Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailThe Digital Humanities Classroom as a “Node”. From Toolbox to Mindset?
Armaselu, Florentina UL

in DH Benelux Journal (2021), 3(Autumn 2021), 103-115

The paper describes a framework for digital pedagogy and evaluation that combines different approaches – theoretical, application-oriented and project-based –, underpinned by a view of the digital ... [more ▼]

The paper describes a framework for digital pedagogy and evaluation that combines different approaches – theoretical, application-oriented and project-based –, underpinned by a view of the digital humanities classroom metaphorically defined as a “node”. The metaphor encompasses the hybrid character of digital humanities teaching, as a crossing or convergence of paths, which involves the use of various categories of study materials, themes, examples, methodologies and skills, as well as exchange, circulation of ideas and connection with other disciplines. It is assumed that the application of this type of hybrid approach in the course design, together with the coverage of a variety of tools to be studied in class, might foster a reflective mindset, enabling the students to contextualise the digital technologies within different humanities areas, beyond the acquisition of technical skills and knowledge of computational methods and tools usually referred to as the toolbox-based education paradigm. [less ▲]

Detailed reference viewed: 98 (9 UL)
See detailBeeinträchtigung und soziale Partizipation in Familie und Schule
Stöcker, Anne UL; Zurbriggen, Carmen

Presentation (2021, October)

Detailed reference viewed: 38 (0 UL)
Full Text
Peer Reviewed
See detailPakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE
Vazquez Sandoval, Itzel UL; Atashpendar, Arash; Lenzini, Gabriele UL et al

in Obaidat, Mohammad S.; Ben-Othman, Jalel (Eds.) E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers. (2021, October)

We propose the use of password-authenticated key exchange (PAKE) for achieving and enhancing entity authentication (EA) and key management (KM) in the context of decentralized end-to-end encrypted email ... [more ▼]

We propose the use of password-authenticated key exchange (PAKE) for achieving and enhancing entity authentication (EA) and key management (KM) in the context of decentralized end-to-end encrypted email and secure messaging, i.e., without a public key infrastructure or a trusted third party. This not only simplifies the EA process by requiring users to share only a low-entropy secret such as a memorable word, but it also allows us to establish a high-entropy secret key. This approach enables a series of cryptographic enhancements and security properties, which are hard to achieve using out-of-band (OOB) authentication. We first study a few vulnerabilities in voice-based OOB authentication, in particular a combinatorial attack against lazy users, which we analyze in the context of a secure email solution. We then propose tackling public key authentication by solving the problem of secure equality test using PAKE and discuss various protocols and their properties. This method enables the automation of important KM tasks such as key renewal and future key pair authentications, reduces the impact of human errors and lends itself to the asynchronous nature of email and modern messaging. It also provides cryptographic enhancements including multi-device synchronization, and secure secret storage/retrieval, and paves the path for forward secrecy, deniability and post-quantum security.We also discuss the use of auditable PAKEs for mitigating a class of online guess and abort attacks in authentication protocols. We present an implementation of our proposal, called PakeMail, to demonstrate the feasibility of the core idea and discuss some of its cryptographic details, implemented features and efficiency aspects. We conclude with some design and security considerations, followed by future lines of work. [less ▲]

Detailed reference viewed: 76 (3 UL)
See detailQuality and Trade with Many Countries and Industries
Picard, Pierre M UL; Tampieri, Alessandro

Scientific Conference (2021, October)

This paper investigates a trade model with many countries, many goods produced in multiple quality versions and non-homothetic preferences. It studies the impact of productivity, population changes and ... [more ▼]

This paper investigates a trade model with many countries, many goods produced in multiple quality versions and non-homothetic preferences. It studies the impact of productivity, population changes and trade costs on the quality composition of exports. The analysis embeds within the same model a series of empirical results about high-income countries specialization and trade in higher quality goods. Product di¤erentiation matters at explaining the volumes of trade quality. High-quality goods exhibiting a high degree of di¤erentiation are traded only by high-income countries. [less ▲]

