References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
See detailThe legacy of coal mining – a view on examples in Belgium and France
Helfer, Malte UL

in Deutsches Bergbau-Museum Bochum (Ed.) Boom – Crisis – Heritage. King Coal and Energy Revolutions after 1945; proceedings of the international conference March 14th-16th 2018, Technische Hochschule Georg Agricola, Bochum (in press)

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s ... [more ▼]

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s French-speaking neighbours and presents the most important remaining coal mining heritage sites as well as some extraordinary converted sites in France and the Belgian province Wallonia. [less ▲]

Detailed reference viewed: 58 (0 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 79 (12 UL)
Full Text
Peer Reviewed
See detailCoercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme
Roenne, Peter UL; Atashpendar, Arash UL; Kristian, Gjøsteen et al

in Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (in press)

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE ... [more ▼]

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The pairwise comparison-based approach of JCJ using plaintext equivalence tests leads to a quadratic blow-up in the number of votes, which makes the tallying process rather impractical in realistic settings with a large number of voters. We show how the removal of invalid votes can be done in linear time via a solution based on recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE. We conclude by touching upon some of the advantages and challenges of such an approach, followed by a discussion of further security and post-quantum considerations. [less ▲]

Detailed reference viewed: 240 (66 UL)
Full Text
Peer Reviewed
See detailExternalisation de la politique migratoire et identité de l'Union européenne
Neframi, Eleftheria UL; Gatti, Mauro UL

in Benlolo, Myriam (Ed.) L'Union européenne et les migrations (in press)

Detailed reference viewed: 94 (5 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 91 (11 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 67 (1 UL)
Full Text
Peer Reviewed
See detailBack to the Moon: Legal Challenges for Future Lunar Exploration
Salmeri, Antonino UL

in Proceedings of the International Institute of Space Law (in press)

In the light of the recently renovated interest in returning humans to the Moon, this paper addresses the main legal challenges related, with the goal to show practical solutions under the current system ... [more ▼]

In the light of the recently renovated interest in returning humans to the Moon, this paper addresses the main legal challenges related, with the goal to show practical solutions under the current system of international space law. In order to do so, the paper first presents an overview of current lunar exploration programs, arguing that public and private missions raise different challenges and thus require specific models. Following, it accordingly assesses possible legal solutions for the regulation of these programs. On the one hand, States’ exploration programs may be governed by a revised version of the Intergovernmental Agreement already concluded for the International Space Station. On the other hand, private activities could be better organized relying on Articles VI-IX OST as integrated by a new UNGA Resolution, ad hoc bilateral agreements and specific provisions in national space legislations. Finally, the paper concludes underlining the importance of international cooperation as the key to ensure the peaceful use and exploration of outer space. [less ▲]

Detailed reference viewed: 48 (1 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 141 (6 UL)
Full Text
Peer Reviewed
See detailA Look into Privacy-Preserving Blockchains
Khan, Nida UL; Nassar, Mohamed

in IEEE BCA @AICCSA 2019 - Workshop on Blockchain and it's Applications (in press)

Blockchain is a revolutionary technology promising a new generation of decentralized, transparent and tamper-proof database systems. However, one of the main challenges of the emerging blockchain systems ... [more ▼]

Blockchain is a revolutionary technology promising a new generation of decentralized, transparent and tamper-proof database systems. However, one of the main challenges of the emerging blockchain systems remains to address data privacy. While in Bitcoin and similar e-cash systems, privacy was limited to anonymity and addressed by using cryptographic pseudonyms for identification and authentication of parties, the question of privacy has more breadth in systems maintaining actual data such as medical records or energy meters. In this paper, we look into recently proposed privacy-preserving blockchains, analyze their strengths and weaknesses, and highlight research questions requiring future investigation. We conclude that privacy-preserving blockchains are still in their infancy and more research is definitely needed in this area. [less ▲]

Detailed reference viewed: 64 (8 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 357 (7 UL)
Full Text
Peer Reviewed
See detailA Multilayer Low-Altitude Airspace Model for UAV Traffic Management
Samir Labib, Nader UL; Danoy, Grégoire UL; Musial, Jedrzej et al

in Samir Labib, Nader; Danoy, Grégoire; Musial, Jedrzej (Eds.) et al 9th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (DIVANet '19) (in press)

Over the recent years, Unmanned Aerial Vehicles' (UAVs) technology developed rapidly. In turn shedding light on a wide range of potential civil and commercial applications ranging from mapping and ... [more ▼]

Over the recent years, Unmanned Aerial Vehicles' (UAVs) technology developed rapidly. In turn shedding light on a wide range of potential civil and commercial applications ranging from mapping and surveillance, parcel delivery to more demanding ones that require UAVs to operate in heterogeneous swarms. However, with the great advantages UAVs bring, they are expected to soon dominate the shared, low-altitude airspace over populated cities, introducing multiple new research challenges in safely managing the unprecedented traffic demands. The main contribution of this work is addressing the complex problem of UAV traffic management at an abstract level by proposing a structure for the uncontrolled low-altitude airspace. The paper proposes a model of the airspace as a weighted multilayer network of nodes and airways and presents a set of experimental simulations of UAV traffic for the verification and validation of the model. Finally, the paper outlines our intended future work. [less ▲]

Detailed reference viewed: 67 (16 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 190 (6 UL)
Full Text
See detailUpdate Internationales und Europäisches Steuerrecht
Sinnig, Julia UL

in Taeger, Jürgen (Ed.) Tagungsband Herbstakademie 2019 (in press)

Im Juni 2019 stellte die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) das Arbeitsprogramm zur weiteren Ausarbeitung einer Anpassung des internationalen Ertragsteuerrechts an die ... [more ▼]

Im Juni 2019 stellte die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) das Arbeitsprogramm zur weiteren Ausarbeitung einer Anpassung des internationalen Ertragsteuerrechts an die neue wirtschaftliche Realität der digitalisierten Welt vor. Auf Ebene der Europäischen Union (EU) gilt die Verabschiedung der im März 2018 von der Europäischen Kommission vorgestellten Richtlinien-Vorschläge (RL-Vorschläge) zu einer Digitalsteuer und einer sog. signifikanten digitalen Präsenz, nach intensiver Diskussion im Rat, als unwahrscheinlich. Der Gerichtshof der Europäischen Union beschäftigt sich derzeit mit der unionsrechtlichen Vereinbarkeit nationaler Sonderabgaben, die umsatzbasiert erhoben werden. Dieser Beitrag bietet einen Überblick über wesentliche Entwicklungen im internationalen und europäischen Steuerrecht bzgl. der Besteuerung digitalisierter Unternehmen. Der Beitrag knüpft an den Vortrag von Prof. Dr. Jens M. Schmittmann und der Verfasserin anlässlich der Herbstakademie 2018 in Bochum, sowie dem Vortrag der Verfasserin anlässlich der Herbstakademie 2017 in Heidelberg an. [less ▲]

Detailed reference viewed: 66 (2 UL)
Full Text
Peer Reviewed
See detailFeasibility of Stellar as a Blockchain-based Micropayment System
Khan, Nida UL; Ahmad, Tabrez; State, Radu UL

in Springer SmartBlock 2019 - 2nd International Conference on Smart Blockchain (in press)

The advent of Bitcoin was heralded as an innovation in the global monetary system, that could bring down transaction fees by circumventing the need for third parties and conduct transactions in real time ... [more ▼]

The advent of Bitcoin was heralded as an innovation in the global monetary system, that could bring down transaction fees by circumventing the need for third parties and conduct transactions in real time. The divisibility of a blockchain cryptocurrency to even fractions of a cent, caused microtransactions to become feasible to formerly non-existent denominations. These microtransactions have spurred the development of novel ways of monetizing online resources and hold the potential to aid in alleviation of poverty. The paper conducts a feasibility study on Stellar as a blockchain-based micropayment system. It highlights the computational and other issues that impedes its progress and utilizes a characterization model for micropayment systems to evaluate the efficacy of the Stellar platform. The paper conducts a comparison with the micropayment solutions from Bitcoin, Ethereum and PayPal. The paper analyzes a subset of transactions from the Stellar blockchain to aid in drawing a conclusion on the undertaken study and elaborates on the mitigation tools to enable fraud prevention in online monetary transactions. [less ▲]

Detailed reference viewed: 79 (12 UL)
Full Text
Peer Reviewed
See detailCase Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in 3rd Central European Cybersecurity Conference (in press)

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples ... [more ▼]

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples by hand to discover whether they are malware does not scale, so antivirus companies automate the process e.g., using sand- boxes where samples can be run, observed, and classified. Malware authors are aware of this fact, and try to evade detection. In this paper we describe one of such evasion technique: unprecedented, we discovered it while analyzing a ransomware sample. Analyzed in a Cuckoo Sandbox, the sample was able to avoid triggering malware indicators, thus scoring significantly below the minimum severity level. Here, we discuss what strategy the sample follows to evade the analysis, proposing practical defense methods to nullify, in our turn, the sample’s furtive strategy. [less ▲]

Detailed reference viewed: 40 (2 UL)
Full Text
Peer Reviewed
See detailUsing Passive Data Collection Methods to Learn Complex Mobility Patterns: An Exploratory Analysis
Toader, Bogdan UL; Cantelmo, Guido UL; Popescu, Mioara et al

Scientific Conference (in press)

Detailed reference viewed: 84 (10 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 86 (0 UL)
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 130 (9 UL)
Full Text
Peer Reviewed
See detailRigor or rhetoric: Public philosopher and public in dialogue
Burks, Deven UL

in Perspectives: international postgraduate journal of philosophy (in press), 9

Brian Leiter (2016) throws down two gauntlets to philosophers engaged in dialogue with the broader public. If, with the first, public philosophers recognize that they cannot offer substantive answers but ... [more ▼]

