References of "Scientific congresses, symposiums and conference proceedings"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailBack to the Moon: Legal Challenges for Future Lunar Exploration
Salmeri, Antonino UL

in Proceedings of the International Institute of Space Law (in press)

In the light of the recently renovated interest in returning humans to the Moon, this paper addresses the main legal challenges related, with the goal to show practical solutions under the current system ... [more ▼]

In the light of the recently renovated interest in returning humans to the Moon, this paper addresses the main legal challenges related, with the goal to show practical solutions under the current system of international space law. In order to do so, the paper first presents an overview of current lunar exploration programs, arguing that public and private missions raise different challenges and thus require specific models. Following, it accordingly assesses possible legal solutions for the regulation of these programs. On the one hand, States’ exploration programs may be governed by a revised version of the Intergovernmental Agreement already concluded for the International Space Station. On the other hand, private activities could be better organized relying on Articles VI-IX OST as integrated by a new UNGA Resolution, ad hoc bilateral agreements and specific provisions in national space legislations. Finally, the paper concludes underlining the importance of international cooperation as the key to ensure the peaceful use and exploration of outer space. [less ▲]

Detailed reference viewed: 24 (0 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 72 (4 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 44 (1 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 187 (19 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 129 (6 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 66 (10 UL)
Full Text
See detailDas Verhältnis zwischen Hochschule und Wissenschaft in Deutschland: Expansion – Produktion – Kooperation
Dusdal, Jennifer; Oberg, Achim; Powell, Justin J W UL

in DGS (Ed.) Komplexe Dynamiken globaler und lokaler Entwicklungen: Der Verhandlungsband des 39. Kongresses der Deutschen Gesellschaft für Soziologie vom 24.-28. September 2018 an der Georg-August-Universität Göttingen (in press)

Dieser Beitrag rekonstruiert den Einfluss der Hochschulentwicklung und der wissenschaftlichen Kapazitätsbildung auf die wissenschaftliche Wissensproduktion in Deutschland, einem der weltweit stärksten ... [more ▼]

Dieser Beitrag rekonstruiert den Einfluss der Hochschulentwicklung und der wissenschaftlichen Kapazitätsbildung auf die wissenschaftliche Wissensproduktion in Deutschland, einem der weltweit stärksten Produzenten wissenschaftlichen Wissen seit 1900. Folgende Forschungsfragen sollen beantwortet werden: Wie haben institutionalisierte Strukturen, und darin verschiedene Organisationsformen, die langfristige Entwicklung wissenschaftlicher Produktivität beeinflusst und verändert? In welchen organisationalen Netzwerken entwickelt sich aktuell die Wissenschaft weiter? Die Annäherung an den Forschungsgegenstand erfolgt auf der Makroebene anhand von Indikatoren zur Erfassung der globalen Expansion, Kooperation und Produktion der Wissenschaft. Vor dem Hintergrund dieses Untersuchungsrahmens wird dann auf der Mesoebene das Zusammenspiel von Organisationsformen in Deutschland mittels netzwerkanalytischer Verfahren betrachtet. Ziel des Beitrags ist, die Orte und institutionellen Settings wissenschaftlicher Produktion zu identifizieren und anhand ihrer Aufgaben und Ziele voneinander abzugrenzen sowie ihre Beziehungen zueinander herauszuarbeiten. Als theoretische Basis werden neo-institutionalistische Ansätze zur Untersuchung und Erklärung der Expansion des Hochschulwesens und der Wissenschaft und zur Analyse von organisationalen Netzwerken herangezogen. Grundlage der empirischen Analyse bilden Publikationen in peer-reviewed Zeitschriften als Kennzeichen wissenschaftlicher Produktion. [less ▲]

Detailed reference viewed: 39 (3 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 305 (4 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 178 (6 UL)
Full Text
Peer Reviewed
See detailExternalisation de la politique migratoire et identité de l'Union européenne
Neframi, Eleftheria UL; Gatti, Mauro UL

in Benlolo, Myriam (Ed.) L'Union européenne et les migrations (in press)

Detailed reference viewed: 36 (1 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 53 (0 UL)
Full Text
Peer Reviewed
See detailComputational Arithmetic of Modular Forms
Wiese, Gabor UL

in Buyukasik, Engin; Inam, Ilker (Eds.) Notes from the International Autumn School on Computational Number Theory: Izmir Institute of Technology 2017 (in press)

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as ... [more ▼]

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as possible, and to enable the devoted student to implement it over any ring (such that a sufficient linear algebra theory is available in the chosen computer algebra system). The chosen approach is based on group cohomology and along the way the needed tools from homological algebra are provided. [less ▲]

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailUsing Passive Data Collection Methods to Learn Complex Mobility Patterns: An Exploratory Analysis
Toader, Bogdan UL; Cantelmo, Guido UL; Popescu, Mioara et al

Scientific Conference (in press)

Detailed reference viewed: 34 (0 UL)
Full Text
Peer Reviewed
See detailRigor or rhetoric: Public philosopher and public in dialogue
Burks, Deven UL

in Perspectives: international postgraduate journal of philosophy (in press), 9

Brian Leiter (2016) throws down two gauntlets to philosophers engaged in dialogue with the broader public. If, with the first, public philosophers recognize that they cannot offer substantive answers but ... [more ▼]

Brian Leiter (2016) throws down two gauntlets to philosophers engaged in dialogue with the broader public. If, with the first, public philosophers recognize that they cannot offer substantive answers but only sophisticated method, they nevertheless fail to realize that said method does not resonate with the very public whom they purport to help. For, with the second, that method does not engage the emotivist and tribalist cast of contemporary public discourse: emotivist because a person’s moral and political beliefs are a function of emotional attitudes or affective responses for which she adduces reasons post hoc; tribalist because the person tracks not the inferential relation between beliefs but her similarity with interlocutors. In order to understand the full extent of this critique, it is necessary, first, to parse strands of public philosophy, distinct discursive sites, and pictures of philosophical practice and, then, to probe the critique’s empirical groundedness and intended scope. These elements in place, it is then possible to sketch public philosophy reconceived along Leiter’s lines as equal part rigor and rhetoric. That sketch may be somewhat filled out through two tactics employed in Jeffrey Stout’s (2004, 2010) work. These form part of a toolkit for philosophical dialogue whereby philosophers get a discursive grip on non-discursive factors underlying public discourse and push back on Leiter's dilemma. [less ▲]

Detailed reference viewed: 37 (1 UL)
Full Text
Peer Reviewed
See detailCoercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme
Roenne, Peter UL; Atashpendar, Arash UL; Kristian, Gjøsteen et al

in Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (in press)

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE ... [more ▼]

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The pairwise comparison-based approach of JCJ using plaintext equivalence tests leads to a quadratic blow-up in the number of votes, which makes the tallying process rather impractical in realistic settings with a large number of voters. We show how the removal of invalid votes can be done in linear time via a solution based on recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE. We conclude by touching upon some of the advantages and challenges of such an approach, followed by a discussion of further security and post-quantum considerations. [less ▲]

Detailed reference viewed: 128 (37 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 51 (0 UL)
Full Text
Peer Reviewed
See detailTopologie culinaire au cinéma : le lieu commun du repas et ses déclinaison
Roelens, Nathalie UL

in Bibliothèque électronique Paris 8 (in press)

Detailed reference viewed: 114 (9 UL)
Full Text
See detailFundamental rights and constitutional identity(ies): limits or parameters of the EU constitutional governance?
Zinonos, Panagiotis UL

in European Governance and Sovereignty (in press)

Detailed reference viewed: 32 (11 UL)
Peer Reviewed
See detailValue-added modeling in primary school: What covariates to include?
Levy, Jessica UL; Brunner, Martin; Keller, Ulrich UL et al

Scientific Conference (2019, August)

Detailed reference viewed: 37 (3 UL)
Peer Reviewed
See detailBracketing in student writing: its uses (and abuses)
Deroey, Katrien UL

Scientific Conference (2019, July 23)

This paper reports on the use of bracketed text in a large corpus of student writing. The function of bracketing has been neglected in academic writing research and coursebooks. Yet it is closely related ... [more ▼]

This paper reports on the use of bracketed text in a large corpus of student writing. The function of bracketing has been neglected in academic writing research and coursebooks. Yet it is closely related to important text construction issues such as information packaging, coherence, clarity, conciseness, intertextual framing and sourcing. With a view to informing academic writing description and instruction, we examined the relationship between bracketed text and its cotext in a wide variety of disciplines and assignment genres. The relationships are described using an adaptation of Halliday and Matthiessen’s (2014) logico-semantic framework of clausal relationships. To better understand and teach the use of this information packaging feature, we studied the relationship between bracketed text and its cotext in the British Academic Written English (BAWE) corpus of high-graded student assignments. Using Sketch Engine and corpus query language, we extracted a random sample of 2000 instances of bracketing in running text only. This subcorpus is composed of 500 instances from each of the four main disciplinary groupings (Arts and Humanities, Life Sciences, Physical Sciences, Social Sciences) and contains instances from most of the BAWE assignment genres. The concordances were imported into a database table in FileMaker Pro. This database programme facilitates coding by limiting choices depending on previous selections and thus guiding the coder through the analytical steps. For the analysis of the data, it offers flexibility for grouping records and aggregating results on different levels. The logico-semantic framework used in systemic functional linguistics to classify the relationships between clauses (Halliday & Matthiessen, 2014) served as our starting point to classify the relationships between bracketed text and cotext. This framework distinguishes two fundamental logico-semantic relationships: expansion, which ‘relates phenomena as being of the same order of experience’, and projection, which ‘relates phenomena of one order of experience (the processes of saying and thinking) to phenomena of a higher order (semiotic phenomena – what people say and think)’ (p. 443). The latter contains three subtypes: elaboration (‘one clause elaborates on the meaning of another by further specifying or describing it’) (p. 461), enhancement (‘one clause (or subcomplex) enhances the meaning of another by qualifying it) (p. 476) and extension (‘one clause extends the meaning of another by adding something new to it’) (p. 471). This framework was refined and expanded through several stages of interrating and discussion in order to reflect our findings. We first analysed a random sample of 1000 instances from the whole BAWE corpus. With the resulting adapted classificatory framework we next independently analysed a quarter of our subcorpus of 2000 concordances. This led to further refinement of the framework and classificatory criteria. Finally, we each analyzed a different set of concordances from the disciplinary groupings. Disciplinary informants were consulted where needed. Our analysis revealed four major logico-semantic relationships between the bracketed text and cotext: in addition to Halliday & Matthiessen’s (2014) projection (1) and expansion (elaboration (2), enhancement (3, 4), extension (5)), we identified bracketed text functioning as intratextual reference (6) and code (7). The few instances that could not be confidently classified were assigned to a ‘hard to classify’ category. (1) However the anticipated number of children per woman in Europe and the USA is still near or above two (Bongaarts, 1999), showing that many are still having children. (2) Many of these injures are healed fractures and breaks occurring around the torso (upper body). (3) It is dated to the reign of Nectanebo II (360-343 BC). (4) Acetanilide (4.78g, 35.4 mmol) was dissolved in cold, glacial acetic acid (25ml, 437.1 mmol) (5) Parmenides decision to include a cosmology that he has already (apparently) proved to be flawed is an interesting one to say the least. (6) This is called circular polarization (figure 5) and is the natural state of white light. (7) Stronger field ligands such as (PPh 3) and (NCS) increase the splitting. Projection was –perhaps not surprisingly- the most common relationship by far, although markedly less frequent in the Physical Sciences. Expansion was mainly achieved through elaboration, with restatements (2) and abbreviations predominating. Enhancement relationships were mostly temporal locations (3) or measurements (4). Extension was relatively rare (5). Intratextual references (6) took various forms, such as figures, appendices, equations, and line numbers for quoted text. Bracketed code was a marked feature of the Physical Sciences, occurring in formulae and enclosing symbols or abbreviations (7). Overall, students’ use of bracketed text appeared to reflect disciplinary conventions and reflected the genre goals of assignments by demonstrating knowledge, understanding and appropriate source use. Contrary to expectations, instances where the bracketed text seemed superfluous or adversely affected coherence were rare. We conclude by discussing what these findings mean for academic writing instruction. Reference Halliday, M. A. K., & Matthiessen, C. M. I. M. (2014). Halliday's introduction to functional grammar (4 ed.). Abingdon: Routledge. [less ▲]

