References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 231 (3 UL)
Full Text
Peer Reviewed
See detailAre octroyed constitutions of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon (Ed.) ‘Imposed Constitutions: Aspects of Imposed Constitutionalism’ (in press)

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a ... [more ▼]

The paper considers ‘octroyed’, ‘conceded’ or ‘granted’ constitutions of 19th century Europe whose common roots are to be found in the French ‘Charte constitutionnelle’ of 1814. These Charters stem from a paternalistic process of domestic constitution-making engaged unilaterally by a monarch possessing the de facto constituent power and exercising it without the direct involvement of a body representing the people. Such octroyed constitutions, which are of course to be opposed to democratically established ones, show nevertheless a number of specific characteristics which distinguish them also from ‘imposed constitutions’ in the usual sense. The expression ‘constitutional octroy’ should not be used as a synonym for any process leading to an ‘imposed Constitution’. The contribution aims to develop and to validate or invalidate the value of a series of distinctive criteria and possible elements of a definition of ‘octroyed’ or ‘granted’ constitutions in order to underline their specificity. [less ▲]

Detailed reference viewed: 26 (2 UL)
Full Text
Peer Reviewed
See detailFeasibility Analysis of Blockchain for Donation-based Crowdfunding of Ethical Projects
Khan, Nida UL; Ouaich, Rachid

in AUEIRC Proceeedings (in press)

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present ... [more ▼]

Donation is a necessary social tool that is plagued by many inherent shortcomings. A novel model in the form of a decentralized app was designed in the Ethereum blockchain to solve the challenges present and optimize the process of Zakaah donation. Load and stress tests on the prototype of the smart contract in the public testnet of Ethereum were analyzed to gauge the feasibility of mass usage. Similar tests were done in Hyperledger to conclude on the optimum blockchain platform for Zakaah. An anomaly was detected during the testing phase of the decentralized app in the public testnet of Ethereum and it was exploited to propose a novel strategy to enhance the throughput of Ethereum. The testing is a pioneer in evaluating the throughput and feasibility of a blockchain based financial product and provides a benchmark to validate the business and technical hypotheses of other similar financial products and services. [less ▲]

Detailed reference viewed: 120 (13 UL)
Full Text
See detailKommunale Selbstinszenierung im vorstädtischen Raum. Ein neuer Blick auf Leprosorien des Spätmittelalters und der frühen Neuzeit
Uhrmacher, Martin UL

in Hesse, Christian; Schulte, Daniela; Stercken, Martina (Eds.) Kommunale Selbstinszenierung (in press)

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical ... [more ▼]

Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical Perspectives' Universität Zürich, 3./4./5. September 2015 Martin Uhrmacher (Universität Luxemburg) „Leprosorien als kommunale Repräsentationsbauten im vorstädtischen Raum. Ein neuer Blick auf eine bisher wenig beachtete städtische Baugattung“ Die vor den Mauern mittelalterlicher und frühneuzeitlicher Städte gelegenen Leprosorien werden heute zumeist noch immer als abgelegene und verborgene Orte der Exklusion angesehen, durch Zäune und Mauern von der Außenwelt getrennt. Dementsprechend wird auch der Baugattung „Leprosorium“ nur wenig architektonischer Wert zugebilligt, wie bspw. im Ausstellungskatalog „Aussatz – Lepra – Hansen-Krankheit: Demnach hatten sie „keinerlei repräsentative Bedeutung, im Gegenteil: eher unauffällig sollten sie sein, verborgen vor dem Blick der Stadtbewohner und Reisenden“. Im 2005 von Monika Escher und Frank G. Hirschmann publizierten Syntheseband „Die urbanen Zentren des hohen und späten Mittelalters“ zur Geschichte mittelalterlicher Städte zwischen Rhein und Maas werden Leprosorien zudem als „nicht wertungsrelevantes“ Urbanitäts- und Zentralitätskriterium“ bezeichnet; begründet mit der angeblichen „Tatsache, daß in der Regel der topographische Bezug zur Stadt gering war“. In der jüngeren Forschung hat sich diese Einschätzung nun grundlegend gewandelt. Leprosorien gelten aufgrund ihrer besonders prominent und exponiert ausgewählten Standorte an Kreuzungen, Brücken und Hauptausfallstraßen als präsente und das städtische Umland prägende kommunale Einrichtungen, die ein fester Bestandteil der städtischen Lebenswelt waren. Sie dienten nicht dazu, ihre Bewohner zu verstecken, sondern waren vielmehr mit Stiftungen und Spenden versehene städtische Einrichtungen, die vom Rat und den Bürgern auch als Prestigeobjekte betrachtet wurden. Anhand ausgewählter Beispiele wird aufgezeigt, wie Leprosorien als Repräsentationsobjekte der Stadtgemeinden auch dem bürgerlichen Selbstverständnis Ausdruck verliehen. [less ▲]