Brian Leiter (2016) throws down two gauntlets to philosophers engaged in dialogue with the broader public. If, with the first, public philosophers recognize that they cannot offer substantive answers but only sophisticated method, they nevertheless fail to realize that said method does not resonate with the very public whom they purport to help. For, with the second, that method does not engage the emotivist and tribalist cast of contemporary public discourse: emotivist because a person’s moral and political beliefs are a function of emotional attitudes or affective responses for which she adduces reasons post hoc; tribalist because the person tracks not the inferential relation between beliefs but her similarity with interlocutors. In order to understand the full extent of this critique, it is necessary, first, to parse strands of public philosophy, distinct discursive sites, and pictures of philosophical practice and, then, to probe the critique’s empirical groundedness and intended scope. These elements in place, it is then possible to sketch public philosophy reconceived along Leiter’s lines as equal part rigor and rhetoric. That sketch may be somewhat filled out through two tactics employed in Jeffrey Stout’s (2004, 2010) work. These form part of a toolkit for philosophical dialogue whereby philosophers get a discursive grip on non-discursive factors underlying public discourse and push back on Leiter's dilemma. [less ▲]

Detailed reference viewed: 52 (1 UL)
Full Text
Peer Reviewed
See detailWidths of regular and context-free languages
Mestel, David UL

in 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2019) (in press)

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 54 (1 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 242 (24 UL)
Full Text
Peer Reviewed
See detailQuantifying information flow in interactive systems
Mestel, David UL

in 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) (in press)

We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is ... [more ▼]

We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is deterministic then the information flow is either logarithmic or linear, and there is a polynomial-time algorithm to distinguish the two cases and compute the rate of logarithmic flow. To achieve this we first extend the theory of information leakage through channels to the case of interactive systems, and establish a number of results which greatly simplify computation. We then show that for deterministic systems the information flow corresponds to the growth rate of antichains inside a certain regular language, a property called the width of the language. In a companion work we have shown that there is a dichotomy between polynomial and exponential antichain growth, and a polynomial time algorithm to distinguish the two cases and to compute the order of polynomial growth. We observe that these two cases correspond to logarithmic and linear information flow respectively. Finally, we formulate several attractive open problems, covering the cases of probabilistic systems, systems with more than two users and nondeterministic systems where the nondeterminism is assumed to be innocent rather than demonic. [less ▲]

Detailed reference viewed: 62 (5 UL)
Peer Reviewed
See detailA short Survey on the Cyber Security in Control Systems
Bezzaoucha, Souad UL; Voos, Holger UL

Scientific Conference (2020, July)

In the present survey paper, we give a short, yet exhaustive state-of-the-art about the cyber-security applied to control systems, especially the event-based strategy. Indeed, in the past few years, due ... [more ▼]

In the present survey paper, we give a short, yet exhaustive state-of-the-art about the cyber-security applied to control systems, especially the event-based strategy. Indeed, in the past few years, due to a highest degree of connectivity in modern systems, new related control-specific cyber-physical systems security challengesarise and novel approaches integrating the cyber aspect are developed.Our goal in this paper is then to provide an overview of attack-modeling and security analysis approaches in recent works thatexplore networked control systems subject to cyber-attacks attacks. To this end, we look at the control, estimation, and modeling problems. [less ▲]

Detailed reference viewed: 36 (2 UL)
Full Text
Peer Reviewed
See detailAdversarial Embedding: A robust and elusive Steganography and Watermarking technique
Ghamizi, Salah UL; Cordy, Maxime UL; Papadakis, Mike UL et al

Scientific Conference (2020)

We propose adversarial embedding, a new steganography and watermarking technique that embeds secret information within images. The key idea of our method is to use deep neural networks for image ... [more ▼]

We propose adversarial embedding, a new steganography and watermarking technique that embeds secret information within images. The key idea of our method is to use deep neural networks for image classification and adversarial attacks to embed secret information within images. Thus, we use the attacks to embed an encoding of the message within images and the related deep neural network outputs to extract it. The key properties of adversarial attacks (invisible perturbations, nontransferability, resilience to tampering) offer guarantees regarding the confidentiality and the integrity of the hidden messages. We empirically evaluate adversarial embedding using more than 100 models and 1,000 messages. Our results confirm that our embedding passes unnoticed by both humans and steganalysis methods, while at the same time impedes illicit retrieval of the message (less than 13% recovery rate when the interceptor has some knowledge about our model), and is resilient to soft and (to some extent) aggressive image tampering (up to 100% recovery rate under jpeg compression). We further develop our method by proposing a new type of adversarial attack which improves the embedding density (amount of hidden information) of our method to up to 10 bits per pixel. [less ▲]

Detailed reference viewed: 82 (6 UL)
Full Text
Peer Reviewed
See detailJoint Scheduling and Precoding for Frame-Based Multigroup Multicasting in Satellite Communications
Bandi, Ashok UL; Shankar, Bhavani UL; Chatzinotas, Symeon UL et al

Scientific Conference (2019, December 09)

Recent satellite standards enforce the coding of multiple users’ data in a frame. This transmission strategy mimics the well-known physical layer multigroup multicasting (MGMC). However, typical beam ... [more ▼]

Recent satellite standards enforce the coding of multiple users’ data in a frame. This transmission strategy mimics the well-known physical layer multigroup multicasting (MGMC). However, typical beam coverage with a large number of users and limited frame length lead to the scheduling of only a few users. Moreover, in emerging aggressive frequency reuse systems, scheduling is coupled with precoding. This is addressed in this work, through the joint design of scheduling and precoding for frame-based MGMC satellite systems. This aim is formulated as the maximization of the sum-rate under per beam power constraint and minimum SINR requirement of scheduled users. Further, a framework is proposed to transform the non-smooth SR objective with integer scheduling and nonconvex SINR constraints as a difference-of-convex problem that facilitates the joint update of scheduling and precoding. Therein, an efficient convex-concave procedure based algorithm is proposed. Finally, the gains (up to 50%) obtained by the jointed design over state-of-the-art methods is shown through Monte-Carlo simulations. [less ▲]

Detailed reference viewed: 74 (16 UL)
Full Text
Peer Reviewed
See detailThe Impact of Human Mobility on Edge Data Center Deployment in Urban Environments
Vitello, Piergiorgio UL; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019 (2019, December)

Multi-access Edge Computing (MEC) brings storage and computational capabilities at the edge of the network into so-called Edge Data Centers (EDCs) to better low-latency applications. To this end ... [more ▼]

Multi-access Edge Computing (MEC) brings storage and computational capabilities at the edge of the network into so-called Edge Data Centers (EDCs) to better low-latency applications. To this end, effective placement of EDCs in urban environments is key for proper load balance and to minimize outages. In this paper, we specifically tackle this problem. To fully understand how the computational demand of EDCs varies, it is fundamental to analyze the complex dynamics of cities. Our work takes into account the mobility of citizens and their spatial patterns to estimate the optimal placement of MEC EDCs in urban environments in order to minimize outages. To this end, we propose and compare two heuristics. In particular, we present the mobility-aware deployment algorithm (MDA) that outperforms approaches that do not consider citizens mobility. Simulations are conducted in Luxembourg City by extending the CrowdSenSim simulator and show that efficient EDCs placement significantly reduces outages. [less ▲]

Detailed reference viewed: 60 (7 UL)
Full Text
Peer Reviewed
See detailPOSTER: Traffic Splitting to Counter Website Fingerprinting
de La Cadena Ramos, Augusto Wladimir UL; Mitseva, Asya UL; Pennekamp, Jan et al

Poster (2019, November 11)

Detailed reference viewed: 32 (4 UL)
Peer Reviewed
See detailMath and Reading Difficulties in a Multilingual Educational Setting
Martini, Sophie Frédérique UL; Fischbach, Antoine UL; Ugen, Sonja UL

Scientific Conference (2019, November 06)

Detailed reference viewed: 25 (2 UL)
See detailDimensional and Social Comparison Effects on Domain-Specific Academic Self-Concepts and Interests with First- and Third-Grade Students
van der Westhuizen, Lindie UL; Arens, Katrin; Keller, Ulrich UL et al

Scientific Conference (2019, November 06)

Academic self-concepts (ASCs) are self-perceptions of one’s own academic abilities. The internal/external frame of reference (I/E) model (Marsh, 1986) explains the formation of domain-specific ASCs ... [more ▼]

Academic self-concepts (ASCs) are self-perceptions of one’s own academic abilities. The internal/external frame of reference (I/E) model (Marsh, 1986) explains the formation of domain-specific ASCs through a combination of social (i.e. comparing one’s achievement in one domain with the achievement of others in the same domain) and dimensional (i.e. comparing one’s achievement in one domain with one’s achievement in another domain) comparisons. This results into positive achievement-self-concept relations within the math and verbal domains, but into negative achievement-self-concept relations across these domains. The generalized internal/external frame of reference (GI/E) model (Möller, Müller-Kalthoff, Helm, Nagy, & Marsh, 2015) extends the I/E model to the formation of other domain-specific academic self-beliefs such as interest. Research on the validity of the (G)I/E model for elementary school children is limited, especially for first-graders. This study examined the associations between verbal and math achievement and corresponding domain-specific self-concepts and interests for first-graders and third-graders. Two fully representative Luxembourgish first-grader cohorts and two fully representative third-graders cohorts (N=21,192) were used. The analyses were based on structural equation modeling. The findings fully supported the (G)I/E model for third-graders: Achievement was positively related to self-concept and interest within matching domains. Negative relations were found between achievement and self-concept and between achievement and interest across domains. For first-graders, achievement was positively related to self-concept and interest within matching domains. However, the majority of cross-domain relations were non-significant, except for the negative path between math achievement and verbal interest. Hence, while the formation of domain-specific ASCs and interests seem to rely on social and dimensional comparisons for third-graders, only social comparisons seem to be in operation for first-graders. Gender and cohort invariance was established for both grade levels. The findings are discussed within the framework of ASC differentiation and dimensional comparison theory applied to elementary school students. [less ▲]