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailInvestigating Usability and User Experience of Individually Verifiable Internet Voting Schemes
Marky, Karola; Zollinger, Marie-Laure UL; Roenne, Peter et al

in ACM Transactions on Computer-Human Interaction (2021), 28(5), 1-36

Internet voting can afford more inclusive and inexpensive elections. The flip side is that the integrity of the election can be compromised by adversarial attacks and malfunctioning voting infrastructure ... [more ▼]

Internet voting can afford more inclusive and inexpensive elections. The flip side is that the integrity of the election can be compromised by adversarial attacks and malfunctioning voting infrastructure. Individual verifiability aims to protect against such risks by letting voters verify that their votes are correctly registered in the electronic ballot box. Therefore, voters need to carry out additional tasks making human factors crucial for security. In this article, we establish a categorization of individually verifiable Internet voting schemes based on voter interactions. For each category in our proposed categorization, we evaluate a voting scheme in a user study with a total of 100 participants. In our study, we assessed usability, user experience, trust, and further qualitative data to gain deeper insights into voting schemes. Based on our results, we conclude with recommendations for developers and policymakers to inform the choices and design of individually verifiable Internet voting schemes. [less ▲]

Detailed reference viewed: 54 (8 UL)
Full Text
Peer Reviewed
See detailDo We Really Need TSN in Next-Generation Helicopters? Insights From a Case-Study
Mauclair, Cédric; Gutiérrez, Marina; Migge, Jörn et al

in 2021 AIAA/IEEE 40th Digital Avionics Systems Conference (DASC) (2021, October)

As Ethernet rapidly replaces legacy networks as the core high-speed network in helicopter’s avionics and mission systems, we ask in this paper the question of the technical benefits of migrating to ... [more ▼]

As Ethernet rapidly replaces legacy networks as the core high-speed network in helicopter’s avionics and mission systems, we ask in this paper the question of the technical benefits of migrating to Ethernet Time-Sensitive-Networking (TSN). Indeed, TSN has become a rich toolbox of mechanisms and protocols to address Quality-of-Service (QoS) requirements pertaining to timing and reliability. TSN is quickly becoming the prominent technology for wired high-speed communications in a variety of application domains like automotive, industry 4.0 and telecom. In this context, this work explores the use of TSN timing QoS mechanisms for helicopter’s avionics and mission systems on a case-study representative of the communication requirements of next-generation systems. This study aims to provide quantified insights into what can be expected from TSN in terms of timing, memory usage and extensibility. [less ▲]

Detailed reference viewed: 109 (10 UL)
Full Text
Peer Reviewed
See detailNB-IoT Random Access for Non-Terrestrial Networks: Preamble Detection and Uplink Synchronization
Chougrani, Houcine UL; Kisseleff, Steven UL; Alves Martins, Wallace UL et al

in IEEE Internet of Things Journal (2021)

The satellite component is recognized as a promising solution to complement and extend the coverage of future Internet of things (IoT) terrestrial networks (TNs). In this context, a study item to ... [more ▼]

The satellite component is recognized as a promising solution to complement and extend the coverage of future Internet of things (IoT) terrestrial networks (TNs). In this context, a study item to integrate satellites into narrowband-IoT (NBIoT) systems has been approved within the 3rd Generation Partnership Project (3GPP) standardization body. However, as NBIoT systems were initially conceived for TNs, their basic design principles and operation might require some key modifications when incorporating the satellite component. These changes in NB-IoT systems, therefore, need to be carefully implemented in order to guarantee a seamless integration of both TN and non-terrestrial network (NTN) for a global coverage. This paper addresses this adaptation for the random access (RA) step in NBIoT systems, which is in fact the most challenging aspect in the NTN context, for it deals with multi-user time-frequency synchronization and timing advance for data scheduling. In particular, we propose an RA technique which is robust to typical satellite channel impairments, including long delays, significant Doppler effects, and wide beams, without requiring any modification to the current NB-IoT RA waveform. Performance evaluations demonstrate the proposal’s capability of addressing different NTN configurations recently defined by 3GPP for the 5G new radio system. [less ▲]

