References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailLe récit de voyage comme rupture de contrat
Roelens, Nathalie UL

in Acta Fabula : Revue des Parutions en Théorie Littéraire (in press)

Detailed reference viewed: 65 (6 UL)
Full Text
Peer Reviewed
See detailO-MI/O-DF vs. MQTT: a performance analysis
Benedick, Paul-Lou UL; Robert, Jérémy UL; Le Traon, Yves UL et al

in O-MI/O-DF vs. MQTT: a performance analysis (in press)

Over the past decade, a flourishing number of concepts and architectural shifts appeared such as Industrial Internet of Things (IIoT), Industrial CPS or even Industry 4.0. Unfortunately, today’s IoT as ... [more ▼]

Over the past decade, a flourishing number of concepts and architectural shifts appeared such as Industrial Internet of Things (IIoT), Industrial CPS or even Industry 4.0. Unfortunately, today’s IoT as well as Industry 4.0 environments, look more like a collection of isolated “Intranets of Things”, also referred to as “vertical silos”, rather than a federated infrastructure. Breaking down these silos is a key challenge in both the IoT and Industry 4.0 communities. This paper is intended to present and discuss two open and standardised mes- saging protocols designed for IoT applications, namely: MQTT and O-MI/O-DF. First, a traffic load’s analytical model derived from the MQTT standard specifications is presented. Second, a comparison study between MQTT and O-MI/O-DF standards is carried out based on a real-life industrial implementation. This study brings a deep understanding of the extent to which these protocols are performant (from a traffic load perspective) and how they can impact on future architectural designs. [less ▲]

Detailed reference viewed: 45 (3 UL)
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 106 (9 UL)
Full Text
See detailFundamental rights and constitutional identity(ies): limits or parameters of the EU constitutional governance?
Zinonos, Panagiotis UL

in European Governance and Sovereignty (in press)

Detailed reference viewed: 23 (9 UL)
See detailEntwicklungen der sexualwissenschaftlichen und rechtlichen Debatten zu Transsexualität und deren Verschränkungen in der Bundesrepublik Deutschland (1960er Jahre bis 1980)
De Silva, Adrian UL

in 'Auf nach Casablanca?' Lebensrealitäten transgeschlechtlicher Menschen zwischen 1945-1980 (in press)

Detailed reference viewed: 38 (6 UL)
Full Text
Peer Reviewed
See detailNew Directions in Attack Tree Research: Catching up with Industrial Needs
Gadyatskaya, Olga UL; Trujillo Rasua, Rolando UL

in Mauw, Sjouke (Ed.) Proceedings of the 4th International Workshop on Graphical Models for Security (in press)

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal ... [more ▼]

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal mathematical frameworks for analyzing them in a qualitative or a quantitative manner. Indeed, the mathematical frameworks have become a large focus of attack tree research. However, practical applications of attack trees in industry largely remain a tedious and error-prone exercise. Recent research directions in attack trees, such as attack tree generation, attempt to close this gap and to improve the attack tree state-of-thepractice. In this position paper we outline the recurrent challenges in manual tree design within industry, and we overview the recent research results in attack trees that help the practitioners. For the challenges that have not yet been addressed by the community, we propose new promising research directions. [less ▲]

Detailed reference viewed: 66 (3 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 41 (1 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 29 (0 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 65 (3 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 112 (6 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 53 (10 UL)
Full Text
Peer Reviewed
See detailRevisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation
Atashpendar, Arash UL; Policharla, Guru Vamsi; Roenne, Peter UL et al

in Secure IT Systems, 23rd Nordic Conference, NordSec 2018 (in press)

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily ... [more ▼]

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits key equivocation. We provide more insight into the nature of this attack and how it extends to other constructions such as QKE obtained from uncloneable encryption. We then adopt the framework for quantum authenticated key exchange, developed by Mosca et al., and extend it to introduce the notion of coercer-deniable QKE, formalized in terms of the indistinguishability of real and fake coercer views. Next, we apply results from a recent work by Arrazola and Scarani on covert quantum communication to establish a connection between covert QKE and deniability. We propose DC-QKE, a simple deniable covert QKE protocol, and prove its deniability via a reduction to the security of covert QKE. Finally, we consider how entanglement distillation can be used to enable information-theoretically deniable protocols for QKE and tasks beyond key exchange. [less ▲]

Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 139 (18 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 163 (6 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 279 (4 UL)
Full Text
See detailInternationale Besteuerung der digitalen Wirtschaft: EU- und OECD-Vorschläge
Sinnig, Julia UL

in Taeger, Jürgen (Ed.) Tagungsband Herbstakademie 2018: Rechtsfragen digitaler Transformationen - Gestaltung digitaler Veränderungsprozesse durch Recht (in press)

Im März 2018 stellten sowohl die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) als auch die Europäische Union (EU) Zwischenergebnisse ihrer Arbeit im Bereich der ... [more ▼]

Im März 2018 stellten sowohl die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) als auch die Europäische Union (EU) Zwischenergebnisse ihrer Arbeit im Bereich der Ertragsbesteuerung digitalisierter Geschäftsaktivitäten vor. Während die OECD keine konkrete Empfehlung zur Anpassung bestehender Vorschriften des internationalen Steuerrechts aussprach, stellte die Europäische Kommission sowohl eine langfristige Maßnahme – eine Anpassung des Betriebsstättenkonzepts zugunsten einer sog. signifikanten digitalen Präsenz – als auch einen kurzfristigen Besteuerungsvorschlag – eine sog. Digitalsteuer – vor. Dieser Beitrag knüpft an den Vortrag der Verfasserin in Heidelberg anlässlich der Herbstakademie 2017 an. [less ▲]

Detailed reference viewed: 47 (3 UL)
Full Text
Peer Reviewed
See detailRevisiting Gaussian Mixture Models for Driver Identification
Jafarnejad, Sasan UL; Castignani, German UL; Engel, Thomas UL

in Proceedings of IEEE International Conference on Vehicular Electronics and Safety (ICVES) (ICVES 2018) (in press)

The increasing penetration of connected vehicles nowadays has enabled driving data collection at a very large scale. Many telematics applications have been also enabled from the analysis of those datasets ... [more ▼]

The increasing penetration of connected vehicles nowadays has enabled driving data collection at a very large scale. Many telematics applications have been also enabled from the analysis of those datasets and the usage of Machine Learning techniques, including driving behavior analysis predictive maintenance of vehicles, modeling of vehicle health and vehicle component usage, among others. In particular, being able to identify the individual behind the steering wheel has many application fields. In the insurance or car-rental market, the fact that more than one driver make use of the vehicle generally triggers extra fees for the contract holder. Moreover being able to identify different drivers enables the automation of comfort settings or personalization of advanced driver assistance (ADAS) technologies. In this paper, we propose a driver identification algorithm based on Gaussian Mixture Models (GMM). We show that only using features extracted from the gas pedal position and steering wheel angle signals we are able to achieve near 100 accuracy in scenarios with up to 67 drivers. In comparison to the state-of-the-art, our proposed methodology has lower complexity, superior accuracy and offers scalability to a larger number of drivers. [less ▲]

Detailed reference viewed: 16 (3 UL)
Full Text
Peer Reviewed
See detailThe competence to conclude the new generation of free trade agreements: lessons from Opinion 2/15
Neframi, Eleftheria UL

in Chaisse, Julien (Ed.) China-European Union Investment Relationships (in press)

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU ... [more ▼]

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU-only agreement, or a mixed agreement, jointly by the Union and its Member States. The Court of Justice of the European Union held that the EU competence to conclude the EUSFTA is not exclusive, as long as provisions concerning non-direct investments and dispute settlement fall under the shared competence of the Union and its Member States. The Court of Justice made valuable contributions to the interpretation of the scope of the Union’s competence in the field of common commercial policy, comprising sustainable development provisions, as well as to the interpretation of implied external competences, and clarified the status of non-substantive provisions. However, uncertainty remains as far as the meaning and the impact of a shared competence are concerned. [less ▲]

Detailed reference viewed: 91 (15 UL)
Full Text
See detailNeue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)
Uhrmacher, Martin UL

in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) et al Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. Tagung und Workshop zum 200. Jahrestag des Abschlusses des Wiener Kongresses (in press)

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress ... [more ▼]

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Vortrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen Luxemburg und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailAn Investigation of Compression Techniques to Speed up Mutation Testing
Zhu; Panichella, Annibale UL; Zaidman, Andy

in Proceedings of 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (in press)

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]

Detailed reference viewed: 121 (18 UL)
Full Text
Peer Reviewed
See detailSequential Resource Distribution Technique for Multi-User OFDM-SWIPT based Cooperative Networks
Gautam, Sumit UL; Lagunas, Eva UL; Chatzinotas, Symeon UL et al

Scientific Conference (2018, December)

In this paper, we investigate resource allocation and relay selection in a dual-hop orthogonal frequency division multiplexing (OFDM)-based multi-user network where amplify-and-forward (AF) enabled relays ... [more ▼]

