Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailTrace Diagnostics for Signal-based Temporal Properties
Boufaied, Chaima; Menghi, Claudio; Bianculli, Domenico UL et al

in IEEE Transactions on Software Engineering (in press)

Trace checking is a verification technique widely used in Cyber-physical system (CPS) development, to verify whether execution traces satisfy or violate properties expressing system requirements. Often ... [more ▼]

Trace checking is a verification technique widely used in Cyber-physical system (CPS) development, to verify whether execution traces satisfy or violate properties expressing system requirements. Often these properties characterize complex signal behaviors and are defined using domain-specific languages, such as SB-TemPsy-DSL, a pattern-based specification language for signal-based temporal properties. Most of the trace-checking tools only yield a Boolean verdict. However, when a property is violated by a trace, engineers usually inspect the trace to understand the cause of the violation; such manual diagnostic is time-consuming and error-prone. Existing approaches that complement trace-checking tools with diagnostic capabilities either produce low-level explanations that are hardly comprehensible by engineers or do not support complex signal-based temporal properties. In this paper, we propose TD-SB-TemPsy, a trace-diagnostic approach for properties expressed using SB-TemPsy-DSL. Given a property and a trace that violates the property, TD-SB-TemPsy determines the root cause of the property violation. TD-SB-TemPsy relies on the concepts of violation cause, which characterizes one of the behaviors of the system that may lead to a property violation, and diagnoses, which are associated with violation causes and provide additional information to help engineers understand the violation cause. As part of TD-SB-TemPsy, we propose a language-agnostic methodology to define violation causes and diagnoses. In our context, its application resulted in a catalog of 34 violation causes, each associated with one diagnosis, tailored to properties expressed in SB-TemPsy-DSL. We assessed the applicability of TD-SB-TemPsy on two datasets, including one based on a complex industrial case study. The results show that TD-SB-TemPsy could finish within a timeout of 1 min for ≈ 83.66% of the trace-property combinations in the industrial dataset, yielding a diagnosis in ≈ 99.84% of these cases; moreover, it also yielded a diagnosis for all the trace-property combinations in the other dataset. These results suggest that our tool is applicable and efficient in most cases. [less ▲]

Detailed reference viewed: 32 (2 UL)
Full Text
Peer Reviewed
See detailDaMAT: A Data-driven Mutation Analysis Tool
Vigano, Enrico UL; Cornejo Olivares, Oscar Eduardo UL; Pastore, Fabrizio UL et al

in Proceedings of the 45th International Conference on Software Engineering (ICSE ’23) (in press)

We present DaMAT, a tool that implements data- driven mutation analysis. In contrast to traditional code-driven mutation analysis tools it mutates (i.e., modifies) the data ex- changed by components ... [more ▼]

We present DaMAT, a tool that implements data- driven mutation analysis. In contrast to traditional code-driven mutation analysis tools it mutates (i.e., modifies) the data ex- changed by components instead of the source of the software under test. Such an approach helps ensure that test suites appropriately exercise components interoperability — essential for safety-critical cyber-physical systems. A user-provided fault model drives the mutation process. We have successfully evalu- ated DaMAT on software controlling a microsatellite and a set of libraries used in deployed CubeSats. A demo video of DaMAT is available at https://youtu.be/s5M52xWCj84 [less ▲]

Detailed reference viewed: 59 (0 UL)
Full Text
Peer Reviewed
See detailMetamorphic Testing for Web System Security
Bayati Chaleshtari, Nazanin; Pastore, Fabrizio UL; Goknil, Arda et al

in IEEE Transactions on Software Engineering (in press)

Security testing aims at verifying that the software meets its security properties. In modern Web systems, however, this often entails the verification of the outputs generated when exercising the system ... [more ▼]

