Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailAmbient Backscatter Assisted Co-Existence in Aerial-IRS Wireless Networks
Solanki, Sourabh UL; Gautam, Sumit; Sharma, Shree Krishna et al

in IEEE Open Journal of the Communications Society (in press)

Ambient backscatter communication (AmBC) is an emerging technology that has the potential to offer spectral- and energy-efficient solutions for the next generation wireless communications networks ... [more ▼]

Ambient backscatter communication (AmBC) is an emerging technology that has the potential to offer spectral- and energy-efficient solutions for the next generation wireless communications networks, especially for the Internet of Things (IoT). Intelligent reflecting surfaces (IRSs) are also perceived to be an integral part of the beyond 5G systems to complement the traditional relaying scheme. To this end, this paper proposes a novel system design that enables the co-existence of a backscattering secondary system with the legacy primary system. This co-existence is primarily driven by leveraging the AmBC technique in IRS-assisted unmanned aerial vehicle (UAV) networks. More specifically, an aerial-IRS mounted on a UAV is considered to be employed for cooperatively relaying the transmitted signal from a terrestrial primary source node to a user equipment on the ground. Meanwhile, capitalizing on the AmBC technology, a backscatter capable terrestrial secondary node transmits its information to a terrestrial secondary receiver by modulating and backscattering the ambient relayed radio frequency signals from the UAV-IRS. We comprehensively analyze the performance of the proposed design framework with co-existing systems by deriving the outage probability and ergodic spectral efficiency expressions. Moreover, we also investigate the asymptotic behaviour of outage performance in high transmit power regimes for both primary and secondary systems. Importantly, we analyze the performance of the primary system by considering two different scenarios i.e., optimal phase shifts design and random phase shifting at IRS. Finally, based on the analytical performance assessment, we present numerical results to provide various useful insights and also provide simulation results to corroborate the derived theoretical results. [less ▲]

Detailed reference viewed: 86 (21 UL)
Full Text
Peer Reviewed
See detailMothers’ and fathers’ reflective functioning and its association with parenting behaviors and cortisol reactivity during a conflict interaction with their adolescent children
Decarli, Alessandro; Schulz, André UL; Pierrehumbert, Blaise et al

in Emotion (in press)

We assessed parental reflective functioning (PRF) with the Parent Development Interview - Revised, and investigated its association with parenting behaviors, i.e., autonomy support and psychological ... [more ▼]

We assessed parental reflective functioning (PRF) with the Parent Development Interview - Revised, and investigated its association with parenting behaviors, i.e., autonomy support and psychological control (operationalized in terms of behaviors promoting and undermining autonomy relatedness), and stress responses (cortisol reactivity) during a parent-child conflict interaction task (Family Interaction Task). Participants were 40 mothers and 28 fathers, who took part in the study together with their adolescent children (N = 49). Mothers had significantly lower PRF and displayed more psychologically controlling behaviors in the interaction with their children than fathers. Rather than sex per se, high levels of PRF were the best predictors of autonomy support, whereas lower levels of PRF predicted more psychological control. Higher levels of PRF were also the best predictor for lower levels of parenting stress. Stress in the context of parenting was neither related to autonomy support nor to psychological control, which were best predicted by divorced family status. The findings point to the potential utility of interventions aimed at improving PRF and stress management in the context of parenting, especially in divorced families, given their protective effects on parenting behaviors. [less ▲]

Detailed reference viewed: 80 (2 UL)
Full Text
Peer Reviewed
See detailTHz-Empowered UAVs in 6G: Opportunities, Challenges, and Trade-Offs
Azari, Mohammad Mahdi UL; Solanki, Sourabh UL; Chatzinotas, Symeon UL et al

in IEEE Communications Magazine (in press)

Envisioned use cases of unmanned aerial vehicles (UAVs) impose new service requirements in terms of data rate, latency, and sensing accuracy, to name a few. If such requirements are satisfactorily met, it ... [more ▼]