In this paper, we investigate resource allocation and relay selection in a dual-hop orthogonal frequency division multiplexing (OFDM)-based multi-user network where amplify-and-forward (AF) enabled relays facilitate simultaneous wireless information and power transfer (SWIPT) to the end-users. In this context, we address an optimization problem to maximize the end-users’ sum-rate subjected to transmit power and harvested energy constraints. Furthermore, the problem is formulated for both time-switching (TS) and power-splitting (PS) SWIPT schemes.We aim at optimizing the users’ SWIPT splitting factors as well as sub-carrier–destination assignment, sub-carrier pairing, and relay–destination coupling metrics. This kind of joint evaluation is combinatorial in nature with non-linear structure involving mixed-integer programming. In this vein, we propose a sub-optimal low complex sequential resource distribution (SRD) method to solve the aforementioned problem. The performance of the proposed SRD technique is compared with a semi-random resource allocation and relay selection approach. Simulation results reveal the benefits of the proposed design under several parameter values with various operating conditions to illustrate the efficiency of SWIPT schemes for the proposed techniques. [less ▲]

Detailed reference viewed: 35 (5 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon; Albert, Richard; Fotiadou, Alkmene (Eds.) The Law and Legitimacy of Imposed Constitutions (2018, November)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 73 (5 UL)
Full Text
Peer Reviewed
See detailEnabling Model Testing of Cyber-Physical Systems
Gonzalez Perez, Carlos Alberto UL; Varmazyar, Mojtaba UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system ... [more ▼]

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system and its environment. To alleviate these challenges we propose to conduct testing at early stages and over executable models of the system and its environment. Model testing of CPSs is however not without difficulties. The complexity and heterogeneity of CPSs renders necessary the combination of different modeling formalisms to build faithful models of their different components. The execution of CPS models thus requires an execution framework supporting the co-simulation of different types of models, including models of the software (e.g., SysML), hardware (e.g., SysML or Simulink), and physical environment (e.g., Simulink). Furthermore, to enable testing in realistic conditions, the co-simulation process must be (1) fast, so that thousands of simulations can be conducted in practical time, (2) controllable, to precisely emulate the expected runtime behavior of the system and, (3) observable, by producing simulation data enabling the detection of failures. To tackle these challenges, we propose a SysML-based modeling methodology for model testing of CPSs, and an efficient SysML-Simulink co-simulation framework. Our approach was validated on a case study from the satellite domain. [less ▲]

Detailed reference viewed: 70 (7 UL)
Full Text
Peer Reviewed
See detailHITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems
Shin, Seung Yeob UL; Chaouch, Karim UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are ... [more ▼]

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are impacted by the uncertainties in the CPS environment. To mitigate the risks associated with HiL testing, engineers have to ensure that (1) HiL test cases are well-behaved, i.e., they implement valid test scenarios and do not accidentally damage hardware, and (2) HiL test cases can execute within the time budget allotted to HiL testing. This paper proposes an approach to help engineers systematically specify and analyze CPS HiL test cases. Leveraging the UML profile mechanism, we develop an executable domain-specific language, HITECS, for HiL test case specification. HITECS builds on the UML Testing Profile (UTP) and the UML action language (Alf). Using HITECS, we provide analysis methods to check whether HiL test cases are well-behaved, and to estimate the execution times of these test cases before the actual HiL testing stage. We apply HITECS to an industrial case study from the satellite domain. Our results show that: (1) HITECS is feasible to use in practice; (2) HITECS helps engineers define more complete and effective well-behavedness assertions for HiL test cases, compared to when these assertions are defined without systematic guidance; (3) HITECS verifies in practical time that HiL test cases are well-behaved; and (4) HITECS accurately estimates HiL test case execution times. [less ▲]

Detailed reference viewed: 122 (21 UL)
Full Text
Peer Reviewed
See detailStatic load deflection experiment on a beam for damage detection using the Deformation Area Difference Method
Erdenebat, Dolgion UL; Waldmann, Danièle UL; Teferle, Felix Norman UL

Scientific Conference (2018, October)

A reliable and safety infrastructure for both transport and traffic is becoming increasingly important today. The condition assessment of bridges remains difficult and new methods must be found to provide ... [more ▼]

A reliable and safety infrastructure for both transport and traffic is becoming increasingly important today. The condition assessment of bridges remains difficult and new methods must be found to provide reliable information. A meaningful in-situ assessment of bridges requires very detailed investigations which cannot be guaranteed by commonly used methods. It is known that the structural response to external loading is influenced by local damages. However, the detection of local damage depends on many factors such as environmental effects (e.g. temperature), construction layer (e.g. asphalt) and accuracy of the structural response measurement. Within the paper, a new so-called Deformation Area Difference (DAD) Method is presented. The DAD method is based on a load deflection experiment and does not require a reference measurement of initial condition. Therefore, the DAD method can be applied on existing bridges. Moreover, the DAD method uses the most modern technologies such as high precision measurement techniques and attempts to combine digital photogrammetry with drone applications. The DAD method uses information given in the curvature course from a theoretical model of the structure and compares it to real measurements. The paper shows results from a laboratory load-deflection experiment with a steel beam which has been gradually damaged at distinct positions. The load size is chosen so that the maximum deflection does not exceed the serviceability limit state. With the data obtained by the laboratory experiment, the damage degree, which can still be detected by the DAD method, is described. Furthermore, the influence of measurement accuracy on damage detection is discussed. [less ▲]

Detailed reference viewed: 59 (14 UL)
Full Text
Peer Reviewed
See detailModel-Driven Trace Diagnostics for Pattern-based Temporal Specifications
Dou, Wei UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of the 2018 ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS 2018) (2018, October)

Offline trace checking tools check whether a specification holds on a log of events recorded at run time; they yield a verification verdict (typically a boolean value) when the checking process ends. When ... [more ▼]

Offline trace checking tools check whether a specification holds on a log of events recorded at run time; they yield a verification verdict (typically a boolean value) when the checking process ends. When the verdict is false, a software engineer needs to diagnose the property violations found in the trace in order to understand their cause and, if needed, decide for corrective actions to be performed on the system. However, a boolean verdict may not be informative enough to perform trace diagnostics, since it does not provide any useful information about the cause of the violation and because a property can be violated for multiple reasons. The goal of this paper is to provide a practical and scalable so- lution to solve the trace diagnostics problem, in the settings of model-driven trace checking of temporal properties expressed in TemPsy, a pattern-based specification language. The main contributions of the paper are: a model-driven approach for trace diagnostics of pattern-based temporal properties expressed in TemPsy, which relies on the evaluation of OCL queries on an instance of a trace meta-model; the implementation of this trace diagnostics procedure in the TemPsy-Report tool; the evaluation of the scalability of TemPsy-Report, when used for the diagnostics of violations of real properties derived from a case study of our industrial partner. The results show that TemPsy-Report is able to collect diagnostic information from large traces (with one million events) in less than ten seconds; TemPsy-Report scales linearly with respect to the length of the trace and keeps approximately constant performance as the number of violations increases. [less ▲]

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailThe Price of Privacy in Collaborative Learning
Pejo, Balazs UL; Tang, Qiang UL; Gergely, Biczok

Poster (2018, October)

Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training ... [more ▼]

Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training dataset; in reality a small or medium sized organization often does not have enough data to train a reasonably accurate model. For such organizations, a realistic solution is to train machine learning models based on a joint dataset (which is a union of the individual ones). Unfortunately, privacy concerns prevent them from straightforwardly doing so. While a number of privacy-preserving solutions exist for collaborating organizations to securely aggregate the parameters in the process of training the models, we are not aware of any work that provides a rational framework for the participants to precisely balance the privacy loss and accuracy gain in their collaboration. In this paper, we model the collaborative training process as a two-player game where each player aims to achieve higher accuracy while preserving the privacy of its own dataset. We introduce the notion of Price of Privacy, a novel approach for measuring the impact of privacy protection on the accuracy in the proposed framework. Furthermore, we develop a game-theoretical model for different player types, and then either find or prove the existence of a Nash Equilibrium with regard to the strength of privacy protection for each player. [less ▲]

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailKnowledge Graph-based Teacher Support for Learning Material Authoring
Grevisse, Christian UL; Manrique, Rubén; Mariño, Olga et al

in Advances in Computing - CCC 2018 (2018, September 26)

Preparing high-quality learning material is a time-intensive, yet crucial task for teachers of all educational levels. In this paper, we present SoLeMiO, a tool to recommend and integrate learning ... [more ▼]