Detailed reference viewed: 10 (1 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 134 (5 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 43 (9 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 23 (1 UL)
Full Text
Peer Reviewed
See detailHybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems
Tsinos, Christos UL; Maleki, Sina UL; Chatzinotas, Symeon UL et al

in Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems (in press)

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the ... [more ▼]

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the design of a prospect transceiver should guarantee the efficient coexistence with the incumbent services in these bands. To that end, in this paper, two underlay cognitive transceiver designs are proposed based on a hybrid Analog/Digital transceiver architecture that enables the mmWave spectrum access while controlling the interference to the incumbent users with low hardware complexity and power consumption. The first cognitive solution designs a codebook free cognitive hybrid pre-coder by maximizing the mutual information between its two ends subject to interference, power and hardware constraints related to the analog counterpart. The second solution is codebook based and exhibits less complexity than the first one at the cost of inferior spectral efficiency. A novel codebook free solution for the post-coder at the cognitive receiver part is further proposed, based on a hardware constrained Minimum Mean Square Error criterion. Simulations study the performance of both the proposed hybrid approaches and compare it to the one of a fully digital solution for typical wireless environments. [less ▲]

Detailed reference viewed: 157 (22 UL)
Full Text
Peer Reviewed
See detailComparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL et al

in Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers (in press)

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to ... [more ▼]

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances while recommending cloud services to the cloud users, using all available data. In this paper, we compare our two approaches to do so: a min-max-min decomposition based on Intuitionistic Fuzzy Logic (IFL) and a Performance Heat Map technique, to evaluate the performance of commercially available cloud providers. While the IFL technique provides simple, total order of the evaluated CSPs, Performance Heat Map provides transparent and explanatory, yet consistent evaluation of service performance of commercially available CSPs. The identified drawbacks of the IFL technique are: 1) It does not return the accurate performance evaluation over multiple decision alternatives due to highly influenced by critical feedback of the evaluators; 2) Overall ranking of the CSPs is not as expected according to the performance measurement. As a result, we recommend to use performance Heat Map for this problem. [less ▲]

Detailed reference viewed: 51 (10 UL)
Full Text
Peer Reviewed
See detailExperimental design trade-offs for gene regulatory network inference: an in silico study of the yeast Saccharomyces cerevisiae cell cycle
Markdahl, Johan UL; Colombo, Nicolo UL; Thunberg, Johan UL et al

in Proceedings of the 56th IEEE Conference on Decision and Control (in press)

Time-series of high throughput gene sequencing data intended for gene regulatory network (GRN) inference are often short due to the high costs of sampling cell systems. Moreover, experimentalists lack a ... [more ▼]

Time-series of high throughput gene sequencing data intended for gene regulatory network (GRN) inference are often short due to the high costs of sampling cell systems. Moreover, experimentalists lack a set of quantitative guidelines that prescribe the minimal number of samples required to infer a reliable GRN model. We study the temporal resolution of data vs.quality of GRN inference in order to ultimately overcome this deficit. The evolution of a Markovian jump process model for the Ras/cAMP/PKA pathway of proteins and metabolites in the G1 phase of the Saccharomyces cerevisiae cell cycle is sampled at a number of different rates. For each time-series we infer a linear regression model of the GRN using the LASSO method. The inferred network topology is evaluated in terms of the area under the precision-recall curve (AUPR). By plotting the AUPR against the number of samples, we show that the trade-off has a, roughly speaking, sigmoid shape. An optimal number of samples corresponds to values on the ridge of the sigmoid. [less ▲]

Detailed reference viewed: 9 (1 UL)
Full Text
Peer Reviewed
See detailAn Investigation of Compression Techniques to Speed up Mutation Testing
Zhu; Panichella, Annibale UL; Zaidman, Andy

in 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (in press)

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]

Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]

Detailed reference viewed: 21 (6 UL)
Full Text
Peer Reviewed
See detailLa force intégrative du statut de l'Etat membre sur la fonction juridictionnelle
Neframi, Eleftheria UL

in Potvin Solis, Laurence (Ed.) Le statut d'Etat membre de l'Union européenne (in press)

