References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailThe competence to conclude the new generation of free trade agreements: lessons from Opinion 2/15
Neframi, Eleftheria UL

in Chaisse, Julien (Ed.) China-European Union Investment Relationships (in press)

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU ... [more ▼]

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU-only agreement, or a mixed agreement, jointly by the Union and its Member States. The Court of Justice of the European Union held that the EU competence to conclude the EUSFTA is not exclusive, as long as provisions concerning non-direct investments and dispute settlement fall under the shared competence of the Union and its Member States. The Court of Justice made valuable contributions to the interpretation of the scope of the Union’s competence in the field of common commercial policy, comprising sustainable development provisions, as well as to the interpretation of implied external competences, and clarified the status of non-substantive provisions. However, uncertainty remains as far as the meaning and the impact of a shared competence are concerned. [less ▲]

Detailed reference viewed: 63 (6 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 47 (9 UL)
See detailEntwicklungen der sexualwissenschaftlichen und rechtlichen Debatten zu Transsexualität und deren Verschränkungen in der Bundesrepublik Deutschland (1960er Jahre bis 1980)
De Silva, Adrian UL

in 'Auf nach Casablanca?' Lebensrealitäten transgeschlechtlicher Menschen zwischen 1945-1980 (in press)

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 106 (11 UL)
Full Text
Peer Reviewed
See detailUne cour constitutionnelle différente des autres. Etendue, raisons & avenir de l'originalité de la Cour constitutionnelle luxembourgeoise
Heuschling, Luc UL

in Gerkrath, Jörg (Ed.) Les 20 ans de la Cour Constitutionnelle: trop jeune pour mourir? (in press)

Detailed reference viewed: 60 (6 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon (Ed.) ‘Imposed Constitutions: Aspects of Imposed Constitutionalism’ (in press)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 48 (4 UL)
Full Text
See detailKommunale Selbstinszenierung im vorstädtischen Raum. Ein neuer Blick auf Leprosorien des Spätmittelalters und der frühen Neuzeit
Uhrmacher, Martin UL

in Hesse, Christian; Schulte, Daniela; Stercken, Martina (Eds.) Kommunale Selbstinszenierung (in press)

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical ... [more ▼]

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical Perspectives' Universität Zürich, 3./4./5. September 2015 Martin Uhrmacher (Universität Luxemburg) „Leprosorien als kommunale Repräsentationsbauten im vorstädtischen Raum. Ein neuer Blick auf eine bisher wenig beachtete städtische Baugattung“ Die vor den Mauern mittelalterlicher und frühneuzeitlicher Städte gelegenen Leprosorien werden heute zumeist noch immer als abgelegene und verborgene Orte der Exklusion angesehen, durch Zäune und Mauern von der Außenwelt getrennt. Dementsprechend wird auch der Baugattung „Leprosorium“ nur wenig architektonischer Wert zugebilligt, wie bspw. im Ausstellungskatalog „Aussatz – Lepra – Hansen-Krankheit: Demnach hatten sie „keinerlei repräsentative Bedeutung, im Gegenteil: eher unauffällig sollten sie sein, verborgen vor dem Blick der Stadtbewohner und Reisenden“. Im 2005 von Monika Escher und Frank G. Hirschmann publizierten Syntheseband „Die urbanen Zentren des hohen und späten Mittelalters“ zur Geschichte mittelalterlicher Städte zwischen Rhein und Maas werden Leprosorien zudem als „nicht wertungsrelevantes“ Urbanitäts- und Zentralitätskriterium“ bezeichnet; begründet mit der angeblichen „Tatsache, daß in der Regel der topographische Bezug zur Stadt gering war“. In der jüngeren Forschung hat sich diese Einschätzung nun grundlegend gewandelt. Leprosorien gelten aufgrund ihrer besonders prominent und exponiert ausgewählten Standorte an Kreuzungen, Brücken und Hauptausfallstraßen als präsente und das städtische Umland prägende kommunale Einrichtungen, die ein fester Bestandteil der städtischen Lebenswelt waren. Sie dienten nicht dazu, ihre Bewohner zu verstecken, sondern waren vielmehr mit Stiftungen und Spenden versehene städtische Einrichtungen, die vom Rat und den Bürgern auch als Prestigeobjekte betrachtet wurden. Anhand ausgewählter Beispiele wird aufgezeigt, wie Leprosorien als Repräsentationsobjekte der Stadtgemeinden auch dem bürgerlichen Selbstverständnis Ausdruck verliehen. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 250 (3 UL)
Full Text
See detailNeue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)
Uhrmacher, Martin UL

in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) et al Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. Tagung und Workshop zum 200. Jahrestag des Abschlusses des Wiener Kongresses (in press)

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress ... [more ▼]

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Vortrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen Luxemburg und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailComparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL et al

in Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers (in press)

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to ... [more ▼]

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances while recommending cloud services to the cloud users, using all available data. In this paper, we compare our two approaches to do so: a min-max-min decomposition based on Intuitionistic Fuzzy Logic (IFL) and a Performance Heat Map technique, to evaluate the performance of commercially available cloud providers. While the IFL technique provides simple, total order of the evaluated CSPs, Performance Heat Map provides transparent and explanatory, yet consistent evaluation of service performance of commercially available CSPs. The identified drawbacks of the IFL technique are: 1) It does not return the accurate performance evaluation over multiple decision alternatives due to highly influenced by critical feedback of the evaluators; 2) Overall ranking of the CSPs is not as expected according to the performance measurement. As a result, we recommend to use performance Heat Map for this problem. [less ▲]

Detailed reference viewed: 72 (14 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 60 (3 UL)
Full Text
Peer Reviewed
See detailAn Investigation of Compression Techniques to Speed up Mutation Testing
Zhu; Panichella, Annibale UL; Zaidman, Andy

in 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (in press)

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]

Detailed reference viewed: 91 (15 UL)
Full Text
Peer Reviewed
See detailNew Directions in Attack Tree Research: Catching up with Industrial Needs
Gadyatskaya, Olga UL; Trujillo Rasua, Rolando UL

in Mauw, Sjouke (Ed.) Proceedings of the 4th International Workshop on Graphical Models for Security (in press)

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal ... [more ▼]

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal mathematical frameworks for analyzing them in a qualitative or a quantitative manner. Indeed, the mathematical frameworks have become a large focus of attack tree research. However, practical applications of attack trees in industry largely remain a tedious and error-prone exercise. Recent research directions in attack trees, such as attack tree generation, attempt to close this gap and to improve the attack tree state-of-thepractice. In this position paper we outline the recurrent challenges in manual tree design within industry, and we overview the recent research results in attack trees that help the practitioners. For the challenges that have not yet been addressed by the community, we propose new promising research directions. [less ▲]

Detailed reference viewed: 58 (3 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 150 (6 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 104 (6 UL)
Full Text
Peer Reviewed
See detailNo Random, No Ransom: A Key to Stop Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

in Proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2018) (in press)

Detailed reference viewed: 40 (4 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 26 (1 UL)
Full Text
Peer Reviewed
See detailParallel and hybrid soft-thresholding algorithms with line search for sparse nonlinear regression
Yang, Yang UL; Pesavento, Marius; Chatzinotas, Symeon UL et al

in Proc. 26th European Signal Processing Conference (2018, September)

Detailed reference viewed: 82 (10 UL)
Full Text
Peer Reviewed
See detailSuccessive convex approximation algorithms for sparse signal estimation with nonconvex regularizations
Yang, Yang UL; Pesavento, Marius; Chatzinotas, Symeon UL et al

in Proc. The 10th IEEE Sensor Array and Multichannel Signal Processing Workshop (2018, July)

Detailed reference viewed: 94 (10 UL)
Full Text
Peer Reviewed
See detailTest Case Prioritization for Acceptance Testing of Cyber Physical Systems: A Multi-Objective Search-Based Approach
Shin, Seung Yeob UL; Nejati, Shiva UL; Sabetzadeh, Mehrdad UL et al

in Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'18) (2018, July)

Acceptance testing validates that a system meets its requirements and determines whether it can be sufficiently trusted and put into operation. For cyber physical systems (CPS), acceptance testing is a ... [more ▼]

Acceptance testing validates that a system meets its requirements and determines whether it can be sufficiently trusted and put into operation. For cyber physical systems (CPS), acceptance testing is a hardware-in-the-loop process conducted in a (near-)operational environment. Acceptance testing of a CPS often necessitates that the test cases be prioritized, as there are usually too many scenarios to consider given time constraints. CPS acceptance testing is further complicated by the uncertainty in the environment and the impact of testing on hardware. We propose an automated test case prioritization approach for CPS acceptance testing, accounting for time budget constraints, uncertainty, and hardware damage risks. Our approach is based on multi-objective search, combined with a test case minimization algorithm that eliminates redundant operations from an ordered sequence of test cases. We evaluate our approach on a representative case study from the satellite domain. The results indicate that, compared to test cases that are prioritized manually by satellite engineers, our automated approach more than doubles the number of test cases that fit into a given time frame, while reducing to less than one third the number of operations that entail the risk of damage to key hardware components. [less ▲]

Detailed reference viewed: 51 (4 UL)
Full Text
Peer Reviewed
See detailHighway Network Block with Gates Constraints for Training Very Deep Networks
Oyedotun, Oyebade UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in 2018 IEEE International Conference on Computer Vision and Pattern Recognition Workshop, June 18-22, 2018 (2018, June 19)

In this paper, we propose to reformulate the learning of the highway network block to realize both early optimization and improved generalization of very deep networks while preserving the network depth ... [more ▼]