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailTogether or Alone: The Price of Privacy in Collaborative Learinig
Pejo, Balazs UL; Tang, Qiang; Biczók, Gergely

in Proceedings on Privacy Enhancing Technologies (2019, July)

Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training ... [more ▼]

Machine learning algorithms have reached mainstream status and are widely deployed in many applications. The accuracy of such algorithms depends significantly on the size of the underlying training dataset; in reality a small or medium sized organization often does not have the necessary data to train a reasonably accurate model. For such organizations, a realistic solution is to train their machine learning models based on their joint dataset (which is a union of the individual ones). Unfortunately, privacy concerns prevent them from straightforwardly doing so. While a number of privacy-preserving solutions exist for collaborating organizations to securely aggregate the parameters in the process of training the models, we are not aware of any work that provides a rational framework for the participants to precisely balance the privacy loss and accuracy gain in their collaboration. In this paper, by focusing on a two-player setting, we model the collaborative training process as a two-player game where each player aims to achieve higher accuracy while preserving the privacy of its own dataset. We introduce the notion of Price of Privacy, a novel approach for measuring the impact of privacy protection on the accuracy in the proposed framework. Furthermore, we develop a game-theoretical model for different player types, and then either find or prove the existence of a Nash Equilibrium with regard to the strength of privacy protection for each player. Using recommendation systems as our main use case, we demonstrate how two players can make practical use of the proposed theoretical framework, including setting up the parameters and approximating the non-trivial Nash Equilibrium. [less ▲]

Detailed reference viewed: 38 (1 UL)
See detailExpansion nach Belgien als Verwaltungstätigkeit: der Kölner Beamte Franz Thedieck im NS
Brüll, Christoph UL

Scientific Conference (2019, June 28)

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailBenefits, challenges, social learning and controversies around Local Food Systems
Reckinger, Rachel UL; Nemes, Gusztav; Lajos, Veronika

Scientific Conference (2019, June 25)

Objectives: Our WG touches upon three main elements among the themes of the conference: (1) innovation, (2) social justice and (3) knowledge production. Innovative local food systems and alternative food ... [more ▼]

Objectives: Our WG touches upon three main elements among the themes of the conference: (1) innovation, (2) social justice and (3) knowledge production. Innovative local food systems and alternative food networks, approached from a collaborative and participatory angle, bring about a cultural shift by associating prosumers through a renewed form of trust, reciprocity and community, thus reinforcing social and ecological justice. At the same time, such heterodox actors in the transition to more sustainable food systems create new forms of knowledge, that are contested, co-constructed and potentially conflictual – along with enabling or disabling policymaking and, often, in dialogue with research. Our main objective is in this topic to start the process of creating an edited special issue of a peer reviewed journal (Sociologia Ruralis, Studies of Agricultural Economics or similar) should raise from this WG. We invite researchers working in the area of (local) food systems, alternative food networks, short food supply chains and related topics (rural tourism, community supported agriculture, etc.). We consider both the benefits and possible conflicts/problems in the connected socio-economic, cultural and environmental processes and welcome theoretical papers and case studies, too. Topic: By welcoming case studies from all geographical areas, in a comparative manner, this Working Group’s aim is to address different understandings and dynamics happening within and around different types of Local Food Systems (LFS). Alternative food networks, local food systems and short food supply chains have long been viewed as a sustainable, green way of raising the value added and creating opportunities for sur/re-vival of rural economy and society. They induce many benefits in terms of environmental impact, cultural exemplification, ethical entrepreneurship, social justice or rural development. Conceptually, LFS can be understood as ‘local food for local people’, as for example in the Slow Food or the community supported agriculture (CSA) movements. They are then associated with low food miles, environmental protection (Jones 2002), enhanced social networks and revitalised local communities (Fenstra 1997). From a local economic development perspective, in particular when LFS produce high quality products, they can equally be considered as ‘local food for non-local people’, either transported to urban centres, or attracting flows of tourists into rural areas. Here LFS can still enhance local businesses, economic and rural development, yet social and environmental benefits (Guthman 2004) of such foodstuffs, marketed with the added value of environmental and social responsibility, are more difficult to trace. Therefore, besides benefits, we would also like to analyse potential dissonances, that the distinction between local or extra-local target groups help to identify – for instance: • established, certified organic producers might criticize non-certified yet organically producing CSAs as fragmenting an already minority market or showing a lack of solidarity by not contributing to organic labels; • when LFS end up producing high quality, expensive products, a dynamic of social exclusion might occur, favoring the wealthy; • enhanced local production, tourism, and visitor pressure can cause social, economic, and environmental degradation, multiplier effects do not always occur to build more businesses and sustain social and economic capital; • innovative alternative food networks tend to struggle with territorial competition over land and resources, but if they rely on external investments, they might additionally be confronted – more insidiously – with the risk of co-option by neoliberal corporate agendas. We welcome analyses focusing on negotiations and struggles among actors in a multifaceted foodscape, where some block and some enhance transitions. Viewing the relationships, interconnectedness and agency of niche innovations, local and non-local appropriations as well regime hegemonies opens up the theoretical perspective of contested knowledge claims. We look for questions and answers including: • How are dynamics of “knowing and growing food in a contested arena” (Goodman, DuPuis, Goodman, 2014) negotiated – sometimes in a mutually enhancing and locally beneficial way, sometimes in more conflictual ways? • What are the local and extra-local stakeholders’ (producers, intermediaries, customers, tourists) different and often conflicting interests and responsibilities in LFS? • What can we learn from the tensions and local problems of LFS in order to support relevant policies to solve current controversies within the sector? • How can rural sociologists use their knowledge and influence to support local rural stakeholders of LFS? [less ▲]

Detailed reference viewed: 81 (2 UL)
Peer Reviewed
See detailNetworks and Governance of Local Food Systems. The case of Food Policy Councils
Reckinger, Rachel UL

Scientific Conference (2019, June 06)

Detailed reference viewed: 58 (3 UL)
Peer Reviewed
See detailCraving for violence: The role of Dark Personality traits in violent video game preference
Melzer, André UL

Scientific Conference (2019, June)

Background: Violent and antisocial video games are popular, but little is known why players are drawn to these kinds of games. This present research tested whether there is a connection between player ... [more ▼]

Background: Violent and antisocial video games are popular, but little is known why players are drawn to these kinds of games. This present research tested whether there is a connection between player preferences for violent games and characteristics of so called “dark” personality traits. Method: Relying on a user-centered approach, three online studies (N=662) examined the role of “dark” personality traits together with a novel violent game preference short scale. Results: Study 1 and 2 indicated strong correlations between trait aggression and players’ interest in explicit depictions of blood and gore and games that provide experiences of domination and antisocial behavior. In Study 3, the new scale was tested together with participants’ trait aggression, trait empathy, and the Dark Triad traits of psychopathy, Machiavellianism, and narcissism. Games featuring violence and the possibility of antisocial behavior were found to meet the needs of players who lack empathy and show callous, impulsive, and exploitive (but not narcissistic) attributes. Conclusions: Findings of individual motivators for game violence significantly extend the literature that is predominantly focusing on the effects of playing these games. Apparently, game preferences and playing habits fulfill individual needs that are at least partly determined by particular, i.e. “dark”, personality characteristics. [less ▲]

Detailed reference viewed: 70 (2 UL)
Peer Reviewed
See detailReading in a new technology environment: Are reading assessments still in the ballpark?
Reichert, Monique UL; Krämer, Charlotte UL; Wollschläger, Rachel UL

Scientific Conference (2019, May 31)

Using digital technologies for daily activities such as communicating or learning has become ubiquitous today. This trend is also clearly visible within the field of reading habits, especially among ... [more ▼]

Using digital technologies for daily activities such as communicating or learning has become ubiquitous today. This trend is also clearly visible within the field of reading habits, especially among adolescents: Recent studies underline that traditional text types (e.g., fiction books) are no longer part of the more commonly read text materials (Duncan et al., 2016). The question addressed in the presentation will deal with the degree to which different reading habits impact on adolescents’ reading competence, and is intended to encourage a discussion about the construct of reading competence as generally operationalized in reading competence assessments. We base our considerations on the analyses of two data sets: The first one deals with the extra-curricular reading habits of 3074 9th grade students, and the impact of these practices on their German reading competence. The corresponding data are taken from a survey regarding their reading habits in terms of ten different types of texts (e.g., non-fiction books, e-mails). A regression analysis reveals the strongest impact on reading competence for narrative texts, whilst reading digital texts – although highly attractive among the students – is found to be of minor importance. The second data set differentiates between the reading habits of around 4500 adolescents regarding 1) traditional (printed) texts, 2) digitalised texts (e.g., e-books), and 3) text types that have emerged with new technologies (e.g., social media texts). The ensuing discussion compares particularities of classical and digital texts, and raises questions concerning the construct of reading competence (to be) targeted by standardized tests. [less ▲]

