References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
Full Text
See detailKommunale Selbstinszenierung im vorstädtischen Raum. Ein neuer Blick auf Leprosorien des Spätmittelalters und der frühen Neuzeit
Uhrmacher, Martin UL

in Hesse, Christian; Schulte, Daniela; Stercken, Martina (Eds.) Kommunale Selbstinszenierung (in press)

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical ... [more ▼]

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical Perspectives' Universität Zürich, 3./4./5. September 2015 Martin Uhrmacher (Universität Luxemburg) „Leprosorien als kommunale Repräsentationsbauten im vorstädtischen Raum. Ein neuer Blick auf eine bisher wenig beachtete städtische Baugattung“ Die vor den Mauern mittelalterlicher und frühneuzeitlicher Städte gelegenen Leprosorien werden heute zumeist noch immer als abgelegene und verborgene Orte der Exklusion angesehen, durch Zäune und Mauern von der Außenwelt getrennt. Dementsprechend wird auch der Baugattung „Leprosorium“ nur wenig architektonischer Wert zugebilligt, wie bspw. im Ausstellungskatalog „Aussatz – Lepra – Hansen-Krankheit: Demnach hatten sie „keinerlei repräsentative Bedeutung, im Gegenteil: eher unauffällig sollten sie sein, verborgen vor dem Blick der Stadtbewohner und Reisenden“. Im 2005 von Monika Escher und Frank G. Hirschmann publizierten Syntheseband „Die urbanen Zentren des hohen und späten Mittelalters“ zur Geschichte mittelalterlicher Städte zwischen Rhein und Maas werden Leprosorien zudem als „nicht wertungsrelevantes“ Urbanitäts- und Zentralitätskriterium“ bezeichnet; begründet mit der angeblichen „Tatsache, daß in der Regel der topographische Bezug zur Stadt gering war“. In der jüngeren Forschung hat sich diese Einschätzung nun grundlegend gewandelt. Leprosorien gelten aufgrund ihrer besonders prominent und exponiert ausgewählten Standorte an Kreuzungen, Brücken und Hauptausfallstraßen als präsente und das städtische Umland prägende kommunale Einrichtungen, die ein fester Bestandteil der städtischen Lebenswelt waren. Sie dienten nicht dazu, ihre Bewohner zu verstecken, sondern waren vielmehr mit Stiftungen und Spenden versehene städtische Einrichtungen, die vom Rat und den Bürgern auch als Prestigeobjekte betrachtet wurden. Anhand ausgewählter Beispiele wird aufgezeigt, wie Leprosorien als Repräsentationsobjekte der Stadtgemeinden auch dem bürgerlichen Selbstverständnis Ausdruck verliehen. [less ▲]

Detailed reference viewed: 8 (1 UL)
Full Text
Peer Reviewed
See detailOn the performance of an overlapping-domain parallelization strategy for Eulerian-Lagrangian Multiphysics software
Pozzetti, Gabriele UL; Besseron, Xavier UL; Rousset, Alban UL et al

in AIP Conference Proceedings ICNAAM 2017 (in press)

In this work, a strategy for the parallelization of a two-way CFD-DEM coupling is investigated. It consists on adopting balanced overlapping partitions for the CFD and the DEM domains, that aims to reduce ... [more ▼]

In this work, a strategy for the parallelization of a two-way CFD-DEM coupling is investigated. It consists on adopting balanced overlapping partitions for the CFD and the DEM domains, that aims to reduce the memory consumption and inter-process communication between CFD and DEM. Two benchmarks are proposed to assess the consistency and scalability of this approach, coupled execution on 252 cores shows that less than 1\% of time is used to perform inter-physics data exchange. [less ▲]

Detailed reference viewed: 21 (12 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 23 (1 UL)
Full Text
Peer Reviewed
See detailComparing automated visual GUI testing tools: an industrial case study
Garousi, Vahid UL; Afzal, Wasif; Çağlar, Adem et al

in Proceedings of International Workshop on Automated Software Testing (A-TEST) (in press)

Visual GUI testing (VGT) is a tool-driven technique, which uses image recognition for interaction and assertion of the behaviour of system under test. Motivated by a real industrial need, in the context ... [more ▼]

Visual GUI testing (VGT) is a tool-driven technique, which uses image recognition for interaction and assertion of the behaviour of system under test. Motivated by a real industrial need, in the context of a large Turkish software and systems company providing solutions in the areas of defense and IT sector, we systematically planned and applied a VGT project in this industrial context. The goal of the initial phase of the project was to empirically evaluate two well-known VGT tools (Sikuli and JAutomate) to help the company select the best tool for a given testing project. Our results show that both two tools suffer from similar test ‘Replay’ problems such as the inability to find smaller-sized images. The repeatability of test executions was better for JAutomate in case of one of the two software under test (SUT) while it was comparable for the other. In terms of test development effort, for both tools, there were high correlations with number of steps in test suites, however the effort is reduced if test code is reused. The study has already provided benefits to the test engineers and managers in the company by increasing the know-how in the company w.r.t. VGT, and by identifying the challenges and their workarounds in using the tools. The industrial case study in this paper intends to add to the body of evidence in VGT and help other researchers and practitioners. [less ▲]

Detailed reference viewed: 47 (3 UL)
Full Text
Peer Reviewed
See detailHybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems
Tsinos, Christos UL; Maleki, Sina UL; Chatzinotas, Symeon UL et al

in Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems (in press)

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the ... [more ▼]

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the design of a prospect transceiver should guarantee the efficient coexistence with the incumbent services in these bands. To that end, in this paper, two underlay cognitive transceiver designs are proposed based on a hybrid Analog/Digital transceiver architecture that enables the mmWave spectrum access while controlling the interference to the incumbent users with low hardware complexity and power consumption. The first cognitive solution designs a codebook free cognitive hybrid pre-coder by maximizing the mutual information between its two ends subject to interference, power and hardware constraints related to the analog counterpart. The second solution is codebook based and exhibits less complexity than the first one at the cost of inferior spectral efficiency. A novel codebook free solution for the post-coder at the cognitive receiver part is further proposed, based on a hardware constrained Minimum Mean Square Error criterion. Simulations study the performance of both the proposed hybrid approaches and compare it to the one of a fully digital solution for typical wireless environments. [less ▲]

Detailed reference viewed: 126 (15 UL)
Full Text
Peer Reviewed
See detailLa force intégrative du statut de l'Etat membre sur la fonction juridictionnelle
Neframi, Eleftheria UL

in Potvin Solis, Laurence (Ed.) Le statut d'Etat membre de l'Union européenne (in press)

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields ... [more ▼]

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields covered by Union law (Art 19, par 1, subpar 2, TEU). Member States have to ensure access to the national judge, who has been entrusted with a European mandate, and who is in measure to cooperate with the Court of Justice through the preliminary reference procedure. The Member States establish in this way an integrated judicial function. The exercise of such a function by the national judge, in cooperation with the Court of Justice and under the control of the Member State, implies integrative dynamic, which however depends on the balancing exercise with national procedural autonomy and the margin of appreciation of the national judge. [less ▲]

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailOn the Risk of Tool Over-tuning in Runtime Verification Competitions
Bianculli, Domenico UL; Krstic, Srdan

in Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (in press)

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailSupporting Security Protocols on CAN-Based Networks
Bloom, Gedare; Cena, Gianlua; Cibrario Bertolotti, Ivan et al

Scientific Conference (in press)

The ever-increasing variety of services built on top of the Controller Area Network (CAN), along with the recent discovery of vulnerabilities in CAN-based automotive systems (some of them demonstrated in ... [more ▼]

The ever-increasing variety of services built on top of the Controller Area Network (CAN), along with the recent discovery of vulnerabilities in CAN-based automotive systems (some of them demonstrated in practice) stimulated a renewed attention to security-oriented enhancements of the CAN protocol. The issue is further compounded nowadays because, unlike in the past, security can no longer be enforced by physical bus segregation. This paper describes how CAN XR, a recently proposed extension of the CAN data-link layer, can effectively support the distributed calculation of arbitrary binary Boolean functions, which are the foundation of most security protocols, without necessarily disclosing their operands on the bus. The feasibility of the approach is then shown through experimental evaluation and by confirming its applicability to a shared key generation protocol proposed in literature. [less ▲]

Detailed reference viewed: 26 (1 UL)
Full Text
Peer Reviewed
See detailMulti-objective regression test selection in practice: an empirical study in the defense software industry
Özkan, Ramazan; Garousi, Vahid UL; Betin-Can, Aysu

in Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) (in press)

Executing an entire regression test suite after every code change is often costly in large software projects. To address this challenge, various regression test selection techniques have been proposed in ... [more ▼]

Executing an entire regression test suite after every code change is often costly in large software projects. To address this challenge, various regression test selection techniques have been proposed in the literature. One of those approaches is the Multi-Objective Regression Test Optimization (MORTO) approach, which is applied when there are multiple objectives during regression testing (e.g., minimizing the number of test cases and maximizing test coverage). This paper reports an action research type of study which was conducted to improve regression test-selection practices of a safety-critical industrial software in the defence domain based on the MORTO approach. The problem is formulated and solved by converting the multi-objective genetic-algorithm (GA) problem into a custom-built scalarized single-objective GA. The empirical results demonstrate that this approach yields a more efficient test suite (in terms of testing cost and benefits) compared to the old (manual) test-selection approach and another approach from the literature, i.e., the selective requirement coverage-based approach. Based on the context and need of the company, we developed the GA-based solution on a set of five cost objectives and four benefit objectives for regression testing while providing full coverage of the affected (changed) requirements. Since our proposed approach has been beneficial in the industrial context, it is currently in active use in the company. [less ▲]

