Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailImmunity Defences and the Enforcement of Awards in Investor-State Disputes
Garcia Olmedo, Javier UL

in Nasir Gore, Kiran; Duggal, Kabir; Putilin, Elijah (Eds.) et al Investment Law & Arbitration in Central Asia: Emerging Issues (in press)

This chapter critically examines the claim that investment treaty awards have a final and binding character. It finds that, despite providing different mechanisms of collection, the ICSID and New York ... [more ▼]

This chapter critically examines the claim that investment treaty awards have a final and binding character. It finds that, despite providing different mechanisms of collection, the ICSID and New York Conventions provide states with a tool to avoid compliance with investment treaty awards based on sovereign immunity rules. These rules have been invoked by states in an increasing number of cases, creating a hurdle for investors to obtain payment of the award. This chapter concludes with some potential remedies to the immunity bar. [less ▲]

Detailed reference viewed: 14 (1 UL)
See detailStresstest für die Jugendmobilität im Grenzraum. Grenzüberschreitende Berufsausbildung und Studium während der Pandemie – Erfahrungen und Perspektiven
Funk, Ines; Wille, Christian UL

Report (in press)

Die grenzüberschreitende Studie wendet sich jungen Menschen zu, die in der Nachbetrachtung der Pandemie kaum Berücksichtigung fanden. Die Autor:innen analysieren zunächst die Pandemiefolgen für die duale ... [more ▼]

Die grenzüberschreitende Studie wendet sich jungen Menschen zu, die in der Nachbetrachtung der Pandemie kaum Berücksichtigung fanden. Die Autor:innen analysieren zunächst die Pandemiefolgen für die duale Berufsausbildung an der deutsch-französischen Grenze. Dabei stützen sie sich auf eigene Interviews, die Einblicke in die Dynamiken der grenzüberschreitenden Kooperation im Berufswesen geben in einer Zeit, die nicht nur von Covid-19, sondern auch von einer institutionellen Neuordnung geprägt war. Im Weiteren stellen die Autor:innen die Ergebnisse einer eigenen Befragung von Studierenden grenznaher Bachelor- und Master-Studienprogramme in der Großregion vor. Sie wurde an der Universität des Saarlandes koordiniert und gibt Auskunft über die physische und virtuelle Mobilität von Studierenden, über ihre sozialen Kontakte sowie den Beratungs- und Unterstützungsbedarf in den Jahren 2020 und 2021. Mit anschaulichen Beispielen aus dem trinationalen UniGR-Master in Border Studies werden die Ergebnisse illustriert. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailAn (Un)Necessary Evil - Users’ (Un)Certainty about Smartphone App Permissions and Implications for Privacy Engineering
Bongard, Kerstin UL; Sterckx, Jean-Louis; Rossi, Arianna UL et al

in 2022 7th IEEE European Symposium on Security and Privacy Workshops (EuroSPW) (in press)

App permission requests are a control mechanism meant to help users oversee and safeguard access to data and resources on their smartphones. To decide whether to accept or deny such requests and make this ... [more ▼]

App permission requests are a control mechanism meant to help users oversee and safeguard access to data and resources on their smartphones. To decide whether to accept or deny such requests and make this consent valid, users need to understand the underlying reasons and judge the relevance of disclosing data in line with their own use of an app. This study investigates people’s certainty about app permission requests via an online survey with 400 representative participants of the UK population. The results demonstrate that users are uncertain about the necessity of granting app permissions for about half of the tested permission requests. This implies substantial privacy risks, which are discussed in the paper, resulting in a call for user-protecting interventions by privacy engineers. [less ▲]

Detailed reference viewed: 54 (5 UL)
Full Text
Peer Reviewed
See detailAutomated Question Answering for Improved Understanding of Compliance Requirements: A Multi-Document Study
Abualhaija, Sallam UL; Arora, Chetan; Sleimi, Amin et al

in In Proceedings of the 30th IEEE International Requirements Engineering Conference (RE'22), Melbourne, Australia 15-19 August 2022 (in press)

