References of "Paper published in a book"      in Complete repository Arts & humanities   Archaeology   Art & art history   Classical & oriental studies   History   Languages & linguistics   Literature   Performing arts   Philosophy & ethics   Religion & theology   Multidisciplinary, general & others Business & economic sciences   Accounting & auditing   Production, distribution & supply chain management   Finance   General management & organizational theory   Human resources management   Management information systems   Marketing   Strategy & innovation   Quantitative methods in economics & management   General economics & history of economic thought   International economics   Macroeconomics & monetary economics   Microeconomics   Economic systems & public economics   Social economics   Special economic topics (health, labor, transportation…)   Multidisciplinary, general & others Engineering, computing & technology   Aerospace & aeronautics engineering   Architecture   Chemical engineering   Civil engineering   Computer science   Electrical & electronics engineering   Energy   Geological, petroleum & mining engineering   Materials science & engineering   Mechanical engineering   Multidisciplinary, general & others Human health sciences   Alternative medicine   Anesthesia & intensive care   Cardiovascular & respiratory systems   Dentistry & oral medicine   Dermatology   Endocrinology, metabolism & nutrition   Forensic medicine   Gastroenterology & hepatology   General & internal medicine   Geriatrics   Hematology   Immunology & infectious disease   Laboratory medicine & medical technology   Neurology   Oncology   Ophthalmology   Orthopedics, rehabilitation & sports medicine   Otolaryngology   Pediatrics   Pharmacy, pharmacology & toxicology   Psychiatry   Public health, health care sciences & services   Radiology, nuclear medicine & imaging   Reproductive medicine (gynecology, andrology, obstetrics)   Rheumatology   Surgery   Urology & nephrology   Multidisciplinary, general & others Law, criminology & political science   Civil law   Criminal law & procedure   Criminology   Economic & commercial law   European & international law   Judicial law   Metalaw, Roman law, history of law & comparative law   Political science, public administration & international relations   Public law   Social law   Tax law   Multidisciplinary, general & others Life sciences   Agriculture & agronomy   Anatomy (cytology, histology, embryology...) & physiology   Animal production & animal husbandry   Aquatic sciences & oceanology   Biochemistry, biophysics & molecular biology   Biotechnology   Entomology & pest control   Environmental sciences & ecology   Food science   Genetics & genetic processes   Microbiology   Phytobiology (plant sciences, forestry, mycology...)   Veterinary medicine & animal health   Zoology   Multidisciplinary, general & others Physical, chemical, mathematical & earth Sciences   Chemistry   Earth sciences & physical geography   Mathematics   Physics   Space science, astronomy & astrophysics   Multidisciplinary, general & others Social & behavioral sciences, psychology   Animal psychology, ethology & psychobiology   Anthropology   Communication & mass media   Education & instruction   Human geography & demography   Library & information sciences   Neurosciences & behavior   Regional & inter-regional studies   Social work & social policy   Sociology & social sciences   Social, industrial & organizational psychology   Theoretical & cognitive psychology   Treatment & clinical psychology   Multidisciplinary, general & others     Showing results 1 to 100 of 3174 1 2 3 4 5 6     Neue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)Uhrmacher, Martin in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) et al Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. Tagung und Workshop zum 200. Jahrestag des Abschlusses des Wiener Kongresses (in press)Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress ... [more ▼]Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Vortrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen Luxemburg und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]Detailed reference viewed: 9 (0 UL) On the performance of an overlapping-domain parallelization strategy for Eulerian-Lagrangian Multiphysics softwarePozzetti, Gabriele ; Besseron, Xavier ; Rousset, Alban et alin AIP Conference Proceedings ICNAAM 2017 (in press)In this work, a strategy for the parallelization of a two-way CFD-DEM coupling is investigated. It consists on adopting balanced overlapping partitions for the CFD and the DEM domains, that aims to reduce ... [more ▼]In this work, a strategy for the parallelization of a two-way CFD-DEM coupling is investigated. It consists on adopting balanced overlapping partitions for the CFD and the DEM domains, that aims to reduce the memory consumption and inter-process communication between CFD and DEM. Two benchmarks are proposed to assess the consistency and scalability of this approach, coupled execution on 252 cores shows that less than 1\% of time is used to perform inter-physics data exchange. [less ▲]Detailed reference viewed: 21 (12 UL) Kommunale Selbstinszenierung im vorstädtischen Raum. Ein neuer Blick auf Leprosorien des Spätmittelalters und der frühen NeuzeitUhrmacher, Martin in Hesse, Christian; Schulte, Daniela; Stercken, Martina (Eds.) Kommunale Selbstinszenierung (in press)Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical ... [more ▼]Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical Perspectives' Universität Zürich, 3./4./5. September 2015 Martin Uhrmacher (Universität Luxemburg) „Leprosorien als kommunale Repräsentationsbauten im vorstädtischen Raum. Ein neuer Blick auf eine bisher wenig beachtete städtische Baugattung“ Die vor den Mauern mittelalterlicher und frühneuzeitlicher Städte gelegenen Leprosorien werden heute zumeist noch immer als abgelegene und verborgene Orte der Exklusion angesehen, durch Zäune und Mauern von der Außenwelt getrennt. Dementsprechend wird auch der Baugattung „Leprosorium“ nur wenig architektonischer Wert zugebilligt, wie bspw. im Ausstellungskatalog „Aussatz – Lepra – Hansen-Krankheit: Demnach hatten sie „keinerlei repräsentative Bedeutung, im Gegenteil: eher unauffällig sollten sie sein, verborgen vor dem Blick der Stadtbewohner und Reisenden“. Im 2005 von Monika Escher und Frank G. Hirschmann publizierten Syntheseband „Die urbanen Zentren des hohen und späten Mittelalters“ zur Geschichte mittelalterlicher Städte zwischen Rhein und Maas werden Leprosorien zudem als „nicht wertungsrelevantes“ Urbanitäts- und Zentralitätskriterium“ bezeichnet; begründet mit der angeblichen „Tatsache, daß in der Regel der topographische Bezug zur Stadt gering war“. In der jüngeren Forschung hat sich diese Einschätzung nun grundlegend gewandelt. Leprosorien gelten aufgrund ihrer besonders prominent und exponiert ausgewählten Standorte an Kreuzungen, Brücken und Hauptausfallstraßen als präsente und das städtische Umland prägende kommunale Einrichtungen, die ein fester Bestandteil der städtischen Lebenswelt waren. Sie dienten nicht dazu, ihre Bewohner zu verstecken, sondern waren vielmehr mit Stiftungen und Spenden versehene städtische Einrichtungen, die vom Rat und den Bürgern auch als Prestigeobjekte betrachtet wurden. Anhand ausgewählter Beispiele wird aufgezeigt, wie Leprosorien als Repräsentationsobjekte der Stadtgemeinden auch dem bürgerlichen Selbstverständnis Ausdruck verliehen. [less ▲]Detailed reference viewed: 8 (1 UL) L’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciationSchall, Céline in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]Detailed reference viewed: 120 (5 UL) Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave SystemsTsinos, Christos ; Maleki, Sina ; Chatzinotas, Symeon et alin Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems (in press)Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the ... [more ▼]Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the design of a prospect transceiver should guarantee the efficient coexistence with the incumbent services in these bands. To that end, in this paper, two underlay cognitive transceiver designs are proposed based on a hybrid Analog/Digital transceiver architecture that enables the mmWave spectrum access while controlling the interference to the incumbent users with low hardware complexity and power consumption. The first cognitive solution designs a codebook free cognitive hybrid pre-coder by maximizing the mutual information between its two ends subject to interference, power and hardware constraints related to the analog counterpart. The second solution is codebook based and exhibits less complexity than the first one at the cost of inferior spectral efficiency. A novel codebook free solution for the post-coder at the cognitive receiver part is further proposed, based on a hardware constrained Minimum Mean Square Error criterion. Simulations study the performance of both the proposed hybrid approaches and compare it to the one of a fully digital solution for typical wireless environments. [less ▲]Detailed reference viewed: 126 (15 UL) Are octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?Gerkrath, Jörg in Contiades, Xenophon (Ed.) ‘Imposed Constitutions: Aspects of Imposed Constitutionalism’ (in press)The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]Detailed reference viewed: 19 (2 UL) Automatically Repairing Web Application Firewalls Based on Successful SQL Injection AttacksAppelt, Dennis; Panichella, Annibale ; Briand, Lionel in The 28th IEEE International Symposium on Software Reliability Engineering (ISSRE) (in press)Testing and fixing WAFs are two relevant and complementary challenges for security analysts. Automated testing helps to cost-effectively detect vulnerabilities in a WAF by generating effective test cases ... [more ▼]Testing and fixing WAFs are two relevant and complementary challenges for security analysts. Automated testing helps to cost-effectively detect vulnerabilities in a WAF by generating effective test cases, i.e., attacks. Once vulnerabilities have been identified, the WAF needs to be fixed by augmenting its rule set to filter attacks without blocking legitimate requests. However, existing research suggests that rule sets are very difficult to understand and too complex to be manually fixed. In this paper, we formalise the problem of fixing vulnerable WAFs as a combinatorial optimisation problem. To solve it, we propose an automated approach that combines machine learning with multi-objective genetic algorithms. Given a set of legitimate requests and bypassing SQL injection attacks, our approach automatically infers regular expressions that, when added to the WAF's rule set, prevent many attacks while letting legitimate requests go through. Our empirical evaluation based on both open-source and proprietary WAFs shows that the generated filter rules are effective at blocking previously identified and successful SQL injection attacks (recall between 54.6% and 98.3%), while triggering in most cases no or few false positives (false positive rate between 0% and 2%). [less ▲]Detailed reference viewed: 81 (8 UL) « … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romainBinsfeld, Andrea in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)Detailed reference viewed: 43 (9 UL) TemPsy-Check: a Tool for Model-driven Trace Checking of Pattern-based Temporal PropertiesDou, Wei ; Bianculli, Domenico ; Briand, Lionel in Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (in press)Detailed reference viewed: 20 (0 UL) Le dialogue entre les juges en matière de protection des droits de l'hommePelin Raducu, Ioana in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]Detailed reference viewed: 54 (3 UL) On the Risk of Tool Over-tuning in Runtime Verification CompetitionsBianculli, Domenico ; Krstic, Srdanin Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (in press)Detailed reference viewed: 13 (0 UL) Glwssiki ikanotita, glwssiki chrisi kai glwssikes staseis Alvanwn metanastwn prwtis kai defteris genias stin Ellada.Michail, Domna; Gogonas, Nikolaos (in press)Detailed reference viewed: 25 (5 UL) Introducing automated GUI testing and observing its benefits: an industrial case study in the context of law-practice management softwareGarousi, Vahid ; Yıldırım, Erdemin Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) (in press)Motivated by a real-world industrial need in the context of a large IT solutions company based in Turkey, the authors and their colleagues developed and introduced automated test suites for GUI testing of ... [more ▼]Motivated by a real-world industrial need in the context of a large IT solutions company based in Turkey, the authors and their colleagues developed and introduced automated test suites for GUI testing of two large-scale law-practice management software (comprising of 414 and 105 KLOC). We report in this paper our experience in developing and introducing a set of large automated test suites (more than 50 KLOC in total), using best practices in state-of-the art and –practice, and to report its observed benefits by conducting cost-benefit analysis in the specific industrial context. The project was conducted based on the principles of case-study and “action research” in which the real industrial needs drove the research. Among the best practices that we used are the followings: (1) the page-object test pattern, (2) modularity in test code, (3) creating test-specific libraries, and (4) using systematic guidelines to decide when and what (test cases) to automate. To assess the cost-benefit and Return On Investment (ROI) of test automation, we followed a hybrid measurement approach to assess both the quantitative and qualitative (intangible) benefits of test automation. The empirical findings showed that the automated GUI testing approach has indeed benefitted the test and QA team in the company under study and automation has been highly welcome by the test engineers. By serving as a success story and experience report in development and introduction of automated test suites in an industrial setting, this paper adds to the body of evidence in this area and it aims at sharing both technical (e.g., using automated test patterns) and process aspects (e.g., test process improvement) of our project with other practitioners and researchers with the hope of encouraging more industry-academia collaborations in test automation. [less ▲]Detailed reference viewed: 37 (4 UL) Comparing automated visual GUI testing tools: an industrial case studyGarousi, Vahid ; Afzal, Wasif; Çağlar, Adem et alin Proceedings of International Workshop on Automated Software Testing (A-TEST) (in press)Visual GUI testing (VGT) is a tool-driven