Preparing high-quality learning material is a time-intensive, yet crucial task for teachers of all educational levels. In this paper, we present SoLeMiO, a tool to recommend and integrate learning material in popular authoring software. As teachers create their learning material, SoLeMiO identifies the concepts they want to address. In order to identify relevant concepts in a reliable, automatic and unambiguous way, we employ state of the art concept recognition and entity linking tools. From the recognized concepts, we build a semantic representation by exploiting additional information from Open Knowledge Graphs through expansion and filtering strategies. These concepts and the semantic representation of the learning material support the authoring process in two ways. First, teachers will be recommended related, heterogeneous resources from an open corpus, including digital libraries, domain-specific knowledge bases, and MOOC platforms. Second, concepts are proposed for semi-automatic tagging of the newly authored learning resource, fostering its reuse in different e-learning contexts. Our approach currently supports resources in English, French, and Spanish. An evaluation of concept identification in lecture video transcripts and a user study based on the quality of tag and resource recommendations yielded promising results concerning the feasibility of our technique. [less ▲]

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailTUNA: TUning Naturalness-based Analysis
Jimenez, Matthieu UL; Cordy, Maxime UL; Le Traon, Yves UL et al

in 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018 (2018, September 26)

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have ... [more ▼]

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have shown that the conclusions of a study can drastically change with respect to how the code is tokenized and how the used n-gram model is parameterized. These choices are thus of utmost importance, and one must carefully make them. To show this and allow the community to benefit from our work, we have developed TUNA (TUning Naturalness-based Analysis), a Java software artifact to perform naturalness-based analyses of source code. To the best of our knowledge, TUNA is the first open- source, end-to-end toolchain to carry out source code analyses based on naturalness. [less ▲]

Detailed reference viewed: 31 (5 UL)
Full Text
Peer Reviewed
See detailVerlet buffer for broad phase interaction detection in Discrete Element Method
Mainassara Chekaraou, Abdoul Wahid UL; Rousset, Alban UL; Besseron, Xavier UL et al

Poster (2018, September 24)

The Extended Discrete Element Method (XDEM) is a novel and innovative numerical simulation technique that extends the dynamics of granular materials or particles as described through the classical ... [more ▼]

The Extended Discrete Element Method (XDEM) is a novel and innovative numerical simulation technique that extends the dynamics of granular materials or particles as described through the classical discrete element method (DEM) by additional properties such as the thermodynamic state, stress/strain for each particle. Such DEM simulations used by industries to set up their experimental processes are complexes and heavy in computation time. Therefore, simulations have to be precise, efficient and fast in order to be able to process hundreds of millions of particles. To tackle this issue, such DEM simulations are usually parallelized with MPI. One of the most expensive computation parts of a DEM simulation is the collision detection of particles. It is classically divided into two steps: the broad phase and the narrow phase. The broad phase uses simplified bounding volumes to perform an approximated but fast collision detection. It returns a list of particle pairs that could interact. The narrow phase is applied to the result of the broad phase and returns the exact list of colliding particles. The goal of this research is to apply a Verlet buffer method to (X)DEM simulations regardless of which broad phase algorithm is used. We rely on the fact that such DEM simulations are temporal coherent: the neighborhood only changes slightly from the last time-step to the current time-step. We use the Verlet buffer method to extend the list of pairs returned by the broad phase by stretching the particles bounding volume with an extension range. This allows re-using the result of the broad phase for several time-steps before an update is required once again and thereby its reduce the number of times the broad phase is executed. We have implemented a condition based on particles displacements to ensure the validity of the broad phase: a new one is executed to update the list of colliding particles only when necessary. This guarantees identical results because approximations introduced in the broad phase by our approach are corrected in the narrow phase which is executed at every time-steps anyway. We perform an extensive study to evaluate the influence of the Verlet extension range on the performance of the execution in terms of computation time and memory consumption. We consider different test-cases, partitioners (ORB, Zoltan, METIS, SCOTCH, ...), broad phase algorithms (Link cell, Sweep and prune, ...) and grid configurations (fine, coarse), sequential and parallel (up to 280 cores). While a larger Verlet buffer increases the cost of the broad phase and narrow phase, it also allows skipping a significant number of broad phase execution (> 99 \%). As a consequence, our first results show that this approach can speeds up the total .execution time up to a factor of 5 for sequential executions, and up to a factor of 3 parallel executions on 280 cores while maintaining a reasonable memory consumption. [less ▲]

Detailed reference viewed: 13 (4 UL)
Peer Reviewed
See detailTeachers´ attitudes towards inclusion: Effects of a training module
Pit-Ten Cate, Ineke UL; Krischler, Mireille Gilberte Pauline UL

Scientific Conference (2018, September 17)

The success of implementing inclusive practice depends on teachers´ competence as well as their attitudes. Attitudes are defined as psychological tendencies expressed by evaluating a particular entity ... [more ▼]

The success of implementing inclusive practice depends on teachers´ competence as well as their attitudes. Attitudes are defined as psychological tendencies expressed by evaluating a particular entity with some degree of favor or disfavor. Research has provided mixed results concerning teachers´ attitudes toward students with SEN and inclusive practice, whereby teachers generally have more positive attitudes toward the inclusion of students with mild SEN than toward students with complex needs. Training, especially modules focusing on the cognitive processes underlying judgment, can facilitate positive change in attitudes toward inclusion of students with SEN. In a pre–post-test design, data were collected for a sample of 33 experienced primary school teachers attending a course (2x4hr) on inclusion with a focus on the role of attitudes in decision-making and behavior. We assessed general attitudes toward the inclusion of students with SEN as well as teachers´ emotional reactions, stereotypes and behavioural intentions. Results of a repeated measures ANOVA, with time (pre vs. post) and general attitude toward inclusion (4 subscales) as within group factors only showed a main effect for attitudes, reflecting variations between the subscale scores. The training course did not result in changes in general attitudes. Further analyses revealed a positive pre-post course change in teachers´ emotional reactions concerning the inclusion of a student with SEN in their class. Teachers´ stereotype ratings indicated they perceived students with learning difficulties as less competent but warm, whereas students with challenging behavior were perceived as relatively competent but average in warmth. Finally, teachers´ behavioral intentions shifted from focusing on finding solutions within the classroom to more cooperation with colleagues, parents and experts to provide the best support for the student with SEN. In sum, the training course impacted both the affective and conative components of attitudes, whereas general attitudes toward inclusion remained unchanged. [less ▲]

Detailed reference viewed: 9 (0 UL)
Peer Reviewed
See detailChanges in preservice teachers´ attitudes toward inclusion: the role of competence
Pit-Ten Cate, Ineke UL; Krischler, Mireille Gilberte Pauline UL

Scientific Conference (2018, September 13)

Following policies to promote a more equitable and inclusive educational system, the question arises how to prepare teachers to accommodate an increasingly heterogeneous student population. As teachers´ ... [more ▼]

Following policies to promote a more equitable and inclusive educational system, the question arises how to prepare teachers to accommodate an increasingly heterogeneous student population. As teachers´ competence concerning inclusion is grounded in their training (e.g. Baker-Ericzen et al. 2009), courses focussing on inclusion as an educational practice could reduce uncertainties (e.g. Carroll et al. 2003). However, inclusion not only depends on teachers´ competence but also on their attitudes. Teachers’ attitudes may be pivotal for the success of inclusive education as they can elicit differential expectations and behaviors, which can enhance or limit the successful inclusion of students with special educational needs (SEN). Avramidis and Norwich (2002) stressed the importance of training in the formation of positive attitudes toward the integration of students with SEN. Although several studies have reported positive changes in attitudes following a course on inclusive education (e.g. Shade & Stewart, 2001), the relationship between competence and attitudes is less clear. Therefore, this study aimed to evaluate the effect of a course on inclusive pedagogy on competence and attitudes and the association between these constructs. Data were collected for 69 preservice teachers enrolled in a course on inclusive pedagogy. Attitudes toward the inclusion of students with SEN were assessed before and after the course, using the German version of The Opinions Relative to Integration of Students with Disabilities questionnaire (ORI; Benoit & Bless, 2014). In addition, at the end of the course students indicated to what extend the course had helped them to gain knowledge, skills and strategies concerning teaching a heterogeneous student population. Results of a repeated measures 2×4 ANOVA, with time (pre vs. post) and attitude towards inclusion (ORI subscales) as within group factors showed a main effect for attitudes, reflecting variations between the subscale scores. A significant time × attitudes interaction effect indicated positive attitude changes over time, but only in the domain of educational and social progression of students with SEN. Results of a regression analysis indicated that, after controlling for pre-course attitude ratings, perceived competence predicted attitude ratings at the end of the course. This study shows that teacher training can positively affect both teachers´ competence and attitudes concerning inclusive education, whereby perceived competence contributed to positive attitude change. [less ▲]

Detailed reference viewed: 6 (1 UL)
Full Text
Peer Reviewed
See detailSocial participation and peer relationships of students with special educational needs
Pit-Ten Cate, Ineke UL

Scientific Conference (2018, September 06)

Detailed reference viewed: 4 (0 UL)
Peer Reviewed
See detail(In)flexible Language Use in a Year 4 Class in Luxembourg: Which Languages in Which Subjects?
Kirsch, Claudine UL; Degano, Sarah UL