Detailed reference viewed: 58 (5 UL)
See detailMonitoring du système scolaire – Le modèle luxembourgeois (invited talk)
Fischbach, Antoine UL

Scientific Conference (2019, May 21)

Detailed reference viewed: 22 (2 UL)
Full Text
Peer Reviewed
See detailVIEW-INVARIANT ACTION RECOGNITION FROM RGB DATA VIA 3D POSE ESTIMATION
Baptista, Renato UL; Ghorbel, Enjie UL; Papadopoulos, Konstantinos UL et al

in IEEE International Conference on Acoustics, Speech and Signal Processing, Brighton, UK, 12–17 May 2019 (2019, May)

In this paper, we propose a novel view-invariant action recognition method using a single monocular RGB camera. View-invariance remains a very challenging topic in 2D action recognition due to the lack of ... [more ▼]

In this paper, we propose a novel view-invariant action recognition method using a single monocular RGB camera. View-invariance remains a very challenging topic in 2D action recognition due to the lack of 3D information in RGB images. Most successful approaches make use of the concept of knowledge transfer by projecting 3D synthetic data to multiple viewpoints. Instead of relying on knowledge transfer, we propose to augment the RGB data by a third dimension by means of 3D skeleton estimation from 2D images using a CNN-based pose estimator. In order to ensure view-invariance, a pre-processing for alignment is applied followed by data expansion as a way for denoising. Finally, a Long-Short Term Memory (LSTM) architecture is used to model the temporal dependency between skeletons. The proposed network is trained to directly recognize actions from aligned 3D skeletons. The experiments performed on the challenging Northwestern-UCLA dataset show the superiority of our approach as compared to state-of-the-art ones. [less ▲]

Detailed reference viewed: 71 (17 UL)
Full Text
Peer Reviewed
See detailWho’s afraid of Donkey Kong? Testing the Stereotype Threat Effect in Video Gaming
Holl, Elisabeth UL; Wagener, Gary L.; Melzer, André UL

Scientific Conference (2019, May)

In two studies (Study 1: N = 130; Study 2: N = 56) participants played a video game (Bejeweled 3; SkyChasers) and were either confronted with a stereotype threat (ST) or not. ST is defined as the risk of ... [more ▼]

In two studies (Study 1: N = 130; Study 2: N = 56) participants played a video game (Bejeweled 3; SkyChasers) and were either confronted with a stereotype threat (ST) or not. ST is defined as the risk of confirming a negative stereotype about one’s own group and has been investigated in various field, i.a. in gaming. In the first study participants were confronted with the stereotype that women would perform worse in video games than men. In the second study we worked with a reversed stereotype, namely that women would have now outpaced males in some genres of video games. Our results show that performance varies across gender and genre. Although we did not find the hypothesized interaction effect of gender and ST condition in performance, self-reported measures, such as perceived frustration, and moderating variables indicate performance differences both for women and men, but on different psychological dimensions. [less ▲]

Detailed reference viewed: 90 (8 UL)
Full Text
Peer Reviewed
See detailLearning to Sport and Refactor Inconsistent Method Names
Liu, Kui UL; Kim, Dongsun; Bissyande, Tegawendé François D Assise UL et al

in 41st ACM/IEEE International Conference on Software Engineering (ICSE) (2019, May)

To ensure code readability and facilitate software maintenance, program methods must be named properly. In particular, method names must be consistent with the corresponding method implementations ... [more ▼]

To ensure code readability and facilitate software maintenance, program methods must be named properly. In particular, method names must be consistent with the corresponding method implementations. Debugging method names remains an important topic in the literature, where various approaches analyze commonalities among method names in a large dataset to detect inconsistent method names and suggest better ones. We note that the state-of-the-art does not analyze the implemented code itself to assess consistency. We thus propose a novel automated approach to debugging method names based on the analysis of consistency between method names and method code. The approach leverages deep feature representation techniques adapted to the nature of each artifact. Experimental results on over 2.1 million Java methods show that we can achieve up to 15 percentage points improvement over the state-of-the-art, establishing a record performance of 67.9% F1-measure in identifying inconsistent method names. We further demonstrate that our approach yields up to 25% accuracy in suggesting full names, while the state-of-the-art lags far behind at 1.1% accuracy. Finally, we report on our success in fixing 66 inconsistent method names in a live study on projects in the wild. [less ▲]

Detailed reference viewed: 89 (4 UL)
Full Text
Peer Reviewed
See detailParallel coordinate descent algorithms for sparse phase retrieval
Yang, Yang UL; Pesavento, Marius; Eldar, Yonina C. et al

in Proc. 2019 IEEE International Conference on Acoustics, Speech and Signal (ICASSP) (2019, May)

Detailed reference viewed: 106 (10 UL)
Full Text
Peer Reviewed
See detailYou Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems
Liu, Kui UL; Koyuncu, Anil UL; Bissyande, Tegawendé François D Assise UL et al

in The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019) (2019, April 24)

Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure ... [more ▼]

Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure that it reaches significant milestones by reliably comparing state-of-the-art tools for a better understanding of their strengths and weaknesses. In this work, we identify and investigate a practical bias caused by the fault localization (FL) step in a repair pipeline. We propose to highlight the different fault localization configurations used in the literature, and their impact on APR systems when applied to the Defects4J benchmark. Then, we explore the performance variations that can be achieved by "tweaking'' the FL step. Eventually, we expect to create a new momentum for (1) full disclosure of APR experimental procedures with respect to FL, (2) realistic expectations of repairing bugs in Defects4J, as well as (3) reliable performance comparison among the state-of-the-art APR systems, and against the baseline performance results of our thoroughly assessed kPAR repair tool. Our main findings include: (a) only a subset of Defects4J bugs can be currently localized by commonly-used FL techniques; (b) current practice of comparing state-of-the-art APR systems (i.e., counting the number of fixed bugs) is potentially misleading due to the bias of FL configurations; and (c) APR authors do not properly qualify their performance achievement with respect to the different tuning parameters implemented in APR systems. [less ▲]

Detailed reference viewed: 86 (10 UL)
Full Text
Peer Reviewed
See detailIoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis
Msadek, Mohamed Nizar UL; Soua, Ridha UL; Engel, Thomas UL

in The IEEE Wireless Communications and Networking Conference (WCNC) (2019, April 19)

Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface ... [more ▼]

Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface, which can seriously harm users’ privacy. We demonstrate in this paper that an attacker is able to disclose sensitive information about the IoT device, such as its type,by identifying specific patterns in IoT traffic. To perform the fingerprint attack, we train machine-learning algorithms based on selected features extracted from the encrypted IoT traffic.Extensive simulations involving the baseline approach show that we achieve not only a significant mean accuracy improvement of 18.5% and but also a speedup of 18.39 times for finding the best estimators. Obtained results should spur the attention of policymakers and IoT vendors to secure the IoT devices they bring to market. [less ▲]

Detailed reference viewed: 55 (3 UL)
Peer Reviewed
See detailHow can we support lecturers in English-medium instruction?
Deroey, Katrien UL

Scientific Conference (2019, April 13)

English-medium instruction (EMI) is a worldwide phenomenon. EMI language and communication issues (e.g. Hu et al., 2014; Murray, 2015; Werther et al., 2014) have led to calls for EAP practitioners to ... [more ▼]

English-medium instruction (EMI) is a worldwide phenomenon. EMI language and communication issues (e.g. Hu et al., 2014; Murray, 2015; Werther et al., 2014) have led to calls for EAP practitioners to collaborate with lecturers and other HE stakeholders to explore ways in which these lecturers can be supported and teaching standards ensured (Coleman, 2006; Doiz et al., 2013; Dubow & Gundermann, 2017). The design and implementation of EMI training and support programmes can be an especially challenging task for EAP practitioners. First, lecturers may not recognize the need for support and may be reluctant to be assessed. Second, we need to factor in practical considerations such as their limited availability and possible reluctance to attend ‘classes’ with colleagues. Third, we have limited resources in terms of specialized standardized tests, training materials and research literature that could inform our 'course' design. Innovative approaches are therefore needed to factor in all these circumstances. This paper has two main parts. First I summarize research on the challenges EMI lecturers face, including the results of a needs analysis among lecturers at the University of Luxembourg and my work on lecture discourse organization (Deroey, 2015). From the relatively few studies that exist, we will see that lecturers tend to believe they have sufficient English language skills and that reduced interactivity is a particularly common issue. Second, I survey different support and training schemes at HE institutions across the world. Here, it will become clear that work on relevant pedagogical skills needs to be included and an apparently ‘remedial’ approach should be avoided if we want to get lecturers on board. [less ▲]

Detailed reference viewed: 42 (0 UL)
Full Text
See detailADVANCES IN GEOMETRY INDEPENDENT APPROXIMATIONS
Anitescu, Cosmin; Atroshchenko, Elena; Bordas, Stéphane UL et al

Scientific Conference (2019, April 11)

We present recent advances in geometry independent field approximations. The GIFT approach is a generalisation of isogeometric analysis where the approximation used to describe the field variables no ... [more ▼]

We present recent advances in geometry independent field approximations. The GIFT approach is a generalisation of isogeometric analysis where the approximation used to describe the field variables no-longer has to be identical to the approximation used to describe the geometry of the domain. As such, the geometry can be described using usual CAD representations, e.g. NURBS, which are the most common in the CAD area, whilst local refinement and meshes approximations can be used to describe the field variables, enabling local adaptivity. We show in which cases the approach passes the patch test and present applications to various mechanics, fracture and multi-physics problems. [less ▲]

Detailed reference viewed: 118 (1 UL)
See detailLes résistances belge et luxembourgeoise et leurs conceptions européennes
Brüll, Christoph UL

Scientific Conference (2019, April 10)

La deuxième Occupation allemande en un quart de siècle a vu se développer en Belgique et au Luxembourg une série de mouvements de Résistance aux caractéristiques et conceptions politiques très diverses ... [more ▼]