Security testing aims at verifying that the software meets its security properties. In modern Web systems, however, this often entails the verification of the outputs generated when exercising the system with a very large set of inputs. Full automation is thus required to lower costs and increase the effectiveness of security testing. Unfortunately, to achieve such automation, in addition to strategies for automatically deriving test inputs, we need to address the oracle problem, which refers to the challenge, given an input for a system, of distinguishing correct from incorrect behavior (e.g., the response to be received after a specific HTTP GET request). In this paper, we propose Metamorphic Security Testing for Web-interactions (MST-wi), a metamorphic testing approach that integrates test input generation strategies inspired by mutational fuzzing and alleviates the oracle problem in security testing. It enables engineers to specify metamorphic relations (MRs) that capture many security properties of Web systems. To facilitate the specification of such MRs, we provide a domain-specific language accompanied by an Eclipse editor. MST-wi automatically collects the input data and transforms the MRs into executable Java code to automatically perform security testing. It automatically tests Web systems to detect vulnerabilities based on the relations and collected data. We provide a catalog of 76 system-agnostic MRs to automate security testing in Web systems. It covers 39% of the OWASP security testing activities not automated by state-of-the-art techniques; further, our MRs can automatically discover 102 different types of vulnerabilities, which correspond to 45% of the vulnerabilities due to violations of security design principles according to the MITRE CWE database. We also define guidelines that enable test engineers to improve the testability of the system under test with respect to our approach. We evaluated MST-wi effectiveness and scalability with two well-known Web systems (i.e., Jenkins and Joomla). It automatically detected 85% of their vulnerabilities and showed a high specificity (99.81% of the generated inputs do not lead to a false positive); our findings include a new security vulnerability detected in Jenkins. Finally, our results demonstrate that the approach scale, thus enabling automated security testing overnight. [less ▲]

Detailed reference viewed: 33 (0 UL)
Peer Reviewed
See detailAltersbilder als wichtiger Hintergrund für die Altersmedizin.
Kornadt, Anna Elena UL

in Bauer, Jürgen; Denkinger, Michael; Becker, Clemens (Eds.) et al Geriatrie (in press)

Detailed reference viewed: 33 (2 UL)
Full Text
Peer Reviewed
See detailSimulator-based explanation and debugging of hazard-triggering events in DNN-based safety-critical systems
Fahmy, Hazem UL; Pastore, Fabrizio UL; Briand, Lionel UL et al

in ACM Transactions on Software Engineering and Methodology (in press)

When Deep Neural Networks (DNNs) are used in safety-critical systems, engineers should determine the safety risks associated with failures (i.e., erroneous outputs) observed during testing. For DNNs ... [more ▼]

When Deep Neural Networks (DNNs) are used in safety-critical systems, engineers should determine the safety risks associated with failures (i.e., erroneous outputs) observed during testing. For DNNs processing images, engineers visually inspect all failure-inducing images to determine common characteristics among them. Such characteristics correspond to hazard-triggering events (e.g., low illumination) that are essential inputs for safety analysis. Though informative, such activity is expensive and error-prone. To support such safety analysis practices, we propose SEDE, a technique that generates readable descriptions for commonalities in failure-inducing, real-world images and improves the DNN through effective retraining. SEDE leverages the availability of simulators, which are commonly used for cyber-physical systems. It relies on genetic algorithms to drive simulators towards the generation of images that are similar to failure-inducing, real-world images in the test set; it then employs rule learning algorithms to derive expressions that capture commonalities in terms of simulator parameter values. The derived expressions are then used to generate additional images to retrain and improve the DNN. With DNNs performing in-car sensing tasks, SEDE successfully characterized hazard-triggering events leading to a DNN accuracy drop. Also, SEDE enabled retraining leading to significant improvements in DNN accuracy, up to 18 percentage points. [less ▲]

Detailed reference viewed: 44 (7 UL)
Full Text
Peer Reviewed
See detailThe Rise of the Unified Patent Court. A Turn of Eras for European Patent Enforcement
Stierle, Martin UL

in IIC: International Review of Intellectual Property and Competition Law (in press)

