References of "2017"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailJoint signature of two or more systems with applications to multistate systems made up of two-state components
Marichal, Jean-Luc UL; Mathonet, Pierre; Navarro, Jorge et al

in European Journal of Operational Research (2017), 263(2), 559-570

The structure signature of a system made up of n components having continuous and i.i.d. lifetimes was defined in the eighties by Samaniego as the n-tuple whose k-th coordinate is the probability that the ... [more ▼]

The structure signature of a system made up of n components having continuous and i.i.d. lifetimes was defined in the eighties by Samaniego as the n-tuple whose k-th coordinate is the probability that the k-th component failure causes the system to fail. More recently, a bivariate version of this concept was considered as follows. The joint structure signature of a pair of systems built on a common set of components having continuous and i.i.d. lifetimes is a square matrix of order n whose (k,l)-entry is the probability that the k-th failure causes the first system to fail and the l-th failure causes the second system to fail. This concept was successfully used to derive a signature-based decomposition of the joint reliability of the two systems. In the first part of this paper we provide an explicit formula to compute the joint structure signature of two or more systems and extend this formula to the general non-i.i.d. case, assuming only that the distribution of the component lifetimes has no ties. We also provide and discuss a necessary and sufficient condition on this distribution for the joint reliability of the systems to have a signature-based decomposition. In the second part of this paper we show how our results can be efficiently applied to the investigation of the reliability and signature of multistate systems made up of two-state components. The key observation is that the structure function of such a multistate system can always be additively decomposed into a sum of classical structure functions. Considering a multistate system then reduces to considering simultaneously several two-state systems. [less ▲]

Detailed reference viewed: 37 (8 UL)
See detailEnergy, Risk and Governance: The Case of Nuclear Energy in India
Wong, Catherine UL

Book published by Palgrave Macmillan (2017)

This book is about how risk, energy and governance are intertwined in the development of the nuclear industry in India and its relationship with the Indian public. It provides a rare insider-view of how ... [more ▼]

This book is about how risk, energy and governance are intertwined in the development of the nuclear industry in India and its relationship with the Indian public. It provides a rare insider-view of how the nuclear establishment thinks about risk and contrasts that with public understandings of nuclear risk. Through that, the book presents a more nuanced picture of why nuclear energy is considered a rational choice in spite of the risks; the ambiguities in both expert and public risk perceptions; and the internal reflexivities that have emerged within the nuclear establishment as a result of the Fukushima-Daiichi disaster which are not displayed in the public discourse. The insights in this book are not unique to India and similar observations can easily be made in the global nuclear industry. Reflecting on what this means for risk governance in practice, the book proposes a toolkit that practitioners in the nuclear industry can use in public engagement, risk communication and deliberation at various stages of decision-making. [less ▲]

Detailed reference viewed: 29 (3 UL)
Peer Reviewed
See detailLuxembourg Analysis
Danescu, Elena UL; Kmec, Sonja UL

in Hartley, Cathy (Ed.) WESTERN EUROPE 2018 (2017)

With a long tradition of political stability and social democracy, a creative development model, skilled human capital and a culture of consensus, Luxembourg is at the forefront of Europe. Its main ... [more ▼]

With a long tradition of political stability and social democracy, a creative development model, skilled human capital and a culture of consensus, Luxembourg is at the forefront of Europe. Its main strategic challenge is how to achieve economic diversification while maintaining the sustainability of the Luxembourg social model. The country has embarked on the "third industrial revolution", with innovation as the main driver of sustainable growth and the University of Luxembourg as a major player. [less ▲]

Detailed reference viewed: 17 (2 UL)
Full Text
Peer Reviewed
See detailL’événement énonciatif en sémiotique de l’image : de Roland Barthes à la sémiotique tensive
Colas-Blaise, Marion UL; Dondero, Maria Giulia

in La part de l'oeil (2017)

Detailed reference viewed: 10 (1 UL)
See detailBritain, the US and Greece after World War II: Anglo-American Relations and the Cold War
Paravantis, Spero UL

Book published by IB Tauris - 1st (2017)

This Book provides a new analysis of the role that the British played in the shift in American foreign policy from 1946 to 1950. To achieve this shift (which also included support of British strategic ... [more ▼]