La deuxième Occupation allemande en un quart de siècle a vu se développer en Belgique et au Luxembourg une série de mouvements de Résistance aux caractéristiques et conceptions politiques très diverses. Parmi les Résistants qui s’interrogent sur l’après-guerre, deux tendances lourdes s’affirment : le rétablissement de l’indépendance nationale et la démilitarisation d’une Allemagne vaincue. Il en résulte aussi des plans pour l’Europe qui reposent toutefois rarement sur une approche systématique de la question. Une importance cruciale revient à la question des liens entre mouvements de Résistance et gouvernements en exil. Par ailleurs, il y a des personnalités qui, comme le futur Premier ministre luxembourgeois Pierre Werner, s’engagent aux côtés de la Résistance française et réfléchissent sur l’avenir du continent. La contribution se propose d’établir un inventaire de ces initiatives et d’adopter (là où c’est possible) une perspective comparatiste. Finalement, nous examinerons le rôle des mouvements de Résistance dans la vie politique de l’après-guerre et l’engagement de certains Résistants dans les débuts de l’intégration européenne après 1945. [less ▲]

Detailed reference viewed: 32 (1 UL)
Full Text
See detailImproved Monitoringand Tracking Hurricanes using GPS Atmospheric WaterVapour
Ejigu, Yohannes Getachew; Teferle, Felix Norman UL; klose, Anna et al

Poster (2019, April 09)

Detailed reference viewed: 40 (2 UL)
See detailIntegrated micromechanical model for slope stability analysis
Kabore, Brice Wendlassida UL; Peters, Bernhard UL

Scientific Conference (2019, April 09)

Advances in supercomputing hardware have made it possible to handle highly complex geomechanical analysis with large data. Thus, particle-based methods are gaining an ever-increasing interest with ... [more ▼]

Advances in supercomputing hardware have made it possible to handle highly complex geomechanical analysis with large data. Thus, particle-based methods are gaining an ever-increasing interest with massively parallel programs being developed. These methods have been applied to the analysis of failure mechanisms and scenarios such as mass movement in landslides, avalanches under static, dynamic or seismic loading condition. They provide deep insights into the meso and micro-scale mechanisms leading to macroscopic instabilities. This contribution describes a micromechanical model for stability analysis and simulation in natural or man-made slopes under complex loading and boundary conditions. Based on the micromechanics of loose granular and compacted geomaterial, microstructural change, viscoelastic deformations, fracture, and healing are explicitly integrated into a coupled discrete particle and beam lattice model. Stress-based failure criteria and energy based dissipation and frictional contact are employed. Both gravity increase and strength reduction methods have been employed to evaluate the Factor of Safety (FoS) and potential failure surface and compared. With an emphasis on the impact of the microstructure and its spatial variability on stress-induced microcracks and crack propagation, this study outlines material models and properties relevant to stability analysis. Special focus has been put on layered slopes which present varying shear strength along the depth formed over time according to pressure, temperature, and moisture such as snowpack. This microstructural approach unifies geometrical and material information and allows the structural assembling layers of different strength. [less ▲]

Detailed reference viewed: 39 (8 UL)
Full Text
Peer Reviewed
See detailAn interface resolved immersed boundary method in XDEM for particulate flow simulations
Wu, Mingqiu UL; Peters, Bernhard UL; Rosemann, Tony et al

in International Congress on Particle Technology (2019, April 09)

immersed boundary method (IBM) has recently been used for particulate flows and complex fluid-solid interaction problems. The IBM was first introduced by Peskin to simulate blood flow in a beating heart ... [more ▼]

immersed boundary method (IBM) has recently been used for particulate flows and complex fluid-solid interaction problems. The IBM was first introduced by Peskin to simulate blood flow in a beating heart. Later it has been extended for a different range of applications. The advantages of IBM over the body-fitted method is that it substantially simplified grid generation for immersed geometries, and it is easier to handle moving boundary situations. IBM even allows the use of a stationary and non-deformation background mesh, as well as it reduces the cost of computation by avoiding generation of a body-fitted mesh for each time step. However, the IBM approach is not straightforward to implement and it requires special techniques for cut-off boundary cells as well as special techniques for data point interpolations. Generally, the IBM is classified into two approaches based on the methods of imposing the boundary condition in the immersed body. The first approach is called fictitious domain method with continuous forcing scheme which employs a distributed forcing function to impose a rigidity boundary condition in the solid particle domain. The second one is the discrete forcing approach, which enables a sharp interface to represent the immersed surface. The IBM discussed in this work is a combination of these above two approaches: we first employ the continuous forcing scheme to get a first-step approximation of the immersed body, then use an interpolation polynomial to impose a desired accurate physical boundary for each immersed boundary point based on a least square interpolation reconstruction scheme. Particle motions can be calculated and tracked by solving Newton’s equations of motions using the extended discrete element method (XDEM) while the data of fluid flow properties are obtained by solving the Navier-Stokes equations which govern the fluid phase. Combined this leads to the basic concept of DEM-CFD coupling. Therefore, a particle interface resolved simulation solver is developed by coupling the XDEM and IBM approaches together. Consequently, this solver is then used to handle both static and dynamic particle problems as well as particle packed bed simulations. The validation of the solver can be performed by setting one static sphere in a channel and evaluate the drag coefficients and Strouhal number (when shedding occurs) at various Reynolds [less ▲]

Detailed reference viewed: 50 (8 UL)
Full Text
Peer Reviewed
See detailAn Effective Hybrid Imperialist Competitive Algorithm and Tabu Search for an Extended Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 34th ACM/SIGAPP Symposium On Applied Computing, Limassol, Cyprus April 8-12, 2019 (2019, April 08)

An extended version of the flexible job shop problem is tackled in this work. The investigated extension of the classical flexible job shop problem allows the precedences between the operations to be ... [more ▼]

An extended version of the flexible job shop problem is tackled in this work. The investigated extension of the classical flexible job shop problem allows the precedences between the operations to be given by an arbitrary directed acyclic graph instead of a linear order. The problem consists of designating the operations to the machines and sequencing them in compliance with the supplied precedences. The goal in the present work is the minimization of the makespan. In order to produce reasonable outcomes in acceptable time, a hybrid imperialist competitive algorithm and tabu search is proposed to solve the problem. Numerical experiments assess the efficiency of the proposed method and compare it with well-known scheduling algorithms. [less ▲]

Detailed reference viewed: 99 (19 UL)
See detailMortgages and Life Time Contracts
Ratti, Luca UL

Scientific Conference (2019, April 05)

Detailed reference viewed: 46 (0 UL)
Full Text
Peer Reviewed
See detailFog Computing as the Key for Seamless Connectivity Handover in Future Vehicular Networks
Palattella, Maria Rita UL; Soua, Ridha UL; Abdelmajid, Khelil et al

in The 34th ACM Symposium On Applied Computing (SAC (2019, April)

Detailed reference viewed: 99 (15 UL)
Full Text
Peer Reviewed
See detailLooking into the Past: Evaluating the Effect of Time Gaps in a Personalized Sentiment Model
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in ACM/SIGAPP Symposium On Applied Computing, Limassol 8-12 April 2019 (2019, April)

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating ... [more ▼]

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating to a person’s past expressions (or opinions), however the time gaps between the messages are not considered in the existing works. We argue that the opinion at a specific time point is affected more by recent opinions that contain related content than the earlier or unrelated ones, thus a sentiment model ought to include such information in the analysis. By using a recurrent neural network with an attention layer as a basic model, we introduce three cases to integrate time gaps in the model. Evaluated on Twitter data with frequent users, we have found that the performance is improved the most by including the time information in the Hawkes process, and it is also more effective to add the time information in the attention layer than at the input. [less ▲]

Detailed reference viewed: 83 (20 UL)
Full Text
Peer Reviewed
See detailSecurity – Visible, Yet Unseen? How Displaying Security Mechanisms Impacts User Experience and Perceived Security
Distler, Verena UL; Zollinger, Marie-Laure UL; Lallemand, Carine UL et al

in Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI2019) (2019, April)

An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or blackboxed away from the user for the sake of usability. However, tying this question to ... [more ▼]

An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or blackboxed away from the user for the sake of usability. However, tying this question to pragmatic usability factors only might be simplistic. This study aims at researching the impact of displaying security mechanisms on user experience (UX) in the context of e-voting. Two versions of an e-voting application were designed and tested using a between-group experimental protocol (N=38). Version D displayed security mechanisms, while version ND did not reveal any security-related information. We collected data on UX using standardised evaluation scales and semi-structured interviews. Version D performed better overall in terms of UX and need fulfilment. Qualitative analysis of the interviews gives further insights into factors impacting perceived security. Our study adds to existing research suggesting a conceptual shift from usability to UX and discusses implications for designing and evaluating secure systems. [less ▲]

Detailed reference viewed: 148 (27 UL)
Full Text
Peer Reviewed
See detailPricing Perspective for SWIPT in OFDM-based Multi-User Wireless Cooperative Systems
Gautam, Sumit UL; Lagunas, Eva UL; Vuppala, Satyanarayana UL et al

Scientific Conference (2019, April)

We propose a novel formulation for joint maximization of total weighted sum-spectral efficiency and weighted sum-harvested energy to study Simultaneous Wireless Information and Power Transfer (SWIPT) from ... [more ▼]

We propose a novel formulation for joint maximization of total weighted sum-spectral efficiency and weighted sum-harvested energy to study Simultaneous Wireless Information and Power Transfer (SWIPT) from a pricing perspective. Specifically, we consider that a transmit source communicates with multiple destinations using Orthogonal Frequency Division Multiplexing (OFDM) system within a dual-hop relay-assisted network, where the destination nodes are capable of jointly decoding information and harvesting energy from the same radio-frequency (RF) signal using either the time-switching (TS) or power-splitting (PS) based SWIPT receiver architectures. Computation of the optimal solution for the aforementioned problem is an extremely challenging task as joint optimization of several network resources introduce intractability at high numeric values of relays, destination nodes and OFDM sub-carriers. Therefore, we present a suitable algorithm with sub-optimal results and good performance to compute the performance of joint data processing and harvesting energy under fixed pricing methods by adjusting the respective weight factors, motivated by practical statistics. Furthermore, by exploiting the binary options of the weights, we show that the proposed formulation can be regulated purely as a sum-spectral efficiency maximization or solely as a sum-harvested energy maximization problem. Numerical results illustrate the benefits of the proposed design under several operating conditions and parameter values. [less ▲]

Detailed reference viewed: 41 (6 UL)
Peer Reviewed
See detailExploration of Different School Value-Added Models in a Highly Heterogeneous Educational Context
Levy, Jessica UL; Brunner, Martin; Keller, Ulrich UL et al

Scientific Conference (2019, April)

Detailed reference viewed: 61 (10 UL)
See detailTrue or False Contradictions between Life Time Contracts and Platform Work Contracts?
Ratti, Luca UL

Scientific Conference (2019, March 22)

