References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 305 (4 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 178 (6 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 72 (4 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 187 (19 UL)
Full Text
See detailDas Verhältnis zwischen Hochschule und Wissenschaft in Deutschland: Expansion – Produktion – Kooperation
Dusdal, Jennifer; Oberg, Achim; Powell, Justin J W UL

in DGS (Ed.) Komplexe Dynamiken globaler und lokaler Entwicklungen: Der Verhandlungsband des 39. Kongresses der Deutschen Gesellschaft für Soziologie vom 24.-28. September 2018 an der Georg-August-Universität Göttingen (in press)

Dieser Beitrag rekonstruiert den Einfluss der Hochschulentwicklung und der wissenschaftlichen Kapazitätsbildung auf die wissenschaftliche Wissensproduktion in Deutschland, einem der weltweit stärksten ... [more ▼]

Dieser Beitrag rekonstruiert den Einfluss der Hochschulentwicklung und der wissenschaftlichen Kapazitätsbildung auf die wissenschaftliche Wissensproduktion in Deutschland, einem der weltweit stärksten Produzenten wissenschaftlichen Wissen seit 1900. Folgende Forschungsfragen sollen beantwortet werden: Wie haben institutionalisierte Strukturen, und darin verschiedene Organisationsformen, die langfristige Entwicklung wissenschaftlicher Produktivität beeinflusst und verändert? In welchen organisationalen Netzwerken entwickelt sich aktuell die Wissenschaft weiter? Die Annäherung an den Forschungsgegenstand erfolgt auf der Makroebene anhand von Indikatoren zur Erfassung der globalen Expansion, Kooperation und Produktion der Wissenschaft. Vor dem Hintergrund dieses Untersuchungsrahmens wird dann auf der Mesoebene das Zusammenspiel von Organisationsformen in Deutschland mittels netzwerkanalytischer Verfahren betrachtet. Ziel des Beitrags ist, die Orte und institutionellen Settings wissenschaftlicher Produktion zu identifizieren und anhand ihrer Aufgaben und Ziele voneinander abzugrenzen sowie ihre Beziehungen zueinander herauszuarbeiten. Als theoretische Basis werden neo-institutionalistische Ansätze zur Untersuchung und Erklärung der Expansion des Hochschulwesens und der Wissenschaft und zur Analyse von organisationalen Netzwerken herangezogen. Grundlage der empirischen Analyse bilden Publikationen in peer-reviewed Zeitschriften als Kennzeichen wissenschaftlicher Produktion. [less ▲]

Detailed reference viewed: 39 (3 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 66 (10 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 44 (1 UL)
Full Text
Peer Reviewed
See detailComputational Arithmetic of Modular Forms
Wiese, Gabor UL

in Buyukasik, Engin; Inam, Ilker (Eds.) Notes from the International Autumn School on Computational Number Theory: Izmir Institute of Technology 2017 (in press)

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as ... [more ▼]

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as possible, and to enable the devoted student to implement it over any ring (such that a sufficient linear algebra theory is available in the chosen computer algebra system). The chosen approach is based on group cohomology and along the way the needed tools from homological algebra are provided. [less ▲]

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 53 (0 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 51 (0 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 129 (6 UL)
Full Text
Peer Reviewed
See detailExternalisation de la politique migratoire et identité de l'Union européenne
Neframi, Eleftheria UL; Gatti, Mauro UL

in Benlolo, Myriam (Ed.) L'Union européenne et les migrations (in press)

Detailed reference viewed: 36 (1 UL)
Full Text
Peer Reviewed
See detailCoercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme
Roenne, Peter UL; Atashpendar, Arash UL; Kristian, Gjøsteen et al

in Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (in press)

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE ... [more ▼]

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The pairwise comparison-based approach of JCJ using plaintext equivalence tests leads to a quadratic blow-up in the number of votes, which makes the tallying process rather impractical in realistic settings with a large number of voters. We show how the removal of invalid votes can be done in linear time via a solution based on recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE. We conclude by touching upon some of the advantages and challenges of such an approach, followed by a discussion of further security and post-quantum considerations. [less ▲]

Detailed reference viewed: 128 (37 UL)
Full Text
See detailFundamental rights and constitutional identity(ies): limits or parameters of the EU constitutional governance?
Zinonos, Panagiotis UL

in European Governance and Sovereignty (in press)

Detailed reference viewed: 32 (11 UL)
Full Text
Peer Reviewed
See detailParallel coordinate descent algorithms for sparse phase retrieval
Yang, Yang UL; Pesavento, Marius; Eldar, Yonina C. et al

in Proc. 2019 IEEE International Conference on Acoustics, Speech and Signal (ICASSP) (2019, May)

Detailed reference viewed: 106 (10 UL)
Full Text
Peer Reviewed
See detailLearning to Sport and Refactor Inconsistent Method Names
Liu, Kui UL; Kim, Dongsun; Bissyande, Tegawendé François D Assise UL et al

in 41st ACM/IEEE International Conference on Software Engineering (ICSE) (2019, May)

To ensure code readability and facilitate software maintenance, program methods must be named properly. In particular, method names must be consistent with the corresponding method implementations ... [more ▼]

To ensure code readability and facilitate software maintenance, program methods must be named properly. In particular, method names must be consistent with the corresponding method implementations. Debugging method names remains an important topic in the literature, where various approaches analyze commonalities among method names in a large dataset to detect inconsistent method names and suggest better ones. We note that the state-of-the-art does not analyze the implemented code itself to assess consistency. We thus propose a novel automated approach to debugging method names based on the analysis of consistency between method names and method code. The approach leverages deep feature representation techniques adapted to the nature of each artifact. Experimental results on over 2.1 million Java methods show that we can achieve up to 15 percentage points improvement over the state-of-the-art, establishing a record performance of 67.9% F1-measure in identifying inconsistent method names. We further demonstrate that our approach yields up to 25% accuracy in suggesting full names, while the state-of-the-art lags far behind at 1.1% accuracy. Finally, we report on our success in fixing 66 inconsistent method names in a live study on projects in the wild. [less ▲]

Detailed reference viewed: 89 (4 UL)
Full Text
Peer Reviewed
See detailVIEW-INVARIANT ACTION RECOGNITION FROM RGB DATA VIA 3D POSE ESTIMATION
Baptista, Renato UL; Ghorbel, Enjie UL; Papadopoulos, Konstantinos UL et al

in IEEE International Conference on Acoustics, Speech and Signal Processing, Brighton, UK, 12–17 May 2019 (2019, May)

In this paper, we propose a novel view-invariant action recognition method using a single monocular RGB camera. View-invariance remains a very challenging topic in 2D action recognition due to the lack of ... [more ▼]

In this paper, we propose a novel view-invariant action recognition method using a single monocular RGB camera. View-invariance remains a very challenging topic in 2D action recognition due to the lack of 3D information in RGB images. Most successful approaches make use of the concept of knowledge transfer by projecting 3D synthetic data to multiple viewpoints. Instead of relying on knowledge transfer, we propose to augment the RGB data by a third dimension by means of 3D skeleton estimation from 2D images using a CNN-based pose estimator. In order to ensure view-invariance, a pre-processing for alignment is applied followed by data expansion as a way for denoising. Finally, a Long-Short Term Memory (LSTM) architecture is used to model the temporal dependency between skeletons. The proposed network is trained to directly recognize actions from aligned 3D skeletons. The experiments performed on the challenging Northwestern-UCLA dataset show the superiority of our approach as compared to state-of-the-art ones. [less ▲]

Detailed reference viewed: 71 (17 UL)
Full Text
Peer Reviewed
See detailYou Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems
Liu, Kui UL; Koyuncu, Anil UL; Bissyande, Tegawendé François D Assise UL et al

in The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019) (2019, April 24)

Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure ... [more ▼]

Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure that it reaches significant milestones by reliably comparing state-of-the-art tools for a better understanding of their strengths and weaknesses. In this work, we identify and investigate a practical bias caused by the fault localization (FL) step in a repair pipeline. We propose to highlight the different fault localization configurations used in the literature, and their impact on APR systems when applied to the Defects4J benchmark. Then, we explore the performance variations that can be achieved by "tweaking'' the FL step. Eventually, we expect to create a new momentum for (1) full disclosure of APR experimental procedures with respect to FL, (2) realistic expectations of repairing bugs in Defects4J, as well as (3) reliable performance comparison among the state-of-the-art APR systems, and against the baseline performance results of our thoroughly assessed kPAR repair tool. Our main findings include: (a) only a subset of Defects4J bugs can be currently localized by commonly-used FL techniques; (b) current practice of comparing state-of-the-art APR systems (i.e., counting the number of fixed bugs) is potentially misleading due to the bias of FL configurations; and (c) APR authors do not properly qualify their performance achievement with respect to the different tuning parameters implemented in APR systems. [less ▲]

Detailed reference viewed: 86 (10 UL)
Full Text
Peer Reviewed
See detailIoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis
Msadek, Mohamed Nizar UL; Soua, Ridha UL; Engel, Thomas UL

in The IEEE Wireless Communications and Networking Conference (WCNC) (2019, April 19)

Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface ... [more ▼]

Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface, which can seriously harm users’ privacy. We demonstrate in this paper that an attacker is able to disclose sensitive information about the IoT device, such as its type,by identifying specific patterns in IoT traffic. To perform the fingerprint attack, we train machine-learning algorithms based on selected features extracted from the encrypted IoT traffic.Extensive simulations involving the baseline approach show that we achieve not only a significant mean accuracy improvement of 18.5% and but also a speedup of 18.39 times for finding the best estimators. Obtained results should spur the attention of policymakers and IoT vendors to secure the IoT devices they bring to market. [less ▲]

Detailed reference viewed: 55 (3 UL)
Full Text
Peer Reviewed
See detailAn Effective Hybrid Imperialist Competitive Algorithm and Tabu Search for an Extended Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 34th ACM/SIGAPP Symposium On Applied Computing, Limassol, Cyprus April 8-12, 2019 (2019, April 08)

An extended version of the flexible job shop problem is tackled in this work. The investigated extension of the classical flexible job shop problem allows the precedences between the operations to be ... [more ▼]

An extended version of the flexible job shop problem is tackled in this work. The investigated extension of the classical flexible job shop problem allows the precedences between the operations to be given by an arbitrary directed acyclic graph instead of a linear order. The problem consists of designating the operations to the machines and sequencing them in compliance with the supplied precedences. The goal in the present work is the minimization of the makespan. In order to produce reasonable outcomes in acceptable time, a hybrid imperialist competitive algorithm and tabu search is proposed to solve the problem. Numerical experiments assess the efficiency of the proposed method and compare it with well-known scheduling algorithms. [less ▲]

Detailed reference viewed: 99 (19 UL)
Full Text
Peer Reviewed
See detailLooking into the Past: Evaluating the Effect of Time Gaps in a Personalized Sentiment Model
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in ACM/SIGAPP Symposium On Applied Computing, Limassol 8-12 April 2019 (2019, April)

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating ... [more ▼]