Software systems are increasingly subject to regulatory compliance. Extracting compliance requirements from regulations is challenging. Ideally, locating compliance-related information in a regulation ... [more ▼]

Software systems are increasingly subject to regulatory compliance. Extracting compliance requirements from regulations is challenging. Ideally, locating compliance-related information in a regulation requires a joint effort from requirements engineers and legal experts, whose availability is limited. However, regulations are typically long documents spanning hundreds of pages, containing legal jargon, applying complicated natural language structures, and including cross-references, thus making their analysis effort-intensive. In this paper, we propose an automated question-answering (QA) approach that assists requirements engineers in finding the legal text passages relevant to compliance requirements. Our approach utilizes large-scale language models fine-tuned for QA, including BERT and three variants. We evaluate our approach on 107 question-answer pairs, manually curated by subject-matter experts, for four different European regulatory documents. Among these documents is the general data protection regulation (GDPR) – a major source for privacy-related requirements. Our empirical results show that, in ~94% of the cases, our approach finds the text passage containing the answer to a given question among the top five passages that our approach marks as most relevant. Further, our approach successfully demarcates, in the selected passage, the right answer with an average accuracy of ~ 91%. [less ▲]

Detailed reference viewed: 197 (10 UL)
Full Text
Peer Reviewed
See detailEstimating Probabilistic Safe WCET Ranges of Real-Time Systems at Design Stages
Lee, Jaekwon UL; Shin, Seung Yeob UL; Nejati, Shiva et al

in ACM Transactions on Software Engineering and Methodology (in press)

Estimating worst-case execution times (WCET) is an important activity at early design stages of real-time systems. Based on WCET estimates, engineers make design and implementation decisions to ensure ... [more ▼]

Estimating worst-case execution times (WCET) is an important activity at early design stages of real-time systems. Based on WCET estimates, engineers make design and implementation decisions to ensure that task execution always complete before their specified deadlines. However, in practice, engineers often cannot provide precise point WCET estimates and prefer to provide plausible WCET ranges. Given a set of real-time tasks with such ranges, we provide an automated technique to determine for what WCET values the system is likely to meet its deadlines, and hence operate safely with a probabilistic guarantee. Our approach combines a search algorithm for generating worst-case scheduling scenarios with polynomial logistic regression for inferring probabilistic safe WCET ranges. We evaluated our approach by applying it to three industrial systems from different domains and several synthetic systems. Our approach efficiently and accurately estimates probabilistic safe WCET ranges within which deadlines are likely to be satisfied with a high degree of confidence. [less ▲]

Detailed reference viewed: 70 (13 UL)
Full Text
Peer Reviewed
See detailReplication studies in top management journals: an empirical investigation of prevalence, types, outcomes, and impact
Block, Jörn; Fisch, Christian UL; Kanwal, Narmeen et al

in Management Review Quarterly (in press)

Replication studies are important for the empirical research process. Yet, while there is an increased awareness of the need for replication in management research, it appears that such studies are rarely ... [more ▼]

Replication studies are important for the empirical research process. Yet, while there is an increased awareness of the need for replication in management research, it appears that such studies are rarely published in leading management journals. Importantly, we lack a comprehensive overview of replication studies in the top management journals that spans all sub-disciplines. Our systematic review closes this gap and provides an overview of the prevalence, types, outcomes, and impact of replication studies in management journals. We find that differences in the prevalence of replications between sub-disciplines exist and that most replications are wide replications. With regard to the replication outcome, our review shows that the share of non-confirming replications is low. Moreover, such replications are cited less often than confirming replications pointing towards a confirmation bias in management research. We discuss the implications of our results for authors, reviewers, and editors of management journals. [less ▲]

Detailed reference viewed: 30 (1 UL)
Full Text
Peer Reviewed
See detailIntelligent Blockchain-based Edge Computing via Deep Reinforcement Learning: Solutions and Challenges
Nguyen, Dinh C; Nguyen, van Dinh UL; Ding, Ming et al

in IEEE Network (in press)

The convergence of mobile edge computing (MEC) and blockchain is transforming the current computing services in wireless Internet-of-Things networks, by enabling task offloading with security enhancement ... [more ▼]