Scientific Conference (2018, September 06)

The project described in this paper is part of the broader research project ‘Capitalizing on Linguistic Diversity in Education’ that investigates how multilingualism can be used as a resource for ... [more ▼]

The project described in this paper is part of the broader research project ‘Capitalizing on Linguistic Diversity in Education’ that investigates how multilingualism can be used as a resource for educational success and social well-being in Luxembourg. Research projects in preschool, Year 1 and Year 2 classes show that teachers have begun to draw on children’s semiotic repertoires (Kirsch 2017, Kirsch and Bes 2017). The present doctoral research project aims to understand the ways in which and the extent to which, first, Year 4 and Year 5 teachers in three schools address linguistic diversity and, second, children draw on their language repertoire to learn. The focus lies on the translanguaging practices of teachers and children. Translanguaging is a pillar of multilingual pedagogies which promote social equity and build on socio-constructivist learning theories (García & Li Wei 2014). The education system in Luxembourg is trilingual in Luxembourgish, German and French. The curriculum is based on monoglossic ideologies and a compartmentalised view of language teaching (De Korne 2012). The system is particularly challenging for the 63.5 percent of primary school children who do not speak Luxembourgish as a first language and underachieve compared to the Luxembourgish-speakers (Menje 2017). This paper draws its data from six days of observations and video-recordings of learning activities in seven French, eight Mathematics and two Arts lessons from September 2017 to January 2018 in one school characterised by the diversity of its intake and the high SES of the families. The data collection is still on-going. The participants are the two teachers of the Year 4 class and three focus children of Slovenian, French and Icelandic background. The thematic analysis focuses on the type of learning activities, the school subjects, the speech acts, the language use, and the pedagogical use of translanguaging. The preliminary findings show that almost all learning activities are teacher-led and that interactions are based on initiation-response-feedback sequences. The teachers systematically translanguage between a target language and the other curricula languages to scaffold learning, build relationships and manage the classroom. Both teachers and children create a specific space for German which is highly unusual in Luxembourg. The children rarely draw on their home languages unless these are the three languages of the country. While translanguaging is frequently used as a scaffold, it is neither transformative nor does it contribute to raising equal opportunities (García & Kleyn 2016). [less ▲]

Detailed reference viewed: 28 (17 UL)
Peer Reviewed
See detailInclusive multilingual pedagogies in a preschool in Luxembourg
Mortini, Simone UL

Scientific Conference (2018, September 04)

Detailed reference viewed: 10 (2 UL)
Full Text
Peer Reviewed
See detailHybrid MPI+OpenMP Implementation of eXtended Discrete Element Method
Mainassara Chekaraou, Abdoul Wahid UL; Rousset, Alban UL; Besseron, Xavier UL et al

in Proc. of the 9th Workshop on Applications for Multi-Core Architectures (WAMCA'18), part of 30th Intl. Symp. on Computer Architecture and High Performance Computing (SBAC-PAD 2018) (2018, September)

The Extended Discrete Element Method (XDEM) is a novel and innovative numerical simulation technique that ex- tends classical Discrete Element Method (DEM) (which simulates the motion of granular material ... [more ▼]

The Extended Discrete Element Method (XDEM) is a novel and innovative numerical simulation technique that ex- tends classical Discrete Element Method (DEM) (which simulates the motion of granular material), by additional properties such as the chemical composition, thermodynamic state, stress/strain for each particle. It has been applied successfully to numerous industries involving the processing of granular materials such as sand, rock, wood or coke [16], [17]. In this context, computational simulation with (X)DEM has become a more and more essential tool for researchers and scientific engineers to set up and explore their experimental processes. However, increasing the size or the accuracy of a model requires the use of High Performance Computing (HPC) platforms over a parallelized implementation to accommodate the growing needs in terms of memory and computation time. In practice, such a parallelization is traditionally obtained using either MPI (distributed memory computing), OpenMP (shared memory computing) or hybrid approaches combining both of them. In this paper, we present the results of our effort to implement an OpenMP version of XDEM allowing hybrid MPI+OpenMP simulations (XDEM being already parallelized with MPI). Far from the basic OpenMP paradigm and recommendations (which simply summarizes by decorating the main computation loops with a set of OpenMP pragma), the OpenMP parallelization of XDEM required a fundamental code re-factoring and careful tuning in order to reach good performance. There are two main reasons for those difficulties. Firstly, XDEM is a legacy code devel- oped for more than 10 years, initially focused on accuracy rather than performance. Secondly, the particles in a DEM simulation are highly dynamic: they can be added, deleted and interaction relations can change at any timestep of the simulation. Thus this article details the multiple layers of optimization applied, such as a deep data structure profiling and reorganization, the usage of fast multithreaded memory allocators and of advanced process/thread-to-core pinning techniques. Experimental results evaluate the benefit of each optimization individually and validate the implementation using a real-world application executed on the HPC platform of the University of Luxembourg. Finally, we present our Hybrid MPI+OpenMP results with a 15%-20% performance gain and how it overcomes scalability limits (by increasing the number of compute cores without dropping of performances) of XDEM-based pure MPI simulations. [less ▲]

Detailed reference viewed: 30 (6 UL)
Full Text
Peer Reviewed
See detailAn Imperialist Competitive Algorithm for a Real-World Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 23rd IEEE International Conference on Emerging Technologies and Factory Automation, Torino, Italy, September 4-7, 2018 (2018, September)

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these ... [more ▼]

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these techniques. The real-world problem addressed here is an extension of flexible job shop scheduling problem and is issued from the modern printing and boarding industry. The precedence between operations of each job is given by an arbitrary directed acyclic graph rather than a linear order. In this paper, we extend the traditional FJSP solutions representation to address the parallel operations. We propose an imperialist competitive algorithm for the problem. Several instances are used for the experiments and the results show that, for the considered instances, the proposed algorithm is faster and found better or equal solutions compared to the state-of-the-art algorithms. [less ▲]

Detailed reference viewed: 53 (14 UL)
Full Text
See detailAn equation-free, nested, concurrent multiscale approach without scale-separation
Beex, Lars UL; Kerfriden, Pierre

Scientific Conference (2018, September)

Detailed reference viewed: 30 (0 UL)
See detailDie Vorhersage von Selbstkontrolle durch Need for Cognition. Generalisierbarkeit und Erklärungsansätze
Grass, Julia; Krieger, Florian UL; Paulus, P. et al

Scientific Conference (2018, September)

Detailed reference viewed: 8 (1 UL)
Full Text
Peer Reviewed
See detailModel-driven Run-time Enforcement of Complex Role-based Access Control Policies
Ben Fadhel, Ameni UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceeding of the 2018 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE ’18) (2018, September)

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several ... [more ▼]

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several models have been proposed to specify complex RBAC policies. However, existing approaches for policy enforcement do not fully support all the types of policies that can be expressed in these models, which hinders their adoption among practitioners. In this paper we propose a model-driven enforcement framework for complex policies captured by GemRBAC+CTX, a comprehensive RBAC model proposed in the literature. We reduce the problem of making an access decision to checking whether a system state (from an RBAC point of view), expressed as an instance of the GemRBAC+CTX model, satisfies the constraints corresponding to the RBAC policies to be enforced at run time. We provide enforcement algorithms for various types of access requests and events, and a prototype tool (MORRO) implementing them. We also show how to integrate MORRO into an industrial Web application. The evaluation results show the applicability of our approach on a industrial system and its scalability with respect to the various parameters characterizing an AC configuration. [less ▲]

Detailed reference viewed: 74 (11 UL)
Full Text
Peer Reviewed
See detailA Closer Look at Real-World Patches
Liu, Kui UL; Kim, Dongsun UL; Koyuncu, Anil UL et al

Scientific Conference (2018, September)

Bug fixing is a time-consuming and tedious task. To reduce the manual efforts in bug fixing, researchers have presented automated approaches to software repair. Unfortunately, recent studies have shown ... [more ▼]

Bug fixing is a time-consuming and tedious task. To reduce the manual efforts in bug fixing, researchers have presented automated approaches to software repair. Unfortunately, recent studies have shown that the state-of-the-art techniques in automated repair tend to generate patches only for a small number of bugs even with quality issues (e.g., incorrect behavior and nonsensical changes). To improve automated program repair (APR) techniques, the community should deepen its knowledge on repair actions from real-world patches since most of the techniques rely on patches written by human developers. Previous investigations on real-world patches are limited to statement level that is not sufficiently fine-grained to build this knowledge. In this work, we contribute to building this knowledge via a systematic and fine-grained study of 16,450 bug fix commits from seven Java open-source projects. We find that there are opportunities for APR techniques to improve their effectiveness by looking at code elements that have not yet been investigated. We also discuss nine insights into tuning automated repair tools. For example, a small number of statement and expression types are recurrently impacted by real-world patches, and expression-level granularity could reduce search space of finding fix ingredients, where previous studies never explored. [less ▲]