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating to a person’s past expressions (or opinions), however the time gaps between the messages are not considered in the existing works. We argue that the opinion at a specific time point is affected more by recent opinions that contain related content than the earlier or unrelated ones, thus a sentiment model ought to include such information in the analysis. By using a recurrent neural network with an attention layer as a basic model, we introduce three cases to integrate time gaps in the model. Evaluated on Twitter data with frequent users, we have found that the performance is improved the most by including the time information in the Hawkes process, and it is also more effective to add the time information in the attention layer than at the input. [less ▲]

Detailed reference viewed: 83 (20 UL)
Full Text
Peer Reviewed
See detailFog Computing as the Key for Seamless Connectivity Handover in Future Vehicular Networks
Palattella, Maria Rita UL; Soua, Ridha UL; Abdelmajid, Khelil et al

in The 34th ACM Symposium On Applied Computing (SAC (2019, April)

Detailed reference viewed: 99 (15 UL)
Full Text
Peer Reviewed
See detailEvaluation of End-To-End Learning for Autonomous Driving: The Good, the Bad and the Ugly
Varisteas, Georgios UL; Frank, Raphaël UL; Sajadi Alamdari, Seyed Amin UL et al

in 2nd International Conference on Intelligent Autonomous Systems, Singapore, Feb. 28 to Mar. 2, 2019 (2019, March 01)

Detailed reference viewed: 58 (6 UL)
Full Text
Peer Reviewed
See detailArt in Rich-Prospect: Evaluating Next-Generation User Interfaces for Cultural Heritage
Morse, Christopher UL; Koenig, Vincent UL; Lallemand, Carine UL et al

in Morse, Christopher; Koenig, Vincent; Lallemand, Carine (Eds.) et al MW2019: Museums and the Web, Boston 2-6 April 2019 (2019, March)

The present study reports on the user experience (UX) of rich-prospect browsing, an emerging interface design trend for digital cultural heritage. Building on research that suggests online museum ... [more ▼]

The present study reports on the user experience (UX) of rich-prospect browsing, an emerging interface design trend for digital cultural heritage. Building on research that suggests online museum collections are used only infrequently by the general public, this study investigates the role of next-generation user interfaces in the design of optimal browsing experiences. Moreover, it describes the results of user testing for three different arts and culture collections that make use of rich-prospect. The study recruited 30 participants of varying ages, nationalities, and museum visiting habits to discuss their museum experiences and test three different applications: Coins, Curator Table, and Museum of the World. The results of the study provide insights into the user experience of a new browsing medium and reveal the information-seeking habits and patterns that occurred within these information environments. Moreover, the study isolated the core features of rich-prospect in order to define opportunities and pain points during the browsing experience and indicated which features in particular are most important to people during the browsing experience. Finally, we suggest some best practices going forward in the design of rich-prospect. [less ▲]

Detailed reference viewed: 33 (5 UL)
Full Text
Peer Reviewed
See detailAVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations
Liu, Kui UL; Koyuncu, Anil UL; Dongsun, Kim et al

in The 26th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER-2019) (2019, February 24)

Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained ... [more ▼]

Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained with mutation operators through genetic programming. The performance of pattern-based APR systems, however, depends on the fix ingredients mined from fix changes in development histories. Unfortunately, collecting a reliable set of bug fixes in repositories can be challenging. In this paper, we propose to investigate the possibility in an APR scenario of leveraging code changes that address violations by static bug detection tools. To that end, we build the AVATAR APR system, which exploits fix patterns of static analysis violations as ingredients for patch generation. Evaluated on the Defects4J benchmark, we show that, assuming a perfect localization of faults, AVATAR can generate correct patches to fix 34/39 bugs. We further find that AVATAR yields performance metrics that are comparable to that of the closely-related approaches in the literature. While AVATAR outperforms many of the state-of-the-art pattern-based APR systems, it is mostly complementary to current approaches. Overall, our study highlights the relevance of static bug finding tools as indirect contributors of fix ingredients for addressing code defects identified with functional test cases. [less ▲]

Detailed reference viewed: 73 (10 UL)
Full Text
Peer Reviewed
See detailShould You Consider Adware as Malware in Your Study?
Gao, Jun UL; Li, Li; Kong, Pingfan UL et al

in 26th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering (2019, February 24)

Empirical validations of research approaches eventually require a curated ground truth. In studies related to Android malware, such a ground truth is built by leveraging Anti-Virus (AV) scanning reports ... [more ▼]

Empirical validations of research approaches eventually require a curated ground truth. In studies related to Android malware, such a ground truth is built by leveraging Anti-Virus (AV) scanning reports which are often provided free through online services such as VirusTotal. Unfortunately, these reports do not offer precise information for appropriately and uniquely assigning classes to samples in app datasets: AV engines indeed do not have a consensus on specifying information in labels. Furthermore, labels often mix information related to families, types, etc. In particular, the notion of “adware” is currently blurry when it comes to maliciousness. There is thus a need to thoroughly investigate cases where adware samples can actually be associated with malware (e.g., because they are tagged as adware but could be considered as malware as well). In this work, we present a large-scale analytical study of Android adware samples to quantify to what extent “adware should be considered as malware”. Our analysis is based on the Androzoo repository of 5 million apps with associated AV labels and leverages a state-of-the-art label harmonization tool to infer the malicious type of apps before confronting it against the ad families that each adware app is associated with. We found that all adware families include samples that are actually known to implement specific malicious behavior types. Up to 50% of samples in an ad family could be flagged as malicious. Overall the study demonstrates that adware is not necessarily benign. [less ▲]

Detailed reference viewed: 41 (7 UL)
Full Text
Peer Reviewed
See detailRobust Design of Power Minimizing Symbol-Level Precoder under Channel Uncertainty
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL; Ottersten, Björn UL

in IEEE Global Communications Conference (GLOBECOM), Abu Dhabi 9-13 December 2018 (2019, February 21)

In this paper, we investigate the downlink transmission of a multiuser multiple-input single-output (MISO) channel under a symbol-level precoding (SLP) scheme, having imperfect channel knowledge at the ... [more ▼]

In this paper, we investigate the downlink transmission of a multiuser multiple-input single-output (MISO) channel under a symbol-level precoding (SLP) scheme, having imperfect channel knowledge at the transmitter. In defining the SLP design problem, a general category of constructive interference regions (CIR) called distance preserving CIR (DPCIR) is adopted. In particular, we are interested in a robust SLP design minimizing the total transmit power subject to individual quality-of-service (QoS) requirements. We consider two common models for the channel uncertainty region, namely, spherical (norm-bounded) and stochastic. For the spherical uncertainty model, a worst-case robust precoder is proposed, while for the stochastically known uncertainties, we derive a convex optimization problem with probabilistic constraints. We simulate the performance of the proposed robust approaches, and compare them with the existing methods. Through the simulation results, we also show that there is an essential trade-off between the two robust approaches. [less ▲]

Detailed reference viewed: 48 (4 UL)
Full Text
Peer Reviewed
See detailCharacterizations of idempotent n-ary uninorms
Devillet, Jimmy UL; Kiss, Gergely; Marichal, Jean-Luc UL

in 38th Linz Seminar on Fuzzy Set Theory (2019, February 05)

In this paper we provide a characterization of the class of idempotent n-ary uninorms on a given chain. When the chain is finite, we also provide anaxiomatic characterization of the latter class by means ... [more ▼]

In this paper we provide a characterization of the class of idempotent n-ary uninorms on a given chain. When the chain is finite, we also provide anaxiomatic characterization of the latter class by means of four conditions only: associativity, quasitriviality, symmetry, and nondecreasing monotonicity. In particular, we show that associativity can be replaced with bisymmetry in this axiomatization. [less ▲]

Detailed reference viewed: 54 (16 UL)
Full Text
Peer Reviewed
See detailROSploit: Cybersecurity tool for ROS
Rivera, Sean UL; Lagraa, Sofiane UL; State, Radu UL

in International Conference on Robotic Computing (2019, February)

Abstract—Robotic Operating System(ROS) security research is currently in a preliminary state, with limited research in tools or models. Considering the trend of digitization of robotic systems, this lack ... [more ▼]

Abstract—Robotic Operating System(ROS) security research is currently in a preliminary state, with limited research in tools or models. Considering the trend of digitization of robotic systems, this lack of foundational knowledge increases the potential threat posed by security vulnerabilities in ROS. In this article, we present a new tool to assist further security research in ROS, ROSploit. ROSploit is a modular two-pronged offensive tool covering both reconnaissance and exploitation of ROS systems, designed to assist researchers in testing exploits for ROS. [less ▲]

Detailed reference viewed: 48 (0 UL)
Full Text
Peer Reviewed
See detailReal-time attack detection on robot cameras: A self-driving car application
Lagraa, Sofiane UL; Cailac, Maxime; Rivera, Sean UL et al

in International Conference on Robotic Computing (2019, February)

The Robot Operating System (ROS) are being deployed for multiple life critical activities such as self-driving cars, drones, and industries. However, the security has been persistently neglected ... [more ▼]

The Robot Operating System (ROS) are being deployed for multiple life critical activities such as self-driving cars, drones, and industries. However, the security has been persistently neglected, especially the image flows incoming from camera robots. In this paper, we perform a structured security assessment of robot cameras using ROS. We points out a relevant number of security flaws that can be used to take over the flows incoming from the robot cameras. Furthermore, we propose an intrusion detection system to detect abnormal flows. Our defense approach is based on images comparisons and unsupervised anomaly detection method. We experiment our approach on robot cameras embedded on a self-driving car. [less ▲]

Detailed reference viewed: 96 (13 UL)
Full Text
Peer Reviewed
See detailA View-invariant Framework for Fast Skeleton-based Action Recognition Using a Single RGB Camera
Ghorbel, Enjie UL; Papadopoulos, Konstantinos UL; Baptista, Renato UL et al

in 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Prague, 25-27 February 2018 (2019, February)

View-invariant action recognition using a single RGB camera represents a very challenging topic due to the lack of 3D information in RGB images. Lately, the recent advances in deep learning made it ... [more ▼]

View-invariant action recognition using a single RGB camera represents a very challenging topic due to the lack of 3D information in RGB images. Lately, the recent advances in deep learning made it possible to extract a 3D skeleton from a single RGB image. Taking advantage of this impressive progress, we propose a simple framework for fast and view-invariant action recognition using a single RGB camera. The proposed pipeline can be seen as the association of two key steps. The first step is the estimation of a 3D skeleton from a single RGB image using a CNN-based pose estimator such as VNect. The second one aims at computing view-invariant skeleton-based features based on the estimated 3D skeletons. Experiments are conducted on two well-known benchmarks, namely, IXMAS and Northwestern-UCLA datasets. The obtained results prove the validity of our concept, which suggests a new way to address the challenge of RGB-based view-invariant action recognition. [less ▲]

Detailed reference viewed: 65 (10 UL)
Full Text
Peer Reviewed
See detailAssessing the impact of attacks on OPC-UA applications in the Industry 4.0 era
Polge, Julien UL; Robert, Jérémy UL; Le Traon, Yves UL

in 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, 11-14 January 2019 (2019, January 11)

Detailed reference viewed: 37 (3 UL)
Full Text
Peer Reviewed
See detailEconomic inequality and intergenerational socioeconomic persistence: A European test of the Great Gatsby Curve hypothesis
Chauvel, Louis UL; Hartung, Anne UL

in Long-term consequences of the Great Recession for stratification, mobility and inequality. Abstracts booklet. (2019)