Detailed reference viewed: 26 (1 UL)
Peer Reviewed
See detailSocial Rehire Clauses and Transfer of Undertakings
Ratti, Luca UL

Scientific Conference (2019, March 19)

Detailed reference viewed: 16 (0 UL)
See detailN point Virasoro algebras are multi-point Krichever Novikov type algebras
Schlichenmaier, Martin UL

Scientific Conference (2019, March 19)

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailCharacterizations and classifications of quasitrivial semigroups
Devillet, Jimmy UL; Marichal, Jean-Luc UL; Teheux, Bruno UL

Scientific Conference (2019, March 03)

Detailed reference viewed: 47 (9 UL)
Full Text
Peer Reviewed
See detailEvaluation of End-To-End Learning for Autonomous Driving: The Good, the Bad and the Ugly
Varisteas, Georgios UL; Frank, Raphaël UL; Sajadi Alamdari, Seyed Amin UL et al

in 2nd International Conference on Intelligent Autonomous Systems, Singapore, Feb. 28 to Mar. 2, 2019 (2019, March 01)

Detailed reference viewed: 58 (6 UL)
See detailThe Pact with the Devil as Model and Crisis of Complicity (Marlowe, Goethe)
Kohns, Oliver UL

Scientific Conference (2019, March)

Detailed reference viewed: 25 (1 UL)
Peer Reviewed
See detailOrganiser, European Banking Center (EBC) Network Conference
Wolff, Christian UL

Scientific Conference (2019, March)

Detailed reference viewed: 42 (0 UL)
Full Text
Peer Reviewed
See detailArt in Rich-Prospect: Evaluating Next-Generation User Interfaces for Cultural Heritage
Morse, Christopher UL; Koenig, Vincent UL; Lallemand, Carine UL et al

in Morse, Christopher; Koenig, Vincent; Lallemand, Carine (Eds.) et al MW2019: Museums and the Web, Boston 2-6 April 2019 (2019, March)

The present study reports on the user experience (UX) of rich-prospect browsing, an emerging interface design trend for digital cultural heritage. Building on research that suggests online museum ... [more ▼]

The present study reports on the user experience (UX) of rich-prospect browsing, an emerging interface design trend for digital cultural heritage. Building on research that suggests online museum collections are used only infrequently by the general public, this study investigates the role of next-generation user interfaces in the design of optimal browsing experiences. Moreover, it describes the results of user testing for three different arts and culture collections that make use of rich-prospect. The study recruited 30 participants of varying ages, nationalities, and museum visiting habits to discuss their museum experiences and test three different applications: Coins, Curator Table, and Museum of the World. The results of the study provide insights into the user experience of a new browsing medium and reveal the information-seeking habits and patterns that occurred within these information environments. Moreover, the study isolated the core features of rich-prospect in order to define opportunities and pain points during the browsing experience and indicated which features in particular are most important to people during the browsing experience. Finally, we suggest some best practices going forward in the design of rich-prospect. [less ▲]

Detailed reference viewed: 33 (5 UL)
Full Text
Peer Reviewed
See detailAVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations
Liu, Kui UL; Koyuncu, Anil UL; Dongsun, Kim et al

in The 26th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER-2019) (2019, February 24)

Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained ... [more ▼]

Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained with mutation operators through genetic programming. The performance of pattern-based APR systems, however, depends on the fix ingredients mined from fix changes in development histories. Unfortunately, collecting a reliable set of bug fixes in repositories can be challenging. In this paper, we propose to investigate the possibility in an APR scenario of leveraging code changes that address violations by static bug detection tools. To that end, we build the AVATAR APR system, which exploits fix patterns of static analysis violations as ingredients for patch generation. Evaluated on the Defects4J benchmark, we show that, assuming a perfect localization of faults, AVATAR can generate correct patches to fix 34/39 bugs. We further find that AVATAR yields performance metrics that are comparable to that of the closely-related approaches in the literature. While AVATAR outperforms many of the state-of-the-art pattern-based APR systems, it is mostly complementary to current approaches. Overall, our study highlights the relevance of static bug finding tools as indirect contributors of fix ingredients for addressing code defects identified with functional test cases. [less ▲]

Detailed reference viewed: 73 (10 UL)
Full Text
Peer Reviewed
See detailShould You Consider Adware as Malware in Your Study?
Gao, Jun UL; Li, Li; Kong, Pingfan UL et al

in 26th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering (2019, February 24)

Empirical validations of research approaches eventually require a curated ground truth. In studies related to Android malware, such a ground truth is built by leveraging Anti-Virus (AV) scanning reports ... [more ▼]

Empirical validations of research approaches eventually require a curated ground truth. In studies related to Android malware, such a ground truth is built by leveraging Anti-Virus (AV) scanning reports which are often provided free through online services such as VirusTotal. Unfortunately, these reports do not offer precise information for appropriately and uniquely assigning classes to samples in app datasets: AV engines indeed do not have a consensus on specifying information in labels. Furthermore, labels often mix information related to families, types, etc. In particular, the notion of “adware” is currently blurry when it comes to maliciousness. There is thus a need to thoroughly investigate cases where adware samples can actually be associated with malware (e.g., because they are tagged as adware but could be considered as malware as well). In this work, we present a large-scale analytical study of Android adware samples to quantify to what extent “adware should be considered as malware”. Our analysis is based on the Androzoo repository of 5 million apps with associated AV labels and leverages a state-of-the-art label harmonization tool to infer the malicious type of apps before confronting it against the ad families that each adware app is associated with. We found that all adware families include samples that are actually known to implement specific malicious behavior types. Up to 50% of samples in an ad family could be flagged as malicious. Overall the study demonstrates that adware is not necessarily benign. [less ▲]

Detailed reference viewed: 41 (7 UL)
Full Text
Peer Reviewed
See detailRobust Design of Power Minimizing Symbol-Level Precoder under Channel Uncertainty
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL; Ottersten, Björn UL

in IEEE Global Communications Conference (GLOBECOM), Abu Dhabi 9-13 December 2018 (2019, February 21)

In this paper, we investigate the downlink transmission of a multiuser multiple-input single-output (MISO) channel under a symbol-level precoding (SLP) scheme, having imperfect channel knowledge at the ... [more ▼]

In this paper, we investigate the downlink transmission of a multiuser multiple-input single-output (MISO) channel under a symbol-level precoding (SLP) scheme, having imperfect channel knowledge at the transmitter. In defining the SLP design problem, a general category of constructive interference regions (CIR) called distance preserving CIR (DPCIR) is adopted. In particular, we are interested in a robust SLP design minimizing the total transmit power subject to individual quality-of-service (QoS) requirements. We consider two common models for the channel uncertainty region, namely, spherical (norm-bounded) and stochastic. For the spherical uncertainty model, a worst-case robust precoder is proposed, while for the stochastically known uncertainties, we derive a convex optimization problem with probabilistic constraints. We simulate the performance of the proposed robust approaches, and compare them with the existing methods. Through the simulation results, we also show that there is an essential trade-off between the two robust approaches. [less ▲]

Detailed reference viewed: 48 (4 UL)
Full Text
Peer Reviewed
See detailFunctional Interpretation of Single Amino Acid Substitutions in 1,330 Disease-Associated Genes
Iqbal, Sumaiya; Jespersen, Jakob Berg; Perez-Palma, Eduardo et al

in Biophysical Journal (2019, February 15), 116(3), 420-421

Elucidating molecular consequences of amino-acid-altering missense variants at scale is challenging. In this work, we explored whether features derived from three-dimensional (3D) protein structures can ... [more ▼]

Elucidating molecular consequences of amino-acid-altering missense variants at scale is challenging. In this work, we explored whether features derived from three-dimensional (3D) protein structures can characterize patient missense variants across different protein classes with similar molecular level activities. The identified disease-associated features can advance our understanding of how a single amino acid substitution can lead to the etiology of monogenic disorders. For 1,330 disease-associated genes (>80%, 1,077/1,330 implicated in Mendelian disorders), we collected missense variants from the general population (gnomAD database, N=164,915) and patients (ClinVar and HGMD databases, N=32,923). We in silico mapped the variant positions onto >14k human protein 3D structures. We annotated the protein positions of variants with 40 structural, physiochemical, and functional features. We then grouped the genes into 24 protein classes based on their molecular functions and performed statistical association analyses with the features of population and patient variants. We identified 18 (out of 40) features that are associated with patient variants in general. Specifically, patient variants are less exposed to solvent (p<1.0e-100), enriched on b-sheets (p<2.37e-39), frequently mutate aromatic residues (p<1.0e-100), occur in ligand binding sites (p<1.0e-100) and are spatially close to phosphorylation sites (p<1.0e-100). We also observed differential protein-class-specific features. For three protein classes (signaling molecules, proteases and hydrolases), patient variants significantly perturb the disulfide bonds (p<1.0e-100). Only in immunity proteins, patient variants are enriched in flexible coils (p<1.65e-06). Kinases and cell junction proteins exhibit enrichment of patient variants around SUMOylation (p<1.0e-100) and methylation sites (p<9.29e-11), respectively. In summary, we studied shared and unique features associated with patient variants on protein structure across 24 protein classes, providing novel mechanistic insights. We generated an online resource that contains amino-acid-wise feature annotation-track for 1,330 genes, summarizes the patient-variant-associated features on residue level, and can guide variant interpretation. [less ▲]

Detailed reference viewed: 52 (0 UL)
Full Text
Peer Reviewed
See detailCharacterizations of idempotent n-ary uninorms
Devillet, Jimmy UL; Kiss, Gergely; Marichal, Jean-Luc UL

in 38th Linz Seminar on Fuzzy Set Theory (2019, February 05)

In this paper we provide a characterization of the class of idempotent n-ary uninorms on a given chain. When the chain is finite, we also provide anaxiomatic characterization of the latter class by means ... [more ▼]

In this paper we provide a characterization of the class of idempotent n-ary uninorms on a given chain. When the chain is finite, we also provide anaxiomatic characterization of the latter class by means of four conditions only: associativity, quasitriviality, symmetry, and nondecreasing monotonicity. In particular, we show that associativity can be replaced with bisymmetry in this axiomatization. [less ▲]

Detailed reference viewed: 54 (16 UL)
See detailDer "March for Science" – eine Initiative für die Freiheit der Wissenschaft
Baudson, Tanja Gabriele UL

Scientific Conference (2019, February 01)

Der ›March for Science‹ ist eine international angelegte Großdemonstration, die sich für Wissenschaftsfreiheit und gegen ›alternative Fakten‹ ausspricht. Sie findet seit 2017 in mehr als 600 Städten ... [more ▼]