Detailed reference viewed: 41 (1 UL)
Peer Reviewed
See detailThe stability of academic self-concept profiles – a latent transition analysis
Franzen, Patrick UL; Arens, A. Katrin; Niepel, Christoph UL

Poster (2019, November 06)

Detailed reference viewed: 62 (1 UL)
Peer Reviewed
See detailSimilarities and differences of value-added scores from models with different covariates: A cluster analysis
Levy, Jessica UL; Brunner, Martin; Keller, Ulrich UL et al

Scientific Conference (2019, November 06)

Detailed reference viewed: 40 (3 UL)
Peer Reviewed
See detailNeed for Cognition across school tracks: The importance of learning environments
Colling, Joanne UL; Wollschläger, Rachel UL; Keller, Ulrich UL et al

Scientific Conference (2019, November 06)

Detailed reference viewed: 51 (5 UL)
See detailVon Eupen-Malmedy nach Ostbelgien. Eine deutsch-belgische Beziehungsgeschichte seit 1920
Brüll, Christoph UL

Scientific Conference (2019, November 01)

Detailed reference viewed: 33 (1 UL)
Full Text
Peer Reviewed
See detailEnhanced Sketchnoting through Semantic Integration of Learning Material
Atashpendar, Aryobarzan UL; Grevisse, Christian UL; Rothkugel, Steffen UL

in Applied Informatics (2019, November)

Within the transition from pen-and-paper to digital solutions, many tablet-based note-taking apps have been developed. In addition, sketchnoting, a highly visual form of note-taking, has gained in ... [more ▼]

Within the transition from pen-and-paper to digital solutions, many tablet-based note-taking apps have been developed. In addition, sketchnoting, a highly visual form of note-taking, has gained in popularity, especially in teaching and learning. While current solutions already reduce the burden of organizing and searching through stacks of paper, they provide little support in finding additional information related to the notes, and search capabilities are mostly limited to textual queries and content. In this paper, we present a novel solution for digital sketchnoting aimed at enhancing the learning experience of students. In addition to common capabilities such as handwriting recognition, our note-taking app integrates semantic annotation and drawing recognition. Handwritten notes are recognized and passed through concept recognition and entity linking tools to enable a knowledge graph-based integration of contextually relevant learning resources. We extend traditional search capabilities by including the semantic metadata from the related material as well as enabling visual queries to find recognized sketches. Finally, resembling the exchange of paper notes among students, our app allows to share the semantically enhanced notes with other devices. [less ▲]

Detailed reference viewed: 82 (18 UL)
Full Text
Peer Reviewed
See detailA Personalized Sentiment Model with Textual and Contextual Information
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in The SIGNLL Conference on Computational Natural Language Learning, Hong Kong 3-4 November 2019 (2019, November)

In this paper, we look beyond the traditional population-level sentiment modeling and consider the individuality in a person's expressions by discovering both textual and contextual information. In ... [more ▼]

In this paper, we look beyond the traditional population-level sentiment modeling and consider the individuality in a person's expressions by discovering both textual and contextual information. In particular, we construct a hierarchical neural network that leverages valuable information from a person's past expressions, and offer a better understanding of the sentiment from the expresser's perspective. Additionally, we investigate how a person's sentiment changes over time so that recent incidents or opinions may have more effect on the person's current sentiment than the old ones. Psychological studies have also shown that individual variation exists in how easily people change their sentiments. In order to model such traits, we develop a modified attention mechanism with Hawkes process applied on top of a recurrent network for a user-specific design. Implemented with automatically labeled Twitter data, the proposed model has shown positive results employing different input formulations for representing the concerned information. [less ▲]

Detailed reference viewed: 183 (3 UL)
Full Text
Peer Reviewed
See detailVPGA: an SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 38th IEEE International Performance Computing and Communications Conference (IPCCC) (2019, October 29)

Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track ... [more ▼]

Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track drivers during their journey. Vehicular Location Privacy Zones (VLPZs) is a promising approach to ensure unlinkability. These logical zones can be easily deployed over roadside infrastructures (RIs) such as gas station or electric charging stations. However, the placement optimization problem of VLPZs is NP-hard and thus an efficient allocation of VLPZs to these RIs is needed to avoid their overload and the degradation of the QoS provided within theses RIs. This work considers the optimal placement of the VLPZs and proposes a genetic-based algorithm in a software defined vehicular network to ensure minimized trajectory cost of involved vehicles and hence less consumption of their pseudonyms. The analytical evaluation shows that the proposed approach is cost-efficient and ensures a shorter response time. [less ▲]

Detailed reference viewed: 76 (12 UL)
Full Text
Peer Reviewed
See detailTeachers’ translanguaging stance, design, and shifts in a professional development course
Aleksic, Gabrijela UL; Bebic, Dzoen Dominique UL

Scientific Conference (2019, October 28)

Classrooms in Luxembourg are highly socially, culturally, and linguistically diverse. About 65% of 4 year-old children do not speak Luxembourgish, of which 28% speak Portuguese (MENJE, 2018). In 2017, the ... [more ▼]

Classrooms in Luxembourg are highly socially, culturally, and linguistically diverse. About 65% of 4 year-old children do not speak Luxembourgish, of which 28% speak Portuguese (MENJE, 2018). In 2017, the new law has declared multilingual early education mandatory. Until that time, the focus was solely on the development of Luxemburgish, whereas now teachers should also familiarize children with French and value their home languages. To support preschool teachers, our project aims to: (1) offer a professional development (PD) course in translanguaging, (2) involve children’s families to reinforce home-school collaboration, and (3) foster children’s cognitive, linguistic, and socio-emotional engagement in the classroom. We use focus groups, questionnaires, and language portraits with teachers and a test in early literacy and numeracy in school and home language and video observations with children. Translanguaging, the main topic of our 22 hour PD course (June – December 2019), is the use of a full linguistic repertoire to make meaning (Otheguy, García, & Reid, 2015). Through focus groups, we identified teachers’ negative translanguaging stance towards children’s proficiency in their home language that hinders the development of Luxembourgish. Translanguaging design was related to teachers’ use of multilingual stories and morning greetings, while translanguaging shifts concerned frequent translations by involving older children. Our main goal is to address the negative translanguaging stance by offering practical activities during the course and collaborating with parents, children, and organisational stakeholders. References Ministry of National Education, Childhood and Youth [MENJE]. (2018). Key numbers of the national education: statistics and indicators – School year 2016-2017. Retrieved from http://www.men.public.lu/fr/actualites/publications/themes-transversaux/statistiques-analyses/chiffres-cles/index.html Otheguy, R., García, O., & Reid, W. (2015). Clarifying translanguaging and deconstructing named languages: A perspective from linguistics. Applied Linguistic Review, 6(3), 281–307. [less ▲]

Detailed reference viewed: 53 (2 UL)
Peer Reviewed
See detailFacing parallel inventions: the French telecommunications strategies in the digital field (mid-1950s to mid-1990s)
Schafer, Valerie UL

Scientific Conference (2019, October 26)

This panel on parallel inventions is an opportunity to rethink 15-years of research on data networks and digitization from the perspective of simultaneity. The subject of parallel inventions in the field ... [more ▼]

This panel on parallel inventions is an opportunity to rethink 15-years of research on data networks and digitization from the perspective of simultaneity. The subject of parallel inventions in the field of data networks immediately brings to mind the outset of packet switching, a key concept of Arpanet and Internet (Bay, 2019) that was developed in the 1960s by several players, namely Paul Baran at the RAND Corporation, Leonard Kleinrock at UCLA and Donald Davies at the NPL (National Physical Laboratory) in Great Britain. Yet this Zeitgeist surrounding packet switching is not the only example of parallel ideas and projects within the history of data networks, nor is it limited to the US context. My presentation therefore aims to shift the focus to deepen our understanding of simultaneous inventions, turning away from the cumbersome examination of the “great figures” towards collective innovation and adoption. To do so, we will look at the telecommunications sector. Since the 1950s, this sector in the United States, France, Great Britain and other European countries has been confronted with computer needs and the challenge of building data networks based on their infrastructure – communication lines were mainly monopolized by telecommunication companies in Europe until the end of the 1980s. Several parallel paths were experimented during the period from the transition to electronic switching in phone equipment to the development of standards such as X25, which competed with Internet protocols in the 1980s and 1990s, demonstrating that innovation is not a linear process. Rather than discuss AT&T’s hostility towards packet switching as implemented in Arpanet, which has already been well documented (Abbate, 1999), this study will look at the French telecommunications administration and show how those responsible for the communication lines needed for French networks were positioning themselves to face the changes that had begun in the 1950s, whilst assessing parallel inventions that were either internal or external to the administration. Our paper will therefore focus less on invention per se than on the response to simultaneous inventions, and will review several simultaneous paths in the history of digital networks that French telecommunications had to face, and the associated process of collective decision-making. We will start by presenting the parallel development of spatial and temporal switching in the second half of the 1950s, then look at the simultaneous experiment of Caducée and Hermès networks (early 1970s). Complementary case studies will cover the debate about virtual circuits and datagrams from the 1970s to the 1990s, standardization within the field of telematics and the first Web offers in the transition period from the Minitel to the Web in the 1990s. Our analysis aims to establish a typology of the administration’s choices and attitudes, which differ according to whether the alternative is an internal solution or from an external source, but also according to the periods, from the telecommunications monopoly to the 1990s deregulation. In this way, we aim to reveal how inventions were not only connected to the technical context and knowledge, but were also shaped by those who were interested in the resulting technology. [less ▲]

