References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailLe récit de voyage comme rupture de contrat
Roelens, Nathalie UL

in Acta Fabula : Revue des Parutions en Théorie Littéraire (in press)

Detailed reference viewed: 48 (5 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 85 (8 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 86 (6 UL)
Full Text
Peer Reviewed
See detailThe competence to conclude the new generation of free trade agreements: lessons from Opinion 2/15
Neframi, Eleftheria UL

in Chaisse, Julien (Ed.) China-European Union Investment Relationships (in press)

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU ... [more ▼]

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU-only agreement, or a mixed agreement, jointly by the Union and its Member States. The Court of Justice of the European Union held that the EU competence to conclude the EUSFTA is not exclusive, as long as provisions concerning non-direct investments and dispute settlement fall under the shared competence of the Union and its Member States. The Court of Justice made valuable contributions to the interpretation of the scope of the Union’s competence in the field of common commercial policy, comprising sustainable development provisions, as well as to the interpretation of implied external competences, and clarified the status of non-substantive provisions. However, uncertainty remains as far as the meaning and the impact of a shared competence are concerned. [less ▲]

Detailed reference viewed: 18 (3 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 134 (5 UL)
Full Text
Peer Reviewed
See detailHigher Algebra over the Leibniz Operad
Poncin, Norbert UL

in Banach Center Publications (in press)

Detailed reference viewed: 116 (11 UL)
Full Text
Peer Reviewed
See detailOn the performance of an overlapping-domain parallelization strategy for Eulerian-Lagrangian Multiphysics software
Pozzetti, Gabriele UL; Besseron, Xavier UL; Rousset, Alban UL et al

in AIP Conference Proceedings ICNAAM 2017 (in press)

In this work, a strategy for the parallelization of a two-way CFD-DEM coupling is investigated. It consists on adopting balanced overlapping partitions for the CFD and the DEM domains, that aims to reduce ... [more ▼]

In this work, a strategy for the parallelization of a two-way CFD-DEM coupling is investigated. It consists on adopting balanced overlapping partitions for the CFD and the DEM domains, that aims to reduce the memory consumption and inter-process communication between CFD and DEM. Two benchmarks are proposed to assess the consistency and scalability of this approach, coupled execution on 252 cores shows that less than 1\% of time is used to perform inter-physics data exchange. [less ▲]

Detailed reference viewed: 46 (22 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 231 (3 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 54 (3 UL)
Full Text
See detailKommunale Selbstinszenierung im vorstädtischen Raum. Ein neuer Blick auf Leprosorien des Spätmittelalters und der frühen Neuzeit
Uhrmacher, Martin UL

in Hesse, Christian; Schulte, Daniela; Stercken, Martina (Eds.) Kommunale Selbstinszenierung (in press)

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical ... [more ▼]

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical Perspectives' Universität Zürich, 3./4./5. September 2015 Martin Uhrmacher (Universität Luxemburg) „Leprosorien als kommunale Repräsentationsbauten im vorstädtischen Raum. Ein neuer Blick auf eine bisher wenig beachtete städtische Baugattung“ Die vor den Mauern mittelalterlicher und frühneuzeitlicher Städte gelegenen Leprosorien werden heute zumeist noch immer als abgelegene und verborgene Orte der Exklusion angesehen, durch Zäune und Mauern von der Außenwelt getrennt. Dementsprechend wird auch der Baugattung „Leprosorium“ nur wenig architektonischer Wert zugebilligt, wie bspw. im Ausstellungskatalog „Aussatz – Lepra – Hansen-Krankheit: Demnach hatten sie „keinerlei repräsentative Bedeutung, im Gegenteil: eher unauffällig sollten sie sein, verborgen vor dem Blick der Stadtbewohner und Reisenden“. Im 2005 von Monika Escher und Frank G. Hirschmann publizierten Syntheseband „Die urbanen Zentren des hohen und späten Mittelalters“ zur Geschichte mittelalterlicher Städte zwischen Rhein und Maas werden Leprosorien zudem als „nicht wertungsrelevantes“ Urbanitäts- und Zentralitätskriterium“ bezeichnet; begründet mit der angeblichen „Tatsache, daß in der Regel der topographische Bezug zur Stadt gering war“. In der jüngeren Forschung hat sich diese Einschätzung nun grundlegend gewandelt. Leprosorien gelten aufgrund ihrer besonders prominent und exponiert ausgewählten Standorte an Kreuzungen, Brücken und Hauptausfallstraßen als präsente und das städtische Umland prägende kommunale Einrichtungen, die ein fester Bestandteil der städtischen Lebenswelt waren. Sie dienten nicht dazu, ihre Bewohner zu verstecken, sondern waren vielmehr mit Stiftungen und Spenden versehene städtische Einrichtungen, die vom Rat und den Bürgern auch als Prestigeobjekte betrachtet wurden. Anhand ausgewählter Beispiele wird aufgezeigt, wie Leprosorien als Repräsentationsobjekte der Stadtgemeinden auch dem bürgerlichen Selbstverständnis Ausdruck verliehen. [less ▲]

Detailed reference viewed: 10 (1 UL)
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 94 (9 UL)
Full Text
Peer Reviewed
See detailNew Directions in Attack Tree Research: Catching up with Industrial Needs
Gadyatskaya, Olga UL; Trujillo Rasua, Rolando UL

in Mauw, Sjouke (Ed.) Proceedings of the 4th International Workshop on Graphical Models for Security (in press)

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal ... [more ▼]

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal mathematical frameworks for analyzing them in a qualitative or a quantitative manner. Indeed, the mathematical frameworks have become a large focus of attack tree research. However, practical applications of attack trees in industry largely remain a tedious and error-prone exercise. Recent research directions in attack trees, such as attack tree generation, attempt to close this gap and to improve the attack tree state-of-thepractice. In this position paper we outline the recurrent challenges in manual tree design within industry, and we overview the recent research results in attack trees that help the practitioners. For the challenges that have not yet been addressed by the community, we propose new promising research directions. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailComparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL et al

in Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers (in press)

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to ... [more ▼]

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances while recommending cloud services to the cloud users, using all available data. In this paper, we compare our two approaches to do so: a min-max-min decomposition based on Intuitionistic Fuzzy Logic (IFL) and a Performance Heat Map technique, to evaluate the performance of commercially available cloud providers. While the IFL technique provides simple, total order of the evaluated CSPs, Performance Heat Map provides transparent and explanatory, yet consistent evaluation of service performance of commercially available CSPs. The identified drawbacks of the IFL technique are: 1) It does not return the accurate performance evaluation over multiple decision alternatives due to highly influenced by critical feedback of the evaluators; 2) Overall ranking of the CSPs is not as expected according to the performance measurement. As a result, we recommend to use performance Heat Map for this problem. [less ▲]

Detailed reference viewed: 51 (10 UL)
Full Text
Peer Reviewed
See detailHybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems
Tsinos, Christos UL; Maleki, Sina UL; Chatzinotas, Symeon UL et al

in Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems (in press)

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the ... [more ▼]

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the design of a prospect transceiver should guarantee the efficient coexistence with the incumbent services in these bands. To that end, in this paper, two underlay cognitive transceiver designs are proposed based on a hybrid Analog/Digital transceiver architecture that enables the mmWave spectrum access while controlling the interference to the incumbent users with low hardware complexity and power consumption. The first cognitive solution designs a codebook free cognitive hybrid pre-coder by maximizing the mutual information between its two ends subject to interference, power and hardware constraints related to the analog counterpart. The second solution is codebook based and exhibits less complexity than the first one at the cost of inferior spectral efficiency. A novel codebook free solution for the post-coder at the cognitive receiver part is further proposed, based on a hardware constrained Minimum Mean Square Error criterion. Simulations study the performance of both the proposed hybrid approaches and compare it to the one of a fully digital solution for typical wireless environments. [less ▲]

Detailed reference viewed: 157 (22 UL)
Full Text
Peer Reviewed
See detailModelling Metrics for Transparency in Medical Systems
Pierina Brustolin Spagnuelo, Dayana UL; Bartolini, Cesare UL; Lenzini, Gabriele UL

in Proceedings of TrustBus 2017 (in press)

Detailed reference viewed: 44 (11 UL)
Full Text
See detailNeue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)
Uhrmacher, Martin UL

in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) et al Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. Tagung und Workshop zum 200. Jahrestag des Abschlusses des Wiener Kongresses (in press)

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress ... [more ▼]

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Vortrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen Luxemburg und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]

Detailed reference viewed: 14 (0 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 43 (9 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 23 (1 UL)
Full Text
Peer Reviewed
See detailAn Investigation of Compression Techniques to Speed up Mutation Testing
Zhu; Panichella, Annibale UL; Zaidman, Andy

in 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (in press)

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]

Detailed reference viewed: 21 (6 UL)
Full Text
Peer Reviewed
See detailLa force intégrative du statut de l'Etat membre sur la fonction juridictionnelle
Neframi, Eleftheria UL

in Potvin Solis, Laurence (Ed.) Le statut d'Etat membre de l'Union européenne (in press)

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields ... [more ▼]

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields covered by Union law (Art 19, par 1, subpar 2, TEU). Member States have to ensure access to the national judge, who has been entrusted with a European mandate, and who is in measure to cooperate with the Court of Justice through the preliminary reference procedure. The Member States establish in this way an integrated judicial function. The exercise of such a function by the national judge, in cooperation with the Court of Justice and under the control of the Member State, implies integrative dynamic, which however depends on the balancing exercise with national procedural autonomy and the margin of appreciation of the national judge. [less ▲]

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon (Ed.) ‘Imposed Constitutions: Aspects of Imposed Constitutionalism’ (in press)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 26 (2 UL)
Full Text
Peer Reviewed
See detailFeasibility Analysis of Blockchain for Donation-based Crowdfunding of Ethical Projects
Khan, Nida UL; Ouaich, Rachid

in AUEIRC Proceeedings (in press)

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present ... [more ▼]

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present and optimize the process of Zakaah donation. Load and stress tests on the prototype of the smart contract in the public testnet of Ethereum were analyzed to gauge the feasibility of mass usage. Similar tests were done in Hyperledger to conclude on the optimum blockchain platform for Zakaah. An anomaly was detected during the testing phase of the decentralized app in the public testnet of Ethereum and it was exploited to propose a novel strategy to enhance the throughput of Ethereum. The testing is a pioneer in evaluating the throughput and feasibility of a blockchain based financial product and provides a benchmark to validate the business and technical hypotheses of other similar financial products and services. [less ▲]

