References of "2019"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailChallenges in completing EMU: asymmetric competition vs fiscal harmonisation. A case study of the Benelux countries
Danescu, Elena UL

in Journal of Contemporary European Research [=JCER] (2019)

This paper aims to investigate the concept, context and socio-economic consequences of fiscal competition in the integrated economic space of EMU in completion, to pinpoint the positive and negative ... [more ▼]

This paper aims to investigate the concept, context and socio-economic consequences of fiscal competition in the integrated economic space of EMU in completion, to pinpoint the positive and negative factors at work via a case study of the Benelux countries – both founder members of the EU and pioneers of EMU – and to examine the impact on European and international regulations in the field. In particular, it will endeavour to provide a comprehensive interpretation of fiscal policy in the Benelux countries via a comparative approach and from a historical perspective. It will look at the development of respective domestic fiscal policies, driven by national interests and by membership of a Community that is subject to requirements in terms of harmonisation and taxation, but also by constant contact (and frequent clashes) with the multilateral international environment. [less ▲]

Detailed reference viewed: 93 (17 UL)
See detailNew Migration of Families from Greece to Europe and Canada – Experiences and Interpretations of Family Members within the Context of Different Migration Societies and Educational Systems
Chatzidaki; Kirsch, Claudine UL; Panagiotopoulou, Argyro et al

Book published by Springer - Reihe Inklusion Bildung Migration (2019)

Detailed reference viewed: 84 (8 UL)
Peer Reviewed
See detailValue-added modeling in primary school: What covariates to include?
Levy, Jessica UL; Brunner, Martin; Keller, Ulrich UL et al

Scientific Conference (2019, August)

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailTogether or Alone: The Price of Privacy in Collaborative Learinig
Pejo, Balazs UL; Tang, Qiang; Biczók, Gergely

in Proceedings on Privacy Enhancing Technologies (2019, July)

Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training ... [more ▼]

Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training dataset; in reality a small or medium sized organization often does not have the necessary data to train a reasonably accurate model. For such organizations, a realistic solution is to train their machine learning models based on their joint dataset (which is a union of the individual ones). Unfortunately, privacy concerns prevent them from straightforwardly doing so. While a number of privacy-preserving solutions exist for collaborating organizations to securely aggregate the parameters in the process of training the models, we are not aware of any work that provides a rational framework for the participants to precisely balance the privacy loss and accuracy gain in their collaboration. In this paper, by focusing on a two-player setting, we model the collaborative training process as a two-player game where each player aims to achieve higher accuracy while preserving the privacy of its own dataset. We introduce the notion of Price of Privacy, a novel approach for measuring the impact of privacy protection on the accuracy in the proposed framework. Furthermore, we develop a game-theoretical model for different player types, and then either find or prove the existence of a Nash Equilibrium with regard to the strength of privacy protection for each player. Using recommendation systems as our main use case, we demonstrate how two players can make practical use of the proposed theoretical framework, including setting up the parameters and approximating the non-trivial Nash Equilibrium. [less ▲]

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailTheir ‘Apple of Discord’ or the Apple of Their Eye: How the British Secured Eastern Mediterranean and Western European Security, 1947-1948
Paravantis, Spero UL

in Kamouzis, Dimitris; Nafpliotis, Alexandros (Eds.) Αnglo-Hellenic relations in the 20th Century (2019)

This chapter examines the role the British policy in Greece played in the shift in American foreign policy that was manifested in 1947-48, that led directly to these alliances, namely the Western European ... [more ▼]

This chapter examines the role the British policy in Greece played in the shift in American foreign policy that was manifested in 1947-48, that led directly to these alliances, namely the Western European Union and NATO. To achieve this shift (which also included support of British strategic interests in the Eastern Mediterranean) this chapter argues that the British used Greece, first as a way to draw the United States further into European affairs, and then as a way to anchor the United States in Europe, achieving a guarantee of security for the Eastern Mediterranean and for Western Europe. Drawing on both published and unpublished British and American sources, this chapter will also examine perceptions of the conflicts in and about Greece, and what it represented for Western European and Eastern Mediterranean security, and Western ideas of democracy when confronted with supporting a right-wing Greek government. In so doing, it clarifies how American foreign policy changed from its pre-war focus on non-intervention, to the cold-war politics of containment and intervention. [less ▲]

Detailed reference viewed: 110 (24 UL)
Full Text
Peer Reviewed
See detailBenefits, challenges, social learning and controversies around Local Food Systems
Reckinger, Rachel UL; Nemes, Gusztav; Lajos, Veronika