Detailed reference viewed: 30 (3 UL)
Full Text
Peer Reviewed
See detailInformation Content of Systematic and Idiosyncratic Risk Disclosure
Weber, Véronique UL; Muessig, Anke UL

Scientific Conference (2019, October 24)

Detailed reference viewed: 25 (0 UL)
See detailThe Occupied Museum. Culture and Science in Luxemburg during the Nazi Occupation, 1940–1944
Spirinelli, Fabio UL

Scientific Conference (2019, October 24)

Detailed reference viewed: 45 (1 UL)
Full Text
Peer Reviewed
See detailSoftware Engineering for Dataset Augmentation using Generative Adversarial Networks
Jahic, Benjamin UL; Guelfi, Nicolas UL; Ries, Benoît UL

Scientific Conference (2019, October 19)

Software engineers require a large amount of data for building neural network-based software systems. The engineering of these data is often neglected, though, it is a critical and time-consuming activity ... [more ▼]

Software engineers require a large amount of data for building neural network-based software systems. The engineering of these data is often neglected, though, it is a critical and time-consuming activity. In this work, we present a novel software engineering approach for dataset augmentation using neural networks. We propose a rigorous process for generating synthetic data to improve the training of neural networks. Also, we demonstrate our approach to successfully improve the recognition of handwritten digits using conditional generative adversarial networks (cGAN). Finally, we shortly discuss selected important issues of our process, presenting related work and proposing some improvements. [less ▲]

Detailed reference viewed: 95 (71 UL)
See detailDiscussion of "Do ETFs Increase Liquidity?" by Mehmet Saglam, Tugkan Tuzun and Russ Wermers
Holcblat, Benjamin UL

Scientific Conference (2019, October 18)

Detailed reference viewed: 27 (2 UL)
See detailApproche européenne sur l'entreprise : de la nouveauté ?
Corbisier, Isabelle UL

Scientific Conference (2019, October 17)

Detailed reference viewed: 32 (4 UL)
See detailRegards allemands sur le Luxembourg
Brüll, Christoph UL

Scientific Conference (2019, October 17)

Detailed reference viewed: 32 (1 UL)
See detailRegards belges sur le Luxembourg 1919-1921
Brüll, Christoph UL

Scientific Conference (2019, October 17)

Detailed reference viewed: 27 (0 UL)
See detailMonitoring du système scolaire – Le modèle luxembourgeois (invited talk)
Fischbach, Antoine UL

Scientific Conference (2019, October 17)

Detailed reference viewed: 38 (6 UL)
Full Text
Peer Reviewed
See detailTravail frontalier en Suisse et au Luxembourg : mobilités, profils et défis
Pigeron-Piroth, Isabelle UL; Helfer, Malte UL; Belkacem, Rachid

Scientific Conference (2019, October 15)

La Suisse et le Luxembourg sont particulièrement concernés par le travail frontalier. Ces deux pays accueillent à eux seuls plus d’un demi-million de travailleurs frontaliers et recourent à la main ... [more ▼]

La Suisse et le Luxembourg sont particulièrement concernés par le travail frontalier. Ces deux pays accueillent à eux seuls plus d’un demi-million de travailleurs frontaliers et recourent à la main-d’œuvre frontalière depuis plusieurs décennies. Petits pays dynamiques ayant d’importants besoins de main-d’œuvre, ils se caractérisent par des différentiels liés à la présence de frontières (différentiels de prix immobiliers, de taux de chômage, de salaires, de niveaux d’activité économique … avec les pays voisins). Ces différentiels entretiennent la dynamique du travail frontalier (Belkacem et Pigeron-Piroth, 2016). [less ▲]

Detailed reference viewed: 28 (3 UL)
See detailInside the Trading Zone: Doing Digital Hermeneutics in an Interdisciplinary Setting
van der Heijden, Tim UL; Tatarinov, Juliane UL

Scientific Conference (2019, October 11)

Our contribution examines the conference theme of digital hermeneutics from the perspective of the Doctoral Training Unit (DTU) in ‘Digital History and Hermeneutics’, a four-year interdisciplinary ... [more ▼]

Our contribution examines the conference theme of digital hermeneutics from the perspective of the Doctoral Training Unit (DTU) in ‘Digital History and Hermeneutics’, a four-year interdisciplinary research and training program hosted by the Centre for Contemporary and Digital History (C²DH) at the University of Luxembourg. The DTU is designed as an experimental platform for collaboration or ‘trading zone’, in which thirteen doctoral candidates with different disciplinary backgrounds – from history, linguistics and philosophy to computer and information science – study and reflect on the epistemological and methodological implications of the ‘digital turn’ on historical research. This presentation reflects on the project’s first year, in which the doctoral candidates were introduced to various skills and methods in digital humanities, including text mining, digital source criticism, database structures, data visualization, GIS analysis, tool criticism and algorithmic critique; and its second year, when data collections had been created and research tools identified that were going to be applied to it. By doing so, it presents some of the main practical and epistemological opportunities and challenges of “thinkering” with digital tools and technologies in the Digital History Lab of the C2DH, and it reflects scientific dissemination strategies for the group and the individual. The analysis is informed by studies on interdisciplinarity, digital humanities infrastructures and communities of practice. It furthermore draws on a series of semi-structured interviews and self-reflexive training reports, in which the doctoral candidates of the DTU reflect on their experiences in doing digital hermeneutics in an interdisciplinary setting. [less ▲]

Detailed reference viewed: 28 (1 UL)
See detailThe ESP estimator
Holcblat, Benjamin UL; Sowell, Fallaw

Scientific Conference (2019, October 08)

Detailed reference viewed: 23 (1 UL)
Full Text
Peer Reviewed
See detailSoftwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection
Rinaldi, Giulia UL; Adamsky, Florian UL; Soua, Ridha UL et al

in 10th International Conference on Networks of the Future (NoF) (2019, October 04)

The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to ... [more ▼]

The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to monitor their operation. Given the impor-tance of an early anomaly detection, Intrusion Detection Systems(IDSs) are introduced in SCADA systems to detect malicious ac-tivities as early as possible. Agents or probes form the cornerstoneof any IDS by capturing network packets and extracting relevantinformation. However, IDSs are facing unprecedented challengesdue to the escalation in the number, scale and diversity of attacks.Software-Defined Network (SDN) then comes into play and canprovide the required flexibility and scalability. Building on that,we introduce Traffic Agent Controllers (TACs) that monitor SDN-enabled switches via OpenFlow. By using lightweight statisticalmetrics such as Kullback-Leibler Divergence (KLD), we are ableto detect the slightest anomalies, such as stealth port scans, evenin the presence of background traffic. The obtained metrics canalso be used to locate the anomalies with precision over 90%inside a hierarchical network topology. [less ▲]

Detailed reference viewed: 82 (13 UL)
Full Text
Peer Reviewed
See detailP3LS : Plausible Deniability for Practical Privacy-Preserving Live Streaming
Decouchant, Jérémie UL; Boutet, Antoine; Yu, Jiangshan et al

Scientific Conference (2019, October)

Video consumption is one of the most popular Internet activities worldwide. The emergence of sharing videos directly recorded with smartphones raises important privacy concerns. In this paper we propose ... [more ▼]

Video consumption is one of the most popular Internet activities worldwide. The emergence of sharing videos directly recorded with smartphones raises important privacy concerns. In this paper we propose P3LS , the first practical privacy-preserving peer-to-peer live streaming system. To protect the privacy of its users, P3LS relies on k-anonymity when users subscribe to streams, and on plausible deniability for the dissemination of video streams. Specifically, plausible deniability during the dissemination phase ensures that an adversary is never able to distinguish a user’s stream of interest from the fake streams from a statistical analysis (i.e., using an analysis of variance). We exhaustively evaluate P3LS and show that adversaries are not able to identify the real stream of a user with very high confidence. Moreover, P3LS consumes 30% less bandwidth than the standard k-anonymity approach where nodes fully contribute to the dissemination of k streams. [less ▲]

Detailed reference viewed: 87 (9 UL)
Full Text
Peer Reviewed
See detailEFFECTS OF MULTIPLE OSCILLATOR PHASE NOISE IN PRECODING PERFORMANCE
Martinez Marrero, Liz UL

Scientific Conference (2019, October)

Satellite Precoding is a promising technique to meet the target data rates of the future high throughput satellite systems and the costs per bit as required by 5G applications and networks, but it ... [more ▼]

Satellite Precoding is a promising technique to meet the target data rates of the future high throughput satellite systems and the costs per bit as required by 5G applications and networks, but it requires strict synchronization among the transmitted waveforms, in addition to accurate channel state information. Most of the published work about this topic consider ideal oscillators, but in practice, the output of an oscillator is not a single spectral line at the nominal frequency. This paper proposes a model for the oscillator phase noise and analyzes the resulting received signal to interference plus noise ratio (SNIR) in a satellite communication system using Precoding. Simulations of a communication satellite system with a two-beam transponder and two receivers were performed to compute the effective SNIR. This work uses a simulator which also considers practical impairments such as time misalignment, errors in the channel state information, interference, thermal noise and phase noise masks for satellite oscillators. The Precoding methods used for the analysis are Zero Forcing (ZF) and Minimum Mean Square Error (MMSE). The obtained results prove that there is a degradation in the performance due to the use of independent oscillators but this effect is compensated by the precoding matrix. [less ▲]

Detailed reference viewed: 43 (5 UL)
Full Text
Peer Reviewed
See detailUser Experience Design for E-Voting: How mental models align with security mechanisms
Zollinger, Marie-Laure UL; Distler, Verena UL; Roenne, Peter UL et al

in Electronic Voting (2019, October)

This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design ... [more ▼]

This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with 38 participants, and user experience data was collected via questionnaires and semi-structured interviews on user experience and perceived security. Results concerning the impact of displaying security mechanisms on UX were presented in a complementary paper. Here we expand on this analysis by studying the mental models revealed during the interviews and compare them with theoretical security notions. Finally, we propose a list of improvements for designs of future voting protocols. [less ▲]