Detailed reference viewed: 120 (13 UL)
Full Text
Peer Reviewed
See detailExperimental design trade-offs for gene regulatory network inference: an in silico study of the yeast Saccharomyces cerevisiae cell cycle
Markdahl, Johan UL; Colombo, Nicolo UL; Thunberg, Johan UL et al

in Proceedings of the 56th IEEE Conference on Decision and Control (in press)

Time-series of high throughput gene sequencing data intended for gene regulatory network (GRN) inference are often short due to the high costs of sampling cell systems. Moreover, experimentalists lack a ... [more ▼]

Time-series of high throughput gene sequencing data intended for gene regulatory network (GRN) inference are often short due to the high costs of sampling cell systems. Moreover, experimentalists lack a set of quantitative guidelines that prescribe the minimal number of samples required to infer a reliable GRN model. We study the temporal resolution of data vs.quality of GRN inference in order to ultimately overcome this deficit. The evolution of a Markovian jump process model for the Ras/cAMP/PKA pathway of proteins and metabolites in the G1 phase of the Saccharomyces cerevisiae cell cycle is sampled at a number of different rates. For each time-series we infer a linear regression model of the GRN using the LASSO method. The inferred network topology is evaluated in terms of the area under the precision-recall curve (AUPR). By plotting the AUPR against the number of samples, we show that the trade-off has a, roughly speaking, sigmoid shape. An optimal number of samples corresponds to values on the ridge of the sigmoid. [less ▲]

Detailed reference viewed: 9 (1 UL)
Full Text
Peer Reviewed
See detailComparative Study of Genetic and Discrete Firefly Algorithm for Combinatorial Optimization
Tessaro Lunardi, Willian UL; Voos, Holger UL

in 33rd ACM/SIGAPP Symposium On Applied Computing, Pau, France, April 9 - 13, 2018 (2018, April)

Flexible job-shop scheduling problem (FJSP) is one of the most challenging combinatorial optimization problems. FJSP is an extension of the classical job shop scheduling problem where an operation can be ... [more ▼]

Flexible job-shop scheduling problem (FJSP) is one of the most challenging combinatorial optimization problems. FJSP is an extension of the classical job shop scheduling problem where an operation can be processed by several different machines. The FJSP contains two sub-problems, namely machine assignment problem and operation sequencing problem. In this paper, we propose and compare a discrete firefly algorithm (FA) and a genetic algorithm (GA) for the multi-objective FJSP. Three minimization objectives are considered, the maximum completion time, workload of the critical machine and total workload of all machines. Five well-known instances of FJSP have been used to evaluate the performance of the proposed algorithms. Comparisons among our methods and state-of-the-art algorithms are also provided. The experimental results demonstrate that the FA and GA have achieved improvements in terms of efficiency. Solutions obtained by both algorithms are comparable to those obtained by algorithms with local search. In addition, based on our initial experiments, results show that the proposed discrete firefly algorithm is feasible, more effective and efficient than our proposed genetic algorithm for solving multi-objective FJSP. [less ▲]

Detailed reference viewed: 109 (42 UL)
Peer Reviewed
See detailLa référence à l’Alsace-Lorraine dans le rattachement et l’intégration d’Eupen-Malmedy à la Belgique (1918-1925)
Brüll, Christoph UL

Scientific Conference (2018, February 09)

En novembre 1910, le Journal des Tribunaux, principal organe d’information des juristes belges, qualifie la partie wallonne du Kreis allemand de Malmedy de « notre Alsace-Lorraine » où se trouveraient des ... [more ▼]

En novembre 1910, le Journal des Tribunaux, principal organe d’information des juristes belges, qualifie la partie wallonne du Kreis allemand de Malmedy de « notre Alsace-Lorraine » où se trouveraient des « frères de race et de langue, exilés et emprisonnés en Prusse. » Le 20 septembre 1920, ce Kreis ainsi que celui d’Eupen, presque exclusivement germanophone, sont rattachés à la Belgique, suite au traité de Versailles et à un simulacre de consultation populaire. Dans notre contribution qui traitera de la période qui s’étend de l’occupation de la région par des troupes belges en août 1919 à la fin du régime transitoire en mars 1925, nous voudrions nous interroger sur la signification de la référence à l’Alsace-Lorraine pendant cette phase du changement de la nationalité. Des indices donnent à penser que cette référence n’est pas limitée aux discours de légitimation de l’annexion du territoire par la Belgique, mais que les autorités belges ont, à certaines occasions (comme l’introduction du service militaire), contacté leurs homologues français afin de connaître la politique d’intégration menée en Alsace-Lorraine. En revanche, il n’y a jamais eu d’étude systématique de cette référence idéelle et pratique. Notre proposition voudrait combler cette lacune et constituerait également une contribution à une histoire comparée de la transition étatique dans les deux territoires. [less ▲]

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailInsights on the Performance and Configuration of AVB and TSN in Automotive Ethernet Networks
Migge, Jörn; Villanueva, Josetxo; Navet, Nicolas UL et al

Scientific Conference (2018, February 02)

Switched Ethernet is profoundly reshaping in-car communications. To meet the diverse real-time requirements in automotive communications, Quality-of-Service protocols that go beyond the mere use of ... [more ▼]

Switched Ethernet is profoundly reshaping in-car communications. To meet the diverse real-time requirements in automotive communications, Quality-of-Service protocols that go beyond the mere use of priorities are required. In this work, the basic questions that we investigate on a case-study with diverse and demanding communication requirements is what can we expect from the various protocols aimed at providing a better timing Quality of Service on top of Ethernet? And how to use them? Especially how to use them in a combined manner. We will focus on the Credit-Based Shaper of AVB, the Time-Aware Shaper of TSN and the use of priorities as defined in IEEE802.1Q. The performance metrics considered are the distributions of the communication latencies, obtained by simulation, as well as upper bounds on these quantities obtained by worst-case schedulability analysis. If there have been over the last 5 years numerous studies on the performance of AVB CBS, the literature on comparing AVB to TSN and other candidate protocols is still sparse. To the best of our knowledge, this empirical study is the first to consider most protocols currently considered in the automotive domain, with the aim to gain insights into the different technological, design and configurations alternatives. In particular, an objective of this study is to identify key problems that need to be solved in order to further automate network design and configuration. [less ▲]

Detailed reference viewed: 14 (1 UL)
Full Text
Peer Reviewed
See detailSimulation-Based Fault Injection as a Verification Oracle for the Engineering of Time-Triggered Ethernet networks
Fejoz, Loïc; Regnier, Bruno; Miramont, Philippe et al

Scientific Conference (2018, February 02)

TTEthernet (TTE) is considered for use as high-speed backbone in the avionics of next-generation orbital space launchers. Given the key role of communication in launchers, the OEM must acquire a precise ... [more ▼]

TTEthernet (TTE) is considered for use as high-speed backbone in the avionics of next-generation orbital space launchers. Given the key role of communication in launchers, the OEM must acquire a precise understanding of TTE’s functioning and its performances in nominal and error conditions. This holds especially true for the clock synchronization algorithm, the cornerstone of time-triggered communication in TTE, which involves complex distributed algorithms. In this study, we use both an experimental platform and fault-injection on a simulation model to gain quantified insights in these questions. We first describe a fine-grained simulation model of TTE model and discuss how it has been validated against communication traces recorded on the TTE platform. We then present experiments that evaluate the accuracy of the clock synchronization in TTE in the fault-free case as well as considering permanent link failure and transient transmission errors. Finally, we discuss what we have learned during the project in terms of development process and programming language support for complex simulation models used in the design of critical systems. [less ▲]

Detailed reference viewed: 22 (5 UL)
Peer Reviewed
See detailSurmonter les barrières linguistiques avec « MaGrid » - un outil de formation de pré-mathématiques pour un contexte scolaire multilingue
Cornu, Véronique UL; Pazouki, Tahereh UL; Schiltz, Christine UL et al

Scientific Conference (2018, January 11)

Le contexte scolaire luxembourgeois est caractérisé par le multilinguisme et une population scolaire hétérogène, ce qui nécessite la mise en place de pratiques pédagogiques qui prennent en compte ... [more ▼]

Le contexte scolaire luxembourgeois est caractérisé par le multilinguisme et une population scolaire hétérogène, ce qui nécessite la mise en place de pratiques pédagogiques qui prennent en compte l’hétérogénéité des élèves. Dans le domaine des mathématiques, qui semble être non-verbal à première vue, des résultats scientifiques montrent que les enfants dont la langue maternelle est différente de la langue d’instruction, atteignent sur des tests d’aptitudes pré-mathématiques des résultats significativement inférieurs à ceux de leurs camarades natifs. Ceci est d’autant plus inquiétant, sachant que ces aptitudes pré-mathématiques sont prédictives des apprentissages ultérieurs. Par conséquent, nous avons développé l’outil de formation de pré-mathématiques non-verbale « MaGrid ». « MaGrid » permet à chaque enfant de bénéficier pleinement d’une instruction préscolaire en mathématiques, indépendamment de ses compétences langagières. Cet outil se caractérise par sa nature visuelle et il est implémenté sur tablette tactile. Jusqu’à présent, nous avons implémenté et évalué « MaGrid » lors de deux études scientifiques. Les résultats quantitatifs des évaluations empiriques sont prometteurs, comme ils montrent des effets positifs sur les habilités entraînées chez les enfants ayant utilisé cet outil comparé à un groupe contrôle. Dans une première étude, l’outil a été utilisé auprès de cinq classes durant 10 semaines, comprenant deux séances de 20 minutes par semaine. Les résultats lors de petites épreuves spécifiques ont été comparés aux résultats d’élèves de cinq classes n’ayant pas d’entraînement spécifique, et des effets d’intervention ont été observés. Dans une deuxième étude, nous nous sommes focalisés sur un groupe d’enfants de langue minoritaire (le portugais). « MaGrid » a été utilisé lors d’un programme d’intervention de pré-mathématiques s’étendant sur les deux années scolaires de l’école préscolaire. Les analyses préliminaires ont abouti à des résultats positifs. Des effets bénéfiques se sont manifestés sur différentes mesures de pré-mathématiques chez les enfants ayant suivi notre programme par rapport aux enfants du groupe contrôle. [less ▲]

Detailed reference viewed: 20 (3 UL)
Full Text
Peer Reviewed
See detailAnticipating Suspicious Actions using a Small Dataset of Action Templates
Baptista, Renato UL; Antunes, Michel; Aouada, Djamila UL et al

in 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP) (2018, January)

In this paper, we propose to detect an action as soon as possible and ideally before it is fully completed. The objective is to support the monitoring of surveillance videos for preventing criminal or ... [more ▼]