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields ... [more ▼]

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields covered by Union law (Art 19, par 1, subpar 2, TEU). Member States have to ensure access to the national judge, who has been entrusted with a European mandate, and who is in measure to cooperate with the Court of Justice through the preliminary reference procedure. The Member States establish in this way an integrated judicial function. The exercise of such a function by the national judge, in cooperation with the Court of Justice and under the control of the Member State, implies integrative dynamic, which however depends on the balancing exercise with national procedural autonomy and the margin of appreciation of the national judge. [less ▲]

Detailed reference viewed: 12 (0 UL)
Full Text
See detailNeue Staaten – neue Grenzen. Die Rhein-Maas-Mosel-Region zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816)
Uhrmacher, Martin UL

in Fickers, Andreas; Franz, Norbert; Laux, Stephan (Eds.) et al Repression, Reform und Neuordnung im Zeitalter der Revolutionen: Die Folgen des Wiener Kongresses für Westeuropa. Tagung und Workshop zum 200. Jahrestag des Abschlusses des Wiener Kongresses (in press)

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress ... [more ▼]

Abstract Konferenz 200 Jahre Wiener Kongress Martin Uhrmacher Neue Staaten – neue Grenzen. Die Großregion zwischen den Grenzbereinigungen des Ancien Régime und der Neuordnung durch den Wiener Kongress (1779 – 1816). Der Vortrag untersucht die Veränderung von Grenzen und Ihre Entwicklung von sich teils überlagernden und durch Enklaven und Gemeinsherrschaften durchsetzten historisch gewachsenen Grenzsäumen hin zu begradigten, fest definierten und teils naturräumlichen Scheidelinien folgenden Staatsgrenzen. In der heutigen Großregion vollzog sich dieser fundamentale Wandel in nur drei Jahrzehnten: Er gliederte die Region vollkommen neu. Zunächst waren es 1779 mit dem Brüsseler Vertrag nach jahrzehntelangen Verhandlungen endlich zu einem Ausgleich zwischen Österreich und Frankreich gekommen, der die Grenzstreitigkeiten beseitigte und neue, begradigte Grenzen exakt festlegte. Ein ähnlicher Vertrag wurde auch zwischen Österreich und Kurtrier abgeschlossen. Doch die als endgültig geplanten Regelungen bestanden nur wenige Jahre: Infolge der französischen Revolution annektierte die französische Republik am 1. Oktober 1795 die österreichischen Niederlande mit dem Herzogtum Luxemburg und kurz darauf auch Kurtrier und die anderen linksrheinischen Territorien. Alle Staaten wurden aufgelöst und gehörten nun zum französischen Staatsgebiet; Teile der alten Grenzen bestanden als Départementsgrenzen weiter. Nach der Absetzung Napoleons beschloss der Wiener Kongress 1815 eine Neuordnung Europas. Doch im Maas-Moselraum blieben mit Ausnahme Frankreichs alle Territorien und Landesherrschaften, die hier seit dem Früh- und Hochmittelalter bestanden hatten verschwunden. Sie wurden ersetzt durch das neu gegründete Großherzogtum Luxemburg und das ebenfalls neu gegründete Königreich der Vereinigten Niederlande sowie durch die preußische Rheinprovinz, die den gesamten östlichen Teil umfasste. Bei der territorialen Neugliederung griff man in Teilen auf die bis 1795 bestehenden Grenzen des alten Herzogtums zurück. In der Schlussakte des Wiener Kongresses behandeln die Artikel 66 bis 69 das Großherzogtum Luxemburg. Hier werden die Grenzen des neuen Staates allerdings nur grob umrissen; detaillierte Regelungen blieben späteren Verträgen vorbehalten. Unstrittig war die Süd- und Westgrenze mit Frankreich; sie entsprach der 1769/79 festgesetzten und bis 1795 gültigen Linie mit Ausnahme des ehemaligen Herzogtums Bouillon als Zugewinn. Vollkommen neu festgelegt wurde jedoch die Ostgrenze: Mit der Schlussakte des Wiener Kongresses waren alle hier an Luxemburg angrenzenden Gebiete an das Königreich Preußen gefallen. In den Verträgen von Aachen (26. Juni 1816) und Kleve (7. Oktober 1816) einigten sich die niederländische und die preußische Seite darauf, dass die Flussläufe von Mosel, Sauer und Our zukünftig die gemeinsame Grenze bildeten. Hier offenbart sich ein grundlegender Wandel im Verständnis und der Genese von Grenzen: Bisher waren territoriale Veränderungen auf Grundlage historisch gewachsener Herrschaftsstrukturen vorgenommen worden. So konnten kleinere Herrschaften aber auch größere Gebietskonglomerate zwar durch Tausch, Verkauf, Abtretung oder - wie durch Frankreich praktiziert - als „Reunionen“ die territoriale Zugehörigkeit wechseln. Dabei wurden jedoch die historisch gewachsenen Grenzen beachtet, sogar noch bei der Einrichtung der französischen Départements 1795. Mit der Wahl des Flußverlaufs von Sauer und Our als Grenze zwischen Luxemburg und Preußen wurde dieses Prinzip durchbrochen und ein naturräumliches Gliederungselement als neu geschaffene Grenze gewählt. [less ▲]