Detailed reference viewed: 48 (0 UL)
Full Text
Peer Reviewed
See detailA cohort perspective on intergenerational mobility and inequality
Bar-Haim, Eyal UL; Chauvel, Louis UL; Hartung, Anne UL

in Long-term consequences of the Great Recession for stratification, mobility and inequality. Abstracts booklet. (2019)

Detailed reference viewed: 30 (0 UL)
Full Text
Peer Reviewed
See detailAutonomy and EU Competences in the Context of Free Trade and Investment Agreements
Neframi, Eleftheria UL; Gatti, Mauro UL

in Bosse Platiere, Isabelle; Rapoport, Cecile (Eds.) Negotiation and Conclusion of the New Generation of Free Trade Agreements (2019)

Detailed reference viewed: 35 (2 UL)
Full Text
Peer Reviewed
See detailDecision Support for Security-Control Identification Using Machine Learning
Bettaieb, Seifeddine UL; Shin, Seung Yeob UL; Sabetzadeh, Mehrdad UL et al

in International Working Conference on Requirements Engineering: Foundation for Software Quality, Essen 18-21 March 2019 (2019)

[Context & Motivation] In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is ... [more ▼]

[Context & Motivation] In many domains such as healthcare and banking, IT systems need to fulfill various requirements related to security. The elaboration of security requirements for a given system is in part guided by the controls envisaged by the applicable security standards and best practices. [Problem] An important difficulty that analysts have to contend with during security requirements elaboration is sifting through a large number of security controls and determining which ones have a bearing on the security requirements for a given system. This challenge is often exacerbated by the scarce security expertise available in most organizations. [Principal ideas/results] In this paper, we develop automated decision support for the identification of security controls that are relevant to a specific system in a particular context. Our approach, which is based on machine learning, leverages historical data from security assessments performed over past systems in order to recommend security controls for a new system. We operationalize and empirically evaluate our approach using real historical data from the banking domain. Our results show that, when one excludes security controls that are rare in the historical data, our approach has an average recall of ≈ 95% and average precision of ≈ 67%. [Contribution] The high recall – indicating only a few relevant security controls are missed – combined with the reasonable level of precision – indicating that the effort required to confirm recommendations is not excessive – suggests that our approach is a useful aid to analysts for more efficiently identifying the relevant security controls, and also for decreasing the likelihood that important controls would be overlooked. [less ▲]

Detailed reference viewed: 115 (24 UL)
Full Text
Peer Reviewed
See detailFeasibility Analysis of Blockchain for Donation-based Crowdfunding of Ethical Projects
Khan, Nida UL; Ouaich, Rachid

in Springer Smart Technologies and Innovation for a Sustainable Future. Advances in Science, Technology & Innovation (IEREK Interdisciplinary Series for Sustainable Development). (2019)

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present ... [more ▼]

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present and optimize the process of Zakaah donation. Load and stress tests on the prototype of the smart contract in the public testnet of Ethereum were analyzed to gauge the feasibility of mass usage. Similar tests were done in Hyperledger to conclude on the optimum blockchain platform for Zakaah. An anomaly was detected during the testing phase of the decentralized app in the public testnet of Ethereum and it was exploited to propose a novel strategy to enhance the throughput of Ethereum. The testing is a pioneer in evaluating the throughput and feasibility of a blockchain based financial product and provides a benchmark to validate the business and technical hypotheses of other similar financial products and services. [less ▲]

Detailed reference viewed: 546 (41 UL)
Full Text
Peer Reviewed
See detailTRANSMISSION OF COLLECTIVE MEMORY AND JEWISH IDENTITY IN POSTWAR JEWISH GENERATIONS THROUGH WAR SOUVENIRS
Bronec, Jakub UL

in International 26th annual CIDOC - ICOM Conference in 2018 (2019)

My contribution includes a sample of testimonies containing the life stories of Jews born in the aftermath of World War II in two countries (Czechoslovakia and Luxembourg). At that time, Czechoslovakian ... [more ▼]

My contribution includes a sample of testimonies containing the life stories of Jews born in the aftermath of World War II in two countries (Czechoslovakia and Luxembourg). At that time, Czechoslovakian Jews were living through the era of de-Stalinisation, and their narratives offer new insights into this segment of Jewish postwar history that differ from those of Jews living in liberal democratic European states. Based on personal documents, photos, letters and souvenirs, the conducted interviews highlight an interesting way of maintaining personal memories in Jewish families and how this varies from one generation to the next. In my contribution, I am planning to illustrate the importance of these small artefacts for the transmission of Jewish collective memory. My presentation showcases people widely referred to as the “second and third Jewish generation”, their attitude to current notions of Jewish memory and self-perception and their role in society. Some had to live under totalitarian oppression, others had to face a wave of Jewish Sephardic immigrants coming from overseas – and witnesses admit that the arrival of these newcomers often caused difficulties in Jewish communities. Small objects from the war, often displayed in their households, serve as a reminder of their roots and destiny, which should not be forgotten. This paper is a part of my broader research project examining distinctions and similarities in identity formation through generations of Czech, Slovak, French and Luxembourgish Jews, who grew up either under communism or in liberal Western Europe. The aim is to create an international virtual library and cloud storage, not only for professional educators but also for the public. [less ▲]

Detailed reference viewed: 39 (5 UL)
Full Text
Peer Reviewed
See detailNature et modernité : réflexions théoriques suivies d’une lecture écologique de Fenn Kaß
Thiltges, Sébastian UL

in Millim, Anne-Marie; Toffoli, Ian (Eds.) Modernismen in Luxemburg: Traditionen - Variationen - Brüche (2019)

The current environmental concerns call upon a revaluation of the concept of modernity which, a century ago, has been proven to be a major cultural and aesthetic reference. Modernist writers took up new ... [more ▼]

The current environmental concerns call upon a revaluation of the concept of modernity which, a century ago, has been proven to be a major cultural and aesthetic reference. Modernist writers took up new subjects, like industry and urbanism, as an alternative to homeland literature’s depiction of earth and soil. Batty Weber depicts in Fenn Kaß (1913) the life of a defrocked priest who leaves his native countryside to become an engineer abroad. Seemingly a novel about modernity, the book also contains several descriptions of the protagonist’s relation to the natural environment, using repeatedly the metaphor of a liquid and dissolving body. By defining both interrelated concepts of nature and modernity, this paper provides an anthropological reading of texts, questioning how salient poetical motives can challenge sociological and epistemological contextualisation. [less ▲]

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailOn the Evolution of Keyword-Driven Test Suites
Rwemalika, Renaud UL; Kintis, Marinos UL; Papadakis, Mike UL et al

in 12th IEEE International Conference on Software Testing, Verification and Validation (2019)

Many companies rely on software testing to verify that their software products meet their requirements. However, test quality and, in particular, the quality of end-to-end testing is relatively hard to ... [more ▼]

Many companies rely on software testing to verify that their software products meet their requirements. However, test quality and, in particular, the quality of end-to-end testing is relatively hard to achieve. The problem becomes challenging when software evolves, as end-to-end test suites need to adapt and conform to the evolved software. Unfortunately, end-to-end tests are particularly fragile as any change in the application interface, e.g., application flow, location or name of graphical user interface elements, necessitates a change in the tests. This paper presents an industrial case study on the evolution of Keyword-Driven test suites, also known as Keyword-Driven Testing (KDT). Our aim is to demonstrate the problem of test maintenance, identify the benefits of Keyword-Driven Testing and overall improve the understanding of test code evolution (at the acceptance testing level). This information will support the development of automatic techniques, such as test refactoring and repair, and will motivate future research. To this end, we identify, collect and analyze test code changes across the evolution of industrial KDT test suites for a period of eight months. We show that the problem of test maintenance is largely due to test fragility (most commonly-performed changes are due to locator and synchronization issues) and test clones (over 30% of keywords are duplicated). We also show that the better test design of KDT test suites has the potential for drastically reducing (approximately 70%) the number of test code changes required to support software evolution. To further validate our results, we interview testers from BGL BNP Paribas and report their perceptions on the advantages and challenges of keyword-driven testing. [less ▲]

Detailed reference viewed: 66 (7 UL)
Full Text
Peer Reviewed
See detailNeue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)
Uhrmacher, Martin UL

in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) et al Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. (2019)

Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Beitrag untersucht die Veränderung von Grenzen ... [more ▼]

Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Beitrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man nur in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen dem Großherzogtum Luxemburg als Provinz des niederländischen Königreichs und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]

Detailed reference viewed: 34 (2 UL)
See detailEntwicklungen der sexualwissenschaftlichen und rechtlichen Debatten zu Transsexualität und deren Verschränkungen in der Bundesrepublik Deutschland (1960er Jahre bis 1980)
De Silva, Adrian UL

in Landesstelle für Gleichbehandlung - gegen Diskriminierung, Fachbereich LSBTI (Ed.) 'Auf nach Casablanca?' Lebensrealitäten transgeschlechtlicher Menschen zwischen 1945-1980 (2019)

Detailed reference viewed: 83 (17 UL)
Full Text
Peer Reviewed
See detailPersonalized Sentiment Analysis and a Framework with Attention-Based Hawkes Process Model
Guo, Siwen UL; Höhn, Sviatlana UL; Xu, Feiyu et al

in Agents and Artificial Intelligence (2019)

People use different words when expressing their opinions. Sentiment analysis as a way to automatically detect and categorize people’s opinions in text, needs to reflect this diversity and individuality ... [more ▼]

People use different words when expressing their opinions. Sentiment analysis as a way to automatically detect and categorize people’s opinions in text, needs to reflect this diversity and individuality. One possible approach to analyze such traits is to take a person’s past opinions into consideration. In practice, such a model can suffer from the data sparsity issue, thus it is difficult to develop. In this article, we take texts from social platforms and propose a preliminary model for evaluating the effectiveness of including user information from the past, and offer a solution for the data sparsity. Furthermore, we present a finer-designed, enhanced model that focuses on frequent users and offers to capture the decay of past opinions using various gaps between the creation time of the text. An attention-based Hawkes process on top of a recurrent neural network is applied for this purpose, and the performance of the model is evaluated with Twitter data. With the proposed framework, positive results are shown which opens up new perspectives for future research. [less ▲]

Detailed reference viewed: 51 (7 UL)
Full Text
Peer Reviewed
See detailPower and Flow Assignment for 5G Integrated Terrestrial-Satellite Backhaul Networks
Lagunas, Eva UL; Lei, Lei UL; Chatzinotas, Symeon UL et al

in IEEE Wireless Communications and Networking Conference, Marrakech, Morocco, April 2019 (2019)

Detailed reference viewed: 26 (2 UL)
Full Text
See detailDigital Resources and Tools in Historical Research
Zaagsma, Gerben UL; Wieneke, Lars UL

in Kollmann, Stefanie; Müller, Lars; Reh, Sabine (Eds.) et al Picture archives and the emergence of visual history of education. ISCHE 40 pre-conference workshop. 3rd workshop "Pictura Paedagogica Online: educational knowledge in images (2018, December 21)

One of the characteristic features of modern life is the omnipresence of images - in public life as well as in the private surroundings. At latest with coining the term "Visual history" at the beginning ... [more ▼]