In this paper, we propose to detect an action as soon as possible and ideally before it is fully completed. The objective is to support the monitoring of surveillance videos for preventing criminal or terrorist attacks. For such a scenario, it is of importance to have not only high detection and recognition rates but also low time latency for the detection. Our solution consists in an adaptive sliding window approach in an online manner, which efficiently rejects irrelevant data. Furthermore, we exploit both spatial and temporal information by constructing feature vectors based on temporal blocks. For an added efficiency, only partial template actions are considered for the detection. The relationship between the template size and latency is experimentally evaluated. We show promising preliminary experimental results using Motion Capture data with a skeleton representation of the human body. [less ▲]

Detailed reference viewed: 26 (4 UL)
Full Text
Peer Reviewed
See detailÉvaluations numériques: quel rôle pour l’expérience utilisateur ?
Pere, Maxime UL; Lallemand, Carine UL; Koenig, Vincent UL

Scientific Conference (2018, January)

Detailed reference viewed: 42 (12 UL)
Full Text
Peer Reviewed
See detailASPIC-END: Structured Argumentation with Explanations and Natural Deduction
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that ... [more ▼]

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that models argumentation about explanations of semantic paradoxes (e.g. the Liar paradox), and we show that ASPIC-END satisfies rationality postulates akin to those satisfied by ASPIC+. [less ▲]

Detailed reference viewed: 66 (8 UL)
Full Text
Peer Reviewed
See detailLes bourgeois de Bohême et l’impossible légitimation ? La conjuration de Prague et de Kutná Hora de février 1309
Vomacka, Eloïse UL

in Contester au Moyen Âge : de la désobéissance à la révolte XLIXe congrès de la SHMESP (2018)

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailComparison of Several RANS Modelling for the Pavia TRIGA Mark II Research Reactor
Introini, Carolina; Cammi, Antonio; Lorenzi, Stefano et al

in Journal of Nuclear Engineering and Radiation Science (2018)

Aim of this work is the comparison of different turbulent models based on the Reynolds Averaged Navier-Stokes (RANS) equations in order to find out which model is the most suitable for the study of the ... [more ▼]

Aim of this work is the comparison of different turbulent models based on the Reynolds Averaged Navier-Stokes (RANS) equations in order to find out which model is the most suitable for the study of the channel thermal-hydraulics of the TRIGA Mark II reactor. Only the steady state behaviour (i.e. the full power stationary operational conditions) of the reactor has been considered. To this end, the RAS (Reynolds-Averaged Simulation) models available in the open source CFD software OpenFOAM have been applied to the most internal channel of the TRIGA and assessed against a Large Eddy Simulation (LES) model. The results of the latter approach, expressed in terms of axial velocity, turbulent viscosity, turbulent kinetic energy, and temperature have been compared with the results obtained by the RAS models available in OpenFOAM (k − ε, k − ω and Reynolds Stress Transport). Heat transfer is taken into account as well by means of the turbulent energy diffusivity parameter. The simulation results demonstrate how, amongst the RAS models, the k − ω SST is the one whose results are closer to the LES simulation. This model seems to be the best one for the treatment of turbulent flow within the TRIGA subchannel, offering a good compromise between accuracy and computational requirements. Since it is much less expensive than an LES model, it can be applied even to full core calculation, in order to obtain accurate results with less computational effort. [less ▲]

Detailed reference viewed: 27 (3 UL)
Full Text
Peer Reviewed
See detailExtended Explanatory Argumentation Frameworks
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already ... [more ▼]

Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already previously proven useful to study and combine such extensions is the meta-argumentation methodology involving the notion of a flattening. In order to faithfully model the interaction between explanation argumentation in scientific debates, Šešelja and Straßer have introduced Explanatory Argumentation Frameworks (EAFs). In this paper, we first prove that the flattening technique works as expected for recursive (higher-order) attacks. Then we apply this technique in order to combine EAFs with multiple other extensions that have been proposed to AFs, namely with recursive attacks, joint attacks and a support relation between arguments. This gives rise to Extended Explanatory Argumentation Frameworks (EEAFs). We illustrate the applicability of EEAFs by using them to model a piece of argumentation from a research-level philosophy book. [less ▲]

Detailed reference viewed: 80 (4 UL)
Full Text
Peer Reviewed
See detailAutomated Generation of Constraints from Use Case Specifications to Support System Testing
Wang, Chunhui UL; Pastore, Fabrizio UL; Briand, Lionel UL

in Proceedings of the 11th IEEE Conference on Software Testing, Validation and Verification (2018)

System testing plays a crucial role in safety-critical domains, e.g., automotive, where system test cases are used to demonstrate the compliance of software with its functional and safety requirements ... [more ▼]

System testing plays a crucial role in safety-critical domains, e.g., automotive, where system test cases are used to demonstrate the compliance of software with its functional and safety requirements. Unfortunately, since requirements are typically written in natural language, significant engineering effort is required to derive test cases from requirements. In such a context, automated support for generating system test cases from requirements specifications written in natural language would be highly beneficial. Unfortunately, existing approaches have limited applicability. For example, some of them require that software engineers provide formal specifications that capture some of the software behavior described using natural language. The effort needed to define such specifications is usually a significant deterrent for software developers. This paper proposes an approach, OCLgen, which largely automates the generation of the additional formal specifications required by an existing test generation approach named UMTG. More specifically, OCLgen relies on semantic analysis techniques to automatically derive the pre- and post-conditions of the activities described in use case specifications. The generated conditions are used by UMTG to identify the test inputs that cover all the use case scenarios described in use case specifications. In practice, the proposed approach enables the automated generation of test cases from use case specifications while avoiding most of the additional modeling effort required by UMTG. Results from an industrial case study show that the approach can automatically and correctly generate more than 75% of the pre- and post-conditions characterizing the activities described in use case specifications. [less ▲]

Detailed reference viewed: 66 (8 UL)
Full Text
Peer Reviewed
See detailTesting Vision-Based Control Systems Using Learnable Evolutionary Algorithms
Ben Abdessalem (helali), Raja UL; Nejati, Shiva UL; Briand, Lionel UL et al

in Proceedings of the 40th International Conference on Software Engineering (ICSE 2018) (2018)

Vision-based control systems are key enablers of many autonomous vehicular systems, including self-driving cars. Testing such systems is complicated by complex and multidimensional input spaces. We ... [more ▼]

Vision-based control systems are key enablers of many autonomous vehicular systems, including self-driving cars. Testing such systems is complicated by complex and multidimensional input spaces. We propose an automated testing algorithm that builds on learnable evolutionary algorithms. These algorithms rely on machine learning or a combination of machine learning and Darwinian genetic operators to guide the generation of new solutions (test scenarios in our context). Our approach combines multiobjective population-based search algorithms and decision tree classification models to achieve the following goals: First, classification models guide the search-based generation of tests faster towards critical test scenarios (i.e., test scenarios leading to failures). Second, search algorithms refine classification models so that the models can accurately characterize critical regions (i.e., the regions of a test input space that are likely to contain most critical test scenarios). Our evaluation performed on an industrial automotive vision-based control system shows that: (1) Our algorithm outperforms a baseline evolutionary search algorithm and generates 78% more distinct, critical test scenarios compared to the baseline algorithm. (2) Our algorithm accurately characterizes critical regions of the system under test, thus identifying the conditions that likely to lead to system failures. [less ▲]

Detailed reference viewed: 97 (24 UL)
Full Text
Peer Reviewed
See detailA Security Analysis, and a Fix, of a Code-Corrupted Honeywords System
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL et al

in Proceedings of the 4th International Conference on Information Systems Security and Privacy (2018)

In 2013 Juels and Rivest introduced the Honeywords System, a password-based authentication system designed to detect when a password file has been stolen. A Honeywords System stores passwords together ... [more ▼]

In 2013 Juels and Rivest introduced the Honeywords System, a password-based authentication system designed to detect when a password file has been stolen. A Honeywords System stores passwords together with indistinguishable decoy words so when an intruder steals the file, retrieves the words, and tries to log-in, he does not know which one is the password. By guessing one from the decoy words, he may not be lucky and reveal the leak. Juels and Rivest left a problem open: how to make the system secure even when the intruder corrupted the login server’s code. In this paper we study and solve the problem. However, since “code corruption” is a powerful attack, we first define rigorously the threat and set a few assumptions under which the problem is still solvable, before showing meaningful attacks against the original Honeywords System. Then we elicit a fundamental security requirement, implementing which, we are able to restore the honeywords System’s security despite a corrupted login service. We verify the new protocol’s security formally, using ProVerif for this task. We also implement the protocol and test its performance. Finally, at the light of our findings, we discuss whether it is still worth using a fixed honeywords-based system against such a powerful threat, or whether it is better, in order to be resilient against code corruption attacks, to design afresh a completely different password-based authentication solution. [less ▲]

Detailed reference viewed: 65 (13 UL)
Full Text
Peer Reviewed
See detailSecure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
Seo, Hwajeong; Liu, Zhe UL; Park, Taehwan et al

in The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 (2017, December 30)

Detailed reference viewed: 3 (0 UL)
See detailAn elementary proof of the formal rigidity of the Witt and Virasoro algebra
Schlichenmaier, Martin UL

Scientific Conference (2017, December 19)

Detailed reference viewed: 9 (0 UL)
Peer Reviewed
See detailThe Missing Risk Premium in Exchange Rates
Penasse, Julien UL

Scientific Conference (2017, December 15)

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailOn the Risk of Tool Over-tuning in Runtime Verification Competitions
Bianculli, Domenico UL; Krstic, Srdan

in Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (2017, December 14)

Detailed reference viewed: 31 (7 UL)
Full Text
Peer Reviewed
See detailTemPsy-Check: a Tool for Model-driven Trace Checking of Pattern-based Temporal Properties
Dou, Wei UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (2017, December 14)

Detailed reference viewed: 38 (6 UL)
See detailHealth Behaviour in School-aged Children - Studienergebnisse der HBSC-Erhebung 2014
Heinz, Andreas UL

Scientific Conference (2017, December 13)

Detailed reference viewed: 19 (0 UL)
Full Text
See detailFirst Vertical Land Movement Estimates on South Georgia Island: An Impact Study on Sea Level Change from Tide Gauge and Altimetry Measurements
Teferle, Felix Norman UL; Hunegnaw, Addisu UL; Abraha, Kibrom Ebuy UL et al

Poster (2017, December 11)

South Georgia Island in the Southern Atlantic Ocean has been a key location for the seismic, geomagnetic and oceanic global monitoring networks. However, no permanent geodetic monitoring station had been ... [more ▼]

