Last 7 days
![]() Bloch, Natalie ![]() in Theater heute (2022), 63(12), 59-60 Detailed reference viewed: 28 (0 UL)![]() Faber, Véronique ![]() Presentation (2022, December) Research poster highlighting the focus of thesis topic on border collaborations Detailed reference viewed: 31 (2 UL)![]() Mahmood, Asad ![]() ![]() Scientific Conference (2022, December) With the technological evolution and new applications, user equipment (UEs) has become a vital part of our lives. However, limited computational capabilities and finite battery life bottleneck the ... [more ▼] With the technological evolution and new applications, user equipment (UEs) has become a vital part of our lives. However, limited computational capabilities and finite battery life bottleneck the performance of computationally demanding applications. A practical solution to enhance the quality of experience (QoE) is to offload the extensive computation to the mobile edge cloud (MEC). Moreover, the network’s performance can be further improved by deploying an unmanned aerial vehicle (UAV) integrated with intelligent reflective surfaces (IRS): an effective alternative to massive antenna systems to enhance the signal quality and suppress interference. In this work, the MEC network architecture is assisted by UAV-IRS to provide computational services to the UEs. To do so, a cost minimization problem in terms of computing time and hovering energy consumption is formulated. Furthermore, to achieve an efficient solution to a formulated challenging problem, the original optimization problem is decoupled into sub-problems using the block-coordinate decent method. Moreover, numerical results are compared to baseline schemes to determine the effectiveness of the proposed scheme. Simulation results demonstrate that the optimal allocation of local computational resources results in minimizing tasks’ computational time and hovering energy consumption. [less ▲] Detailed reference viewed: 50 (16 UL)![]() ; ; et al in Hormigon y Acero (2022) This paper describes the model for the compressive stress-strain behaviourof steel-fibre reinforced concrete (SFRC) in Annex L of the new Eurocode 2(CEN, Eurocode 2: Design of concrete structures. Part 1 ... [more ▼] This paper describes the model for the compressive stress-strain behaviourof steel-fibre reinforced concrete (SFRC) in Annex L of the new Eurocode 2(CEN, Eurocode 2: Design of concrete structures. Part 1-1: General rules– Rules for buildings, bridges and civil structures, prEN 1992-1-1: 2022;EC2 in short), developed within CEN TC250/SC2/WG1/TG2 – Fiber rein-forced concrete. The model uses functions obtained from correlations withan extensive database comprised of 197 well-documented SFRC compres-sive tests and 484 flexural tests. We detailedly explain the model and derive the strain values for the parabola-rectangle model for ULS of SFRC in An-nex L. In addition, we also use the model and the correlations with thedatabase to provide a link between the compressive and the flexural perfor-mance classes in EC2, which allows a complete definition of any particularSFRC. Likewise, we derive parabola-rectangle strain values for each flexuralperformance class, which is mainly advantageous for the stronger flexuralperformance classes. Finally, we give an example showing the enhancementin strength and ductility of a composite steel-SFRC section endorsed withthe new model, which results of 15% and 100%, respectively. [less ▲] Detailed reference viewed: 35 (4 UL)![]() Dubuisson, Bastien ![]() in Kurtrierisches Jahrbuch (2022), 62 Detailed reference viewed: 37 (6 UL)![]() Lorenzoni, Isabella ![]() in Yearbook of Antitrust and Regulatory Studies (2022, December), 15(26), 33-55 Recent technological developments are transforming the way antitrust is enforced as well as the way market players are infringing competition law. As a result, enforcers are starting to equip themselves ... [more ▼] Recent technological developments are transforming the way antitrust is enforced as well as the way market players are infringing competition law. As a result, enforcers are starting to equip themselves with sophisticated digital investigation tools. This paper explores this interest in building an Artificial Intelligence (AI) arsenal for the fight against algorithmic infringements. What are the key factors motivating regulators to develop their own technological tools to enforce competition law? Building on interviews with a number of competition authorities, this paper finds that changes in digital markets, the need for enforcers to reverse- engineer companies’ algorithms in order to better understand their implications for competition law, the need to enhance efficiency and keep pace with the fast evolution