Scientific Conference (2019, June 25)

Objectives: Our WG touches upon three main elements among the themes of the conference: (1) innovation, (2) social justice and (3) knowledge production. Innovative local food systems and alternative food ... [more ▼]

Objectives: Our WG touches upon three main elements among the themes of the conference: (1) innovation, (2) social justice and (3) knowledge production. Innovative local food systems and alternative food networks, approached from a collaborative and participatory angle, bring about a cultural shift by associating prosumers through a renewed form of trust, reciprocity and community, thus reinforcing social and ecological justice. At the same time, such heterodox actors in the transition to more sustainable food systems create new forms of knowledge, that are contested, co-constructed and potentially conflictual – along with enabling or disabling policymaking and, often, in dialogue with research. Our main objective is in this topic to start the process of creating an edited special issue of a peer reviewed journal (Sociologia Ruralis, Studies of Agricultural Economics or similar) should raise from this WG. We invite researchers working in the area of (local) food systems, alternative food networks, short food supply chains and related topics (rural tourism, community supported agriculture, etc.). We consider both the benefits and possible conflicts/problems in the connected socio-economic, cultural and environmental processes and welcome theoretical papers and case studies, too. Topic: By welcoming case studies from all geographical areas, in a comparative manner, this Working Group’s aim is to address different understandings and dynamics happening within and around different types of Local Food Systems (LFS). Alternative food networks, local food systems and short food supply chains have long been viewed as a sustainable, green way of raising the value added and creating opportunities for sur/re-vival of rural economy and society. They induce many benefits in terms of environmental impact, cultural exemplification, ethical entrepreneurship, social justice or rural development. Conceptually, LFS can be understood as ‘local food for local people’, as for example in the Slow Food or the community supported agriculture (CSA) movements. They are then associated with low food miles, environmental protection (Jones 2002), enhanced social networks and revitalised local communities (Fenstra 1997). From a local economic development perspective, in particular when LFS produce high quality products, they can equally be considered as ‘local food for non-local people’, either transported to urban centres, or attracting flows of tourists into rural areas. Here LFS can still enhance local businesses, economic and rural development, yet social and environmental benefits (Guthman 2004) of such foodstuffs, marketed with the added value of environmental and social responsibility, are more difficult to trace. Therefore, besides benefits, we would also like to analyse potential dissonances, that the distinction between local or extra-local target groups help to identify – for instance: • established, certified organic producers might criticize non-certified yet organically producing CSAs as fragmenting an already minority market or showing a lack of solidarity by not contributing to organic labels; • when LFS end up producing high quality, expensive products, a dynamic of social exclusion might occur, favoring the wealthy; • enhanced local production, tourism, and visitor pressure can cause social, economic, and environmental degradation, multiplier effects do not always occur to build more businesses and sustain social and economic capital; • innovative alternative food networks tend to struggle with territorial competition over land and resources, but if they rely on external investments, they might additionally be confronted – more insidiously – with the risk of co-option by neoliberal corporate agendas. We welcome analyses focusing on negotiations and struggles among actors in a multifaceted foodscape, where some block and some enhance transitions. Viewing the relationships, interconnectedness and agency of niche innovations, local and non-local appropriations as well regime hegemonies opens up the theoretical perspective of contested knowledge claims. We look for questions and answers including: • How are dynamics of “knowing and growing food in a contested arena” (Goodman, DuPuis, Goodman, 2014) negotiated – sometimes in a mutually enhancing and locally beneficial way, sometimes in more conflictual ways? • What are the local and extra-local stakeholders’ (producers, intermediaries, customers, tourists) different and often conflicting interests and responsibilities in LFS? • What can we learn from the tensions and local problems of LFS in order to support relevant policies to solve current controversies within the sector? • How can rural sociologists use their knowledge and influence to support local rural stakeholders of LFS? [less ▲]

Detailed reference viewed: 50 (1 UL)
Peer Reviewed
See detailNetworks and Governance of Local Food Systems. The case of Food Policy Councils
Reckinger, Rachel UL

Scientific Conference (2019, June 06)

Detailed reference viewed: 49 (3 UL)
Full Text
Peer Reviewed
See detailEstimating fibres' material parameter distributions from limited data with the help of Bayesian inference
Rappel, Hussein UL; Beex, Lars UL

in European Journal of Mechanics. A, Solids (2019), 75

Numerous materials are essentially structures of discrete fibres, yarns or struts. Considering these materials at their discrete scale, one may distinguish two types of intrinsic randomness that affect ... [more ▼]