Der ›March for Science‹ ist eine international angelegte Großdemonstration, die sich für Wissenschaftsfreiheit und gegen ›alternative Fakten‹ ausspricht. Sie findet seit 2017 in mehr als 600 Städten weltweit statt. Im Rahmen eines Symposiums soll es um diese Initiative und das Thema ›Wissenschaft im politischen Meinungsstreit‹ gehen. [less ▲]

Detailed reference viewed: 23 (1 UL)
Full Text
Peer Reviewed
See detailHow to Assess the Usability Metrics of E-Voting Schemes
Marky, Karola; Zollinger, Marie-Laure UL; Funk, Markus et al

in Lecture Notes in Computer Science (2019, February)

Detailed reference viewed: 44 (2 UL)
Full Text
Peer Reviewed
See detailA View-invariant Framework for Fast Skeleton-based Action Recognition Using a Single RGB Camera
Ghorbel, Enjie UL; Papadopoulos, Konstantinos UL; Baptista, Renato UL et al

in 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Prague, 25-27 February 2018 (2019, February)

View-invariant action recognition using a single RGB camera represents a very challenging topic due to the lack of 3D information in RGB images. Lately, the recent advances in deep learning made it ... [more ▼]

View-invariant action recognition using a single RGB camera represents a very challenging topic due to the lack of 3D information in RGB images. Lately, the recent advances in deep learning made it possible to extract a 3D skeleton from a single RGB image. Taking advantage of this impressive progress, we propose a simple framework for fast and view-invariant action recognition using a single RGB camera. The proposed pipeline can be seen as the association of two key steps. The first step is the estimation of a 3D skeleton from a single RGB image using a CNN-based pose estimator such as VNect. The second one aims at computing view-invariant skeleton-based features based on the estimated 3D skeletons. Experiments are conducted on two well-known benchmarks, namely, IXMAS and Northwestern-UCLA datasets. The obtained results prove the validity of our concept, which suggests a new way to address the challenge of RGB-based view-invariant action recognition. [less ▲]

Detailed reference viewed: 65 (10 UL)
Peer Reviewed
See detailTeachers´ Attitudes toward Students with High- and Low-Educated Parents
Pit-Ten Cate, Ineke UL; Glock, Sabine UL

Scientific Conference (2019, February)

Background In several countries, school tracking is used to group students with similar academic potential to optimize instruction. Teachers often have a more or less deciding vote, which school track ... [more ▼]

Background In several countries, school tracking is used to group students with similar academic potential to optimize instruction. Teachers often have a more or less deciding vote, which school track would suit different students based on academic achievement and potential (Ansalone and Biafora, 2004). Given the differential qualifications associated with completion of the different school tracks, teachers’ abilities to correctly assign students to different tracks will not only affect the students´ educational pathways, but also has a long lasting effect on career opportunities and general wellbeing in future adult life. Research shows that tracking recommendations mainly rely on students’ abilities (e.g., Caro, et al., 2009; Klapproth, et al., 2013; Marks, 2006). However, non-academic related student characteristics such as the socioeconomic status (SES) of the parents and —closely related (Reardon, 2011)—the parental educational level also affect teachers´ tracking decisions, either indirectly via grades or directly via the tracking decision itself (Bauer and Riphahn, 2006; Caro et al., 2009; de Boer, et al., 2010; Ditton, Krüsken, and Schauenberg, 2005; Maaz, et al., 2008; Timmermans, et al., 2015; Wagner, et al., 2009). Indeed, research has provided evidence for such stereotype bias in teachers’ judgments, leading to disadvantages for certain social groups (Peterson, et al., 2016; van den Bergh, et al., 2010). Hence, the aim of our study was the investigation of teachers’ attitudes toward students in relation to the educational level of parents. Method The aim of the current study was to investigate teachers´ implicit and explicit attitudes toward students with differentially educated parents. Implicit attitudes were measured using an implicit association task (IAT). The first name of the student was used as a proxy for the educational level of parents (see Onland & Bloothooft, 2008), whereby we created separate versions for boys and girls. Participating teachers (N=70) were randomly divided in two groups whereby the first group completed the IAT-boys version and the other group the IAT-girls version. Explicit attitudes were measured using a questionnaire (adapted from Glock, et al., 2016). Results: Participants indicated positive implicit attitudes toward students with highly educated parents, independent of the gender of the student. More specifically, an independent t test revealed that the mean IAT-D scores for boys and girls did not differ, t(68)=0.47, p=.64, d=0.12. The IAT-D score for the whole sample (M=0.81, SD=0.61) was significantly different from zero, t(69)=11.14, p<.001, d=1.33, reflecting more positive implicit attitudes toward highly educated parents. Teachers did not express differential explicit beliefs regarding the learning and social behaviors of students based on the educational level of the parents (i.e., subscale scores were significantly lower than the mean of the scale, t(65)=4.26, p<.001, d=0.53), whereas their expectations concerning the motivation and ambitions or educational chances of these students were neutral. Although the three subscales within the explicit attitudes measure were substantially associated (correlations ranging from r = .39 to r =.74), no association between explicit and implicit attitudes measures was found (correlations range from r = -.07 to r = .08). Conclusion: Teachers’ attitudes seem to be an important factor, which can guide teachers´ judgments and behaviors, and could partly explain differences in educational equity for students with similar academic profiles, but differentially educated parents. The positive implicit attitudes in favor of students with highly educated parents imply more favorable judgments for and behavior toward these students and deeper work is required to ensure teachers’ fair treatment of all students. The dissociation between implicit and explicit attitudes may be an indication of the social sensitivity of the relationship between students´ social background and educational achievements and opportunities. [less ▲]

Detailed reference viewed: 47 (4 UL)
Full Text
Peer Reviewed
See detailROSploit: Cybersecurity tool for ROS
Rivera, Sean UL; Lagraa, Sofiane UL; State, Radu UL

in International Conference on Robotic Computing (2019, February)

Abstract—Robotic Operating System(ROS) security research is currently in a preliminary state, with limited research in tools or models. Considering the trend of digitization of robotic systems, this lack ... [more ▼]

Abstract—Robotic Operating System(ROS) security research is currently in a preliminary state, with limited research in tools or models. Considering the trend of digitization of robotic systems, this lack of foundational knowledge increases the potential threat posed by security vulnerabilities in ROS. In this article, we present a new tool to assist further security research in ROS, ROSploit. ROSploit is a modular two-pronged offensive tool covering both reconnaissance and exploitation of ROS systems, designed to assist researchers in testing exploits for ROS. [less ▲]

Detailed reference viewed: 48 (0 UL)
Full Text
Peer Reviewed
See detailReal-time attack detection on robot cameras: A self-driving car application
Lagraa, Sofiane UL; Cailac, Maxime; Rivera, Sean UL et al

in International Conference on Robotic Computing (2019, February)

The Robot Operating System (ROS) are being deployed for multiple life critical activities such as self-driving cars, drones, and industries. However, the security has been persistently neglected ... [more ▼]

The Robot Operating System (ROS) are being deployed for multiple life critical activities such as self-driving cars, drones, and industries. However, the security has been persistently neglected, especially the image flows incoming from camera robots. In this paper, we perform a structured security assessment of robot cameras using ROS. We points out a relevant number of security flaws that can be used to take over the flows incoming from the robot cameras. Furthermore, we propose an intrusion detection system to detect abnormal flows. Our defense approach is based on images comparisons and unsupervised anomaly detection method. We experiment our approach on robot cameras embedded on a self-driving car. [less ▲]

Detailed reference viewed: 96 (13 UL)
Full Text
Peer Reviewed
See detailGeneralizations of single-peakedness
Devillet, Jimmy UL

Scientific Conference (2019, January 30)

We establish a surprising connection between a family of conservative semigroups, which includes the class of idempotent uninorms, and the concepts of single-peakedness and single-plateaudness, introduced ... [more ▼]

We establish a surprising connection between a family of conservative semigroups, which includes the class of idempotent uninorms, and the concepts of single-peakedness and single-plateaudness, introduced in social choice theory by D. Black. We also introduce a generalization of single-peakedness to partial orders of join-semilattices and show how it is related to the class of idempotent and commutative semigroups. Finally, we enumerate those orders when the corresponding semigroups are finite. [less ▲]

Detailed reference viewed: 54 (9 UL)
Peer Reviewed
See detail"A Colônia Luxemburguesa" – Trajectories made of Steel
Santana, Dominique UL

Scientific Conference (2019, January 25)

Detailed reference viewed: 32 (2 UL)
Full Text
Peer Reviewed
See detailSC2Share: Smart Contract for Secure Car Sharing
Akash, Madhusudan; Symeonidis, Iraklis UL; A. Mustafa, Mustafa et al

in International Conference on Information Systems Security and Privacy (ICISSP) (2019, January 24)

This paper presents an efficient solution for the booking and payments functionality of a car sharing system that allows individuals to share their personal, underused cars in a completely decentralized ... [more ▼]

This paper presents an efficient solution for the booking and payments functionality of a car sharing system that allows individuals to share their personal, underused cars in a completely decentralized manner, annulling the need of an intermediary. Our solution, named SC2Share, leverages smart contracts and uses them to carry out secure and private car booking and payments. Our experiments on SC2Share on the Ethereum testnet guarantee high security and privacy to its users and confirm that our system is cost-efficient and ready for practical use. [less ▲]

Detailed reference viewed: 75 (3 UL)
Full Text
Peer Reviewed
See detailIslamic Finance and Economic Growth: New Evidence
Lehnert, Thorsten UL

Scientific Conference (2019, January 24)

While extensive work has shown that conventional banking development is generally conducive to economic growth, there are only a limited number of studies that investigate the impact of Islamic banking ... [more ▼]

While extensive work has shown that conventional banking development is generally conducive to economic growth, there are only a limited number of studies that investigate the impact of Islamic banking. Importantly, the literature on conventional banking claims that a reverse causality from economy performance to banking may exists, but existing studies on Islamic banking fail to address this potential endogeneity problem. This paper tackles this problem and explores the relationship between Islamic banking development and economic performance in a sample of 32 developed and developing countries based on data spanning the 2000 to 2016 period. The findings show that, although Islamic banks are considered small relative to the total size of the financial sector, Islamic banking is positively correlated with economic growth even after controlling for financial structure, macroeconomic factors and other variables. The outcome is robust across different econometric specifications like pooling OLS, fixed effects, panel data with over-identified GMM, and dynamic difference GMM. The results are confirmed on two different indicators of Islamic banking and hold for different time periods. [less ▲]