Detailed reference viewed: 76 (5 UL)
See detailDie Maske des Bösen : Lombroso, Fu-Manchu, Mabuse
Kohns, Oliver UL

Scientific Conference (2019, October)

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailOn the Event-based Attack-tolerant Control: A Polytopic Representation
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Automation, Control and Robots (2019, October)

In the present contribution, we present a new event-based control representation. Based on the polytopic approach, more specifically the sector nonlinear transformation, an event-based attack-tolerant ... [more ▼]

In the present contribution, we present a new event-based control representation. Based on the polytopic approach, more specifically the sector nonlinear transformation, an event-based attack-tolerant control, and scheduling co-design strategy are proposed. From the event triggering definition (sample-and-hold strategy), polytopic writing of the event-triggered feedback control is first presented and then incorporated into the system dynamics for analysis. Our goal is to present a unique model that is able to deal with the co-design problem simultaneously and that can be handled by classical control synthesis tools. The novel representation, including data deception and attack tolerant control is formulated as a BMI optimization problem ensuring both stability and some level performance requirements (L2 attenuation of the cyber-attack). [less ▲]

Detailed reference viewed: 30 (0 UL)
Full Text
Peer Reviewed
See detailSDN-based Pseudonym-Changing Strategy for Privacy Preservation in Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 15th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'19) (2019, October)

The pseudonym-changing approach is the de-factolocation privacy solution proposed by security standards toensure that drivers are not tracked during their journey. SeveralPseudonym Changing Strategies ... [more ▼]

The pseudonym-changing approach is the de-factolocation privacy solution proposed by security standards toensure that drivers are not tracked during their journey. SeveralPseudonym Changing Strategies (PCSs) have been proposed tosynchronize Pseudonym Changing Processes (PCPs) between con-nected vehicles. However, most of the existing strategies are static,rigid and do not adapt to the vehicles’ context. In this paper, weexploit the Software Defined Network (SDN) paradigm to proposea context-aware pseudonym changing strategy (SDN-PCS) whereSDN controllers orchestrate the dynamic update of the securityparameters of the PCS. Simulation results demonstrate that SDN-PCS strategy outperforms typical static PCSs to perform efficientPCPs and protect the location privacy of vehicular network users [less ▲]

Detailed reference viewed: 94 (15 UL)
Full Text
Peer Reviewed
See detailSimultaneous State and False-Data Injection Attacks Reconstruction for NonLinear Systems: an LPV Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Automation, Control and Robots (2019, October)

The present contribution addresses simultaneous state and actuator/sensor false-data injection attacks reconstruction for nonlinear systems. The considered actuator/sensor attacks are modeled as time ... [more ▼]

The present contribution addresses simultaneous state and actuator/sensor false-data injection attacks reconstruction for nonlinear systems. The considered actuator/sensor attacks are modeled as time-varying parameters with a multiplicative effect on the actuator input signal and the sensor output signal, respectively. Based on the sector non-linearity approach and the convex polytopic transformation, the nonlinear model is written in a Linear Parameter-Varying (LPV) form, then an observer allowing both state and attack reconstruction is designed by solving an LMI optimization problem. [less ▲]

Detailed reference viewed: 33 (0 UL)
See detailL’UniGR-Center for Border Studies et ses outils d’analyse
Wille, Christian UL; Dethier, Perrine

Scientific Conference (2019, October)

Detailed reference viewed: 41 (1 UL)
Peer Reviewed
See detailHow To Attract And Retain Talents In Not-For-Profit Organizations?
Usanova, Ksenia; Telitsina, Aleksandra; Geraudel, Mickaël UL

Scientific Conference (2019, September 30)

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailThree models of flexible talent management
Usanova, Ksenia; Geraudel, Mickaël UL; D'Armagnac, Sophie et al

Scientific Conference (2019, September 30)

Detailed reference viewed: 33 (1 UL)
Peer Reviewed
See detailQualitative interviewing in multilingual research
Kalocsanyiova, Erika UL; Shatnawi, Malika

Scientific Conference (2019, September 27)

A growing body of research in super-diverse societies is conducted, by necessity, in multiple languages. Multilingual research practices can play a fundamental role in empowering participants and ... [more ▼]

A growing body of research in super-diverse societies is conducted, by necessity, in multiple languages. Multilingual research practices can play a fundamental role in empowering participants and privileging their voices, especially in migration-related studies. Yet, questions of cross-language interviewing are for the most part avoided or ignored in mainstream research. This contribution seeks to bring cross-language communication back into the focus of methodological discussions. Our paper builds on multilingual interview material extracted from a two-year linguistic ethnographic research project on forced migrants’ integration trajectories in Luxembourg. It looks at interpreter-mediated research encounters, as well as interviewees’ translation and translanguaging moves. Audio recordings and field notes from collaborative data analysis sessions underpin the data for this contribution. Our examples show that there is merit in fixing our analytical gaze on the minute details of language use across different codes, as these allow for a novel inquiry into specific moments of meaning making, role performances and rapport-building in qualitative interviewing. [less ▲]

Detailed reference viewed: 40 (0 UL)
Full Text
Peer Reviewed
See detailNoCry: No More Secure Encryption Keys for Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

in 2nd International Workshop on Emerging Technologies for Authorization and Authentication (2019, September 27)

Since the appearance of ransomware in the cyber crime scene, researchers and anti-malware companies have been offering solutions to mitigate the threat. Anti-malware solutions differ on the specific ... [more ▼]

Since the appearance of ransomware in the cyber crime scene, researchers and anti-malware companies have been offering solutions to mitigate the threat. Anti-malware solutions differ on the specific strategy they implement, and all have pros and cons. However, three requirements concern them all: their implementation must be secure, be effective, and be efficient. Recently, Genç et al. proposed to stop a specific class of ransomware, the cryptographically strong one, by blocking unauthorized calls to cryptographically secure pseudo-random number generators, which are required to build strong encryption keys. Here, in adherence to the requirements, we discuss an implementation of that solution that is more secure (with components that are not vulnerable to known attacks), more effective (with less false negatives in the class of ransomware addressed) and more efficient (with minimal false positive rate and negligible overhead) than the original, bringing its security and technological readiness to a higher level. [less ▲]

Detailed reference viewed: 51 (2 UL)
Full Text
Peer Reviewed
See detailThe impact of resilience on perceived chronic stress in undergraduate psychology students
Lenz, Hannah; Steffgen, Georges UL

Poster (2019, September 26)

The purpose of this exploratory study was to analyze the relationship between academic stressors and chronic stress in undergraduate psychology students, and to identify whether resilience and/or social ... [more ▼]

The purpose of this exploratory study was to analyze the relationship between academic stressors and chronic stress in undergraduate psychology students, and to identify whether resilience and/or social support function as mediators amid this relationship. Students from the University of Luxembourg and the University of Trier (N = 152) were recruited to fill out an online questionnaire consisting of the Trier inventory of chronic stress (Schulz et al., 2004), the resilience scale (Leppert et al., 2008), the perceived social support scale (Kliem et al., 2015), and five dimensions of academic stressors (Herbst et al., 2016). Results show a positive correlation between academic stressors and chronic stress. Multiple regression analysis prove that neither gender, home university, additional occupation nor social support are significant predictors of chronic stress. Compared to academic stressors and resilience, which account for more than 56% of the variance of students’ experienced chronic stress. Furthermore, academic stressors and chronic stress are mediated by resilience but not by perceived social support. The implications of the findings are discussed in terms of their relevance for the development of intervention programs against chronic stress of undergraduate students. [less ▲]

Detailed reference viewed: 54 (6 UL)
Full Text
Peer Reviewed
See detailTHE MARKET SKEWNESS-RETURN RELATIONSHIP, Plenary Talk
Lehnert, Thorsten UL

Scientific Conference (2019, September 25)

Detailed reference viewed: 25 (1 UL)
Full Text
See detailEvaluation von bauphysikalischen Vormessungen im Rahmen von komplexen Innendämmprojekten
Latz, Sebastian Joachim UL; Thewes, Andreas; Scholzen, Frank UL et al

in Vogel, Albert (Ed.) Bauphysiktage 2019 in Weimar - Bauphysik in Forschung und Praxis (2019, September 25)

The installation of internal insulation systems within the scope of refurbishment changes the hygrothermal behaviour of the existing masonry of a building in the long term. The internal insulation layer ... [more ▼]

The installation of internal insulation systems within the scope of refurbishment changes the hygrothermal behaviour of the existing masonry of a building in the long term. The internal insulation layer reduces the temperature of the masonry during the heating period and considerably reduces the drying potential. If the moisture content is too high due to the absorption of driving rain from the outside and moisture from the interior climate, the masonry may be permanently damaged and mould may form. The proof of function can be achieved by hygrothermal simulations. These simulations require the input of sensitive boundary conditions and different material parameters. In order to obtain precise simulation results, these input values should be validated by building physics measurements. In order to be able to better assess the simulation parameters, various physical measurements for the preparation of a field test for interior insulation systems in a conference room were carried out on behalf of the administration of the bâtiments publics at the University of Luxembourg as part of the research project "Possibilities and limitations of interior insulation in the renovation of public buildings in Luxembourg". [less ▲]

Detailed reference viewed: 61 (6 UL)
Full Text
Peer Reviewed
See detailEarly-stage topological and technological choices for TSN-based communication architectures
Navet, Nicolas UL; Villanueva, Josetxo; Migge, Jörn

Scientific Conference (2019, September 24)

A main issue in the design of automotive communication architectures is that the most important design choices pertaining to the topology of the networks and the technologies to use (protocols, data rate ... [more ▼]