South Georgia Island in the Southern Atlantic Ocean has been a key location for the seismic, geomagnetic and oceanic global monitoring networks. However, no permanent geodetic monitoring station had been established there despite the lack of observations from this region within, for example, the International GNSS Service (IGS) network of Global Navigation Satellite System (GNSS) stations. Then, in 2013 the King Edward Point (KEP) Geodetic Observatory was established with a focus on sea level studies and in support of general geoscience applications. Currently, this observatory located roughly half-way along the main island and along its northern coastline, consists of two GNSS stations (KEPA and KRSA) with local benchmark networks, allowing the height determinations from the GNSS antennas to be transferred to the KEP tide gauge (GLOSS ID 187) and forming a height reference within the International Terrestrial Reference Frame. In late 2014, three additional GNSS stations (SG01, SG02 and SG03) were established, all on small islands at the perimeter of the main island. Together the stations provide the best possible opportunity to study various geophysical processes in the region. With the GNSS-derived position time series partly reaching over 4.5 years in length, it has become possible to provide first estimates of vertical land movements for the island and KEP with its surrounding area. Together with four precise levelling campaigns of the benchmark network in 2013, 2014 and two in 2017, it has also been possible to investigate the very local character of the vertical motions, ie. the stability of the jetty upon which the tide gauge is mounted. Our measurements show that while South Georgia Island and the area around KEP are rising, the jetty and tide gauge are subsiding. In this study, we will present the preliminary results from the GNSS and levelling measurements and will discuss their impact on the sea level record from the KEP tide gauge which is ideally situated in a mid-ocean location for satellite altimetry calibration over the Southern Atlantic and Southern Oceans. [less ▲]

Detailed reference viewed: 51 (6 UL)
Full Text
Peer Reviewed
See detailDiscovery and pathogenicity assessment of neuropathology-associated gene variants
Neupert, Lisa-Marie; May, Patrick UL; Kobow, Katja et al

in Epilepsia (2017, December 08), 58(Suppl.5), 174

Germline and brain-specific somatic variants have been reported as an underlying cause in patients with epilepsy-associated neuropathologies, including focal cortical dysplasias (FCDs) and long-term ... [more ▼]

Germline and brain-specific somatic variants have been reported as an underlying cause in patients with epilepsy-associated neuropathologies, including focal cortical dysplasias (FCDs) and long-term epilepsy associated tumors (LEAT). However, evaluation of identified neuropathology associated variants in genetic screens is complex since not all observed variants contribute to the etiology of neuropathologies not even in genuinely disease-associated genes. Here, we critically reevaluated the pathogenicity of 12 previously published disease-related genes and of 79 neuropathology-associated missense variants listed in the PubMed and ClinVar databases. We (1) assessed the evolutionary gene constraint using the pLI and the missense z score, (2) used the latest American College of Medical Genetics and Genomics (ACMG) guidelines, and (3) performed bioinformatic variant pathogenicity prediction analyses using PolyPhen-2, CADD and GERP. Constraint analysis classified only seven out of 12 genes to be likely disease-associated. Furthermore, 78 (89%) of 88 neuropathology-associated missense variants were classified as being of unknown significance (VUS) and only 10 (11%) as being likely pathogenic (LPII). Pathogenicity prediction yielded a discrimination between LPII variants and a discrimination for VUS compared with rare variant scores from individuals present in the Genome Aggregation Database (gnomAD). In summary, our results demonstrate that interpretation of variants associated with neuropathologies is complex while the application of current ACMG guidelines including bioinformatic pathogenicity prediction can help improving variant evaluation. Furthermore, we will augment this set of literature-identified variants at the conference by results from our variant screen using self-generated deep sequencing data in >150 candidate genes in >50 patients not yet analyzed. [less ▲]

Detailed reference viewed: 21 (0 UL)
Peer Reviewed
See detailZugangsbarrieren im Gesundheitssystem - Ein Ländervergleich
Heinz, Andreas UL

Scientific Conference (2017, December 08)

In der international vergleichenden Forschung zu Gesundheitssystemen spielt der Zugang zu Gesundheitsleistungen eine zentrale Rolle. Entsprechende Typologien klassifizieren Gesundheitssysteme u.a. danach ... [more ▼]

In der international vergleichenden Forschung zu Gesundheitssystemen spielt der Zugang zu Gesundheitsleistungen eine zentrale Rolle. Entsprechende Typologien klassifizieren Gesundheitssysteme u.a. danach, ob Patienten Zuzahlungen leisten müssen, ob sie sich bei Hausärzten einschreiben müssen und nach welchen Regeln sie einen Facharzt konsultieren können (z.B. Reibling 2010, Wendt 2009, Böhm et al 2013). In der Typologie von Wendt gehört Österreich zum „Health service provision-oriented type“, der fast der gesamten Bevölkerung einen einfachen Zugang zu Gesundheitsleistungen bei geringen Zuzahlungen und freier Arztwahl ermöglicht (2009). Diese Typologien basieren jedoch auf den gesetzlichen Zugangsregeln in einem Land, nicht auf den subjektiven Erfahrungen der Bevölkerung mit Zugangsbarrieren. Im aktuellen European Social Survey (ESS) wurde nach diesen Barrieren gefragt: Haben Befragte medizinische Behandlungen nicht bekommen und was waren die Gründe (z.B. Kosten, Behandlung nicht erhältlich, Warteliste zu lang)? Der Vortrag stellt die Ergebnisse des ESS vor und geht auf folgende Fragen ein: • Wie häufig stoßen Kranke in Österreich und in anderen europäischen Ländern auf Zugangsbarrieren? • Welche Personen in Österreich sind besonders von Zugangsbarrieren betroffen? Die vorläufigen Ergebnisse deuten darauf hin, dass es durchaus nennenswerte Zugangsbarrieren im Gesundheitssystem Österreichs gibt und dass ohnehin benachteiligte Personen häufiger als andere auf Zugangsbarrieren stoßen. Für die wissenschaftliche Theorie stellt sich die Frage, ob die gängigen Typologien von Gesundheitssystemen um die subjektiven Erfahrungen ergänzt werden müssen. Für die Praxis stellt sich die Frage, wie schädlich Zugangsbarrieren sind und wie sie abgebaut werden können. [less ▲]

Detailed reference viewed: 20 (0 UL)
Full Text
See detailBlockchain Technology - Arsenal for a Shariah-Compliant Financial Ecosystem
Lacasse, Rcihard-Marc; Lambert, Berthe; Khan, Nida UL

Scientific Conference (2017, December 05)

The authors’ first challenge is to decipher the complexity of Islamic Finance despite the opacity of the sector. A second focal point is the agent’s agenda; in the Islamic Finance industry, contributors ... [more ▼]

The authors’ first challenge is to decipher the complexity of Islamic Finance despite the opacity of the sector. A second focal point is the agent’s agenda; in the Islamic Finance industry, contributors mandate intermediaries (agents) to transfer their contributions to social causes according to the Shariah; in principle, Islamic financial institutions must create value for their stakeholders by offering Shariah-compliant products and services. An underlying assumption of agency theory is that agents attempt to maximize their personal welfare and compensation, but such behaviour may not always be in the best interests of other stakeholders, and an analysis of the agent’s agenda can help explain how agents can fall off the pedestal of altruism. Relationships between Islamic banks and three key stakeholders (contributors, beneficiaries and regulators) are also explored via a complexity-aware monitoring process. Contributors provide funds to an Islamic bank (agent), and in return, the agent should be accountable to the contributors, but the form and degree of accountability can vary depending on the organization’s mission. There are many unanswered questions regarding the monitoring process. One objective of the article is to consider whether agents act in the best interests of the stakeholders. Finally, the authors explore the following question: Can blockchain technology and smart contracts support and enhance the transparency feature, which is the core underlying principle of all transactions in the Islamic Finance industry? A qualitative research framework was adopted because of the constraints of the enigmatic, secretive Islamic Finance culture. [less ▲]

Detailed reference viewed: 108 (7 UL)
Full Text
Peer Reviewed
See detailTightly-Secure PAK(E)
Lopez Becerra, José Miguel UL; Iovino, Vincenzo UL; Ostrev, Dimiter UL et al

in Cryptology and Network Security (2017, December 02)

We present a security reduction for the PAK protocol instantiated over Gap Diffie-Hellman Groups that is tighter than previously known reductions. We discuss the implications of our results for concrete ... [more ▼]

We present a security reduction for the PAK protocol instantiated over Gap Diffie-Hellman Groups that is tighter than previously known reductions. We discuss the implications of our results for concrete security. Our proof is the first to show that the PAK protocol can provide meaningful security guarantees for values of the parameters typical in today’s world. [less ▲]

Detailed reference viewed: 21 (2 UL)
Peer Reviewed
See detailOntologically stepping-up: A model for refugee entrepreneurship
Heilbrunn, Sibylle; Iannone, Rosa Lisa UL

Scientific Conference (2017, December 01)

This paper is a first attempt at proposing an integrated conceptual model that would bridge this gap in our knowledge of refugee entrepreneurship. Such a model might then enable for the understanding of ... [more ▼]

This paper is a first attempt at proposing an integrated conceptual model that would bridge this gap in our knowledge of refugee entrepreneurship. Such a model might then enable for the understanding of the super-diverse entrepreneurial strategies being employed by super-diverse refugees, within complex and super-diverse socio-economic and political settings – thereby, ontologically stepping-up our theoretical approaches and empirical insights into the phenomenon. [less ▲]

Detailed reference viewed: 44 (1 UL)
Full Text
Peer Reviewed
See detailEvaluating the Impact of Juice Filming Charging Attack in Practical Environments
Meng, Weizhi; Lee, Wanghao; Liu, Zhe UL et al

in The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 (2017, December 01)

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailFast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
Xinwei, Gao; Li, Lin; Jintai, Ding et al

in The 13th International Conference on Information Security Practice and Experience - ISPEC 2017 (2017, December 01)

Detailed reference viewed: 5 (0 UL)
Full Text
See detailPreparing Future Teachers for Strategic Uses of Educational Technology: A Project-Based Approach
Reuter, Bob UL; Busana, Gilbert UL

Scientific Conference (2017, December 01)

Given (1) the need for teachers who are willing and able to design, implement and reflect meaningful and successful educational technology practices in schools and (2) the current rarity of strategic uses ... [more ▼]

Given (1) the need for teachers who are willing and able to design, implement and reflect meaningful and successful educational technology practices in schools and (2) the current rarity of strategic uses of ICT in education in Luxembourgish schools, the self-declared lack of competencies and the low confidence of teachers when it comes to teaching with ICT (Reuter, Busana & Linckels, 2016), we have designed, implemented and tested a project-based approach to the development of practice- oriented TPACK in pre-service teachers. Future teacher students are instructed to define an educational problem they want to solve, to explore existing pedagogical and technological solutions and to design an original solution that involves the strategic use of ICT (theoretically grounded and practically meaningful). They then have to implement the designed learning & teaching scenario in a classroom, to document the teaching & learning processes, to analyse, evaluate and to critically reflect them. Finally, they are required to write a structured report about their project and to present it to their peers and to interested teachers from schools. Overall, we observe that while most students become able to design and implement relatively meaningful educational technology practices, they still tend to feel that they are not ready to teach with technology in a more general sense, because their work was focused on one or two tools and does not give them access to a broader range of meaningful ICT-enriched teaching scenarios for their later professional career. [less ▲]