Detailed reference viewed: 6 (1 UL)
Full Text
Peer Reviewed
See detailOn the impact of tokenizer and parameters on N-gram based Code Analysis
Jimenez, Matthieu UL; Cordy, Maxime UL; Le Traon, Yves UL et al

Scientific Conference (2018, September)

Recent research shows that language models, such as n-gram models, are useful at a wide variety of software engineering tasks, e.g., code completion, bug identification, code summarisation, etc. However ... [more ▼]

Recent research shows that language models, such as n-gram models, are useful at a wide variety of software engineering tasks, e.g., code completion, bug identification, code summarisation, etc. However, such models require the appropriate set of numerous parameters. Moreover, the different ways one can read code essentially yield different models (based on the different sequences of tokens). In this paper, we focus on n- gram models and evaluate how the use of tokenizers, smoothing, unknown threshold and n values impact the predicting ability of these models. Thus, we compare the use of multiple tokenizers and sets of different parameters (smoothing, unknown threshold and n values) with the aim of identifying the most appropriate combinations. Our results show that the Modified Kneser-Ney smoothing technique performs best, while n values are depended on the choice of the tokenizer, with values 4 or 5 offering a good trade-off between entropy and computation time. Interestingly, we find that tokenizers treating the code as simple text are the most robust ones. Finally, we demonstrate that the differences between the tokenizers are of practical importance and have the potential of changing the conclusions of a given experiment. [less ▲]

Detailed reference viewed: 35 (4 UL)
Full Text
Peer Reviewed
See detailParallel and hybrid soft-thresholding algorithms with line search for sparse nonlinear regression
Yang, Yang UL; Pesavento, Marius; Chatzinotas, Symeon UL et al

in Proc. 26th European Signal Processing Conference (2018, September)

Detailed reference viewed: 138 (19 UL)
Full Text
Peer Reviewed
See detailA Contribution to Cyber-Physical Systems Security: an Event-based Attack-tolerant Control Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Proceedings of 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2018 (2018, August 29)

In the present paper, a model-based fault/attack tolerant scheme is proposed to deal with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback ... [more ▼]

In the present paper, a model-based fault/attack tolerant scheme is proposed to deal with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback control based on an event-triggered framework is given with control synthesis and condition on the switching time. An event-based implementation is proposed in order to achieve novel security strategy. Observer and controller gains are deduced by solving su cient Bilinear Matrix Inequality (BMI) condition. Simulation results on a real-time laboratory three tank system are given to show the attack-tolerant control ability despite data deception attacks on both actuators and sensors. [less ▲]

Detailed reference viewed: 92 (13 UL)
Full Text
Peer Reviewed
See detailCategories of coalgebras for modal extensions of Łukasiewicz logic
Teheux, Bruno UL; Kurz, Alexander

Scientific Conference (2018, August 27)

The category of complete and completely distributive Boolean algebras with complete operators is dual to the category of frames. We lift this duality to the category of complete and completely ... [more ▼]

The category of complete and completely distributive Boolean algebras with complete operators is dual to the category of frames. We lift this duality to the category of complete and completely distributive MV-algebras with complete operators. [less ▲]

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailSymbol-Level Precoding Design for Max-Min SINR in Multiuser MISO Broadcast Channels
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL; Ottersten, Björn UL

in International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata 25-28 June 2018 (2018, August 27)

In this paper, we address the symbol level precoding (SLP) design problem under max-min SINR criterion in the downlink of multiuser multiple-input single-output (MISO) channels. First, we show that the ... [more ▼]

In this paper, we address the symbol level precoding (SLP) design problem under max-min SINR criterion in the downlink of multiuser multiple-input single-output (MISO) channels. First, we show that the distance preserving constructive interference regions (DPCIR) are always polyhedral angles (shifted pointed cones) for any given constellation point with unbounded decision region. Then we prove that any signal in a given unbounded DPCIR has a norm larger than the norm of the corresponding vertex if and only if the convex hull of the constellation contains the origin. Using these properties, we show that the power of the noiseless received signal lying on an unbounded DPCIR is an strictly increasing function of two parameters. This allows us to reformulate the originally non-convex SLP max-min SINR as a convex optimization problem. We discuss the loss due to our proposed convex reformulation and provide some simulation results. [less ▲]

Detailed reference viewed: 22 (7 UL)
Full Text
Peer Reviewed
See detailWhen the exception becomes the rule … When the margins become the center …
Schafer, Valerie UL

Scientific Conference (2018, August 23)

This contribution invited participants of the Summer school to critically reflect upon centers and peripheries in Internet history, not only from a geographical perspective , but also from a narrative ... [more ▼]

This contribution invited participants of the Summer school to critically reflect upon centers and peripheries in Internet history, not only from a geographical perspective , but also from a narrative standpoint [less ▲]

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailKnowledge Discovery Approach from Blockchain, Crypto-currencies, and Financial Stock Exchanges
Lagraa, Sofiane UL; Charlier, Jérémy Henri J. UL; State, Radu UL

Poster (2018, August 20)

Last few years have witnessed a steady growth in interest on crypto-currencies and blockchains. They are receiving considerable interest from industry and the research community, the most popular one ... [more ▼]

Last few years have witnessed a steady growth in interest on crypto-currencies and blockchains. They are receiving considerable interest from industry and the research community, the most popular one being Bitcoin. However, these crypto-currencies are so far relatively poorly analyzed and investigated. Recently, many solutions, mostly based on ad-hoc engineered solutions, are being developed to discover relevant analysis from crypto-currencies, but are not sufficient to understand behind crypto-currencies. In this paper, we provide a deep analysis of crypto-currencies by proposing a new knowledge discovery approach for each crypto-currency, across crypto-currencies, blockchains, and financial stocks. The novel approach is based on a conjoint use of data mining algorithms on imbalanced time series. It automatically reports co-variation dependency patterns of the time series. The experiments on the public crypto-currencies and financial stocks markets data also demonstrate the usefulness of the approach by discovering the different relationships across multiple time series sources and insights correlations behind crypto-currencies. [less ▲]

Detailed reference viewed: 20 (0 UL)
Full Text
See detailA Dynamic Associative Memory for Distant Reading
Kamlovskaya, Ekaterina UL; Schommer, Christoph UL; Sirajzade, Joshgun UL

in International Conference on Artificial Intelligence Humanities, Book of Abstracts (2018, August 16)

Detailed reference viewed: 20 (2 UL)
Full Text
See detailMind and Language. AI in an Example of Similar Patterns of Luxembourgish Language
Sirajzade, Joshgun UL; Schommer, Christoph UL

in International Conference on Artificial Intelligence Humanities, Book of Abstracts (2018, August 16)

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailAutomated Extraction of Semantic Legal Metadata Using Natural Language Processing
Sleimi, Amin UL; Sannier, Nicolas UL; Sabetzadeh, Mehrdad UL et al

in the 26th IEEE International Requirements Engineering Conference, Banff, Alberta, 20-24 August 2018 (2018, August)

[Context] Semantic legal metadata provides information that helps with understanding and interpreting the meaning of legal provisions. Such metadata is important for the systematic analysis of legal ... [more ▼]

[Context] Semantic legal metadata provides information that helps with understanding and interpreting the meaning of legal provisions. Such metadata is important for the systematic analysis of legal requirements. [Objectives] Our work is motivated by two observations: (1) The existing requirements engineering (RE) literature does not provide a harmonized view on the semantic metadata types that are useful for legal requirements analysis. (2) Automated support for the extraction of semantic legal metadata is scarce, and further does not exploit the full potential of natural language processing (NLP). Our objective is to take steps toward addressing these limitations. [Methods] We review and reconcile the semantic legal metadata types proposed in RE. Subsequently, we conduct a qualitative study aimed at investigating how the identified metadata types can be extracted automatically. [Results and Conclusions] We propose (1) a harmonized conceptual model for the semantic metadata types pertinent to legal requirements analysis, and (2) automated extraction rules for these metadata types based on NLP. We evaluate the extraction rules through a case study. Our results indicate that the rules generate metadata annotations with high accuracy. [less ▲]

Detailed reference viewed: 92 (8 UL)
Full Text
Peer Reviewed
See detailEnergy-Efficient Resource Optimization with Wireless Power Transfer for Secure NOMA Systems
Lei, Lei UL; Chang, Zheng; Hu, Yun et al

in IEEE/CIC International Conference on Communications in China (ICCC 2018) (2018, August)

Detailed reference viewed: 6 (0 UL)
Peer Reviewed
See detailFrom Epics to Novelization : Conceptualizing Science Education Curricula and Practices through a historical lens
Te Heesen, Kerstin UL; Siry, Christina UL; Schreiber, Catherina

Scientific Conference (2018, August)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailResource Allocation and Relay Selection for Multi-User OFDM-Based Cooperative Networks with SWIPT
Gautam, Sumit UL; Lagunas, Eva UL; Chatzinotas, Symeon UL et al

Scientific Conference (2018, August)