One of the characteristic features of modern life is the omnipresence of images - in public life as well as in the private surroundings. At latest with coining the term "Visual history" at the beginning of the nineteen nineties historical disciplines are dealing with this ever growing pool of pictorial sources. This is also true for educational history - especially when keeping in mind that the use of images in an educational context is common practice since early modern ages. This concerns the presentation practices, the design of didactic visual media and their use in educational practice as well as the illustrated traces of historical educational practice and historical educational knowledge (e.g. photographs of school buildings or educational scenes). There are various digital picture archives to address the research questions of many historical disciplines. These databases, though, differ widely in purpose and design - and of course they cannot serve every scientific demand. According to Gerhard Paul there should be at least four layers of information evaluation when analysing historical images (reality of depiction, genesis, use and impact). Thus, building up a corpus of image sources with sufficient accompanying information can be quite challenging. As major topic the Pre-Conference Workshop will focus on the impact of the discipline on developing and maintaining of a picture archive. (DIPF/Orig.) [less ▲]

Detailed reference viewed: 107 (6 UL)
Full Text
Peer Reviewed
See detailLSRepair: Live Search of Fix Ingredients for Automated Program Repair
Liu, Kui UL; Koyuncu, Anil UL; Kim, Kisub UL et al

in 25th Asia-Pacific Software Engineering Conference (APSEC) (2018, December 07)

Automated program repair (APR) has extensively been developed by leveraging search-based techniques, in which fix ingredients are explored and identified in different granularities from a specific search ... [more ▼]

Automated program repair (APR) has extensively been developed by leveraging search-based techniques, in which fix ingredients are explored and identified in different granularities from a specific search space. State-of-the approaches often find fix ingredients by using mutation operators or leveraging manually-crafted templates. We argue that the fix ingredients can be searched in an online mode, leveraging code search techniques to find potentially-fixed versions of buggy code fragments from which repair actions can be extracted. In this study, we present an APR tool, LSRepair, that automatically explores code repositories to search for fix ingredients at the method-level granularity with three strategies of similar code search. Our preliminary evaluation shows that code search can drive a faster fix process (some bugs are fixed in a few seconds). LSRepair helps repair 19 bugs from the Defects4J benchmark successfully. We expect our approach to open new directions for fixing multiple-lines bugs. [less ▲]

Detailed reference viewed: 158 (18 UL)
Full Text
Peer Reviewed
See detailA Memory-Based Label Propagation Algorithm for Community Detection
Fiscarelli, Antonio Maria UL; Brust, Matthias R. UL; Danoy, Grégoire UL et al

in Aiello, Luca Maria; Cherifi, Chantal; Cherifi, Hocine (Eds.) et al Complex Networks and Their Applications VII (2018, December 02)

The objective of a community detection algorithm is to group similar nodes in a network into communities, while increasing the dis- similarity between them. Several methods have been proposed but many of ... [more ▼]

The objective of a community detection algorithm is to group similar nodes in a network into communities, while increasing the dis- similarity between them. Several methods have been proposed but many of them are not suitable for large-scale networks because they have high complexity and use global knowledge. The Label Propagation Algorithm (LPA) assigns a unique label to every node and propagates the labels locally, while applying the majority rule to reach a consensus. Nodes which share the same label are then grouped into communities. Although LPA excels with near linear execution time, it gets easily stuck in local optima and often returns a single giant community. To overcome these problems we propose MemLPA, a novel LPA where each node imple- ments memory and the decision rule takes past states of the network into account. We demonstrate through extensive experiments on the Lancichinetti-Fortunato-Radicchi benchmark and a set of real-world net- works that MemLPA outperforms most of state-of-the-art community detection algorithms. [less ▲]

Detailed reference viewed: 51 (11 UL)
Full Text
Peer Reviewed
See detailOsiris: Hunting for Integer Bugs in Ethereum Smart Contracts
Ferreira Torres, Christof UL; Schütte, Julian; State, Radu UL

in 34th Annual Computer Security Applications Conference (ACSAC ’18), San Juan, Puerto Rico, USA, December 3-7, 2018 (2018, December)

The capability of executing so-called smart contracts in a decentralised manner is one of the compelling features of modern blockchains. Smart contracts are fully fledged programs which cannot be changed ... [more ▼]

The capability of executing so-called smart contracts in a decentralised manner is one of the compelling features of modern blockchains. Smart contracts are fully fledged programs which cannot be changed once deployed to the blockchain. They typically implement the business logic of distributed apps and carry billions of dollars worth of coins. In that respect, it is imperative that smart contracts are correct and have no vulnerabilities or bugs. However, research has identified different classes of vulnerabilities in smart contracts, some of which led to prominent multi-million dollar fraud cases. In this paper we focus on vulnerabilities related to integer bugs, a class of bugs that is particularly difficult to avoid due to some characteristics of the Ethereum Virtual Machine and the Solidity programming language. In this paper we introduce Osiris – a framework that combines symbolic execution and taint analysis, in order to accurately find integer bugs in Ethereum smart contracts. Osiris detects a greater range of bugs than existing tools, while providing a better specificity of its detection. We have evaluated its performance on a large experimental dataset containing more than 1.2 million smart contracts. We found that 42,108 contracts contain integer bugs. Be- sides being able to identify several vulnerabilities that have been reported in the past few months, we were also able to identify a yet unknown critical vulnerability in a couple of smart contracts that are currently deployed on the Ethereum blockchain. [less ▲]

Detailed reference viewed: 209 (8 UL)
Full Text
Peer Reviewed
See detailA Family of Lightweight Twisted Edwards Curves for the Internet of Things
Ghatpande, Sankalp UL; Groszschädl, Johann UL; Liu, Zhe UL

in Blazy, Olivier; Yeun, Chan Y. (Eds.) Information Security Theory and Practice, 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Proceedings (2018, December)

We introduce a set of four twisted Edwards curves that satisfy common security requirements and allow for fast implementations of scalar multiplication on 8, 16, and 32-bit processors. Our curves are ... [more ▼]

We introduce a set of four twisted Edwards curves that satisfy common security requirements and allow for fast implementations of scalar multiplication on 8, 16, and 32-bit processors. Our curves are defined by an equation of the form -x^2 + y^2 = 1 + dx^2y^2 over a prime field Fp, where d is a small non-square modulo p. The underlying prime fields are based on "pseudo-Mersenne" primes given by p = 2^k - c and have in common that p is congruent to 5 modulo 8, k is a multiple of 32 minus 1, and c is at most eight bits long. Due to these common features, our primes facilitate a parameterized implementation of the low-level arithmetic so that one and the same arithmetic function is able to process operands of different length. Each of the twisted Edwards curves we introduce in this paper is birationally equivalent to a Montgomery curve of the form -(A+2)y^2 = x^3 + Ax^2 + x where 4/(A+2) is small. Even though this contrasts with the usual practice of choosing A such that (A + 2)/4 is small, we show that the Montgomery form of our curves allows for an equally efficient implementation of point doubling as Curve25519. The four curves we put forward roughly match the common security levels of 80, 96, 112 and 128 bits. In addition, their Weierstraß representations are isomorphic to curves of the form y^2 = x^3 - 3x + b so as to facilitate inter-operability with TinyECC and other legacy software. [less ▲]

Detailed reference viewed: 187 (13 UL)
Full Text
Peer Reviewed
See detailRobust Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System
Joroughi, Vahid UL; Shankar, Bhavani UL; Maleki, Sina UL et al

in Robust Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System (2018, December)

This paper aims to design joint precoding and onboard beamforming at a multiple gateway multibeam satellite system. Full frequency reuse pattern is considered among the beams and each gateway serves a ... [more ▼]

This paper aims to design joint precoding and onboard beamforming at a multiple gateway multibeam satellite system. Full frequency reuse pattern is considered among the beams and each gateway serves a cluster of adjacent beams such that multiple clusters are served through a set of gateways. However, two issues are required to be addressed. First, the interference in both user and feeder links is the bottleneck of the whole system and employing interference mitigation techniques is essential. Second, as the data demand increases, the ground and space segments should employ extensive bandwidth resources in the feeder link accordingly. This entails embedding an extra number of gateways aiming to support a fair balance between the increasing demand and the corresponding required feeder link resources. To tackle these problems, this paper studies the impact of employing a joint multiple gateway architecture and on-board beamforming scheme. It is shown that by properly designing the on-board beamforming scheme, the number of gateways can be kept affordable even if the data demand increases. The proposed beamforming scheme can partially mitigate the interference in the user link. While the user and feeder link channels vary over time, this paper focuses on designing fixed beamforming which is sufficiently robust to the variations in both channels, leading to keep payload complexity low. Moreover, Zero Forcing precoding technique is employed at the gateways to reject the interference in the feeder links as well as it helps the proposed fixed on-board beamforming by partially equalizing the interference in user link. [less ▲]

Detailed reference viewed: 64 (6 UL)
Full Text
Peer Reviewed
See detailCollaborative Data Delivery for Smart City-oriented Mobile Crowdsensing Systems
Vitello, Piergiorgio; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, UAE, 2018 (2018, December)

The huge increase of population living in cities calls for a sustainable urban development. Mobile crowdsensing (MCS) leverages participation of active citizens to improve performance of existing sensing ... [more ▼]

The huge increase of population living in cities calls for a sustainable urban development. Mobile crowdsensing (MCS) leverages participation of active citizens to improve performance of existing sensing infrastructures. In typical MCS systems, sensing tasks are allocated and reported on individual-basis. In this paper, we investigate on collaboration among users for data delivery as it brings a number of benefits for both users and sensing campaign organizers and leads to better coordination and use of resources. By taking advantage from proximity, users can employ device-to-device (D2D) communications like Wi-Fi Direct that are more energy efficient than 3G/4G technology. In such scenario, once a group is set, one of its member is elected to be the owner and perform data forwarding to the collector. The efficiency of forming groups and electing suitable owners defines the efficiency of the whole collaborative-based system. This paper proposes three policies optimized for MCS that are compliant with current Android implementation of Wi-Fi Direct. The evaluation results, obtained using CrowdSenSim simulator, demonstrate that collaborative-based approaches outperform significantly individual-based approaches. [less ▲]

Detailed reference viewed: 99 (12 UL)
Full Text
Peer Reviewed
See detailPower and Load Optimization in Interference-Coupled Non-Orthogonal Multiple Access Networks
Lei, Lei UL; You, Lei; Yang, Yang UL et al

in IEEE Global Communications Conference (GLOBECOM) 2018 (2018, December)

Detailed reference viewed: 84 (16 UL)
Full Text
Peer Reviewed
See detailKnowledge Graph-based Core Concept Identification in Learning Resources
Manrique, Rubén; Grevisse, Christian UL; Mariño, Olga et al

in 8th Joint International Conference, JIST 2018, Awaji, Japan, November 26–28, 2018, Proceedings (2018, December)

The automatic identification of core concepts addressed by a learning resource is an important task in favor of organizing content for educational purposes and for the next generation of learner support ... [more ▼]