technique, which uses image recognition for interaction and assertion of the behaviour of system under test. Motivated by a real industrial need, in the context ... [more ▼]Visual GUI testing (VGT) is a tool-driven technique, which uses image recognition for interaction and assertion of the behaviour of system under test. Motivated by a real industrial need, in the context of a large Turkish software and systems company providing solutions in the areas of defense and IT sector, we systematically planned and applied a VGT project in this industrial context. The goal of the initial phase of the project was to empirically evaluate two well-known VGT tools (Sikuli and JAutomate) to help the company select the best tool for a given testing project. Our results show that both two tools suffer from similar test ‘Replay’ problems such as the inability to find smaller-sized images. The repeatability of test executions was better for JAutomate in case of one of the two software under test (SUT) while it was comparable for the other. In terms of test development effort, for both tools, there were high correlations with number of steps in test suites, however the effort is reduced if test code is reused. The study has already provided benefits to the test engineers and managers in the company by increasing the know-how in the company w.r.t. VGT, and by identifying the challenges and their workarounds in using the tools. The industrial case study in this paper intends to add to the body of evidence in VGT and help other researchers and practitioners. [less ▲]Detailed reference viewed: 47 (3 UL) Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud ProvidersWagle, Shyam Sharan ; Guzek, Mateusz ; Bouvry, Pascal et alin Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers (in press)Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to ... [more ▼]Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances while recommending cloud services to the cloud users, using all available data. In this paper, we compare our two approaches to do so: a min-max-min decomposition based on Intuitionistic Fuzzy Logic (IFL) and a Performance Heat Map technique, to evaluate the performance of commercially available cloud providers. While the IFL technique provides simple, total order of the evaluated CSPs, Performance Heat Map provides transparent and explanatory, yet consistent evaluation of service performance of commercially available CSPs. The identified drawbacks of the IFL technique are: 1) It does not return the accurate performance evaluation over multiple decision alternatives due to highly influenced by critical feedback of the evaluators; 2) Overall ranking of the CSPs is not as expected according to the performance measurement. As a result, we recommend to use performance Heat Map for this problem. [less ▲]Detailed reference viewed: 35 (4 UL) Le quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?Schall, Céline ; Vilatte, Jean-Christophein Les mondes de la médiation culturelle (in press)« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]Detailed reference viewed: 23 (1 UL) Modelling Metrics for Transparency in Medical SystemsPierina Brustolin Spagnuelo, Dayana ; Bartolini, Cesare ; Lenzini, Gabriele in Proceedings of TrustBus 2017 (in press)Detailed reference viewed: 18 (3 UL) Exploring Different Receiver Structures for Radio over FSO Systems with Signal Dependent NoiseMengali, Alberto ; Shankar, Bhavani ; Ottersten, Björn in Proceedings of Globecom 2017 (in press)Detailed reference viewed: 17 (0 UL) Multi-objective regression test selection in practice: an empirical study in the defense software industryÖzkan, Ramazan; Garousi, Vahid ; Betin-Can, Aysuin Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) (in press)Executing an entire regression test suite after every code change is often costly in large software projects. To address this challenge, various regression test selection techniques have been proposed in ... [more ▼]Executing an entire regression test suite after every code change is often costly in large software projects. To address this challenge, various regression test selection techniques have been proposed in the literature. One of those approaches is the Multi-Objective Regression Test Optimization (MORTO) approach, which is applied when there are multiple objectives during regression testing (e.g., minimizing the number of test cases and maximizing test coverage). This paper reports an action research type of study which was conducted to improve regression test-selection practices of a safety-critical industrial software in the defence domain based on the MORTO approach. The problem is formulated and solved by converting the multi-objective genetic-algorithm (GA) problem into a custom-built scalarized single-objective GA. The empirical results demonstrate that this approach yields a more efficient test suite (in terms of testing cost and benefits) compared to the old (manual) test-selection approach and another approach from the literature, i.e., the selective requirement coverage-based approach. Based on the context and need of the company, we developed the GA-based solution on a set of five cost objectives and four benefit objectives for regression testing while providing full coverage of the affected (changed) requirements. Since our proposed approach has been beneficial in the industrial context, it is currently in active use in the company. [less ▲]Detailed reference viewed: 28 (2 UL) La force intégrative du statut de l'Etat membre sur la fonction juridictionnelleNeframi, Eleftheria in Potvin Solis, Laurence (Ed.) Le statut d'Etat membre de l'Union européenne (in press)The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields ... [more ▼]The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields covered by Union law (Art 19, par 1, subpar 2, TEU). Member States have to ensure access to the national judge, who has been entrusted with a European mandate, and who is in measure to cooperate with the Court of Justice through the preliminary reference procedure. The Member States establish in this way an integrated judicial function. The exercise of such a function by the national judge, in cooperation with the Court of Justice and under the control of the Member State, implies integrative dynamic, which however depends on the balancing exercise with national procedural autonomy and the margin of appreciation of the national judge. [less ▲]Detailed reference viewed: 7 (0 UL) Service Performance Pattern Analysis and Prediction of Commercially Available Cloud ProvidersWagle, Shyam Sharan ; Guzek, Mateusz ; Bouvry, Pascal in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]Detailed reference viewed: 65 (6 UL) Historical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandarisMeiers, Fabienne in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]Detailed reference viewed: 77 (6 UL) A New Perspective on the Luxembourgish GenitiveDöhmer, Caroline in Germanic Genitives (in press)Detailed reference viewed: 219 (3 UL) Les bourgeois de Bohême et l’impossible légitimation ? La conjuration de Prague et de Kutná Hora de février 1309Vomacka, Eloïse in Contester au Moyen Âge : de la désobéissance à la révolte XLIXe congrès de la SHMESP (2018)Detailed reference viewed: 22 (0 UL) Un roi étranger en Bohême. Les modalités de la communication politique entre Jean l’Aveugle et la noblesse, de la publication des Diplômes inauguraux aux accords de Domažlice (1310-1318).Vomacka, Eloïse in Gouverner en territoire étranger (2018)Detailed reference viewed: 22 (4 UL) ASPIC-END: Structured Argumentation with Explanations and Natural DeductionDauphin, Jérémie ; Cramer, Marcos in Theory and Applications of Formal Argumentation (2018)We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that ... [more ▼]We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that models argumentation about explanations of semantic paradoxes (e.g. the Liar paradox), and we show that ASPIC-END satisfies rationality postulates akin to those satisfied by ASPIC+. [less ▲]Detailed reference viewed: 25 (4 UL) Extended Explanatory Argumentation FrameworksDauphin, Jérémie ; Cramer, Marcos in Theory and Applications of Formal Argumentation (2018)Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already ... [more ▼]Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already previously proven useful to study and combine such extensions is the meta-argumentation methodology involving the notion of a flattening. In order to faithfully model the interaction between explanation argumentation in scientific debates, Šešelja and Straßer have introduced Explanatory Argumentation Frameworks (EAFs). In this paper, we first prove that the flattening technique works as expected for recursive (higher-order) attacks. Then we apply this technique in order to combine EAFs with multiple other extensions that have been proposed to AFs, namely with recursive attacks, joint attacks and a support relation between arguments. This gives rise to Extended Explanatory Argumentation Frameworks (EEAFs). We illustrate the applicability of EEAFs by using them to model a piece of argumentation from a research-level philosophy book. [less ▲]Detailed reference viewed: 27 (3 UL) A Framework for Optimizing Multi-cell NOMA: Delivering Demand with Less ResourceYou, Lei; Lei, Lei ; Yuan, Di et alin 2017 IEEE Global Communications Conference (GLOBECOM) (2017, December)Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far ... [more ▼]Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far, most papers on NOMA have focused on performance gain for one or sometimes two base stations. In this paper, we study multi-cell NOMA and provide a general framework for user clustering and power allocation, taking into account inter-cell interference, for optimizing resource allocation of NOMA in multi-cell networks of arbitrary topology. We provide a series of theoretical analysis, to algorithmically enable optimization approaches. The resulting algorithmic notion is very general. Namely, we prove that for any performance metric that monotonically increases in the cells’ resource consumption, we have convergence guarantee for global optimum. We apply the framework with its algorithmic concept to a multi-cell scenario to demonstrate the gain of NOMA in achieving significantly higher efficiency. [less ▲]Detailed reference viewed: 45 (12 UL) Analysis of Fingerprinting Techniques for Tor Hidden ServicesPanchenko, Andriy ; Mitseva, Asya ; Henze, Martin et alin Proceedings of the 24th ACM Computer and Communications Security (ACM CCS) 16th Workshop on Privacy in the Electronic Society (ACM WPES 2017) (2017, October 31)Detailed reference viewed: 34 (2 UL) Security in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid CrystalsLenzini, Gabriele ; Samir, Ouchani; Roenne, Peter et alin Proc. of the 9th IEEE Workshop on Information Forensics and Security (2017, October 02)We describe the application in security of shells of Cholesteric Liquid Crystals (ChLCs). Such shells have a diameter in the microns range and can be gathered in hundreds in a surface area as small as a ... [more ▼]We describe the application in security of shells of Cholesteric Liquid Crystals (ChLCs). Such shells have a diameter in the microns range and can be gathered in hundreds in a surface area as small as a nail’s head. Because of their structural properties, a bundle of them reflects light, creating colorful patterns that we argue to be unique and computationally hard to predict. We argue also that the bundle itself is unclonable. These are typical properties of Physically Unclonable Functions, a family to which shells of ChLCs belong too. Herein we discuss their physical and security properties and their potential use in object authentication. [less ▲]Detailed reference viewed: 26 (1 UL) Towards Automatic Human Body Model Fitting to a 3D ScanSaint, Alexandre Fabian A ; Shabayek, Abd El Rahman ; Aouada, Djamila et alin D'APUZZO, Nicola (Ed.) Proceedings of 3DBODY.TECH 2017 - 8th International Conference and Exhibition on 3D Body Scanning and Processing Technologies, Montreal QC, Canada, 11-12 Oct. 2017 (2017, October)This paper presents a method to automatically recover a realistic and accurate body shape of a person wearing clothing from a 3D scan. Indeed, in many practical situations, people are scanned wearing ... [more ▼]This paper presents a method to automatically recover a realistic and accurate body shape of a person wearing clothing from a 3D scan. Indeed, in many practical situations, people are scanned wearing clothing. The underlying body shape is thus partially or completely occluded. Yet, it is very desirable to recover the shape of a covered body as it provides non-invasive means of measuring and analysing it. This is particularly convenient for patients in medical applications, customers in a retail shop, as well as in security applications where suspicious objects under clothing are to be detected. To recover the body shape from the 3D scan of a person in any pose, a human body model is usually fitted to the scan. Current methods rely on the manual placement of markers on the body to identify anatomical locations and guide the pose fitting. The markers are either physically placed on the body before scanning or placed in software as a postprocessing step. Some other methods detect key points on the scan using 3D feature descriptors to automate the placement of markers. They usually require a large database of 3D scans. We propose to automatically estimate the body pose of a person from a 3D mesh acquired by standard 3D body scanners, with or without texture. To fit a human model to the scan, we use joint locations as anchors. These are detected from multiple 2D views using a conventional body joint detector working on images. In contrast to existing approaches, the proposed method is fully automatic, and takes advantage of the robustness of state-of-art 2D joint detectors. The proposed approach is validated on scans of people in different poses wearing garments of various thicknesses and on scans of one person in multiple poses with known ground truth wearing close-fitting clothing. [less ▲]Detailed reference viewed: 15 (6 UL) Relay Selection Strategies for SWIPT-Enabled Cooperative Wireless SystemsGautam, Sumit ; Lagunas, Eva ; Sharma, Shree K. et alin IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, Oct. 2017 (2017, October)Detailed reference viewed: 55 (15 UL) Wi-Fi butterfly effect in indoor localization: The impact of imprecise ground truth and small-scale fadingPopleteev, Andrei in 14th IEEE Workshop on Positioning, Navigation and Communications (WPNC-2017) (2017, October)The increasing accuracy of indoor positioning systems makes