Editorial

Detailed reference viewed: 49 (4 UL)
Full Text
Peer Reviewed
See detailL'hagiographie à l'aune du numérique. Nouvelles perspectives d'étude des légendiers latins
De Valeriola, Sébastien; Dubuisson, Bastien UL

in In Monte Artium (in press)

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailDeciding When To Decide: Collective Deliberation and Obstruction
Anesi, Vincent UL; Safronov, Mikhail

in International Economic Review (in press)

We study the impact of deliberation rules on collective learning and decision making in committees. In contrast to much of the existing literature, this paper makes a distinction between the final votes ... [more ▼]

We study the impact of deliberation rules on collective learning and decision making in committees. In contrast to much of the existing literature, this paper makes a distinction between the final votes over policy proposals and the cloture votes that bring them about. We show how deliberation rules can cause Pareto inefficient outcomes and failures to bring good proposals to a final vote, and how they affect the distribution of power among committee members in the deliberative process. We further show that deliberation rules are dynamically stable, even when they generate Pareto ineffcient outcomes. [less ▲]

Detailed reference viewed: 30 (1 UL)
Full Text
Peer Reviewed
See detailDie Hausarbeit im Kontext von Deutsch als Fach- und Fremdsprache
Huemer, Birgit UL

in Szurawitzki, Michael; Wolf-Farré, Patrick (Eds.) Handbuch Deutsch als Fach- und Fremdsprache (in press)

In diesem Beitrag wird der Entwicklungsgeschichte der studentischen Hausarbeit und ihrer Funktionen nachgegangen, die sie heutzutage in der deutschsprachigen Hochschullandschaft erfüllt. Zunächst werden ... [more ▼]

In diesem Beitrag wird der Entwicklungsgeschichte der studentischen Hausarbeit und ihrer Funktionen nachgegangen, die sie heutzutage in der deutschsprachigen Hochschullandschaft erfüllt. Zunächst werden die wichtigsten Ansätze zur Erforschung der Textsorte Hausarbeit und zum wissenschaftlichen Schreiben von Studierenden im deutschsprachigen Raum skizziert. Dabei werden allgemeine schreibdidaktische Herausforderungen beim Lehren und Lernen wissenschaftlichen Schreibens besprochen, bevor im Speziellen auf fach- und fremdsprachliche Aspekte beim Verfassen von Hausarbeiten eingegangen wird. Zum Abschluss zeigt der Beitrag gegenwärtige Problemfelder und Forschungstrends auf. [less ▲]

Detailed reference viewed: 36 (0 UL)
Full Text
Peer Reviewed
See detailMonetary policy and venture capital markets
Bellavitis, Cristiano; Fisch, Christian UL; Vismara, Silvio

in Review of Corporate Finance (in press)

We assess the impact of monetary policy (i.e., central bank interest rates) on the activity of venture capitalists (VC). Using data from 31 countries from 2004 to 2019, we find that VC firms’ fundraising ... [more ▼]

We assess the impact of monetary policy (i.e., central bank interest rates) on the activity of venture capitalists (VC). Using data from 31 countries from 2004 to 2019, we find that VC firms’ fundraising activity increases when interest rates become negative. We explain this finding by referring to the principal-agent relationship between general and limited partners of VC firms in combination with behavioral finance arguments. Specifically, we identify three channels pertaining to a legal motivation (i.e., legislative hurdles and litigation risks), a liquidity motivation (i.e., substitution effect relative to other asset classes), and behavioral biases (i.e., mental accounting, conservatism, disposition effect, or prospect theory). [less ▲]

Detailed reference viewed: 101 (2 UL)
Full Text
Peer Reviewed
See detailGender, Loneliness and Happiness during COVID-19
Lepinteur, Anthony UL; Clark, Andrew; Ferrer-I-Carbonell, Ada et al

in Journal of Behavioral and Experimental Economics (in press)