Detailed reference viewed: 28 (2 UL)
Full Text
See detailNeue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)
Uhrmacher, Martin UL

in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) et al Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. Tagung und Workshop zum 200. Jahrestag des Abschlusses des Wiener Kongresses (in press)

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress ... [more ▼]

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Vortrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen Luxemburg und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailComparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL et al

in Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers (in press)

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to ... [more ▼]

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances while recommending cloud services to the cloud users, using all available data. In this paper, we compare our two approaches to do so: a min-max-min decomposition based on Intuitionistic Fuzzy Logic (IFL) and a Performance Heat Map technique, to evaluate the performance of commercially available cloud providers. While the IFL technique provides simple, total order of the evaluated CSPs, Performance Heat Map provides transparent and explanatory, yet consistent evaluation of service performance of commercially available CSPs. The identified drawbacks of the IFL technique are: 1) It does not return the accurate performance evaluation over multiple decision alternatives due to highly influenced by critical feedback of the evaluators; 2) Overall ranking of the CSPs is not as expected according to the performance measurement. As a result, we recommend to use performance Heat Map for this problem. [less ▲]

Detailed reference viewed: 35 (4 UL)
Full Text
Peer Reviewed
See detailTemPsy-Check: a Tool for Model-driven Trace Checking of Pattern-based Temporal Properties
Dou, Wei UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (in press)

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailHigher Algebra over the Leibniz Operad
Poncin, Norbert UL

in Banach Center Publications (in press)

Detailed reference viewed: 96 (7 UL)
Full Text
Peer Reviewed
See detailAutomatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks
Appelt, Dennis; Panichella, Annibale UL; Briand, Lionel UL

in The 28th IEEE International Symposium on Software Reliability Engineering (ISSRE) (in press)

Testing and fixing WAFs are two relevant and complementary challenges for security analysts. Automated testing helps to cost-effectively detect vulnerabilities in a WAF by generating effective test cases ... [more ▼]

Testing and fixing WAFs are two relevant and complementary challenges for security analysts. Automated testing helps to cost-effectively detect vulnerabilities in a WAF by generating effective test cases, i.e., attacks. Once vulnerabilities have been identified, the WAF needs to be fixed by augmenting its rule set to filter attacks without blocking legitimate requests. However, existing research suggests that rule sets are very difficult to understand and too complex to be manually fixed. In this paper, we formalise the problem of fixing vulnerable WAFs as a combinatorial optimisation problem. To solve it, we propose an automated approach that combines machine learning with multi-objective genetic algorithms. Given a set of legitimate requests and bypassing SQL injection attacks, our approach automatically infers regular expressions that, when added to the WAF's rule set, prevent many attacks while letting legitimate requests go through. Our empirical evaluation based on both open-source and proprietary WAFs shows that the generated filter rules are effective at blocking previously identified and successful SQL injection attacks (recall between 54.6% and 98.3%), while triggering in most cases no or few false positives (false positive rate between 0% and 2%). [less ▲]

Detailed reference viewed: 81 (8 UL)
Full Text
Peer Reviewed
See detailIntroducing automated GUI testing and observing its benefits: an industrial case study in the context of law-practice management software
Garousi, Vahid UL; Yıldırım, Erdem

in Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) (in press)

Motivated by a real-world industrial need in the context of a large IT solutions company based in Turkey, the authors and their colleagues developed and introduced automated test suites for GUI testing of ... [more ▼]

Motivated by a real-world industrial need in the context of a large IT solutions company based in Turkey, the authors and their colleagues developed and introduced automated test suites for GUI testing of two large-scale law-practice management software (comprising of 414 and 105 KLOC). We report in this paper our experience in developing and introducing a set of large automated test suites (more than 50 KLOC in total), using best practices in state-of-the art and –practice, and to report its observed benefits by conducting cost-benefit analysis in the specific industrial context. The project was conducted based on the principles of case-study and “action research” in which the real industrial needs drove the research. Among the best practices that we used are the followings: (1) the page-object test pattern, (2) modularity in test code, (3) creating test-specific libraries, and (4) using systematic guidelines to decide when and what (test cases) to automate. To assess the cost-benefit and Return On Investment (ROI) of test automation, we followed a hybrid measurement approach to assess both the quantitative and qualitative (intangible) benefits of test automation. The empirical findings showed that the automated GUI testing approach has indeed benefitted the test and QA team in the company under study and automation has been highly welcome by the test engineers. By serving as a success story and experience report in development and introduction of automated test suites in an industrial setting, this paper adds to the body of evidence in this area and it aims at sharing both technical (e.g., using automated test patterns) and process aspects (e.g., test process improvement) of our project with other practitioners and researchers with the hope of encouraging more industry-academia collaborations in test automation. [less ▲]

Detailed reference viewed: 37 (4 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 54 (3 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 43 (9 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 77 (6 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 219 (3 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 65 (6 UL)
Full Text
Peer Reviewed
See detailModelling Metrics for Transparency in Medical Systems
Pierina Brustolin Spagnuelo, Dayana UL; Bartolini, Cesare UL; Lenzini, Gabriele UL

in Proceedings of TrustBus 2017 (in press)

Detailed reference viewed: 18 (3 UL)
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 93 (9 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 120 (5 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon (Ed.) ‘Imposed Constitutions: Aspects of Imposed Constitutionalism’ (in press)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 19 (2 UL)
Full Text
Peer Reviewed
See detailLe récit de voyage comme rupture de contrat
Roelens, Nathalie UL

in Acta Fabula : Revue des Parutions en Théorie Littéraire (in press)

Detailed reference viewed: 45 (3 UL)
Full Text
Peer Reviewed
See detailASPIC-END: Structured Argumentation with Explanations and Natural Deduction
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that ... [more ▼]

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that models argumentation about explanations of semantic paradoxes (e.g. the Liar paradox), and we show that ASPIC-END satisfies rationality postulates akin to those satisfied by ASPIC+. [less ▲]

Detailed reference viewed: 25 (4 UL)
Full Text
Peer Reviewed
See detailLes bourgeois de Bohême et l’impossible légitimation ? La conjuration de Prague et de Kutná Hora de février 1309
Vomacka, Eloïse UL

in Contester au Moyen Âge : de la désobéissance à la révolte XLIXe congrès de la SHMESP (2018)

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailExtended Explanatory Argumentation Frameworks
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already ... [more ▼]

Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already previously proven useful to study and combine such extensions is the meta-argumentation methodology involving the notion of a flattening. In order to faithfully model the interaction between explanation argumentation in scientific debates, Šešelja and Straßer have introduced Explanatory Argumentation Frameworks (EAFs). In this paper, we first prove that the flattening technique works as expected for recursive (higher-order) attacks. Then we apply this technique in order to combine EAFs with multiple other extensions that have been proposed to AFs, namely with recursive attacks, joint attacks and a support relation between arguments. This gives rise to Extended Explanatory Argumentation Frameworks (EEAFs). We illustrate the applicability of EEAFs by using them to model a piece of argumentation from a research-level philosophy book. [less ▲]

Detailed reference viewed: 27 (3 UL)
Full Text
Peer Reviewed
See detailA Framework for Optimizing Multi-cell NOMA: Delivering Demand with Less Resource
You, Lei; Lei, Lei UL; Yuan, Di et al

in 2017 IEEE Global Communications Conference (GLOBECOM) (2017, December)

Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far ... [more ▼]

Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far, most papers on NOMA have focused on performance gain for one or sometimes two base stations. In this paper, we study multi-cell NOMA and provide a general framework for user clustering and power allocation, taking into account inter-cell interference, for optimizing resource allocation of NOMA in multi-cell networks of arbitrary topology. We provide a series of theoretical analysis, to algorithmically enable optimization approaches. The resulting algorithmic notion is very general. Namely, we prove that for any performance metric that monotonically increases in the cells’ resource consumption, we have convergence guarantee for global optimum. We apply the framework with its algorithmic concept to a multi-cell scenario to demonstrate the gain of NOMA in achieving significantly higher efficiency. [less ▲]

Detailed reference viewed: 45 (12 UL)
Peer Reviewed
See detailValue-Added Modelling in Primary and Secondary School: An Integrative Review of 674 Publications
Levy, Jessica UL; Keller, Ulrich UL; Brunner, Martin et al

Scientific Conference (2017, December)

Detailed reference viewed: 19 (9 UL)
Full Text
Peer Reviewed
See detailThe Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

Scientific Conference (2017, November 17)

Although conceptually not new, ransomware recently regained attraction in the cybersecurity community: notorious attacks in fact have caused serious damage, proving their disruptive effect. This is likely ... [more ▼]

Although conceptually not new, ransomware recently regained attraction in the cybersecurity community: notorious attacks in fact have caused serious damage, proving their disruptive effect. This is likely just the beginning of a new era. According to a recent intelligence report by Cybersecurity Ventures, the total cost due to ransomware attacks is predicted to exceed $5 billion in 2017. How can this disruptive threat can be contained? Current anti-ransomware solutions are effective only against existing threats, and the worst is yet to come. Cyber criminals will design and deploy more sophisticated strategies, overcoming current defenses and, as it commonly happens in security, defenders and attackers will embrace a competition that will never end. In this arm race, anticipating how current ransomware will evolve may help at least being prepared for some future damage. In this paper, we describe existing techniques to mitigate ransomware and we discuss their limitations. Discussing how current ransomware could become even more disruptive and elusive is crucial to conceive more solid defense and systems that can mitigate zero-day ransomware, yielding higher security levels for information systems, including critical infrastructures such as intelligent transportation networks and health institutions. [less ▲]