their evaluation an increasingly challenging task. A number of factors are already known to affect performance of fingerprint-based systems ... [more ▼]The increasing accuracy of indoor positioning systems makes their evaluation an increasingly challenging task. A number of factors are already known to affect performance of fingerprint-based systems: hardware diversity, device orientation, environment dynamics. This paper presents a new butterfly-like effect in localization experiments. The effect is caused by minor ground truth (GT) errors --- that is, small deviations between calibration and test positions. While such deviations are widely considered as purely additive and thus negligible, we demonstrate that even centimeter-scale GT errors are amplified by small-scale radio fading and lead to severe multi-meter Wi-Fi positioning errors. The results show that fingerprint-based localization accuracy quickly deteriorates as GT errors increase towards 0.4 wavelength (5 cm for 2.4 GHz). Beyond that threshold, system's accuracy saturates to about one-third of its original level achievable with precise GT. This effect challenges the impact of the already known accuracy-limiting factors (such as cross-user tests, receiver diversity, device orientation and temporal variations), as they can be partially explained by minor GT errors. Moreover, for smartphone-in-a-hand experiments, this effect directly associates the evaluation outcomes with experimenters' diligence. [less ▲]Detailed reference viewed: 13 (0 UL) Optical Feeder Links Study towards Future Generation MEO VHTS SystemsMengali, Alberto ; Lyras, Nikos K.; Shankar, Bhavani et alin Proceedings of the 35th AIAA International Communications Satellite Systems Conference (ICSSC) (2017, October)Detailed reference viewed: 13 (0 UL) Estimating Urban Road Traffic States Using Mobile Network Signaling DataDerrmann, Thierry ; Frank, Raphaël ; Viti, Francesco et alin Derrmann, Thierry; Frank, Raphaël; Viti, Francesco (Eds.) et al Estimating Urban Road Traffic States Using Mobile Network Signaling Data (2017, October)It is intuitive that there is a causal relationship between human mobility and signaling events in mobile phone networks. Among these events, not only the initiation of calls and data sessions can be used ... [more ▼]It is intuitive that there is a causal relationship between human mobility and signaling events in mobile phone networks. Among these events, not only the initiation of calls and data sessions can be used in analyses, but also handovers between different locations that reflect mobility. In this work, we investigate if handovers can be used as a proxy metric for flows in the underlying road network, especially in urban environments. More precisely, we show that characteristic profiles of handovers within and between clusters of mobile network cells exist. We base these profiles on models from road traffic flow theory, and show that they can be used for traffic state estimation using floating-car data as ground truth. The presented model can be beneficial in areas with good mobile network coverage but low road traffic counting infrastructure, e.g. in developing countries, but also serve as an additional predictor for existing traffic state monitoring systems. [less ▲]Detailed reference viewed: 44 (6 UL) Please Stand By: TV-based indoor localizationPopleteev, Andrei in 28th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC-2017) (2017, October)Despite the decades of efforts, indoor positioning remains an open research challenge. While existing solutions already demonstrate high accuracy, their in-building infrastructure --- such as Wi-Fi access ... [more ▼]Despite the decades of efforts, indoor positioning remains an open research challenge. While existing solutions already demonstrate high accuracy, their in-building infrastructure --- such as Wi-Fi access points or Bluetooth beacons --- provides only a limited coverage. This paper investigates feasibility of accurate indoor positioning using broadcast digital TV signals, readily available in populated areas worldwide. We experiment with the classic received signal strength (RSS) fingerprinting, and introduce a novel approach based on channel state information (CSI), which leverages frequency-selective multipath fading of wideband TV signals. The proposed methods are experimentally evaluated on an extensive dataset of DVB-T signals, systematically collected in two large buildings over the course of 8 months. The results show that the proposed approach consistently outperforms RSS fingerprinting and achieves 92--98% localization accuracy. While this study is based on the European DVB-T signals, the proposed method is directly generalizable to other TV standards (such as ATSC, ISDB, DTMB and DMB) and wide-area TV white space (TVWS) networks. [less ▲]Detailed reference viewed: 11 (0 UL) Experimental investigations on semi-continuous encased composite jointsDuarte Da Costa, Job ; Obiala, Renata ; Odenbreit, Christoph in Eurosteel 2017 (2017, September 13)The benefits brought to composite construction by the use of semi-continuous joints are well recognised and confirmed by the significant amount of research which has been performed in this area. It has ... [more ▼]The benefits brought to composite construction by the use of semi-continuous joints are well recognised and confirmed by the significant amount of research which has been performed in this area. It has been analytically proven that at serviceability limit state (SLS) the performance of composite beams benefits from the use of semi-continuous composite joints [1]. At ultimate limit state (ULS) it is of common knowledge that the use of semi-continuous composite joints is only judicious in combination with the plastic hinge theory, which requires the verification of the rotation capacity of the joint. Despite all the effort done in this area, a concise and well-defined method to determine the rotation capacity of composite joints is lacking. Hence, a research programme with a large experimental part has been designed to investigate the behaviour of the connection between a column and a composite slim-floor beam subjected to a negative bending moment. It is the first time that the rotation capacity of an encased composite joint is analysed. The experimental campaign, presented in here, aims at determining the influence of each joint component on the rotation capacity of composite joints. Three test series have been performed; on boltless beam-to-column connections using variable longitudinal reinforcement ratio and bar diameter of the slab, on a bare bolted end-plate steel connection without reinforced concrete slab and finally on the encased composite joint with the complete bolted end-plate connection. This paper presents a detailed description of the tested specimen, shows the main results of the experimental investigations and gives an outlook on future work regarding this research project. The final goal of the research project is to develop a comprehensive methodology to predict the rotation capacity for traditional and slim-floor type of composite beams. [less ▲]Detailed reference viewed: 9 (0 UL) Mechanical Model to Predict the Resistance of the Shear Connection in Composite Beams with Deep Steel DeckingOdenbreit, Christoph ; Nellinger, Sebastian in Eurosteel 2017 (2017, September 13)The resistance of a typical shear connection with headed shear studs in a composite beam is analysed in the normal case in accordance with EN 1994-1-1. The reducing effect of a trapezoidal metal decking ... [more ▼]The resistance of a typical shear connection with headed shear studs in a composite beam is analysed in the normal case in accordance with EN 1994-1-1. The reducing effect of a trapezoidal metal decking onto the ultimate load bearing capacity is considered with empirically derived reduction factors and equations, which have been developed in the last century between the late 70th and the early 80th. The RFCS research project “DISCCO” investigated the shear stud resistance with novel types of steel decking. In many cases, the shear resistance, which was predicted by EN 1994-1-1 was not reached in tests. In the respective experiments with composite beams and deep decking, a concrete cone failure mode was identified and not a pure shear failure of the stud. This failure mode acted in combination with the load bearing capacity of the shear stud, which formed one or two plastic hinges in the shaft - depending on the available geometry. Based on these observations, new equations have been developed to predict the shear connection’s resistance with more accurcy. The yield hinge mechanism of the shear stud, which was developed by Lungershausen, was extended by the above mentioned load bearing component ‘concrete cone’. The formulae consider the geometry of the stud and the steel decking, the material strength of the stud and of the concrete material. The statistical evaluation of the developed equations shows a good accordance with test results. [less ▲]Detailed reference viewed: 4 (1 UL) Specification and Analysis of Resource Utilization Policies for Human-Intensive Systems (Extended Abstract)Shin, Seung Yeob in Proceedings of the BPM Demo Track and BPM Dissertation Award co-located with 15th International Conference on Business Process Management (BPM 2017) (2017, September 10)Societal processes, such as those used in healthcare, typically depend on the effective utilization of resources, both human and non-human. Sound policies for the management of these resources are crucial ... [more ▼]Societal processes, such as those used in healthcare, typically depend on the effective utilization of resources, both human and non-human. Sound policies for the management of these resources are crucial in assuring that these processes achieve their goals. But complex utilization policies may govern the use of such resources, increasing the difficulty of accurately incorporating resource considerations into complex processes. This dissertation presents an approach to the specification, allocation, and analysis of the management of such resources. [less ▲]Detailed reference viewed: 25 (12 UL) LIPS vs MOSA: a Replicated Em- pirical Study on Automated Test Case GenerationPanichella, Annibale ; Kifetew, Fitsum; Tonella, Paoloin International Symposium on Search Based Software Engineering (SSBSE) 2017 (2017, September 09)Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The ... [more ▼]Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The proponents of LIPS, a novel single-target test generator, conducted a preliminary empirical study to compare their approach with MOSA, an alternative many-objective test generator. However, their empirical investigation suffers from several external and internal validity threats, does not consider complex programs with many branches and does not include any qualitative analysis to interpret the results. In this paper, we report the results of a replication of the original study designed to address its major limitations and threats to validity. The new findings draw a completely different picture on the pros and cons of single-target vs many-objective approaches to test case generation. [less ▲]Detailed reference viewed: 36 (1 UL) Is Big Data Sufficient for a Reliable Detection of Non-Technical Losses?Glauner, Patrick ; Migliosi, Angelo ; Meira, Jorge Augusto et alin Proceedings of the 19th International Conference on Intelligent System Applications to Power Systems (ISAP 2017) (2017, September)Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to ... [more ▼]Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to 40% of the total electricity distributed. In order to detect NTLs, machine learning methods are used that learn irregular consumption patterns from customer data and inspection results. The Big Data paradigm followed in modern machine learning reflects the desire of deriving better conclusions from simply analyzing more data, without the necessity of looking at theory and models. However, the sample of inspected customers may be biased, i.e. it does not represent the population of all customers. As a consequence, machine learning models trained on these inspection results are biased as well and therefore lead to unreliable predictions of whether customers cause NTL or not. In machine learning, this issue is called covariate shift and has not been addressed in the literature on NTL detection yet. In this work, we present a novel framework for quantifying and visualizing covariate shift. We apply it to a commercial data set from Brazil that consists of 3.6M customers and 820K inspection results. We show that some features have a stronger covariate shift than others, making predictions less reliable. In particular, previous inspections were focused on certain neighborhoods or customer classes and that they were not sufficiently spread among the population of customers. This framework is about to be deployed in a commercial product for NTL detection. [less ▲]Detailed reference viewed: 41 (6 UL) Die steuerrechtlichen Herausforderungen der digitalen Wirtschaft - Was passiert in Europa?Sinnig, Julia in Taeger, Juergen (Ed.) Tagungsband Herbstakademie 2017: Recht 4.0 - Innovationen aus den rechtswissenschaftlichen Laboren (2017, September)Detailed reference viewed: 23 (3 UL) Comparing Broad-Phase Interaction Detection Algorithms for Multiphysics DEM ApplicationsRousset, Alban ; Mainassara Chekaraou, Abdoul Wahid ; Liao, Yu-Chung et alin AIP Conference Proceedings ICNAAM 2017 (2017, September)Collision detection is an ongoing source of research and optimization in many fields including video-games and numerical simulations [6, 7, 8]. The goal of collision detection is to report a geometric ... [more ▼]Collision detection is an ongoing source of research and optimization in many fields including video-games and numerical simulations [6, 7, 8]. The goal of collision detection is to report a geometric contact when it is about to occur or has actually occurred. Unfortunately, detailed and exact collision detection for large amounts of objects represent an immense amount of computations, naively n 2 operation with n being the number of objects [9]. To avoid and reduce these expensive computations, the collision detection is decomposed in two phases as it shown on Figure 1: the Broad-Phase and the Narrow-Phase. In this paper, we focus on Broad-Phase algorithm in a large dynamic three-dimensional environment. We studied two kinds of Broad-Phase algorithms: spatial partitioning and spatial sorting. Spatial partitioning techniques operate by dividing space into a number of regions that can be quickly tested against each object. Two types of spatial partitioning will be considered: grids and trees. The grid-based algorithms consist of a spatial partitioning processing by dividing space into regions and testing if objects overlap the same region of space. And this reduces the number of pairwise to test. The tree-based algorithms use a tree structure where each node spans a particular space area. This reduces the pairwise checking cost because only tree leaves are checked. The spatial sorting based algorithm consists of a sorted spatial ordering of objects. Axis-Aligned Bounding Boxes (AABBs) are projected onto x, y and z axes and put into sorted lists. By sorting projection onto axes, two objects collide if and only if they collide on the three axes. This axis sorting reduces the number of pairwise to tested by reducing the number of tests to perform to only pairs which collide on at least one axis. For this study, ten different Broad-Phase collision detection algorithms or framework have been considered. The Bullet [6], CGAL [10, 11] frameworks have been used. Concerning the implemented algorithms most of them come from papers or given implementation. [less ▲]Detailed reference viewed: 39 (12 UL) Mining AndroZoo: A RetrospectLi, Li in The International Conference on Software Maintenance and Evolution (ICSME) (2017, September)This paper presents a retrospect of an Android app collection named AndroZoo and some research works conducted on top of the collection. AndroZoo is a growing collection of Android apps from various ... [more ▼]This paper presents a retrospect of an Android app collection named AndroZoo and some research works conducted on top of the collection. AndroZoo is a growing collection of Android apps from various markets including the official Google Play. At the moment, over five million Android apps have been collected. Based on AndroZoo, we have explored several directions that mine Android apps for resolving various challenges. In this work, we summarize those resolved mining challenges in three research dimensions, including code analysis, app evolution analysis, malware analysis, and present in each dimension several case studies that experimentally demonstrate the usefulness of AndroZoo. [less ▲]Detailed reference viewed: 79 (6 UL) Legal Markup Generation in the Large: An Experience ReportSannier, Nicolas ; Adedjouma, Morayo ; Sabetzadeh, Mehrdad et alin the 25th International Requirements Engineering Conference (RE'17), Lisbon, 4-8 September 2017 (2017, September)Detailed reference viewed: 21 (0 UL) Laboratory experiment for damage assessment using the DAD-methodErdenebat, Dolgion ; Waldmann, Danièle ; Teferle, Felix Norman in Conference proceedings SMAR 2017 (2017, September)In the following, a new analytical method, the Deformation Area Difference (DAD) method for damage assessment of bridge structures is applied using experimental test results of a statically loaded beam ... [more ▼]In the following, a new analytical method, the Deformation Area Difference (DAD) method for damage assessment of bridge structures is applied using experimental test results of a statically loaded beam. An essential prerequisite for the application of this method is a high precise measurement of the deflection line. In this paper, the results from a laboratory experiment using modern measurement techniques such as photogrammetry and displacement sensors are discussed. A reinforced concrete beam is stepwise loaded until reaching the ultimate limit state. The DAD-method is applied to the resulting data from the measurements and the outcome is discussed for further optimisation of the method. In principle, the measured deflection line of the beam contains already essential information on discontinuities which occur due to cracking. These entries are processed and visualised using the DAD-method. This study shows that a high accuracy of the measurement techniques in combination with the DAD-method can become an effective tool for damage detection. [less ▲]Detailed reference viewed: 31 (6 UL) A Model-Driven Approach to Trace Checking of Pattern-based Temporal PropertiesDou, Wei; Bianculli, Domenico ; Briand, Lionel in Proceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017 ) (2017, September)Detailed reference viewed: 43 (4 UL) FORMACIÓN SANITARIA EN VIOLENCIA DE GÉNERO. HERRAMIENTAS ONLINE PARA LA CAPACITACIÓN Y TRANSFERENCIA PRÁCTICAFernández Alonso, Carmen; Gomez Bravo, Raquel ; Herrero Velázquez, Sonia et alin González López-Valcárcel, Beatriz (Ed.) XVII CONGRESO SESPAS XXXV REUNIÓN CIENTÍFICA DE LA SOCIEDAD ESPAÑOLA DE EPIDEMIOLOGÍA Y XII CONGRESSO DA ASSOCIAÇÃO PORTUGUESA DE EPIDEMIOLOGIA XXXVII JORNADAS DE ECONOMÍA DE LA SALUD Ciencia para la Acción (2017, September)Antecedentes/Objetivos: La formación en VG de los y las profesionales de la salud es una necesidad incuestionable y urgente. De poco sirven las recomendaciones de actuación para la detección de casos y ... [more ▼]Antecedentes/Objetivos: La formación en VG de los y las profesionales de la salud es una necesidad incuestionable y urgente. De poco sirven las recomendaciones de actuación para la detección de casos y para la atención a las victimas si no disponemos de profesionales formados para llevarlo a cabo. La violencia contra la mujer no está presente en los contenidos curriculares de la mayor parte de las profesiones sanitarias. Por ello la formación en VG supone en muchos casos partir de cero. Supone sensibilizar y convencer que se trata de un problema de salud y nos compete, y luego de capacitar al profesional para una práctica adecuada. Objetivo del estudio: Identificar necesidades de formación de los y las profesionales en VG, los contenidos básicos y los métodos mejor valorados Elaborar un kit de herramientas de ayuda para la formación dirigido a formadores/as en VG. Métodos: Compartir experiencias formativas de 4 organizaciones europeas que trabajan en VG. Análisis de la práctica formativa, diseñar, consensuar y evaluar las herramientas de ayuda a la formación en VG. Resultados: 1. Kit de 28 herramientas para las distintas fases de la formación (preparación, desarrollo, aplicación, seguimiento y evaluación) con ejemplos que facilitan su aplicación práctica. 2. Documento que recoge las herramientas y materiales disponibles para los docentes y discentes. 3. Página web con todo el material (Toolkik) en inglés y en español accesible: www.toolner.com. En 18 meses ha tenido 40.000 visitas 1ª evaluación de una actividad formativa siguiendo esta metodología ha mejorado los conocimientos y actitudes del alumnado. Conclusiones/Recomendaciones: Esta herramienta on-line puede facilitar el trabajo a los formadores/as y contribuir a la mejora de la capacitación de profesionales y la transferencia a la práctica Se trata de una herramienta dinámica que permite realizar cambios y adaptarse a distintos perfiles y necesidades. Accesible en abierto para cualquier usuario. Financiación: Lifelong Learning Programme, acción Leonardo da Vinci (2013-1-DE2-LEO04-16120 4). [less ▲]Detailed reference viewed: 13 (1 UL) Embedding of the Personalized Sentiment Engine PERSEUS in an Artificial CompanionGuo, Siwen ; Schommer, Christoph in International Conference on Companion Technology, Ulm 11-13 September 2017 (2017, September)The term Artificial Companion has originally been introduced by Y. Wilks [1] as “...an intelligent and helpful cognitive agent, which appears to know its owner and their habits, chats to them and diverts ... [more ▼]The term Artificial Companion has originally been introduced by Y. Wilks [1] as “...an intelligent and helpful cognitive agent, which appears to know its owner and their habits, chats to them and diverts them, assists them with simple tasks. . . ”. To serve the users’ interests by considering a personal knowledge is, furthermore, demanded. The following position paper takes this request as motivation for the embedding of the PERSEUS system, which is a personalized sentiment framework based on a Deep Learning approach. We discuss how such an embedding with a group of users should be realized and why the utilization of PERSEUS is beneficial. [less ▲]Detailed reference viewed: 18 (5 UL) Pile load test at the west coast of MexicoRica, Shilton ; Van Baars, Stefan ; Jung, Stefanin Proceedings of Pile 2017 (2017, September)Five pile tests have been performed, at the west coast of Mexico, in order to evaluate their pile bearing capacity. The Kentledge system (a test pile loaded in between two tension piles) has been used to ... [more ▼]Five pile tests have been performed, at the west coast of Mexico, in order to evaluate their pile bearing capacity. The Kentledge system (a test pile loaded in between two tension piles) has been used to execute the pile tests. The soil stratigraphy has been surveyed with standard penetration tests, cone penetration tests and borings, and consists of a ten to twelve meter soft clayey soil on top of a hard clay layer. Three identical pile tests have been performed on bored piles with a pile diameter of 0.6 m and a pile length of 30 m. In addition, two identical pile tests have been performed on driven piles with a squared cross section of 0.5 m × 0.5 m and a pile length of about 21 m. The aims of these tests were, first to evaluate the pile bearing capacity for both the bored and the driven pile types, in order to decide which pile type will be used finally, for the foundation of a factory; and second, to study the influence of the pile installation process on the pile bearing capacity of both pile types. During the testing of the bored piles, load measurements in different sections of the pile suggested that almost all bearing capacity came from the pile section in the upper soft clay layer. Since it is impossible to have such a relative large friction along the pile shaft in the soft soil, and because far more concrete was used for making the pile than expected, it had to be concluded that the liquid concrete has widened the pile diameter just above the hard soil layer, leading to a bulking effect in the pile. Therefore, the pile was leaning on this hard soil layer. For the driven test piles, the measurements showed a normal behaviour of both the pile shaft friction and the pile tip bearing capacity. [less ▲]Detailed reference viewed: 15 (3 UL) AmbiLoc: A year-long dataset of FM, TV and GSM fingerprints for ambient indoor localizationPopleteev, Andrei in 8th International Conference on Indoor Positioning and Indoor Navigation (IPIN-2017) (2017, September)Ambient indoor localization - an approach that leverages ambient radio signals - has been previously shown to provide promising positioning performance using the globally available infrastructure of FM ... [more ▼]Ambient indoor localization - an approach that leverages ambient radio signals - has been previously shown to provide promising positioning performance using the globally available infrastructure of FM, TV and cellular stations. However, the need for specialized equipment and laborious data collection constitute a high entry barrier for follow-up studies. This paper presents AmbiLoc - a dataset of radio signals for ambient indoor localization research. The dataset has been systematically collected in multiple testbeds, including large-scale and multi-floor buildings, over the course of one year. Due to the use of a software-defined radio receiver, raw signal samples in AmbiLoc allow extraction of arbitrary fingerprinting features. The first edition of AmbiLoc, introduced in this paper, includes received signals strength (RSS) fingerprints of FM, TV and GSM signals, along with the relevant metadata (such as weather conditions). The dataset is available online at AmbiLoc.org. As the first public dataset of ambient localization signals, AmbiLoc provides an easy entry and a common reference for researchers exploring novel indoor localization methods. [less ▲]Detailed reference viewed: 9 (0 UL) JoanAudit: A Tool for Auditing Common Injection VulnerabilitiesThome, Julian ; Shar, Lwin Khin ; Bianculli, Domenico et alin 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (2017, September)JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies ... [more ▼]JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies parts of the program code that are relevant for security and generates an HTML report to guide security auditors audit the source code in a scalable way. JoanAudit is configured with various security-sensitive input sources and sinks relevant to injection vulnerabilities and standard sanitization procedures that prevent these vulnerabilities. It can also automatically fix some cases of vulnerabilities in source code — cases where inputs are directly used in sinks without any form of sanitization — by using standard sanitization procedures. Our evaluation shows that by using JoanAudit, security auditors are required to inspect only 1% of the total code for auditing common injection vulnerabilities. The screen-cast demo is available at https://github.com/julianthome/joanaudit. [less ▲]Detailed reference viewed: 114 (27 UL) Refinement-Aware Generation of Attack TreesGadyatskaya, Olga ; Ravi, Jhawar; Mauw, Sjouke et alin Livraga, Giovanni; Mitchell, Chris J. (Eds.) Security and Trust Management - 13th International Workshop (2017, September)Detailed reference viewed: 11 (0 UL) A Deep Learning Approach for Optimizing Content Delivering in Cache-Enabled HetNetLei, Lei ; You, Lei; Dai, Gaoyang et alin IEEE International Symposium on Wireless Communication Systems (ISWCS), Bologna, Aug. 2017 (2017, August 31)Detailed reference viewed: 53 (6 UL) Facial Expression Recognition via Joint Deep Learning of RGB-Depth Map Latent RepresentationsOyedotun, Oyebade ; Demisse, Girum ; Shabayek, Abd El Rahman et alin 2017 IEEE International Conference on Computer Vision Workshop (ICCVW) (2017, August 21)Humans use facial expressions successfully for conveying their emotional states. However, replicating such success in the human-computer interaction domain is an active research problem. In this paper, we ... [more ▼]Humans use facial expressions successfully for conveying their emotional states. However, replicating such success in the human-computer interaction domain is an active research problem. In this paper, we propose deep convolutional neural network (DCNN) for joint learning of robust facial expression features from fused RGB and depth map latent representations. We posit that learning jointly from both modalities result in a more robust classifier for facial expression recognition (FER) as opposed to learning from either of the modalities independently. Particularly, we construct a learning pipeline that allows us to learn several hierarchical levels of feature representations and then perform the fusion of RGB and depth map latent representations for joint learning