We analyse a measure of loneliness from a representative sample of German individuals interviewed in both 2017 and at the beginning of the COVID-19 pandemic in 2020. Both men and women felt lonelier ... [more ▼]

We analyse a measure of loneliness from a representative sample of German individuals interviewed in both 2017 and at the beginning of the COVID-19 pandemic in 2020. Both men and women felt lonelier during the COVID-19 pandemic than they did in 2017. The pandemic more than doubled the gender loneliness gap: women were lonelier than men in 2017, and the 2017-2020 rise in loneliness was far larger for women. This rise is mirrored in life-satisfaction scores. Men’s life satisfaction changed only little between 2017 and 2020; yet that of women fell dramatically, and sufficiently so to produce a female penalty in life satisfaction. We estimate that almost all of this female penalty is explained by the disproportionate rise in loneliness for women during the COVID-19 pandemic. [less ▲]

Detailed reference viewed: 71 (6 UL)
Full Text
Peer Reviewed
See detailInter-State Dispute Settlement and Africa’s Supranational Courts
Happold, Matthew UL; Owiso, Owiso UL

in Joanna, Gomula; Wittich, Stephan (Eds.) Research Handbook on International Procedural Law (in press)

The Chapter examines the various regional and sub-regional judicial mechanisms in Africa highlighting their potential for effective inter-state dispute settlement. It explains the lack of inter-state ... [more ▼]

The Chapter examines the various regional and sub-regional judicial mechanisms in Africa highlighting their potential for effective inter-state dispute settlement. It explains the lack of inter-state disputes before Africa’s supranational courts despite the existence of multiple mechanisms providing them with such jurisdiction, and identifies ways through which the potential of these mechanisms can be harnessed to provide effective avenues for the settlement of disputes between African States. [less ▲]

Detailed reference viewed: 43 (2 UL)
Full Text
Peer Reviewed
See detailSchumpeterian entrepreneurial digital identity and funding from venture capital firms
Block, Jörn; Fisch, Christian UL; Diegel, Walter

in Journal of Technology Transfer (in press)

Schumpeterian entrepreneurs are considered agents of innovation and technology transfer. However, to fulfill this role, they need entrepreneurial finance. From the perspective of digital identity, we ... [more ▼]

Schumpeterian entrepreneurs are considered agents of innovation and technology transfer. However, to fulfill this role, they need entrepreneurial finance. From the perspective of digital identity, we examine the relationship between a Schumpeterian digital identity and venture capital (VC) funding. Because the VC industry celebrates innovative and visionary entrepreneurship, we posit that a founder’s digital identity as a Schumpeterian-type entrepreneur influences the venture’s chances of receiving VC funding. A quantitative analysis of the language used by 3313 founders in a large sample of Twitter messages, however, provides a mixed picture. While some dimensions of Schumpeterian entrepreneurship have a positive relationship with the acquisition of resources from VC firms (entrepreneurial vision and optimism), other dimensions seem to have no (uncertainty tolerance and rationality) or even a decreasing (achievement motivation) effect. The negative relationships observed can be explained by the particularities of the VC business model, which does not align with Schumpeterian entrepreneurship in all respects. Our study contributes to research on Schumpeterian entrepreneurship, the financing of technology transfer, and the link between entrepreneurial digital identity and entrepreneurial finance. From a practical perspective, the results of our study demonstrate the limits of VC with regard to the financing of technology transfer and highlight the need for public funding through governmental VC or agencies for (disruptive) innovation. [less ▲]

Detailed reference viewed: 45 (1 UL)
See detailNorm und Normativität
Becker, Katrin UL

in Schneck,; Lieb, Claudia; Siebenpfeiffer, Hania (Eds.) Handbuch Literatur und Recht (in press)

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailChildren’s internalizing behavior development is heterogeneously associated with the pace of epigenetic aging
Caro, Juan Carlos; Holuka, Cyrielle; Menta, Giorgia et al

in Biological Psychology (in press)