Detailed reference viewed: 34 (3 UL)
Full Text
Peer Reviewed
See detailAnalysis of Fingerprinting Techniques for Tor Hidden Services
Panchenko, Andriy UL; Mitseva, Asya UL; Henze, Martin et al

in Proceedings of the 24th ACM Computer and Communications Security (ACM CCS) 16th Workshop on Privacy in the Electronic Society (ACM WPES 2017) (2017, October 31)

Detailed reference viewed: 34 (2 UL)
Full Text
Peer Reviewed
See detailAdvanced Interest Flooding Attacks in Named-Data Networking
Signorello, Salvatore UL; Marchal, Samuel; François, Jérôme et al

Scientific Conference (2017, October 30)

The Named-Data Networking (NDN) has emerged as a clean-slate Internet proposal on the wave of Information-Centric Networking. Although the NDN’s data-plane seems to offer many advantages, e.g., native ... [more ▼]

The Named-Data Networking (NDN) has emerged as a clean-slate Internet proposal on the wave of Information-Centric Networking. Although the NDN’s data-plane seems to offer many advantages, e.g., native support for multicast communications and flow balance, it also makes the network infrastructure vulnerable to a specific DDoS attack, the Interest Flooding Attack (IFA). In IFAs, a botnet issuing unsatisfiable content requests can be set up effortlessly to exhaust routers’ resources and cause a severe performance drop to legitimate users. So far several countermeasures have addressed this security threat, however, their efficacy was proved by means of simplistic assumptions on the attack model. Therefore, we propose a more complete attack model and design an advanced IFA. We show the efficiency of our novel attack scheme by extensively assessing some of the state-of-the-art countermeasures. Further, we release the software to perform this attack as open source tool to help design future more robust defense mechanisms. [less ▲]

Detailed reference viewed: 19 (1 UL)
Full Text
Peer Reviewed
See detailEthereum: state of knowledge and research perspectives
Tikhomirov, Sergei UL

Scientific Conference (2017, October 24)

Ethereum is a decentralized application platform that allows users to write, deploy, and interact with smart contracts -- programs that encode financial agreements. A peer-to-peer network of mutually ... [more ▼]

Ethereum is a decentralized application platform that allows users to write, deploy, and interact with smart contracts -- programs that encode financial agreements. A peer-to-peer network of mutually distrusting nodes maintains a common view of the state of all accounts and executes smart contracts' code upon request. The global state is stored in a blockchain secured by a proof-of-work consensus mechanism similar to that in Bitcoin. The core value proposition of Ethereum is a Turing-complete programming language that enables implementing complex logic in smart contracts. Decentralized applications without a trusted third party are appealing in many areas, such as financial services, crowdfunding, and gambling. Smart contracts as a research topic contains many unsolved challenges and spans over areas ranging from cryptography, consensus algorithms, and programming languages to governance, ethical, and legal issues. This paper is the first to summarize the state of knowledge in this field. We provide a technical overview of Ethereum and outline open challenges along with proposed solutions. We also mention alternative blockchains with Turing complete programming capabilities. [less ▲]

Detailed reference viewed: 136 (14 UL)
Full Text
Peer Reviewed
See detailThe dialectic of transnational integration and national disintegration as mayor challenge of the aggregation of knowledge by European Expert Groups
Decieux, Jean Philippe Pierre UL

Scientific Conference (2017, October 14)

From a phenomenological perspective on modern systems of knowledge production a transformation towards a hybrid knowledge production has taken place. Categories like locality or embeddedness have been ... [more ▼]

From a phenomenological perspective on modern systems of knowledge production a transformation towards a hybrid knowledge production has taken place. Categories like locality or embeddedness have been overcome and rise of arenas of cross-broader-cooperation can be observed. The political sector is an important example where a rise of decision-making contexts with supra national relevance can be detected. As consequence a transformation of the political advisory-system towards the genesis of multinational advisory organisations on supranational level can be observed. This means that decision-making knowledge is developed and standardized on supranational level and supposed to be applied top-down on local level. Theoretically such a cooperative form of knowledge co-production of application-driven knowledge by a heterogeneous set of stakeholders aims to produce a context specific solution for specific problems of application (“socially robust knowledge”) in order to provide evidence-based policy-making. But in fact such a processes of unification of knowledge on supranational level often reduces national policy autonomy and is associated with the risk of limited compliance to the specific local needs. Thus the universal transnational knowledge is systematically contested by a variety of particularistic relevancies as is lacks in socially robustness for the application on national decision-making level (“dialectic of transnational integration and disintegration “. This paper analyses how national policy systems are responding to global integration initiatives. By using an in-depth-case-study, I focus especially on individual actors and their responses in the light of a multiplicity of institutional relevancies and the effective social robustness of the aggregated knowledge on national level. [less ▲]

Detailed reference viewed: 12 (0 UL)
Peer Reviewed
See detail“They can communicate, BUT…” - Language learning goals of forced migrants in multilingual Luxembourg
Kalocsanyiova, Erika UL

Scientific Conference (2017, October 13)

This contribution presents data from an ongoing doctoral research project that focuses on the linguistic integration trajectory of Syrian and Iraqi refugees in Luxembourg. Drawing on interview data and ... [more ▼]

This contribution presents data from an ongoing doctoral research project that focuses on the linguistic integration trajectory of Syrian and Iraqi refugees in Luxembourg. Drawing on interview data and classroom observations we explore teachers’ and learners’ attitudes towards Luxembourg’s main languages and their beliefs about how to approach language learning in a multilingual society. Upon arrival, refugees are immediately exposed to the country’s immense linguistic diversity along with ambiguous and often competing ideologies as to what languages to learn. While French is the main vernacular language, English has been gaining importance as lingua franca of the Grand Duchy’s large international community. Government sources increasingly emphasise the role of Luxembourgish as the sole language of integration, despite its minority position in several domains. Other languages such as German or Portuguese might be equally important for navigating local life. Refugees from regions where (a regional/dialectal form of) Arabic enjoys the status of majority language, are expected to encounter difficulties in adapting to the complex language situation of Luxembourg. As a result, the research participants have shown a strong interest in developing different capabilities in a variety of languages and for a range of purposes. Our data confirms that wide-ranging learning outcomes are pursued in this context. While teachers acknowledge the importance of this aspect for setting language learning goals, system-wide, policy-declared goals still prevail in their pedagogical practice. Yet, we have observed instances of more holistic approaches that recognize the multilingual character of communication and learning, and take better account of the learners’ short- and long-term expectations. [less ▲]

Detailed reference viewed: 16 (0 UL)
Peer Reviewed
See detailMagnetic SANS as a probe to disclose internal interfaces and the spin structure of nanoparticles
Michels, Andreas UL

Scientific Conference (2017, October 11)

Detailed reference viewed: 15 (1 UL)
Full Text
See detailThe Implementation of the Cross-Border Mergers Directive in Luxembourg - A Critical Assessment
Corbisier, Isabelle UL

Scientific Conference (2017, October 07)

Many cross-border mergers do take place in Luxembourg. Most practical difficulties in implementing the new regime were solved in the first months/years following the transposal of the Cross-Border Mergers ... [more ▼]

Many cross-border mergers do take place in Luxembourg. Most practical difficulties in implementing the new regime were solved in the first months/years following the transposal of the Cross-Border Mergers directive. As a matter of fact most of the cross-border mergers taking place in Luxembourg are of a rather uncomplicated kind as they are often intra-group mergers, between companies with no or very few employees and furthermore in a vast majority of cases between a parent company and its 100% subsidiary. In the most recent practice however, the following questions/issues were raised : - the directive only addresses mergers. Other restructurings such as divisions, transfers of assets, of a branch of activity or of the universality of the company’s assets are not covered by the directive and this even though they can likewise take place across the borders and can be difficult to carry out in the absence of some harmonized regime; - a new company law reform was recently adopted in Luxembourg, introducing, a.o., a new article 1865bis in the Civil Code that allows “dissolution-confusion” in one-shareholder companies. The question can be raised whether this provision could be applied across the borders (f.e. could a French company being the sole shareholder of a Luxembourg company decide to dissolve it without having to consider the provisions of the Cross-Border Mergers Directive ?); - another provision of the recently adopted company law reform does re-balance things when considering the cross-border merger as a means for the company to change “nationality” (or law applicable thereto). In the past companies were eventually forced to use the detour of the CBM in order to avoid the requirement of unanimity imposed by law for the transfer of the seat. Since aforementioned reform unanimity is no longer required for the cross-border transfer of the seat. The usefulness of the Cross-Border Merger Directive is therefore not in the least questioned in Luxembourg but it is regrettable that this would appear part of a “work-in-progress” that however does not show concrete signs of being completed any time soon. [less ▲]

Detailed reference viewed: 24 (1 UL)
Full Text
See detailCreditor Protection in Private Companies - the Luxembourg Experience
Corbisier, Isabelle UL

Scientific Conference (2017, October 06)

Detailed reference viewed: 13 (2 UL)
Peer Reviewed
See detailItaliani fuggitivi o semplici “gondolieri” dello spazio?
Cicotti, Claudio UL

Scientific Conference (2017, October 06)

Detailed reference viewed: 9 (0 UL)
See detailGrenzüberschreitende Berufsausbildung als Prozess grenzüberschreitenden Lernens
Funk, Ines; Nienaber, Birte UL; Dörrenbächer, H. Peter

Scientific Conference (2017, October 03)

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailSecurity in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals
Lenzini, Gabriele UL; Samir, Ouchani; Roenne, Peter UL et al

in Proc. of the 9th IEEE Workshop on Information Forensics and Security (2017, October 02)

We describe the application in security of shells of Cholesteric Liquid Crystals (ChLCs). Such shells have a diameter in the microns range and can be gathered in hundreds in a surface area as small as a ... [more ▼]