Detailed reference viewed: 28 (2 UL)
Peer Reviewed
See detailThe Time-Varying Risk of Macroeconomic Disasters
Penasse, Julien UL

Scientific Conference (2017, December)

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailCombined Use of Lifecycle Management and IoT in Smart Cities
Hefnawy, Ahmed; Elhariri, Taha; Bouras, Abdelaziz et al

in Combined Use of Lifecycle Management and IoT in Smart Cities (2017, December)

Detailed reference viewed: 23 (2 UL)
Full Text
Peer Reviewed
See detailA Framework for Optimizing Multi-cell NOMA: Delivering Demand with Less Resource
You, Lei; Lei, Lei UL; Yuan, Di et al

in 2017 IEEE Global Communications Conference (GLOBECOM) (2017, December)

Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far ... [more ▼]

Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far, most papers on NOMA have focused on performance gain for one or sometimes two base stations. In this paper, we study multi-cell NOMA and provide a general framework for user clustering and power allocation, taking into account inter-cell interference, for optimizing resource allocation of NOMA in multi-cell networks of arbitrary topology. We provide a series of theoretical analysis, to algorithmically enable optimization approaches. The resulting algorithmic notion is very general. Namely, we prove that for any performance metric that monotonically increases in the cells’ resource consumption, we have convergence guarantee for global optimum. We apply the framework with its algorithmic concept to a multi-cell scenario to demonstrate the gain of NOMA in achieving significantly higher efficiency. [less ▲]

Detailed reference viewed: 66 (15 UL)
Full Text
Peer Reviewed
See detailFacing the Safety-Security Gap in RTES: the Challenge of Timeliness
Volp, Marcus UL; Kozhaya, David UL; Verissimo, Paulo UL

Scientific Conference (2017, December)

Safety-critical real-time systems, including real-time cyber-physical and industrial control systems, need not be solely correct but also timely. Untimely (stale) results may have severe consequences that ... [more ▼]

Safety-critical real-time systems, including real-time cyber-physical and industrial control systems, need not be solely correct but also timely. Untimely (stale) results may have severe consequences that could render the control system’s behaviour hazardous to the physical world. To ensure predictability and timeliness, developers follow a rigorous process, which essentially ensures real-time properties a priori, in all but the most unlikely combinations of circumstances. However, we have seen the complexity of both real-time applications, and the environments they run on, increase. If this is matched with the also increasing sophistication of attacks mounted to RTES systems, the case for ensuring both safety and security through aprioristic predictability loses traction, and presents an opportunity, which we take in this paper, for discussing current practices of critical realtime system design. To this end, with a slant on low-level task scheduling, we first investigate the challenges and opportunities for anticipating successful attacks on real-time systems. Then, we propose ways for adapting traditional fault- and intrusiontolerant mechanisms to tolerate such hazards. We found that tasks which typically execute as analyzed under accidental faults, may exhibit fundamentally different behavior when compromised by malicious attacks, even with interference enforcement in place. [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailProbabilistic Analysis of Low-Criticality Execution
Küttler, Martin; Roitzsch, Michael; Hamann, Claude-Joachim et al

Scientific Conference (2017, December)

The mixed-criticality toolbox promises system architects a powerful framework for consolidating real-time tasks with different safety properties on a single computing platform. Thanks to the research ... [more ▼]

The mixed-criticality toolbox promises system architects a powerful framework for consolidating real-time tasks with different safety properties on a single computing platform. Thanks to the research efforts in the mixed-criticality field, guarantees provided to the highest criticality level are well understood. However, lower-criticality job execution depends on the condition that all high-criticality jobs complete within their more optimistic low-criticality execution time bounds. Otherwise, no guarantees are made. In this paper, we add to the mixed-criticality toolbox by providing a probabilistic analysis method for low-criticality tasks. While deterministic models reduce task behavior to constant numbers, probabilistic analysis captures varying runtime behavior. We introduce a novel algorithmic approach for probabilistic timing analysis, which we call symbolic scheduling. For restricted task sets, we also present an analytical solution. We use this method to calculate per-job success probabilities for low-criticality tasks, in order to quantify, how low-criticality tasks behave in case of high-criticality jobs overrunning their optimistic low-criticality reservation. [less ▲]

Detailed reference viewed: 17 (2 UL)
Peer Reviewed
See detailValue-Added Modelling in Primary and Secondary School: An Integrative Review of 674 Publications
Levy, Jessica UL; Keller, Ulrich UL; Brunner, Martin et al

Scientific Conference (2017, December)

Detailed reference viewed: 27 (13 UL)
Full Text
Peer Reviewed
See detailModel-Driven Interaction Design for Social Robots
Cornelius, Gary Philippe UL; Hochgeschwender, Nico UL; Voos, Holger UL

in 4th International Workshop on Model-driven Robot Software Engineering, Marburg, Germany, 2017 (2017, December)

Robotic software development frameworks lack a possibility to present,validate and generate qualitative complex human robot interactions and robot de-velopers are mostly left with unclear informal project ... [more ▼]

Robotic software development frameworks lack a possibility to present,validate and generate qualitative complex human robot interactions and robot de-velopers are mostly left with unclear informal project specifications. The devel-opment of a human-robot interaction is a complex task and involves different ex-perts, for example, the need for human-robot interaction (HRI) specialists, whoknow about the psychological impact of the robot’s movements during the in-teraction in order to design the best possible user experience. In this paper, wepresent a new project that aims to provide exactly this. Focusing on the interac-tion flow and movements of a robot for human-robot interactions we aim to pro-vide a set of modelling languages for human-robot interaction which serves as acommon, more formal, discussion point between the different stakeholders. Thisis a new project and the main topics of this publication are the scenario descrip-tion, the analysis of the different stakeholders, our experience as robot applicationdevelopers for our partner, as well as the future work we plan to achieve. [less ▲]

Detailed reference viewed: 35 (13 UL)
Full Text
Peer Reviewed
See detailOn low complexity detection for QAM isomorphic constellations
Kayhan, Farbod UL

in Kayhan, Farbod (Ed.) On low compelxity detection for QAM isomorphic constellations (2017, December)

Despite of the known gap from the Shannon's capacity, several standards are still employing QAM or star shape constellations, mainly due to the existing low complexity detectors. In this paper, we ... [more ▼]

Despite of the known gap from the Shannon's capacity, several standards are still employing QAM or star shape constellations, mainly due to the existing low complexity detectors. In this paper, we investigate the low complexity detection for a family of QAM isomorphic constellations. These constellations are known to perform very close to the peak-power limited capacity, outperforming the DVB-S2X standard constellations. The proposed strategy is to first remap the received signals to the QAM constellation using the existing isomorphism and then break the log likelihood ratio computations to two one dimensional PAM constellations. Gains larger than 0.6 dB with respect to QAM can be obtained over the peak power limited channels without any increase in detection complexity. Our scheme also provides a systematic way to design constellations with low complexity one dimensional detectors. Several open problems are discussed at the end of the paper. [less ▲]

Detailed reference viewed: 17 (2 UL)
See detailInnovative approaches for microfinance for youth
Leist, Anja UL; Chapet, Jérémie; Szelest, Linda

Scientific Conference (2017, November 28)

Detailed reference viewed: 6 (0 UL)
Peer Reviewed
See detailSome naturally defined star products for Kaehler manifolds
Schlichenmaier, Martin UL

Scientific Conference (2017, November 27)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailPoster: Characterizing Driving Behaviors Through a Car Simulation Platform
Faye, Sébastien UL; Jafarnejad, Sasan UL; Costamagna, Juan UL et al

Poster (2017, November 27)

Human mobility has opened up to many themes in recent years. Human behavior and how a driver might react to certain situations, whether dangerous (e.g. an accident) or simply part of the evolution of new ... [more ▼]

Human mobility has opened up to many themes in recent years. Human behavior and how a driver might react to certain situations, whether dangerous (e.g. an accident) or simply part of the evolution of new technologies (e.g. autonomous driving), leaves many avenues to be explored. Although experiments have been deployed in real situations, it remains difficult to encounter the conditions that certain studies may require. For this reason, we have set up a driving simulator (comprising several modules) that is able to reproduce a realistic driving environment. Although, as the literature has already demonstrated, the conditions are often far from reality, simulation platforms are nonetheless capable of reproducing an incredibly large number of scenarios on the fly. In this poster, we explain how we conceived the simulator, as well as the system we developed for collecting metrics on both the driver and the simulation environment. In addition, we take advantage of this conference to publicly share a dataset consisting of 25 drivers performing the same road circuit on the "Project Cars" game. [less ▲]

Detailed reference viewed: 39 (10 UL)
Peer Reviewed
See detailDemo: MAMBA: A Platform for Personalised Multimodal Trip Planning
Faye, Sébastien UL; Cantelmo, Guido UL; Tahirou, Ibrahim UL et al

Scientific Conference (2017, November 27)

In recent years, multimodal transportation has become a challenging approach to route planning. Most existing planning systems usually rely on data sourced from different organisations, enabling the user ... [more ▼]

In recent years, multimodal transportation has become a challenging approach to route planning. Most existing planning systems usually rely on data sourced from different organisations, enabling the user to select a limited number of routing strategies. As part of the MAMBA project, developed in Luxembourg until 2017, we have been interested in the potential benefits of multimodal mobility systems. A key factor has been integrated into our studies: the need for a personalised experience at user level, whether when selecting the means of transport or describing user habits (e.g. route style, environment). In this context, we have developed a platform for planning personalised multimodal trips, broken down into the three main modules presented in this demonstration. More importantly, this platform has been developed to facilitate the daily mobility of people in Luxembourg, and considers datasets and characteristics that are specific to this region, which has an exceptionally high volume of daily commuting between Luxembourg and neighbouring countries. [less ▲]

Detailed reference viewed: 48 (7 UL)
Peer Reviewed
See detailWorking conditions and work-related anger: A longitudinal perspective
Steffgen, Georges UL; Sischka, Philipp UL

Scientific Conference (2017, November 24)

Detailed reference viewed: 15 (4 UL)
Full Text
Peer Reviewed
See detailMobilités transfrontalières et développement économique et social des territoires frontaliers : l'exemple du nord d ela Lorraine
Pigeron-Piroth, Isabelle UL; Belkacem, Rachid; Clément, Franz