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailThe competence to conclude the new generation of free trade agreements: lessons from Opinion 2/15
Neframi, Eleftheria UL

in Chaisse, Julien (Ed.) China-European Union Investment Relationships (in press)

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU ... [more ▼]

Opinion 2/15 addresses the question of the external competence of the EU to conclude a free trade agreement with Singapore (EUSFTA). The nature of the EU’s competence determines the conclusion of an EU-only agreement, or a mixed agreement, jointly by the Union and its Member States. The Court of Justice of the European Union held that the EU competence to conclude the EUSFTA is not exclusive, as long as provisions concerning non-direct investments and dispute settlement fall under the shared competence of the Union and its Member States. The Court of Justice made valuable contributions to the interpretation of the scope of the Union’s competence in the field of common commercial policy, comprising sustainable development provisions, as well as to the interpretation of implied external competences, and clarified the status of non-substantive provisions. However, uncertainty remains as far as the meaning and the impact of a shared competence are concerned. [less ▲]

Detailed reference viewed: 18 (3 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 86 (6 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 54 (3 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 85 (8 UL)
Full Text
Peer Reviewed
See detailOn the performance of an overlapping-domain parallelization strategy for Eulerian-Lagrangian Multiphysics software
Pozzetti, Gabriele UL; Besseron, Xavier UL; Rousset, Alban UL et al

in AIP Conference Proceedings ICNAAM 2017 (in press)

In this work, a strategy for the parallelization of a two-way CFD-DEM coupling is investigated. It consists on adopting balanced overlapping partitions for the CFD and the DEM domains, that aims to reduce ... [more ▼]

In this work, a strategy for the parallelization of a two-way CFD-DEM coupling is investigated. It consists on adopting balanced overlapping partitions for the CFD and the DEM domains, that aims to reduce the memory consumption and inter-process communication between CFD and DEM. Two benchmarks are proposed to assess the consistency and scalability of this approach, coupled execution on 252 cores shows that less than 1\% of time is used to perform inter-physics data exchange. [less ▲]

Detailed reference viewed: 46 (22 UL)
Full Text
Peer Reviewed
See detailNew Directions in Attack Tree Research: Catching up with Industrial Needs
Gadyatskaya, Olga UL; Trujillo Rasua, Rolando UL

in Mauw, Sjouke (Ed.) Proceedings of the 4th International Workshop on Graphical Models for Security (in press)

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal ... [more ▼]

Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal mathematical frameworks for analyzing them in a qualitative or a quantitative manner. Indeed, the mathematical frameworks have become a large focus of attack tree research. However, practical applications of attack trees in industry largely remain a tedious and error-prone exercise. Recent research directions in attack trees, such as attack tree generation, attempt to close this gap and to improve the attack tree state-of-thepractice. In this position paper we outline the recurrent challenges in manual tree design within industry, and we overview the recent research results in attack trees that help the practitioners. For the challenges that have not yet been addressed by the community, we propose new promising research directions. [less ▲]

Detailed reference viewed: 21 (1 UL)
Full Text
Peer Reviewed
See detailModelling Metrics for Transparency in Medical Systems
Pierina Brustolin Spagnuelo, Dayana UL; Bartolini, Cesare UL; Lenzini, Gabriele UL

in Proceedings of TrustBus 2017 (in press)