of the digital economy, and, finally, the decrease in leniency applications, are all reasons for which competition authorities should strive for more innovative and alternative means to boost their ex officio investigations. [less ▲] Detailed reference viewed: 165 (0 UL)![]() Alsahli, Malik Ruzayq M ![]() ![]() ![]() in Bella, Giampaolo; Doinea, Mihai; Janicke, Helge (Eds.) Innovative Security Solutions for Information Technology and Communications, 15th International Conference, SECITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers (2022, December) The U.S. National Institute of Standards and Technology is currently undertaking a process to evaluate and eventually standardize one or more "lightweight" algorithms for authenticated encryption and ... [more ▼] The U.S. National Institute of Standards and Technology is currently undertaking a process to evaluate and eventually standardize one or more "lightweight" algorithms for authenticated encryption and hashing that are suitable for resource-restricted devices. In addition to security, this process takes into account the efficiency of the candidate algorithms in various hardware environments (e.g. FPGAs, ASICs) and software platforms (e.g. 8, 16, 32-bit microcontrollers). However, while there exist numerous detailed benchmarking results for 8-bit AVR and 32-bit ARM/RISC-V/ESP32 microcontrollers, relatively little is known about the candidates' efficiency on 16-bit platforms. In order to fill this gap, we present a performance evaluation of the final-round candidates Ascon, Schwaemm, TinyJambu, and Xoodyak on the MSP430 series of ultra-low-power 16-bit microcontrollers from Texas Instruments. All four algorithms were explicitly designed to achieve high performance in software and have further in common that the underlying primitive is a permutation. We discuss how these permutations can be implemented efficiently in Assembly language and analyze how basic design decisions impact their execution time on the MSP430 architecture. Our results show that, overall, Schwaemm is the fastest algorithm across various lengths of data and associated data, respectively. Xoodyak has benefits when a large amount of associated data is to be authenticated, whereas TinyJambu is very efficient for the authentication of short messages. [less ▲] Detailed reference viewed: 148 (34 UL)![]() Lehmann, Harry ![]() in Siegmund, Judith (Ed.) Handbuch Kunstphilosophie (2022) Detailed reference viewed: 26 (1 UL)![]() ; ; et al in Transactions on Machine Learning Research (2022) Detailed reference viewed: 19 (1 UL)![]() Apostolopoulos, Petros ![]() in International Public History (2022), 5(2), 159-161 Detailed reference viewed: 18 (2 UL)![]() Daoudi, Nadia ![]() ![]() in Empirical Software Engineering (2022), 28 Research on Android malware detection based on Machine learning has been prolific in recent years. In this paper, we show, through a large-scale evaluation of four state-of-the-art approaches that their ... [more ▼] Research on Android malware detection based on Machine learning has been prolific in recent years. In this paper, we show, through a large-scale evaluation of four state-of-the-art approaches that their achieved performance fluctuates when applied to different datasets. Combining existing approaches appears as an appealing method to stabilise performance. We therefore proceed to empirically investigate the effect of such combinations on the overall detection performance. In our study, we evaluated 22 methods to combine feature sets or predictions from the state-of-the-art approaches. Our results showed that no method has significantly enhanced the detection performance reported by the state-of-the-art malware detectors. Nevertheless, the performance achieved is on par with the best individual classifiers for all settings. Overall, we conduct extensive experiments on the opportunity to combine state-of-the-art detectors. Our main conclusion is that combining state-of-theart malware detectors leads to a stabilisation of the detection performance, and a research agenda on how they should be combined effectively is required to boost malware detection. All artefacts of our large-scale study (i.e., the dataset of ∼0.5 million apks and all extracted features) are made available for replicability. [less ▲] Detailed reference viewed: 29 (4 UL)![]() Boualouache, Abdelwahab ![]() in IEEE Internet of Things Journal (2022) 5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and beyond networks (B5G ... [more ▼] 5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and beyond networks (B5G), unprecedented new vehicular use–cases can be supported on top of the same physical network. NS promises to enable the sharing of common network