The automatic identification of core concepts addressed by a learning resource is an important task in favor of organizing content for educational purposes and for the next generation of learner support systems. We present a set of strategies for core concept identification on the basis of a semantic representation built using the open and available knowledge in the so-called Knowledge Graphs (KGs). Different unsupervised weighting strategies, as well as a supervised method that operates on the semantic representation, were implemented for core concept identification. In order to test the effectiveness of the proposed strategies, a human-expert annotated dataset of 96 learning resources extracted from MOOCs was built. In our experiments, we show the capacity of the semantic representation for the core-concept identification task as well as the superiority of the supervised method. [less ▲]

Detailed reference viewed: 338 (11 UL)
Full Text
Peer Reviewed
See detailBlockPGP: A Blockchain-based Framework for PGP Key Servers
Yakubov, Alexander UL; Shbair, Wazen UL; State, Radu UL

in The Sixth International Symposium on Computing and Networking (2018, November 28)

Pretty Good Privacy (PGP) is one of the most prominent cryptographic standards, offering end-to-end encryption for email messages and other sensitive information. PGP allows to verify the identity of the ... [more ▼]

Pretty Good Privacy (PGP) is one of the most prominent cryptographic standards, offering end-to-end encryption for email messages and other sensitive information. PGP allows to verify the identity of the correspondent in information exchange as well as the information integrity. It implements asymmetric encryption with certificates shared through a network of PGP key servers. Many recent breaches show that certificate infrastructure can be compromised as well as exposed to operational errors. In this paper, we propose a new PGP management framework with the key server infrastructure implemented using blockchain technology. Our framework resolves some problems of PGP key servers focusing in particular on fast propagation of certificate revocation among key servers and elimination of man-in-the-middle risk. We also provided user access right control where only the certificate holder can change information related to the certificate. We designed and developed a prototype for key server deployment on permissioned Ethereum blockchain. Permissioned blockchain should allow to control the costs of PGP key server infrastructure maintenance at the present level. [less ▲]

Detailed reference viewed: 80 (4 UL)
Full Text
Peer Reviewed
See detailHoneyPAKEs
Lopez Becerra, José Miguel UL; Roenne, Peter UL; Ryan, Peter UL et al

in Security Protocols XXVI: Lecture Notes in Computer Science (2018, November 27)

We combine two security mechanisms: using a Password-based Authenticated Key Establishment (PAKE) protocol to protect the password for access control and the Honeywords construction of Juels and Rivest to ... [more ▼]

We combine two security mechanisms: using a Password-based Authenticated Key Establishment (PAKE) protocol to protect the password for access control and the Honeywords construction of Juels and Rivest to detect loss of password files. The resulting construction combines the properties of both mechanisms: ensuring that the password is intrinsically protected by the PAKE protocol during transmission and the Honeywords mechanisms for detecting attempts to exploit a compromised password file. Our constructions lead very naturally to two factor type protocols. An enhanced version of our protocol further provides protection against a compromised login server by ensuring that it does not learn the index to the true password. [less ▲]

Detailed reference viewed: 20 (6 UL)
Full Text
Peer Reviewed
See detailA Novel Approach to Joint User Selection and Precoding for Multiuser MISO Downlink Channels
Bandi, Ashok UL

in Bandi, Ashok; Shankar, Bhavani; maleki, Sina (Eds.) et al 6th IEEE Global Conference on Signal and Information Processing, November 26–29, 2018 Anaheim, California, USA (2018, November 26)

Detailed reference viewed: 87 (35 UL)
Full Text
Peer Reviewed
See detailFAST: A MapReduce Consensus for High Performance Blockchains
Khan, Nida UL

in ACM BlockSys@SenSys '18 Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems (2018, November 04)

Blockchain platforms when used as a database for IoT systems can resolve data reliability fault-tolerance, consistency and non-repudiation issues. However, their inherent shortcomings related to their ... [more ▼]

Blockchain platforms when used as a database for IoT systems can resolve data reliability fault-tolerance, consistency and non-repudiation issues. However, their inherent shortcomings related to their throughput in terms of processed transactions, limit their applicability in such environments in a decentralized way as the underlying network is unable to sustain high workloads. In this paper a fully decentralized high performance consensus mechanism, named FAST, is proposed for a public blockchain. FAST is based on mapreduce paradigm for aggregating and adding transactions on blockchain blocks. FAST was implemented and evaluated in a basic blockchain prototype. A light client for FAST using IPFS, was developed to bring about a reduction in the data stored locally. The obtained results from tests conducted on the prototype depict that FAST exceeds the performance of not just other existing blockchain platforms but comes very close to the throughput of traditional electronic payment networks such as Visa. [less ▲]

Detailed reference viewed: 40 (7 UL)
Full Text
Peer Reviewed
See detailEmpowering reuse of digital cultural heritage in context-aware crosscuts of European history
Antoniou, A; Lopez-Nores, M; Yannick, N et al

in Wallace, M; Antoniou, A (Eds.) Proceedings of the Workshop on Cultural Informatics co-located with the EUROMED International Conference on Digital Heritage 2018 (EUROMED 2018) (2018, November 03)

The paper presents the H2020 CrossCult project, providing a short overview, a summary of the platform developed by the project, a description of the consortium, lessons learnt in three main dimensions ... [more ▼]

The paper presents the H2020 CrossCult project, providing a short overview, a summary of the platform developed by the project, a description of the consortium, lessons learnt in three main dimensions (humanities, technology and business), the open challenges and the main tools developed by the project. [less ▲]

Detailed reference viewed: 18 (0 UL)
Full Text
Peer Reviewed
See detailRevisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation
Atashpendar, Arash UL; Policharla, Guru Vamsi; Roenne, Peter UL et al

in Secure IT Systems, 23rd Nordic Conference, NordSec 2018. Lecture Notes in Computer Science, vol 11252. Springer, Cham (2018, November 02)

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily ... [more ▼]

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits key equivocation. We provide more insight into the nature of this attack and how it extends to other constructions such as QKE obtained from uncloneable encryption. We then adopt the framework for quantum authenticated key exchange, developed by Mosca et al., and extend it to introduce the notion of coercer-deniable QKE, formalized in terms of the indistinguishability of real and fake coercer views. Next, we apply results from a recent work by Arrazola and Scarani on covert quantum communication to establish a connection between covert QKE and deniability. We propose DC-QKE, a simple deniable covert QKE protocol, and prove its deniability via a reduction to the security of covert QKE. Finally, we consider how entanglement distillation can be used to enable information-theoretically deniable protocols for QKE and tasks beyond key exchange. [less ▲]

Detailed reference viewed: 141 (42 UL)
Full Text
Peer Reviewed
See detailVisualizing the Learning Progress of Self-Driving Cars
Mund, Sandro; Frank, Raphaël UL; Varisteas, Georgios UL et al

in 21st International Conference on Intelligent Transportation Systems (2018, November 02)

Using Deep Learning to predict lateral and longitudinal vehicle control, i.e. steering, acceleration and braking, is becoming increasingly popular. However, it remains widely unknown why those models ... [more ▼]

Using Deep Learning to predict lateral and longitudinal vehicle control, i.e. steering, acceleration and braking, is becoming increasingly popular. However, it remains widely unknown why those models perform so well. In order for them to become a commercially viable solution, it first needs to be understood why a certain behavior is triggered and how and what those networks learn from human-generated driving data to ensure safety. One research direction is to visualize what the network sees by highlighting regions of an image that influence the outcome of the model. In this vein, we propose a generic visualization method using Attention Heatmaps (AHs) to highlight what a given Convolutional Neural Network (CNN) learns over time. To do so, we rely on a novel occlusion technique to mask different regions of an input image to observe the effect on a predicted steering signal. We then gradually increase the amount of training data and study the effect on the resulting Attention Heatmaps, both in terms of visual focus and temporal behavior. [less ▲]

Detailed reference viewed: 78 (13 UL)
Full Text
See detailFLEXCAP – Cost competitive flexible process for highly aesthetic closures manufacturing
Kakogiannos, Ioannis UL; Hichri, Bassem UL; Plapper, Peter UL

in Kakogiannos, Ioannis; Hichri, Bassem; Plapper, Peter (Eds.) Robotix-Academy Conference for Industrial Robotics (RACIR) 2018 (2018, November)

Detailed reference viewed: 44 (0 UL)
Full Text
Peer Reviewed
See detailAttacks and Countermeasures for White-box Designs
Biryukov, Alex UL; Udovenko, Aleksei UL

in Peyrin, Thomas; Galbraith, Steven (Eds.) Advances in Cryptology – ASIACRYPT 2018 (2018, November)

In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implementation ... [more ▼]

In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implementation. He can use both static and dynamic analysis as well as fault analysis in order to break the cryptosystem, e.g. to extract the embedded secret key. Implementations secure in such model have many applications in industry. However, creating such implementations turns out to be a very challenging if not an impossible task. Recently, Bos et al. proposed a generic attack on white-box primitives called differential computation analysis (DCA). This attack was applied to many white-box implementations both from academia and industry. The attack comes from the area of side-channel analysis and the most common method protecting against such attacks is masking, which in turn is a form of secret sharing. In this paper we present multiple generic attacks against masked white-box implementations. We use the term “masking” in a very broad sense. As a result, we deduce new constraints that any secure white-box implementation must satisfy. Based on the new constraints, we develop a general method for protecting white-box implementations. We split the protection into two independent components: value hiding and structure hiding. Value hiding must pro- vide protection against passive DCA-style attacks that rely on analysis of computation traces. Structure hiding must provide protection against circuit analysis attacks. In this paper we focus on developing the value hiding component. It includes protection against the DCA attack by Bos et al. and protection against a new attack called algebraic attack. We present a provably secure first-order protection against the new al- gebraic attack. The protection is based on small gadgets implementing secure masked XOR and AND operations. Furthermore, we give a proof of compositional security allowing to freely combine secure gadgets. We derive concrete security bounds for circuits built using our construction. [less ▲]

Detailed reference viewed: 639 (14 UL)
Full Text
Peer Reviewed
See detailFraudDroid: Automated Ad Fraud Detection for Android Apps
Dong, Feng; Wang, Haoyu; Li, Li et al

in ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE 2018) (2018, November)

Detailed reference viewed: 60 (1 UL)
Full Text
Peer Reviewed
See detailAn Approach to Incorporate Emotions in a Chatbot with Seq2Seq Model
Zheng, Yaqiong; Guo, Siwen UL; Schommer, Christoph UL

in Benelux Conference on Artificial Intelligence, ‘s-Hertogenbosch 8-9 November 2018 (2018, November)

Detailed reference viewed: 59 (14 UL)
Full Text
Peer Reviewed
See detailDeploying Joint Beamforming and Precoding in Multibeam Satellite Networks with Time Variant Traffic
Joroughi, Vahid; Lagunas, Eva UL; Andrenacci, Stefano UL et al

in IEEE Global Conference on Signal and Information Processing (GlobalSIP), Anaheim, California, USA (2018, November)

Detailed reference viewed: 15 (5 UL)
Full Text
Peer Reviewed
See detailDeformation-Based Abnormal Motion Detection using 3D Skeletons
Baptista, Renato UL; Demisse, Girum UL; Aouada, Djamila UL et al

in IEEE International Conference on Image Processing Theory, Tools and Applications (IPTA) (2018, November)

In this paper, we propose a system for abnormal motion detection using 3D skeleton information, where the abnormal motion is not known a priori. To that end, we present a curve-based representation of a ... [more ▼]