of facial expressions. Our experimental results on the BU-3DFE dataset validate the proposed fusion approach, as a model learned from the joint modalities outperforms models learned from either of the modalities. [less ▲]Detailed reference viewed: 96 (26 UL) Coverage optimization with connectivity preservation for UAV swarms applying chaotic dynamicsRosalie, Martin ; Brust, Matthias ; Danoy, Grégoire et alin IEEE International Conference on Autonomic Computing (ICAC), Columbus 17-21 July 2017 (2017, August 11)Cooperative usage of multiple UAVs as a swarm can deliver high-quality surveillance performance. However, the communication capabilities within the UAV swarm must be maintained for local data propagation ... [more ▼]Cooperative usage of multiple UAVs as a swarm can deliver high-quality surveillance performance. However, the communication capabilities within the UAV swarm must be maintained for local data propagation to swarm members in favor of achieving an efficient global behavior. In this paper, we address the problem of optimizing two adversary criteria for such a UAV swarm: (a) maximizing the area coverage, while (b) preserving network connectivity. Our approach, called CACOC², solves the problem with a novel chaotic ant colony optimization approach, which combines an Ant Colony Optimization approach (ACO) with a chaotic dynamical system. CACOC² employs swarming behavior to obtain UAV clustering that result in maximized area coverage and preserved network connectivity. We show by extensive simulations how the size of the UAV swarm influences the coverage and connectivity. A metrics comparison chart shows the correlation of coverage and connectivity metrics. [less ▲]Detailed reference viewed: 29 (5 UL) An engineering approach to mapping meanings in products and servicesWaltersdorfer, Gregor ; Gericke, Kilian ; Desmet, Pieter M. A. et alin Maier, Anja; Skec, Stanko; Kim, Harrison (Eds.) et al Proceedings of the 21st International Conference on Engineering Design (ICED 17) Vol 3: Product, Services and Systems Design (2017, August)Detailed reference viewed: 32 (4 UL) Random Phase Center Motion Technique for Enhanced Angle-Doppler Discrimination Using MIMO RadarsHammes, Christian ; Shankar, Bhavani ; Nijsure, Yogesh et alin European Signal Processing Conference (EUSIPCO) 2017 (2017, August)A random Phase Center Motion (PCM) technique is presented in this paper, based on Frequency Modulated Continuous Wave (FMCW) radar, in order to suppress the angle- Doppler coupling in Time Division ... [more ▼]A random Phase Center Motion (PCM) technique is presented in this paper, based on Frequency Modulated Continuous Wave (FMCW) radar, in order to suppress the angle- Doppler coupling in Time Division Multiplex (TDM) Multiple- Input-Multiple-Output (MIMO) radar when employing sparse array structures. The presented approach exploits an apparently moving transmit platform or PCM due to spatio-temporal transmit array modulation. In particular, the work considers a framework utilizing a random PCM trajectory. The statistical characterization of the random PCM trajectory is devised, such that the PCM and the target motion coupling is minimal, while the angular resolution is increased by enabling the virtual MIMO concept. In more details, this paper discusses sidelobe suppression approaches within the angle-Doppler Ambiguity Function (AF) by introducing a phase center probability density function within the array. This allows for enhanced discrimination of multiple targets. Simulation results demonstrate the suppression angle- Doppler coupling by more than 30 dB, even though spatiotemporal transmit array modulation is done across chirps which leads usually to strong angle-Doppler coupling. [less ▲]Detailed reference viewed: 34 (4 UL) Belief Change in a Preferential Non-Monotonic FrameworkCasini, Giovanni ; Meyer, Thomasin Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (2017, August)Belief change and non-monotonic reasoning are usually viewed as two sides of the same coin, with results showing that one can formally be defined in terms of the other. In this paper we show that we can ... [more ▼]Belief change and non-monotonic reasoning are usually viewed as two sides of the same coin, with results showing that one can formally be defined in terms of the other. In this paper we show that we can also integrate the two formalisms by studying belief change within a (preferential) non-monotonic framework. This integration relies heavily on the identification of the monotonic core of a non-monotonic framework. We consider belief change operators in a non-monotonic propositional setting with a view towards preserving consistency. These results can also be applied to the preservation of coherence—an important notion within the field of logic-based ontologies. We show that the standard AGM approach to belief change can be adapted to a preferential non-monotonic framework, with the definition of expansion, contraction, and revision operators, and corresponding representation results. Surprisingly, preferential AGM belief change, as defined here, can be obtained in terms of classical AGM belief change. [less ▲]Detailed reference viewed: 44 (0 UL) An Extensible and Lightweight Modular Ontology for Programming EducationGrevisse, Christian ; Botev, Jean ; Rothkugel, Steffen in Advances in Computing - 12th Colombian Conference, CCC 2017, Cali, Colombia, September 19-22, 2017, Proceedings (2017, August)Semantic web technologies such as ontologies can foster the reusability of learning material by introducing common sets of concepts for annotation purposes. However, suggesting learning material from an ... [more ▼]Semantic web technologies such as ontologies can foster the reusability of learning material by introducing common sets of concepts for annotation purposes. However, suggesting learning material from an open, heterogeneous corpus is a nontrivial problem. In this paper, we propose an extensible and lightweight modular ontology for programming education. Its main purpose is to integrate annotated learning material related to programming into an IDE such as Eclipse. Our ontology is based on a modular architecture, which is extensible with respect to different programming languages. Aligning language-specific concepts with user-specific tags allows us to suggest learning resources for code elements in a fine-grained and cross-curricular way. Our concrete implementation establishes relations between learning aspects in Java or C code and annotated resources such as articles on online question-and-answer sites. [less ▲]Detailed reference viewed: 46 (12 UL) Indoor localization using ambient FM radio RSS fingerprinting: A 9-month studyPopleteev, Andrei in 17th IEEE International Conference on Computer and Information Technology (CIT-2017) (2017, August)While indoor positioning systems aspire for higher accuracy, their coverage is typically limited to buildings with dedicated hardware. A possible alternative is offered by infrastructure-free positioning ... [more ▼]While indoor positioning systems aspire for higher accuracy, their coverage is typically limited to buildings with dedicated hardware. A possible alternative is offered by infrastructure-free positioning methods. In particular, several studies have demonstrated feasibility of indoor positioning using broadcast FM radio signals, which are available in most populated areas worldwide. However, previous work provides little information about long-term performance of FM-based indoor localization. This paper presents a longitudinal study of FM indoor positioning based on received signal strength (RSS) fingerprinting. We evaluate system's performance on a large dataset of real-world FM signals, systematically collected in several large-scale multi-floor testbeds over the course of 9 months. We also investigate the impact of different classifiers, training schedules and fingerprint sizes on localization accuracy. The results demonstrate that well-trained FM-based system can provide reliable indoor positioning even several months after deployment. [less ▲]Detailed reference viewed: 5 (0 UL) What do we need to say about a design method?Gericke, Kilian ; Eckert, Claudia; Stacey, Martinin Proceedings of the 21st International Conference on Engineering Design (2017, August)Method development is one of the raisons d’etre of engineering design research and method uptake by industry is perceived as an important success criterion. This paper argues that one of the problems with ... [more ▼]Method development is one of the raisons d’etre of engineering design research and method uptake by industry is perceived as an important success criterion. This paper argues that one of the problems with methods is the lack of clarity about what is actually proposed to industry and the academic community when a new method is put forward, in terms of how detailed, strict, precise and rigorous the method is and what it can deliver. This paper puts the concept of method in the context of related concepts and proposes a multi-level model of the elements of a method to argue that a contribution on each of these levels can be of value and that the introduction of methods can fail on each of these levels. Implications thereof for industry and academia are discussed, concluding that a clear description of methods and their intended use is important for enabling proper validation of each of the method’s elements and for communicating methods to academia and industry. [less ▲]Detailed reference viewed: 31 (3 UL) Training Very Deep Networks via Residual Learning with Stochastic Input Shortcut ConnectionsOyedotun, Oyebade ; Shabayek, Abd El Rahman ; Aouada, Djamila et alin 24th International Conference on Neural Information Processing, Guangzhou, China, November 14–18, 2017 (2017, July 31)Many works have posited the benefit of depth in deep networks. However, one of the problems encountered in the training of very deep networks is feature reuse; that is, features are ’diluted’ as they are ... [more ▼]Many works have posited the benefit of depth in deep networks. However, one of the problems encountered in the training of very deep networks is feature reuse; that is, features are ’diluted’ as they are forward propagated through the model. Hence, later network layers receive less informative signals about the input data, consequently making training less effective. In this work, we address the problem of feature reuse by taking inspiration from an earlier work which employed residual learning for alleviating the problem of feature reuse. We propose a modification of residual learning for training very deep networks to realize improved generalization performance; for this, we allow stochastic shortcut connections of identity mappings from the input to hidden layers.We perform extensive experiments using the USPS and MNIST datasets. On the USPS dataset, we achieve an error rate of 2.69% without employing any form of data augmentation (or manipulation). On the MNIST dataset, we reach a comparable state-of-the-art error rate of 0.52%. Particularly, these results are achieved without employing any explicit regularization technique. [less ▲]Detailed reference viewed: 75 (30 UL) Development of a new push test for Eurocode 4Hicks, Stephen; Ciutina, Adrian; Odenbreit, Christoph in 8th International Conference on Composite Construction in Steel and Concrete (2017, July 30)The standard push test specimen in the current version of Eurocode 4 does not provide any information on what modifications should be made when profiled steel sheeting is introduced. Whilst the lack of ... [more ▼]The standard push test specimen in the current version of Eurocode 4 does not provide any information on what modifications should be made when profiled steel sheeting is introduced. Whilst the lack of information was intended to encourage innovation, this has sometimes lead to test results implying that stud connectors possess a lower resistance and ductility than assumed in current Standards. From full-scale beam and companion push tests in Europe, it has been shown that modifying the push test through the introduction of a normal force to the face of the test slabs provides comparable load-slip performance to that encountered within a beam. Within the work programme for developing the second generation of Eurocodes, this paper presents part of the background to Sub-task 1 of SC4.T3, whose aim is to develop an improved push test for Eurocode 4 when stud connectors are welded within profiled steel sheeting. [less ▲]Detailed reference viewed: 18 (2 UL) Area exploration with a swarm of UAVs combining deterministic Chaotic Ant Colony Mobility with position MPCRosalie, Martin ; Dentler, Jan Eric ; Danoy, Grégoire et alin 2017 International Conference on Unmanned Aircraft Systems (ICUAS) (2017, July 27)The recent advances in Unmanned Aerial Vehicles (UAVs) technology permit to develop new usages for them. One of the current challenges is to operate UAVs as an autonomous swarm. In this domain we already ... [more ▼]The recent advances in Unmanned Aerial Vehicles (UAVs) technology permit to develop new usages for them. One of the current challenges is to operate UAVs as an autonomous swarm. In this domain we already proposed a new mobility model using Ant Colony Algorithms combined with chaotic dynamics (CACOC) to enhance the coverage of an area by a swarm of UAVs. In this paper we propose to consider this mobility model as waypoints for real UAVs. A control model of the UAVs is deployed to test the efficiency of the coverage of an area by the swarm. We have tested our approach in a realistic robotics simulator (V-Rep) which is connected with ROS. We compare the performance in terms of coverage using several metrics to ensure that this mobility model is efficient for real UAVs. [less ▲]Detailed reference viewed: 68 (12 UL) Changing (multi-)cultural contexts through the lense of the receiving societyMurdock, Elke ; Albert, Isabelle ; Ferring, Dieter in 9th European IACCP Conference - Program and the book of abstracts (2017, July 17)Using the natural laboratory of Luxembourg with a foreign population of 47% as case study example, we outline the diversification of diversity. The immigrant population is increasingly heterogeneous in ... [more ▼]Using the natural laboratory of Luxembourg with a foreign population of 47% as case study example, we outline the diversification of diversity. The immigrant population is increasingly heterogeneous in terms of countries of origin, length of stay/ generation status, economic participation and acculturation choices. Who is a Luxembourger is increasingly difficult to define and minority or majority becomes ever more fluid. Empirical findings concerning the