Envisioned use cases of unmanned aerial vehicles (UAVs) impose new service requirements in terms of data rate, latency, and sensing accuracy, to name a few. If such requirements are satisfactorily met, it can create novel applications and enable highly reliable and harmonized integration of UAVs in the 6G network ecosystem. Towards this, terahertz (THz) bands are perceived as a prospective technological enabler for various improved functionalities such as ultra-high throughput and enhanced sensing capabilities. This paper focuses on THz-empowered UAVs with the following capabilities: communication, sensing, localization, imaging, and control. We review the potential opportunities and use cases of THz-empowered UAVs, corresponding novel design challenges, and resulting trade-offs. Furthermore, we overview recent advances in UAV deployments regulations, THz standardization, and health aspects related to THz bands. Finally, we take UAV to UAV (U2U) communication as a case-study to provide numerical insights into the impact of various system design parameters and environment factors. [less ▲]

Detailed reference viewed: 92 (19 UL)
Peer Reviewed
See detailZur Wechselseitigkeit von Sozialer Anerkennung und Selbstbildung: Jugendliche und junge Erwachsene im Alter zwischen 12 und 30 Jahren in Einrichtungen der Jugendarbeit
Biewers, Sandra UL; Weis, Daniel UL; Latz, Anita UL

in Baltes-Löhr, Christel; Schumacher, Anette; Biewers, Sandra (Eds.) Zufriedenheit - Wohlbefinden - Anerkennung. Ein Blick hinter die Kulissen non-formaler Bildungseinrichtungen in Luxemburg (in press)

Detailed reference viewed: 54 (8 UL)
Full Text
Peer Reviewed
See detailFedFog: Network-Aware Optimization of Federated Learning over Wireless Fog-Cloud System
Nguyen, van Dinh UL; Chatzinotas, Symeon UL; Ottersten, Björn UL et al

in IEEE Transactions on Wireless Communications (in press)

Federated learning (FL) is capable of performing large distributed machine learning tasks across multiple edge users by periodically aggregating trained local parameters. To address key challenges of ... [more ▼]

Federated learning (FL) is capable of performing large distributed machine learning tasks across multiple edge users by periodically aggregating trained local parameters. To address key challenges of enabling FL over a wireless fogcloud system (e.g., non-i.i.d. data, users’ heterogeneity), we first propose an efficient FL algorithm based on Federated Averaging (called FedFog) to perform the local aggregation of gradient parameters at fog servers and global training update at the cloud. Next, we employ FedFog in wireless fog-cloud systems by investigating a novel network-aware FL optimization problem that strikes the balance between the global loss and completion time. An iterative algorithm is then developed to obtain a precise measurement of the system performance, which helps design an efficient stopping criteria to output an appropriate number of global rounds. To mitigate the straggler effect, we propose a flexible user aggregation strategy that trains fast users first to obtain a certain level of accuracy before allowing slow users to join the global training updates. Extensive numerical results using several real-world FL tasks are provided to verify the theoretical convergence of FedFog. We also show that the proposed co-design of FL and communication is essential to substantially improve resource utilization while achieving comparable accuracy of the learning model. [less ▲]

Detailed reference viewed: 70 (11 UL)
Full Text
Peer Reviewed
See detailEnergy performance comparison of ventilation-based heating versus water-based heating systems in an efficient residential building
Shirani, Arsalan UL; Merzkirch, Alexander; Leyer, Stephan UL et al

in Fluid Dynamics & Material Processing (in press)

The application of air-based heating systems as a possible approach to reduce the construction costs in highly efficient residential buildings is becoming popular. Air-based heating systems have been well ... [more ▼]

The application of air-based heating systems as a possible approach to reduce the construction costs in highly efficient residential buildings is becoming popular. Air-based heating systems have been well-known for their usage in passive houses during the past three decades. Available studies on such systems tend mostly to focus only on comparing exhaust air heat pump technology with conventional systems in efficient buildings. Moreover, most of the existing studies ignore the usual presence of the electrical heaters as backup. Besides, a comprehensive study and comparison between different air-based heating system concepts is still missing. In this study, four different air-based heating system concepts separated by the type of heat source of heat pump for heating and domestic hot water are defined. These systems are compared to four conventional heating system, including floor heating and direct electrical system employing dynamic annual simulations. According to simulation results, the systems with floor heating have shown the best system efficiencies and the lowest energy demand in comparison to the other systems. The main reason for this was the lower supply temperatures of the floor heating systems. Between the air heating systems, the system equipped with an outdoor air heat pump showed a better energy performance than an exhaust air system. The main reason for this could be attributed to the power limitation of exhaust air heat pump systems. [less ▲]