In this paper, we propose to reformulate the learning of the highway network block to realize both early optimization and improved generalization of very deep networks while preserving the network depth. Gate constraints are duly employed to improve optimization, latent representations and parameterization usage in order to efficiently learn hierarchical feature transformations which are crucial for the success of any deep network. One of the earliest very deep models with over 30 layers that was successfully trained relied on highway network blocks. Although, highway blocks suffice for alleviating optimization problem via improved information flow, we show for the first time that further in training such highway blocks may result into learning mostly untransformed features and therefore a reduction in the effective depth of the model; this could negatively impact model generalization performance. Using the proposed approach, 15-layer and 20-layer models are successfully trained with one gate and a 32-layer model using three gates. This leads to a drastic reduction of model parameters as compared to the original highway network. Extensive experiments on CIFAR-10, CIFAR-100, Fashion-MNIST and USPS datasets are performed to validate the effectiveness of the proposed approach. Particularly, we outperform the original highway network and many state-ofthe- art results. To the best our knowledge, on the Fashion-MNIST and USPS datasets, the achieved results are the best reported in literature. [less ▲]

Detailed reference viewed: 43 (2 UL)
Peer Reviewed
See detailPose Encoding for Robust Skeleton-Based Action Recognition
Demisse, Girum UL; Papadopoulos, Konstantinos UL; Aouada, Djamila UL et al

in CVPRW: Visual Understanding of Humans in Crowd Scene, Salt Lake City, Utah, June 18-22, 2018 (2018, June 18)

Some of the main challenges in skeleton-based action recognition systems are redundant and noisy pose transformations. Earlier works in skeleton-based action recognition explored different approaches for ... [more ▼]

Some of the main challenges in skeleton-based action recognition systems are redundant and noisy pose transformations. Earlier works in skeleton-based action recognition explored different approaches for filtering linear noise transformations, but neglect to address potential nonlinear transformations. In this paper, we present an unsupervised learning approach for estimating nonlinear noise transformations in pose estimates. Our approach starts by decoupling linear and nonlinear noise transformations. While the linear transformations are modelled explicitly the nonlinear transformations are learned from data. Subsequently, we use an autoencoder with L2-norm reconstruction error and show that it indeed does capture nonlinear noise transformations, and recover a denoised pose estimate which in turn improves performance significantly. We validate our approach on a publicly available dataset, NW-UCLA. [less ▲]

Detailed reference viewed: 46 (16 UL)
Full Text
Peer Reviewed
See detailCarrier Allocation for 5G Integrated Satellite-Terrestrial Backhaul Networks
Lagunas, Eva UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in International Conference on Communications (ICT), Saint-Malo, France, June 2018. (2018, June)

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailORBIT - Overcoming Breakdowns in Teams with Interactive Tabletops
Sunnen, Patrick UL; Arend, Béatrice UL; Maquil, Valérie

in Kay, Judy; Luckin, Rose (Eds.) Rethinking learning in the digital age: Making the Learning Sciences count (2018, June)

ORBIT implements and studies a joint problem-solving activity at an interactive tabletop providing participants with the opportunity to develop their collaboration methods by jointly overcoming breakdowns ... [more ▼]

ORBIT implements and studies a joint problem-solving activity at an interactive tabletop providing participants with the opportunity to develop their collaboration methods by jointly overcoming breakdowns. The design and the research process relies on user-centered design methods and on an ethnomethodological conversation analytic framework. The project will generate scientific knowledge on participants’ collaboration methods and create a powerful collaborative learning tool. [less ▲]

Detailed reference viewed: 64 (9 UL)
Full Text
Peer Reviewed
See detailA Mathematical Model and a Firefly Algorithm for an Extended Flexible Job Shop Problem with Availability Constraints
Tessaro Lunardi, Willian UL; Cherri, Luiz Henrique; Voos, Holger UL

in 17th International Conference on Artificial Intelligence and Soft Computing, Zakopane, Poland, June 3-7, 2018 (2018, June)

Manufacturing scheduling strategies have historically ignored the availability of the machines. The more realistic the schedule, more accurate the calculations and predictions. Availability of machines ... [more ▼]

Manufacturing scheduling strategies have historically ignored the availability of the machines. The more realistic the schedule, more accurate the calculations and predictions. Availability of machines will play a crucial role in the Industry 4.0 smart factories. In this paper, a mixed integer linear programming model (MILP) and a discrete firefly algorithm (DFA) are proposed for an extended multi-objective FJSP with availability constraints (FJSP-FCR). Several standard instances of FJSP have been used to evaluate the performance of the model and the algorithm. New FJSP-FCR instances are provided. Comparisons among the proposed methods and other state-of-the-art reported algorithms are also presented. Alongside the proposed MILP model, a Genetic Algorithm is implemented for the experiments with the DFA. Extensive investigations are conducted to test the performance of the proposed model and the DFA. The comparisons between DFA and other recently published algorithms shows that it is a feasible approach for the stated problem. [less ▲]

Detailed reference viewed: 60 (7 UL)
Full Text
Peer Reviewed
See detailPOSTER: WLAN Device Fingerprinting using Channel State Information (CSI)
Adamsky, Florian UL; Retunskaia, Tatiana UL; Schiffner, Stefan UL et al

in 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) (2018, June)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailLes bourgeois de Bohême et l’impossible légitimation ? La conjuration de Prague et de Kutná Hora de février 1309
Vomacka, Eloïse UL

in Contester au Moyen Âge : de la désobéissance à la révolte (2018, May 23)

Detailed reference viewed: 23 (1 UL)
Full Text
Peer Reviewed
See detailTime to Clean Your Test Objectives
Marcozzi, Michaël; Bardin, Sébastien; Kosmatov, Nikolai et al

in 40th International Conference on Software Engineering, May 27 - 3 June 2018, Gothenburg, Sweden (2018, May)

Detailed reference viewed: 30 (1 UL)
Full Text
Peer Reviewed
See detailHigh-Precision Design of Pedestrian Mobility for Smart City Simulators
Vitello, Piergiorgio; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 2018 (2018, May)

The unprecedented growth of the population living in urban environments calls for a rational and sustainable urban development. Smart cities can fill this gap by providing the citizens with high-quality ... [more ▼]

The unprecedented growth of the population living in urban environments calls for a rational and sustainable urban development. Smart cities can fill this gap by providing the citizens with high-quality services through efficient use of Information and Communication Technology (ICT). To this end, active citizen participation with mobile crowdsensing (MCS) techniques is a becoming common practice. As MCS systems require wide participation, the development of large scale real testbeds is often not feasible and simulations are the only alternative solution. Modeling the urban environment with high precision is a key ingredient to obtain effective results. However, currently existing tools like OpenStreetMap (OSM) fail to provide sufficient levels of details. In this paper, we apply a procedure to augment the precision (AOP) of the graph describing the street network provided by OSM. Additionally, we compare different mobility models that are synthetic and based on a realistic dataset originated from a well known MCS data collection campaign (ParticipAct). For the dataset, we propose two arrival models that determine the users’ arrivals and match the experimental contact distribution. Finally, we assess the scalability of AOP for different cities, verify popular metrics for human mobility and the precision of different arrival models. [less ▲]

Detailed reference viewed: 34 (2 UL)
Full Text
Peer Reviewed
See detailAn exploratory study on the use of new design methods in design consultancies
Filippi, Anna; Suarez Madrigal, Antonio; Eisenbart, Boris et al

in Proceedings of the International Design Conference - DESIGN 2018 (2018, May)

This paper explores the uptake of design methods in design consultancies. Our results show that new methods are primarily used in the initial phases of the design process for specific problems. The main ... [more ▼]

This paper explores the uptake of design methods in design consultancies. Our results show that new methods are primarily used in the initial phases of the design process for specific problems. The main motive for doing so is to enhance creativity and understanding of the user. Many participants modify methods to fit specific needs or develop own methods. These findings highlight the need to improve the link between industry and academia in order to increase method awareness and use. Potential ways to improve this include better descriptions of methods and the be­nefits provided. [less ▲]

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailA method for function integrity diagnosis and documentation: FIDD
Wichmann, Robert; Gericke, Kilian UL; Eisenbart, Boris et al

in Proceedings of the International Design Conference - DESIGN 2018 (2018, May)

This paper introduces a method to perform systematic diagnosis of function integrity. The proposed method advances the Integrated Function Modelling framework to extend its application to risk ... [more ▼]

This paper introduces a method to perform systematic diagnosis of function integrity. The proposed method advances the Integrated Function Modelling framework to extend its application to risk identification and documentation tasks. By analyzing the system model of interdisciplinary designs, this method guides the designer to explore function vulnerability by systematic decoupling of inherent design entities. Thereby it provides unique opportunities for failure mode identification in complex, interdisciplinary systems. The motivation for this method is ensuring system function integrity. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailEight key strategies for successful stakeholder involvement in design
Manrique, Sebastián; Simons, Daria; Eisenbart, Boris et al

in Proceedings of the International Design Conference - DESIGN 2018 (2018, May)

Design professionals work often in multi-stakeholder environments. This research aims to understand how design practitioners deal with challenges resulting from stakeholder involvement in design ... [more ▼]

Design professionals work often in multi-stakeholder environments. This research aims to understand how design practitioners deal with challenges resulting from stakeholder involvement in design activities. In this exploratory study, ten interviews were conducted with design practitioners from design agencies in the Netherlands. Eight key strategies were identified that are considered for successful stakeholder involvement. The findings can help the field of DTM to develop methods and tools that fit better with the needs of design professionals. [less ▲]