In this paper, we investigate resource allocation and relay selection in a two-hop relay-assisted multi-user network, where the end users support Simultaneous Wireless Information and Power Transfer ... [more ▼]

In this paper, we investigate resource allocation and relay selection in a two-hop relay-assisted multi-user network, where the end users support Simultaneous Wireless Information and Power Transfer (SWIPT). In particular, we consider single source assisted by a set of spatially distributed relays able to amplify-and-forward orthogonal frequency division multiplexing (OFDM) signals carrying both data and power at the same time. The users are assumed to implement a power splitting technique where the received signal is orthogonally split in two streams of different power levels, where one signal stream is sent to the power harvesting module while the other is converted to baseband for information decoding. We aim at optimizing the users’ power splitting ratios as well as the relay, carrier and power assignment so that the end-users’ sum-rate is maximized subject to transmitted and harvested power constraints. Such joint optimization is combinatorial in nature with a non-convex structure. Therefore, we present a sub-optimal low complex solution based on the harmonic mean of the two-hop relay channel coefficients. Simulation results reveal that the proposed algorithm provides significant performance gains in comparison with a semi-random resource allocation and relay selection approach. [less ▲]

Detailed reference viewed: 65 (14 UL)
Peer Reviewed
See detailTapping the Potential of Diverse Founding Teams for Firm Growth: The Role of New Venture Activities
Tryba, Anne UL; Patzelt, Holger; Breugst, Nicola

Scientific Conference (2018, August)

Detailed reference viewed: 39 (0 UL)
Full Text
Peer Reviewed
See detailBlockchain-Based, Decentralized Access Control for IPFS
Steichen, Mathis UL; Fiz Pontiveros, Beltran UL; Norvill, Robert UL et al

in The 2018 IEEE International Conference on Blockchain (Blockchain-2018) (2018, July 30)

Large files cannot be efficiently stored on blockchains. On one hand side, the blockchain becomes bloated with data that has to be propagated within the blockchain network. On the other hand, since the ... [more ▼]

Large files cannot be efficiently stored on blockchains. On one hand side, the blockchain becomes bloated with data that has to be propagated within the blockchain network. On the other hand, since the blockchain is replicated on many nodes, a lot of storage space is required without serving an immediate purpose, especially if the node operator does not need to view every file that is stored on the blockchain. It furthermore leads to an increase in the price of operating blockchain nodes because more data needs to be processed, transferred and stored. IPFS is a file sharing system that can be leveraged to more efficiently store and share large files. It relies on cryptographic hashes that can easily be stored on a blockchain. Nonetheless, IPFS does not permit users to share files with selected parties. This is necessary, if sensitive or personal data needs to be shared. Therefore, this paper presents a modified version of the InterPlanetary Filesystem (IPFS) that leverages Ethereum smart contracts to provide access controlled file sharing. The smart contract is used to maintain the access control list, while the modified IPFS software enforces it. For this, it interacts with the smart contract whenever a file is uploaded, downloaded or transferred. Using an experimental setup, the impact of the access controlled IPFS is analyzed and discussed. [less ▲]

Detailed reference viewed: 19 (14 UL)
Full Text
See detailUncertainty Quantification in Finite Element Models:Application to SoftTissue Biomechanics
Hauseux, Paul UL; Hale, Jack UL; Bulle, Raphaël UL et al

Scientific Conference (2018, July 23)

We present probabilistic approaches aiming at the selection of the best constitutive model and to identify their parameters from experimental data. These parameters are always associated with some degree ... [more ▼]

We present probabilistic approaches aiming at the selection of the best constitutive model and to identify their parameters from experimental data. These parameters are always associated with some degree of uncertainty. It is therefore important to study how this statistical uncertainty in parameters propagates to a safety-critical quantity of interest in the output of a model. Efficient Monte Carlo methods based on variance reduction techniques (Sensitivity Derivatives Monte Carlo methods [Hauseux et al. 2017] and MultiLevel Monte Carlo [Giles 2015] methods) are employed to propagate this uncertainty for both random variables and random fields. Inverse and forward problems are strongly connected. In a bayesian setting [Matthies et al. 2017], developing methods that reduce the number of evaluations of the forward model to an absolute minimum to achieve convergence is crucial for tractable computations. Numerical results in the context of soft tissue biomechanics are presented and discussed. [less ▲]

Detailed reference viewed: 47 (0 UL)
See detailThe Challenge of Situating Sacred Wind Music on the Example of Laurent Menager (1835-1902)
Duhr, Marlène UL

Scientific Conference (2018, July 20)

Detailed reference viewed: 15 (1 UL)
Full Text
Peer Reviewed
See detailWind Music and Terminology. A Critical Review of an Immanent Phenomenon
Sagrillo, Damien UL

in Sagrillo, Damien (Ed.) Conference Guide (2018, July 20)

During the last decades of wind music research, a few publications focussed on terminology. Elmar Walter wrote a dissertation about Blas- und Bläsermusik. In his talk at Oberwölz, Raoul Camus stated: “A ... [more ▼]

During the last decades of wind music research, a few publications focussed on terminology. Elmar Walter wrote a dissertation about Blas- und Bläsermusik. In his talk at Oberwölz, Raoul Camus stated: “A band is a Band is Band”. However, he seemed to hesitate because he referred to Joseph Manfredo who, in his awarded dissertation, asked: “What is a Band?” In my lecture, I will bring this topic to the fore again and deal with the terminology used to designate a group of wind instruments, and I will come up with some suggestions for definitions. I will try to find an answer to questions such as: When is a band a symphonic band, or even a symphonic wind ensemble or “only” a community band? When I say: “I will try to find an answer”, I must admit that I cannot guarantee to find an acceptable one: Are these terms filled with a substance – what makes the difference? – or are they simply a grandiloquent absurdity? Do pretentious terms refer to “better” musicians or music? I will present my paper in English, but I will also deal with band designations in German, in French and my native language – Luxembourgish. [less ▲]

Detailed reference viewed: 95 (1 UL)
Full Text
Peer Reviewed
See detailStochastic Optimum Energy Management for Advanced Transportation Network
Sajadi Alamdari, Seyed Amin UL; Voos, Holger UL; Darouach, Mohamed

in 15th IFAC Symposium on Control in Transportation Systems CTS 2018 (2018, July 19)

Smart and optimal energy consumption in electric vehicles has high potential to improve the limited cruising range on a single battery charge. The proposed concept is a semi-autonomous ecological advanced ... [more ▼]

Smart and optimal energy consumption in electric vehicles has high potential to improve the limited cruising range on a single battery charge. The proposed concept is a semi-autonomous ecological advanced driver assistance system which predictively plans for a safe and energy-efficient cruising velocity profile autonomously for battery electric vehicles. However, high entropy in transportation network leads to a challenging task to derive a computationally efficient and tractable model to predict the traffic flow. Stochastic optimal control has been developed to systematically find an optimal decision with the aim of performance improvement. However, most of the developed methods are not real-time algorithms. Moreover, they are mainly risk-neutral for safety-critical systems. This paper investigates on the real-time risk-sensitive nonlinear optimal control design subject to safety and ecological constraints. This system improves the efficiency of the transportation network at the microscopic level. Obtained results demonstrate the effectiveness of the proposed method in terms of states regulation and constraints satisfaction. [less ▲]

Detailed reference viewed: 34 (2 UL)
Full Text
Peer Reviewed
See detailConclusions générales: La Cour Constitutionnelle en tant qu'autorité de dialogue
Gerkrath, Jörg UL

in Gerkrath, Jörg (Ed.) Les 20 ans de la Cour Constitutionnelle: Trop jeune pour mourir? (2018, July 17)

Detailed reference viewed: 42 (4 UL)
Peer Reviewed
See detailHow working conditions influence work-related anger
Steffgen, Georges UL; Sischka, Philipp UL

Scientific Conference (2018, July 13)

Detailed reference viewed: 24 (6 UL)
Peer Reviewed
See detailGlobal inequalities 1980-2050: a microdata oriented simulation – Worldsim
Chauvel, Louis UL; Bar-Haim, Eyal UL; Hartung, Anne UL et al

Scientific Conference (2018, July 13)

Former global inequality models lack realistic features of the population (age, gender, education, behavior). Worldsim develops a panel sample based simulation of the world population until 2050, relying ... [more ▼]

Former global inequality models lack realistic features of the population (age, gender, education, behavior). Worldsim develops a panel sample based simulation of the world population until 2050, relying on UN, Cepii, etc, big data aggregated forecasts, that we individually disaggregate. The simulation confirms the decline of the world's Gini index, but underlines several paradoxes in the socioecodemography of the world, with increasing gaps between resources and needs. Compared to more standard socioeconomic simulations of inequalities, we provide more substantial characterization of the population, and compared to other global simulations, we capture the dimensions of social divergences between social groups and geographic regions. [less ▲]