Detailed reference viewed: 59 (2 UL)
See detailProtéger, libérer, assujettir. L’extension territoriale de la commune de Florence au XIVe siècle
Abeles, Solal UL

Book published by École française de Rome (in press)

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailSprachliche Mittel in Fake News: Eine textlinguistische Perspektive
Huemer, Birgit UL

in Bendheim, Amelie; Pavlik, Jennifer (Eds.) Fake News. Von Fakten und Fiktionen in Literatur und Medien (in press)

Linguistische Studien zum Thema Fake News nähern sich diesem Phänomen hauptsächlich aus zwei verschiedenen Richtungen. Mit Methoden der kritischen Diskursanalyse wird untersucht wie der Begriff Fake News ... [more ▼]

Linguistische Studien zum Thema Fake News nähern sich diesem Phänomen hauptsächlich aus zwei verschiedenen Richtungen. Mit Methoden der kritischen Diskursanalyse wird untersucht wie der Begriff Fake News im öffentlichen Diskurs verwendet wird, welche Vorstellungen geschaffen, welche Identitäten konstruiert werden und welche Machtverhältnisse erzeugt, verteidigt oder herausgefordert werden. Computerlinguistische Ansätze beschäftigen sich mit der Charakterisierung und automatisierten Erkennung von Fake News, um diese von sogenanntem „rechtmäßigen“ Nachrichten (legitimate news ) zu unterscheiden. Textlinguistische Untersuchungen zum Thema Fake News gibt es bisher kaum. In diesem Beitrag wird zuerst den wenig vorhandenen linguistischen Definitionsansätzen von Fake News auf den Grund gegangen, mit dem Ziel diese durch die textlinguistische Analyse zu ergänzen. Danach werden die beiden sprachwissenschaftlichen Zugänge zum Phänomen Fake News vorgestellt und einige Untersuchungen zum Corona-Diskurs skizziert, die für die Beispielanalyse relevant sind. Exemplarisch werden in der vorliegenden Untersuchung redaktionelle Beiträge und Fake News zum Corona-Diskurs qualitative analysiert und miteinander verglichen. Damit wird der Versuch unternommen Fake News als Textsorte einzuordnen und die sprachlichen Strategien herauszuarbeiten, die für dieses Phänomen typisch sind. Die zuvor erwähnten linguistischen Zugänge liefern dabei wertvolle Ergebnisse, die als Ausgangsbasis für diese Untersuchung dienen. Die Analyse zeigt, dass sich Fake News zwar an journalistischen Nachrichtenformaten orientieren, jedoch sprachliche Muster aufweisen, die sie von diesen unterscheiden. Unter anderem benutzen sie sprachliche Strategien wie Polarisierung, starke Wertungen und direkte Leseradressierung, die für redaktionelle Berichterstattung unüblich ist. Diese Strategien sind nicht nur für Fake News typisch, sondern weisen eine gewisse Parallele zu sprachlichen Mustern in Verschwörungstheorien und Propaganda auf. [less ▲]

Detailed reference viewed: 119 (0 UL)
Full Text
Peer Reviewed
See detailA Machine Learning Approach for Automated Filling of Categorical Fields in Data Entry Forms
Belgacem, Hichem UL; Li, Xiaochen; Bianculli, Domenico UL et al

in ACM Transactions on Software Engineering and Methodology (in press)

Users frequently interact with software systems through data entry forms. However, form filling is time-consuming and error-prone. Although several techniques have been proposed to auto-complete or pre ... [more ▼]

Users frequently interact with software systems through data entry forms. However, form filling is time-consuming and error-prone. Although several techniques have been proposed to auto-complete or pre-fill fields in the forms, they provide limited support to help users fill categorical fields, i.e., fields that require users to choose the right value among a large set of options. In this paper, we propose LAFF, a learning-based automated approach for filling categorical fields in data entry forms. LAFF first builds Bayesian Network models by learning field dependencies from a set of historical input instances, representing the values of the fields that have been filled in the past. To improve its learning ability, LAFF uses local modeling to effectively mine the local dependencies of fields in a cluster of input instances. During the form filling phase, LAFF uses such models to predict possible values of a target field, based on the values in the already-filled fields of the form and their dependencies; the predicted values (endorsed based on field dependencies and prediction confidence) are then provided to the end-user as a list of suggestions. We evaluated LAFF by assessing its effectiveness and efficiency in form filling on two datasets, one of them proprietary from the banking domain. Experimental results show that LAFF is able to provide accurate suggestions with a Mean Reciprocal Rank value above 0.73. Furthermore, LAFF is efficient, requiring at most 317 ms per suggestion. [less ▲]