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailMargins lead to overcapacity
Jones, Darren; Eckert, Claudia; Gericke, Kilian UL

in Proceedings of the International Design Conference - DESIGN 2018 (2018, May)

This paper categorises and describes the design stages, stakeholders and decision processes of an overcapacity boiler upgrade that came about from the excessive use of design margins. Using a hospital ... [more ▼]

This paper categorises and describes the design stages, stakeholders and decision processes of an overcapacity boiler upgrade that came about from the excessive use of design margins. Using a hospital case study, the reason behind the overcapacity and excessive margins is explored using semi-structured interviews, document analysis and process modelling. Design margins arise from a lack of systemic thinking during the design and installation phases. It is likely that margins are added as a matter of habit with no real thought to their applicability, calling into question the design process. [less ▲]

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailPAPR Minimization through Spatio-temporal Symbol-level Precoding for the Non-linear Multi-user MISO Channel
Spano, Danilo UL; Alodeh, Maha; Chatzinotas, Symeon UL et al

in 2018 International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2018) (2018, April 19)

Symbol-level precoding (SLP) is a promising technique which allows to constructively exploit the multi-user interference in the downlink of multiple antenna systems. Recently, this approach has also been ... [more ▼]

Symbol-level precoding (SLP) is a promising technique which allows to constructively exploit the multi-user interference in the downlink of multiple antenna systems. Recently, this approach has also been used in the context of non-linear systems for reducing the instantaneous power imbalances among the antennas. However, previous works have not exploited SLP to improve the dynamic properties of the waveforms in the temporal dimension, which are fundamental for non-linear systems. To fill this gap, this paper proposes a novel precoding method, referred to as spatio-temporal SLP, which minimizes the peak-to-average power ratio of the transmitted waveforms both in the spatial and in the temporal dimensions, while at the same time exploiting the constructive interference effect. Numerical results are presented to highlight the enhanced performance of the proposed scheme with respect to state of the art SLP techniques, in terms of power distribution and symbol error rate over non-linear channels. [less ▲]

Detailed reference viewed: 25 (3 UL)
Full Text
Peer Reviewed
See detailDesigning Joint Precoding and Beamforming in a Multiple Gateway Multibeam Satellite System
Joroughi, Vahid; Shankar, Bhavani UL; Maleki, Sina UL et al

in IEEE WCNC 2018 (2018, April 18)

This paper aims to design joint on-ground precoding and on-board beamforming of a multiple gateway multibeam satellite system in a hybrid space-ground mode where full frequency reuse pattern is considered ... [more ▼]

This paper aims to design joint on-ground precoding and on-board beamforming of a multiple gateway multibeam satellite system in a hybrid space-ground mode where full frequency reuse pattern is considered among the beams. In such an architecture, each gateway serves a cluster of adjacent beams such that the adjacent clusters are served through a set of gateways that are located at different geographical areas. However, such a system brings in two challenges to overcome. First, the inter-beam interference is the bottleneck of the whole system and applying interference mitigation techniques becomes necessary. Second, as the data demand increases, the ground and space segments should employ extensive bandwidth resources in the feeder link accordingly. This entails embedding an extra number of gateways aiming to support a fair balance between the increasing demand and the corresponding required feeder link resources. To solve these problems, this study investigates the impact of employing a joint multiple gateway architecture and on-board beamforming scheme. It is shown that by properly designing the on-board beamforming scheme, the number of gateways can be kept affordable even if the data demand increases. Moreover, Zero Forcing (ZF) precoding technique is considered to cope with the inter-beam interference where each gateway constructs a part of block ZF precoding matrix. The conceived designs are evaluated with a close-to-real beam pattern and the latest broadband communication standard for satellite communications. [less ▲]

Detailed reference viewed: 72 (2 UL)
See detailLongitudinal Shaer in Composite Beams
Zhang, Qingjie UL; Schäfer, Markus UL

in Young Engineers Colloquium Munich 2018 (2018, April 13)

Longitudinal shear has important influences on the performance of composite beams. According to Eurocode 4, with cross-section class 1 and 2 in combination with ductile shear connectors, a plastic method ... [more ▼]

Longitudinal shear has important influences on the performance of composite beams. According to Eurocode 4, with cross-section class 1 and 2 in combination with ductile shear connectors, a plastic method, considering redistribution of longitudinal shear force is allowed. The conditions therefore are full development of plastic moment resistance and sufficient slip at interface to reach the plateau of P-δ curve of the shear connectors. However, for slim-floor beams, it is to question if the above-mentioned method can be applied. To answer it, related topics still need further investigation, which is the focus of the author’s Ph.D work. This paper presents part of the first stage results on the theoretical analysis of longitudinal shear, considering the influence of plasticity of the beam. For composite beams with rigid shear connectors, non-linear shear stress distribution appears in the plastic region, which influences the shear connector arrangement. However, detailed theoretical research is still hard to be found. In this work, based on a simple beam partly in plastic zone, mathematical equations are developed to calculate the plastic zone height and longitudinal shear stress distribution. Benchmarks with ANSYS and existing tests are performed. [less ▲]

Detailed reference viewed: 11 (0 UL)
Full Text
See detailAnalysis and Comparison of Eurocodes and Chinese codes of Design
Santos Ferreira, Katia UL; Zhang, Qingjie UL; Schäfer, Markus UL

in Young Engineers Colloquium Munich 2018 (2018, April 13)

Eurocodes (EC) which were published in 2007 are one of the most advanced standards for structure design in the world. Today, Eurocodes are not only used in EU or EFTA countries, but also many other ... [more ▼]

Eurocodes (EC) which were published in 2007 are one of the most advanced standards for structure design in the world. Today, Eurocodes are not only used in EU or EFTA countries, but also many other countries use Eurocodes or align their National standards with them, which gives Eurocodes global influence. Chinese codes of practise, on the other hand, benefit from the recent fast developed construction industry and have a vast application base. In the recent years, half of the new building floor area worldwide is built in China. Thus, it is interesting to compare Eurocodes (one of the most used codes worldwide) with the Chinese codes of design (with which most buildings were recently built). [less ▲]

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailA parallel best-response algorithm with exact line search for nonconvex sparsity-regularized rank minimization
Yang, Yang UL; Pesavento, Marius

in Proc. 2018 IEEE International Conference on Acoustics, Speech and Signal (2018, April)

Detailed reference viewed: 115 (37 UL)
Full Text
Peer Reviewed
See detailEnergy efficiency in MIMO interference channels: Social optimality and max-min fairness
Yang, Yang UL; Pesavento, Marius

in Proc. 2018 IEEE International Conference on Acoustics, Speech and Signal (2018, April)

Detailed reference viewed: 83 (8 UL)
Full Text
See detailPeut-on se moquer de tout ?
 L’étendue de la liberté d’expression face au sentiment religieux.
Gerkrath, Jörg UL

in Actes de la Section des sciences morales et politiques. Vol XXI (2018, April)

Detailed reference viewed: 30 (5 UL)
Full Text
Peer Reviewed
See detailComparative Study of Genetic and Discrete Firefly Algorithm for Combinatorial Optimization
Tessaro Lunardi, Willian UL; Voos, Holger UL

in 33rd ACM/SIGAPP Symposium On Applied Computing, Pau, France, April 9 - 13, 2018 (2018, April)

Flexible job-shop scheduling problem (FJSP) is one of the most challenging combinatorial optimization problems. FJSP is an extension of the classical job shop scheduling problem where an operation can be ... [more ▼]

Flexible job-shop scheduling problem (FJSP) is one of the most challenging combinatorial optimization problems. FJSP is an extension of the classical job shop scheduling problem where an operation can be processed by several different machines. The FJSP contains two sub-problems, namely machine assignment problem and operation sequencing problem. In this paper, we propose and compare a discrete firefly algorithm (FA) and a genetic algorithm (GA) for the multi-objective FJSP. Three minimization objectives are considered, the maximum completion time, workload of the critical machine and total workload of all machines. Five well-known instances of FJSP have been used to evaluate the performance of the proposed algorithms. Comparisons among our methods and state-of-the-art algorithms are also provided. The experimental results demonstrate that the FA and GA have achieved improvements in terms of efficiency. Solutions obtained by both algorithms are comparable to those obtained by algorithms with local search. In addition, based on our initial experiments, results show that the proposed discrete firefly algorithm is feasible, more effective and efficient than our proposed genetic algorithm for solving multi-objective FJSP. [less ▲]

Detailed reference viewed: 229 (61 UL)
Full Text
Peer Reviewed
See detailVelisarios: Byzantine Fault-Tolerant Protocols Powered by Coq
Rahli, Vincent UL; Vukotic, Ivana UL; Volp, Marcus UL et al

in Velisarios: Byzantine Fault-Tolerant Protocols Powered by Coq (2018, April)

Our increasing dependence on complex and critical information infrastructures and the emerging threat of sophisticated attacks, ask for extended efforts to ensure the correctness and security of these ... [more ▼]

Our increasing dependence on complex and critical information infrastructures and the emerging threat of sophisticated attacks, ask for extended efforts to ensure the correctness and security of these systems. Byzantine fault-tolerant state-machine replication (BFT-SMR) provides a way to harden such systems. It ensures that they maintain correctness and availability in an application-agnostic way, provided that the replication protocol is correct and at least n-f out of n replicas survive arbitrary faults. This paper presents Velisarios a logic-of-events based framework implemented in Coq, which we developed to implement and reason about BFT-SMR protocols. As a case study, we present the first machine-checked proof of a crucial safety property of an implementation of the area's reference protocol: PBFT. [less ▲]