Detailed reference viewed: 44 (11 UL)
Full Text
Peer Reviewed
See detailComparative Study of Genetic and Discrete Firefly Algorithm for Combinatorial Optimization
Tessaro Lunardi, Willian UL; Voos, Holger UL

in 33rd ACM/SIGAPP Symposium On Applied Computing, Pau, France, April 9 - 13, 2018 (2018, April)

Flexible job-shop scheduling problem (FJSP) is one of the most challenging combinatorial optimization problems. FJSP is an extension of the classical job shop scheduling problem where an operation can be ... [more ▼]

Flexible job-shop scheduling problem (FJSP) is one of the most challenging combinatorial optimization problems. FJSP is an extension of the classical job shop scheduling problem where an operation can be processed by several different machines. The FJSP contains two sub-problems, namely machine assignment problem and operation sequencing problem. In this paper, we propose and compare a discrete firefly algorithm (FA) and a genetic algorithm (GA) for the multi-objective FJSP. Three minimization objectives are considered, the maximum completion time, workload of the critical machine and total workload of all machines. Five well-known instances of FJSP have been used to evaluate the performance of the proposed algorithms. Comparisons among our methods and state-of-the-art algorithms are also provided. The experimental results demonstrate that the FA and GA have achieved improvements in terms of efficiency. Solutions obtained by both algorithms are comparable to those obtained by algorithms with local search. In addition, based on our initial experiments, results show that the proposed discrete firefly algorithm is feasible, more effective and efficient than our proposed genetic algorithm for solving multi-objective FJSP. [less ▲]

Detailed reference viewed: 109 (42 UL)
Full Text
Peer Reviewed
See detailAnticipating Suspicious Actions using a Small Dataset of Action Templates
Baptista, Renato UL; Antunes, Michel; Aouada, Djamila UL et al

in 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP) (2018, January)

In this paper, we propose to detect an action as soon as possible and ideally before it is fully completed. The objective is to support the monitoring of surveillance videos for preventing criminal or ... [more ▼]

In this paper, we propose to detect an action as soon as possible and ideally before it is fully completed. The objective is to support the monitoring of surveillance videos for preventing criminal or terrorist attacks. For such a scenario, it is of importance to have not only high detection and recognition rates but also low time latency for the detection. Our solution consists in an adaptive sliding window approach in an online manner, which efficiently rejects irrelevant data. Furthermore, we exploit both spatial and temporal information by constructing feature vectors based on temporal blocks. For an added efficiency, only partial template actions are considered for the detection. The relationship between the template size and latency is experimentally evaluated. We show promising preliminary experimental results using Motion Capture data with a skeleton representation of the human body. [less ▲]

Detailed reference viewed: 26 (4 UL)
Full Text
Peer Reviewed
See detailTesting Vision-Based Control Systems Using Learnable Evolutionary Algorithms
Ben Abdessalem (helali), Raja UL; Nejati, Shiva UL; Briand, Lionel UL et al

in Proceedings of the 40th International Conference on Software Engineering (ICSE 2018) (2018)

Vision-based control systems are key enablers of many autonomous vehicular systems, including self-driving cars. Testing such systems is complicated by complex and multidimensional input spaces. We ... [more ▼]

Vision-based control systems are key enablers of many autonomous vehicular systems, including self-driving cars. Testing such systems is complicated by complex and multidimensional input spaces. We propose an automated testing algorithm that builds on learnable evolutionary algorithms. These algorithms rely on machine learning or a combination of machine learning and Darwinian genetic operators to guide the generation of new solutions (test scenarios in our context). Our approach combines multiobjective population-based search algorithms and decision tree classification models to achieve the following goals: First, classification models guide the search-based generation of tests faster towards critical test scenarios (i.e., test scenarios leading to failures). Second, search algorithms refine classification models so that the models can accurately characterize critical regions (i.e., the regions of a test input space that are likely to contain most critical test scenarios). Our evaluation performed on an industrial automotive vision-based control system shows that: (1) Our algorithm outperforms a baseline evolutionary search algorithm and generates 78% more distinct, critical test scenarios compared to the baseline algorithm. (2) Our algorithm accurately characterizes critical regions of the system under test, thus identifying the conditions that likely to lead to system failures. [less ▲]

Detailed reference viewed: 97 (24 UL)
Full Text
Peer Reviewed
See detailA Security Analysis, and a Fix, of a Code-Corrupted Honeywords System
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL et al

in Proceedings of the 4th International Conference on Information Systems Security and Privacy (2018)