Scientific Conference (2017, November 23)

Par leur ampleur, mais aussi leur pérennité, les mobilités transfrontalières au sein de la Grande Région SaarLorLux ne sont pas sans effets sur les dynamiques territoriales. Au Luxembourg, vers lequel ... [more ▼]

Par leur ampleur, mais aussi leur pérennité, les mobilités transfrontalières au sein de la Grande Région SaarLorLux ne sont pas sans effets sur les dynamiques territoriales. Au Luxembourg, vers lequel converge une grande partie des flux de travailleurs, le phénomène frontalier a des conséquences multiples (sur la consommation, les pratiques linguistiques, les transports, l’immobilier….). Le travail frontalier a également des impacts sur les régions de provenance des travailleurs . Il est devenu un important ressort de la dynamique économique et sociale de ces espaces géographiques. Sur un plan économique, il contribue à l’ajustement aussi bien quantitatif que qualitatif entre besoins en ressources humaines et besoins de production. Il est aussi à l’origine de nombreuses autres formes de mobilités (mobilités résidentielles, de consommation, de loisirs….) qui contribuent à dynamiser aussi bien les territoires d’emploi que de résidence. L’hypothèse que nous formulons est que le développement du travail frontalier impacte les trajectoires de développement économique et social des territoires frontaliers, particulièrement des territoires de résidence de ces travailleurs. Quelles sont les nouvelles activités structurantes du territoire en rupture avec le passé industriel (comme par exemple au nord de la Lorraine) ? Cette question a du sens dans un contexte où le travail frontalier est ancré dans les économies locales. En Lorraine, 10% de la population active occupée a son emploi de l’autre côté des frontières. A proximité directe des frontières, ce pourcentage augmente. Le travail frontalier concerne par exemple la moitié des actifs occupés habitant la zone d’emploi de Longwy. Notre proposition se focalisera sur cette zone d’emploi située au nord de la Lorraine, frontalière à la fois du Luxembourg et de la Belgique. Le choix de ce territoire s’explique surtout par les ruptures importantes de la structure économique et sociale locale avec l’activité industrielle passée de ce territoire et par l’ampleur des restructurations du système productif local. [less ▲]

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailConfronting corpora with coursebooks: the case of lecture listening
Deroey, Katrien UL

Scientific Conference (2017, November 23)

This paper confronts language use in the British Academic Spoken English (BASE) corpus with the representation of lectures in 25 listening coursebooks (Deroey, submitted; Deroey, 2017). Following key ... [more ▼]

This paper confronts language use in the British Academic Spoken English (BASE) corpus with the representation of lectures in 25 listening coursebooks (Deroey, submitted; Deroey, 2017). Following key tenets such as authenticity, specificity and needs analysis, English for Academic Purposes (EAP) materials development should be guided by an understanding of target genres and their communicative demands. Yet, lecture listening coursebooks have often been criticised for their lack of realistic lecture models (e.g. Alexander, Argent, & Spencer, 2008; Field, 2011; Thompson, 2003). The aspects of representativeness examined in these coursebooks are language, lecture authenticity and research-informedness. To assess the representativeness of language, signposts of important points are compared with those retrieved from the BASE corpus of 160 authentic lectures (Deroey, submitted; Deroey and Taverniers, 2012). The coursebook lectures are also analysed in terms of their source, delivery and length. The materials are further reviewed for their use of findings from research into listening comprehension and lecture discourse. Results suggest that current lecture listening materials often do not reflect the language and lectures students are likely to encounter on their degree programmes. Moreover, materials are typically not (systematically) informed by listening and lecture discourse research. These findings highlight the need for EAP practitioners to approach published materials critically and supplement or modify them in ways that would better serve students. References Alexander, O., Argent, S., & Spencer, J. (2008). EAP Essentials: a teacher’s guide to principles and practice. Reading: Garnet. Deroey, K. L. B. (submitted). The representativeness of lecture listening coursebooks: language, lectures, research-informedness. Deroey, K. L. B. (2017). How representative are EAP listening books of real lectures? . In J. Kemp (Ed.), Proceedings of the 2015 BALEAP Conference. EAP in a rapidly changing landscape: Issues, challenges and solutions. Reading: Garnet. Deroey, K. L. B., & Taverniers, M. (2012). Just remember this: Lexicogrammatical relevance markers in lectures. English for Specific Purposes, 31(4), 221-233.  Field, J. (2011). Into the mind of the academic listener. Journal of English for Academic Purposes, 10(2), 102-112.  Thompson, S. E. (2003). Text-structuring metadiscourse, intonation and the signalling of organisation in academic lectures. Journal of English for Academic Purposes, 2(1), 5-20.  [less ▲]

Detailed reference viewed: 35 (0 UL)
Full Text
Peer Reviewed
See detailComparison of design for composite beams in steel and concrete according to Eurocode 4 and Chinese Design Codes
Zhang, Qingjie UL; Schäfer, Markus UL

in XI Conference on Steel and Composite Construction (2017, November 23)

Parallel to the investigation in the second generation of Eurocodes, the Chinese design standards are also updated. At 01/12/2016, a new Chinese Code for the design of composite structures JGJ138-2016 was ... [more ▼]

Parallel to the investigation in the second generation of Eurocodes, the Chinese design standards are also updated. At 01/12/2016, a new Chinese Code for the design of composite structures JGJ138-2016 was put in practice to replace the old JGJ138-2001. Benefit from the vast experience of composite structure applications blooming recently in Chinese, the new code covers much wider topics and is more comparable to Eurocodes 4. Generally, both codes cover topics of composite beams and columns, composite slabs and composite connections. However, JGJ138-2016 covers also the design of composite shear walls, while Eurocode 4 considers more about durability and time effects. It is necessary to compare the materials used for both of codes. In this article, it covers comparison of the mechanic properties such as elastic modulus, characteristic strength and design strength. The analysis includes concrete, reinforcement, and structural steel. The main comparison is the design procedure of composite columns. The application range of the codes will be pointed out first. Both codes allow the design of concrete encased sections and concrete filled rectangular and circular tubes. However different limitations on cross-section sizes and materials can be found. Eurocode 4 represents three different design methods: the simplified method for centric loading, based on the buckling curves; the general method based on 2nd order calculation for action effects and N-M interaction for the determination of resistances; as well as the non-linear method based on stress-strain limitation of material and FE-Analysis. Chinese code gives a simplified method of the calculation of column resistance for centric and eccentric loading. Also the impact of second-order effect are to proof if needed. According to the EN1994-1-1 the impact of creep is to consider for the denervation of the bending stiffness and for ideal buckling resistance and non-dimensional slenderness. JGJ138-2016 do not consider impact of creep for the design. Besides, JGJ138-2016 includes also design for seismic situation. The axial cross-section resistance and normal force-moment interaction curves (N-M curves) will be compared through theoretical analysis and parameter studies. JGJ138-2016 considers mainly transversal shear resistances, while Eurocode 4 further considers shear connection, load introduction and longitudinal shear outside the areas of load introduction. The design shear resistance will be compared in general and within parameter study. [less ▲]

Detailed reference viewed: 27 (3 UL)
Full Text
Peer Reviewed
See detailA Perspective of Security for Mobile Service Robots
Cornelius, Gary Philippe UL; Hochgeschwender, Nico UL; Voos, Holger UL et al

in Iberian Robotics Conference, Seville, Spain, 2017 (2017, November 22)

Future homes will contain Mobile Service Robots (MSR) with diverse functionality. MSRs act in close proximity to humans and have the physical capabilities to cause serious harm to their environment ... [more ▼]

Future homes will contain Mobile Service Robots (MSR) with diverse functionality. MSRs act in close proximity to humans and have the physical capabilities to cause serious harm to their environment. Furthermore, they have sensors that gather large amounts of data, which might contain sensitive information. A mobile service robot’s physical capabilities are controlled by networked computers susceptible to faults and intrusions. The proximity to humans and the possibility to physically interact with them makes it critical to think about the security issues of MSRs. In this work, we investigate possible attacks on mobile service robots. We survey adversary motivations to attack MSRs, analyse threat vectors and list different available defence mechanisms against attacks on MSRs. [less ▲]

Detailed reference viewed: 90 (43 UL)
Full Text
Peer Reviewed
See detailEvasive Maneuvering for UAVs: An MPC Approach
Castillo Lopez, Manuel UL; Olivares Mendez, Miguel Angel UL; Voos, Holger UL

in ROBOT'2017 - Third Iberian Robotics Conference, Sevilla, Spain, 2017 (2017, November 22)

Flying autonomously in a workspace populated by obstacles is one of the main goals when working with Unmanned Aerial Vehicles (UAV). To address this challenge, this paper presents a model predictive ... [more ▼]

Flying autonomously in a workspace populated by obstacles is one of the main goals when working with Unmanned Aerial Vehicles (UAV). To address this challenge, this paper presents a model predictive flight controller that drives the UAV through collision-free trajectories to reach a given pose or follow a way-point path. The major advantage of this approach lies on the inclusion of three-dimensional obstacle avoidance in the control layer by adding ellipsoidal constraints to the optimal control problem. The obstacles can be added, moved and resized online, providing a way to perform waypoint navigation without the need of motion planning. In addition, the delays of the system are considered in the prediction by an experimental first order with delay model of the system. Successful experiments in 3D path tracking and obstacle avoidance validates its effectiveness for sense-and-avoid and surveillance applications presenting the proper structure to extent its autonomy and applications. [less ▲]

Detailed reference viewed: 35 (5 UL)
See detailKonventionen und Tabus? Deutschlandbilder in Lüttich im langen 19. Jahrhundert
Brüll, Christoph UL

Scientific Conference (2017, November 22)

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailMarkers of lesser importance in lecture discourse
Deroey, Katrien UL

Scientific Conference (2017, November 22)

This paper surveys how less important lecture discourse is marked lexicogrammatically in the British Academic Spoken English (BASE) corpus (Deroey and Taverniers, 2012; Deroey, 2014). Such interpersonal ... [more ▼]