Detailed reference viewed: 69 (10 UL)
Full Text
Peer Reviewed
See detailOptimization of weighted individual energy efficiencies in interference networks
Matthiesen, Bho; Yang, Yang UL; Jorswieck, Eduard

in Proc. IEEE Wireless Communications and Networking Conference (2018, April)

Detailed reference viewed: 91 (3 UL)
Full Text
Peer Reviewed
See detailExtracting Statistical Graph Features for Accurate and Efficient Time Series Classification
Li, Daoyuan UL; Lin, Jessica; Bissyande, Tegawendé François D Assise UL et al

in 21st International Conference on Extending Database Technology (2018, March)

This paper presents a multiscale visibility graph representation for time series as well as feature extraction methods for time series classification (TSC). Unlike traditional TSC approaches that seek to ... [more ▼]

This paper presents a multiscale visibility graph representation for time series as well as feature extraction methods for time series classification (TSC). Unlike traditional TSC approaches that seek to find global similarities in time series databases (eg., Nearest Neighbor with Dynamic Time Warping distance) or methods specializing in locating local patterns/subsequences (eg., shapelets), we extract solely statistical features from graphs that are generated from time series. Specifically, we augment time series by means of their multiscale approximations, which are further transformed into a set of visibility graphs. After extracting probability distributions of small motifs, density, assortativity, etc., these features are used for building highly accurate classification models using generic classifiers (eg., Support Vector Machine and eXtreme Gradient Boosting). Thanks to the way how we transform time series into graphs and extract features from them, we are able to capture both global and local features from time series. Based on extensive experiments on a large number of open datasets and comparison with five state-of-the-art TSC algorithms, our approach is shown to be both accurate and efficient: it is more accurate than Learning Shapelets and at the same time faster than Fast Shapelets. [less ▲]

Detailed reference viewed: 114 (2 UL)
Full Text
Peer Reviewed
See detailProfiling Energy Efficiency of Mobile Crowdsensing Data Collection Frameworks for Smart City Applications
Tomasoni, Mattia; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in The 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2018) (2018, March)

Mobile crowdsensing (MCS) has emerged in the last years and has become one of the most prominent paradigms for urban sensing. In MCS, citizens actively participate in the sensing process by contributing ... [more ▼]

Mobile crowdsensing (MCS) has emerged in the last years and has become one of the most prominent paradigms for urban sensing. In MCS, citizens actively participate in the sensing process by contributing data with their smartphones, tablets, wearables and other mobile devices to a collector. As citizens sustain costs while contributing data, i.e., the energy spent from the batteries for sensing and reporting, devising energy efficient data collection frameworks (DCFs) is essential. In this work, we compare the energy efficiency of several DCFs through CrowdSenSim, which allows to perform large-scale simulation experiments in realistic urban environments. Specifically, the DCFs under analysis differ one with each other by the data reporting mechanism implemented and the signaling between users and the collector needed for sensing and reporting decisions. Results reveal that the key criterion differentiating DCFs' energy consumption is the data reporting mechanism. In principle, continuous reporting to the collector should be more energy consuming than probabilistic reporting. However, DCFs with continuous reporting that implement mechanisms to block sensing and data delivery after a certain amount of contribution are more effective in harvesting data from the crowd. [less ▲]

Detailed reference viewed: 89 (4 UL)
Full Text
See detailRetrouver le rapport à l’histoire et à l’Europe
Poirier, Philippe UL; Hartog, François

in Herzog, Philippe (Ed.) Europe 21 (2018, February 28)

L’Europe n’a de sens et de fondement que si les gens peuvent acquérir une conscience commune, former des projets communs, générer un affectio societatis. Ce n’est pas le cas aujourd’hui. Nous voulons donc ... [more ▼]

L’Europe n’a de sens et de fondement que si les gens peuvent acquérir une conscience commune, former des projets communs, générer un affectio societatis. Ce n’est pas le cas aujourd’hui. Nous voulons donc mettre la culture au cœur de l’espace public européen, au cœur de chaque action, et pour cela faire appel à toutes les sources d’inspiration en conjuguant foi et raison. La formation d’acteurs de la société civile capables de mettre les populations en relation et de porter des projets par-delà les frontières est essentielle. Ceci exige de dépasser les barrières nationales, psychiques et institutionnelles, et implique une culture de l’altérité afin que l’Europe puisse répondre positivement aux défis internes et externes de la mondialisation [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailIMPROVING THE CAPACITY OF VERY DEEP NETWORKS WITH MAXOUT UNITS
Oyedotun, Oyebade UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (2018, February 21)

Deep neural networks inherently have large representational power for approximating complex target functions. However, models based on rectified linear units can suffer reduction in representation ... [more ▼]

Deep neural networks inherently have large representational power for approximating complex target functions. However, models based on rectified linear units can suffer reduction in representation capacity due to dead units. Moreover, approximating very deep networks trained with dropout at test time can be more inexact due to the several layers of non-linearities. To address the aforementioned problems, we propose to learn the activation functions of hidden units for very deep networks via maxout. However, maxout units increase the model parameters, and therefore model may suffer from overfitting; we alleviate this problem by employing elastic net regularization. In this paper, we propose very deep networks with maxout units and elastic net regularization and show that the features learned are quite linearly separable. We perform extensive experiments and reach state-of-the-art results on the USPS and MNIST datasets. Particularly, we reach an error rate of 2.19% on the USPS dataset, surpassing the human performance error rate of 2.5% and all previously reported results, including those that employed training data augmentation. On the MNIST dataset, we reach an error rate of 0.36% which is competitive with the state-of-the-art results. [less ▲]

Detailed reference viewed: 83 (16 UL)
Full Text
Peer Reviewed
See detailPERSEUS: A Personalization Framework for Sentiment Categorization with Recurrent Neural Network
Guo, Siwen UL; Höhn, Sviatlana; Xu, Feiyu et al

in International Conference on Agents and Artificial Intelligence , Funchal 16-18 January 2018 (2018, January)

This paper introduces the personalization framework PERSEUS in order to investigate the impact of individuality in sentiment categorization by looking into the past. The existence of diversity between ... [more ▼]

This paper introduces the personalization framework PERSEUS in order to investigate the impact of individuality in sentiment categorization by looking into the past. The existence of diversity between individuals and certain consistency in each individual is the cornerstone of the framework. We focus on relations between documents for user-sensitive predictions. Individual’s lexical choices act as indicators for individuality, thus we use a concept-based system which utilizes neural networks to embed concepts and associated topics in text. Furthermore, a recurrent neural network is used to memorize the history of user’s opinions, to discover user-topic dependence, and to detect implicit relations between users. PERSEUS also offers a solution for data sparsity. At the first stage, we show the benefit of inquiring a user-specified system. Improvements in performance experimented on a combined Twitter dataset are shown over generalized models. PERSEUS can be used in addition to such generalized systems to enhance the understanding of user’s opinions. [less ▲]

Detailed reference viewed: 96 (35 UL)
Full Text
Peer Reviewed
See detailNon-Negative Paratuck2 Tensor Decomposition Combined to LSTM Network For Smart Contracts Profiling
Charlier, Jérémy Henri J. UL; State, Radu UL; Hilger, Jean

in Charlier, Jeremy; State, Radu; Hilger, Jean (Eds.) 2018 IEEE International Conference on Big Data and Smart Computing Proceedings (2018, January)

Smart contracts are programs stored and executed on a blockchain. The Ethereum platform, an open source blockchain-based platform, has been designed to use these programs offering secured protocols and ... [more ▼]

Smart contracts are programs stored and executed on a blockchain. The Ethereum platform, an open source blockchain-based platform, has been designed to use these programs offering secured protocols and transaction costs reduction. The Ethereum Virtual Machine performs smart contracts runs, where the execution of each contract is limited to the amount of gas required to execute the operations described in the code. Each gas unit must be paid using Ether, the crypto-currency of the platform. Due to smart contracts interactions evolving over time, analyzing the behavior of smart contracts is very challenging. We address this challenge in our paper. We develop for this purpose an innovative approach based on the nonnegative tensor decomposition PARATUCK2 combined with long short-term memory (LSTM) to assess if predictive analysis can forecast smart contracts interactions over time. To validate our methodology, we report results for two use cases. The main use case is related to analyzing smart contracts and allows shedding some light into the complex interactions among smart contracts. In order to show the generality of our method on other use cases, we also report its performance on video on demand recommendation. [less ▲]

Detailed reference viewed: 86 (15 UL)
Full Text
Peer Reviewed
See detailAnticipating Suspicious Actions using a Small Dataset of Action Templates
Baptista, Renato UL; Antunes, Michel; Aouada, Djamila UL et al

in 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP) (2018, January)

In this paper, we propose to detect an action as soon as possible and ideally before it is fully completed. The objective is to support the monitoring of surveillance videos for preventing criminal or ... [more ▼]

In this paper, we propose to detect an action as soon as possible and ideally before it is fully completed. The objective is to support the monitoring of surveillance videos for preventing criminal or terrorist attacks. For such a scenario, it is of importance to have not only high detection and recognition rates but also low time latency for the detection. Our solution consists in an adaptive sliding window approach in an online manner, which efficiently rejects irrelevant data. Furthermore, we exploit both spatial and temporal information by constructing feature vectors based on temporal blocks. For an added efficiency, only partial template actions are considered for the detection. The relationship between the template size and latency is experimentally evaluated. We show promising preliminary experimental results using Motion Capture data with a skeleton representation of the human body. [less ▲]

Detailed reference viewed: 70 (8 UL)
Full Text
Peer Reviewed
See detailEvoMaster: Evolutionary Multi-context Automated System Test Generation
Arcuri, Andrea UL

in IEEE Conference on Software Testing, Validation and Verification (2018)