Detailed reference viewed: 109 (0 UL)
See detailMagnetic and free-layer properties of MgO/(Co)FeB/MgO structure: Dependence on CoFeB composition
Bersweiler, Mathias UL

Scientific Conference (2019, January 17)

Detailed reference viewed: 24 (4 UL)
Full Text
Peer Reviewed
See detailAssessing the impact of attacks on OPC-UA applications in the Industry 4.0 era
Polge, Julien UL; Robert, Jérémy UL; Le Traon, Yves UL

in 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, 11-14 January 2019 (2019, January 11)

Detailed reference viewed: 37 (3 UL)
Peer Reviewed
See detailComment assurer la qualité de l’évaluation par les pairs des propositions de communication dans le cadre d’un colloque scientifique ?
Milmeister, Marianne UL; Weis, Christiane UL; Dierendonck, Christophe UL

Scientific Conference (2019, January 10)

L’évaluation par les pairs joue un rôle important dans le monde universitaire et est souvent considérée comme le garant de la qualité scientifique. En même temps, les biais qui existent pour ce type ... [more ▼]

L’évaluation par les pairs joue un rôle important dans le monde universitaire et est souvent considérée comme le garant de la qualité scientifique. En même temps, les biais qui existent pour ce type d’évaluation sont multiples (partialité des évaluateurs, divergence de jugement entre évaluateurs, etc.) et bien documentés dans la littérature. Dans le cadre d’un colloque que nous avons organisé en 2018, nous avons mené une analyse exploratoire sur la base de données des évaluations réalisées par les pairs. Le but était d’avoir une idée de la qualité de l’évaluation par les pairs, de voir dans quelle mesure on retrouve les biais relevés par la littérature scientifique et, enfin, de définir des pistes qui pourraient contribuer à améliorer la qualité de ce processus. Dans le cas de notre colloque, l’évaluation par les pairs s’est faite via une plateforme en ligne. Chaque proposition de communication était évaluée de manière anonyme par deux personnes et sur base de neuf critères pour lesquels les évaluateurs pouvaient choisir entre quatre modalités d’appréciation : très faible, faible, bon, très bon. Ensuite, l’évaluateur devait donner sa recommandation pour la contribution analysée : acceptation, acceptation sous réserve d’ajustements ou refus. Une première analyse des données montre notamment qu’il existe des différences plus ou moins importantes tant entre les jugements des évaluateurs qu’entre les décisions d’un même évaluateur. Les résultats détaillés de nos analyses seront présentés lors du colloque et des pistes d’amélioration discutées. [less ▲]

Detailed reference viewed: 27 (3 UL)
Full Text
See detailMethodological Aspects of Software Engineering, Assurance, Quality, and Reliability Engineering (MAS/AQR) 2019 Welcome from the Minitrack Co-Chairs
Tenbergen, Bastian; Ries, Benoît UL

in Proceedings of the 52nd Hawaii International Conference on System Sciences (HICSS) (2019, January)

Detailed reference viewed: 25 (1 UL)
See detailKomparatistik als Praxis der Freiheit (Hans-Jost Frey, Werner Hamacher)
Kohns, Oliver UL

Scientific Conference (2019, January)

Detailed reference viewed: 33 (1 UL)
Full Text
Peer Reviewed
See detailMixed hybrid and electric bus dynamic fleet management in urban networks: a model predictive control approach
Rinaldi, Marco UL; Picarelli, Erika; Laskaris, Georgios UL et al

Scientific Conference (2019, January)

Reducing pollutant emissions and promoting sustainable mobility solutions, including Public Transport, are increasingly becoming key objectives for policymakers worldwide. In order to jointly achieve ... [more ▼]

Reducing pollutant emissions and promoting sustainable mobility solutions, including Public Transport, are increasingly becoming key objectives for policymakers worldwide. In order to jointly achieve these goals, careful consideration should be put on the operational cost and management of PT services, in order to promote the adoption of green mobility solutions and advanced management techniques by operators. In this work we develop a dynamic fleet management approach for next generation Public Transportation systems, considering the instance of mixed electric / hybrid fleet. Our objective is that of investigating to what extent electrification, coupled with optimal fleet management, can yield operational cost savings for PT operators, explicitly considering real-time disturbances, including delays, service disruptions etc. We propose a Mixed Integer Linear Program to address the problem of optimal scheduling of a mixed fleet of electric and hybrid / non-electric buses, and employ it as predictor in a Model Predictive Control approach. Test results based upon a real-life scenario showcase how the proposed approach is indeed capable of yielding a sizable reduction in operational costs, even when considerable disturbances arise from the underlying system. [less ▲]

Detailed reference viewed: 85 (1 UL)
Peer Reviewed
See detailGender differences with regard to physical activity motivation and behavior in physical education and leisure time
Hutmacher, Djenna UL; Eckelt, Melanie UL; Bund, Andreas UL et al

Scientific Conference (2019, January)

Objectives: Given a widespread continuous decrease in children’s and adoles-cents’ physical activity (PA), the potential of physical education (PE) in promoting young people’s PA motivation and behavior ... [more ▼]

Objectives: Given a widespread continuous decrease in children’s and adoles-cents’ physical activity (PA), the potential of physical education (PE) in promoting young people’s PA motivation and behavior has become a key issue in research. Based on the self-determination theory (SDT) of Deci and Ryan (1985), the present study aimed to ex-amine gender differences with regard to PA motivation and behavior during PE and lei-sure time (LT). Previously, girls were found to be more self-determined than boys (Wil-liams & Deci, 1996), but showed lower self-reported PA and were meeting the PA guide-lines of the WHO to a lesser extent (Trost et al., 2002). Method: 244 students (139 girls and 125 boys) from 11 to 21 years participated in the study. PA motivation was assessed via a digital questionnaire containing the scales need support (Standage, Duda and Ntoumanis, 2005), basic needs (BPNES; Vlachopou-los, Ntoumanis & Smith, 2010), external and intrinsic motivation in PE (PLOC-R; Vla-chopoulos et al., 2011) and in LT (BREQ-II; Markland & Tobin, 2004). PA behavior was measured through a self-report questionnaire (Schmidt, Will, Henn, Reimers & Woll, 2016). Additionally, 76 students (38 girls and 38 boys) wore an accelerometer (ActiGraph GT3X-BT) over seven consecutive days to measure PA behavior objectively, too. Results: With regard to PA motivation, girls reported a lower fulfillment in the basic need of competence during PE and scored higher in the external motivation during PE and LT than boys. In contrast, boys reported higher rates of intrinsic motivation during PE and LT. Concerning PA behavior, boys showed higher PA than girls for self-reported and objectively measured PA in PE and LT. Independently of gender, higher levels of intrinsic motivation were associated with increased self-reported PA. Discussion: In conflict with previous findings, girls reported a lower intrinsic motiva-tion in PA than boys. As girls simultaneously show lower self-reported and objectively measured PA, future intervention programs should focus on strengthening the more in-ternally driven behavior of girls in order to foster regular PA. Key Reference: Deci, E.L. & Ran, R.M. (1985). Intrinsic motivation and self-determination in human behav-ior. New York: Plenum Press. [less ▲]

Detailed reference viewed: 92 (22 UL)
Full Text
Peer Reviewed
See detailAutomated Search for Configurations of Deep Neural Network Architectures
Ghamizi, Salah UL; Cordy, Maxime UL; Papadakis, Mike UL et al

Scientific Conference (2019)

Deep Neural Networks (DNNs) are intensively used to solve a wide variety of complex problems. Although powerful, such systems require manual configuration and tuning. To this end, we view DNNs as ... [more ▼]

Deep Neural Networks (DNNs) are intensively used to solve a wide variety of complex problems. Although powerful, such systems require manual configuration and tuning. To this end, we view DNNs as configurable systems and propose an end-to-end framework that allows the configuration, evaluation and automated search for DNN architectures. Therefore, our contribution is threefold. First, we model the variability of DNN architectures with a Feature Model (FM) that generalizes over existing architectures. Each valid configuration of the FM corresponds to a valid DNN model that can be built and trained. Second, we implement, on top of Tensorflow, an automated procedure to deploy, train and evaluate the performance of a configured model. Third, we propose a method to search for configurations and demonstrate that it leads to good DNN models. We evaluate our method by applying it on image classification tasks (MNIST, CIFAR-10) and show that, with limited amount of computation and training, our method can identify high-performing architectures (with high accuracy). We also demonstrate that we outperform existing state-of-the-art architectures handcrafted by ML researchers. Our FM and framework have been released to support replication and future research. [less ▲]

Detailed reference viewed: 46 (14 UL)
Full Text
Peer Reviewed
See detailFabrication and Optical Characterization of Hyperbolic Nanoparticles on a Transparent Substrate
Iarossi, Marzia; Darvill, Daniel; Isoniemi, Tommi et al

in Proceedings of SPIE : The International Society for Optical Engineering (2019), 10927

We report on the fabrication and optical characterization of hyperbolic nanoparticles on a transparent substrate. These nanoparticles enable a separation of ohmic and radiative channels in the visible and ... [more ▼]

We report on the fabrication and optical characterization of hyperbolic nanoparticles on a transparent substrate. These nanoparticles enable a separation of ohmic and radiative channels in the visible and near-infrared frequency ranges. The presented architecture opens the pathway towards novel routes to exploit the light to energy conversion channels beyond what is offered by current plasmon-based nanostructures, possibly enabling applications spanning from thermal emission manipulation, theragnostic nano-devices, optical trapping and nano-manipulation, non-linear optical properties, plasmonenhanced molecular spectroscopy, photovoltaics and solar-water treatments, as well as heat-assisted ultra-dense and ultrafast magnetic recording. [less ▲]

Detailed reference viewed: 29 (1 UL)
Full Text
Peer Reviewed
See detailPlasmonic Nanopore Prepared on MoS2 Membrane - Hybrid Nanostructures Based on Site Selective Deposition
Mosconi, Dario; Miele, Ermanno; Giovannini, Giovannini et al

in Proceedings of SPIE : The International Society for Optical Engineering (2019), 10894

Here, we propose easy and robust strategies for the versatile integration 2D material flakes on plasmonic nanoholes by means of site selective deposition of MoS2. The methods can be applied both to simple ... [more ▼]