This Book provides a new analysis of the role that the British played in the shift in American foreign policy from 1946 to 1950. To achieve this shift (which also included support of British strategic interests in the Eastern Mediterranean) this book argues that the British used Greece, first as a way to draw the United States further into European affairs, and then as a way to anchor the United States in Europe, achieving a guarantee of security of the Eastern Mediterranean and of Western Europe. While trying to understand and explain the origins and dynamics of Anglo-American foreign policy in the pre and early years of the Cold War, the role that perception played in the design and implementation of foreign policy became a central focus of the research. From this point came the realization of a general lack of emphasis and research into the ways in which the British government managed to convince the United States government to assume support for worldwide British strategic objectives. How this support was achieved is the central theme of this book. It also addresses the question of whether or not Anglo-American policy was simply a convergence of common Anglo-American objectives, or if it was a result of common objectives created by British influence? To support these hypotheses, this work uses mainly the British and American documents relating to Greece from 1946 to 1950 to explain how these nations made and implemented policy towards Greece during this crucial period in history. In so doing it also explains how American foreign policy in general changed from its pre-war focus on non-intervention, to the post-war policy which heavily favours intervention. [less ▲]

Detailed reference viewed: 44 (9 UL)
Full Text
Peer Reviewed
See detailEstimating Urban Road Traffic States Using Mobile Network Signaling Data
Derrmann, Thierry UL; Frank, Raphaël UL; Viti, Francesco UL et al

in Derrmann, Thierry; Frank, Raphaël; Viti, Francesco (Eds.) et al Estimating Urban Road Traffic States Using Mobile Network Signaling Data (2017, October)

It is intuitive that there is a causal relationship between human mobility and signaling events in mobile phone networks. Among these events, not only the initiation of calls and data sessions can be used ... [more ▼]

It is intuitive that there is a causal relationship between human mobility and signaling events in mobile phone networks. Among these events, not only the initiation of calls and data sessions can be used in analyses, but also handovers between different locations that reflect mobility. In this work, we investigate if handovers can be used as a proxy metric for flows in the underlying road network, especially in urban environments. More precisely, we show that characteristic profiles of handovers within and between clusters of mobile network cells exist. We base these profiles on models from road traffic flow theory, and show that they can be used for traffic state estimation using floating-car data as ground truth. The presented model can be beneficial in areas with good mobile network coverage but low road traffic counting infrastructure, e.g. in developing countries, but also serve as an additional predictor for existing traffic state monitoring systems. [less ▲]

Detailed reference viewed: 28 (2 UL)
See detailDrama und Interkulturalität
Bloch, Natalie UL; Heimböckel, Dieter UL

in Englhart, Andreas; Schößler, Franziska (Eds.) Grundthemen der Literaturwissenschaft: Drama (2017)

Detailed reference viewed: 26 (6 UL)
Full Text
Peer Reviewed
See detailLIPS vs MOSA: a Replicated Em- pirical Study on Automated Test Case Generation
Panichella, Annibale UL; Kifetew, Fitsum; Tonella, Paolo

in International Symposium on Search Based Software Engineering (SSBSE) 2017 (2017, September 09)

Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The ... [more ▼]

Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The proponents of LIPS, a novel single-target test generator, conducted a preliminary empirical study to compare their approach with MOSA, an alternative many-objective test generator. However, their empirical investigation suffers from several external and internal validity threats, does not consider complex programs with many branches and does not include any qualitative analysis to interpret the results. In this paper, we report the results of a replication of the original study designed to address its major limitations and threats to validity. The new findings draw a completely different picture on the pros and cons of single-target vs many-objective approaches to test case generation. [less ▲]

Detailed reference viewed: 25 (0 UL)
Full Text
See detailMultiscale Modelling of Damage and Fracture in Discrete Materials Using a Variational Quasicontinuum Method
Rokos, Ondrej; Peerlings, Ron; Beex, Lars UL et al

Scientific Conference (2017, September 05)

Detailed reference viewed: 21 (1 UL)
See detailThe relevance of verbal and visuo-spatial abilities for verbal number skills – what matters in 5 to 6 year olds?
Cornu, Véronique UL; Schiltz, Christine UL; Martin, Romain UL et al

Poster (2017, September)

The acquisition of verbal number skills, as defined by the meaningful use of number words, marks a milestone in numerical development. In the present study, we were particularly interested in the question ... [more ▼]

The acquisition of verbal number skills, as defined by the meaningful use of number words, marks a milestone in numerical development. In the present study, we were particularly interested in the question, whether verbal number skills are primarily verbal in nature, or if they call upon visuo-spatial processes, reflecting a spatial grounding of verbal number skills. 141 five- to six-year old children were tested on a range of verbal (i.e. vocabulary, phonological awareness and verbal working memory) and visuo-spatial abilities (i.e. spatial perception, visuo-motor integration and visuo-spatial working memory). We were particularly interested in the predictive role of these abilities for children’s verbal number skills (as measured by different counting and number naming tasks). In a latent regression model, basic visuo-spatial abilities, measured by spatial perception and visuo-motor integration, emerge as the most important predictor of verbal number skills. This gives raise to the assumption, that verbal number skills are, despite their verbal nature, spatially grounded in young children. [less ▲]