The convergence of mobile edge computing (MEC) and blockchain is transforming the current computing services in wireless Internet-of-Things networks, by enabling task offloading with security enhancement based on blockchain mining. Yet the existing approaches for these enabling technologies are isolated, providing only tailored solutions for specific services and scenarios. To fill this gap, we propose a novel cooperative task offloading and blockchain mining (TOBM) scheme for a blockchain-based MEC system, where each edge device not only handles computation tasks but also deals with block mining for improving system utility. To address the latency issues caused by the blockchain operation in MEC, we develop a new Proof-of-Reputation consensus mechanism based on a lightweight block verification strategy. To accommodate the highly dynamic environment and high-dimensional system state space, we apply a novel distributed deep reinforcement learning-based approach by using a multi-agent deep deterministic policy gradient algorithm. Experimental results demonstrate the superior performance of the proposed TOBM scheme in terms of enhanced system reward, improved offloading utility with lower blockchain mining latency, and better system utility, compared to the existing cooperative and non-cooperative schemes. The paper concludes with key technical challenges and possible directions for future blockchain-based MEC research. [less ▲]

Detailed reference viewed: 28 (3 UL)
Full Text
Peer Reviewed
See detailAn Axiomatic Approach to the Measurement of Comparative Female Disadvantage
Chakravarty, Satya; Chattopadhyay, Nachiketa; d'Ambrosio, Conchita UL

in Social Indicators Research (in press)

Female comparative disadvantage refers to the mismatch of the female with respect to achievements in different dimensions of human well-being in comparison with the corresponding achievements of the male ... [more ▼]

Female comparative disadvantage refers to the mismatch of the female with respect to achievements in different dimensions of human well-being in comparison with the corresponding achievements of the male. This paper axiomatically derives a general family of female comparative disadvantage indicators which has very important policy implications. The axioms employed are shown to be ‘independent’. An empirical illustration of the general index is provided using the UNDP data on mean years of schooling, life expectancy at birth and gross national income per capita in 2018. Results show that female comparative disadvantage is not necessarily related to standard measures of human development, such as the HDI, and is present even in countries reaching very high human development. The factor where policy intervention is needed the most is income. [less ▲]

Detailed reference viewed: 45 (0 UL)
Full Text
Peer Reviewed
See detailI-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies
Pascoal, Túlio UL; Decouchant, Jérémie; Boutet, Antoine et al

in Proceedings on Privacy Enhancing Technologies (2023)

Genome-wide Association Studies (GWASes) identify genomic variations that are statistically associated with a trait, such as a disease, in a group of individuals. Unfortunately, careless sharing of GWAS ... [more ▼]

Genome-wide Association Studies (GWASes) identify genomic variations that are statistically associated with a trait, such as a disease, in a group of individuals. Unfortunately, careless sharing of GWAS statistics might give rise to privacy attacks. Several works attempted to reconcile secure processing with privacy-preserving releases of GWASes. However, we highlight that these approaches remain vulnerable if GWASes utilize overlapping sets of individuals and genomic variations. In such conditions, we show that even when relying on state-of-the-art techniques for protecting releases, an adversary could reconstruct the genomic variations of up to 28.6% of participants, and that the released statistics of up to 92.3% of the genomic variations would enable membership inference attacks. We introduce I-GWAS, a novel framework that securely computes and releases the results of multiple possibly interdependent GWASes. I-GWAS continuously releases privacy-preserving and noise-free GWAS results as new genomes become available. [less ▲]

Detailed reference viewed: 31 (6 UL)
Full Text
See detailSpatial adaptive settlement systems in archaeology. Modelling long-term settlement formation from spatial micro interactions
Sikk, Kaarel UL

Doctoral thesis (2023)

Despite research history spanning more than a century, settlement patterns still hold a promise to contribute to the theories of large-scale processes in human history. Mostly they have been presented as ... [more ▼]