attitude of the receiving society towards multiculturalism will be presented including implications for national identification. We aim to shed light on inter-individual differences in terms of views on immigration among the receiving society, also taking into consideration regional demographic differences. We draw on two different samples, one from the center of Luxembourg (N = 507), where the native population is in the minority and a more regionally diversified sample (N = 238). Similarities and differences will be highlighted and implications discussed. [less ▲]Detailed reference viewed: 23 (7 UL) Risk-averse Stochastic Nonlinear Model Predictive Control for Real-time Safety-critical SystemsSajadi Alamdari, Seyed Amin ; Voos, Holger ; Darouach, Mohamedin The 20th World Congress of the International Federation of Automatic Control, IFAC 2017 World Congress, Toulouse, France, 9-14 July 2017 (2017, July 11)Stochastic nonlinear model predictive control has been developed to systematically find an optimal decision with the aim of performance improvement in dynamical systems that involve uncertainties. However ... [more ▼]Stochastic nonlinear model predictive control has been developed to systematically find an optimal decision with the aim of performance improvement in dynamical systems that involve uncertainties. However, most of the current methods are risk-neutral for safety-critical systems and depend on computationally expensive algorithms. This paper investigates on the risk-averse optimal stochastic nonlinear control subject to real-time safety-critical systems. In order to achieve a computationally tractable design and integrate knowledge about the uncertainties, bounded trajectories generated to quantify the uncertainties. The proposed controller considers these scenarios in a risk-sensitive manner. A certainty equivalent nonlinear model predictive control based on minimum principle is reformulated to optimise nominal cost and expected value of future recourse actions. The capability of proposed method in terms of states regulations, constraints fulfilment, and real-time implementation is demonstrated for a semi-autonomous ecological advanced driver assistance system specified for battery electric vehicles. This system plans for a safe and energy-efficient cruising velocity profile autonomously. [less ▲]Detailed reference viewed: 35 (3 UL) Knowledge-based Consistency Index for Fuzzy Pairwise Comparison MatricesKubler, Sylvain ; Derigent, William; Voisin, Alexandre et alin Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices (2017, July 10)Abstract—Fuzzy AHP is today one of the most used Multiple Criteria Decision-Making (MCDM) techniques. The main argument to introduce fuzzy set theory within AHP lies in its ability to handle uncertainty ... [more ▼]Abstract—Fuzzy AHP is today one of the most used Multiple Criteria Decision-Making (MCDM) techniques. The main argument to introduce fuzzy set theory within AHP lies in its ability to handle uncertainty and vagueness arising from decision makers (when performing pairwise comparisons between a set of criteria/alternatives). As humans usually reason with granular information rather than precise one, such pairwise comparisons may contain some degree of inconsistency that needs to be properly tackled to guarantee the relevance of the result/ranking. Over the last decades, several consistency indexes designed for fuzzy pairwise comparison matrices (FPCMs) were proposed, as will be discussed in this article. However, for some decision theory specialists, it appears that most of these indexes fail to be properly “axiomatically” founded, thus leading to misleading results. To overcome this, a new index, referred to as KCI (Knowledge-based Consistency Index) is introduced in this paper, and later compared with an existing index that is axiomatically well founded. The comparison results show that (i) both indexes perform similarly from a consistency measurement perspective, but (ii) KCI contributes to significantly reduce the computation time, which can save expert’s time in some MCDM problems. [less ▲]Detailed reference viewed: 14 (1 UL) Testing the discrimination hypothesis for female self employment migrants in the UKConstantinidis, Christina ; Fletcher, Denise Elaine ; Joxhe, Majlinda in IAFFE (Ed.) Books of Abstracts (2017, July 01)We propose a comparative analysis of migrants in both sectors (employment and self-employment) exploring the gender earning discrimination hypothesis. Using individual micro data from the British ... [more ▼]We propose a comparative analysis of migrants in both sectors (employment and self-employment) exploring the gender earning discrimination hypothesis. Using individual micro data from the British Household Panel Survey (1991-2008), we estimate wage equations for employed and self-employed migrants and find that, contrary to our expectations, the average earnings gap in self-employment is almost double compared to the employment sector. This finding reveals that self-employment leads migrant women to an even more precarious and vulnerable position in terms of financial means and economic power. In addition, we explore the determinants of these gaps using the econometric procedure of the decomposition (the Blinder-Oaxaca) model. We find that the variables that explain the gender gap in the employment sector are mostly observable individual characteristics like education or migration duration, confirming the human capital theory, whereas in the self-employment sector, this gap is more due to unobservable individual characteristics. Through our work, we show that including the gender perspective into migration analysis has implications for policy makers enabling them to evaluate these processes from a more social (rather than individualistic) dimension. [less ▲]Detailed reference viewed: 19 (1 UL) The role of humour in intimate intercultural relationshipsAleksic, Gabrijela in The 9th European IACPP Conference (2017, July)Humour is vital for social life. We explored the role of humour in intimate intercultural relationships by: (1) interviewing intercultural couples and (2) analysing the videos of international street ... [more ▼]Humour is vital for social life. We explored the role of humour in intimate intercultural relationships by: (1) interviewing intercultural couples and (2) analysing the videos of international street performances of a conflictual intercultural clown couple. The interviews involved 15 intercultural couples. The video analysis was based on one clown couple selected from an initial sample. Preliminary results supported the interdisciplinary theories explaining the relationships between: (1) humour and embarrassment and (2) humour and hatred. Humour and ridicule are main elements of embarrassment which is important for maintaining social order. The presence of an audience in embarrassing situations is necessary. ‘Laughing with’ or ‘laughing at’ was explored through three main types of embarrassing situations: faux pas, sticky situations and being the centre of attention. The third type was found to be the most common among intercultural couples, especially in situations of linguistic misunderstandings. Humour was the most used remedial strategy, along with apologies, excuses and justifications. Embarrassment was related to shame, the master-emotion appearing when interpersonal or group relations are broken. Shame could transform into rage and humour can provide tools for expressing it while also supporting the feelings of pleasure. Hatred was present in the forms of stereotypes against the partner’s culture through jokes. We discuss humour, embarrassment and hatred from micro to macro level to understand how they can protect the social order, find the pleasure in damaging the same and what we can do about it. [less ▲]Detailed reference viewed: 11 (2 UL) Power Allocation for In-Band Full-Duplex Self-BackhaulingLagunas, Eva ; Lei, Lei ; Maleki, Sina et alin International Conference on Telecommunications and Signal Processing (TSP), Barcelona, Spain, July 2017 (2017, July)Detailed reference viewed: 37 (8 UL) Towards Semantic Interoperability in an Open IoT Ecosystem for Connected Vehicle ServicesKolbe, Niklas ; Kubler, Sylvain ; Robert, Jérémy et alin 2017 IEEE Global Internet of Things Summit (GIoTS) Proceedings (2017, July)A present challenge in today’s Internet of Things (IoT) ecosystem is to enable interoperability across hetero- geneous systems and service providers. Restricted access to data sources and services limits ... [more ▼]A present challenge in today’s Internet of Things (IoT) ecosystem is to enable interoperability across hetero- geneous systems and service providers. Restricted access to data sources and services limits the capabilities of a smart city to improve social, environmental and economic aspects. Interoperability in the IoT is concerned with both, messaging interfaces and semantic understanding of heterogeneous data. In this paper, the first building blocks of an emerging open IoT ecosystem developed at the EU level are presented. Se- mantic web technologies are applied to the existing messaging components to support and improve semantic interoperability. The approach is demonstrated with a proof-of-concept for connected vehicle services in a smart city setting. [less ▲]Detailed reference viewed: 69 (1 UL) Analyzing Complex Data in Motion at Scale with Temporal GraphsHartmann, Thomas ; Fouquet, François ; Jimenez, Matthieu et alin Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering (2017, July)Modern analytics solutions succeed to understand and predict phenomenons in a large diversity of software systems, from social networks to Internet-of-Things platforms. This success challenges analytics ... [more ▼]Modern analytics solutions succeed to understand and predict phenomenons in a large diversity of software systems, from social networks to Internet-of-Things platforms. This success challenges analytics algorithms to deal with more and more complex data, which can be structured as graphs and evolve over time. However, the underlying data storage systems that support large-scale data analytics, such as time-series or graph databases, fail to accommodate both dimensions, which limits the integration of more advanced analysis taking into account the history of complex graphs, for example. This paper therefore introduces a formal and practical definition of temporal graphs. Temporal graphs pro- vide a compact representation of time-evolving graphs that can be used to analyze complex data in motion. In particular, we demonstrate with our open-source implementation, named GREYCAT, that the performance of temporal graphs allows analytics solutions to deal with rapidly evolving large-scale graphs. [less ▲]Detailed reference viewed: 40 (3 UL) Numerical Check of the Meyerhof Bearing Capacity Equation for Shallow FoundationsVan Baars, Stefan in Shehata, Hany; Rashed, Youssef (Eds.) Congress and Exhibition on Sustainable Civil Infrastructures (2017, July)In 1920 Prandtl published an analytical solution for the bearing capacity of a strip load on a weightless infinite half-space. This solution was extended with a surrounding surcharge by Reissner and with ... [more ▼]In 1920 Prandtl published an analytical solution for the bearing capacity of a strip load on a weightless infinite half-space. This solution was extended with a surrounding surcharge by Reissner and with the soil weight by Keverling Buisman. It was Terzaghi who wrote this with three separate bearing capacity factors for the cohesion, surcharge and soil-weight. Meyerhof extended this to the equation which is nowadays used; with shape and inclination factors. He also proposed equations for the inclination factors, based on his own laboratory experiments. Since then, several people proposed updated equations for the soil-weight bearing capacity factor, and also for the shape and inclination factors. The common idea is that failure of a footing occurs in all cases with a Prandtl-wedge failure mechanism. In order to check the failure mechanisms and the currently used equations for the bearing capacity factors and shape factors, a large number of finite element calculations of strip and circular footings have been made. These calculations proof that for some cases there are also a few other failure mechanisms possible. Also the currently used bearing capacity factors and shape factors are not correct. In fact, for footings on a soil with a higher friction angle, all three bearing capacity factors and all three shape factors can be much lower than the currently used values. This means that the currently used equations for the soil-weight bearing capacity factors and the shape factors are inaccurate and unsafe. Therefore, based on the finite element calculations, new equations have been presented in this paper. [less ▲]Detailed reference viewed: 28 (2 UL) An LMI-Based H_infty Discrete-Time Nonlinear State Observer Design for an Anaerobic Digestion ModelChaib Draa, Khadidja ; Voos, Holger in World Congress of the International Federation of Automatic Control, Toulouse 9-14 July 2017 (2017, July)This paper is devoted to the design of an H1 discrete-time nonlinear state observer for an anaerobic digestion model. Indeed, the designed observer can be used for di erent class of systems, mainly linear ... [more ▼]This paper is devoted to the design of an H1 discrete-time nonlinear state observer for an anaerobic digestion model. Indeed, the designed observer can be used for di erent class of systems, mainly linear systems, LPV systems with known and bounded parameters, and nonlinear Lipschitz systems. We use an LMI approach to guarantee the H1 asymptotic stability of the estimation error despite the disturbances a ecting the system dynamics and measurements. The synthesised LMI is relaxed due to the inclusion of additional decision variables which enhance its feasibility. This was possible due to the use of a suitable reformulation of the Young's inequality. Simulation results are given to show the robustness of the designed observer. [less ▲]Detailed reference viewed: 12 (0 UL) LMI-Based H_infty Nonlinear State Observer Design for Anaerobic Digestion ModelChaib Draa, Khadidja ; Voos, Holger ; Alma, Marouane et alin IEEE Mediterranean Conference on Control and Automation, Valletta 3-6 July 2017 (2017, July)This note deals with the design of an $H_{\infty}$ nonlinear state observer for the anaerobic digestion model. Positively, the designed observer is an unified one that can be used for different class of ... [more ▼]This note deals with the design of an $H_{\infty}$ nonlinear state observer for the anaerobic digestion model. Positively, the designed observer is an unified one that can