Detailed reference viewed: 85 (19 UL)
Full Text
Peer Reviewed
See detailEmpirical risk assessment of maintenance costs under full-service contracts
Deprez, Laurens UL; Antonio, Katrien; Boute, Robert

in European Journal of Operational Research (in press)

We provide a data-driven framework to conduct a risk assessment, including data pre-processing, exploration, and statistical modeling, on a portfolio of full-service maintenance contracts. These contracts ... [more ▼]

We provide a data-driven framework to conduct a risk assessment, including data pre-processing, exploration, and statistical modeling, on a portfolio of full-service maintenance contracts. These contracts cover all maintenance-related costs for a fixed, upfront fee during a predetermined horizon. Charging each contract a price proportional to its risk prevents adverse selection by incentivizing low risk (i.e., maintenance-light) profiles to not renege on their agreements. We borrow techniques from non-life insurance pricing and tailor them to the setting of maintenance contracts to assess the risk and estimate the expected maintenance costs under a full-service contract. We apply the framework on a portfolio of about 5 000 full-service contracts of industrial equipment and show how a data-driven analysis based on contract and machine characteristics, or risk factors, supports a differentiated, risk-based break-even tariff plan. We employ generalized additive models (GAMs) to predict the risk factors’ impact on the frequency (number of) and severity (cost) of maintenance interventions. GAMs are interpretable yet flexible statistical models that capture the effect of both continuous and categorical risk factors. Our predictive models quantify the impact of the contract and machine type, service history, and machine running hours on the contract cost. We additionally utilize the predictive cost distributions of our models to augment the break-even price with the appropriate risk margins to further protect against the inherently stochastic nature of the maintenance costs. The framework shows how maintenance intervention data can set up a differentiated tariff plan. [less ▲]

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailCOVID-19 and the global venture capital landscape
Bellavitis, Cristiano; Fisch, Christian UL; McNaughton, Rod

in Small Business Economics (in press)

We assess the effect of the COVID-19 pandemic on venture capital (VC) investments, documenting a significant decline in investments using a dataset of 39,527 funding rounds occurring before and during the ... [more ▼]

We assess the effect of the COVID-19 pandemic on venture capital (VC) investments, documenting a significant decline in investments using a dataset of 39,527 funding rounds occurring before and during the pandemic in 130 countries. In line with our theoretical considerations, we show that this decline is more pronounced for investments characterized by higher uncertainty, namely investments in seed-stage ventures, industries affected more heavily by the COVID-19 crisis, international investments, and non-syndicated investments. Investor prominence partially moderates these effects. [less ▲]

Detailed reference viewed: 35 (5 UL)
Full Text
Peer Reviewed
See detailAn (Un)Necessary Evil - Users’ (Un)Certainty about Smartphone App Permissions and Implications for Privacy Engineering
Bongard, Kerstin UL; Sterckx, Jean-Louis; Rossi, Arianna UL et al

in 2022 7th IEEE European Symposium on Security and Privacy Workshops (EuroSPW) (in press)

App permission requests are a control mechanism meant to help users oversee and safeguard access to data and resources on their smartphones. To decide whether to accept or deny such requests and make this ... [more ▼]

App permission requests are a control mechanism meant to help users oversee and safeguard access to data and resources on their smartphones. To decide whether to accept or deny such requests and make this consent valid, users need to understand the underlying reasons and judge the relevance of disclosing data in line with their own use of an app. This study investigates people’s certainty about app permission requests via an online survey with 400 representative participants of the UK population. The results demonstrate that users are uncertain about the necessity of granting app permissions for about half of the tested permission requests. This implies substantial privacy risks, which are discussed in the paper, resulting in a call for user-protecting interventions by privacy engineers. [less ▲]