This paper surveys how less important lecture discourse is marked lexicogrammatically in the British Academic Spoken English (BASE) corpus (Deroey and Taverniers, 2012; Deroey, 2014). Such interpersonal, metadiscursive devices combine discourse organization with evaluation along a ‘parameter of importance or relevance’ (Thompson and Hunston, 2000: 24). They can help students discern the relative importance of points and so may aid lecture comprehension, note-taking and retention. The markers were first retrieved manually from 40 lectures and then using Sketch Engine from all 160 lectures. They fell into five categories: (i) message status markers (e.g. not pertinent, joke, anyway); (ii) topic treatment markers (e.g. briefly, not look at, for a moment); (iii) lecturer knowledge markers (e.g. not know, not remember); (iv) assessment markers (e.g. not examine, not learn); and (v) attention- and note-taking markers (e.g. ignore, not copy down). This study illustrates the challenge of identifying and quantifying pragmatic features in academic discourse. Few markers explicitly evaluated discourse as being unimportant (e.g. not pertinent) and few had an inherent meaning of lesser importance (e.g. incidentally). Instead, they depended rather heavily on pragmatic interpretation to achieve their effect and could generally be viewed as ‘muted signals’ (Swales and Burke, 2003: 17), expressing importance implicitly or cumulatively (cf. Hunston, 2011). Hence, Hunston’s observation that ‘much evaluative meaning is not obviously identifiable, as it appears to depend on immediate context and on reader assumptions about value’ (2004: 157) is particularly pertinent here. References Deroey, K. L. B. (2014). ‘Anyway, the point I'm making is’: Lexicogrammatical relevance marking in lectures. In L. Vandelanotte, D. Kristin, G. Caroline, & K. Ditte (Eds.), Recent Advances in Corpus Linguistics: Developing and Exploiting Corpora (pp. 265-291). Amsterdam/New York: Rodopi. Deroey, K. L. B., & Taverniers, M. (2012). ‘Ignore that' cause it's totally irrelevant’: Marking lesser relevance in lectures. Journal of Pragmatics, 44(14), 2085-2099. Hunston, S. (2004). Counting the uncountable: Problems of identifying evaluation in a text and in a corpus. In A. Partington, J. Morley, & L. Haarman (Eds.), Corpora and discourse (pp. 157-188). Bern: Peter Lang. Hunston, S. (2011). Corpus approaches to evaluation: phraseology and evaluative language (Vol. 13). New York: Routledge. Swales, J. M., & Burke, A. (2003). " Its really fascinating work": Differences in Evaluative Adjectives across Academic Registers. Language and Computers, 46(1), 1-18.  Thompson, G., & Hunston, S. (2000). Evaluation: An introduction. In Hunston, S., & Thompson, G. (Eds.), Evaluation in text: Authorial stance and the construction of discourse (pp. 1-27). Oxford: OUP. [less ▲]

Detailed reference viewed: 40 (0 UL)
See detailDemystifying multilingualism at work, at home and at school
Kirsch, Claudine UL

Scientific Conference (2017, November 21)

What is multilingualism? How has our understanding of multilingualism, language learning and developing several languages in children at home and at school changed over the last century? Building on the ... [more ▼]

What is multilingualism? How has our understanding of multilingualism, language learning and developing several languages in children at home and at school changed over the last century? Building on the work of several leading scholars such as García, Creese and Blackledge, Li Wei, and Baker as well as on my own research, this interactive presentation will deconstruct traditional understandings of multilingualism and show that translanguaging, the use of one’s entire semiotic repertoire for communication, meaning-making and learning, is a normal practice. In addition, we will examine approaches such as “one-person-one-language” and “one-person-two-languages” and discuss some video excerpts illustrating how children use their multilingual repertoire in a crèche at and school. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailEU citizens’ rights versus the Member States’ right to withdraw from the Union
Gerkrath, Jörg UL

Scientific Conference (2017, November 18)

Detailed reference viewed: 8 (0 UL)
Peer Reviewed
See detailConclusions
Pettiau, Hérold UL; Lemesle, Bruno; Lemaître, Nicole

Scientific Conference (2017, November 17)

This intervention consiste of concluding remarks of a conférence on the office of bishops as administrations of their diocèse within a region encompassing the Low Countries, dthe Duchy of Lorraine, the ... [more ▼]

This intervention consiste of concluding remarks of a conférence on the office of bishops as administrations of their diocèse within a region encompassing the Low Countries, dthe Duchy of Lorraine, the Alsace region, Switzelrand, south-Esastern France and the North of Italy, which were allegedly part of a sort of "catholic front" facing the Reformation. [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailLearning Resource Management through Semantic Annotation Features in Popular Authoring Software
Grevisse, Christian UL; Botev, Jean UL; Rothkugel, Steffen UL

in ICERI 2017 Proceedings (2017, November 16)

The ever-growing set of learning material challenges both students and teachers. While students often need to quickly retrieve resources on a certain topic, teachers have to author high quality documents ... [more ▼]

The ever-growing set of learning material challenges both students and teachers. While students often need to quickly retrieve resources on a certain topic, teachers have to author high quality documents in a limited amount of time, preferably using their favourite tools. In this paper, we propose an open ecosystem of plugins for popular authoring software, enabling teachers to annotate learning resources using domain concepts from ontologies. In addition, a plugin for the Moodle Learning Management System extracts these annotations from the metadata of the provided resources to allow students to get an overview of important concepts and efficiently retrieve corresponding material. [less ▲]

Detailed reference viewed: 14 (3 UL)
Full Text
Peer Reviewed
See detailAlternative Paths Towards Sustainable Localized Food Sovereignty. Convergence between Prosumers and Ethical Entrepreneurs over Time
Reckinger, Rachel UL

Scientific Conference (2017, November 14)

Recently, a number of resourceful community-driven initiatives for local food production and retail have arisen in Luxembourg, in a context of particularly low organic agricultural rates paradoxically ... [more ▼]

Recently, a number of resourceful community-driven initiatives for local food production and retail have arisen in Luxembourg, in a context of particularly low organic agricultural rates paradoxically paired with high consumer demands for organic produce, leading to a specific market of largely imported organic goods. As an encompassing reaction to this situation, a niche of social innovators are combining agro-ecological land use and food production with locavoracity and circular economy. Based on qualitative in-depth interviews and participant observation, we would like to expand on four micro-case studies of circular-economy-type fruit and vegetable production as well as unpackaged and/or socially responsible food retail in today’s Luxembourg. One has been established since the 1980s with over 150 employees, partly in social insertion measures, producing and importing organic fruits and vegetables, delivered via a classical box scheme system. Additionally, over the last three years three significantly smaller initiatives with higher citizen and/or community involvement have emerged. They are characterized by a cooperative governance structure, a claimed community-supported agricultural outlook, a more dynamic presence on social media and regular hands-on workshops and activities. These more recent initiatives are also more radical in their agro-ecological and/or permaculture practices, focusing on local production without relying on imports, as a politicized step further than mere (possibly industrialized) organic production, which is an altogether renewed enacting of circular economy precepts. Yet their position on the market is for the moment more fragile and marginal. Particularly, the retailers among them have to build creative consensus – according to specific priorities and stances – between their standards and the adjustment to consumers who, albeit sensitized, are in search for a certain variety and convenience. By focusing on heterodox experiences of more or less established alternative actors in diverse yet complementary food production and retail niches, we will explore topics such as emotional collective commitment and consensus-building, ethical entrepreneurship in relation to possibly reframed standards over time, governmentality, political enabling or disabling structures and regulations, as well as commodification and upscaling issues. Therefore, this paper touches on political processes and strategies, urban agro-ecological practices as well as post-capitalist economics. [less ▲]

Detailed reference viewed: 6 (0 UL)
See detailEarly life stress reduces neuropathic pain in adulthood -is alteration of spinal microglial reactivity critically involved?
Genty, Julien UL; Tetsi Nomigni, Milène UL; Anton, Fernand UL et al

Poster (2017, November 14)

Growing evidence underlines the association between early life adversity and persistent alterations of neural, endocrine and immune functions that may be accompanied by a host of disease patterns such as ... [more ▼]

Growing evidence underlines the association between early life adversity and persistent alterations of neural, endocrine and immune functions that may be accompanied by a host of disease patterns such as chronic pain in later life. Neuropathy is a debilitating condition presenting a substantial cooccurrence with stress related disorders. Despite the established overlapping of biochemical pathways involved in the etiology of these disorders, the intricacy of their mutual interdependence remains. In this context, immunocompetent cells are largely affected during chronic stress and are a key factor in the sensitization of nociceptive dorsal horn neurons. The goal of the present study was to investigate the impact of maternal separation (MS), a wellestablished model of early life stress in rodents, on chronic constriction injury (CCI)induced neuropathic pain and to reveal the relevance of spinal microglia activation and proinflammatory cytokine regulation. For this purpose 12 groups of rats were exposed to different combinations of stress condition, CCIinjury and pharmacological treatment. Noxious sensitivity was tested during baseline conditions as well as during subsequent neuropathic and pharmacological treatment conditions. Von Frey hair and the cold plate tests were used for the assessment of mechanical and cold hyperalgesia/allodynia. Amphotericin B, a substance known to activate monocytes and macrophages in the periphery and microglial cells in the CNS was administered to subgroups of animals. At the end of the protocol, rats were sacrificed to assess microglial activation using qPCR and immunohistochemistry. Our main finding was that maternal separation led to a reduction of CCIrelated pain hypersensitivity (thermal and mechanical hyperalgesia/allodynia). We concomitantly observed a downregulation of Iba 1, mRNA a marker of microglial cells, and of IL1β mRNA, a proinflammatory cytokine that may be released by microglia. According to preliminary results, Amphotericin B in turn seemed to enhance CCI related pain sensitivity, possibly via an activation of microglia. Our results show that MS may lead to a reduction of neuropathy relatedpain in adult age. Stress related dampening of spinal microglial reactivity may play a critical role in this context. [less ▲]

Detailed reference viewed: 17 (5 UL)
Full Text
See detailRecent Successes with a Meta-Logical Approach to Universal Logical Reasoning (Extended Abstract)
Benzmüller, Christoph UL

in Benzmüller, Christoph (Ed.) Formal Methods: Foundations and Applications - 20th Brazilian Symposium SBMF 2017, Recife, Brazil, November 29 - December 1, 2017, Proceedings (2017, November 11)

The quest for a most general framework supporting universal reasoning is very prominently represented in the works of Leibniz. He envisioned a scientia generalis founded on a characteristica universalis ... [more ▼]

The quest for a most general framework supporting universal reasoning is very prominently represented in the works of Leibniz. He envisioned a scientia generalis founded on a characteristica universalis, that is, a most universal formal language in which all knowledge about the world and the sciences can be encoded. A quick study of the survey literature on logical formalisms suggests that quite the opposite to Leibniz’ dream has become reality. Instead of a characteristica universalis, we are today facing a very rich and heterogenous zoo of different logical systems, and instead of converging towards a single superior logic, this logic zoo is further expanding, eventually even at accelerated pace. As a consequence, the unified vision of Leibniz seems farther away than ever before. However, there are also some promising initiatives to counteract these diverging developments. Attempts at unifying approaches to logic include categorial logic algebraic logic and coalgebraic logic. [less ▲]