Detailed reference viewed: 43 (2 UL)
Full Text
Peer Reviewed
See detailPsychological contact violation or basic need frustration? Psychological mechanisms behind the effects of workplace bullying.
Sischka, Philipp UL; Steffgen, Georges UL

Scientific Conference (2018, July 12)

Workplace bullying is a serious phenomenon that has serious detrimental effects on victim’s health, attitudes, and work-related behavior. However, research that examines the mechanisms behind these ... [more ▼]

Workplace bullying is a serious phenomenon that has serious detrimental effects on victim’s health, attitudes, and work-related behavior. However, research that examines the mechanisms behind these relations is still sparse. Two theories that may explain the links between workplace bullying and various negative outcomes are social exchange theory and self-determination theory. Drawing on these theories, we hypothesized that the relationship between workplace bullying and various outcomes is mediated by perceptions of psychological contract violation and the frustration of basic psychological needs (i.e. autonomy, competence, relatedness). Therefore, the aim of our study was to test these mediators separately and simultaneously to see whether they have an incremental mediation effect between workplace bullying and well-being, work satisfaction, engagement, performance, burnout, workplace deviance and turnover intentions. An online survey design was employed and data were collected among U.S. employees. The final sample consists of 1,408 respondents (56.6% females, n=798, age: M=37.3, SD =10.4). Single mediation analysis within a structural equation modeling framework revealed that psychological contract violation acted as a mediator for all outcome variables. Furthermore, basic need frustrations were also meaningfully mediators between workplace bullying and all outcomes, but different need frustration were differently linked with them. The multiple mediation analyses mainly supported the hypothesized importance of the mediators for the different outcomes. The study findings advance the field through identifying the most important mediators between workplace bullying and several outcome variables guiding possible interventions. [less ▲]

Detailed reference viewed: 46 (3 UL)
Peer Reviewed
See detailThe Reasons of Older people for the Use or Non-use of Assistive Technologies:
A Systematic Review of Qualitative Studies
Abrilahij, Afsaneh UL; Boll, Thomas UL

Scientific Conference (2018, July 06)

The baby boomer generation is aging and the proportion of older people in the population is increasing. While people age, functional, cognitive, and physical problems increase. Assistive technology (AT ... [more ▼]

The baby boomer generation is aging and the proportion of older people in the population is increasing. While people age, functional, cognitive, and physical problems increase. Assistive technology (AT) can help to overcome some activity limitations relevant to aging. Although ATs have potential benefits (e.g., to reduce the burden of caregivers, to increase independence), their usage rate is still low. Whereas several reviews of quantitative studies on factors of ATs use already exist, a systematic review of qualitative research about AT use is still missing. The aim of the current review is to provide more differentiated answers about what makes some older people use ATs while others not. Based on systematic literature searches in PsycINFO, MEDLINE, and Google Scholar databases 18 relevant papers were identified according to our selection criteria. These studies were based on to self-reported reasons of older people for using or not-using diverse types of ATs designed for many different activities. We classified the key reasons as referring to three aspects: attributes of “potential technology users”, “context”, and “technology”. Perceived usefulness and attitudes towards use were the most common “personal” reasons and social impact by significant others was the most common “contextual” reason, and technology design was the most common “technological” reason influencing use or non-use of ATs. We discussed the identified reasons in relation to the major models of developmental self-regulation and action-theoretical approaches to development in age. Based on the current review, we generated methodological and theoretical recommendations for future research and for practical applications. [less ▲]

Detailed reference viewed: 36 (9 UL)
Peer Reviewed
See detailComparative Evaluation of Models of Assistive Technologies’ Use
Abrilahij, Afsaneh UL; Boll, Thomas UL

Scientific Conference (2018, July 06)

Many older people have functional limitations and are at risk of losing their ability to live autonomously. Assistive Technology (AT) could help to reduce that risk. However, many older people don’t use ... [more ▼]

Many older people have functional limitations and are at risk of losing their ability to live autonomously. Assistive Technology (AT) could help to reduce that risk. However, many older people don’t use ATs. Our presentation reviews existing models of ATs use, their applicability to specific types of AT, predictive value, fundamental elements, and critiques of such models. In systematic literature searches in PsycINFO, MEDLINE, and Google Scholar 46 papers were identified that met our inclusion criteria. 32 papers covered models of ATs use, applicability to special types of ATs, components of models, and their predictive value. 14 papers cover criticisms of models of AT use. We classified the models into two groups: The first included 11 models focusing on individuals’ mental states (e.g., beliefs, desires) as factors explaining ATs use; the second included 22 models that also considered contextual factors (e.g., social influence, physical environment) in addition to individuals’ mental states. Across both groups the most frequently included explanatory components were subjective norm and personal attitudes towards AT use, followed by perceived usefulness, perceived ease of use and then intention to use. Models were most frequently applied to information technologies followed by application to socially assistive robots. Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) and an extended version of Technology Acceptance Model showed the highest amount of explained variance in intention to use (56-74%) and an extended model of UTAUT in actual use of ATs (64%). We conclude with recommendations for further improvement of AT use models. [less ▲]

Detailed reference viewed: 41 (20 UL)
Peer Reviewed
See detailNational, European or Cosmopolitan identification? Insights from the heart of Europe
Murdock, Elke UL; Kraus, Xavier; Ferring, Dieter UL

Scientific Conference (2018, July 04)

Trilingual Luxembourg shares borders with three European countries and has a foreign population percentage of 47%. Given this multicultural context we wanted to explore firstly the national, supra ... [more ▼]

Trilingual Luxembourg shares borders with three European countries and has a foreign population percentage of 47%. Given this multicultural context we wanted to explore firstly the national, supra-national or non-national identification among the native population, secondly their stereotypical judgements of EU Member State countries and attitudes towards the European Union and thirdly identify predictors for cosmopolitanism. With a sentence completion task we investigated the reasons for a feeling of belonging to a national entity or lack of it. All 255 participants in our study (Mage = 38.8 SD = 10.7, 59% female) had Luxembourgish citizenship. Forty percent provided a national self-identification (“Luxembourger”), 36% supra-national identification (“European”) and 24% a non-national identification (“cosmopolitan”). These three groups did not differ in terms of stereotypical assessments of the EU Member states regarding warmth and competence (stereotype content model). Yet, when asked about their own assessment of Luxembourg, differences occurred with supra- and non-national identifiers providing significantly lower ratings under the self-rating condition. The three groups differed in their attitude towards the European Union. Low commitment (MEIM subscale), high contact with non-natives and group self-identification predicted cosmopolitanism. There were no effects in terms of self-efficacy, age, gender or socioeconomic status. The content analysis of the sentence completion exercise revealed that affective components dominated arguments for belonging whereas cognitive reasoning governed the statements expressing a lack of belonging. The implications of these findings among natives within the multicultural context of Luxembourg will be discussed – against the rise of nationalism in many European countries and beyond. [less ▲]

Detailed reference viewed: 26 (1 UL)
Full Text
See detailAn n-ary generalization of the concept of distance
Kiss, Gergely; Marichal, Jean-Luc UL; Teheux, Bruno UL

Scientific Conference (2018, July 03)

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailApprentissage formel, non-formel et informel de musique dans la communauté. Comment correspondent-ils
Sagrillo, Damien UL

Scientific Conference (2018, July 02)

Tandis que le concept de l’apprentissage formel, non-formel et informel est supposé connu en ce qui concerne ses orientations générales, il en est moins pour la pédagogie musicale. Sa vue sous différents ... [more ▼]

Tandis que le concept de l’apprentissage formel, non-formel et informel est supposé connu en ce qui concerne ses orientations générales, il en est moins pour la pédagogie musicale. Sa vue sous différents angles, notamment sous l’optique de la musique pour amateurs, fera l’objet de ma communication. De l'autre côté, le concept de musique dans la communauté est emprunté de l’anglais « community music ». Celui-ci signifie que la pratique des amateurs de musique est fondée sur des activités de loisir. Mais il existe bien d’autres volets qui pourraient être regroupés sous la perspective d’une musique dans ou par la communauté. D’abord il semble qu’il est totalement dissocié des méthodes traditionnelles d’apprentissage musical de nature formelle ou non-formelle. Mais il serait plutôt lié à une éducation de nature informelle qui, cependant, ne peut pas être mise en relation avec l’autodidactie. Des approches récentes la voient en rapport avec l’inclusion et la participation réalisée dans un milieu associatif et comme moyen de surmonter l’obstacle qui existe entre la pédagogie musicale traditionnelle et les exigences de la communauté musicale. De l’autre côté, la musique dans la communauté se présente comme un contre-projet face à la haute culture musicale professionnalisée (Lichtinger 2013). En ce qui concerne le terme de « community music », il n’existe pas de traduction littérale française. Cependant, il est parfaitement approprié de retracer le processus d’une éducation musicale des jeunes qui commence souvent par une phase amateur pour mener par après à la vie professionnelle pour les plus doués, soit pour décrire la formation et la vie musicale des jeunes amateurs, soit pour retracer la vie de musicien amateur tout au long de la vie de ces musicophiles. Dans ma communication, je présenterai des définitions pour chacun des trois aspects de formation musicale n’ignorant pas que surtout pour l’éducation musicale de type non-formel il n’existe pas de consensus. Ensuite, je mettrai en relation les deux concepts – i.e. celui des trois aspects de formation musicale et celui de la musique dans la communauté – en donnant des exemples d’une pratique musicale très répandue, à savoir la musique à vent (et/ou chant choral) pour enfin comparer des modèles d’apprentissage musical tels qu’ils existent et sont appliqués dans différents pays européens liés à cette tradition. [less ▲]