Detailed reference viewed: 115 (14 UL)
Full Text
Peer Reviewed
See detailProvably Improving Election Verifiability in Belenios
Baloglu, Sevdenur UL; Bursuc, Sergiu UL; Mauw, Sjouke UL et al

in Electronic Voting 6th International Joint Conference, E-Vote-ID 2021 Virtual Event, October 5–8, 2021, Proceedings (2021, October)

Belenios is an online voting system that provides a strong notion of election verifiability, where no single party has to be trusted, and security holds as soon as either the voting registrar or the ... [more ▼]

Belenios is an online voting system that provides a strong notion of election verifiability, where no single party has to be trusted, and security holds as soon as either the voting registrar or the voting server is honest. It was formally proved to be secure, making the assump- tion that no further ballots are cast on the bulletin board after voters verified their ballots. In practice, however, revoting is allowed and voters can verify their ballots anytime. This gap between formal proofs and use in practice leaves open space for attacks, as has been shown recently. In this paper we make two simple additions to Belenios and we formally prove that the new version satisfies the expected verifiability properties. Our proofs are automatically performed with the Tamarin prover, under the assumption that voters are allowed to vote at most four times. [less ▲]

Detailed reference viewed: 126 (23 UL)
Full Text
Peer Reviewed
See detailA global carbon tax? Why firm mobility and heterogeneity matters
Zanaj, Skerdilajda UL

E-print/Working paper (2021)

Detailed reference viewed: 251 (15 UL)
Full Text
Peer Reviewed
See detailThe role of economic complexity on the formation of gender roles
Zanaj, Skerdilajda UL

E-print/Working paper (2021)

Detailed reference viewed: 187 (22 UL)
Full Text
See detailDichtungsanalyse von Elastomer-O-Ringen unter Hochdruck bei Raum- und Tieftemperatur
Repplinger, Christian UL; Sellen, Stephan UL; Maas, Stefan UL

in Repplinger, Christian (Ed.) 47. VDI-Jahrestagung: Schadensanalyse 2021 - Wasserstoff in metallischen Bauteilen und Mediale und klimatische Beanspruchung von polymeren Produkten (2021, October)

Detailed reference viewed: 47 (5 UL)
Full Text
Peer Reviewed
See detailAnalysis of residual stress relaxation of aluminum alloys EN AW 6061/-82 T6 under cyclic loading
Repplinger, Christian UL; Sellen, Stephan UL; Kedziora, Slawomir UL et al

in Fatigue and Fracture of Engineering Materials and Structures (2021)

Stress relaxation describes the reduction of stress under static or cyclic loading at a constant strain level. Several processes induce intentionally residual stresses, for example, autofrettage of thick ... [more ▼]

Stress relaxation describes the reduction of stress under static or cyclic loading at a constant strain level. Several processes induce intentionally residual stresses, for example, autofrettage of thick-walled pressurized tubes to improve their fatigue life. This well-known process induces residual compressive stresses at the critical inner surface by using a single static but controlled over- loading internal pressure. Relaxation of residual stresses due to cyclic loading in service would endanger the effectiveness of autofrettage and could finally lead to unexpected fatigue failure. In this study, strain-controlled experiments up to 500,000 load cycles and amending nonlinear finite element simulations were done for the aluminum alloys EN AW 6061 T6 and EN AW 6082 T6 to study potential cyclic stress relaxation in four-point bending tests after con- trolled single static plasticization for residual stress generation. This analysis identifies almost stable residual stresses for both materials under different cyclic strain-controlled load levels. [less ▲]