Here, we propose easy and robust strategies for the versatile integration 2D material flakes on plasmonic nanoholes by means of site selective deposition of MoS2. The methods can be applied both to simple metallic flat nanostructures and to complex 3D metallic structures comprising nanoholes. The deposition methods allow the decoration of large ordered arrays of plasmonic structures with single or few layers of MoS2. We show that the plasmonic field generated by the nanohole can interact significantly with the 2D layer, thus representing an ideal system for hybrid 2DMaterial/ Plasmonic investigation. The controlled/ordered integration of 2D materials on plasmonic nanostructures opens a pathway towards new investigation of the following: enhanced light emission; strong coupling from plasmonic hybrid structures; hot electron generation; and sensors in general based on 2D materials. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailTRANSMISSION OF COLLECTIVE MEMORY AND JEWISH IDENTITY IN POSTWAR JEWISH GENERATIONS THROUGH WAR SOUVENIRS
Bronec, Jakub UL

in International 26th annual CIDOC - ICOM Conference in 2018 (2019)

My contribution includes a sample of testimonies containing the life stories of Jews born in the aftermath of World War II in two countries (Czechoslovakia and Luxembourg). At that time, Czechoslovakian ... [more ▼]

My contribution includes a sample of testimonies containing the life stories of Jews born in the aftermath of World War II in two countries (Czechoslovakia and Luxembourg). At that time, Czechoslovakian Jews were living through the era of de-Stalinisation, and their narratives offer new insights into this segment of Jewish postwar history that differ from those of Jews living in liberal democratic European states. Based on personal documents, photos, letters and souvenirs, the conducted interviews highlight an interesting way of maintaining personal memories in Jewish families and how this varies from one generation to the next. In my contribution, I am planning to illustrate the importance of these small artefacts for the transmission of Jewish collective memory. My presentation showcases people widely referred to as the “second and third Jewish generation”, their attitude to current notions of Jewish memory and self-perception and their role in society. Some had to live under totalitarian oppression, others had to face a wave of Jewish Sephardic immigrants coming from overseas – and witnesses admit that the arrival of these newcomers often caused difficulties in Jewish communities. Small objects from the war, often displayed in their households, serve as a reminder of their roots and destiny, which should not be forgotten. This paper is a part of my broader research project examining distinctions and similarities in identity formation through generations of Czech, Slovak, French and Luxembourgish Jews, who grew up either under communism or in liberal Western Europe. The aim is to create an international virtual library and cloud storage, not only for professional educators but also for the public. [less ▲]

Detailed reference viewed: 39 (5 UL)
Full Text
Peer Reviewed
See detailDecision Support for Security-Control Identification Using Machine Learning
Bettaieb, Seifeddine UL; Shin, Seung Yeob UL; Sabetzadeh, Mehrdad UL et al

in International Working Conference on Requirements Engineering: Foundation for Software Quality, Essen 18-21 March 2019 (2019)

[Context & Motivation] In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is ... [more ▼]

[Context & Motivation] In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is in part guided by the controls envisaged by the applicable security standards and best practices. [Problem] An important difficulty that analysts have to contend with during security requirements elaboration is sifting through a large number of security controls and determining which ones have a bearing on the security requirements for a given system. This challenge is often exacerbated by the scarce security expertise available in most organizations. [Principal ideas/results] In this paper, we develop automated decision support for the identification of security controls that are relevant to a specific system in a particular context. Our approach, which is based on machine learning, leverages historical data from security assessments performed over past systems in order to recommend security controls for a new system. We operationalize and empirically evaluate our approach using real historical data from the banking domain. Our results show that, when one excludes security controls that are rare in the historical data, our approach has an average recall of ≈ 95% and average precision of ≈ 67%. [Contribution] The high recall – indicating only a few relevant security controls are missed – combined with the reasonable level of precision – indicating that the effort required to confirm recommendations is not excessive – suggests that our approach is a useful aid to analysts for more efficiently identifying the relevant security controls, and also for decreasing the likelihood that important controls would be overlooked. [less ▲]

Detailed reference viewed: 115 (24 UL)
Full Text
Peer Reviewed
See detailNature et modernité : réflexions théoriques suivies d’une lecture écologique de Fenn Kaß
Thiltges, Sébastian UL

in Millim, Anne-Marie; Toffoli, Ian (Eds.) Modernismen in Luxemburg: Traditionen - Variationen - Brüche (2019)

The current environmental concerns call upon a revaluation of the concept of modernity which, a century ago, has been proven to be a major cultural and aesthetic reference. Modernist writers took up new ... [more ▼]

The current environmental concerns call upon a revaluation of the concept of modernity which, a century ago, has been proven to be a major cultural and aesthetic reference. Modernist writers took up new subjects, like industry and urbanism, as an alternative to homeland literature’s depiction of earth and soil. Batty Weber depicts in Fenn Kaß (1913) the life of a defrocked priest who leaves his native countryside to become an engineer abroad. Seemingly a novel about modernity, the book also contains several descriptions of the protagonist’s relation to the natural environment, using repeatedly the metaphor of a liquid and dissolving body. By defining both interrelated concepts of nature and modernity, this paper provides an anthropological reading of texts, questioning how salient poetical motives can challenge sociological and epistemological contextualisation. [less ▲]

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailPersonalized Sentiment Analysis and a Framework with Attention-Based Hawkes Process Model
Guo, Siwen UL; Höhn, Sviatlana UL; Xu, Feiyu et al

in Agents and Artificial Intelligence (2019)

People use different words when expressing their opinions. Sentiment analysis as a way to automatically detect and categorize people’s opinions in text, needs to reflect this diversity and individuality ... [more ▼]

People use different words when expressing their opinions. Sentiment analysis as a way to automatically detect and categorize people’s opinions in text, needs to reflect this diversity and individuality. One possible approach to analyze such traits is to take a person’s past opinions into consideration. In practice, such a model can suffer from the data sparsity issue, thus it is difficult to develop. In this article, we take texts from social platforms and propose a preliminary model for evaluating the effectiveness of including user information from the past, and offer a solution for the data sparsity. Furthermore, we present a finer-designed, enhanced model that focuses on frequent users and offers to capture the decay of past opinions using various gaps between the creation time of the text. An attention-based Hawkes process on top of a recurrent neural network is applied for this purpose, and the performance of the model is evaluated with Twitter data. With the proposed framework, positive results are shown which opens up new perspectives for future research. [less ▲]

Detailed reference viewed: 51 (7 UL)
Full Text
Peer Reviewed
See detailRule-Based Supervisory Control-Extension for Automated Manufacturing Processes
Klecker, Sophie UL; Hichri, Bassem UL; Plapper, Peter UL

in International Journal of Mechanical Engineering and Robotics Research (2019)

Before performing a surface finishing process, human operators analyze the workpiece-conditions and react accordingly, i.e. they adapt the contact-situation of the tool with respect to the surface. This ... [more ▼]

Before performing a surface finishing process, human operators analyze the workpiece-conditions and react accordingly, i.e. they adapt the contact-situation of the tool with respect to the surface. This first step is ignored in most suggested automation concepts. Although their performance is satisfactory for the general process thanks to adaptive position- and force-/torque-control algorithms, they are unable to address specific problematic cases as often encountered in practice because of variations in workpiece-dimensions or -positioning. In this work, a human mimicking element is developed to overcome this limitation of current control concepts and to translate human expertise to the robotic manipulator. A rule-based system is designed where human knowledge is encoded as if-then rules. This system is integrated with a previously suggested control strategy in a hierarchical manner. The developed concept is experimentally validated on a KUKA LWR 4+-robotic manipulator. [less ▲]

Detailed reference viewed: 23 (1 UL)
Full Text
Peer Reviewed
See detailNeue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)
Uhrmacher, Martin UL

in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) et al Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. (2019)

Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Beitrag untersucht die Veränderung von Grenzen ... [more ▼]

Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Beitrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man nur in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen dem Großherzogtum Luxemburg als Provinz des niederländischen Königreichs und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]

Detailed reference viewed: 34 (2 UL)
Full Text
Peer Reviewed
See detailOptimisation de la prise en charge médicale des patients sortant de prison au Luxembourg
Battista, Jorge; Stein, Romain; Baumann, Michèle UL

Poster (2019)

Introduction : Le passage en prison peut être un gain de chance pour la santé de la population carcérale qui a généralement un faible accès au système de soins. L’élargissement de prison peut devenir une ... [more ▼]

Introduction : Le passage en prison peut être un gain de chance pour la santé de la population carcérale qui a généralement un faible accès au système de soins. L’élargissement de prison peut devenir une période de vulnérabilité où ce gain potentiellement acquis s’annule si la transition vers la société civile n’est pas anticipée. L’objectif principal était l’identification et l’analyse des facteurs qui favorisent et s’opposent à une pratique de soins primaires chez les patients sortant du milieu carcéral au Luxembourg. L’objectif secondaire était l’élaboration de recommandations à l’égard des principaux résultats en s’appuyant sur une revue de la littérature. Méthodes : Une enquête qualitative à l’aide d’entretiens semi-dirigés a été menée auprès de médecins généralistes et de patients-détenus. Les questions des deux guides d’entretien étaient semblables afin que l’analyse permette une mise en miroir des résultats. Un recueil des caractéristiques sociodémographiques a également été effectué. A l’aide de la transcription des entretiens, une analyse de contenu thématique catégorielle de ces derniers a été réalisée au regard des objectifs. Sur base des verbatim, des items ont été formulés et regroupés en dimensions puis en thèmes. Résultats : Notre analyse a mis en lumière le manque de relais entre la prison et l’extérieur à chaque étape de la prise en charge médico-psycho-sociale du point de vue des soins et des aides proposées en prison jusqu’à l’élargissement. Des recommandations concernant des améliorations possibles ont pu être proposées, comme la création d’un réseau de médecins généralistes prenant le relais ainsi qu’une véritable coopération avec des organisations prenant en charge des toxicomanes. Conclusion : Des reformes concernant les soins en prison devraient être envisagées entre le système de l’élargissement, la création de relais socio-médicaux et des alternatives à l’incarcération, en analogie aux transitions clinics retrouvés aux États-Unis. [less ▲]

Detailed reference viewed: 70 (0 UL)
See detailEntwicklungen der sexualwissenschaftlichen und rechtlichen Debatten zu Transsexualität und deren Verschränkungen in der Bundesrepublik Deutschland (1960er Jahre bis 1980)
De Silva, Adrian UL

in Landesstelle für Gleichbehandlung - gegen Diskriminierung, Fachbereich LSBTI (Ed.) 'Auf nach Casablanca?' Lebensrealitäten transgeschlechtlicher Menschen zwischen 1945-1980 (2019)

Detailed reference viewed: 83 (17 UL)