Detailed reference viewed: 27 (3 UL)
Full Text
Peer Reviewed
See detailA Model-Driven Approach to Trace Checking of Pattern-based Temporal Properties
Dou, Wei; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017 ) (2017, September)

Detailed reference viewed: 26 (3 UL)
Full Text
Peer Reviewed
See detailMining AndroZoo: A Retrospect
Li, Li UL

in The International Conference on Software Maintenance and Evolution (ICSME) (2017, September)

This paper presents a retrospect of an Android app collection named AndroZoo and some research works conducted on top of the collection. AndroZoo is a growing collection of Android apps from various ... [more ▼]

This paper presents a retrospect of an Android app collection named AndroZoo and some research works conducted on top of the collection. AndroZoo is a growing collection of Android apps from various markets including the official Google Play. At the moment, over five million Android apps have been collected. Based on AndroZoo, we have explored several directions that mine Android apps for resolving various challenges. In this work, we summarize those resolved mining challenges in three research dimensions, including code analysis, app evolution analysis, malware analysis, and present in each dimension several case studies that experimentally demonstrate the usefulness of AndroZoo. [less ▲]

Detailed reference viewed: 34 (3 UL)
Full Text
See detailDas NEtzDG und die CPS Guidelines zur Verfolgung strafbarer Inhalte in sozialen Medien
Schmitz, Sandra UL; Robinson, Gavin UL

in Taeger, Jürgen (Ed.) Recht 4.0 - Innovationen aus den rechtswissenschaftlichen Laboren (2017)

Detailed reference viewed: 21 (0 UL)
Full Text
Peer Reviewed
See detailLegal Markup Generation in the Large: An Experience Report
Sannier, Nicolas UL; Adedjouma, Morayo UL; Sabetzadeh, Mehrdad UL et al

in the 25th International Requirements Engineering Conference (RE'17), Lisbon, 4-8 September 2017 (2017, September)

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailIs Big Data Sufficient for a Reliable Detection of Non-Technical Losses?
Glauner, Patrick UL; Migliosi, Angelo UL; Meira, Jorge Augusto UL et al

in Proceedings of the 19th International Conference on Intelligent System Applications to Power Systems (ISAP 2017) (2017, September)

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to ... [more ▼]

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to 40% of the total electricity distributed. In order to detect NTLs, machine learning methods are used that learn irregular consumption patterns from customer data and inspection results. The Big Data paradigm followed in modern machine learning reflects the desire of deriving better conclusions from simply analyzing more data, without the necessity of looking at theory and models. However, the sample of inspected customers may be biased, i.e. it does not represent the population of all customers. As a consequence, machine learning models trained on these inspection results are biased as well and therefore lead to unreliable predictions of whether customers cause NTL or not. In machine learning, this issue is called covariate shift and has not been addressed in the literature on NTL detection yet. In this work, we present a novel framework for quantifying and visualizing covariate shift. We apply it to a commercial data set from Brazil that consists of 3.6M customers and 820K inspection results. We show that some features have a stronger covariate shift than others, making predictions less reliable. In particular, previous inspections were focused on certain neighborhoods or customer classes and that they were not sufficiently spread among the population of customers. This framework is about to be deployed in a commercial product for NTL detection. [less ▲]

Detailed reference viewed: 34 (6 UL)
Full Text
Peer Reviewed
See detailJoanAudit: A Tool for Auditing Common Injection Vulnerabilities
Thome, Julian UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (2017, September)

JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies ... [more ▼]

JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies parts of the program code that are relevant for security and generates an HTML report to guide security auditors audit the source code in a scalable way. JoanAudit is configured with various security-sensitive input sources and sinks relevant to injection vulnerabilities and standard sanitization procedures that prevent these vulnerabilities. It can also automatically fix some cases of vulnerabilities in source code — cases where inputs are directly used in sinks without any form of sanitization — by using standard sanitization procedures. Our evaluation shows that by using JoanAudit, security auditors are required to inspect only 1% of the total code for auditing common injection vulnerabilities. The screen-cast demo is available at https://github.com/julianthome/joanaudit. [less ▲]

Detailed reference viewed: 62 (25 UL)