We describe the application in security of shells of Cholesteric Liquid Crystals (ChLCs). Such shells have a diameter in the microns range and can be gathered in hundreds in a surface area as small as a nail’s head. Because of their structural properties, a bundle of them reflects light, creating colorful patterns that we argue to be unique and computationally hard to predict. We argue also that the bundle itself is unclonable. These are typical properties of Physically Unclonable Functions, a family to which shells of ChLCs belong too. Herein we discuss their physical and security properties and their potential use in object authentication. [less ▲]

Detailed reference viewed: 26 (1 UL)
Full Text
Peer Reviewed
See detailPlease Stand By: TV-based indoor localization
Popleteev, Andrei UL

in 28th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC-2017) (2017, October)

Despite the decades of efforts, indoor positioning remains an open research challenge. While existing solutions already demonstrate high accuracy, their in-building infrastructure --- such as Wi-Fi access ... [more ▼]

Despite the decades of efforts, indoor positioning remains an open research challenge. While existing solutions already demonstrate high accuracy, their in-building infrastructure --- such as Wi-Fi access points or Bluetooth beacons --- provides only a limited coverage. This paper investigates feasibility of accurate indoor positioning using broadcast digital TV signals, readily available in populated areas worldwide. We experiment with the classic received signal strength (RSS) fingerprinting, and introduce a novel approach based on channel state information (CSI), which leverages frequency-selective multipath fading of wideband TV signals. The proposed methods are experimentally evaluated on an extensive dataset of DVB-T signals, systematically collected in two large buildings over the course of 8 months. The results show that the proposed approach consistently outperforms RSS fingerprinting and achieves 92--98% localization accuracy. While this study is based on the European DVB-T signals, the proposed method is directly generalizable to other TV standards (such as ATSC, ISDB, DTMB and DMB) and wide-area TV white space (TVWS) networks. [less ▲]

Detailed reference viewed: 11 (0 UL)
See detailAssessing adaptive task assignments in a simulated classroom setting
Hörstermann, Thomas UL

Scientific Conference (2017, October)

Detailed reference viewed: 11 (0 UL)
Full Text
See detailTowards Automatic Human Body Model Fitting to a 3D Scan
Saint, Alexandre Fabian A UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in D'APUZZO, Nicola (Ed.) Proceedings of 3DBODY.TECH 2017 - 8th International Conference and Exhibition on 3D Body Scanning and Processing Technologies, Montreal QC, Canada, 11-12 Oct. 2017 (2017, October)

This paper presents a method to automatically recover a realistic and accurate body shape of a person wearing clothing from a 3D scan. Indeed, in many practical situations, people are scanned wearing ... [more ▼]

This paper presents a method to automatically recover a realistic and accurate body shape of a person wearing clothing from a 3D scan. Indeed, in many practical situations, people are scanned wearing clothing. The underlying body shape is thus partially or completely occluded. Yet, it is very desirable to recover the shape of a covered body as it provides non-invasive means of measuring and analysing it. This is particularly convenient for patients in medical applications, customers in a retail shop, as well as in security applications where suspicious objects under clothing are to be detected. To recover the body shape from the 3D scan of a person in any pose, a human body model is usually fitted to the scan. Current methods rely on the manual placement of markers on the body to identify anatomical locations and guide the pose fitting. The markers are either physically placed on the body before scanning or placed in software as a postprocessing step. Some other methods detect key points on the scan using 3D feature descriptors to automate the placement of markers. They usually require a large database of 3D scans. We propose to automatically estimate the body pose of a person from a 3D mesh acquired by standard 3D body scanners, with or without texture. To fit a human model to the scan, we use joint locations as anchors. These are detected from multiple 2D views using a conventional body joint detector working on images. In contrast to existing approaches, the proposed method is fully automatic, and takes advantage of the robustness of state-of-art 2D joint detectors. The proposed approach is validated on scans of people in different poses wearing garments of various thicknesses and on scans of one person in multiple poses with known ground truth wearing close-fitting clothing. [less ▲]

Detailed reference viewed: 15 (6 UL)
Full Text
Peer Reviewed
See detailEstimating Urban Road Traffic States Using Mobile Network Signaling Data
Derrmann, Thierry UL; Frank, Raphaël UL; Viti, Francesco UL et al

in Derrmann, Thierry; Frank, Raphaël; Viti, Francesco (Eds.) et al Estimating Urban Road Traffic States Using Mobile Network Signaling Data (2017, October)

It is intuitive that there is a causal relationship between human mobility and signaling events in mobile phone networks. Among these events, not only the initiation of calls and data sessions can be used ... [more ▼]

It is intuitive that there is a causal relationship between human mobility and signaling events in mobile phone networks. Among these events, not only the initiation of calls and data sessions can be used in analyses, but also handovers between different locations that reflect mobility. In this work, we investigate if handovers can be used as a proxy metric for flows in the underlying road network, especially in urban environments. More precisely, we show that characteristic profiles of handovers within and between clusters of mobile network cells exist. We base these profiles on models from road traffic flow theory, and show that they can be used for traffic state estimation using floating-car data as ground truth. The presented model can be beneficial in areas with good mobile network coverage but low road traffic counting infrastructure, e.g. in developing countries, but also serve as an additional predictor for existing traffic state monitoring systems. [less ▲]

Detailed reference viewed: 44 (6 UL)
See detailGesellschaftlicher Wandel als Re-Formierung sozialer Praxis: Analytische Zugänge
Wille, Christian UL

Scientific Conference (2017, October)

In Abgrenzung zu herkömmlichen Beschreibungen von gesellschaftlichen Verhältnissen entwerfen Praxistheorien eine Vision von Sozietät, die performativ angelegt ist, Materialität und Körperlichkeit betont ... [more ▼]

In Abgrenzung zu herkömmlichen Beschreibungen von gesellschaftlichen Verhältnissen entwerfen Praxistheorien eine Vision von Sozietät, die performativ angelegt ist, Materialität und Körperlichkeit betont und Formen des Wandels integriert. Allerdings geben die Praxistheorien (zunächst) keine modellhaften Erklärungen für gesellschaftliche Verhältnisse oder verweisen (offenkundig) auf Stellschrauben für die Steuerung des Sozialen. Im Sinne einer dynamischen Heuristik bieten sie vielmehr vielfältige und miteinander verknüpfte Beschreibungs- und Analysekategorien, treffen Aussagen über (angenommene) Zusammenhänge und versuchen die Heterogenität und Widersprüchlichkeit des Sozialen als Vollzugswirklichkeiten zu greifen. Der Vortrag setzt an dieser Stelle an und will die Chancen und Grenzen einer praxistheoretischen Reformulierung und Untersuchung von gesellschaftlichen Verhältnissen unter dem Aspekt von Wandel umreißen. Dafür wird besonders auf den flexiven Charakter von sozialen Praktiken eingegangen (In/Stabilität), das Moment der Praxislogik entwickelt (Wissen) und gefragt, inwiefern Praxistheorien eine diachrone Perspektive vorsehen (Rekonfiguration). Letztere erscheint unverzichtbar für die Thematisierung von Wandel und soll helfen praxistheoretisch orientierte Ansatzpunkte seiner Untersuchung zu identifizieren. Der Vortrag verzichtet auf empirische Beispiele, überträgt die Überlegungen allerdings auf Fragen des Forschungsprozesses. [less ▲]

Detailed reference viewed: 15 (1 UL)
Full Text
Peer Reviewed
See detailOptical Feeder Links Study towards Future Generation MEO VHTS Systems
Mengali, Alberto UL; Lyras, Nikos K.; Shankar, Bhavani UL et al

in Proceedings of the 35th AIAA International Communications Satellite Systems Conference (ICSSC) (2017, October)

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailRelay Selection Strategies for SWIPT-Enabled Cooperative Wireless Systems
Gautam, Sumit UL; Lagunas, Eva UL; Sharma, Shree K. et al

in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, Oct. 2017 (2017, October)

Detailed reference viewed: 55 (15 UL)
Peer Reviewed
See detailCharacterizing Driving Environments Through Bluetooth Discovery
Bronzi, Walter UL; Faye, Sébastien UL; Frank, Raphaël UL et al

Scientific Conference (2017, October)

Within the world of wireless technologies, Bluetooth has recently been at the forefront of innovation. It is becoming increasingly relevant for vehicles to become aware of their surroundings. Therefore ... [more ▼]

Within the world of wireless technologies, Bluetooth has recently been at the forefront of innovation. It is becoming increasingly relevant for vehicles to become aware of their surroundings. Therefore, having knowledge of nearby Bluetooth devices, both inside and outside other vehicles, can provide the listening vehicles with enough data to learn about their environment. In this paper, we collect and analyze a dataset of Bluetooth Classic (BC) and Low Energy (BLE) discoveries. We evaluate their respective characteristics and ability to provide context-aware information from a vehicular perspective. By taking a look at data about the encountered devices, such as GPS location, quantity, quality of signal and device class information, we infer distinctive behaviors between BC and BLE relative to context and application. For this purpose, we propose a set a features to train a classifier for the recognition of different driving environments (i.e. road classes) from Bluetooth discovery data alone. Comparing the performance of our classifier with different sampling parameters, the presented results indicate that, with our feature selection, we are able to predict with reasonable confidence up to three classes (Highway, City, Extra-Urban) by using only discovery data and no geographical information. This outcome gives promising results targeted at low energy and privacy-friendly applications and can open up a wide range of research directions. [less ▲]

Detailed reference viewed: 38 (5 UL)
Full Text
Peer Reviewed
See detailWi-Fi butterfly effect in indoor localization: The impact of imprecise ground truth and small-scale fading
Popleteev, Andrei UL

in 14th IEEE Workshop on Positioning, Navigation and Communications (WPNC-2017) (2017, October)