Despite research history spanning more than a century, settlement patterns still hold a promise to contribute to the theories of large-scale processes in human history. Mostly they have been presented as passive imprints of past human activities and spatial interactions they shape have not been studied as the driving force of historical processes. While archaeological knowledge has been used to construct geographical theories of evolution of settlement there still exist gaps in this knowledge. Currently no theoretical framework has been adopted to explore them as spatial systems emerging from micro-choices of small population units. The goal of this thesis is to propose a conceptual model of adaptive settlement systems based on complex adaptive systems framework. The model frames settlement system formation processes as an adaptive system containing spatial features, information flows, decision making population units (agents) and forming cross scale feedback loops between location choices of individuals and space modified by their aggregated choices. The goal of the model is to find new ways of interpretation of archaeological locational data as well as closer theoretical integration of micro-level choices and meso-level settlement structures. The thesis is divided into five chapters, the first chapter is dedicated to conceptualisation of the general model based on existing literature and shows that settlement systems are inherently complex adaptive systems and therefore require tools of complexity science for causal explanations. The following chapters explore both empirical and theoretical simulated settlement patterns based dedicated to studying selected information flows and feedbacks in the context of the whole system. Second and third chapters explore the case study of the Stone Age settlement in Estonia comparing residential location choice principles of different periods. In chapter 2 the relation between environmental conditions and residential choice is explored statistically. The results confirm that the relation is significant but varies between different archaeological phenomena. In the third chapter hunter-fisher-gatherer and early agrarian Corded Ware settlement systems were compared spatially using inductive models. The results indicated a large difference in their perception of landscape regarding suitability for habitation. It led to conclusions that early agrarian land use significantly extended land use potential and provided a competitive spatial benefit. In addition to spatial differences, model performance was compared and the difference was discussed in the context of proposed adaptive settlement system model. Last two chapters present theoretical agent-based simulation experiments intended to study effects discussed in relation to environmental model performance and environmental determinism in general. In the fourth chapter the central place foragingmodel was embedded in the proposed model and resource depletion, as an environmental modification mechanism, was explored. The study excluded the possibility that mobility itself would lead to modelling effects discussed in the previous chapter. The purpose of the last chapter is the disentanglement of the complex relations between social versus human-environment interactions. The study exposed non-linear spatial effects expected population density can have on the system and the general robustness of environmental inductive models in archaeology to randomness and social effect. The model indicates that social interactions between individuals lead to formation of a group agency which is determined by the environment even if individual cognitions consider the environment insignificant. It also indicates that spatial configuration of the environment has a certain influence towards population clustering therefore providing a potential pathway to population aggregation. Those empirical and theoretical results showed the new insights provided by the complex adaptive systems framework. Some of the results, including the explanation of empirical results, required the conceptual model to provide a framework of interpretation. [less ▲]

Detailed reference viewed: 30 (1 UL)
Full Text
Peer Reviewed
See detailRegional heterogeneity and individual characteristics in the development of a European tax policy: historical insights from Luxembourg
Danescu, Elena UL

in Danescu, Elena; Dima, Alina Mihaela (Eds.) Fostering recovery through metaverse business modelling - An interdisciplinary analysis of the new paradigm shift (2023, March)

Luxembourg is currently one of the most politically stable, consensus-oriented, and prosperous countries in the world, characterised by am advanced social market economy, and a level of material wellbeing ... [more ▼]

Luxembourg is currently one of the most politically stable, consensus-oriented, and prosperous countries in the world, characterised by am advanced social market economy, and a level of material wellbeing above the EU average. Its strong fiscal position is well illustrated by a longstanding AAA credit rating, a significant accumulation of government financial assets, and a distinct fiscal approach. In this light, this paper aims to investigate the specific features of the tax system in Luxembourg from a multidisciplinary perspective by analysing historical sources and exploring the development of these particularities over time, their impact on the socioeconomic context and their repercussions for the European integration process, especially in the design and completion of Economic and Monetary Union (EMU). [less ▲]

Detailed reference viewed: 11 (0 UL)
Full Text
See detailGlobal Mega-Science: Universities Scientize the World
Baker, David UL; Powell, Justin J W UL

Book published by Stanford University Press (2023)