Numerous materials are essentially structures of discrete fibres, yarns or struts. Considering these materials at their discrete scale, one may distinguish two types of intrinsic randomness that affect the structural behaviours of these discrete structures: geometrical randomness and material randomness. Identifying the material randomness is an experimentally demanding task, because many small fibres, yarns or struts need to be tested, which are not easy to handle. To avoid the testing of hundreds of constituents, this contribution proposes an identification approach that only requires a few dozen of constituents to be tested (we use twenty to be exact). The identification approach is applied to articially generated measurements, so that the identified values can be compared to the true values. Another question this contribution aims to answer is how precise the material randomness needs to be identified, if the geometrical randomness will also influence the macroscale behaviour of these discrete networks. We therefore also study the effect of the identified material randomness to that of the actual material randomness for three types of structures; each with an increasing level of geometrical randomness. [less ▲]

Detailed reference viewed: 63 (16 UL)
Full Text
Peer Reviewed
See detailWho’s afraid of Donkey Kong? Testing the Stereotype Threat Effect in Video Gaming
Holl, Elisabeth UL; Wagener, Gary L.; Melzer, André UL

Scientific Conference (2019, May)

In two studies (Study 1: N = 130; Study 2: N = 56) participants played a video game (Bejeweled 3; SkyChasers) and were either confronted with a stereotype threat (ST) or not. ST is defined as the risk of ... [more ▼]

In two studies (Study 1: N = 130; Study 2: N = 56) participants played a video game (Bejeweled 3; SkyChasers) and were either confronted with a stereotype threat (ST) or not. ST is defined as the risk of confirming a negative stereotype about one’s own group and has been investigated in various field, i.a. in gaming. In the first study participants were confronted with the stereotype that women would perform worse in video games than men. In the second study we worked with a reversed stereotype, namely that women would have now outpaced males in some genres of video games. Our results show that performance varies across gender and genre. Although we did not find the hypothesized interaction effect of gender and ST condition in performance, self-reported measures, such as perceived frustration, and moderating variables indicate performance differences both for women and men, but on different psychological dimensions. [less ▲]

Detailed reference viewed: 57 (4 UL)
Full Text
Peer Reviewed
See detailComputational chemo-thermo-mechanical coupling phase-field model for complex fracture induced by early-age shrinkage and hydration heat in cement-based materials
Nguyen, Thanh Tung UL; Waldmann, Danièle UL; Bui, T. Q.

in Computer Methods in Applied Mechanics and Engineering (2019), 348

In this paper, we present a new multi-physics computational framework that enables us to capture and investigate complex fracture behavior in cement-based materials at early-age. The present model ... [more ▼]

In this paper, we present a new multi-physics computational framework that enables us to capture and investigate complex fracture behavior in cement-based materials at early-age. The present model consists of coupling the most important chemo-thermo-mechanical processes to describe temperature evolution, variation of hydration degree, and mechanical behavior. The changes of material properties are expressed as a function of the hydration degree, to capture the age effects. Fracture analysis of these processes are then accommodated by a versatile phase field model in the framework of smeared crack models, addressing the influence of cracks on hydration and thermal transfer. We additionally describe a stable and robust numerical algorithm, which aims to solve coupled problems by using a staggered scheme. The developed approach is applied to study the fracture phenomena at both macroscopic and mesoscopic scales, in which all microstructural heterogeneities of sand and cement matrix are explicitly accounted. Nucleation, initiation, and propagation of complex crack network are simulated in an efficient way demonstrating the potential of the proposed approach to assess the early-age defects in concrete structures and materials. [less ▲]

Detailed reference viewed: 98 (19 UL)
Full Text
Peer Reviewed
See detailParallel coordinate descent algorithms for sparse phase retrieval
Yang, Yang UL; Pesavento, Marius; Eldar, Yonina C. et al

in Proc. 2019 IEEE International Conference on Acoustics, Speech and Signal (ICASSP) (2019, May)

Detailed reference viewed: 75 (8 UL)
Full Text
Peer Reviewed
See detailYou Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems
Liu, Kui UL; Koyuncu, Anil UL; Bissyande, Tegawendé François D Assise UL et al

in The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019) (2019, April 24)

Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure ... [more ▼]

Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure that it reaches significant milestones by reliably comparing state-of-the-art tools for a better understanding of their strengths and weaknesses. In this work, we identify and investigate a practical bias caused by the fault localization (FL) step in a repair pipeline. We propose to highlight the different fault localization configurations used in the literature, and their impact on APR systems when applied to the Defects4J benchmark. Then, we explore the performance variations that can be achieved by "tweaking'' the FL step. Eventually, we expect to create a new momentum for (1) full disclosure of APR experimental procedures with respect to FL, (2) realistic expectations of repairing bugs in Defects4J, as well as (3) reliable performance comparison among the state-of-the-art APR systems, and against the baseline performance results of our thoroughly assessed kPAR repair tool. Our main findings include: (a) only a subset of Defects4J bugs can be currently localized by commonly-used FL techniques; (b) current practice of comparing state-of-the-art APR systems (i.e., counting the number of fixed bugs) is potentially misleading due to the bias of FL configurations; and (c) APR authors do not properly qualify their performance achievement with respect to the different tuning parameters implemented in APR systems. [less ▲]

Detailed reference viewed: 49 (5 UL)
Full Text
Peer Reviewed
See detailAn Effective Hybrid Imperialist Competitive Algorithm and Tabu Search for an Extended Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 34th ACM/SIGAPP Symposium On Applied Computing, Limassol, Cyprus April 8-12, 2019 (2019, April 08)

An extended version of the flexible job shop problem is tackled in this work. The investigated extension of the classical flexible job shop problem allows the precedences between the operations to be ... [more ▼]

An extended version of the flexible job shop problem is tackled in this work. The investigated extension of the classical flexible job shop problem allows the precedences between the operations to be given by an arbitrary directed acyclic graph instead of a linear order. The problem consists of designating the operations to the machines and sequencing them in compliance with the supplied precedences. The goal in the present work is the minimization of the makespan. In order to produce reasonable outcomes in acceptable time, a hybrid imperialist competitive algorithm and tabu search is proposed to solve the problem. Numerical experiments assess the efficiency of the proposed method and compare it with well-known scheduling algorithms. [less ▲]

Detailed reference viewed: 73 (14 UL)
Full Text
Peer Reviewed
See detailLooking into the Past: Evaluating the Effect of Time Gaps in a Personalized Sentiment Model
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in ACM/SIGAPP Symposium On Applied Computing, Limassol 8-12 April 2019 (2019, April)

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating ... [more ▼]

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating to a person’s past expressions (or opinions), however the time gaps between the messages are not considered in the existing works. We argue that the opinion at a specific time point is affected more by recent opinions that contain related content than the earlier or unrelated ones, thus a sentiment model ought to include such information in the analysis. By using a recurrent neural network with an attention layer as a basic model, we introduce three cases to integrate time gaps in the model. Evaluated on Twitter data with frequent users, we have found that the performance is improved the most by including the time information in the Hawkes process, and it is also more effective to add the time information in the attention layer than at the input. [less ▲]

Detailed reference viewed: 50 (10 UL)
Full Text
Peer Reviewed
See detailPricing Perspective for SWIPT in OFDM-based Multi-User Wireless Cooperative Systems
Gautam, Sumit UL; Lagunas, Eva UL; Vuppala, Satyanarayana UL et al

Scientific Conference (2019, April)

We propose a novel formulation for joint maximization of total weighted sum-spectral efficiency and weighted sum-harvested energy to study Simultaneous Wireless Information and Power Transfer (SWIPT) from ... [more ▼]

We propose a novel formulation for joint maximization of total weighted sum-spectral efficiency and weighted sum-harvested energy to study Simultaneous Wireless Information and Power Transfer (SWIPT) from a pricing perspective. Specifically, we consider that a transmit source communicates with multiple destinations using Orthogonal Frequency Division Multiplexing (OFDM) system within a dual-hop relay-assisted network, where the destination nodes are capable of jointly decoding information and harvesting energy from the same radio-frequency (RF) signal using either the time-switching (TS) or power-splitting (PS) based SWIPT receiver architectures. Computation of the optimal solution for the aforementioned problem is an extremely challenging task as joint optimization of several network resources introduce intractability at high numeric values of relays, destination nodes and OFDM sub-carriers. Therefore, we present a suitable algorithm with sub-optimal results and good performance to compute the performance of joint data processing and harvesting energy under fixed pricing methods by adjusting the respective weight factors, motivated by practical statistics. Furthermore, by exploiting the binary options of the weights, we show that the proposed formulation can be regulated purely as a sum-spectral efficiency maximization or solely as a sum-harvested energy maximization problem. Numerical results illustrate the benefits of the proposed design under several operating conditions and parameter values. [less ▲]