Detailed reference viewed: 54 (5 UL)
Full Text
Peer Reviewed
See detailAutomated Question Answering for Improved Understanding of Compliance Requirements: A Multi-Document Study
Abualhaija, Sallam UL; Arora, Chetan; Sleimi, Amin et al

in In Proceedings of the 30th IEEE International Requirements Engineering Conference (RE'22), Melbourne, Australia 15-19 August 2022 (in press)

Software systems are increasingly subject to regulatory compliance. Extracting compliance requirements from regulations is challenging. Ideally, locating compliance-related information in a regulation ... [more ▼]

Software systems are increasingly subject to regulatory compliance. Extracting compliance requirements from regulations is challenging. Ideally, locating compliance-related information in a regulation requires a joint effort from requirements engineers and legal experts, whose availability is limited. However, regulations are typically long documents spanning hundreds of pages, containing legal jargon, applying complicated natural language structures, and including cross-references, thus making their analysis effort-intensive. In this paper, we propose an automated question-answering (QA) approach that assists requirements engineers in finding the legal text passages relevant to compliance requirements. Our approach utilizes large-scale language models fine-tuned for QA, including BERT and three variants. We evaluate our approach on 107 question-answer pairs, manually curated by subject-matter experts, for four different European regulatory documents. Among these documents is the general data protection regulation (GDPR) – a major source for privacy-related requirements. Our empirical results show that, in ~94% of the cases, our approach finds the text passage containing the answer to a given question among the top five passages that our approach marks as most relevant. Further, our approach successfully demarcates, in the selected passage, the right answer with an average accuracy of ~ 91%. [less ▲]

Detailed reference viewed: 198 (10 UL)
Full Text
Peer Reviewed
See detailOptimal Priority Assignment for Real-Time Systems: A Coevolution-Based Approach
Lee, Jaekwon UL; Shin, Seung Yeob UL; Nejati, Shiva et al

in Empirical Software Engineering (in press)

In real-time systems, priorities assigned to real-time tasks determine the order of task executions, by relying on an underlying task scheduling policy. Assigning optimal priority values to tasks is ... [more ▼]

In real-time systems, priorities assigned to real-time tasks determine the order of task executions, by relying on an underlying task scheduling policy. Assigning optimal priority values to tasks is critical to allow the tasks to complete their executions while maximizing safety margins from their specified deadlines. This enables real-time systems to tolerate unexpected overheads in task executions and still meet their deadlines. In practice, priority assignments result from an interactive process between the development and testing teams. In this article, we propose an automated method that aims to identify the best possible priority assignments in real-time systems, accounting for multiple objectives regarding safety margins and engineering constraints. Our approach is based on a multi-objective, competitive coevolutionary algorithm mimicking the interactive priority assignment process between the development and testing teams. We evaluate our approach by applying it to six industrial systems from different domains and several synthetic systems. The results indicate that our approach significantly outperforms both our baselines, i.e., random search and sequential search, and solutions defined by practitioners. Our approach scales to complex industrial systems as an offline analysis method that attempts to find near-optimal solutions within acceptable time, i.e., less than 16 hours. [less ▲]

Detailed reference viewed: 77 (24 UL)
Full Text
Peer Reviewed
See detailEstimating Probabilistic Safe WCET Ranges of Real-Time Systems at Design Stages
Lee, Jaekwon UL; Shin, Seung Yeob UL; Nejati, Shiva et al

in ACM Transactions on Software Engineering and Methodology (in press)

Estimating worst-case execution times (WCET) is an important activity at early design stages of real-time systems. Based on WCET estimates, engineers make design and implementation decisions to ensure ... [more ▼]

Estimating worst-case execution times (WCET) is an important activity at early design stages of real-time systems. Based on WCET estimates, engineers make design and implementation decisions to ensure that task execution always complete before their specified deadlines. However, in practice, engineers often cannot provide precise point WCET estimates and prefer to provide plausible WCET ranges. Given a set of real-time tasks with such ranges, we provide an automated technique to determine for what WCET values the system is likely to meet its deadlines, and hence operate safely with a probabilistic guarantee. Our approach combines a search algorithm for generating worst-case scheduling scenarios with polynomial logistic regression for inferring probabilistic safe WCET ranges. We evaluated our approach by applying it to three industrial systems from different domains and several synthetic systems. Our approach efficiently and accurately estimates probabilistic safe WCET ranges within which deadlines are likely to be satisfied with a high degree of confidence. [less ▲]