Detailed reference viewed: 44 (0 UL)
Full Text
Peer Reviewed
See detailOn associative, idempotent, symmetric, and nondecreasing operations
Devillet, Jimmy UL; Teheux, Bruno UL

Scientific Conference (2018, July 02)

see attached file

Detailed reference viewed: 13 (0 UL)
Full Text
See detailAssociative and quasitrivial operations on finite sets: characterizations and enumeration
Couceiro, Miguel; Devillet, Jimmy UL; Marichal, Jean-Luc UL

Scientific Conference (2018, July 02)

We investigate the class of binary associative and quasitrivial operations on a given finite set. Here the quasitriviality property (also known as conservativeness) means that the operation always outputs ... [more ▼]

We investigate the class of binary associative and quasitrivial operations on a given finite set. Here the quasitriviality property (also known as conservativeness) means that the operation always outputs one of its input values. We also examine the special situations where the operations are commutative and nondecreasing, in which cases the operations reduce to discrete uninorms (which are discrete fuzzy connectives playing an important role in fuzzy logic). Interestingly, associative and quasitrivial operations that are nondecreasing are characterized in terms of total and weak orderings through the so-called single-peakedness property introduced in social choice theory by Duncan Black. We also address and solve a number of enumeration issues: we count the number of binary associative and quasitrivial operations on a given finite set as well as the number of those operations that are commutative and/or nondecreasing. [less ▲]

Detailed reference viewed: 31 (2 UL)
Full Text
Peer Reviewed
See detailThe Multicultural Ideology Scale (MIS): Factor structure and measurement invariance
Stogianni, Maria UL; Murdock, Elke UL

Scientific Conference (2018, July 02)

The concept of multiculturalism has been widely used in cross-cultural research to describe positive attitudes towards a culturally plural society and practices that support cultural diversity. To date ... [more ▼]

The concept of multiculturalism has been widely used in cross-cultural research to describe positive attitudes towards a culturally plural society and practices that support cultural diversity. To date, attitudes towards multiculturalism among majority and minority group members have been assessed with the same instruments. However, there is little psychometric evidence that these measures operate appropriately in various cultural contexts. The purpose of the present study was to investigate the factor structure of the Multicultural Ideology Scale (MIS; Berry & Kalin, 1995) and test its measurement invariance across different language versions and ethnic groups. The entire sample consisted of 1572 adolescents and adults in Luxembourg, including native majority members (N = 693) and immigrants from diverse ethnic backgrounds (N = 879). Participants were given the option to complete the questionnaire in one of the following languages: English, German or French. The unidimensional model of multicultural ideology did not show an acceptable fit of the data across all language versions of the MIS. Exploratory and confirmatory factorial analyses revealed a two-factor structure, which was partially invariant across two different language versions (English and German). The two factors reflected positive and negative attitudes towards cultural diversity respectively. Subsequent multigroup confirmatory factor analyses supported configural and metric invariance across majority and minority group members. Scalar invariance was not established, indicating that respondents across these two groups conceptualize multiculturalism in different ways. Implications of these findings are discussed together with methodological issues concerning the assessment of measurement invariance. [less ▲]

Detailed reference viewed: 42 (13 UL)
Full Text
Peer Reviewed
See detailTest Case Prioritization for Acceptance Testing of Cyber Physical Systems: A Multi-Objective Search-Based Approach
Shin, Seung Yeob UL; Nejati, Shiva UL; Sabetzadeh, Mehrdad UL et al

in Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'18) (2018, July)

Acceptance testing validates that a system meets its requirements and determines whether it can be sufficiently trusted and put into operation. For cyber physical systems (CPS), acceptance testing is a ... [more ▼]

Acceptance testing validates that a system meets its requirements and determines whether it can be sufficiently trusted and put into operation. For cyber physical systems (CPS), acceptance testing is a hardware-in-the-loop process conducted in a (near-)operational environment. Acceptance testing of a CPS often necessitates that the test cases be prioritized, as there are usually too many scenarios to consider given time constraints. CPS acceptance testing is further complicated by the uncertainty in the environment and the impact of testing on hardware. We propose an automated test case prioritization approach for CPS acceptance testing, accounting for time budget constraints, uncertainty, and hardware damage risks. Our approach is based on multi-objective search, combined with a test case minimization algorithm that eliminates redundant operations from an ordered sequence of test cases. We evaluate our approach on a representative case study from the satellite domain. The results indicate that, compared to test cases that are prioritized manually by satellite engineers, our automated approach more than doubles the number of test cases that fit into a given time frame, while reducing to less than one third the number of operations that entail the risk of damage to key hardware components. [less ▲]

Detailed reference viewed: 153 (18 UL)
Full Text
Peer Reviewed
See detailSome basic reflections on voice-controlled natural language human-Siri talk: Hey Siri, you are challenging the interface between the oral and the written.
Arend, Béatrice UL; Fixmer, Pierre UL

in Proceedings 10th International Conference on Education and New Learning Technologies (2018, July)

Detailed reference viewed: 20 (0 UL)
Full Text
See detailPeut-on se moquer de tout ? L'étendue de la liberté d'expression face au sentiment religieux
Gerkrath, Jörg UL

in Institut Grand Ducal (Ed.) Actes de la Section des sciences morales et politiques (2018, July)

Detailed reference viewed: 84 (33 UL)
Full Text
Peer Reviewed
See detailSuccessive convex approximation algorithms for sparse signal estimation with nonconvex regularizations
Yang, Yang UL; Pesavento, Marius; Chatzinotas, Symeon UL et al

in Proc. The 10th IEEE Sensor Array and Multichannel Signal Processing Workshop (2018, July)

Detailed reference viewed: 149 (22 UL)
See detailBody Mass Index and Social Interactions from Adolescence to Adulthood
Joxhe, Majlinda UL; Corrado, Luisa; Distante, Roberta

Scientific Conference (2018, July)

This paper proposes a novel approach to address identi fication of social endogenous e ects by generalizing the methods commonly used in standard dynamic panel data analysis to the peer e ffects setting ... [more ▼]

This paper proposes a novel approach to address identi fication of social endogenous e ects by generalizing the methods commonly used in standard dynamic panel data analysis to the peer e ffects setting. Our methodology shows to can estimate peer e ects free of the \re "reflection problem" in a dynamic context where individual- and group-specifi c unobservable e ects are controlled for. We apply a dynamic linear-in-means model for analyzing the importance of social ties for the body-weight-related behavior of US youth. We show that the main drivers of body-weight-related behavior are habituation and imitation eff ects. For individuals who were normal-weight during adolescence habits seem to be slightly enforced by imitative behavior: in this instance, for an 1% increase in average BMI we expect about 0:6% increase in individual BMI, whereas the coe cient for past BMI is 0:4%. Imitation e ffects, instead, explain most of the variation in the Body Mass Index of individuals who were overweight and obese during adolescence, signaling the presence of a social multiplier e ffect: for these two groups an increase of 1% in average BMI leads, respectively, to an increase of 0:2% and 0:4% in current BMI. [less ▲]

Detailed reference viewed: 9 (1 UL)
Full Text
Peer Reviewed
See detailEfficient Minimum-Energy Scheduling with Machine-Learning based Predictions for Multiuser MISO Systems
Lei, Lei UL; Vu, Thang Xuan UL; You, Lei et al

in 2018 IEEE International Conference on Communications (ICC) (2018, July)

Detailed reference viewed: 7 (2 UL)
Full Text
Peer Reviewed
See detailGenerating Multi-Categorical Samples with Generative Adversarial Networks
Camino, Ramiro Daniel UL; Hammerschmidt, Christian UL; State, Radu UL

Scientific Conference (2018, July)

We propose a method to train generative adversarial networks on mutivariate feature vectors representing multiple categorical values. In contrast to the continuous domain, where GAN-based methods have ... [more ▼]

We propose a method to train generative adversarial networks on mutivariate feature vectors representing multiple categorical values. In contrast to the continuous domain, where GAN-based methods have delivered considerable results, GANs struggle to perform equally well on discrete data. We propose and compare several architectures based on multiple (Gumbel) softmax output layers taking into account the structure of the data. We evaluate the performance of our architecture on datasets with different sparsity, number of features, ranges of categorical values, and dependencies among the features. Our proposed architecture and method outperforms existing models. [less ▲]

Detailed reference viewed: 44 (6 UL)