This paper presents EVOMASTER, an open-source tool that is able to automatically generate system level test cases using evolutionary algorithms. Currently, EVOMASTER targets RESTful web services running ... [more ▼]

This paper presents EVOMASTER, an open-source tool that is able to automatically generate system level test cases using evolutionary algorithms. Currently, EVOMASTER targets RESTful web services running on JVM technology, and has been used to find several faults in existing open-source projects. We discuss some of the architectural decisions made for its implementation, and future work. [less ▲]

Detailed reference viewed: 40 (0 UL)
Full Text
Peer Reviewed
See detailA Reference Architecture for Deploying Component-based Robot Software and Comparison with Existing Tools
Hochgeschwender, Nico UL; Biggs, Geoffrey; Voos, Holger UL

in Proceedings of the IEEE International Conference on Robotic Computing (2018)

Detailed reference viewed: 36 (2 UL)
See detailDénationaliser le passé, désétatiser le politique : les apports d'un dialogue nouveau entre historiographies française et italienne des formations politiques de la fin du Moyen Âge
Abeles, Solal UL

in Genet, Jean-Philippe (Ed.) Les vecteurs de l'idéel, vi, Mutations des sociétés politiques et systèmes de communication (2018)

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailContext-aware and Attribute-based Access Control Applying Proactive Computing to IoT System
Picard, Noé UL; Colin, Jean-Noël; Zampunieris, Denis UL

in Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security (IoTBDS 2018) (2018)

ABAC allows for high flexibility in access control over a system through the definition of policies based on attribute values. In the context of an IoT-based system, these data can be supplied through its ... [more ▼]

ABAC allows for high flexibility in access control over a system through the definition of policies based on attribute values. In the context of an IoT-based system, these data can be supplied through its sensors connected to the real world, allowing for context-awareness. However, the ABAC model alone does not include proposals for implementing security policies based on verified and/or meaningful values rather than on raw data flowing from the sensors. Nor does it allow to implement immediate action on the system when some security flaw is detected, while this possibility technically exists if the system is equipped with actuators next to its sensors. We show how to circumvent these limitations by adding a proactive engine to the ABAC components, that runs rule-based scenarios devoted to sensor data pre-processing, to higher-level information storage in the PIP, and to real-time, automatic reaction on the system through its actuators when required. [less ▲]

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailLa force intégrative du statut de l'Etat membre sur la fonction juridictionnelle
Neframi, Eleftheria UL

in Potvin Solis, Laurence (Ed.) Le statut d'Etat membre de l'Union européenne (2018)

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields ... [more ▼]

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields covered by Union law (Art 19, par 1, subpar 2, TEU). Member States have to ensure access to the national judge, who has been entrusted with a European mandate, and who is in measure to cooperate with the Court of Justice through the preliminary reference procedure. The Member States establish in this way an integrated judicial function. The exercise of such a function by the national judge, in cooperation with the Court of Justice and under the control of the Member State, implies integrative dynamic, which however depends on the balancing exercise with national procedural autonomy and the margin of appreciation of the national judge. [less ▲]

Detailed reference viewed: 41 (3 UL)
Full Text
Peer Reviewed
See detailExtended Explanatory Argumentation Frameworks
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already ... [more ▼]

Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already previously proven useful to study and combine such extensions is the meta-argumentation methodology involving the notion of a flattening. In order to faithfully model the interaction between explanation argumentation in scientific debates, Šešelja and Straßer have introduced Explanatory Argumentation Frameworks (EAFs). In this paper, we first prove that the flattening technique works as expected for recursive (higher-order) attacks. Then we apply this technique in order to combine EAFs with multiple other extensions that have been proposed to AFs, namely with recursive attacks, joint attacks and a support relation between arguments. This gives rise to Extended Explanatory Argumentation Frameworks (EEAFs). We illustrate the applicability of EEAFs by using them to model a piece of argumentation from a research-level philosophy book. [less ▲]

Detailed reference viewed: 133 (8 UL)
Full Text
Peer Reviewed
See detailMachine Learning for Reliable Network Attack Detection in SCADA Systems
Lopez Perez, Rocio; Adamsky, Florian UL; Soua, Ridha UL et al

in 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18) (2018)

Detailed reference viewed: 24 (2 UL)
Full Text
Peer Reviewed
See detailA Search-based Approach for Accurate Identification of Log Message Formats
Messaoudi, Salma UL; Panichella, Annibale UL; Bianculli, Domenico UL et al

in Proceedings of the 26th IEEE/ACM International Conference on Program Comprehension (ICPC ’18) (2018)

Many software engineering activities process the events contained in log files. However, before performing any processing activity, it is necessary to parse the entries in a log file, to retrieve the ... [more ▼]

Many software engineering activities process the events contained in log files. However, before performing any processing activity, it is necessary to parse the entries in a log file, to retrieve the actual events recorded in the log. Each event is denoted by a log message, which is composed of a fixed part-called (event) template-that is the same for all occurrences of the same event type, and a variable part, which may vary with each event occurrence. The formats of log messages, in complex and evolving systems, have numerous variations, are typically not entirely known, and change on a frequent basis; therefore, they need to be identified automatically. The log message format identification problem deals with the identification of the different templates used in the messages of a log. Any solution to this problem has to generate templates that meet two main goals: generating templates that are not too general, so as to distinguish different events, but also not too specific, so as not to consider different occurrences of the same event as following different templates; however, these goals are conflicting. In this paper, we present the MoLFI approach, which recasts the log message identification problem as a multi-objective problem. MoLFI uses an evolutionary approach to solve this problem, by tailoring the NSGA-II algorithm to search the space of solutions for a Pareto optimal set of message templates. We have implemented MoLFI in a tool, which we have evaluated on six real-world datasets, containing log files with a number of entries ranging from 2K to 300K. The experiments results show that MoLFI extracts by far the highest number of correct log message templates, significantly outperforming two state-of-the-art approaches on all datasets. [less ▲]

Detailed reference viewed: 179 (33 UL)
Full Text
Peer Reviewed
See detailAre Mutation Scores Correlated with Real Fault Detection? A Large Scale Empirical study on the Relationship Between Mutants and Real Faults
Papadakis, Mike UL; Shin, Donghwan; Yoo, Shin et al

in 40th International Conference on Software Engineering, May 27 - 3 June 2018, Gothenburg, Sweden (2018)

Detailed reference viewed: 90 (1 UL)
Full Text
See detailEvaluating Search-Based Techniques With Statistical Tests
Arcuri, Andrea UL

in The Search-Based Software Testing (SBST) Workshop (2018)

This tutorial covers the basics of how to use statistical tests to evaluate and compare search-algorithms, in particular when applied on software engineering problems. Search-algorithms like Hill Climbing ... [more ▼]

This tutorial covers the basics of how to use statistical tests to evaluate and compare search-algorithms, in particular when applied on software engineering problems. Search-algorithms like Hill Climbing and Genetic Algorithms are randomised. Running such randomised algorithms twice on the same problem can give different results. It is hence important to run such algorithms multiple times to collect average results, and avoid so publishing wrong conclusions that were based on just luck. However, there is the question of how often such runs should be repeated. Given a set of n repeated experiments, is such n large enough to draw sound conclusions? Or should had more experiments been run? Statistical tests like the Wilcoxon-Mann-Whitney U-test can be used to answer these important questions. [less ▲]

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailUne approche particulière du dialogue des juges au sein de l'espace économique européen
Neframi, Eleftheria UL; Lacchi, Clelia UL

in Monjal, Pierre Yves (Ed.) Une approche particulière du dialogue des juges au sein de l'espace économique européen (2018)

Detailed reference viewed: 72 (7 UL)
Full Text
Peer Reviewed
See detailA Security Analysis, and a Fix, of a Code-Corrupted Honeywords System
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL et al

in Proceedings of the 4th International Conference on Information Systems Security and Privacy (2018)

In 2013 Juels and Rivest introduced the Honeywords System, a password-based authentication system designed to detect when a password file has been stolen. A Honeywords System stores passwords together ... [more ▼]

In 2013 Juels and Rivest introduced the Honeywords System, a password-based authentication system designed to detect when a password file has been stolen. A Honeywords System stores passwords together with indistinguishable decoy words so when an intruder steals the file, retrieves the words, and tries to log-in, he does not know which one is the password. By guessing one from the decoy words, he may not be lucky and reveal the leak. Juels and Rivest left a problem open: how to make the system secure even when the intruder corrupted the login server’s code. In this paper we study and solve the problem. However, since “code corruption” is a powerful attack, we first define rigorously the threat and set a few assumptions under which the problem is still solvable, before showing meaningful attacks against the original Honeywords System. Then we elicit a fundamental security requirement, implementing which, we are able to restore the honeywords System’s security despite a corrupted login service. We verify the new protocol’s security formally, using ProVerif for this task. We also implement the protocol and test its performance. Finally, at the light of our findings, we discuss whether it is still worth using a fixed honeywords-based system against such a powerful threat, or whether it is better, in order to be resilient against code corruption attacks, to design afresh a completely different password-based authentication solution. [less ▲]

Detailed reference viewed: 137 (25 UL)
Full Text
Peer Reviewed
See detailTesting Vision-Based Control Systems Using Learnable Evolutionary Algorithms
Ben Abdessalem (helali), Raja UL; Nejati, Shiva UL; Briand, Lionel UL et al

in Proceedings of the 40th International Conference on Software Engineering (ICSE 2018) (2018)