The increasing accuracy of indoor positioning systems makes their evaluation an increasingly challenging task. A number of factors are already known to affect performance of fingerprint-based systems ... [more ▼]

The increasing accuracy of indoor positioning systems makes their evaluation an increasingly challenging task. A number of factors are already known to affect performance of fingerprint-based systems: hardware diversity, device orientation, environment dynamics. This paper presents a new butterfly-like effect in localization experiments. The effect is caused by minor ground truth (GT) errors --- that is, small deviations between calibration and test positions. While such deviations are widely considered as purely additive and thus negligible, we demonstrate that even centimeter-scale GT errors are amplified by small-scale radio fading and lead to severe multi-meter Wi-Fi positioning errors. The results show that fingerprint-based localization accuracy quickly deteriorates as GT errors increase towards 0.4 wavelength (5 cm for 2.4 GHz). Beyond that threshold, system's accuracy saturates to about one-third of its original level achievable with precise GT. This effect challenges the impact of the already known accuracy-limiting factors (such as cross-user tests, receiver diversity, device orientation and temporal variations), as they can be partially explained by minor GT errors. Moreover, for smartphone-in-a-hand experiments, this effect directly associates the evaluation outcomes with experimenters' diligence. [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailMultiscale model of sintering: diffusion and plastic flow
Kabore, Brice Wendlassida UL; Peters, Bernhard UL

Scientific Conference (2017, September 27)

Impacting particles or static aggregated particles at high temperature may undergo a permanent change of shape modifying the microstructure. Two particles in contact can develop some bonds within sub ... [more ▼]

Impacting particles or static aggregated particles at high temperature may undergo a permanent change of shape modifying the microstructure. Two particles in contact can develop some bonds within sub-second time. This fast sintering force in the particular case of the snow contribute to the rheological behavior and grain rearrangement [1]. Understanding the kinetics of sintering in granular material is of great importance in some engineering applications. For decades, diffusional processes have received more attention in investigations related to the mechanisms behind sintering [2]. Some works have suggested that the plastic flow might be neglected in sintering process for stresses are not high enough to cause dislocation. However, some studies have showed that stresses experienced in fine particles necks can be high enough and even lead to plasticity driven sintering. The importance of each mechanism in the sintering process may lie in the temporal and spatial scale of interest. Increasing importance is being accorded to the role of plastic flow in sintering. however, several investigations have proved that the conventional plasticity theory may fail to predict plastic activity at micro-scale, The objective of this work is to develop adequate computational model that includes instantaneous and time-dependent plastic flow at micro-scale. We aim at extending existing models of sintering and plasticity to cope with multiple spatial and temporal scales simulations using Extended Discrete Element Method. The numerical results are compare to experimental data on snow. [less ▲]

Detailed reference viewed: 39 (6 UL)
Peer Reviewed
See detailEnlarging the frame: Issues of Inclusion and mental health in an ageing society
Murdock, Elke UL; Ferring, Dieter UL

Scientific Conference (2017, September 22)

This contribution frames the notions of inclusion and mental health by describing trends in European societies at the social and economic level that will have direct consequences for a participative civil ... [more ▼]

This contribution frames the notions of inclusion and mental health by describing trends in European societies at the social and economic level that will have direct consequences for a participative civil society and social cohesion. Our starting point is the observation that the world faces challenges at the start of the 21st century that are new and unprecedented in its history. The four global forces that break all the trends known so far in human history include urbanisation, accelerating technological development, greater global connections, and population ageing (Dobbs, Manyika and Woetzel, 2016). We will first describe the scale of population ageing, as ageing populutions characterize several developed economies. In a second step, we will highlight some consequences of population ageing for social welfare and in a third part I will elaborate on the notion of justice and inclusion in rapidly changing societies. [less ▲]

Detailed reference viewed: 10 (0 UL)
Peer Reviewed
See detailDoes physical learning environment matter? Effects after the move to a new campus on the perception of the quality of studies
Steffgen, Georges UL; Vesely, Jana; Pinto Costa, Andreia UL

Poster (2017, September 18)

The present study examined the effects of a move to a new physical learning environment – Belval Campus – on the students’ satisfaction with the course program in psychology. It was hypothesized that the ... [more ▼]

The present study examined the effects of a move to a new physical learning environment – Belval Campus – on the students’ satisfaction with the course program in psychology. It was hypothesized that the move to a new and modern University campus with better study facilities increases course climate, learning promotion, and skill acquisition. Participants were 538 undergraduate students who completed the Bachelor Evaluation Questionnaire, which assessed the perceived quality of the course program as well as five infrastructure and equipment aspects of the new campus. Findings show that students were more satisfied with the classrooms, the capacity of the rooms, and the library facilities, but there was no increase in perceived course climate, learning promotion, and skill acquisition of the students after 6 months nor after 18 months from the move. The implications of these findings for the need to change physical learning environments are discussed and recommendations for the design of learning environments are presented. [less ▲]

Detailed reference viewed: 14 (3 UL)
Full Text
Peer Reviewed
See detailMechanical Model to Predict the Resistance of the Shear Connection in Composite Beams with Deep Steel Decking
Odenbreit, Christoph UL; Nellinger, Sebastian UL

in Eurosteel 2017 (2017, September 13)

The resistance of a typical shear connection with headed shear studs in a composite beam is analysed in the normal case in accordance with EN 1994-1-1. The reducing effect of a trapezoidal metal decking ... [more ▼]

The resistance of a typical shear connection with headed shear studs in a composite beam is analysed in the normal case in accordance with EN 1994-1-1. The reducing effect of a trapezoidal metal decking onto the ultimate load bearing capacity is considered with empirically derived reduction factors and equations, which have been developed in the last century between the late 70th and the early 80th. The RFCS research project “DISCCO” investigated the shear stud resistance with novel types of steel decking. In many cases, the shear resistance, which was predicted by EN 1994-1-1 was not reached in tests. In the respective experiments with composite beams and deep decking, a concrete cone failure mode was identified and not a pure shear failure of the stud. This failure mode acted in combination with the load bearing capacity of the shear stud, which formed one or two plastic hinges in the shaft - depending on the available geometry. Based on these observations, new equations have been developed to predict the shear connection’s resistance with more accurcy. The yield hinge mechanism of the shear stud, which was developed by Lungershausen, was extended by the above mentioned load bearing component ‘concrete cone’. The formulae consider the geometry of the stud and the steel decking, the material strength of the stud and of the concrete material. The statistical evaluation of the developed equations shows a good accordance with test results. [less ▲]

Detailed reference viewed: 4 (1 UL)
Full Text
Peer Reviewed
See detailExperimental investigations on semi-continuous encased composite joints
Duarte Da Costa, Job UL; Obiala, Renata UL; Odenbreit, Christoph UL

in Eurosteel 2017 (2017, September 13)

The benefits brought to composite construction by the use of semi-continuous joints are well recognised and confirmed by the significant amount of research which has been performed in this area. It has ... [more ▼]

The benefits brought to composite construction by the use of semi-continuous joints are well recognised and confirmed by the significant amount of research which has been performed in this area. It has been analytically proven that at serviceability limit state (SLS) the performance of composite beams benefits from the use of semi-continuous composite joints [1]. At ultimate limit state (ULS) it is of common knowledge that the use of semi-continuous composite joints is only judicious in combination with the plastic hinge theory, which requires the verification of the rotation capacity of the joint. Despite all the effort done in this area, a concise and well-defined method to determine the rotation capacity of composite joints is lacking. Hence, a research programme with a large experimental part has been designed to investigate the behaviour of the connection between a column and a composite slim-floor beam subjected to a negative bending moment. It is the first time that the rotation capacity of an encased composite joint is analysed. The experimental campaign, presented in here, aims at determining the influence of each joint component on the rotation capacity of composite joints. Three test series have been performed; on boltless beam-to-column connections using variable longitudinal reinforcement ratio and bar diameter of the slab, on a bare bolted end-plate steel connection without reinforced concrete slab and finally on the encased composite joint with the complete bolted end-plate connection. This paper presents a detailed description of the tested specimen, shows the main results of the experimental investigations and gives an outlook on future work regarding this research project. The final goal of the research project is to develop a comprehensive methodology to predict the rotation capacity for traditional and slim-floor type of composite beams. [less ▲]

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailSpecification and Analysis of Resource Utilization Policies for Human-Intensive Systems (Extended Abstract)
Shin, Seung Yeob UL

in Proceedings of the BPM Demo Track and BPM Dissertation Award co-located with 15th International Conference on Business Process Management (BPM 2017) (2017, September 10)

Societal processes, such as those used in healthcare, typically depend on the effective utilization of resources, both human and non-human. Sound policies for the management of these resources are crucial ... [more ▼]

Societal processes, such as those used in healthcare, typically depend on the effective utilization of resources, both human and non-human. Sound policies for the management of these resources are crucial in assuring that these processes achieve their goals. But complex utilization policies may govern the use of such resources, increasing the difficulty of accurately incorporating resource considerations into complex processes. This dissertation presents an approach to the specification, allocation, and analysis of the management of such resources. [less ▲]

Detailed reference viewed: 25 (12 UL)
Full Text
Peer Reviewed
See detailLIPS vs MOSA: a Replicated Em- pirical Study on Automated Test Case Generation
Panichella, Annibale UL; Kifetew, Fitsum; Tonella, Paolo

in International Symposium on Search Based Software Engineering (SSBSE) 2017 (2017, September 09)

Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The ... [more ▼]

Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The proponents of LIPS, a novel single-target test generator, conducted a preliminary empirical study to compare their approach with MOSA, an alternative many-objective test generator. However, their empirical investigation suffers from several external and internal validity threats, does not consider complex programs with many branches and does not include any qualitative analysis to interpret the results. In this paper, we report the results of a replication of the original study designed to address its major limitations and threats to validity. The new findings draw a completely different picture on the pros and cons of single-target vs many-objective approaches to test case generation. [less ▲]

Detailed reference viewed: 36 (1 UL)
Peer Reviewed
See detailAvatar Sex Moderates Aggression in Violent Video Games, But Only for Women
Melzer, André UL; Schmidt, Alexander F.