Detailed reference viewed: 53 (6 UL)
See detailChronique de droit des marchés financiers
Conac, Pierre-Henri UL

in Revue des Sociétés (2021), (10), 608

Full Text
Peer Reviewed
See detailExperimental Comparison of RF Waveform Designs for Wireless Power Transmission
Gautam, Sumit; Kumar, Sumit UL; Chatzinotas, Symeon UL et al

in Experimental Comparison of RF Waveform Designs for Wireless Power Transmission (2021, October)

The possibility to harvest energy from ambient radio-frequency (RF) sources has intrigued humankind for the past several decades. In this context, there has been a tremendously growing research interest ... [more ▼]

The possibility to harvest energy from ambient radio-frequency (RF) sources has intrigued humankind for the past several decades. In this context, there has been a tremendously growing research interest in the field of wireless power transfer (WPT) using the RF range of the electromagnetic (EM) spectrum. In this paper, we experimentally investigate the aspect of real-time energy harvesting (EH) via different types of waveform designs such as orthogonal frequency division multiplexing (OFDM), square, triangular, sinusoidal, and sawtooth. We make use of a Software Defined Radio (SDR) and a Powercast P21XXCSR-EVB EH module to carry out the experiments on the practical device to assess performance. Specifically, we are interested in obtaining insights based on the comparison between the aforementioned waveform designs from the perspectives of the separation distance between the USRP and P21XXCSR-EVB EH module, and power emission via USRP. In this vein, some additional experiments are subsequently performed after a suitable candidate waveform has been reported. The demonstration of the EH is provided in terms of the abovementioned investigation metrics while seeking the best waveform to support WPT. [less ▲]

Detailed reference viewed: 56 (12 UL)
Full Text
Peer Reviewed
See detailVision of a Next-Gen Concurrent Design Facility (CDF-LU)
Rana, Loveneesh UL

in International Astronautical Congress, Dubai, 25-29 October 2021 (2021, October)

Detailed reference viewed: 41 (11 UL)
Peer Reviewed
See detailLuxembourg Cases
Haslehner, Werner UL; Pantazatou, Aikaterini UL

in Kofler, Georg; et al. (Eds.) CJEU - Recent Developments in Direct Taxation 2020 (2021)

Detailed reference viewed: 53 (4 UL)
Full Text
Peer Reviewed
See detailOn pyramids, prisms, and scalable reading
Fickers, Andreas UL; Clavert, Frédéric UL

in Journal of Digital History (2021), 1(1),

Since Robert Darnton’s 1999 essay sketched a broad vision of what could become historical scholarship, many scholars have tried to put into practice new ways to publish in the digital era. Inspired by the ... [more ▼]

Since Robert Darnton’s 1999 essay sketched a broad vision of what could become historical scholarship, many scholars have tried to put into practice new ways to publish in the digital era. Inspired by the concept of digital hermeneutics, the Journal of Digital History – a joint venture between the C2DH and De Gruyter Publishing group – proposes to put Darnton’s vision into reality by offering a multi-layered publication platform for data-driven scholarship in the field of digital history. [less ▲]

Detailed reference viewed: 234 (3 UL)
Full Text
See detailThe Proposal for a Digital Markets Act (DMA): On Gatekeepers, Fairness and Transparency in the Online Environment
Cole, Mark David UL

in Capello, Maja (Ed.) Unravelling the Digital Services Act Package (IRIS Special 1-2021) (2021)

state-of-the-art analysis of how European media legislation proposes to deal with the challenges of regulating online content and those who provide digital services – in the shape of the Digital Services ... [more ▼]

state-of-the-art analysis of how European media legislation proposes to deal with the challenges of regulating online content and those who provide digital services – in the shape of the Digital Services Act Package. [less ▲]

Detailed reference viewed: 108 (2 UL)
Full Text
Peer Reviewed
See detailEditorial
Cole, Mark David UL

in UFITA - Archiv für Medienrecht und Medienwissenschaft (2021), 85(2021), 3-5

Detailed reference viewed: 19 (2 UL)