Detailed reference viewed: 32 (5 UL)
Full Text
See detailAssociative and quasitrivial operations on finite sets (invited lecture)
Marichal, Jean-Luc UL; Couceiro, Miguel; Devillet, Jimmy UL

Scientific Conference (2017, November 10)

Detailed reference viewed: 19 (4 UL)
Full Text
See detailA Product Line of Software Engineering Project Courses
Guelfi, Nicolas UL; Capozucca, Alfredo UL; Ries, Benoît UL

Poster (2017, November 08)

Detailed reference viewed: 7 (1 UL)
Full Text
See detailThe Effects of Deskilling and Unemployment on Hiring Decisions
Samuel, Robin UL; Imdorf, Christian; Sacchi, Stefan et al

Scientific Conference (2017, November 08)

Detailed reference viewed: 15 (0 UL)
Peer Reviewed
See detailThe Missing Risk Premium in Exchange Rates
Penasse, Julien UL

Scientific Conference (2017, November 08)

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailInsights on the performance and configuration of AVB and TSN in automotive applications
Navet, Nicolas UL; Villanueva, Josetxo; Migge, Jörn et al

Scientific Conference (2017, November 01)

Switched Ethernet is profoundly reshaping in-car communications. To meet the diverse real-time requirements in automotive communications, Quality-of-Service protocols that go beyond the mere use of ... [more ▼]

Switched Ethernet is profoundly reshaping in-car communications. To meet the diverse real-time requirements in automotive communications, Quality-of-Service protocols that go beyond the mere use of priorities are required. In this work, the basic questions that we investigate on a case-study with diverse and demanding communication requirements is what can we expect from the various protocols aimed at providing a better timing Quality of Service on top of Ethernet? And how to use them? Especially how to use them in a combined manner. We will focus on the Credit-Based Shaper of AVB, the Time-Aware Shaper of TSN and the use of priorities as defined in IEEE802.1Q. The performance metrics considered are the distributions of the communication latencies, obtained by simulation, as well as upper bounds on these quantities obtained by worst-case schedulability analysis. If there have been over the last 5 years numerous studies on the performance of AVB CBS, the literature on comparing AVB to TSN and other candidate protocols is still sparse. To the best of our knowledge, this empirical study is the first to consider most protocols currently considered in the automotive domain, with the aim to gain insights into the different technological, design and configurations alternatives. In particular, an objective of this study is to identify key problems that need to be solved in order to further automate network design and configuration. [less ▲]

Detailed reference viewed: 7 (1 UL)
Full Text
Peer Reviewed
See detailFatigue of rocks
Pytlik, Robert Stanislaw UL; Van Baars, Stefan UL

in Johansson, Erik; Raasakka, Ville (Eds.) Proceedings of the 3rd Nordic Rock Mechanics Symposium, NRMS 2017 (2017, November)

Cyclic loading on civil structures can lead to a reduction of strength of the used materials. For the materials concrete and especially steel, there are clear design codes about how to account for the ... [more ▼]

Cyclic loading on civil structures can lead to a reduction of strength of the used materials. For the materials concrete and especially steel, there are clear design codes about how to account for the reduction of the material shear strength due to this cyclic loading, which is called fatigue. For the material rock, however, there are no design codes or standards for fatigue, in terms of shear strength reduction. For this reason, a large number of laboratory triaxial tests have been performed, in order to evaluate the fatigue of rocks by comparing the shear strength parameters obtained in cyclic triaxial tests with the static shear strength. Tests have been performed on artificial gypsum, a mixture of sand and cement (mortar) and soft sedimentary limestone. Correlations of the fatigue, for both the number of cycles and the cyclic stress ratio, have been obtained. All triaxial tests were conducted on dry samples (no pore pressure) in the natural state. The range of the confining pressure was between 0 MPa and 0.5 MPa. The frequency was kept low to allow for a precise application of the cyclic load and also accurate readings. The number of applied cycles was from a few cycles up to a few hundred thousand. The imperfections in the artificial gypsum have a significant impact on the results of the (especially cyclic) strength tests. Therefore another man made material was used – a mixture of sand and cement (mortar). As the first static test results were very promising, mortar was used in further tests. The cyclic tests, however, presented a similar, high scatter of results as for artificial gypsum. Due to the complex behaviour of the cohesive materials and high scatter of the results, many tests were required. Two different strategies were used to investigate the fatigue of the cohesive geomaterials: 1. the remaining shear strength curve: after a given number of cycles, a final single load test until failure, measures the remaining shear strength of the sample. 2. the typical S-N curve (Wöhler curves): one counts the number of constant loading cycles until failure. The fatigue of rocks can be seen as a reduction of the cohesion. In this way, the fatigue of a cohesive geomaterial can be described by (a reduction of) the remaining cohesion. An unexpected observation for both artificial gypsum and mortar was that unlike the number of cycles, the size of the cyclic stress ratio has little influence on the remaining shear strength, and therefore on fatigue. The remaining shear strength (or strength reduction) curve has been compared with the standard S-N curve, and is found to be rather similar for both artificial gypsum and mortar. The reason for this is this unexpected observation. Because of this, the S-N curve and the remaining shear strength curve should be theoretically identical. The results of the triaxial tests show however that, the S-N curve gives a bit steeper slope than the remaining shear strength curve, which would imply a shorter life and a faster reduction in comparison to the remaining shear strength curve, but this is only because, the prematurely failed samples are not included in the remaining shear strength curve, while a significant number of the S-N samples are prematurely failed samples from the remaining shear strength tests. [less ▲]

Detailed reference viewed: 11 (1 UL)
Full Text
Peer Reviewed
See detailObserver-based Event-triggered Attack-Tolerant Control Design for Cyber-physical Systems
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in 14th International Workshop on Advanced Control and Diagnosis, Bucharest, Romania, November 2017 (2017, November)

In the present paper, a model-based fault/attack tolerant scheme is proposed to cope with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback ... [more ▼]

In the present paper, a model-based fault/attack tolerant scheme is proposed to cope with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback control based on an aperiodic event-triggered framework is given with control synthesis and condition on the switching time. Classical fault tolerant control with Bilinear Matrix Inequality (BMI) approaches are used to achieve novel and better security strategy based on an event-triggered control implementation. The purpose in using the event-based implementation would be to reduce (limit) the total number of transmissions to only instances when the networked control system (NCS) needs attention. An illustrative example of the proposed approach applied to a three-tank system is presented. [less ▲]

Detailed reference viewed: 39 (3 UL)
Full Text
Peer Reviewed
See detailYour Moves, Your Device: Establishing Behavior Profiles Using Tensors
Falk, Eric UL; Charlier, Jérémy Henri J. UL; State, Radu UL

in Advanced Data Mining and Applications - 13th International Conference, ADMA 2017 (2017, November)

Smartphones became a person's constant companion. As the strictly personal devices they are, they gradually enable the replacement of well established activities as for instance payments, two factor ... [more ▼]

Smartphones became a person's constant companion. As the strictly personal devices they are, they gradually enable the replacement of well established activities as for instance payments, two factor authentication or personal assistants. In addition, Internet of Things (IoT) gadgets extend the capabilities of the latter even further. Devices such as body worn fitness trackers allow users to keep track of daily activities by periodically synchronizing data with the smartphone and ultimately with the vendor's computational centers in the cloud. These fitness trackers are equipped with an array of sensors to measure the movements of the device, to derive information as step counts or make assessments about sleep quality. We capture the raw sensor data from wrist-worn activity trackers to model a biometric behavior profile of the carrier. We establish and present techniques to determine rather the original person, who trained the model, is currently wearing the bracelet or another individual. Our contribution is based on CANDECOMP/PARAFAC (CP) tensor decomposition so that computational complexity facilitates: the execution on light computational devices on low precision settings, or the migration to stronger CPUs or to the cloud, for high to very high granularity. This precision parameter allows the security layer to be adaptable, in order to be compliant with the requirements set by the use cases. We show that our approach identifies users with high confidence. [less ▲]

Detailed reference viewed: 22 (5 UL)
Full Text
Peer Reviewed
See detailOptimising Packet Forwarding in Multi-Tenant Networks using Rule Compilation
Hommes, Stefan UL; Valtchev, Petko; Blaiech, Khalil et al

in Optimising Packet Forwarding in Multi-Tenant Networks using Rule Compilation (2017, November)

Packet forwarding in Software-Defined Networks (SDN) relies on a centralised network controller which enforces network policies expressed as forwarding rules. Rules are deployed as sets of entries into ... [more ▼]

Packet forwarding in Software-Defined Networks (SDN) relies on a centralised network controller which enforces network policies expressed as forwarding rules. Rules are deployed as sets of entries into network device tables. With heterogeneous devices, deployment is strongly bounded by the respective table constraints (size, lookup time, etc.) and forwarding pipelines. Hence, minimising the overall number of entries is paramount in reducing resource consumption and speeding up the search. Moreover, since multiple control plane applications can deploy own rules, conflicts may occur. To avoid those and ensure overall correctness, a rule validation mechanism is required. Here, we present a compilation mechanism for rules of diverging origins that minimises the number of entries. Since it exploits the semantics of rules and entries, our compiler fits a heterogeneous landscape of network devices. We evaluated compiler implementations on both software and hardware switches using a realistic testbed. Experimental results show a reduction in both produced table entries and forwarding delay. [less ▲]

Detailed reference viewed: 17 (2 UL)
Full Text
Peer Reviewed
See detailDeadzone-Quadratic Penalty Function for Predictive Extended Cruise Control with Experimental Validation
Sajadi Alamdari, Seyed Amin UL; Voos, Holger UL; Darouach, Mohamed

in ROBOT 2017: Third Iberian Robotics Conference, Sevilla, Spain 22-24 November 2017 (2017, November)

Battery Electric Vehicles have high potentials for the modern transportations, however, they are facing limited cruising range. To address this limitation, we present a semi-autonomous ecological driver ... [more ▼]

Battery Electric Vehicles have high potentials for the modern transportations, however, they are facing limited cruising range. To address this limitation, we present a semi-autonomous ecological driver assistance system to regulate the velocity with energy-efficient techniques. The main contribution of this paper is the design of a real-time nonlinear receding horizon optimal controller to plan the online cost-effective cruising velocity. Instead of conventional L2-norms, a deadzone-quadratic penalty function for the nonlinear model predictive controller is proposed. Obtained field experimental results demonstrate the effectiveness of the proposed method for a semi-autonomous electric vehicle in terms of real-time energy-efficient velocity regulation and constraints satisfaction. [less ▲]

Detailed reference viewed: 26 (5 UL)