be used for different class of systems, mainly linear systems, Linear Parameter Varying (LPV) systems with known and bounded parameters, and nonlinear Lipschitz systems. Applying the Lyapunov theory and theH¥ criterion, Linear Matrix Inequality (LMI) condition is synthesised and solved to obtain the designed observer gains. The novelty of our work consists in the relaxation of the synthesized LMI condition through the inclusion of additional decision variables. This was possible due to the use of a suitable reformulation of the Young’s inequality. Stability, effectiveness and potency of the theoretical results are confirmed by the simulation results. [less ▲]Detailed reference viewed: 7 (0 UL) Spatial PAPR Reduction in Symbol-level Precoding for the Multi-beam Satellite DownlinkSpano, Danilo ; Alodeh, Maha ; Chatzinotas, Symeon et alin IEEE SPAWC 2017 (2017, July)In this work, a novel symbol-level precoding scheme is proposed, for managing the multi-user interference in the forward downlink channel of a multi-beam satellite system. Besides exploiting the ... [more ▼]In this work, a novel symbol-level precoding scheme is proposed, for managing the multi-user interference in the forward downlink channel of a multi-beam satellite system. Besides exploiting the constructive interference effect, the proposed scheme aims at improving the robustness of the transmitted signals to the non-linear distortions of practical satellite systems. This is done by reducing the imbalances between the instantaneous power transmitted by the multiple antennas, which are detrimental in non-linear systems. More specifically, this work proposes a symbol-level precoding scheme performing the minimization of the spatial peak-to-average power ratio, under Quality-of-Service constraints. An iterative algorithm is proposed to solve the related optimization problem. Numerical results are presented to assess the performance of the proposed scheme, which outperforms the state of the art symbol-level precoding techniques in terms of spatial peak-to-average power ratio across the transmitting antennas. [less ▲]Detailed reference viewed: 83 (13 UL) Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning ComponentsKolbe, Niklas ; Zaslavsky, Arkady; Kubler, Sylvain et alin Modeling and Using Context (2017, July)Theimportanceofsystem-levelcontext-andsituationaware- ness increases with the growth of the Internet of Things (IoT). This paper proposes an integrated approach to situation awareness by providing a ... [more ▼]Theimportanceofsystem-levelcontext-andsituationaware- ness increases with the growth of the Internet of Things (IoT). This paper proposes an integrated approach to situation awareness by providing a semantically rich situation model together with reliable situation infer- ence based on Context Spaces Theory (CST) and Situation Theory (ST). The paper discusses benefits of integrating the proposed situation aware- ness framework with knowledge base and efficient reasoning techniques taking into account uncertainty and incomplete knowledge about situa- tions. The paper discusses advantages and impact of proposed context adaptation in dynamic IoT environments. Practical issues of two-way mapping between IoT messaging standards and CST are also discussed. [less ▲]Detailed reference viewed: 22 (0 UL) Proceedings of International Conference on Software and Systems Process (ICSSP)Kuhrmann, Marco; Diebold, Philipp; Münch, Jürgen et alin Hybrid software and system development in practice: Waterfall, scrum, and beyond (2017, July)Software and system development faces numerous challenges of rapidly changing markets. To address such challenges, companies and projects design and adopt specific development approaches by combining well ... [more ▼]Software and system development faces numerous challenges of rapidly changing markets. To address such challenges, companies and projects design and adopt specific development approaches by combining well-structured comprehensive methods and flexible agile practices. Yet, the number of methods and practices is large, and available studies argue that the actual process composition is carried out in a fairly ad-hoc manner. The present paper reports on a survey on hybrid software development approaches. We study which approaches are used in practice, how different approaches are combined, and what contextual factors influence the use and combination of hybrid software development approaches. Our results from 69 study participants show a variety of development approaches used and combined in practice. We show that most combinations follow a pattern in which a traditional process model serves as framework in which several fine-grained (agile) practices are plugged in. We further show that hybrid software development approaches are independent from the company size and external triggers. We conclude that such approaches are the results of a natural process evolution, which is mainly driven by experience, learning, and pragmatism. [less ▲]Detailed reference viewed: 42 (11 UL) Fast Stochastic Non-linear Model Predictive Control for Electric Vehicle Advanced Driver Assistance SystemsSajadi Alamdari, Seyed Amin ; Voos, Holger ; Darouach, Mohamedin 13th IEEE International Conference on Vehicular Electronics and Safety, Vienna, Austria 27-28 June 2017 (2017, June 27)Semi-autonomous driving assistance systems have a high potential to improve the safety and efficiency of the battery electric vehicles that are enduring limited cruising range. This paper presents an ... [more ▼]Semi-autonomous driving assistance systems have a high potential to improve the safety and efficiency of the battery electric vehicles that are enduring limited cruising range. This paper presents an ecologically advanced driver assistance system to extend the functionality of the adaptive cruise control system. A real-time stochastic non-linear model predictive controller with probabilistic constraints is presented to compute on-line the safe and energy-efficient cruising velocity profile. The individual chance-constraint is reformulated into a convex second-order cone constraint which is robust for a general class of probability distributions. Finally, the performance of proposed approach in terms of states regulation, constraints fulfilment, and energy efficiency is evaluated on a battery electric vehicle. [less ▲]Detailed reference viewed: 32 (0 UL) How Mobile Phone Handovers reflect Urban Mobility: A Simulation StudyDerrmann, Thierry ; Frank, Raphaël ; Engel, Thomas et alin Derrmann, Thierry; Frank, Raphaël; Engel, Thomas (Eds.) et al How Mobile Phone Handovers reflect Urban Mobility: A Simulation Study (2017, June 26)Detailed reference viewed: 40 (5 UL) Keynote: Cultural heritage, musical diversity and functionality of music educationSagrillo, Damien in Andrea Kárpáti (Ed.) New landscapes in science and art - in focus: teaching Visual Culture. Book of Proceedings (2017, June 23)cf. attachmentDetailed reference viewed: 5 (0 UL) ASIMUT project: Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition TechniquesBouvry, Pascal ; Chaumette, Serge; Danoy, Grégoire et alin DroNet'17 Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications (2017, June 23)This document summarizes the activities and results of the ASIMUT project (Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques) carried out by the consortium ... [more ▼]This document summarizes the activities and results of the ASIMUT project (Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques) carried out by the consortium composed of Thales, Fraunhofer IOSB, Fly-n-Sense, University of Bordeaux and University of Luxembourg. Funded by the European Defence Agency (EDA), the objectives of the ASIMUT project are to design, implement and validate algorithms that will allow the efficient usage of autonomous swarms of Unmanned Aerial Vehicles (UAVs) for surveillance missions. [less ▲]Detailed reference viewed: 34 (6 UL) Choosing the Right Test Automation Tool: a Grey Literature Review of Practitioner SourcesRaulamo-Jurvanen, Päivi; Mäntylä, Mika; Garousi, Vahid in Choosing the Right Test Automation Tool: a Grey Literature Review of Practitioner Sources (2017, June 15)Background: Choosing the right software test automation tool is not trivial, and recent industrial surveys indicate lack of right tools as the main obstacle to test automation. Aim: In this paper, we ... [more ▼]Background: Choosing the right software test automation tool is not trivial, and recent industrial surveys indicate lack of right tools as the main obstacle to test automation. Aim: In this paper, we study how practitioners tackle the problem of choosing the right test automation tool. Method: We synthesize the “voice” of the practitioners with a grey literature review originating from 53 different companies. The industry experts behind the sources had roles such as “Software Test Automation Architect”, and “Principal Software Engineer”. Results: Common consensus about the important criteria exists but those are not applied systematically. We summarize the scattered steps from individual sources by presenting a comprehensive process for tool evaluation with 12 steps and a total of 14 different criteria for choosing the right tool. Conclusions: The practitioners tend to have general interest in and be influenced by related grey literature as about 78% of our sources had at least 20 backlinks (a reference comparable to a citation) while the variation was between 3 and 759 backlinks. There is a plethora of different software testing tools available, yet the practitioners seem to prefer and adopt the widely known and used tools. The study helps to identify the potential pitfalls of existing processes and opportunities for comprehensive tool evaluation. [less ▲]Detailed reference viewed: 76 (4 UL) Industry-academia collaborations in software engineering: an empirical analysis of challenges, patterns and anti-patterns in research projectsGarousi, Vahid ; Felderer, Michael; Fernandes, João et alin Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (2017, June 15)Research collaboration between industry and academia supports improvement and innovation in industry and helps to ensure industrial relevance in academic research. However, many researchers and ... [more ▼]Research collaboration between industry and academia supports improvement and innovation in industry and helps to ensure industrial relevance in academic research. However, many researchers and practitioners believe that the level of joint industry-academia collaboration (IAC) in software engineering (SE) research is still relatively low, compared to the amount of activity in each of the two communities. The goal of the empirical study reported in this paper is to exploratory characterize the state of IAC with respect to a set of challenges, patterns and anti-patterns identified by a recent Systematic Literature Review study. To address the above goal, we gathered the opinions of researchers and practitioners w.r.t. their experiences in IAC projects. Our dataset includes 47 opinion data points related to a large set of projects conducted in 10 different countries. We aim to contribute to the body of evidence in the area of IAC, for the benefit of researchers and practitioners in conducting future successful IAC projects in SE. As an output, the study presents a set of empirical findings and evidence-based recommendations to increase the success of IAC projects. [less ▲]Detailed reference viewed: 16 (0 UL) What industry wants from academia in software testing? Hearing practitioners’ opinionsGarousi, Vahid ; Felderer, Michael; Kuhrmann, Marco et alin Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (2017, June 15)The level of industry-academia collaboration (IAC) in software engineering in general and in software testing in particular is quite low. Many researchers and practitioners are not collaborating with the ... [more ▼]The level of industry-academia collaboration (IAC) in software engineering in general and in software testing in particular is quite low. Many researchers and practitioners are not collaborating with the “other side” to solve industrial problems. To shed light on the above issue and to characterize precisely what industry wants from academia in software testing, we solicited practitioners’ opinions on their challenges in different testing activities and also the particularly relevant topics that they want the research community to work on. This short paper aims to draw the community’s attention to the important issue of strengthening IAC with the hope of more IAC in software testing in the areas of most importance to the industry. [less ▲]Detailed reference viewed: 20 (3 UL) Side-Channel Attacks meet Secure Network ProtocolsBiryukov, Alex ; Dinu, Dumitru-Daniel ; Le Corre, Yann in Gollmann, Dieter; Miyaji, Atsuko; Kikuchi, Hiroaki (Eds.) Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017. Proceedings (2017, June)Side-channel attacks are powerful tools for breaking systems that implement cryptographic algorithms. The Advanced Encryption Standard (AES) is widely used to secure data, including the communication ... [more ▼]Side-channel attacks are powerful tools for breaking systems that implement cryptographic algorithms. The Advanced Encryption Standard (AES) is widely used to secure data, including the communication within various network protocols. Major cryptographic libraries such as OpenSSL or ARM mbed TLS include at least one implementation of the AES. In this paper, we show that most implementations of the AES present in popular open-source cryptographic libraries are vulnerable to side-channel attacks, even in a network protocol scenario when the attacker has limited control of the input. We present an algorithm for symbolic processing of the AES state for any input configuration where several input bytes are variable and known, while the rest are fixed and unknown as is the case in most secure network protocols. Then, we classify all possible inputs into 25 independent evaluation cases depending on the number of bytes controlled by attacker and the number of rounds that must be attacked to recover the master key. Finally, we describe an optimal algorithm that can be used to recover the master key using Correlation Power Analysis (CPA) attacks. Our experimental results raise awareness of the insecurity of unprotected implementations of the AES used in network protocol stacks. [less ▲]Detailed reference viewed: 55 (21 UL) The pragmatic oddity in a norm-based semanticsParent, Xavier ; van der Torre, Leon in Governatori, Guido (Ed.) 16th International Conference on Artificial Intelligence & Law (ICAIL-17) (2017, June)The ideal worlds of a possible worlds semantics may satisfy both a primary obligation and an associated secondary obligation, for example the obligation to keep a promise and the obligation to apologise ... [more ▼]The ideal worlds of a possible worlds semantics may satisfy both a primary obligation and an associated secondary obligation, for example the obligation to keep a promise and the obligation to apologise for not keeping it. This is known as the pragmatic oddity introduced by Prakken and Sergot. We argue that an adequate treatment of the pragmatic oddity within a norm-based semantics can be obtained, by not allowing primary and secondary obligations to aggregate, because they are obligations of a di erent kind. On the basis of this conceptual analysis, we introduce two logics, depending on the stance taken on the representation of normative con icts, and we present sound and complete proof systems for these logics. We then give a formal analysis, discuss extensions, and highlight various topics for further research. [less ▲]Detailed reference viewed: 62 (8 UL) Silicone sealants: A Finite Fracture Mechanics failure model for non-linear materialsRosendahl, Philipp L.; Staudt, Yves ; Odenbreit, Christoph et alin 14th International Conference on Fracture (ICF 14) (2017, June)A finite fracture mechanics failure model for hyperelastic silicone sealants is presented. The model is in very good agreement with simple shear tests of different adhesive joint geometries.Detailed reference viewed: 23 (1 UL) Experience-based guidelines for effective and efficient data extraction in systematic reviews in software engineeringGarousi, Vahid ; Felderer, Michaelin Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (2017, June)To systematically collect evidence and to structure a given area in software engineering (SE), Systematic Literature Reviews (SLR) and Systematic Mapping (SM) studies have become common. Data extraction ... [more ▼]To systematically collect evidence and to structure a given area in software engineering (SE), Systematic Literature Reviews (SLR) and Systematic Mapping (SM) studies have become common. Data extraction is one of the main phases (activities) when conducting an SM or an SLR, whose objective is to extract required data from the primary studies and to accurately record the information researchers need to answer the questions of the SM/SLR study. Based on experience in a large number of SM/SLR studies, we and many other researchers have found the data extraction in SLRs to be time consuming and error-prone, thus raising the real need for heuristics and guidelines for effective and efficient data extraction in these studies, especially to be learnt by junior and young researchers. As a ‘guideline’ paper, this paper contributes a synthesized list of challenges usually faced during SLRs’ data extraction phase and the corresponding solutions (guidelines). For our synthesis, we consider two data sources: (1) the pool of 16 SLR studies in which the authors have been involved in, as well as (2) a review of challenges and guidelines in the existing literature. Our experience in utilizing the presented guidelines in the near past have helped our junior colleagues to conduct data extractions more effectively and efficiently. [less ▲]Detailed reference viewed: 42 (7 UL) On idempotent discrete uninormsCouceiro, Miguel; Devillet, Jimmy ; Marichal, Jean-Luc in De Baets, Bernard; Torra, Vicenç; Mesiar, Radko (Eds.) Aggregation Functions in Theory and in Practice (2017, June)In this paper we provide two axiomatizations of the class of idempotent discrete uninorms as conservative binary operations, where an operation is conservative if it always outputs one of its input values ... [more ▼]In this paper we provide two axiomatizations of the class of idempotent discrete uninorms as conservative binary operations, where an operation is conservative if it always outputs one of its input values. More precisely we first show that the idempotent discrete uninorms are exactly those operations that are conservative, symmetric, and nondecreasing in each variable. Then we show that, in this characterization, symmetry can be replaced with both bisymmetry and existence of a neutral element. [less ▲]Detailed reference viewed: 69 (16 UL) Spectrum Sharing in Hybrid Terrestrial-Satellite Backhaul Networks in the Ka BandArtiga, Xavier; Vázquez, Miguel Ángel; Pérez-Neira, Ana et alin European Conference on Networks and Communications (EuCNC), June 2017 (2017, June)Detailed reference viewed: 39 (0 UL) An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program AssumptionTitcheu Chekam, Thierry ; Papadakis, Mike ; Le Traon, Yves et alin International Conference on Software Engineering (ICSE 2017) (2017, May 28)Many studies suggest using coverage concepts, such as branch coverage, as the starting point of testing, while others as the most prominent test quality indicator. Yet the relationship between coverage ... [more ▼]Many studies suggest using coverage concepts, such as branch coverage, as the starting point of testing, while others as the most prominent test quality indicator. Yet the relationship between coverage and fault-revelation remains unknown, yielding uncertainty and controversy. Most previous studies rely on the Clean Program Assumption, that a test suite will obtain similar coverage for both faulty and fixed (‘clean’) program versions. This assumption may appear intuitive, especially for bugs that denote small semantic deviations. However, we present evidence that the Clean Program Assumption does not always hold, thereby raising a critical threat to the validity of previous results. We then conducted a study using a robust experimental methodology that avoids this threat to validity, from which our primary finding is that strong mutation testing has the highest fault revelation of four widely-used criteria. Our findings also revealed that fault revelation starts to increase significantly only once relatively high levels of coverage are attained. [less ▲]Detailed reference viewed: 173 (13 UL) PETrA: a software-based tool for estimating the energy profile of Android applicationsDi Nucci, Dario; Palomba, Fabio; Prota, Antonio et alin 39th International Conference on Software Engineering (ICSE) 2017 (2017, May 24)Energy efficiency is a vital characteristic of any mobile application, and indeed is becoming an important factor for user satisfaction. For this reason, in recent years several approaches and tools for ... [more ▼]Energy efficiency is a vital characteristic of any mobile application, and indeed is becoming an important factor for user satisfaction. For this reason, in recent years several approaches and tools for measuring the energy consumption of mobile devices have been proposed. Hardware-based solutions are highly precise, but at the same time they require costly hardware toolkits. Model-based techniques require a possibly difficult calibration of the parameters needed to correctly create a model on a specific hardware device. Finally, software-based solutions are easier to use, but they are possibly less precise than hardware-based solution. In this demo, we present PETrA, a novel software-based tool for measuring the energy consumption of Android apps. With respect to other tools, PETrA is compatible with all the smartphones with Android 5.0 or higher, not requiring any device specific energy profile. We also provide evidence that our tool is able to perform similarly to hardware-based solutions. [less ▲]Detailed reference viewed: 21 (1 UL) Java Unit Testing Tool Competition — Fifth RoundPanichella, Annibale ; Urko, Ruedain 10th International Workshop on Search- Based Software Testing (SBST) 2017 (2017, May 22)After four successful JUnit tool competitions, we report on the achievements of a new Java Unit Testing Tool Competition. This 5th contest introduces statistical analyses in the benchmark infrastructure ... [more ▼]After four successful JUnit tool competitions, we report on the achievements of a new Java Unit Testing Tool Competition. This 5th contest introduces statistical analyses in the benchmark infrastructure and has been validated with significance against the results of the previous 4th edition. Overall, the competition evaluates four automated JUnit testing tools taking as baseline human written test cases from real projects. The paper details the modifications performed to the methodology and provides full results of the competition. [less ▲]Detailed reference viewed: 17 (0 UL) Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android MalwareHurier, Médéric ; Suarez-Tangil, Guillermo; Dash, Santanu Kumar et alin MSR 2017 (2017, May 21)Android malware is now pervasive and evolving rapidly. Thousands of malware samples are discovered every day with new models of attacks. The growth of these threats has come hand in hand with the ... [more ▼]Android malware is now pervasive and evolving rapidly. Thousands of malware samples are discovered every day with new models of attacks. The growth of these threats has come hand in hand with the proliferation of collective repositories sharing the latest specimens. Having access to a large number of samples opens new research directions aiming at efficiently vetting apps. However, automatically inferring a reference ground-truth from those repositories is not straightforward and can inadvertently lead to unforeseen misconceptions. On the one hand, samples are often mis-labeled as different parties use distinct naming schemes for the same sample. On the other hand, samples are frequently mis-classified due to conceptual errors made during labeling processes. In this paper, we analyze the associations between all labels given by different vendors and we propose a system called EUPHONY to systematically unify common samples into family groups. The key novelty of our approach is that no a-priori knowledge on malware families is needed. We evaluate our approach using reference datasets and more than 0.4 million additional samples outside of these datasets. Results show that EUPHONY provides competitive performance against the state-of-the-art. [less ▲]Detailed reference viewed: 100 (9 UL) Rule Compilation in Multi-Tenant NetworksBlaiech, Khalil; Hamadi, Salaheddine; Hommes, Stefan et alin Rule Compilation in Multi-Tenant Networks (2017, May 18)Detailed reference viewed: 40 (4 UL) Low Complexity Symbol-Level Design for Linear Precoding SystemsKrivochiza, Jevgenij ; Kalantari, Ashkan ; Chatzinotas, Symeon et alin Heusdens, Richard; Weber, Jos H. (Eds.) PROCEEDINGS of the 2017 Symposium on Information Theory and Signal Processing in the Benelux (2017, May 11)The practical utilization of the symbol-level precoding in MIMO systems is challenging since the implementation of the sophisticated optimization algorithms must be done with reasonable computational ... [more ▼]The practical utilization of the symbol-level precoding in MIMO systems is challenging since the implementation of the sophisticated optimization algorithms must be done with reasonable computational resources. In the real implementation of MIMO precoding systems, the processing time for each set of symbols is a crucial parameter, especially in the high-throughput mode. In this work, a symbol-level optimization algorithm with reduced complexity is devised. Performance of a symbol-level precoder is shown to improve in terms of the processing times per set of symbols. [less ▲]Detailed reference viewed: 81 (31 UL) Discrimination of Angle-Doppler Signatures using Arbitrary Phase Center Motion for MIMO RadarsHammes, Christian ; Nijsure, Yogesh ; Shankar, Bhavani et alin IEEE Radar Conf 2017 (2017, May)A novel Phase Center Motion (PCM) based technique for discriminating angle-Doppler signatures within Multiple-Input-Multiple-Output (MIMO) radars using Frequency Modulated Continuous Wave (FMCW) has been ... [more ▼]A novel Phase Center Motion (PCM) based technique for discriminating angle-Doppler signatures within Multiple-Input-Multiple-Output (MIMO) radars using Frequency Modulated Continuous Wave (FMCW) has been explored in this work. The PCM technique induces angle dependent Doppler shifts in the back-scattered signal, wherein a modified Doppler post processing for FMCW leads to joint angle-Doppler processing. Specifically, we intend to design unique spatialtemporal motion of the phase center on each individual MIMO radar channel in an effort to synthesize nearly orthogonal angle-Doppler signatures. Subsequently, we also develop a MIMO radar receiver design, which would be capable of discriminating between these induced angle-Doppler signatures. The asymptotic investigation provides a Bessel function characteristic. Simulation results demonstrate a significant side-lobe suppression of 8:5 dB for an individual PCM trajectory and 7 dB over distinct PCM trajectories, in an attempt towards realization of nearly orthogonal MIMO radar channels. [less ▲]Detailed reference viewed: 51 (5 UL) Differentially Private Neighborhood-based Recommender SystemsWang, Jun ; Tang, Qiangin IFIP Information Security & Privacy Conference (2017, May)Privacy issues of recommender systems have become a hot topic for the society as such systems are appearing in every corner of our life. In contrast to the fact that many secure multi-party computation ... [more ▼]Privacy issues of recommender systems have become a hot topic for the society as such systems are appearing in every corner of our life. In contrast to the fact that many secure multi-party computation protocols have been proposed to prevent information leakage in the process of recommendation computation, very little has been done to restrict the information leakage from the recommendation results. In this paper, we apply the differential privacy concept to neighborhood-based recommendation methods (NBMs) under a probabilistic framework. We first present a solution, by directly calibrating Laplace noise into the training process, to differential-privately find the maximum a posteriori parameters similarity. Then we connect differential privacy to NBMs by exploiting a recent observation that sampling from the scaled posterior distribution of a Bayesian model results in provably differentially private systems. Our experiments show that both solutions allow promising accuracy with a modest privacy budget, and the second solution yields better accuracy if the sampling asymptotically converges. We also compare our solutions to the recent differentially private matrix factorization (MF) recommender systems, and show that our solutions achieve better accuracy when the privacy budget is reasonably small. This is an interesting result because MF systems often offer better accuracy when differential privacy is not applied. [less ▲]Detailed reference viewed: 44 (6 UL)