In this paper, we propose a system for abnormal motion detection using 3D skeleton information, where the abnormal motion is not known a priori. To that end, we present a curve-based representation of a sequence, based on few joints of a 3D skeleton, and a deformation-based distance function. We further introduce a time-variation model that is specifically designed for assessing the quality of a motion; we refer to a distance function that is based on such a model as~\emph{motion quality distance}. The overall advantages of the proposed approach are 1) lower dimensional yet representative sequence representation and 2) a distance function that emphasizes time variation, the motion quality distance, which is a particularly important property for quality assessment. We validate our approach using a publicly available dataset, SPHERE-StairCase2014 dataset. Qualitative and quantitative results show promising performance. [less ▲]

Detailed reference viewed: 49 (4 UL)
Full Text
Peer Reviewed
See detailEfficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers
Cheng, Hao UL; Dinu, Daniel; Groszschädl, Johann UL

in Lanet, Jean-Louis; Toma, Cristian (Eds.) Innovative Security Solutions for Information Technology and Communications, 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers (2018, November)

SHA-512 is a member of the SHA-2 family of cryptographic hash algorithms that is based on a Davies-Mayer compression function operating on eight 64-bit words to produce a 512-bit digest. It provides ... [more ▼]

SHA-512 is a member of the SHA-2 family of cryptographic hash algorithms that is based on a Davies-Mayer compression function operating on eight 64-bit words to produce a 512-bit digest. It provides strong resistance to collision and preimage attacks, and is assumed to remain secure in the dawning era of quantum computers. However, the compression function of SHA-512 is challenging to implement on small 8 and 16-bit microcontrollers because of their limited register space and the fact that 64-bit rotations are generally slow on such devices. In this paper, we present the first highly-optimized Assembler implementation of SHA-512 for the ATmega family of 8-bit AVR microcontrollers. We introduce a special optimization technique for the compression function based on a duplication of the eight working variables so that they can be more efficiently loaded from RAM via the indirect addressing mode with displacement (using the ldd and std instruction). In this way, we were able to achieve high performance without unrolling the main loop of the compression function, thereby keeping the code size small. When executed on an 8-bit AVR ATmega128 microcontroller, the compression function takes slightly less than 60k clock cycles, which corresponds to a compression rate of roughly 467 cycles per byte. The binary code size of the full SHA-512 implementation providing a standard Init-Update-Final (IUF) interface amounts to approximately 3.5 kB. [less ▲]

Detailed reference viewed: 48 (8 UL)
Full Text
See detailCréer des liens entre les formations d'enseignant et de travailleur social pour favoriser les liens professionnels ultérieurs
Dujardin, Céline UL; Poncelet, Débora UL

in Sulova, Lenka; Pourtois, Jean-Pierre; Desmet, Huguette (Eds.) et al La qualité de vie de l'enfant aujourd'hui (2018, November)

La plupart des enfants d’aujourd’hui fréquentent plusieurs institutions éducatives en dehors de la famille. Au Luxembourg, il s’agit d’abord de la maison relais qui est destinée à prendre le relais entre ... [more ▼]

La plupart des enfants d’aujourd’hui fréquentent plusieurs institutions éducatives en dehors de la famille. Au Luxembourg, il s’agit d’abord de la maison relais qui est destinée à prendre le relais entre l’école et la famille dans le but de permettre aux parents à mieux concilier la vie professionnelle et la vie familiale. Ensuite, d’autres institutions éducatives s’ajoutent à la prise en charge de l’enfant, notamment en cas de difficultés d’apprentissage qui nécessitent une prise en charge professionnelle extrascolaire ou en cas de difficultés liées au parent qui sera accompagné par un service d’assistance en famille et de soutien à la parentalité. L’Université du Luxembourg offre avec son Bachelor en Sciences de l’Education la formation des enseignants ainsi qu’avec son Bachelor en Sciences Sociales et Educatives la formation des travailleurs sociaux. Dans le but d’approcher les deux formations sur leurs points communs et leurs similitudes, nous constatons de plus en plus l’importance de ces liens. Les liens entre les deux formations réfèrent aux liens professionnels ultérieurs, primordiaux pour la co-éducation école-famille-communauté. Dans le cours universitaire « relations école-famille », nous avons mené une première expérience en automne 2016 avec les futurs enseignants en intégrant les autres institutions éducatives dans les relations école-famille afin de sensibiliser les futurs enseignants aux enfants et familles en difficulté. Pour finir, cette expérience dans la formation universitaire est confrontée aux conceptions de réflexion et d’attitude professionnelle de ces professions relationnelles. [less ▲]

Detailed reference viewed: 31 (7 UL)
Full Text
See detailIndustry 4.0 – Implementation of an automated assembly line in a wooden modular house production plant: The case Leko Labs
de Vincenzo, Vincenzo UL; Hichri, Bassem UL; Plapper, Peter UL

in De vincenzo, Vincenzo; Hichri, Bassem; Plapper, Peter (Eds.) Robotix-Academy Conference for Industrial Robotics (RACIR) 2018 (2018, November)

Detailed reference viewed: 66 (1 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon; Albert, Richard; Fotiadou, Alkmene (Eds.) The Law and Legitimacy of Imposed Constitutions (2018, November)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 127 (7 UL)
Full Text
Peer Reviewed
See detailAdvancing the Security of Trustworthy Self-IoT (Position Paper)
Msadek, Mohamed Nizar UL; Soua, Ridha UL; Ladid, Latif UL et al

in International Conference on Smart Applications, Communications and Networking (SmartNets) (2018, November)

The Internet of Things (IoT) encompasses many aspects of our daily life, from connected homes and cities through connected vehicles and roads to devices that collaborate independently to achieve a ... [more ▼]

The Internet of Things (IoT) encompasses many aspects of our daily life, from connected homes and cities through connected vehicles and roads to devices that collaborate independently to achieve a specific purpose. Being an example of a largescale self-organizing systems, the IoT should present imperative properties such as autonomy and trustworthiness. However, compared to classical self-organizing systems, IoT has intrinsic characteristics (wide deployment, resource constraints, uncertain environment, etc.) that open up several security challenges. These challenges cannot be solved by existing Autonomic and Organic Computing techniques and therefore new techniques adapted to self-organizing IoT, (that we call Self-IoT) peculiarities are needed. To this end, this paper studies related work in the area of self-organizing IoT, identifies and describes the key research challenges for trustworthy secure Self-IoT and proposes new and tailored existing solutions. [less ▲]

Detailed reference viewed: 197 (14 UL)
Full Text
Peer Reviewed
See detailForward Secrecy for SPAKE2
Lopez Becerra, José Miguel UL; Ostrev, Dimiter UL; Skrobot, Marjan

in Baek, Joonsang; Willy, Susilo (Eds.) Provable Security (2018, October 25)

Currently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdalla and Pointcheval (CT-RSA 2005) is being considered by the IETF for standardization and integration in TLS 1.3 ... [more ▼]

Currently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdalla and Pointcheval (CT-RSA 2005) is being considered by the IETF for standardization and integration in TLS 1.3. Although it has been proven secure in the Find-then-Guess model of Bellare, Pointcheval and Rogaway (EUROCRYPT 2000), whether it satisfies some notion of forward secrecy remains an open question. In this work, we prove that the SPAKE2 protocol satisfies the so-called weak forward secrecy introduced by Krawczyk (CRYPTO 2005). Furthermore, we demonstrate that the incorporation of key-confirmation codes in SPAKE2 results in a protocol that provably satisfies the stronger notion of perfect forward secrecy. As forward secrecy is an explicit requirement for cipher suites supported in the TLS handshake, we believe this work could fill the gap in the literature and facilitate the adoption of SPAKE2 in the recently approved TLS 1.3. [less ▲]

Detailed reference viewed: 42 (9 UL)
Full Text
Peer Reviewed
See detailPrésences de souverains dans l'espace du "regnum Lotharii": Itinéraires, lieux de pouvoir et fidélités "Lotharingiennes" (869-936)
Pettiau, Hérold UL

in Pettiau, Hérold; Margue, Michel (Eds.) La Lotharingie en question. Identités, oppositions, intégration. LOtharingische Identitäten im Spannungsfeld zwischen integrativen und partikularen Kräften. Actes des 14es Journées Lotharingiennes (2018, October 25)

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailSoLeMiO: Semantic Integration of Learning Material in Office
Grevisse, Christian UL; Manrique, Rubén; Mariño, Olga et al

in Proceedings of E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2018 (2018, October 15)

Learners throughout different educational levels and study domains use a significant amount of time to consult learning material. In addition to the resources given by their teachers, further information ... [more ▼]

Learners throughout different educational levels and study domains use a significant amount of time to consult learning material. In addition to the resources given by their teachers, further information might be required by the learner. However, leaving the study context to search for related material may lead to distraction or even abandonment of the learning task. Furthermore, traditional learning resources do not foster active learning. In this paper, we present SoLeMiO, a plugin for Office applications, which identifies key concepts in a document and thereby integrates related, heterogeneous resources from an open corpus. We employ concept recognition tools to determine concepts from different domains. Thereupon, resources from different repositories are suggested to the learner and can be consulted from within the current document. Aside from traditional learning resources, active learning is fostered through gamification activities. We showcase the applicability of our approach in multiple disciplines with concrete examples. [less ▲]

Detailed reference viewed: 50 (7 UL)
Full Text
Peer Reviewed
See detailMoonlightBox: Mining Android API Histories for Uncovering Release-time Inconsistencies
Li, Li; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL

in 29th IEEE International Symposium on Software Reliability Engineering (ISSRE) (2018, October)

Detailed reference viewed: 42 (4 UL)
Full Text
Peer Reviewed
See detailEnabling Model Testing of Cyber-Physical Systems
Gonzalez Perez, Carlos Alberto UL; Varmazyar, Mojtaba UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system ... [more ▼]

Applying traditional testing techniques to Cyber-Physical Systems (CPS) is challenging due to the deep intertwining of software and hardware, and the complex, continuous interactions between the system and its environment. To alleviate these challenges we propose to conduct testing at early stages and over executable models of the system and its environment. Model testing of CPSs is however not without difficulties. The complexity and heterogeneity of CPSs renders necessary the combination of different modeling formalisms to build faithful models of their different components. The execution of CPS models thus requires an execution framework supporting the co-simulation of different types of models, including models of the software (e.g., SysML), hardware (e.g., SysML or Simulink), and physical environment (e.g., Simulink). Furthermore, to enable testing in realistic conditions, the co-simulation process must be (1) fast, so that thousands of simulations can be conducted in practical time, (2) controllable, to precisely emulate the expected runtime behavior of the system and, (3) observable, by producing simulation data enabling the detection of failures. To tackle these challenges, we propose a SysML-based modeling methodology for model testing of CPSs, and an efficient SysML-Simulink co-simulation framework. Our approach was validated on a case study from the satellite domain. [less ▲]

Detailed reference viewed: 204 (24 UL)
Full Text
Peer Reviewed
See detailDas Palux-Projekt in Luxemburg: Forschungsdesign und erste Ergebnisse einer Pilotstudie
Eckelt, Melanie UL; Hutmacher, Djenna UL; Steffgen, Georges UL et al

in Bartsch, Fabienne; Mombeck, Mona; Müller, Merle (Eds.) et al Tägliche Herausforderungen meistern - Sportlehrkräfte im Fokus (2018, October)