Vision-based control systems are key enablers of many autonomous vehicular systems, including self-driving cars. Testing such systems is complicated by complex and multidimensional input spaces. We ... [more ▼]

Vision-based control systems are key enablers of many autonomous vehicular systems, including self-driving cars. Testing such systems is complicated by complex and multidimensional input spaces. We propose an automated testing algorithm that builds on learnable evolutionary algorithms. These algorithms rely on machine learning or a combination of machine learning and Darwinian genetic operators to guide the generation of new solutions (test scenarios in our context). Our approach combines multiobjective population-based search algorithms and decision tree classification models to achieve the following goals: First, classification models guide the search-based generation of tests faster towards critical test scenarios (i.e., test scenarios leading to failures). Second, search algorithms refine classification models so that the models can accurately characterize critical regions (i.e., the regions of a test input space that are likely to contain most critical test scenarios). Our evaluation performed on an industrial automotive vision-based control system shows that: (1) Our algorithm outperforms a baseline evolutionary search algorithm and generates 78% more distinct, critical test scenarios compared to the baseline algorithm. (2) Our algorithm accurately characterizes critical regions of the system under test, thus identifying the conditions that likely to lead to system failures. [less ▲]

Detailed reference viewed: 318 (83 UL)
Full Text
Peer Reviewed
See detailA Revisit of Action Detection using Improved Trajectories
Papadopoulos, Konstantinos UL; Antunes, Michel; Aouada, Djamila UL et al

in IEEE International Conference on Acoustics, Speech and Signal Processing, Calgary, Alberta, Canada, 15–20 April 2018 (2018)

In this paper, we revisit trajectory-based action detection in a potent and non-uniform way. Improved trajectories have been proven to be an effective model for motion description in action recognition ... [more ▼]

In this paper, we revisit trajectory-based action detection in a potent and non-uniform way. Improved trajectories have been proven to be an effective model for motion description in action recognition. In temporal action localization, however, this approach is not efficiently exploited. Trajectory features extracted from uniform video segments result in significant performance degradation due to two reasons: (a) during uniform segmentation, a significant amount of noise is often added to the main action and (b) partial actions can have negative impact in classifier's performance. Since uniform video segmentation seems to be insufficient for this task, we propose a two-step supervised non-uniform segmentation, performed in an online manner. Action proposals are generated using either 2D or 3D data, therefore action classification can be directly performed on them using the standard improved trajectories approach. We experimentally compare our method with other approaches and we show improved performance on a challenging online action detection dataset. [less ▲]

Detailed reference viewed: 71 (15 UL)
Full Text
Peer Reviewed
See detailDetecting Malicious Authentication Events Trustfully
Kaiafas, Georgios UL; Varisteas, Georgios UL; Lagraa, Sofiane UL et al

in Kaiafas, Georgios; Varisteas, Georgios; Lagraa, Sofiane (Eds.) et al IEEE/IFIP Network Operations and Management Symposium, 23-27 April 2018, Taipei, Taiwan Cognitive Management in a Cyber World (2018)

Detailed reference viewed: 14 (2 UL)
Full Text
Peer Reviewed
See detailImpact of Biases in Big Data
Glauner, Patrick UL; Valtchev, Petko; State, Radu UL

in Proceedings of the 26th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2018) (2018)

The underlying paradigm of big data-driven machine learning reflects the desire of deriving better conclusions from simply analyzing more data, without the necessity of looking at theory and models. Is ... [more ▼]

The underlying paradigm of big data-driven machine learning reflects the desire of deriving better conclusions from simply analyzing more data, without the necessity of looking at theory and models. Is having simply more data always helpful? In 1936, The Literary Digest collected 2.3M filled in questionnaires to predict the outcome of that year's US presidential election. The outcome of this big data prediction proved to be entirely wrong, whereas George Gallup only needed 3K handpicked people to make an accurate prediction. Generally, biases occur in machine learning whenever the distributions of training set and test set are different. In this work, we provide a review of different sorts of biases in (big) data sets in machine learning. We provide definitions and discussions of the most commonly appearing biases in machine learning: class imbalance and covariate shift. We also show how these biases can be quantified and corrected. This work is an introductory text for both researchers and practitioners to become more aware of this topic and thus to derive more reliable models for their learning problems. [less ▲]

Detailed reference viewed: 48 (9 UL)
Full Text
Peer Reviewed
See detailA Blockchain-Based PKI Management Framework
Yakubov, Alexander UL; Shbair, Wazen UL; Wallbom, Anders et al

in The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) colocated with IEEE/IFIP NOMS 2018, Tapei, Tawain 23-27 April 2018 (2018)

Public-Key Infrastructure (PKI) is the cornerstone technology that facilitates secure information exchange over the Internet. However, PKI is exposed to risks due to potential failures of Certificate ... [more ▼]

Public-Key Infrastructure (PKI) is the cornerstone technology that facilitates secure information exchange over the Internet. However, PKI is exposed to risks due to potential failures of Certificate Authorities (CAs) that may be used to issue unauthorized certificates for end-users. Many recent breaches show that if a CA is compromised, the security of the corresponding end-users will be in risk. As an emerging solution, Blockchain technology potentially resolves the problems of traditional PKI systems - in particular, elimination of single point-of-failure and rapid reaction to CAs shortcomings. Blockchain has the ability to store and manage digital certificates within a public and immutable ledger, resulting in a fully traceable history log. In this paper we designed and developed a blockchain-based PKI management framework for issuing, validating and revoking X.509 certificates. Evaluation and experimental results confirm that the proposed framework provides more reliable and robust PKI systems with modest maintenance costs. [less ▲]

Detailed reference viewed: 78 (1 UL)
Full Text
Peer Reviewed
See detailASPIC-END: Structured Argumentation with Explanations and Natural Deduction
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that ... [more ▼]

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that models argumentation about explanations of semantic paradoxes (e.g. the Liar paradox), and we show that ASPIC-END satisfies rationality postulates akin to those satisfied by ASPIC+. [less ▲]

Detailed reference viewed: 113 (11 UL)
Full Text
Peer Reviewed
See detailA rule-based approach for self-optimisation in autonomic eHealth systems
Neyens, Gilles UL; Zampunieris, Denis UL

in Workshop Proceedings ot the 6th International Workshop on "Self-Optimisation in Autonomic & Organic Computing Systems" in ARCS 2018 - 31st International Conference on Architecture of Computing Systems, Braunschweig, Germany, 09 - 12 April, 2018 (2018)

Advances in machine learning techniques in recent years were of great benefit for the detection of diseases/medical conditions in eHealth systems, but only to a limited extend. In fact, while for the ... [more ▼]

Advances in machine learning techniques in recent years were of great benefit for the detection of diseases/medical conditions in eHealth systems, but only to a limited extend. In fact, while for the detection of some diseases the data mining techniques were performing very well, they still got outperformed by medical experts in about half of the tests done. In this paper, we propose a hybrid approach, which will use a rule-based system on top of the machine learning techniques in order to optimise the results of conflict handling. The goal is to insert the knowledge from medical experts in order to optimise the results given by the classification techniques. Possible positive and negative effects will be discussed. [less ▲]

Detailed reference viewed: 32 (2 UL)
Full Text
Peer Reviewed
See detailBlockchain Orchestration and Experimentation Framework: A Case Study of KYC
Shbair, Wazen UL; Steichen, Mathis Georges UL; François, Jérôme UL et al

in The First IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block) colocated with IEEE/IFIP NOMS 2018 (2018)

Conducting experiments to evaluate blockchain applications is a challenging task for developers, because there is a range of configuration parameters that control blockchain environments. Many public ... [more ▼]

Conducting experiments to evaluate blockchain applications is a challenging task for developers, because there is a range of configuration parameters that control blockchain environments. Many public testnets (e.g. Rinkeby Ethereum) can be used for testing, however, we cannot adjust their parameters (e.g. Gas limit, Mining difficulty) to further the understanding of the application in question and of the employed blockchain. This paper proposes an easy to use orchestration framework over the Grid'5000 platform. Grid'5000 is a highly reconfigurable and controllable large-scale testbed. We developed a tool that facilitates nodes reservation, deployment and blockchain configuration over the Grid'5000 platform. In addition, our tool can fine-tune blockchain and network parameters before and between experiments. The proposed framework offers insights for private and consortium blockchain developers to identify performance bottlenecks and to assess the behavior of their applications in different circumstances. [less ▲]

Detailed reference viewed: 62 (2 UL)
See detailLa libertas, strumento ideologico dell’espansione territoriale del comune di Firenze nel XIV secolo
Abeles, Solal UL

in Zorzi, Andrea (Ed.) La libertà nelle città comunali e signorili italiane (2018)

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailPredicting the Fault Revelation Utility of Mutants
Titcheu Chekam, Thierry UL; Papadakis, Mike UL; Bissyande, Tegawendé François D Assise UL et al

in 40th International Conference on Software Engineering, Gothenburg, Sweden, May 27 - 3 June 2018 (2018)

Detailed reference viewed: 33 (6 UL)
Full Text
Peer Reviewed
See detailLes bourgeois de Bohême et l’impossible légitimation ? La conjuration de Prague et de Kutná Hora de février 1309
Vomacka, Eloïse UL

in Contester au Moyen Âge : de la désobéissance à la révolte XLIXe congrès de la SHMESP (2018)

Detailed reference viewed: 35 (0 UL)
Full Text
Peer Reviewed
See detailAutomated Generation of Constraints from Use Case Specifications to Support System Testing
Wang, Chunhui UL; Pastore, Fabrizio UL; Briand, Lionel UL

in Proceedings of the 11th IEEE Conference on Software Testing, Validation and Verification (2018)

