries (including Moldova). This massive inflow of Ukrainian refugees into the EU resulted in the Council adopting the implementing Decision 2022/382 of 4 March 2022, introducing temporary protection as a means of dealing with the crisis. [less ▲]

Detailed reference viewed: 93 (9 UL)
See detailA Workshop on War Letters (in the Digital Age)
Janz, Nina UL; van der Lange, Milan

Report (2022)

Impressions of building a community around people working on the digitization of historical ‘egodocuments’ using Transkribus.

Detailed reference viewed: 22 (1 UL)
Full Text
Peer Reviewed
See detailLa relecture entre pairs : un levier de motivation de la pratique de l’écrit
Lejot, Eve UL

Scientific Conference (2022, March 17)

Les enseignants corrigent et donnent des conseils d’amélioration à leurs apprenants, mais les commentaires des enseignants sont parfois mal compris (Cole, Coats, Lentell 1986 ; Smith 1997), alors que la ... [more ▼]

Les enseignants corrigent et donnent des conseils d’amélioration à leurs apprenants, mais les commentaires des enseignants sont parfois mal compris (Cole, Coats, Lentell 1986 ; Smith 1997), alors que la relecture entre pairs apporte un échange avec moins de pression (Lejot 2017). Cet échange se fait à un niveau de hiérarchie égal et facilite la négociation de sens des éléments du texte. Néanmoins, certains élèves pointent le manque de qualification des pairs pour remplacer les commentaires des professeurs dans l’enseignement supérieur (Rollinson 2005). Cette démarche trouve toute sa force pour les doctorants. Mis en place sur un semestre, ce système fermé de relecture et de commentaires reçus en boucle est bénéfique et motivant pour ces derniers. Dans les ateliers interdisciplinaires sur les compétences transversales et en l'occurrence celle de l'écrit académique, les doctorants soulignent l’énergie, la réflexion commune et le soutien que leur a apporté la relecture de texte d'un pair et d'être eux-mêmes relus (Lejot 2017). Relire est formateur et être compris par des chercheurs pairs fait faire un grand pas en termes de cohérence d'écriture et d'argumentation bien articulée à ces groupes des écoles doctorales. [less ▲]

Detailed reference viewed: 54 (0 UL)
Full Text
Peer Reviewed
See detailActive Homework: an underresearched element of the active schools concept
Bailey, Richard; Heck, Sandra UL; Scheuer, Claude UL

in German Journal of Exercise and Sport Research (2022)

Background Most physical activity (PA) interventions targeting children focus on the school setting. However, children and young people are often less active at home. The purpose of this article is to ... [more ▼]

Background Most physical activity (PA) interventions targeting children focus on the school setting. However, children and young people are often less active at home. The purpose of this article is to review evidence from the last ten years of the contribution of physically Active Homework (AH) to the promotion of PA. Methods Using a rapid review methodology, the article reports on evidence contribution of AH and considers conditions for its effective implementation. Results Although research literature on the effects of AH is limited and missing a theoretical base, studies reporting small positive associations between AH and PA levels were identified. Increases in PA were, however, of low intensity; moderate and vigorous intensities remained relatively unchanged. Conclusions Strategies to increase PA extending beyond the school gym are needed. Further and better research is needed to understand the conditions of effective implementation of AH. Nevertheless, there is a plausibility in providing students regular opportunities to further promote PA in students’ lives by practicing movement and sports skills, and offering a flexible way of finding and pursuing meaningful activities. The fact that AH may encourage the engagement of families and communities, multiplies its potential benefits. [less ▲]

Detailed reference viewed: 88 (3 UL)
Full Text
Peer Reviewed
See detailRetrograde Procedural Memory in Parkinson’s Disease: A Cross-Sectional, Case-Control Study
Pauly, Laure UL; Pauly, Claire UL; Hansen, Maxime UL et al

in Journal of Parkinson's Disease (2022)

Background: The analysis of the procedural memory is particularly relevant in neurodegenerative disorders like Parkinson’s disease, due to the central role of the basal ganglia in procedural memory. It ... [more ▼]

Background: The analysis of the procedural memory is particularly relevant in neurodegenerative disorders like Parkinson’s disease, due to the central role of the basal ganglia in procedural memory. It has been shown that anterograde procedural memory, the ability to learn a new skill, is impaired in Parkinson’s disease. However, retrograde procedural memory, the long-term retention and execution of skills learned in earlier life stages, has not yet been systematically investigated in Parkinson’s disease. Objective: This study aims to investigate retrograde procedural memory in people with Parkinson’s disease.We hypothesized that retrograde procedural memory is impaired in people with Parkinson’s disease compared to an age- and gender-matched control group. Methods: First, we developed the CUPRO evaluation system, an extended evaluation system based on the Cube Copying Test, to distinguish the cube copying procedure, representing functioning of retrograde procedural memory, and the final result, representing the visuo-constructive abilities. Development of the evaluation system included tests of discriminant validity. Results: Comparing people with typical Parkinson’s disease (n = 201) with age- and gender-matched control subjects (n = 201), we identified cube copying performance to be significantly impaired in people with Parkinson’s disease (p = 0.008) No significant correlation was observed between retrograde procedural memory and disease duration. Conclusion: We demonstrated lower cube copying performance in people with Parkinson’s disease compared to control subjects, which suggests an impaired functioning of retrograde procedural memory in Parkinson’s disease. [less ▲]

Detailed reference viewed: 49 (5 UL)