Detailed reference viewed: 71 (13 UL)
Full Text
Peer Reviewed
See detailReplication studies in top management journals: an empirical investigation of prevalence, types, outcomes, and impact
Block, Jörn; Fisch, Christian UL; Kanwal, Narmeen et al

in Management Review Quarterly (in press)

Replication studies are important for the empirical research process. Yet, while there is an increased awareness of the need for replication in management research, it appears that such studies are rarely ... [more ▼]

Replication studies are important for the empirical research process. Yet, while there is an increased awareness of the need for replication in management research, it appears that such studies are rarely published in leading management journals. Importantly, we lack a comprehensive overview of replication studies in the top management journals that spans all sub-disciplines. Our systematic review closes this gap and provides an overview of the prevalence, types, outcomes, and impact of replication studies in management journals. We find that differences in the prevalence of replications between sub-disciplines exist and that most replications are wide replications. With regard to the replication outcome, our review shows that the share of non-confirming replications is low. Moreover, such replications are cited less often than confirming replications pointing towards a confirmation bias in management research. We discuss the implications of our results for authors, reviewers, and editors of management journals. [less ▲]

Detailed reference viewed: 31 (2 UL)
Full Text
Peer Reviewed
See detailIntelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and Challenges
Nguyen, Dinh C; Nguyen, van Dinh UL; Ding, Ming et al

in IEEE Network (in press)

The convergence of mobile edge computing (MEC) and blockchain is transforming the current computing services in wireless Internet-of-Things networks, by enabling task offloading with security enhancement ... [more ▼]

The convergence of mobile edge computing (MEC) and blockchain is transforming the current computing services in wireless Internet-of-Things networks, by enabling task offloading with security enhancement based on blockchain mining. Yet the existing approaches for these enabling technologies are isolated, providing only tailored solutions for specific services and scenarios. To fill this gap, we propose a novel cooperative task offloading and blockchain mining (TOBM) scheme for a blockchain-based MEC system, where each edge device not only handles computation tasks but also deals with block mining for improving system utility. To address the latency issues caused by the blockchain operation in MEC, we develop a new Proof-of-Reputation consensus mechanism based on a lightweight block verification strategy. To accommodate the highly dynamic environment and high-dimensional system state space, we apply a novel distributed deep reinforcement learning-based approach by using a multi-agent deep deterministic policy gradient algorithm. Experimental results demonstrate the superior performance of the proposed TOBM scheme in terms of enhanced system reward, improved offloading utility with lower blockchain mining latency, and better system utility, compared to the existing cooperative and non-cooperative schemes. The paper concludes with key technical challenges and possible directions for future blockchain-based MEC research. [less ▲]

Detailed reference viewed: 28 (3 UL)
Full Text
Peer Reviewed
See detailAn Axiomatic Approach to the Measurement of Comparative Female Disadvantage
Chakravarty, Satya; Chattopadhyay, Nachiketa; d'Ambrosio, Conchita UL

in Social Indicators Research (in press)

Female comparative disadvantage refers to the mismatch of the female with respect to achievements in different dimensions of human well-being in comparison with the corresponding achievements of the male ... [more ▼]

Female comparative disadvantage refers to the mismatch of the female with respect to achievements in different dimensions of human well-being in comparison with the corresponding achievements of the male. This paper axiomatically derives a general family of female comparative disadvantage indicators which has very important policy implications. The axioms employed are shown to be ‘independent’. An empirical illustration of the general index is provided using the UNDP data on mean years of schooling, life expectancy at birth and gross national income per capita in 2018. Results show that female comparative disadvantage is not necessarily related to standard measures of human development, such as the HDI, and is present even in countries reaching very high human development. The factor where policy intervention is needed the most is income. [less ▲]

Detailed reference viewed: 46 (0 UL)
Full Text
Peer Reviewed
See detailAre Family Firms Doing More Innovation Output With Less Innovation Input? A Replication and Extension
Block, Joern; Hansen, Christopher UL; Steinmetz, Holger

in Entrepreneurship: Theory and Practice (in press)

Detailed reference viewed: 12 (1 UL)