Background: Internalizing behaviors are an indicator of children’s psychological and emotional development, predicting future mental disorders. Recent studies have identified associations between DNA ... [more ▼]

Background: Internalizing behaviors are an indicator of children’s psychological and emotional development, predicting future mental disorders. Recent studies have identified associations between DNA methylation (DNAm) and internalizing behaviors. This prospective study aimed at exploring the associations between pace of biological aging and the developmental trajectories of internalizing behaviors. Methods: Participants were children from the Avon Longitudinal Study of Parents and Children (ALSPAC) cohort (N=974). Measures of DNA methylation were collected at birth, age 7 and ages 15-17. The pace of aging was estimated using the DunedinPoAm algorithm (PoAm). Internalizing behaviors reported by caregivers between ages 4 and 16 using the Strengths and Difficulties Questionnaire. To explore heterogeneity in the association between PoAm and internalizing behaviors we use Poisson quantile regression in cross-section heterogeneity and longitudinal latent class analysis over the childhood and adolescence. Results: Internalizing behavior trajectories were identified: low-risk, childhood limited, late onset and early onset (persistent). Accelerated aging at birth was negatively associated with internalizing behaviors in early childhood but positively correlated during adolescence. Higher PoAm at birth increased chance of low-risk profile, while decreasing likelihood of childhood limited trajectory. PoAm at age 15 was negatively associated with childhood limited profile and positively linked to late onset trajectories. Associations were larger at higher values of internalizing symptoms. Conclusions: The heterogeneity in the association between biological age acceleration and internalizing behaviors suggests a complex dynamic relationship, particularly in children with high or increased risk of adverse mental health outcomes. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailDesigning and managing an online, personalised research writing course for postgraduates
Deroey, Katrien UL; Skipp, Jennifer

in Mcdiarmid, Carole (Ed.) Exploring pedagogical approaches in EAP teaching (in press)

This paper describes and evaluates a multidisciplinary, online research writing course for PhD students. First, we explain our course rationale and set-up. The core principles are personalised, self ... [more ▼]

This paper describes and evaluates a multidisciplinary, online research writing course for PhD students. First, we explain our course rationale and set-up. The core principles are personalised, self-regulated and peer learning, and the optimal use of class time. This is achieved through the following components: an e-coursebook developed in-house; tasks preparing students for the workshops; workshops; writing and reflection; peer review; and individual consultations. Next, we review participants’ feedback from course evaluation surveys. Many students liked the online format although most would prefer the peer review and discussion of theory to happen ‘offline’. A key finding for course efficacy is that students greatly valued working with their own examples in the workshops. They saw this and independent learning tasks as the greatest drivers of their writing development. They also benefited from multidisciplinary peer review. As regards the writing and reflection, all students chose to write on their own and the writing reflection tool was deemed ineffective. We furthermore discuss our (teachers’) perceptions of the affordances and challenges of this course format. On the one hand, it allows workshops to be devoted to collaborative tasks, reflection and data-driven learning. On the other hand, preparing such workshops is very time-consuming, while the multiple components and regular task submissions carry a heavy administrative burden. The paper concludes with how lessons learnt have been implemented into the current course configuration. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailI Want to Start My Own Business. Can I Ask Our Firm or Family for Help?
Fletcher, Denise Elaine UL

in Jaskiewicz, Peter; Rau, Sabine (Eds.) Enabling Next Generation Legacies”: 35 Questions that Next Generation Members in Enterprising Families Ask (in press)

It is often said that the entrepreneurs of today are the family businesses of tomorrow. This assertion is supported by findings in a Global Entrepreneurship Monitor (2019-20) Report on ‘Family ... [more ▼]