Poster (2017, September 07)

Three studies tested findings reported by Yang, Huesmann, and Bushman (2014) that playing a male avatar in a violent video game leads to greater aggression than playing a female avatar in the same game ... [more ▼]

Three studies tested findings reported by Yang, Huesmann, and Bushman (2014) that playing a male avatar in a violent video game leads to greater aggression than playing a female avatar in the same game. The male avatar effect was confirmed in Study 1 (N=79) for post-game aggression: compared to playing a female character, participants who had played the male fighter in a violent mixed martials arts game chose more Hot Sauce for another participant who allegedly disliked spicy food. In contrast to Yang et al. (2014), however, the male avatar effect was qualified by participant sex, indicating that the effect was more strongly pronounced and only significant for female participants. A similar interaction effect was observed in Study 2 (N=76) and Study 3 (N=70) for in-game aggression: only female participants playing a male avatar showed a greater hit ratio in a mixed martials arts game (Study 2) or a greater number of attacks in a brawler game (Study 3) than their colleagues who played a female avatar. At this stage, the reason for this cross-gender effect is unclear. Given that games allow for behavior (i.e., aggression) independent of socially shared gender norms, we may speculate that for women, male avatars may provide the opportunity to “step out” of prevailing social norms regarding non-aggressive female behavior and adopt the role of the (hyper-)aggressive male. However, this hypothesis needs to be tested in future studies. All three studies additionally tested the mediating effect of male gender stereotype activation that was hypothesized by Yang et al. (2014). In addition to priming violent behavior, and in line with the General Aggression Model, the authors had speculated that playing the male avatar automatically activated male gender stereotypes (i.e., aggressive thoughts and behavior) which then caused aggressive behavior. In order to address this activation hypothesis, we designed an indirect cognitive measure of gender role identity using the Positive-Negative Sex-Role Inventory (PN-SRI: Berger & Krahé, 2013). After participants played the violent game, positive and negative aspects of masculinity and femininity were presented as word fragments in a five-minute response window in Study 1 and 2. Fragment completion rates served as indicators of cognitive activation of male stereotypes. In Study 3, participants used the intact PN-SRI gender attributes to rate the avatar after playing the game. However, both direct and indirect measures failed to corroborate the stereotype activation hypothesis in the present studies: word fragments related to male stereotypes were not completed more often than fragments related to female stereotypes (Study 1 and 2). Also, neither in-game aggression nor success in the game was associated with how masculine participants perceived their fighter (Study 3). At the present stage, thus, the mechanisms underlying the gender effect that participants respond differently when playing a male or female avatar in a violent video game remain unclear. [less ▲]

Detailed reference viewed: 45 (1 UL)
Full Text
See detailMultiscale Modelling of Damage and Fracture in Discrete Materials Using a Variational Quasicontinuum Method
Rokos, Ondrej; Peerlings, Ron; Beex, Lars UL et al

Scientific Conference (2017, September 05)

Detailed reference viewed: 21 (1 UL)
Peer Reviewed
See detailExposure to Sexualized Pictures Primes Occupational Stereotypes
Melzer, André UL; Ramsperger, Stephan

Scientific Conference (2017, September 05)

Gender stereotypes in advertisements, magazines, or videogames often appear in the form of sexualized portrayals of women characterized by inappropriately foregrounding female sexuality. Women are shown ... [more ▼]

Gender stereotypes in advertisements, magazines, or videogames often appear in the form of sexualized portrayals of women characterized by inappropriately foregrounding female sexuality. Women are shown with highly revealing clothing and engaging in seductive acts. Sexualization may serve as a motivator to adopt congruent gender-related stereotypes in the viewers and, thus, influence beliefs about women in the real world, including negative effects on self-efficacy of women (Behm-Morawitz & Mastro, 2009). In two studies, sexualization had similar adverse effects on participants’ spontaneous judgments of occupational stereotypes and job classification. In a field study (Study 1, N=128), sexualized female game characters were spontaneously associated with jobs of lower prestige (e.g., hairdresser). In contrast, non-sexualized portrayals were linked to jobs of higher status (i.e., physician, educator). This detrimental effect of sexualized portrayal on occupational status was replicated for depictions of male and female fashion models in an online survey (Study 2, N=459). Moreover, this effect was partially mediated by ratings of lower perceived competence for sexualized portrayals of both men and women. The findings of the present studies extend the multifaceted negative effects of sexualization on stereotyping by showing that the resulting spontaneous competence judgments may have detrimental job-related consequences. [less ▲]

Detailed reference viewed: 19 (1 UL)
Full Text
Peer Reviewed
See detailAmbiLoc: A year-long dataset of FM, TV and GSM fingerprints for ambient indoor localization
Popleteev, Andrei UL

in 8th International Conference on Indoor Positioning and Indoor Navigation (IPIN-2017) (2017, September)

Ambient indoor localization - an approach that leverages ambient radio signals - has been previously shown to provide promising positioning performance using the globally available infrastructure of FM ... [more ▼]

Ambient indoor localization - an approach that leverages ambient radio signals - has been previously shown to provide promising positioning performance using the globally available infrastructure of FM, TV and cellular stations. However, the need for specialized equipment and laborious data collection constitute a high entry barrier for follow-up studies. This paper presents AmbiLoc - a dataset of radio signals for ambient indoor localization research. The dataset has been systematically collected in multiple testbeds, including large-scale and multi-floor buildings, over the course of one year. Due to the use of a software-defined radio receiver, raw signal samples in AmbiLoc allow extraction of arbitrary fingerprinting features. The first edition of AmbiLoc, introduced in this paper, includes received signals strength (RSS) fingerprints of FM, TV and GSM signals, along with the relevant metadata (such as weather conditions). The dataset is available online at AmbiLoc.org. As the first public dataset of ambient localization signals, AmbiLoc provides an easy entry and a common reference for researchers exploring novel indoor localization methods. [less ▲]

Detailed reference viewed: 9 (0 UL)
Peer Reviewed
See detailOrganizational learning and complex problem solving. Towards a better understanding of the modern workplace.
Jaster, Christian UL; Mainert, Jakob; Greiff, Samuel UL

Scientific Conference (2017, September)

Detailed reference viewed: 2 (0 UL)
See detailThe relevance of verbal and visuo-spatial abilities for verbal number skills – what matters in 5 to 6 year olds?
Cornu, Véronique UL; Schiltz, Christine UL; Martin, Romain UL et al

Poster (2017, September)

The acquisition of verbal number skills, as defined by the meaningful use of number words, marks a milestone in numerical development. In the present study, we were particularly interested in the question ... [more ▼]

The acquisition of verbal number skills, as defined by the meaningful use of number words, marks a milestone in numerical development. In the present study, we were particularly interested in the question, whether verbal number skills are primarily verbal in nature, or if they call upon visuo-spatial processes, reflecting a spatial grounding of verbal number skills. 141 five- to six-year old children were tested on a range of verbal (i.e. vocabulary, phonological awareness and verbal working memory) and visuo-spatial abilities (i.e. spatial perception, visuo-motor integration and visuo-spatial working memory). We were particularly interested in the predictive role of these abilities for children’s verbal number skills (as measured by different counting and number naming tasks). In a latent regression model, basic visuo-spatial abilities, measured by spatial perception and visuo-motor integration, emerge as the most important predictor of verbal number skills. This gives raise to the assumption, that verbal number skills are, despite their verbal nature, spatially grounded in young children. [less ▲]

Detailed reference viewed: 39 (10 UL)
Full Text
Peer Reviewed
See detailLaboratory experiment for damage assessment using the DAD-method
Erdenebat, Dolgion UL; Waldmann, Danièle UL; Teferle, Felix Norman UL

in Conference proceedings SMAR 2017 (2017, September)

In the following, a new analytical method, the Deformation Area Difference (DAD) method for damage assessment of bridge structures is applied using experimental test results of a statically loaded beam ... [more ▼]

In the following, a new analytical method, the Deformation Area Difference (DAD) method for damage assessment of bridge structures is applied using experimental test results of a statically loaded beam. An essential prerequisite for the application of this method is a high precise measurement of the deflection line. In this paper, the results from a laboratory experiment using modern measurement techniques such as photogrammetry and displacement sensors are discussed. A reinforced concrete beam is stepwise loaded until reaching the ultimate limit state. The DAD-method is applied to the resulting data from the measurements and the outcome is discussed for further optimisation of the method. In principle, the measured deflection line of the beam contains already essential information on discontinuities which occur due to cracking. These entries are processed and visualised using the DAD-method. This study shows that a high accuracy of the measurement techniques in combination with the DAD-method can become an effective tool for damage detection. [less ▲]

Detailed reference viewed: 31 (6 UL)
Full Text
Peer Reviewed
See detailJoanAudit: A Tool for Auditing Common Injection Vulnerabilities
Thome, Julian UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (2017, September)

JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies ... [more ▼]

JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies parts of the program code that are relevant for security and generates an HTML report to guide security auditors audit the source code in a scalable way. JoanAudit is configured with various security-sensitive input sources and sinks relevant to injection vulnerabilities and standard sanitization procedures that prevent these vulnerabilities. It can also automatically fix some cases of vulnerabilities in source code — cases where inputs are directly used in sinks without any form of sanitization — by using standard sanitization procedures. Our evaluation shows that by using JoanAudit, security auditors are required to inspect only 1% of the total code for auditing common injection vulnerabilities. The screen-cast demo is available at https://github.com/julianthome/joanaudit. [less ▲]