A main issue in the design of automotive communication architectures is that the most important design choices pertaining to the topology of the networks and the technologies to use (protocols, data rate, hardware) have to be made at a time when the communication requirements are not entirely known. Indeed, many functions only becomes available along the development cycle, and vehicle platforms have to support incremental evolutions of the embedded system that may not be fully foreseeable at the time design choices are made. The problem is becoming even more difficult and crucial with the introduction of dynamically evolving communication requirements requiring network re-configuration at run-time. We present how the use of synthetic data, that is data generated programmatically based on past vehicle projects and what can be foreseen for the current project, enables the designers to make such early stage choices based on quantified metrics. The proposals are applied to Groupe Renault's FACE service-oriented E/E architecture with the use of a software-implemented function we called “Topology Stress Test”. [less ▲]

Detailed reference viewed: 47 (1 UL)
See detailMoney Laundering and Cryptocurrencies
Allegrezza, Silvia UL

Scientific Conference (2019, September 24)

Detailed reference viewed: 41 (2 UL)
Full Text
Peer Reviewed
See detailProceedings of the Deduktionstreffen 2019
Schon, Claudia; Steen, Alexander UL

Scientific Conference (2019, September 23)

The annual meeting Deduktionstreffen is the prime activity of the Special Interest Group on Deduction Systems (FG DedSys) of the AI Section of the German Society for Informatics (GI-FBKI). It is a meeting ... [more ▼]

The annual meeting Deduktionstreffen is the prime activity of the Special Interest Group on Deduction Systems (FG DedSys) of the AI Section of the German Society for Informatics (GI-FBKI). It is a meeting with a familiar, friendly atmosphere, where everyone interested in deduction can report on their work in an informal setting. [less ▲]

Detailed reference viewed: 33 (1 UL)
Full Text
Peer Reviewed
See detailBODYFITR: Robust Automatic 3D Human Body Fitting
Saint, Alexandre Fabian A UL; Shabayek, Abd El Rahman UL; Cherenkova, Kseniya UL et al

in Proceedings of the 2019 IEEE International Conference on Image Processing (ICIP) (2019, September 22)

This paper proposes BODYFITR, a fully automatic method to fit a human body model to static 3D scans with complex poses. Automatic and reliable 3D human body fitting is necessary for many applications ... [more ▼]

This paper proposes BODYFITR, a fully automatic method to fit a human body model to static 3D scans with complex poses. Automatic and reliable 3D human body fitting is necessary for many applications related to healthcare, digital ergonomics, avatar creation and security, especially in industrial contexts for large-scale product design. Existing works either make prior assumptions on the pose, require manual annotation of the data or have difficulty handling complex poses. This work addresses these limitations by providing a novel automatic fitting pipeline with carefully integrated building blocks designed for a systematic and robust approach. It is validated on the 3DBodyTex dataset, with hundreds of high-quality 3D body scans, and shown to outperform prior works in static body pose and shape estimation, qualitatively and quantitatively. The method is also applied to the creation of realistic 3D avatars from the high-quality texture scans of 3DBodyTex, further demonstrating its capabilities. [less ▲]

Detailed reference viewed: 57 (7 UL)
See detailWann kam die Grenze auf die Karte? Zur Konstruktion von Herrschaftsgebieten zwischen Reich und Frankreich in der Frühen Neuzeit
Uhrmacher, Martin UL

Scientific Conference (2019, September 19)

Feste politische Grenzen, wie man sie heute kennt, die ein Staatsgebiet nach innen wie nach außen umfassend begrenzen, sind im Raum zwischen Maas und Rhein ein Produkt des späten 18. Jahrhunderts. Für ... [more ▼]

Feste politische Grenzen, wie man sie heute kennt, die ein Staatsgebiet nach innen wie nach außen umfassend begrenzen, sind im Raum zwischen Maas und Rhein ein Produkt des späten 18. Jahrhunderts. Für diese Region wird nach dem Ursprung dieser festen Grenzlinien gesucht, die heute ein selbstverständlicher Bestandteil von Karten sind. Seit dem späten 16. Jahrhundert wurden im Westen des Heiligen Römischen Reiches erstmals historische Karten publiziert und im Druck verbreitet, die unser Bild der territorialen Landschaft bis heute prägen. Ab wann aber werden solche Grenzlinien zur Darstellung territorial-räumlicher Verhältnisse verwendet? Und welche Rolle kommt ihnen bei der Konstruktion von Herrschaft im Raum zu? Diesen Fragen widmet sich der Beitrag für die Region zwischen Maas und Rhein. Sie liegt an der Schnittstelle von Germania und Romania und ist durch Einflüsse beiderseits der Sprachgrenze geprägt. [less ▲]

Detailed reference viewed: 31 (3 UL)
Peer Reviewed
See detail(Im)mobilizing languages
Kalocsanyiova, Erika UL

Scientific Conference (2019, September 19)

This presentation is concerned with the impact of multilingualism on forced migrants’ trajectories. It reports the findings of a two-year qualitative research project, which used ethnographic research ... [more ▼]

This presentation is concerned with the impact of multilingualism on forced migrants’ trajectories. It reports the findings of a two-year qualitative research project, which used ethnographic research methods, including narrative and go-along interviews, classroom and participant observations and linguistic analysis of interactional data. The project set out to investigate how forced migrants reflect, position, and affirm themselves – through languages – in multilingual societies. Our contribution aligns itself with the body of research that challenges hegemonic monolingual and monocultural practices (Grzymala-Kazlowska/Phillimore 2018, Van Avermaet 2009). Other major influences were Juffermans and Tavares’s (2017) research on south-north trajectories and linguistic repertoires, Stevenson’s (2014, 2017) work on language (hi)stories and Busch’s (2017) biographical explorations of Spracherleben. In this talk, the focus will be on the experiences of three men from Syria and Iraq who have obtained humanitarian protection in Luxembourg, but aspire to fulfil their integration aspirations across multiple locations and countries. A careful analysis of divergent trajectories sheds light on how experiences of linguistic inequality and/or success are imprinted on forced migrants’ repertoires and shape their understanding of (successful) integration. [less ▲]

Detailed reference viewed: 27 (0 UL)
See detailSize-dependent spatial magnetization profile of Manganese-Zinc ferrite nanoparticles
Bersweiler, Mathias UL

Scientific Conference (2019, September 18)

Detailed reference viewed: 29 (0 UL)
See detailLe blanchiment: évolution du cadre européen et nouvelles formes numériques
Allegrezza, Silvia UL

Scientific Conference (2019, September 17)

Detailed reference viewed: 21 (1 UL)
Peer Reviewed
See detailMale vs female gamers: Testing the stereotype threat effect in video gaming
Holl, Elisabeth UL; Wagener, Gary Lee; Melzer, André UL

Scientific Conference (2019, September 17)

Stereotype threat (ST), defined as the risk of confirming a negative stereotype about one’s own group, has been demonstrated in various social contexts. Regarding video games, for example, informing ... [more ▼]

Stereotype threat (ST), defined as the risk of confirming a negative stereotype about one’s own group, has been demonstrated in various social contexts. Regarding video games, for example, informing female participants that men would outperform women in gaming leads to gender differences in performance. To date, however, these studies have not looked into the mechanisms of this ST effect in gaming. In two lab studies (N=186), some participants were confronted with ST-related information before playing a video game. In Study 1, half of the participants read a bogus article confirming the “standard” gender stereotype (“men outperform women”). In Study 2, a reverse stereotype was presented to half of the participants (“women have outpaced men in some game genres”). In contrast to hypotheses, both studies failed to show the expected significant interaction effect of gender and ST condition on performance, although female participants confronted with the “standard” gender stereotype reported greater frustration in Study 1, for example. In sum, results indicate a complex relationship between gender, social identity, experience with the game genre, and behavior. Identifying oneself as a gamer and being experienced in a particular game genre were found to be better performance predictors than reading stereotype threatening information. [less ▲]

Detailed reference viewed: 64 (2 UL)
Full Text
Peer Reviewed
See detailImpact of reinforcement to moment resistance of composite slabs
Zhang, Qingjie UL; Schäfer, Markus UL; Kurz, Wolfgang

in The 2019 World Congress on Advances in Structural Engineering and Mechanics (ASEM19) (2019, September 17)

Composite slabs lead to slim and economic structural solutions with a low selfweight. The determination of their moment resistance follows the regulations presented in EN 1994-1-1 (2004) which are based ... [more ▼]

Composite slabs lead to slim and economic structural solutions with a low selfweight. The determination of their moment resistance follows the regulations presented in EN 1994-1-1 (2004) which are based on plastic design methods. The current version of Eurocode 4 does not consider explicitly additional reinforcement in the ribs for sagging moment resistance. However, the construction industry requires this possibility in order to provide economical and flexible design. Regarding this situation, further investigations are necessary to prove the applicability of plastic design methods. In the case of high bottom reinforcement ratio, a deep position of the plastic neutral axis occurs, and concrete compression failure may happen before most parts of the profiled steel sheeting and reinforcement yield. This leads to an overestimation of the bending resistance according to the plastic design method. A parametric study, based on approximately 290.000 different combinations of various cross-section geometries and materials, is provided to compare the plastic moment resistance with the resistance determined by strain-limited design. The results show that limitations are necessary to be enabled for the general application of plastic design methods. [less ▲]

Detailed reference viewed: 27 (1 UL)
Full Text
Peer Reviewed
See detailPhysical activity of children and adolescents in Luxembourg during school, physical education and leisure time: An accelerometry-based study
Eckelt, Melanie UL; Bund, Andreas UL; Hutmacher, Djenna UL et al

Poster (2019, September 13)

Objectives: Due to its great importance for development and health, the physical activity (PA) of children has become a key issue in research over the last decade. Simultaneously, the measurement of PA ... [more ▼]