It is often said that the entrepreneurs of today are the family businesses of tomorrow. This assertion is supported by findings in a Global Entrepreneurship Monitor (2019-20) Report on ‘Family Entrepreneurship’ which cites that 75% of respondent entrepreneurs across 48 economies indicate that their family was actively involved in either starting or developing a new business . In spite of this, and the fact that it is becoming more popular for family firms to encourage entrepreneurialism within the younger generation, it is often challenging for Next Gens to ‘carve out’ an entrepreneurial identity for themselves. This is even more so the case if the intention is to pursue new ideas that are not central to the core business and which might disturb long-planned succession strategies, or expectations held by senior family members. Making the decision to get on board the entrepreneur(ship) is an important career decision that has huge implications, not only for the Next Gens who are planning this, but also for current members of the family business who might have to adjust their expectations. [less ▲]

Detailed reference viewed: 44 (1 UL)
Full Text
Peer Reviewed
See detailToward an understanding of the implementation of management innovation in international joint ventures: A multilevel perspective
KORBI, Fadia; Geraudel, Mickaël UL; NAKARA, Walid

in European Management Review (in press)

Implementing management innovation (MI) is a great challenge for international joint ventures (IJVs), specifically for those between multinational enterprises (MNEs) and local firms. Different multilevel ... [more ▼]

Implementing management innovation (MI) is a great challenge for international joint ventures (IJVs), specifically for those between multinational enterprises (MNEs) and local firms. Different multilevel factors have been shown in the international business literature to play a role in MI implementation within IJVs. In this paper, we add to this literature by showing that these factors do not act in isolation and that their interplay must be considered. To this aim, we draw on qualitative data from 35 CEOs and TMT members of five IJVs between European MNEs and Tunisian local firms. Overall, our study reveals that depending on the type of IJV, the multilevel factors playing a role in the implementation of MI are different [less ▲]

Detailed reference viewed: 27 (1 UL)
See detailGegenstand, Entwicklungen und Forschungsfelder der Trans Studies
de Silva, Adrian UL

in Gradinari, Irina (Ed.) (Re-)Visionen: Epistemologien, Ontologien und Methodologien der Geschlechterforschung (in press)

The article introduces the reader to the dynamic and interdisciplinary field of Trans Studies with a focus on the development of the field in Germany. For this purpose, the article addresses socio ... [more ▼]

The article introduces the reader to the dynamic and interdisciplinary field of Trans Studies with a focus on the development of the field in Germany. For this purpose, the article addresses socio-political and theoretical contexts from which Trans Studies emerged, the impact of these intellectual influences as well as the methodological orientation and realization in individual studies, and it contains an overview of central fields of Trans Studies research as they have developed until 2021. [less ▲]

Detailed reference viewed: 90 (10 UL)
Full Text
Peer Reviewed
See detailVon Objekt- und Meta-Ebenen: Analyse der Softwareanforderungen computergestützter juristischer Entscheidungen
Adrian, Axel; Rapp, Max; Steen, Alexander UL

in Recht DIGITAL – 25 Jahre IRIS, Proceedings of the International Legal Informatics Symposium (IRIS 2022) (in press)

Die Interpretation und Anwendung von Gesetzestexten auf einem konkreten Lebenssachverhalt erfordert von menschlichen Experten ein hohes Maß an Wissen, Erfahrung und die Fähigkeit zahlreiche kontextuelle ... [more ▼]

Die Interpretation und Anwendung von Gesetzestexten auf einem konkreten Lebenssachverhalt erfordert von menschlichen Experten ein hohes Maß an Wissen, Erfahrung und die Fähigkeit zahlreiche kontextuelle Überlegungen anzustellen. Die Formalisierung und Automatisierung solch eines Prozesses in einem computergestützten Verfahren muss dies entsprechend reflektieren. Ausgehend von einer Fallstudie werden in dieser Arbeit erforderliche juridische Schritte der Rechtsanwendung identifiziert und verschiedenen Objekt- und Meta-Ebenen zugeordnet. Diese Zuordnung erlaubt eine abstrakte Analyse von Softwareanforderungen, die juristische Assistenzsysteme erfüllen müssen, um bei juristischen Fallentscheidungen unterstützen zu können. [less ▲]

Detailed reference viewed: 66 (1 UL)