Detailed reference viewed: 28 (2 UL)
Peer Reviewed
See detailExploration of Different School Value-Added Models in a Highly Heterogeneous Educational Context
Levy, Jessica UL; Brunner, Martin; Keller, Ulrich UL et al

Scientific Conference (2019, April)

Detailed reference viewed: 55 (10 UL)
Full Text
Peer Reviewed
See detailFog Computing as the Key for Seamless Connectivity Handover in Future Vehicular Networks
Palattella, Maria Rita UL; Soua, Ridha UL; Abdelmajid, Khelil et al

in The 34th ACM Symposium On Applied Computing (SAC (2019, April)

With the emergence of highly automated and autonomous con-nected vehicles, rigorous requirements in terms of responsiveness,security and scalability become necessary to enable new servicesthat improve ... [more ▼]

With the emergence of highly automated and autonomous con-nected vehicles, rigorous requirements in terms of responsiveness,security and scalability become necessary to enable new servicesthat improve efficiency and safety on the road. In future networks,vehicles need to frequently perform handover procedures whilecrossing various dense heterogeneous cells, which may cause anunacceptable network service degradation. In this concept paper,we propose a fog-aided architecture for seamless handover. Fogcomputing can fill the architectural gap between clients and cloudsto manage short lived information and enable novel latency-criticalapplications at the edge of networks. Accordingly, the proposedarchitecture, along with its unified integration of virtually all de-vices (end-devices, gateways and servers) and all networks (ad hoc,access and core), supports Vehicle-to-Everything (V2X) distributedapplications with crucial needs such as time-, safety- and security-critical network functions. [less ▲]

Detailed reference viewed: 40 (3 UL)
Full Text
Peer Reviewed
See detailSecurity – Visible, Yet Unseen? How Displaying Security Mechanisms Impacts User Experience and Perceived Security
Distler, Verena UL; Zollinger, Marie-Laure UL; Lallemand, Carine UL et al

in Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI2019) (2019, April)

An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or blackboxed away from the user for the sake of usability. However, tying this question to ... [more ▼]

An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or blackboxed away from the user for the sake of usability. However, tying this question to pragmatic usability factors only might be simplistic. This study aims at researching the impact of displaying security mechanisms on user experience (UX) in the context of e-voting. Two versions of an e-voting application were designed and tested using a between-group experimental protocol (N=38). Version D displayed security mechanisms, while version ND did not reveal any security-related information. We collected data on UX using standardised evaluation scales and semi-structured interviews. Version D performed better overall in terms of UX and need fulfilment. Qualitative analysis of the interviews gives further insights into factors impacting perceived security. Our study adds to existing research suggesting a conceptual shift from usability to UX and discusses implications for designing and evaluating secure systems. [less ▲]

Detailed reference viewed: 86 (16 UL)
Full Text
Peer Reviewed
See detailShape optimization of structures with cutouts by an efficient approach based on XIGA and chaotic particle swarm optimization
Wang, Chao; Yu, Tiantang; Shao, Guojian et al

in European Journal of Mechanics. A, Solids (2019), 74

Structural shape optimization is one important and crucial step in the design and analysis of many engineering applications as it aims to improve structural characteristics, i.e., reducing stress ... [more ▼]

Structural shape optimization is one important and crucial step in the design and analysis of many engineering applications as it aims to improve structural characteristics, i.e., reducing stress concentration and structural weight, or improving the stiffness, by changing the structural boundary geometries. The goal of this paper is to present an efficient approach, which goes beyond limitations of conventional methods, by combining extended isogeometric analysis (XIGA) and chaotic particle swarm optimization algorithm for shape optimization of structures with cutouts. In this setting, mechanical response of structures with cutouts is derived by the non-uniform rational B-spline (NURBS) and enrichment techniques. The computational mesh is hence independent of the cutout geometry, irrelevant to the cutout shape during the optimization process, representing one of the key features of the present work over classical methods. The control points describing the boundary geometries are defined as design variables in this study. The design model, analysis model, and optimization model are uniformly described with the NURBS, providing easy communication among the three aforementioned models, resulting in a smooth optimized boundary. The chaotic particle swarm optimization (CPSO) algorithm is employed for conducting the optimization analysis. Apart from that, the CPSO has some advantages as it includes: (i) its structure is simple and easy to implement; (ii) without the need for the complicated sensitivity analysis as compared with the traditional gradient-based optimization methods; and (iii) effectively escaping from the local optimum. The accuracy and performance of the developed method are underlined by means of several representative 2-D shape optimization examples. [less ▲]

Detailed reference viewed: 30 (1 UL)