Detailed reference viewed: 52 (12 UL)
Full Text
Peer Reviewed
See detailSemi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library
Jhawar, Ravi UL; Lounis, Karim UL; Mauw, Sjouke UL et al

in Katsikas, Sokratis; Alcaraz, Cristina (Eds.) Security and Trust Management. STM 2018. (2018, October)

Detailed reference viewed: 28 (3 UL)
Full Text
Peer Reviewed
See detailHITECS: A UML Profile and Analysis Framework for Hardware-in-the-Loop Testing of Cyber Physical Systems
Shin, Seung Yeob UL; Chaouch, Karim UL; Nejati, Shiva UL et al

in Proceedings of ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS’18) (2018, October)

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are ... [more ▼]

Hardware-in-the-loop (HiL) testing is an important step in the development of cyber physical systems (CPS). CPS HiL test cases manipulate hardware components, are time-consuming and their behaviors are impacted by the uncertainties in the CPS environment. To mitigate the risks associated with HiL testing, engineers have to ensure that (1) HiL test cases are well-behaved, i.e., they implement valid test scenarios and do not accidentally damage hardware, and (2) HiL test cases can execute within the time budget allotted to HiL testing. This paper proposes an approach to help engineers systematically specify and analyze CPS HiL test cases. Leveraging the UML profile mechanism, we develop an executable domain-specific language, HITECS, for HiL test case specification. HITECS builds on the UML Testing Profile (UTP) and the UML action language (Alf). Using HITECS, we provide analysis methods to check whether HiL test cases are well-behaved, and to estimate the execution times of these test cases before the actual HiL testing stage. We apply HITECS to an industrial case study from the satellite domain. Our results show that: (1) HITECS is feasible to use in practice; (2) HITECS helps engineers define more complete and effective well-behavedness assertions for HiL test cases, compared to when these assertions are defined without systematic guidance; (3) HITECS verifies in practical time that HiL test cases are well-behaved; and (4) HITECS accurately estimates HiL test case execution times. [less ▲]

Detailed reference viewed: 201 (42 UL)
Full Text
Peer Reviewed
See detailMesophilic and Thermophilic Anaerobic Digestion of Model Kitchen Waste with Variation of Fat Content
Sobon-Muehlenbrock, Elena UL; Greger, Manfred UL; Schlienz, Markus UL

in Mesophilic and Thermophilic Anaerobic Digestion of Model Kitchen Waste with Variation of Fat Content (2018, October)

Synthetic kitchen waste, produced on basis of a real kitchen waste, and two of its variations are studied. Previous study showed that the fermentation of kitchen waste was similar to the degradation of ... [more ▼]

Synthetic kitchen waste, produced on basis of a real kitchen waste, and two of its variations are studied. Previous study showed that the fermentation of kitchen waste was similar to the degradation of synthetic kitchen waste, further called model kitchen waste (MKW) with the same amounts of carbohydrates, fats and proteins. In this study the anaerobic degradation of this MKW (named MKW1; 23 % rapeseed oil) was investigated under mesophilic and thermophilic conditions at 2 different loadings. Additional experiments were performed with lower (MKW2; 14.7 %) and higher (MKW3; 27.2 %) rapeseed oil content at the expense of starch. An organic loading of 5 gVS/l leads to a fast and undisturbed degradation under mesophilic conditions. The volatile fatty acids (mainly acetic acid) appeared only during the first 3 days. Finally the amount of biogas been produced is weakly correlated with the oil content. Under thermophilic conditions the biogas production was retarded and the concentrations of the volatile fatty acids were generally higher whereas acetic acid was present for a period of 10 days. The final biogas amount was higher than compared to mesophilc conditions. At a higher loading of 25 gVS/l a strong retardation of biogas production was observed which correlates with very high concentrations of volatile fatty acids over the whole runtime period of 50 days. [less ▲]

Detailed reference viewed: 44 (10 UL)
Full Text
Peer Reviewed
See detailIoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks
Soua, Ridha UL; Palattella, Maria Rita UL; Engel, Thomas UL

in IoT Application Protocols Optimisation for Future Integrated M2M-Satellite Networks (2018, October)

Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the ... [more ▼]

Satellites are playing a key role in driving the vision for a truly connected world, providing ubiquitous coverage and reliability in places where no other terrestrial technology could. While the potentials of satellites for IoT are well recognised, to allow a smooth integration of M2M and satellite networks, a lot of tweaking and optimising is still required. The M2MSAT project, funded by the European space Agency (ESA) is contributing to fill this gap, investigating optimisations for MQTT and CoAP, identified as IoT Application Protocols suitable for IoT data collection over satellite. This work outlines the efficient configuration of MQTT and CoAP in an integrated M2M-Satellite network, and presents some optimisations, designed taking into account the peculiarities of satellite links. [less ▲]

Detailed reference viewed: 66 (3 UL)
Full Text
Peer Reviewed
See detailModel-Driven Trace Diagnostics for Pattern-based Temporal Specifications
Dou, Wei UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of the 2018 ACM/IEEE 21st International Conference on Model Driven Engineering Languages and Systems (MODELS 2018) (2018, October)

Offline trace checking tools check whether a specification holds on a log of events recorded at run time; they yield a verification verdict (typically a boolean value) when the checking process ends. When ... [more ▼]

Offline trace checking tools check whether a specification holds on a log of events recorded at run time; they yield a verification verdict (typically a boolean value) when the checking process ends. When the verdict is false, a software engineer needs to diagnose the property violations found in the trace in order to understand their cause and, if needed, decide for corrective actions to be performed on the system. However, a boolean verdict may not be informative enough to perform trace diagnostics, since it does not provide any useful information about the cause of the violation and because a property can be violated for multiple reasons. The goal of this paper is to provide a practical and scalable so- lution to solve the trace diagnostics problem, in the settings of model-driven trace checking of temporal properties expressed in TemPsy, a pattern-based specification language. The main contributions of the paper are: a model-driven approach for trace diagnostics of pattern-based temporal properties expressed in TemPsy, which relies on the evaluation of OCL queries on an instance of a trace meta-model; the implementation of this trace diagnostics procedure in the TemPsy-Report tool; the evaluation of the scalability of TemPsy-Report, when used for the diagnostics of violations of real properties derived from a case study of our industrial partner. The results show that TemPsy-Report is able to collect diagnostic information from large traces (with one million events) in less than ten seconds; TemPsy-Report scales linearly with respect to the length of the trace and keeps approximately constant performance as the number of violations increases. [less ▲]

Detailed reference viewed: 70 (6 UL)
Full Text
Peer Reviewed
See detailTUNA: TUning Naturalness-based Analysis
Jimenez, Matthieu UL; Cordy, Maxime UL; Le Traon, Yves UL et al

in 34th IEEE International Conference on Software Maintenance and Evolution, Madrid, Spain, 26-28 September 2018 (2018, September 26)

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have ... [more ▼]

Natural language processing techniques, in particular n-gram models, have been applied successfully to facilitate a number of software engineering tasks. However, in our related ICSME ’18 paper, we have shown that the conclusions of a study can drastically change with respect to how the code is tokenized and how the used n-gram model is parameterized. These choices are thus of utmost importance, and one must carefully make them. To show this and allow the community to benefit from our work, we have developed TUNA (TUning Naturalness-based Analysis), a Java software artifact to perform naturalness-based analyses of source code. To the best of our knowledge, TUNA is the first open- source, end-to-end toolchain to carry out source code analyses based on naturalness. [less ▲]

Detailed reference viewed: 76 (10 UL)
Full Text
Peer Reviewed
See detailKnowledge Graph-based Teacher Support for Learning Material Authoring
Grevisse, Christian UL; Manrique, Rubén; Mariño, Olga et al

in Advances in Computing - CCC 2018 (2018, September 26)

Preparing high-quality learning material is a time-intensive, yet crucial task for teachers of all educational levels. In this paper, we present SoLeMiO, a tool to recommend and integrate learning ... [more ▼]

Preparing high-quality learning material is a time-intensive, yet crucial task for teachers of all educational levels. In this paper, we present SoLeMiO, a tool to recommend and integrate learning material in popular authoring software. As teachers create their learning material, SoLeMiO identifies the concepts they want to address. In order to identify relevant concepts in a reliable, automatic and unambiguous way, we employ state of the art concept recognition and entity linking tools. From the recognized concepts, we build a semantic representation by exploiting additional information from Open Knowledge Graphs through expansion and filtering strategies. These concepts and the semantic representation of the learning material support the authoring process in two ways. First, teachers will be recommended related, heterogeneous resources from an open corpus, including digital libraries, domain-specific knowledge bases, and MOOC platforms. Second, concepts are proposed for semi-automatic tagging of the newly authored learning resource, fostering its reuse in different e-learning contexts. Our approach currently supports resources in English, French, and Spanish. An evaluation of concept identification in lecture video transcripts and a user study based on the quality of tag and resource recommendations yielded promising results concerning the feasibility of our technique. [less ▲]

Detailed reference viewed: 47 (15 UL)
Full Text
Peer Reviewed
See detailSparsity-Aided Low-Implementation cost based On-Board beamforming Design for High Throughput Satellite Systems
Bandi, Ashok UL

in Bandi, Ashok; Joroughi, Vahid; Shankar, Bhavani (Eds.) et al 9th Advanced Satellite Multimedia Systems Conference (ASMS) and 15th Signal Processing for Space Communications Workshop (SPSC),Berlin, Sept. 10-12, 2018 (2018, September 10)

Detailed reference viewed: 32 (3 UL)
Full Text
Peer Reviewed
See detailComparison of Design Codes for Composite Beams of Steel and Concrete in Europe and China
Zhang, Qingjie UL; Schäfer, Markus UL; Santos-Ferreira, Katia

in 12th Japanese-German Bridge Symposium (2018, September 04)

The comparison gives an overview of the codes for the design of composite structures for buildings. Thereby the history, developments and general structures are illustrated first. Eurocode 4 (EN1994) is a ... [more ▼]

The comparison gives an overview of the codes for the design of composite structures for buildings. Thereby the history, developments and general structures are illustrated first. Eurocode 4 (EN1994) is a part of the Eurocodes, which are European harmonized design codes for buildings and bridges. In this paper, the equivalent Chinese codes are compared to the structure and contents of Eurocodes. EN1994-1-1, which is the first part of Eurocode 4 for general buildings, and JGJ138-2016 have similar design scopes, both cover topics of composite beams, columns, slabs, and connections. JGJ138-2016 also covers the design of composite shear walls and seismic design, while EN1994-1-1 considers more about durability and time effects. For the more technical comparison, the general design bases such as safety concept and design action effects are alike. The material property values by the two codes are mostly similar except for concrete. For structural members, the focus here is mainly on the comparison of composite beams in steel and concrete. The comparisons are explained with the help of parameter studies and theoretical comparisons. [less ▲]

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailParticularities for plastic design of composite beams with deep plastic neutral axis
Schäfer, Markus UL; Zhang, Qingjie UL

in 12th Japanese-German Bridge Symposium (2018, September 04)