Detailed reference viewed: 45 (1 UL)
Full Text
Peer Reviewed
See detailSoK: Secure E-Voting with Everlasting Privacy
Haines, Thomas; Müller, Johannes; Mosaheb, Rafieh UL et al

in Proceedings on Privacy Enhancing Technologies (PoPETs) (2023)

Vote privacy is a fundamental right, which needs to be protected not only during an election, or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e-voting ... [more ▼]

Vote privacy is a fundamental right, which needs to be protected not only during an election, or for a limited time afterwards, but for the foreseeable future. Numerous electronic voting (e-voting) protocols have been proposed to address this challenge, striving for everlasting privacy. This property guarantees that even computationally unbounded adversaries cannot break privacy of past elections. The broad interest in secure e-voting with everlasting privacy has spawned a large variety of protocols over the last three decades. These protocols differ in many aspects, in particular the precise security properties they aim for, the threat scenarios they consider, and the privacy-preserving techniques they employ. Unfortunately, these differences are often opaque, making analysis and comparison cumbersome. In order to overcome this non-transparent state of affairs, we systematically analyze all e-voting protocols designed to provide everlasting privacy. First, we illustrate the relations and dependencies between all these different protocols. Next, we analyze in depth which protocols do provide secure and efficient approaches to e-voting with everlasting privacy under realistic assumptions, and which ones do not. Eventually, based on our extensive and detailed treatment, we identify which research problems in this field have already been solved, and which ones are still open. Altogether, our work offers a well-founded reference point for conducting research on secure e-voting with everlasting privacy as well as for future-proofing privacy in real-world electronic elections. [less ▲]

Detailed reference viewed: 13 (5 UL)
Full Text
Peer Reviewed
See detailPower Allocation for Space-Terrestrial Cooperation Systems with Statistical CSI
Chien, Trinh-Van; Lagunas, Eva UL; Hoang, Tiep M. et al

in IEEE Global Communications Conference (IEEE Globecom), Rio de Janeiro, Brazil, Dec. 2022 (2022, December)

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailCorporate Managers, Price Noise and the Investment Factor
Lehnert, Thorsten UL

in Financial Innovation (2022), 8(61),

Detailed reference viewed: 50 (7 UL)
Full Text
Peer Reviewed
See detailRent, sell, and remanufacture: The manufacturer’s choice when remanufacturing can be outsourced
liu, Jian; Mantin, Binyamin UL; Song, Xuefeng

in European Journal of Operational Research (2022), 303(1), 184-200

Manufacturers have increasingly started offering rental options for the products they sell. Renting products offers an opportunity: segmenting consumers. However, this also raises a challenge: what to do ... [more ▼]

Manufacturers have increasingly started offering rental options for the products they sell. Renting products offers an opportunity: segmenting consumers. However, this also raises a challenge: what to do with the returned products? One solution is to remanufacture these products and then rent or resell them. Subsequently, should remanufacturing be outsourced to a third-party firm that can remanufacture at a lower cost? Here, we use a multi-period setting and examine the optimal decisions for different selling and renting constellations. Importantly, we allow the manufacturing costs of the sales and rental products to differ, as they seem to be critical in determining the manufacturer's renting and selling decisions and remanufacturing strategies. For example, under integrated (i.e. in-house) remanufacturing, when the new rental product's manufacturing cost is sufficiently high, no remanufacturing happens. Under both remanufacturing strategies—integrated and outsourced—the manufacturer does not rent new products in the second period if the manufacturing costs of the sales and rental products are identical. If the rental product's manufacturing cost is either sufficiently low or high, then integrated remanufacturing is more profitable; when this manufacturing cost is within a moderate range, the manufacturer outsources remanufacturing to an independent remanufacturer. Surprisingly, in some situations, the production quantity of the new sales product may even increase with its manufacturing cost. This is because the manufacturer may extract an even higher margin compared with the new rental product. Finally, we also consider several extensions such as uncertainty regarding the quality of the returned goods, simultaneous selling and renting of remanufactured goods, and longer horizons and the product's life cycle. [less ▲]