Detailed reference viewed: 114 (27 UL)
Peer Reviewed
See detailDie Trainierbarkeit von komplexem Problemlösen im Rahmen eines Trainings für Experimentieren.
Stebner, Ferdinand; Kunze, Thiemo UL; Kemper, Christoph UL et al

Scientific Conference (2017, September)

Detailed reference viewed: 7 (3 UL)
Peer Reviewed
See detailSelektives Enkodieren in figuralen Matrizen.
Domnick, Florian UL; Becker, Nicolas; Greiff, Samuel UL et al

Scientific Conference (2017, September)

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailIntroduction to Detection of Non-Technical Losses using Data Analytics
Glauner, Patrick UL; Meira, Jorge Augusto UL; State, Radu UL et al

Scientific Conference (2017, September)

Electricity losses are a frequently appearing problem in power grids. Non-technical losses (NTL) appear during distribution and include, but are not limited to, the following causes: Meter tampering in ... [more ▼]

Electricity losses are a frequently appearing problem in power grids. Non-technical losses (NTL) appear during distribution and include, but are not limited to, the following causes: Meter tampering in order to record lower consumptions, bypassing meters by rigging lines from the power source, arranged false meter readings by bribing meter readers, faulty or broken meters, un-metered supply, technical and human errors in meter readings, data processing and billing. NTLs are also reported to range up to 40% of the total electricity distributed in countries such as Brazil, India, Malaysia or Lebanon. This is an introductory level course to discuss how to predict if a customer causes a NTL. In the last years, employing data analytics methods such as data mining and machine learning have evolved as the primary direction to solve this problem. This course will compare and contrast different approaches reported in the literature. Practical case studies on real data sets will be included. Therefore, attendees will not only understand, but rather experience the challenges of NTL detection and learn how these challenges could be solved in the coming years. [less ▲]

Detailed reference viewed: 15 (2 UL)
Full Text
Peer Reviewed
See detailA Model-Driven Approach to Trace Checking of Pattern-based Temporal Properties
Dou, Wei; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017 ) (2017, September)

Detailed reference viewed: 43 (4 UL)
Full Text
Peer Reviewed
See detailMining AndroZoo: A Retrospect
Li, Li UL

in The International Conference on Software Maintenance and Evolution (ICSME) (2017, September)

This paper presents a retrospect of an Android app collection named AndroZoo and some research works conducted on top of the collection. AndroZoo is a growing collection of Android apps from various ... [more ▼]

This paper presents a retrospect of an Android app collection named AndroZoo and some research works conducted on top of the collection. AndroZoo is a growing collection of Android apps from various markets including the official Google Play. At the moment, over five million Android apps have been collected. Based on AndroZoo, we have explored several directions that mine Android apps for resolving various challenges. In this work, we summarize those resolved mining challenges in three research dimensions, including code analysis, app evolution analysis, malware analysis, and present in each dimension several case studies that experimentally demonstrate the usefulness of AndroZoo. [less ▲]

Detailed reference viewed: 79 (6 UL)
Peer Reviewed
See detailKomplexes Problemlösen und Intelligenz
Greiff, Samuel UL

Scientific Conference (2017, September)

Detailed reference viewed: 3 (1 UL)
Full Text
Peer Reviewed
See detailPile load test at the west coast of Mexico
Rica, Shilton UL; Van Baars, Stefan UL; Jung, Stefan

in Proceedings of Pile 2017 (2017, September)

Five pile tests have been performed, at the west coast of Mexico, in order to evaluate their pile bearing capacity. The Kentledge system (a test pile loaded in between two tension piles) has been used to ... [more ▼]

Five pile tests have been performed, at the west coast of Mexico, in order to evaluate their pile bearing capacity. The Kentledge system (a test pile loaded in between two tension piles) has been used to execute the pile tests. The soil stratigraphy has been surveyed with standard penetration tests, cone penetration tests and borings, and consists of a ten to twelve meter soft clayey soil on top of a hard clay layer. Three identical pile tests have been performed on bored piles with a pile diameter of 0.6 m and a pile length of 30 m. In addition, two identical pile tests have been performed on driven piles with a squared cross section of 0.5 m × 0.5 m and a pile length of about 21 m. The aims of these tests were, first to evaluate the pile bearing capacity for both the bored and the driven pile types, in order to decide which pile type will be used finally, for the foundation of a factory; and second, to study the influence of the pile installation process on the pile bearing capacity of both pile types. During the testing of the bored piles, load measurements in different sections of the pile suggested that almost all bearing capacity came from the pile section in the upper soft clay layer. Since it is impossible to have such a relative large friction along the pile shaft in the soft soil, and because far more concrete was used for making the pile than expected, it had to be concluded that the liquid concrete has widened the pile diameter just above the hard soil layer, leading to a bulking effect in the pile. Therefore, the pile was leaning on this hard soil layer. For the driven test piles, the measurements showed a normal behaviour of both the pile shaft friction and the pile tip bearing capacity. [less ▲]

Detailed reference viewed: 15 (3 UL)
Full Text
See detailEmployable Middle Ages - MediävistInnen auf dem Arbeitsmarkt von morgen?
Bendheim, Amelie UL

Scientific Conference (2017, September)

Detailed reference viewed: 8 (1 UL)
Full Text
Peer Reviewed
See detailRefinement-Aware Generation of Attack Trees
Gadyatskaya, Olga UL; Ravi, Jhawar; Mauw, Sjouke UL et al

in Livraga, Giovanni; Mitchell, Chris J. (Eds.) Security and Trust Management - 13th International Workshop (2017, September)

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailImpact of the Time of Diagnosis on Dyslexic Adolescents' Self-efficacy beliefs
Battistutta, Layla UL; Commissaire, Eva; Steffgen, Georges UL

Poster (2017, September)

Aim: Most of the research on self-efficacy in children with specific learning disorders has focused on inter-group comparisons, showing that these children hold lower self-efficacy scores than their ... [more ▼]

Aim: Most of the research on self-efficacy in children with specific learning disorders has focused on inter-group comparisons, showing that these children hold lower self-efficacy scores than their normally developing peers. As these lower scores might be due to a reduced access to self-efficacy sources (Hampton & Mason, 2003), this small-scale study (N=18) aimed to investigate whether the time of diagnosis might modulate the access to these sources within a group of dyslexic adolescents, either diagnosed in primary or secondary school but paired on chronological age and duration of remedial training. Methods: Mixed methods were employed by using general as well as academic and social self-efficacy scales, complemented by semi-structured interviews investigating students’ understanding and acceptance of their dyslexia. Results: The findings showed that early-diagnosed students hold higher general and academic scores. Further analyses regarding students’ personal statements revealed a statistically significant association between time of diagnosis and understanding as well as tolerance of dyslexia, indicating that early-diagnosed adolescents, compared to their late-diagnosed peers, have a more cohesive understanding and more adequate representations of their reading disorder as specific and non-stigmatizing, all the while being more tolerant and open about announcing their dyslexia to others. Conclusions: An early diagnosis of dyslexia is thus associated with a better understanding and acceptance of the disorder, possibly serving as a protective factor which can consequently contribute to higher general and academic self-efficacy scores. Hence, these findings not only extend the literature on self-efficacy beliefs in dyslexia by investigating the time of diagnosis, but also have important practical implications, highlighting the significance of an early diagnosis beyond the benefits of early rehabilitation as well as the potentially negative psychological consequences of a late diagnosis. [less ▲]

Detailed reference viewed: 22 (5 UL)
See detailInterkulturelle Annäherung im Zeichen der Exogamie - Kommunikationsstrategien im König Rother
Bendheim, Amelie UL

Scientific Conference (2017, September)

Detailed reference viewed: 6 (0 UL)
Peer Reviewed
See detailZusammenhänge zwischen Zahlenstrahlschätzfähigkeit, Mathematikleistung und Schülercharakteristika: Eine Vollerhebung mit 6484 Luxemburgischen Neuntklässlern
Nurayadin, Sevim; Ugen, Sonja UL; Martin, Romain et al

Scientific Conference (2017, September)

In der Zahlenstrahlschätzaufgabe sehen die Probanden eine Zahl und einen leeren Zahlenstrahl, bei dem nur die erste und die letzte Position markiert und mit ihrem Wert beschriftet sind. Die Aufgabe der ... [more ▼]