Objectives: Due to its great importance for development and health, the physical activity (PA) of children has become a key issue in research over the last decade. Simultaneously, the measurement of PA has been strongly improved through the development of user-friendly and reliably working accelerometer, which allow to track PA over several consecutive days in an objective way. Although the benefits of accelerometry are well documented also for children (e.g. Hager et al., 2015), especially cross-national studies such as the Health Behaviour in School-aged Children (HBSC) are still using questionnaires and are focused only on overall or leisure time PA. This study as part of the PALUX project (Physical Activity of Children and Youth in Luxembourg) aims to (1) measure children's daily PA patterns using up-to-date accelerometers while (2) differentiating between PA in school, physical education and leisure time. Methods: In total, 242 children and adolescents (134 girls and 108 boys) aged from 10-18 years from 9 different schools in Luxembourg wore the ActiGraph GT3X-BT- accelerometer at the hip for a period of seven consecutive days. Total time in moderate-to-vigorous PA (MVPA) was calculated using the cut-of points from Evenson et al. (2008). Time spent in school and physical education were determined based on timetables provided by the schools. Results: Mean overall MVPA of participants over seven consecutive days was 307.6 min, with 98.4 min (32 %) during school time and 190.7 min (62 %) during leisure time. Only 16.7 min (6 %) of the school time MVPA were performed in physical education. Boys had more overall MVPA than girls (367.9 vs. 258.9 min, t(240) = 6.76, p < .01) due to significant differences in all areas considered here (schooltime: t(215) = 6.26, p < .01; leisure time: t(215) = 6.18, p < .01; physical education: t(188) = 3.07, p < .01). Children spent 25.6 min of an average physical education class of 77 min in MVPA, which is 19.71 % and thus much less than the 50 % recommended by the U.S. Department for Health and Human Sciences. Only 0.5% of the participants (1.2% of the boys and 0% of the girls) achieved this value. Discussion: Overall, 25.6 % of the children and adolescents in Luxembourg met WHO's PA guideline of at least 60 min MVPA per day, which is in line with results from other European countries. According to our data, the achieved MVPA is mainly due to leisure time activities, whereas the potential of school and physical education in providing and promoting PA has apparently not been fully exploited yet. The consistency of these findings will be examined in a second survey in 2019 [less ▲]

Detailed reference viewed: 66 (3 UL)
See detailSocial stratification in higher education trajectories: A sequence-analytical approach
Haas, Christina UL

Scientific Conference (2019, September 13)

Detailed reference viewed: 37 (2 UL)
Full Text
Peer Reviewed
See detailDifferences in physical activity among children with physically active and inactive parents
Eckelt, Melanie UL; Hutmacher, Djenna UL; Steffgen, Georges UL et al

Scientific Conference (2019, September 13)

Objectives: Parental physical activity is considered as positively related to children´s physical activity (PA; Sallis, Prochaska & Taylor, 2000). Since parents serve as role models, have the potential to ... [more ▼]

Objectives: Parental physical activity is considered as positively related to children´s physical activity (PA; Sallis, Prochaska & Taylor, 2000). Since parents serve as role models, have the potential to influence the health-related behavior and, for instance, to alter a mainly sedentary lifestyle of their children (Beets, Cardinal & Alderman, 2010), the impact of parental PA has become a key issue in research. Many studies report associations between parental PA and the PA behavior of their children, e.g., the direct involvement of the parents in activities with their children is related to increased levels of their PA (Adkins, Sherwood, Story, & Davis, 2004; Beets, Vogel, Chapman, Pitetti, & Cardinal, 2007). However, the mechanisms of parental influence are still poorly understood and besides recent studies are based on self-reported data. Therefore, this study aims to examine if parental PA is related to the subjectively and objectively measured PA of their children. Methods: 237 Luxembourgish children and adolescents (134 girls and 103 boys) aged from 10-18 years participated in the study. Via a digital questionnaire, the children indicated if their mother and father are physically active on a regular basis and if they are active together with their parents. Furthermore, the children and adolescents indicated if they are active at least 60 minutes/ day and if they own a membership in a sports club (MoMo physical activity questionnaire). Additionally, children’s PA behavior was objectively assessed by wearing an accelerometer (ActiGraph GT3X-BT) for a period of seven consecutive days. Activity was categorized as sedentary, light physical activity or moderate to vigorous physical activity (MVPA) using age-specific thresholds. Results: A multivariate ANOVA revealed significant differences in self-reported physical activity if the mother was physically active (F (2, 166) = 5.4, p < .01). Thus, children reported subjectively higher daily activity duration (p < .05) and more activities in a regular week (p < .01). There was no impact on self-reported PA if the father was active or the children were active with their parents together. Regarding the objective data, there were no significant differences between children with active parents and children with inactive parents. If the parents were active with their children together there were significant differences (F (3, 229) = 3.2, p < .05), thus MVPA per day was higher (p < .05) and the sedentary time was lower (p < .01). Neither subjective nor objective data revealed gender-specific differences. Discussion: In contrast to other studies, only the mother seems to have an influence on the subjective PA behavior of the children. The fact, that parents being active or in a sports club does not appear to enhance the PA of the children objectively. However, the objective PA is merely affected by being active together. According to this finding, joint activities of parents and children seem to be necessary to promote children’s PA effectively. It is important to note that in our study the parental PA was rated by the children. In future studies, parents should be included via self-report questionnaires and/or accelerometer. [less ▲]

Detailed reference viewed: 36 (2 UL)
Peer Reviewed
See detailIncome Inequality and the Strength of the Origins-Health Gradient in 20 European Countries
Chauvel, Louis UL; Bar-Haim, Eyal UL; Leist, Anja UL

Scientific Conference (2019, September 12)

Health is determined by socio-economic position not only of the individual, but also by that of their parents. The intergenerational transmission of health via parental socioeconomic status is suggested ... [more ▼]

Health is determined by socio-economic position not only of the individual, but also by that of their parents. The intergenerational transmission of health via parental socioeconomic status is suggested to vary according to contextual factors such as income inequality. Earlier studies with a comparative perspective had a limited number of countries available. This study uses 20 countries at up to five waves from the European Social Survey (2008-2016) and SWIID in order to examine the extent to which income inequality is related to the origins-health gradient. The higher the income inequality of a given country and year, the stronger the origins-health gradient. Contrary to earlier findings, this association can be fully explained by intergenerational transmission of status, i.e. education. Implications of this finding are that health is largely determined by educational attainment and associated health behaviors, giving societal context a less prominent role than earlier studies suggested. [less ▲]

Detailed reference viewed: 59 (7 UL)
Peer Reviewed
See detailDigital History as Trading Zone? Reflections from a Doctoral Training Unit
van der Heijden, Tim UL

Scientific Conference (2019, September 12)

This paper addresses the question how Digital History “trading zones” are being constituted in practice and how they are situated in physical working environments. The analysis is based on a case study of ... [more ▼]

This paper addresses the question how Digital History “trading zones” are being constituted in practice and how they are situated in physical working environments. The analysis is based on a case study of the Doctoral Training Unit (DTU) “Digital History and Hermeneutics”, an interdisciplinary research and training programme that was established at the Luxembourg Centre for Contemporary and Digital History (C²DH) of the University of Luxembourg. The DTU is designed as an interdisciplinary “trading zone”, in which thirteen doctoral candidates with different disciplinary backgrounds – from history, linguistics and philosophy to computer and information science – reflect on the epistemological and methodological challenges of doing digital history and humanities research (Fickers 2015, 2012). The paper reflects on the project’s first year, in which the doctoral researchers were introduced to various skills and methods in digital humanities as part of the so-called “DH incubation phase”. This phase included trainings in text mining, digital source criticism, database structures, data visualization, GIS analysis, tool criticism and algorithmic critique. The paper presents some of the main practical and epistemological opportunities and challenges of “thinkering”: the playful experimentation with digital tools and technologies for doing historical research. It furthermore reflects on the practical and institutional challenges of constituting an interdisciplinary trading zone, like the DTU. As such, it addresses a number of critical questions: How to build bridges between different knowledge domains in a specific research environment? How to stimulate interdisciplinary collaboration and to get scholars out of their disciplinary or methodological comfort zones? What is at stake in such interdisciplinary trading zones? Who are the traders – and what is being traded? The analysis is informed by studies on interdisciplinarity (Klein 2015, Deegan and McCarty 2012, Stehr and Weingart 2000), trading zones (Collins et al. 2007, Galison 1996, Kemman 2019) and communities of practice (Wenger 1998). Empirically, it draws on a series of semi-structured interviews and thirty-nine self-reflexive training reports, in which the doctoral researchers of the DTU discuss their experiences of doing digital history and hermeneutics in an interdisciplinary setting. Finally, the paper evaluates the suitability of the trading zone concept as analytical framework for studying interdisciplinary collaborations in Digital History as a field. [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailInteroceptive accuracy in preschool - aged children: The Jumping Jack Paradigm (JJP)
Opdensteinen, K.; Schaan, L.; Pohl, A. et al

Poster (2019, September 11)

Detailed reference viewed: 22 (1 UL)
Full Text
See detailA comparison between conventional Earth Observation Satellites and CubeSats; Requirements, Capabilities and Data Quality
Backes, Dietmar UL; Hassani, Saif Alislam UL; Teferle, Felix Norman UL et al

Scientific Conference (2019, September 11)

From its early beginning as an educational tool in 1999, cubesats have evolved into a popular platform for technology demonstrations and scientific instruments. Ideas and innovations sparked from an ... [more ▼]