System testing plays a crucial role in safety-critical domains, e.g., automotive, where system test cases are used to demonstrate the compliance of software with its functional and safety requirements ... [more ▼]

System testing plays a crucial role in safety-critical domains, e.g., automotive, where system test cases are used to demonstrate the compliance of software with its functional and safety requirements. Unfortunately, since requirements are typically written in natural language, significant engineering effort is required to derive test cases from requirements. In such a context, automated support for generating system test cases from requirements specifications written in natural language would be highly beneficial. Unfortunately, existing approaches have limited applicability. For example, some of them require that software engineers provide formal specifications that capture some of the software behavior described using natural language. The effort needed to define such specifications is usually a significant deterrent for software developers. This paper proposes an approach, OCLgen, which largely automates the generation of the additional formal specifications required by an existing test generation approach named UMTG. More specifically, OCLgen relies on semantic analysis techniques to automatically derive the pre- and post-conditions of the activities described in use case specifications. The generated conditions are used by UMTG to identify the test inputs that cover all the use case scenarios described in use case specifications. In practice, the proposed approach enables the automated generation of test cases from use case specifications while avoiding most of the additional modeling effort required by UMTG. Results from an industrial case study show that the approach can automatically and correctly generate more than 75% of the pre- and post-conditions characterizing the activities described in use case specifications. [less ▲]

Detailed reference viewed: 255 (33 UL)
Full Text
Peer Reviewed
See detailOn the Reduction of Biases in Big Data Sets for the Detection of Irregular Power Usage
Glauner, Patrick UL; State, Radu UL; Valtchev, Petko et al

in Proceedings 13th International FLINS Conference on Data Science and Knowledge Engineering for Sensing Decision Support (FLINS 2018) (2018)

In machine learning, a bias occurs whenever training sets are not representative for the test data, which results in unreliable models. The most common biases in data are arguably class imbalance and ... [more ▼]

In machine learning, a bias occurs whenever training sets are not representative for the test data, which results in unreliable models. The most common biases in data are arguably class imbalance and covariate shift. In this work, we aim to shed light on this topic in order to increase the overall attention to this issue in the field of machine learning. We propose a scalable novel framework for reducing multiple biases in high-dimensional data sets in order to train more reliable predictors. We apply our methodology to the detection of irregular power usage from real, noisy industrial data. In emerging markets, irregular power usage, and electricity theft in particular, may range up to 40% of the total electricity distributed. Biased data sets are of particular issue in this domain. We show that reducing these biases increases the accuracy of the trained predictors. Our models have the potential to generate significant economic value in a real world application, as they are being deployed in a commercial software for the detection of irregular power usage. [less ▲]

Detailed reference viewed: 18 (2 UL)
Full Text
Peer Reviewed
See detailSecure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
Seo, Hwajeong; Liu, Zhe UL; Park, Taehwan et al

in The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 (2017, December 30)

Detailed reference viewed: 11 (0 UL)
Full Text
Peer Reviewed
See detailTemPsy-Check: a Tool for Model-driven Trace Checking of Pattern-based Temporal Properties
Dou, Wei UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (2017, December 14)

Detailed reference viewed: 61 (9 UL)
Full Text
Peer Reviewed
See detailOn the Risk of Tool Over-tuning in Runtime Verification Competitions
Bianculli, Domenico UL; Krstic, Srdan

in Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (2017, December 14)

Detailed reference viewed: 35 (8 UL)
Full Text
Peer Reviewed
See detailTightly-Secure PAK(E)
Lopez Becerra, José Miguel UL; Iovino, Vincenzo UL; Ostrev, Dimiter UL et al

in Cryptology and Network Security (2017, December 02)

We present a security reduction for the PAK protocol instantiated over Gap Diffie-Hellman Groups that is tighter than previously known reductions. We discuss the implications of our results for concrete ... [more ▼]

We present a security reduction for the PAK protocol instantiated over Gap Diffie-Hellman Groups that is tighter than previously known reductions. We discuss the implications of our results for concrete security. Our proof is the first to show that the PAK protocol can provide meaningful security guarantees for values of the parameters typical in today’s world. [less ▲]

Detailed reference viewed: 76 (16 UL)
Full Text
Peer Reviewed
See detailEvaluating the Impact of Juice Filming Charging Attack in Practical Environments
Meng, Weizhi; Lee, Wanghao; Liu, Zhe UL et al

in The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 (2017, December 01)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailFast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
Xinwei, Gao; Li, Lin; Jintai, Ding et al

in The 13th International Conference on Information Security Practice and Experience - ISPEC 2017 (2017, December 01)

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailDistributed synchronization of euclidean transformations with guaranteed convergence
Thunberg, Johan UL; Goncalves, Jorge UL; Bernard, Florian

in 56th IEEE Conference on Decision and Control (2017, December)

This paper addresses synchronization of Euclidean transformations over graphs. Synchronization in this context, unlike rendezvous or consensus, means that composite transformations over loops in the graph ... [more ▼]

This paper addresses synchronization of Euclidean transformations over graphs. Synchronization in this context, unlike rendezvous or consensus, means that composite transformations over loops in the graph are equal to the identity. Given a set of non-synchronized transformations, the problem at hand is to find a set of synchronized transformations approximating well the non-synchronized transformations. This is formulated as a nonlinear least-squares optimization problem. We present a distributed synchronization algorithm that converges to the optimal solution to an approximation of the optimization problem. This approximation stems from a spectral relaxation of the rotational part on the one hand and from a separation between the rotations and the translations on the other. The method can be used to distributively improve the measurements obtained in sensor networks such as networks of cameras where pairwise relative transformations are measured. The convergence of the method is verified in numerical simulations. [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailModel-Driven Interaction Design for Social Robots
Cornelius, Gary Philippe UL; Hochgeschwender, Nico UL; Voos, Holger UL

in 4th International Workshop on Model-driven Robot Software Engineering, Marburg, Germany, 2017 (2017, December)

Robotic software development frameworks lack a possibility to present,validate and generate qualitative complex human robot interactions and robot de-velopers are mostly left with unclear informal project ... [more ▼]

Robotic software development frameworks lack a possibility to present,validate and generate qualitative complex human robot interactions and robot de-velopers are mostly left with unclear informal project specifications. The devel-opment of a human-robot interaction is a complex task and involves different ex-perts, for example, the need for human-robot interaction (HRI) specialists, whoknow about the psychological impact of the robot’s movements during the in-teraction in order to design the best possible user experience. In this paper, wepresent a new project that aims to provide exactly this. Focusing on the interac-tion flow and movements of a robot for human-robot interactions we aim to pro-vide a set of modelling languages for human-robot interaction which serves as acommon, more formal, discussion point between the different stakeholders. Thisis a new project and the main topics of this publication are the scenario descrip-tion, the analysis of the different stakeholders, our experience as robot applicationdevelopers for our partner, as well as the future work we plan to achieve. [less ▲]

Detailed reference viewed: 54 (15 UL)
Full Text
Peer Reviewed
See detailOn definition and inference of nonlinear Boolean dynamic networks
Yue, Zuogong UL; Thunberg, Johan UL; Ljung, Lennart et al

in On definition and inference of nonlinear Boolean dynamic networks (2017, December)

Network reconstruction has become particularly important in systems biology, and is now expected to deliver information on causality. Systems in nature are inherently nonlinear. However, for nonlinear ... [more ▼]

Network reconstruction has become particularly important in systems biology, and is now expected to deliver information on causality. Systems in nature are inherently nonlinear. However, for nonlinear dynamical systems with hidden states, how to give a useful definition of dynamic networks is still an open question. This paper presents a useful definition of Boolean dynamic networks for a large class of nonlinear systems. Moreover, a robust inference method is provided. The well-known Millar-10 model in systems biology is used as a numerical example, which provides the ground truth of causal networks for key mRNAs involved in eukaryotic circadian clocks. In addition, as second contribution of this paper, we suggest definitions of linear network identifiability, which helps to unify the available work on network identifiability. [less ▲]

Detailed reference viewed: 44 (0 UL)
Full Text
Peer Reviewed
See detailJoint and competitive caching designs in large-scale multi-tier wireless multicasting networks
Wang, Zitian; Cao, Zhehan; Cui, Ying et al

in Proc. 60th IEEE Global Communications Conference (2017, December)

Detailed reference viewed: 45 (6 UL)
Full Text
Peer Reviewed
See detailExperimental design trade-offs for gene regulatory network inference: an in silico study of the yeast Saccharomyces cerevisiae cell cycle
Markdahl, Johan UL; Colombo, Nicolo UL; Thunberg, Johan UL et al

in Proceedings of the 56th IEEE Conference on Decision and Control (2017, December)

Time-series of high throughput gene sequencing data intended for gene regulatory network (GRN) inference are often short due to the high costs of sampling cell systems. Moreover, experimentalists lack a ... [more ▼]

Time-series of high throughput gene sequencing data intended for gene regulatory network (GRN) inference are often short due to the high costs of sampling cell systems. Moreover, experimentalists lack a set of quantitative guidelines that prescribe the minimal number of samples required to infer a reliable GRN model. We study the temporal resolution of data vs.quality of GRN inference in order to ultimately overcome this deficit. The evolution of a Markovian jump process model for the Ras/cAMP/PKA pathway of proteins and metabolites in the G1 phase of the Saccharomyces cerevisiae cell cycle is sampled at a number of different rates. For each time-series we infer a linear regression model of the GRN using the LASSO method. The inferred network topology is evaluated in terms of the area under the precision-recall curve (AUPR). By plotting the AUPR against the number of samples, we show that the trade-off has a, roughly speaking, sigmoid shape. An optimal number of samples corresponds to values on the ridge of the sigmoid. [less ▲]