In der Zahlenstrahlschätzaufgabe sehen die Probanden eine Zahl und einen leeren Zahlenstrahl, bei dem nur die erste und die letzte Position markiert und mit ihrem Wert beschriftet sind. Die Aufgabe der Probanden besteht darin, die Position der Zahl auf dem Strahl anzugeben. Der vorherrschende Ansatz in der Literatur geht davon aus, dass diese Aufgabe die Qualität der mentalen Repräsentation numerischer Größen erfasst. Diese gibt Lernen ein Verständnis von numerischen Größen und ihren Interrelationen, das eine wichtige Grundlage für den Erwerb anspruchsvollerer mathematischer Kompetenzen z.B. in Arithmetik oder Algebra darstellt. Zahlreiche Studien fanden positive Korrelationen zwischen der Zahlenstrahlschätzfähigkeit und der Mathematikleistung. Daher bietet es sich an, die Zahlenstrahlschätzaufgabe zur Diagnostik mathematischer Leistung und Entwicklung zu nutzen. Jedoch ist zum einen noch unklar, wie die Zahlstrahlschätzfähigkeit in der Population ausgeprägt und verteilt ist. Zum anderen ist offen, inwieweit die Korrelation mit der Mathematikleistung eine Scheinkorrelation darstellt, die auf den Einfluss anderer Personeneigenschaften zurückgeht. Um diese Punkte zu klären, analysierten wir Daten aus einer Vollerhebung aller Neuntklässler in Luxemburg (N = 6484). Die Schüler lösten die Zahlenstrahlschätzaufgabe mit ganzen Zahlen sowie Brüchen, absolvierten einen standardisierten Mathematikleistungstest und beantworteten zahlreiche Fragen zu domänenspezifischen (Matheängstlichkeit, Selbstkonzept, Interesse, Testmotivation) und domänenübergreifenden (Geschlecht, Immigrationsstatus, Gewissenhaftigkeit und elterlicher sozioökonomischer Status) Personenmerkmalen. Wir dokumentierten Mittelwerte und Verteilungseigenschaften der Zahlenstrahlschätzfähigkeit für diverse Subpopulationen (Jungen, Mädchen, Migranten, Schulformen etc.). Die Ergebnisse von Mehrebenenregressionsmodellen zeigten, dass die Zahlenstrahlschätzfähigkeit erheblich enger als alle anderen erhobenen Personeneigenschaften mit der Mathematikleistung zusammenhing. Der Zusammenhang war stärker für das Schätzen von Brüchen als ganzen Zahlen. Die Ergebnisse bestätigen die Annahme, dass die Zahlenstrahlschätzfähigkeit eine zentrale Komponente mathematischen Vorwissens erfasst, die weiteres Lernen leitet. In Anbetracht der einfachen Handhabung kann die Aufgabe vielfältig eingesetzt werden, um die mathematische Leistung in der Schule zu messen oder vorherzusagen. Zukünftige Studien sollten verstärkt die Nutzung der Aufgabe in Interventionen erproben. [less ▲]

Detailed reference viewed: 11 (2 UL)
Full Text
Peer Reviewed
See detailLegal Markup Generation in the Large: An Experience Report
Sannier, Nicolas UL; Adedjouma, Morayo UL; Sabetzadeh, Mehrdad UL et al

in the 25th International Requirements Engineering Conference (RE'17), Lisbon, 4-8 September 2017 (2017, September)

Detailed reference viewed: 21 (0 UL)
Full Text
Peer Reviewed
See detailComparing Broad-Phase Interaction Detection Algorithms for Multiphysics DEM Applications
Rousset, Alban UL; Mainassara Chekaraou, Abdoul Wahid UL; Liao, Yu-Chung UL et al

in AIP Conference Proceedings ICNAAM 2017 (2017, September)

Collision detection is an ongoing source of research and optimization in many fields including video-games and numerical simulations [6, 7, 8]. The goal of collision detection is to report a geometric ... [more ▼]

Collision detection is an ongoing source of research and optimization in many fields including video-games and numerical simulations [6, 7, 8]. The goal of collision detection is to report a geometric contact when it is about to occur or has actually occurred. Unfortunately, detailed and exact collision detection for large amounts of objects represent an immense amount of computations, naively n 2 operation with n being the number of objects [9]. To avoid and reduce these expensive computations, the collision detection is decomposed in two phases as it shown on Figure 1: the Broad-Phase and the Narrow-Phase. In this paper, we focus on Broad-Phase algorithm in a large dynamic three-dimensional environment. We studied two kinds of Broad-Phase algorithms: spatial partitioning and spatial sorting. Spatial partitioning techniques operate by dividing space into a number of regions that can be quickly tested against each object. Two types of spatial partitioning will be considered: grids and trees. The grid-based algorithms consist of a spatial partitioning processing by dividing space into regions and testing if objects overlap the same region of space. And this reduces the number of pairwise to test. The tree-based algorithms use a tree structure where each node spans a particular space area. This reduces the pairwise checking cost because only tree leaves are checked. The spatial sorting based algorithm consists of a sorted spatial ordering of objects. Axis-Aligned Bounding Boxes (AABBs) are projected onto x, y and z axes and put into sorted lists. By sorting projection onto axes, two objects collide if and only if they collide on the three axes. This axis sorting reduces the number of pairwise to tested by reducing the number of tests to perform to only pairs which collide on at least one axis. For this study, ten different Broad-Phase collision detection algorithms or framework have been considered. The Bullet [6], CGAL [10, 11] frameworks have been used. Concerning the implemented algorithms most of them come from papers or given implementation. [less ▲]

Detailed reference viewed: 39 (12 UL)
Full Text
Peer Reviewed
See detailFORMACIÓN SANITARIA EN VIOLENCIA DE GÉNERO. HERRAMIENTAS ONLINE PARA LA CAPACITACIÓN Y TRANSFERENCIA PRÁCTICA
Fernández Alonso, Carmen; Gomez Bravo, Raquel UL; Herrero Velázquez, Sonia et al

in González López-Valcárcel, Beatriz (Ed.) XVII CONGRESO SESPAS XXXV REUNIÓN CIENTÍFICA DE LA SOCIEDAD ESPAÑOLA DE EPIDEMIOLOGÍA Y XII CONGRESSO DA ASSOCIAÇÃO PORTUGUESA DE EPIDEMIOLOGIA XXXVII JORNADAS DE ECONOMÍA DE LA SALUD Ciencia para la Acción (2017, September)

Antecedentes/Objetivos: La formación en VG de los y las profesionales de la salud es una necesidad incuestionable y urgente. De poco sirven las recomendaciones de actuación para la detección de casos y ... [more ▼]

Antecedentes/Objetivos: La formación en VG de los y las profesionales de la salud es una necesidad incuestionable y urgente. De poco sirven las recomendaciones de actuación para la detección de casos y para la atención a las victimas si no disponemos de profesionales formados para llevarlo a cabo. La violencia contra la mujer no está presente en los contenidos curriculares de la mayor parte de las profesiones sanitarias. Por ello la formación en VG supone en muchos casos partir de cero. Supone sensibilizar y convencer que se trata de un problema de salud y nos compete, y luego de capacitar al profesional para una práctica adecuada. Objetivo del estudio: Identificar necesidades de formación de los y las profesionales en VG, los contenidos básicos y los métodos mejor valorados Elaborar un kit de herramientas de ayuda para la formación dirigido a formadores/as en VG. Métodos: Compartir experiencias formativas de 4 organizaciones europeas que trabajan en VG. Análisis de la práctica formativa, diseñar, consensuar y evaluar las herramientas de ayuda a la formación en VG. Resultados: 1. Kit de 28 herramientas para las distintas fases de la formación (preparación, desarrollo, aplicación, seguimiento y evaluación) con ejemplos que facilitan su aplicación práctica. 2. Documento que recoge las herramientas y materiales disponibles para los docentes y discentes. 3. Página web con todo el material (Toolkik) en inglés y en español accesible: www.toolner.com. En 18 meses ha tenido 40.000 visitas 1ª evaluación de una actividad formativa siguiendo esta metodología ha mejorado los conocimientos y actitudes del alumnado. Conclusiones/Recomendaciones: Esta herramienta on-line puede facilitar el trabajo a los formadores/as y contribuir a la mejora de la capacitación de profesionales y la transferencia a la práctica Se trata de una herramienta dinámica que permite realizar cambios y adaptarse a distintos perfiles y necesidades. Accesible en abierto para cualquier usuario. Financiación: Lifelong Learning Programme, acción Leonardo da Vinci (2013-1-DE2-LEO04-16120 4). [less ▲]

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailIs Big Data Sufficient for a Reliable Detection of Non-Technical Losses?
Glauner, Patrick UL; Migliosi, Angelo UL; Meira, Jorge Augusto UL et al

in Proceedings of the 19th International Conference on Intelligent System Applications to Power Systems (ISAP 2017) (2017, September)

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to ... [more ▼]

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to 40% of the total electricity distributed. In order to detect NTLs, machine learning methods are used that learn irregular consumption patterns from customer data and inspection results. The Big Data paradigm followed in modern machine learning reflects the desire of deriving better conclusions from simply analyzing more data, without the necessity of looking at theory and models. However, the sample of inspected customers may be biased, i.e. it does not represent the population of all customers. As a consequence, machine learning models trained on these inspection results are biased as well and therefore lead to unreliable predictions of whether customers cause NTL or not. In machine learning, this issue is called covariate shift and has not been addressed in the literature on NTL detection yet. In this work, we present a novel framework for quantifying and visualizing covariate shift. We apply it to a commercial data set from Brazil that consists of 3.6M customers and 820K inspection results. We show that some features have a stronger covariate shift than others, making predictions less reliable. In particular, previous inspections were focused on certain neighborhoods or customer classes and that they were not sufficiently spread among the population of customers. This framework is about to be deployed in a commercial product for NTL detection. [less ▲]

Detailed reference viewed: 41 (6 UL)
Full Text
Peer Reviewed
See detailEmbedding of the Personalized Sentiment Engine PERSEUS in an Artificial Companion
Guo, Siwen UL; Schommer, Christoph UL

in International Conference on Companion Technology, Ulm 11-13 September 2017 (2017, September)

The term Artificial Companion has originally been introduced by Y. Wilks [1] as “...an intelligent and helpful cognitive agent, which appears to know its owner and their habits, chats to them and diverts ... [more ▼]

The term Artificial Companion has originally been introduced by Y. Wilks [1] as “...an intelligent and helpful cognitive agent, which appears to know its owner and their habits, chats to them and diverts them, assists them with simple tasks. . . ”. To serve the users’ interests by considering a personal knowledge is, furthermore, demanded. The following position paper takes this request as motivation for the embedding of the PERSEUS system, which is a personalized sentiment framework based on a Deep Learning approach. We discuss how such an embedding with a group of users should be realized and why the utilization of PERSEUS is beneficial. [less ▲]

Detailed reference viewed: 18 (5 UL)