infrastructure and resources while ensuring strict traffic isolation and providing necessary network resources to each NS. However, enabling NS in vehicular networks brings new security challenges and requirements that automotive or 5G standards have not yet addressed. Attackers can exploit the weakest link in the slicing chain, connected and automated vehicles, to violate the slice isolation and degrade its performance. Furthermore, these attacks can be more powerful, especially if they are produced in cross-border areas of two countries, which require an optimal network transition from one operator to another. Therefore, this article aims to provide an overview of newly enabled 5G-V2X slicing use cases and their security issues while focusing on cross-border slicing attacks. It also presents the open security issues of 5G-V2X slicing and identifies some opportunities. [less ▲] Detailed reference viewed: 83 (15 UL)![]() Boualouache, Abdelwahab ![]() ![]() in IEEE Communications Surveys and Tutorials (2022) Advances in Vehicle-to-Everything (V2X) technology and onboard sensors have significantly accelerated deploying Connected and Automated Vehicles (CAVs). Integrating V2X with 5G has enabled Ultra-Reliable ... [more ▼] Advances in Vehicle-to-Everything (V2X) technology and onboard sensors have significantly accelerated deploying Connected and Automated Vehicles (CAVs). Integrating V2X with 5G has enabled Ultra-Reliable Low Latency Communications (URLLC) to CAVs. However, while communication performance has been enhanced, security and privacy issues have increased. Attacks have become more aggressive, and attackers have become more strategic. Public Key Infrastructure (PKI) proposed by standardization bodies cannot solely defend against these attacks. Thus, in complementary of that, sophisticated systems should be designed to detect such attacks and attackers. Machine Learning (ML) has recently emerged as a key enabler to secure future roads. Various V2X Misbehavior Detection Systems (MDSs) have adopted this paradigm. However, analyzing these systems is a research gap, and developing effective ML-based MDSs is still an open issue. To this end, this paper comprehensively surveys and classifies ML-based MDSs as well as discusses and analyses them from security and ML perspectives. It also provides some learned lessons and recommendations for guiding the development, validation, and deployment of ML-based MDSs. Finally, this paper highlighted open research and standardization issues with some future directions. [less ▲] Detailed reference viewed: 29 (17 UL)![]() Bavle, Hriday ![]() ![]() ![]() E-print/Working paper (2022) In this paper, we present an evolved version of the Situational Graphs, which jointly models in a single optimizable factor graph, a SLAM graph, as a set of robot keyframes, containing its associated ... [more ▼] In this paper, we present an evolved version of the Situational Graphs, which jointly models in a single optimizable factor graph, a SLAM graph, as a set of robot keyframes, containing its associated measurements and robot poses, and a 3D scene graph, as a high-level representation of the environment that encodes its different geometric elements with semantic attributes and the relational information between those elements. Our proposed S-Graphs+ is a novel four-layered factor graph that includes: (1) a keyframes layer with robot pose estimates, (2) a walls layer representing wall surfaces, (3) a rooms layer encompassing sets of wall planes, and (4) a floors layer gathering the rooms within a given floor level. The above graph is optimized in real-time to obtain a robust and accurate estimate of the robot's pose and its map, simultaneously constructing and leveraging the high-level information of the environment. To extract such high-level information, we present novel room and floor segmentation algorithms utilizing the mapped wall planes and free-space clusters. We tested S-Graphs+ on multiple datasets including, simulations of distinct indoor environments, on real datasets captured over several construction sites and office environments, and on a real public dataset of indoor office environments. S-Graphs+ outperforms relevant baselines in the majority of the datasets while extending the robot situational awareness by a four-layered scene model. Moreover, we make the algorithm available as a docker file. [less ▲] Detailed reference viewed: 55 (4 UL)![]() Sagrillo, Damien François ![]() in Ehret, Jean (Ed.) Die geistige und geistliche Macht der Musik (2022) Im Beitrag geht es einerseits um briefliche Korrespondenzen im Zusammenhang mit dem Cäcilianismus in Luxemburg, insbesondere um den Briefaustausch zwischen zwei herausgehobenen Persönlichkeiten, nämlich ... [more ▼] Im Beitrag geht es einerseits um briefliche Korrespondenzen im Zusammenhang mit dem Cäcilianismus in Luxemburg, insbesondere um den Briefaustausch zwischen zwei herausgehobenen Persönlichkeiten, nämlich Franz Xaver Witt, dem im süddeutschen Raum wirkenden Hauptvertreter der kirchenmusikalischen Reformbewegung, und seinem in Luxemburg wirkenden Mitstreiter im Geiste, Heinrich Oberhoffer. Ande-rerseits werden Formen von Machtausübung thematisiert, die vom Cäcili-anismus ausgehen und auf ihn einwirken. [less ▲] Detailed reference viewed: 56 (1 UL)![]() Saintes, Laetitia ![]() in Savoirs en lien (2022), 1 Under the July Monarchy, parliamentary debate was marked by the sometimes unheard-of verbal violence of the exchanges that Louis de Cormenin, MP and pamphleteer, described in his Livre des orateurs (1836 ... [more ▼] Under the July Monarchy, parliamentary debate was marked by the sometimes unheard-of verbal violence of the exchanges that Louis de Cormenin, MP and pamphleteer, described in his Livre des orateurs (1836). In the face of this hysterisation of parliamentary debate, did Cormenin plead for moderation? Did he advocate a debate that allowed room for verbal violence against the immobilism of ministerial policy? Or did he call for a middle way? This contribution seeks to answer this question in the light of the Livre des orateurs and the Lettres sur la liste civile. [less ▲] Detailed reference viewed: 29 (1 UL)![]() Allemand, Frederic ![]() in European Central Bank (Ed.) ESCB Legal Conference 2022 (2022, December) Legal data visualisation and legal knowledge visualisation are increasingly attracting the attention of the legal community, given their alleged positive impact on legal teaching, access to and ... [more ▼] Legal data visualisation and legal knowledge visualisation are increasingly attracting the attention of the legal community, given their alleged positive impact on legal teaching, access to and understanding of the law by citizens and/or litigants, or the production of new legal products or services (e.g. Stanford Legal Design Lab). On the other hand, very few legal research studies are based on and integrate into their analysis the visualization of legal data, legal information, or of legal knowledge. Even fewer studies examine the impact of these tools on legal research methodology. Legal scholars are no less skilled and familiar with the use of IT tools, from preparing their lectures (e.g. ppt presentations) to consulting online databases or using expert systems to review articles. Is the lack of interest in legal data visualisation tools an expression of any technological difficulty? To use Friedrich Lachmayer's metaphor, "Legal informatics, which includes the visualisation of legal data, is about building a bridge between law and informatics. But in the design of visualisation tools, informatics scholars expect too much from legal scholars, then the latter give up and the bridge collapses. Or does the problem stem from a specific feature of the law, namely the ontological formalism of legal norms, which would prevent the dissemination of these tools - or render them useless? Rather than exploring this issue from a theoretical perspective, this study will examine the relevance of legal data visualization tools through the analysis of a concrete case, namely the updating that the present author is to carry out of the "Euro" section, published in the French Répertoire Dalloz. This section, originally written in 2002 by Professor Jean-Victor Louis, analyses the monetary law of the Union. In addition to updating the references to the relevant legal acts and instruments in force, this new version should also highlight changes to the content of the lex monetae and related legislation (protection of banknotes and coins, anti-counterfeiting measures, conversion and rounding procedures, etc.). As part of the updating process, the research methodology will be based on the visualisation tools made available by EUR-lex. The study will therefore examine the extent to which these tools have supported the research and facilitated the identification of new insights. Or, on the contrary, to what extent they proved to be inappropriate or insufficient and, if so, for what reasons? [less ▲] Detailed reference viewed: 13 (0 UL)![]() Riassetto, Isabelle ![]() Book published by GLN Joly (2022) Detailed reference viewed: 46 (6 UL)![]() ![]() Corbisier, Isabelle ![]() in Delvaux, Marie-Amélie; Coipel, Michel (Eds.) Jurisprudence en droit des sociétés et des associations - recueil annuel (2022) Detailed reference viewed: 32 (0 UL)![]() Poillot, Elise ![]() in Picod, Fabrice (Ed.) Jurisprudence de la CJUE 2021 (2022) Detailed reference viewed: 51 (0 UL) |
||