The demand for sustainable constructions increases the importance of composite structures as they lead to slim and economical solutions with a low self-weight of the structure. The determination of the ... [more ▼]

The demand for sustainable constructions increases the importance of composite structures as they lead to slim and economical solutions with a low self-weight of the structure. The determination of the moment resistance for composite beams follows the rules stated in EN 1994-1-1. Based on the slenderness c/t of the compressed parts of the steel-section, composite cross-sections are classified into four cross-section classes. This classification indirectly reflects the rotation capacity and susceptibility to local buckling. For class 1 and 2 cross-sections, the plastic moment resistance of the crosssection may be considered. Otherwise, an elastic design (for class 3) or an elastic design considering local buckling effects (for class 4) is necessary. If the plastic resistance of the cross-section is assumed, it is considered that each cross-section fibre may plastify without limitation of the strain values. For normal composite beams subjected to the sagging moments and with a high plastic neutral axis, the real moment resistance is quite greater than one obtained by the method of the plastic design. For sections with a large compression zone, xpl, a concrete failure in the compression zone can happen before the plastic moment resistance of the composite cross-section, Mpl,Rd, is reached. Strain limit design, therefore, becomes critical. EN 1994-1-1 provides a limitation of the plastic design resistance only for sections with steel grades S420 and S460. However, there is no guidance given for lower steel grades or the determination of the corresponding concrete compression force. This paper points out, that the rotation capacity of a composite section is dependent on the slenderness of steel crosssection parts and on the behaviour of the concrete part. A comparison of plastic and strain limited moment resistances as well as the analysis of partial shear diagram-based strain limited design results in new findings for the limits of plastic design methods. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailVulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks
Gerard, Benjamin; Bezzaoucha, Souad UL; Voos, Holger UL et al

in Vulnerability Analysis of Cyber Physical Systems under False-Data injection and disturbance attacks (2018, September)

In the present paper, the problem of attacks on cyber-physical systems via networked control system (NCS) subject to unmeasured disturbances is considered. The geometric approach is used to evaluate the ... [more ▼]

In the present paper, the problem of attacks on cyber-physical systems via networked control system (NCS) subject to unmeasured disturbances is considered. The geometric approach is used to evaluate the security and vulnerability level of the controlled system. The presented work deals with the so-called false data injection attacks and shows how imperfectly known disturbances can be used to perform undetectable, or at least stealthy, attacks that can make the NCS vulnerable to attacks from malicious outsiders. A numerical example is given to illustrate the approach. [less ▲]

Detailed reference viewed: 29 (3 UL)
Full Text
Peer Reviewed
See detailOntology Coverage Tool and Document Browser for Learning Material Exploration
Grevisse, Christian UL; Meder, Jeff Alphonse Antoine UL; Botev, Jean UL et al

in 2018 Thirteenth International Conference on Digital Information Management (ICDIM) (2018, September)

Document collections in e-learning can cause issues to both learners and teachers. On one hand, inquiry from the vast corpus of available resources is non-trivial without adequate formulation support and ... [more ▼]

Document collections in e-learning can cause issues to both learners and teachers. On one hand, inquiry from the vast corpus of available resources is non-trivial without adequate formulation support and semantic information. Implicit links between documents are hardly understood without a proper visualization. On the other hand, it is difficult for teachers to keep track of the topics covered by a large collection. In this paper, we present an ontology coverage tool and document browser for learning material exploration. Both learners and teachers can benefit from a visualization of an ontology and the documents related to the comprised concepts, overcoming the limitations of traditional file explorers. Guiding users through a visual query process, learners can quickly pinpoint relevant learning material. The visualization, which has been implemented as a web application using the D3.js JavaScript library, can be integrated into different e-learning applications to further enhance the workflow of learners. Finally, teachers are provided an overview of topic coverage within the collection. [less ▲]

Detailed reference viewed: 57 (8 UL)
Full Text
See detailInternationale Besteuerung der digitalen Wirtschaft: EU- und OECD-Vorschläge
Sinnig, Julia UL

in Taeger, Jürgen (Ed.) Tagungsband Herbstakademie 2018: Rechtsfragen digitaler Transformationen - Gestaltung digitaler Veränderungsprozesse durch Recht (2018, September)

Im März 2018 stellten sowohl die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) als auch die Europäische Union (EU) Zwischenergebnisse ihrer Arbeit im Bereich der ... [more ▼]

Im März 2018 stellten sowohl die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) als auch die Europäische Union (EU) Zwischenergebnisse ihrer Arbeit im Bereich der Ertragsbesteuerung digitalisierter Geschäftsaktivitäten vor. Während die OECD keine konkrete Empfehlung zur Anpassung bestehender Vorschriften des internationalen Steuerrechts aussprach, stellte die Europäische Kommission sowohl eine langfristige Maßnahme – eine Anpassung des Betriebsstättenkonzepts zugunsten einer sog. signifikanten digitalen Präsenz – als auch einen kurzfristigen Besteuerungsvorschlag – eine sog. Digitalsteuer – vor. Dieser Beitrag knüpft an den Vortrag der Verfasserin in Heidelberg anlässlich der Herbstakademie 2017 an. [less ▲]

Detailed reference viewed: 312 (10 UL)
Full Text
Peer Reviewed
See detailAutomated Identification of Desynchronisation Attacks on Shared Secrets
Mauw, Sjouke UL; Smith, Zachary Daniel UL; Toro Pozo, Jorge Luis UL et al

in Automated Identification of Desynchronisation Attacks on Shared Secrets (2018, September)

Key-updating protocols are a class of communication protocol that aim to increase security by having the participants change encryption keys between protocol executions. However, such protocols can be ... [more ▼]

Key-updating protocols are a class of communication protocol that aim to increase security by having the participants change encryption keys between protocol executions. However, such protocols can be vulnerable to desynchronisation attacks, a denial of service attack in which the agents are tricked into updating their keys improperly, so that they are no longer able to communicate. In this work we introduce a method that can be used to automatically verify (or falsify) resistance to desynchronisation attacks for a range of protocols. This approach is then used to identify previously unreported vulnerabilities in two published RFID grouping protocols. [less ▲]

Detailed reference viewed: 37 (6 UL)
Full Text
Peer Reviewed
See detailModel-driven Run-time Enforcement of Complex Role-based Access Control Policies
Ben Fadhel, Ameni UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceeding of the 2018 33rd ACM/IEEE International Conference on Automated Software Engineering (ASE ’18) (2018, September)

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several ... [more ▼]

A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform an operation, according to authorization policies which are defined on the user’s role within an enterprise. Several models have been proposed to specify complex RBAC policies. However, existing approaches for policy enforcement do not fully support all the types of policies that can be expressed in these models, which hinders their adoption among practitioners. In this paper we propose a model-driven enforcement framework for complex policies captured by GemRBAC+CTX, a comprehensive RBAC model proposed in the literature. We reduce the problem of making an access decision to checking whether a system state (from an RBAC point of view), expressed as an instance of the GemRBAC+CTX model, satisfies the constraints corresponding to the RBAC policies to be enforced at run time. We provide enforcement algorithms for various types of access requests and events, and a prototype tool (MORRO) implementing them. We also show how to integrate MORRO into an industrial Web application. The evaluation results show the applicability of our approach on a industrial system and its scalability with respect to the various parameters characterizing an AC configuration. [less ▲]

Detailed reference viewed: 132 (19 UL)
Full Text
Peer Reviewed
See detailAn Imperialist Competitive Algorithm for a Real-World Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 23rd IEEE International Conference on Emerging Technologies and Factory Automation, Torino, Italy, September 4-7, 2018 (2018, September)

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these ... [more ▼]

Traditional planning and scheduling techniques still hold important roles in modern smart scheduling systems. Realistic features present in modern manufacturing systems need to be incorporated into these techniques. The real-world problem addressed here is an extension of flexible job shop scheduling problem and is issued from the modern printing and boarding industry. The precedence between operations of each job is given by an arbitrary directed acyclic graph rather than a linear order. In this paper, we extend the traditional FJSP solutions representation to address the parallel operations. We propose an imperialist competitive algorithm for the problem. Several instances are used for the experiments and the results show that, for the considered instances, the proposed algorithm is faster and found better or equal solutions compared to the state-of-the-art algorithms. [less ▲]

Detailed reference viewed: 115 (26 UL)
Full Text
Peer Reviewed
See detailRevisiting Gaussian Mixture Models for Driver Identification
Jafarnejad, Sasan UL; Castignani, German UL; Engel, Thomas UL

in Proceedings of IEEE International Conference on Vehicular Electronics and Safety (ICVES) (ICVES 2018) (2018, September)

The increasing penetration of connected vehicles nowadays has enabled driving data collection at a very large scale. Many telematics applications have been also enabled from the analysis of those datasets ... [more ▼]

The increasing penetration of connected vehicles nowadays has enabled driving data collection at a very large scale. Many telematics applications have been also enabled from the analysis of those datasets and the usage of Machine Learning techniques, including driving behavior analysis predictive maintenance of vehicles, modeling of vehicle health and vehicle component usage, among others. In particular, being able to identify the individual behind the steering wheel has many application fields. In the insurance or car-rental market, the fact that more than one driver make use of the vehicle generally triggers extra fees for the contract holder. Moreover being able to identify different drivers enables the automation of comfort settings or personalization of advanced driver assistance (ADAS) technologies. In this paper, we propose a driver identification algorithm based on Gaussian Mixture Models (GMM). We show that only using features extracted from the gas pedal position and steering wheel angle signals we are able to achieve near 100 accuracy in scenarios with up to 67 drivers. In comparison to the state-of-the-art, our proposed methodology has lower complexity, superior accuracy and offers scalability to a larger number of drivers. [less ▲]

Detailed reference viewed: 45 (10 UL)
Full Text
Peer Reviewed
See detailExperimental validation of adaptive control for a Shape Memory Alloy actuated lightweight robotic arm
Quintanar Guzman, Serket UL; Kannan, Somasundar UL; Voos, Holger UL et al

in ASME 2018 Conferences on Smart Materials, Adaptive Structures and Intelligent Systems, San Antonio 10-12 September 2018 (2018, September)

This article presents the experimental validation of a Direct Adaptive Control for angular position regulation of a lightweight robotic arm. The robotic arm is single degree-of-freedom (DOF) system ... [more ▼]

This article presents the experimental validation of a Direct Adaptive Control for angular position regulation of a lightweight robotic arm. The robotic arm is single degree-of-freedom (DOF) system, actuated by two Shape Memory Alloy (SMA) wires. The proposed adaptive control is capable of adapting itself to the hysteretic behavior of SMA wires and update its behavior to deal with the changing parameters of the material over time. The closed-loop approach is tested experimentally showing its effectiveness to deal with the highly nonlinear dynamics of the SMA wires. These results are discussed and compared with a classical control approach. The updated design and hardware development and modeling of the robotic arm are shown. [less ▲]

Detailed reference viewed: 35 (5 UL)
Full Text
Peer Reviewed
See detailModellierung und Validierung von Simulationsansätzen für die aussenliegende Lufttemperierung
Schmidt, Christoph Wilhelm; Scholzen, Frank UL; Maas, Stefan UL et al

in Tagungsband BauSim 2018 (2018, September)

Detailed reference viewed: 12 (0 UL)