From its early beginning as an educational tool in 1999, cubesats have evolved into a popular platform for technology demonstrations and scientific instruments. Ideas and innovations sparked from an enthusiastic community led to the development of new Earth Observation (EO) technology concepts based on large constellations of satellites with high-resolution optical imagers previously considered as infeasible. Probably the most significant constellation today is deployed by Planet who are currently operating a fleet larger than 120 3U Dove satellites, which provide an imaging service with up to 3m Ground Sample Distance (GSD). The number of low-cost EO Cubesat systems is constantly increasing. However, for a number of reasons there still seems to be a reluctance to use such data for many EO applications. A better understanding of the capabilities of the current generation of small Cubesats compared to the traditional well-established bigger operational missions of high and medium resolution EO satellites is required. What are the critical capabilities and quality indicators? Due to the limited size and weight of Cubesats, critical system components, e.g. for navigation and communication, always compete with operational payloads such as optical camera/sensor systems. A functional EO system requires balanced payload, which provides adequate navigational capabilities, that match the requirements of the optical imagers (camera) deployed with the system. This study reviews the current performance and capabilities of Cubesats for optical EO and compares them to the capabilities of conventional, dedicated high and medium resolution EO systems. We summarise key performance parameters and quality indicators to evaluate the difference between the systems. An empirical study compares recent very high-resolution (VHR) imagery from big EO satellite missions with available images from Cubesats for the use case in disaster monitoring. Small and agile Nanosatellites or Cubesats already show remarkable performance. Although it is not expected that their performance and capability will match those of current bigger EO satellite missions, they are expected to provide a valuable tool for EO and remote sensing, in particular for downstream industry applications. [less ▲]

Detailed reference viewed: 103 (28 UL)
See detailSome naturally defined star products for Kaehler manifolds
Schlichenmaier, Martin UL

Scientific Conference (2019, September 10)

Detailed reference viewed: 25 (0 UL)
Peer Reviewed
See detailImplicit attitudes and stereotypes concerning male and female ethnic minority students
Pit-Ten Cate, Ineke UL; Krischler, Mireille UL

Scientific Conference (2019, September 10)

Stereotypes and attitudes influence behavior and hence contribute to the integration of students from different backgrounds. Stereotypes reflect beliefs about the members of social groups (Fiske & Taylor ... [more ▼]

Stereotypes and attitudes influence behavior and hence contribute to the integration of students from different backgrounds. Stereotypes reflect beliefs about the members of social groups (Fiske & Taylor, 1991) and are associated with expectations, which in turn effect perception and judgments (Ferguson, 2003). Person perceptions- and judgments are however also affected by evaluations of objects (Sanbonmatsu & Fazio, 1990). Based on people´s stereotypical beliefs and associated thoughts and feelings, specific behavioral intentions develop and hence both may be pivotal for the level of acceptance or rejection of others. Research shows that stigmatization based on ethnicity can provide a barrier in terms of both social integration (MENJE, 2015) and educational equity (Gabel, et al., 2009). The current study aimed to assess young peoples´ implicit attitudes and stereotypes concerning male and female students from different ethnic backgrounds (German vs. Turkish). Implicit attitudes were measured using an implicit association task (IAT; Greenwald, et al., 2003). First names were used as a proxy for the ethnic background of the student. Participants (N=98) were randomly divided in two groups, completing either an IAT-boys version or an IAT-girls version. Stereotypes, in terms of students´ academic engagement were assessed using a questionnaire (Hachfeld, et al., 2012). Mean IAT-D scores for boys and girls did not differ, t(89)=1.05, p=.30. The IAT-D score for the whole sample (M=0.33, SD=1.28) was significantly different from zero, t(90)=2.46, p=.02, d=0.26, reflecting more negative implicit attitudes toward students with Turkish roots. Participants did not express differential stereotypical beliefs regarding the students´ academic engagement based on students´ ethnic background (i.e., subscale scores were significantly lower than the mean of the scale, t(88)=6.00, p<.001, d=0.64). No correlation was found between implicit attitudes and stereotypical beliefs (r=.12, n.s.). People´s implicit attitudes in favor of students from ethnic majorities may result in differential social interactions with students from different backgrounds (less acceptance of students with ethnic minority backgrounds). The dissociation between implicit attitudes and explicit stereotypical beliefs may reflect the social sensitivity of the relationship between students´ background and educational opportunities. [less ▲]

Detailed reference viewed: 18 (2 UL)
See detailExamining grades, achievement test scores, and three intelligence facets within an extended I/E model
Hausen, Jennifer UL; Möller, Jens; Greiff, Samuel UL et al

Scientific Conference (2019, September 10)

Domain-specific academic self-concepts (ASCs) are mental representations of one’s abilities that are specific to a particular school subject. According to the internal/external frame of reference (I/E ... [more ▼]

Domain-specific academic self-concepts (ASCs) are mental representations of one’s abilities that are specific to a particular school subject. According to the internal/external frame of reference (I/E) model, achievement influences the formation of ASCs via social and dimensional comparison processes: within one domain students not only compare their achievement with their peers (social comparison) but also with their own achievements in other domains (dimensional comparison). However, students’ intelligence as an indicator of achievement has been neglected within the I/E model framework. Yet, intelligence is known to be an important determinant of academic success and thus it can be assumed to influence the formation of academic self-concepts, too. Hence, this research examined the links between verbal, numerical, figural intelligence and domain-specific ASCs while controlling for grades and achievement test scores. We drew on N = 382 German students to analyze verbal, numerical, and figural intelligence, German and math achievement, domain-specific self-reported grades and ASCs in math, physics, German, and English. We performed structural equation modeling using Mplus 8 with grades, achievement scores and intelligence facets specified as manifest predictors and domain-specific ASCs as latent criteria. Positive within-domain relations indicating social comparison effects were found between math, physics, German, and English grade to their corresponding self-concept as well as from math achievement to math ASC. Dimensional comparison effects are implied by a positive cross-domain path between physics grade and math ASC and by negative cross-domain paths from math grade to German, physics, and English ASC. Further, a positive cross-domain relation was found between math achievement and physics ASC while a negative cross-domain path was found between German achievement and math ASC. With regard to the intelligence facets, positive paths were found between numerical intelligence and physics ASC as well as between verbal intelligence and English ASC. Our findings thus suggest numerical and verbal intelligence to be valid predictors of ASC formation in an extended I/E model beyond grades and test scores. Overall, the proposed I/E model permitted meaningful relations to be drawn between domain-specific achievement indicators and ASCs suggesting that these variables provide incremental validity. [less ▲]

Detailed reference viewed: 35 (1 UL)
Full Text
Peer Reviewed
See detailUnravelling the border-facade of France : a multi-level modelling of cross-border commuting
Pigeron-Piroth, Isabelle UL; Caruso, Geoffrey UL; Le Texier, Marion

in Caruso, Geoffrey; Gerber, Philippe; Jones, Catherine (Eds.) et al 21st European Colloquium on Theoretical and Quantitative Geography (ECTQG), Book of Abstracts, Mondorf-las-Bains, 5-9 septembre 2019 (2019, September 09)

Given its central position in Western Europe, France is the European country where cross-border commuting is most intense. Over 350000 residents cross the national border everyday to go to work. Cross ... [more ▼]

Given its central position in Western Europe, France is the European country where cross-border commuting is most intense. Over 350000 residents cross the national border everyday to go to work. Cross-border commuting raises a lot of concerns for planners on both side of each border, especially for provisioning transport infrastructure and local public services but also because it impacts land and housing markets, especially when salary differentials are high. While there is a lot of research about the daily functioning of specific borders (e.g. France-Switzerland or France-Luxembourg), generalization is lacking and spatial heterogeneities impede our understanding of the very determinants of cross-border commuting, such as the role of benefits differentials, transport costs and distance, or the relative availability of jobs at residential places and across the border. Further, these effects are most likely mediated differently by the socio-demographic characteristics of workers, their employment sector, and the quality of their residential environment at large. This suggests that an individual approach and a spatially detailed approach is needed, which contrasts sharply with the fact that most European-wide studies of cross-border commuting are conducted at very aggregated spatial scales (NUTS 2 or 3). [less ▲]

Detailed reference viewed: 39 (4 UL)
Full Text
See detailThe destruction of distraction? Neural mechanisms of reduced task-related analgesia with aging.
Rischer, Katharina Miriam UL; Dierolf, Angelika UL; Gonzalez-Roldan, Ana Maria et al

Poster (2019, September 06)

Detailed reference viewed: 36 (0 UL)
See detailThe long and winding road: analysing Science and Innovation Centres, a unique policy instrument of Science Diplomacy
Epping, Elisabeth UL

Scientific Conference (2019, September 05)

The aim of this paper is to empirically contribute to the study of science diplomacy and thereby introduce and analyse science and innovation centres (SIC) as a novel policy instrument in the science ... [more ▼]

The aim of this paper is to empirically contribute to the study of science diplomacy and thereby introduce and analyse science and innovation centres (SIC) as a novel policy instrument in the science diplomacy toolbox. SIC are distinct units or satellite institutes, established by governments abroad, operating at the nexus of higher education, research, innovation and diplomacy. Based on a comparative analysis of policy documents and interview data, insights into the development of SIC in Germany and Switzerland are generated. Furthermore, the (changing) political rationales that guide their development, and hence science diplomacy in general, are distilled. By applying a policy instrumentation lens, the research 1) uncovers the development of the two SIC over time reflecting similarities and differences, 2) shows that the political rationales for SIC are changing and exceed dominant science diplomacy notions of soft power, 3) reveals that the promotion of the concept of science diplomacy reflects a certain Zeitgeist and rather than being a novelty, existing practices are relabelled as science diplomacy. [less ▲]

Detailed reference viewed: 17 (2 UL)
Full Text
Peer Reviewed
See detail“It felt wrong to me to play that way” Understanding moral decision-making in video games through focus group discussions
Holl, Elisabeth UL; Bernard, Steve; Melzer, André UL

in Nebel, Steve; Pietschmann, Daniel; Schneider, Sascha (Eds.) et al Proceedings of the Media Psychology Division (2019, September 05)

Detailed reference viewed: 34 (3 UL)