Detailed reference viewed: 44 (0 UL)
Full Text
Peer Reviewed
See detailPrivacy-preserving federated learning for residential short-term load forecasting
Delgado Fernandez, Joaquin UL; Potenciano Menci, Sergio UL; Lee, Chul Min UL et al

in Applied Energy (2022), 326

With high levels of intermittent power generation and dynamic demand patterns, accurate forecasts for residential loads have become essential. Smart meters can play an important role when making these ... [more ▼]

With high levels of intermittent power generation and dynamic demand patterns, accurate forecasts for residential loads have become essential. Smart meters can play an important role when making these forecasts as they provide detailed load data. However, using smart meter data for load forecasting is challenging due to data privacy requirements. This paper investigates how these requirements can be addressed through a combination of federated learning and privacy preserving techniques such as differential privacy and secure aggregation. For our analysis, we employ a large set of residential load data and simulate how different federated learning models and privacy preserving techniques affect performance and privacy. Our simulations reveal that combining federated learning and privacy preserving techniques can secure both high forecasting accuracy and near-complete privacy. Specifically, we find that such combinations enable a high level of information sharing while ensuring privacy of both the processed load data and forecasting models. Moreover, we identify and discuss challenges of applying federated learning, differential privacy and secure aggregation for residential short-term load forecasting. [less ▲]

Detailed reference viewed: 18 (4 UL)
Full Text
Peer Reviewed
See detailElectricity powered by blockchain: A review with a European perspective
Roth, Tamara UL; Utz, Manuel; Baumgarte, Felix et al

in Applied Energy (2022), 325

Blockchain is no longer just a hype technology, and effective blockchain applications exist in many industries. Yet, few blockchain projects have been successful in Europe’s energy systems. To identify ... [more ▼]

Blockchain is no longer just a hype technology, and effective blockchain applications exist in many industries. Yet, few blockchain projects have been successful in Europe’s energy systems. To identify the reasons for this slow progress, we reviewed the recent energy literature regarding the use of blockchain, analyzed industry reports, and interviewed experts who have conducted blockchain projects in Europe’s energy systems. Our analysis reveals eight common use cases, their expected benefits, and the challenges encountered. We find that the expected benefits are often little more than generic hopes, largely outweighed by technological, organizational, and regulatory challenges. The identified challenges are significant and numerous, especially for peer-to-peer trading and microgrid use cases. The fact that few projects have yet provided robust evidence for profitable use suggests there is still a rocky road ahead. Moreover, many use cases appear to require more than just blockchain technology to succeed. In particular, privacy and scalability requirements often call for systems in which blockchains only take a backseat. This realization may be essential for the future use of blockchain technology in energy systems – in Europe and beyond. [less ▲]

Detailed reference viewed: 12 (1 UL)
Full Text
Peer Reviewed
See detailSpecifying Source Code and Signal-based Behaviour of CPS Components
Dawes, Joshua UL; Bianculli, Domenico UL

in Dawes, Joshua; Bianculli, Domenico (Eds.) Proceedings of the 18th International Conference on Formal Aspects of Component Software (2022, November)

Specifying properties over the behaviour of components of Cyber-Physical Systems usually focuses on the behaviour of signals, i.e., the behaviour of the physical part of the system, leaving the behaviour ... [more ▼]

Specifying properties over the behaviour of components of Cyber-Physical Systems usually focuses on the behaviour of signals, i.e., the behaviour of the physical part of the system, leaving the behaviour of the cyber components implicit. There have been some attempts to provide specification languages that enable more explicit reference to the behaviour of cyber components, but it remains awkward to directly express the behaviour of both cyber and physical components in the same specification, using one formalism. In this paper, we introduce a new specification language, Source Code and Signal Logic (SCSL), that 1) provides syntax specific to both signals and events originating in source code; and 2) does not require source code events to be abstracted into signals. We introduce SCSL by giving its syntax and semantics, along with examples. We then provide a comparison between SCSL and existing specification languages, using an example property, to show the benefit of using SCSL to capture certain types of properties. [less ▲]

Detailed reference viewed: 22 (8 UL)