Detailed reference viewed: 44 (9 UL)
Full Text
Peer Reviewed
See detailSchNet: A continuous-filter convolutional neural network for modeling quantum interactions
Schütt, Kristof T.; Kindermans, P. J.; Sauceda, Huziel E. et al

in 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA (2017, December)

Detailed reference viewed: 70 (0 UL)
Full Text
Peer Reviewed
See detailOn low complexity detection for QAM isomorphic constellations
Kayhan, Farbod UL

in Kayhan, Farbod (Ed.) On low compelxity detection for QAM isomorphic constellations (2017, December)

Despite of the known gap from the Shannon's capacity, several standards are still employing QAM or star shape constellations, mainly due to the existing low complexity detectors. In this paper, we ... [more ▼]

Despite of the known gap from the Shannon's capacity, several standards are still employing QAM or star shape constellations, mainly due to the existing low complexity detectors. In this paper, we investigate the low complexity detection for a family of QAM isomorphic constellations. These constellations are known to perform very close to the peak-power limited capacity, outperforming the DVB-S2X standard constellations. The proposed strategy is to first remap the received signals to the QAM constellation using the existing isomorphism and then break the log likelihood ratio computations to two one dimensional PAM constellations. Gains larger than 0.6 dB with respect to QAM can be obtained over the peak power limited channels without any increase in detection complexity. Our scheme also provides a systematic way to design constellations with low complexity one dimensional detectors. Several open problems are discussed at the end of the paper. [less ▲]

Detailed reference viewed: 26 (2 UL)
Full Text
Peer Reviewed
See detailNeuro-Inspired Reward-Based Tracking Control for Robotic Manipulators with Unknown Dynamics
Klecker, Sophie UL; Hichri, Bassem UL; Plapper, Peter UL

in Proceedings of the 2017 2nd International Conference on Robotics and Automation Engineering (ICRAE) (2017, December)

Tracking control for robotic manipulators is required for numerous automation tasks in manufacturing engineering. For this purpose, model-free PD-controllers are largely implemented by default in ... [more ▼]

Tracking control for robotic manipulators is required for numerous automation tasks in manufacturing engineering. For this purpose, model-free PD-controllers are largely implemented by default in commercially available robot arms and provide satisfactory performance for simple path following applications. Ever more complex automation tasks however ask for novel intelligent and adaptive tracking control strategies. In surface finishing processes, discontinuous freeform paths as well as changing constraints between the robotic end-effector and its surrounding environment affect the tracking control by undermining the stable system performance. The lacking knowledge of industrial robot dynamic parameters presents an additional challenge for the tracking control algorithms. In this paper the control problem of robotic manipulators with unknown dynamics and varying constraints is addressed. A robust sliding mode controller is combined with an RBF (Radial Basis Function) Neural Network-estimator and an intelligent, biomimetic BELBIC (Brain Emotional Learning-Based Intelligent Control) term to approximate the nonlinear robot dynamics function and achieve a robust and adaptive tracking performance. [less ▲]

Detailed reference viewed: 20 (1 UL)
Full Text
Peer Reviewed
See detailEnergy efficient transmission in MIMO interference channels with QoS constraints
Yang, Yang UL; Pesavento, Marius

in Proc. 8th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (2017, December)

Detailed reference viewed: 19 (2 UL)
Full Text
Peer Reviewed
See detailCombined Use of Lifecycle Management and IoT in Smart Cities
Hefnawy, Ahmed; Elhariri, Taha; Bouras, Abdelaziz et al

in Combined Use of Lifecycle Management and IoT in Smart Cities (2017, December)

Detailed reference viewed: 49 (2 UL)
Full Text
Peer Reviewed
See detailA Framework for Optimizing Multi-cell NOMA: Delivering Demand with Less Resource
You, Lei; Lei, Lei UL; Yuan, Di et al

in 2017 IEEE Global Communications Conference (GLOBECOM) (2017, December)

Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far ... [more ▼]

Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far, most papers on NOMA have focused on performance gain for one or sometimes two base stations. In this paper, we study multi-cell NOMA and provide a general framework for user clustering and power allocation, taking into account inter-cell interference, for optimizing resource allocation of NOMA in multi-cell networks of arbitrary topology. We provide a series of theoretical analysis, to algorithmically enable optimization approaches. The resulting algorithmic notion is very general. Namely, we prove that for any performance metric that monotonically increases in the cells’ resource consumption, we have convergence guarantee for global optimum. We apply the framework with its algorithmic concept to a multi-cell scenario to demonstrate the gain of NOMA in achieving significantly higher efficiency. [less ▲]

Detailed reference viewed: 84 (16 UL)
Full Text
Peer Reviewed
See detailComparison of design for composite beams in steel and concrete according to Eurocode 4 and Chinese Design Codes
Zhang, Qingjie UL; Schäfer, Markus UL

in XI Conference on Steel and Composite Construction (2017, November 23)

Parallel to the investigation in the second generation of Eurocodes, the Chinese design standards are also updated. At 01/12/2016, a new Chinese Code for the design of composite structures JGJ138-2016 was ... [more ▼]

Parallel to the investigation in the second generation of Eurocodes, the Chinese design standards are also updated. At 01/12/2016, a new Chinese Code for the design of composite structures JGJ138-2016 was put in practice to replace the old JGJ138-2001. Benefit from the vast experience of composite structure applications blooming recently in Chinese, the new code covers much wider topics and is more comparable to Eurocodes 4. Generally, both codes cover topics of composite beams and columns, composite slabs and composite connections. However, JGJ138-2016 covers also the design of composite shear walls, while Eurocode 4 considers more about durability and time effects. It is necessary to compare the materials used for both of codes. In this article, it covers comparison of the mechanic properties such as elastic modulus, characteristic strength and design strength. The analysis includes concrete, reinforcement, and structural steel. The main comparison is the design procedure of composite columns. The application range of the codes will be pointed out first. Both codes allow the design of concrete encased sections and concrete filled rectangular and circular tubes. However different limitations on cross-section sizes and materials can be found. Eurocode 4 represents three different design methods: the simplified method for centric loading, based on the buckling curves; the general method based on 2nd order calculation for action effects and N-M interaction for the determination of resistances; as well as the non-linear method based on stress-strain limitation of material and FE-Analysis. Chinese code gives a simplified method of the calculation of column resistance for centric and eccentric loading. Also the impact of second-order effect are to proof if needed. According to the EN1994-1-1 the impact of creep is to consider for the denervation of the bending stiffness and for ideal buckling resistance and non-dimensional slenderness. JGJ138-2016 do not consider impact of creep for the design. Besides, JGJ138-2016 includes also design for seismic situation. The axial cross-section resistance and normal force-moment interaction curves (N-M curves) will be compared through theoretical analysis and parameter studies. JGJ138-2016 considers mainly transversal shear resistances, while Eurocode 4 further considers shear connection, load introduction and longitudinal shear outside the areas of load introduction. The design shear resistance will be compared in general and within parameter study. [less ▲]

Detailed reference viewed: 43 (3 UL)
Full Text
Peer Reviewed
See detailEvasive Maneuvering for UAVs: An MPC Approach
Castillo Lopez, Manuel UL; Olivares Mendez, Miguel Angel UL; Voos, Holger UL

in ROBOT'2017 - Third Iberian Robotics Conference, Sevilla, Spain, 2017 (2017, November 22)

Flying autonomously in a workspace populated by obstacles is one of the main goals when working with Unmanned Aerial Vehicles (UAV). To address this challenge, this paper presents a model predictive ... [more ▼]

Flying autonomously in a workspace populated by obstacles is one of the main goals when working with Unmanned Aerial Vehicles (UAV). To address this challenge, this paper presents a model predictive flight controller that drives the UAV through collision-free trajectories to reach a given pose or follow a way-point path. The major advantage of this approach lies on the inclusion of three-dimensional obstacle avoidance in the control layer by adding ellipsoidal constraints to the optimal control problem. The obstacles can be added, moved and resized online, providing a way to perform waypoint navigation without the need of motion planning. In addition, the delays of the system are considered in the prediction by an experimental first order with delay model of the system. Successful experiments in 3D path tracking and obstacle avoidance validates its effectiveness for sense-and-avoid and surveillance applications presenting the proper structure to extent its autonomy and applications. [less ▲]

Detailed reference viewed: 66 (12 UL)
Full Text
Peer Reviewed
See detailA Perspective of Security for Mobile Service Robots
Cornelius, Gary Philippe UL; Hochgeschwender, Nico UL; Voos, Holger UL et al

in Iberian Robotics Conference, Seville, Spain, 2017 (2017, November 22)

Future homes will contain Mobile Service Robots (MSR) with diverse functionality. MSRs act in close proximity to humans and have the physical capabilities to cause serious harm to their environment ... [more ▼]

Future homes will contain Mobile Service Robots (MSR) with diverse functionality. MSRs act in close proximity to humans and have the physical capabilities to cause serious harm to their environment. Furthermore, they have sensors that gather large amounts of data, which might contain sensitive information. A mobile service robot’s physical capabilities are controlled by networked computers susceptible to faults and intrusions. The proximity to humans and the possibility to physically interact with them makes it critical to think about the security issues of MSRs. In this work, we investigate possible attacks on mobile service robots. We survey adversary motivations to attack MSRs, analyse threat vectors and list different available defence mechanisms against attacks on MSRs. [less ▲]

Detailed reference viewed: 157 (59 UL)