In 2013 Juels and Rivest introduced the Honeywords System, a password-based authentication system designed to detect when a password file has been stolen. A Honeywords System stores passwords together ... [more ▼]

In 2013 Juels and Rivest introduced the Honeywords System, a password-based authentication system designed to detect when a password file has been stolen. A Honeywords System stores passwords together with indistinguishable decoy words so when an intruder steals the file, retrieves the words, and tries to log-in, he does not know which one is the password. By guessing one from the decoy words, he may not be lucky and reveal the leak. Juels and Rivest left a problem open: how to make the system secure even when the intruder corrupted the login server’s code. In this paper we study and solve the problem. However, since “code corruption” is a powerful attack, we first define rigorously the threat and set a few assumptions under which the problem is still solvable, before showing meaningful attacks against the original Honeywords System. Then we elicit a fundamental security requirement, implementing which, we are able to restore the honeywords System’s security despite a corrupted login service. We verify the new protocol’s security formally, using ProVerif for this task. We also implement the protocol and test its performance. Finally, at the light of our findings, we discuss whether it is still worth using a fixed honeywords-based system against such a powerful threat, or whether it is better, in order to be resilient against code corruption attacks, to design afresh a completely different password-based authentication solution. [less ▲]

Detailed reference viewed: 65 (13 UL)
Full Text
Peer Reviewed
See detailAutomated Generation of Constraints from Use Case Specifications to Support System Testing
Wang, Chunhui UL; Pastore, Fabrizio UL; Briand, Lionel UL

in Proceedings of the 11th IEEE Conference on Software Testing, Validation and Verification (2018)

System testing plays a crucial role in safety-critical domains, e.g., automotive, where system test cases are used to demonstrate the compliance of software with its functional and safety requirements ... [more ▼]

System testing plays a crucial role in safety-critical domains, e.g., automotive, where system test cases are used to demonstrate the compliance of software with its functional and safety requirements. Unfortunately, since requirements are typically written in natural language, significant engineering effort is required to derive test cases from requirements. In such a context, automated support for generating system test cases from requirements specifications written in natural language would be highly beneficial. Unfortunately, existing approaches have limited applicability. For example, some of them require that software engineers provide formal specifications that capture some of the software behavior described using natural language. The effort needed to define such specifications is usually a significant deterrent for software developers. This paper proposes an approach, OCLgen, which largely automates the generation of the additional formal specifications required by an existing test generation approach named UMTG. More specifically, OCLgen relies on semantic analysis techniques to automatically derive the pre- and post-conditions of the activities described in use case specifications. The generated conditions are used by UMTG to identify the test inputs that cover all the use case scenarios described in use case specifications. In practice, the proposed approach enables the automated generation of test cases from use case specifications while avoiding most of the additional modeling effort required by UMTG. Results from an industrial case study show that the approach can automatically and correctly generate more than 75% of the pre- and post-conditions characterizing the activities described in use case specifications. [less ▲]

Detailed reference viewed: 66 (8 UL)
Full Text
Peer Reviewed
See detailExtended Explanatory Argumentation Frameworks
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already ... [more ▼]

Multiple extensions of Dung's argumentation frameworks (AFs) have been proposed in order to model features of argumentation that cannot be directly modeled in AFs. One technique that has already previously proven useful to study and combine such extensions is the meta-argumentation methodology involving the notion of a flattening. In order to faithfully model the interaction between explanation argumentation in scientific debates, Šešelja and Straßer have introduced Explanatory Argumentation Frameworks (EAFs). In this paper, we first prove that the flattening technique works as expected for recursive (higher-order) attacks. Then we apply this technique in order to combine EAFs with multiple other extensions that have been proposed to AFs, namely with recursive attacks, joint attacks and a support relation between arguments. This gives rise to Extended Explanatory Argumentation Frameworks (EEAFs). We illustrate the applicability of EEAFs by using them to model a piece of argumentation from a research-level philosophy book. [less ▲]

Detailed reference viewed: 80 (4 UL)
Full Text
Peer Reviewed
See detailLes bourgeois de Bohême et l’impossible légitimation ? La conjuration de Prague et de Kutná Hora de février 1309
Vomacka, Eloïse UL

in Contester au Moyen Âge : de la désobéissance à la révolte XLIXe congrès de la SHMESP (2018)

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailASPIC-END: Structured Argumentation with Explanations and Natural Deduction
Dauphin, Jérémie UL; Cramer, Marcos UL

in Theory and Applications of Formal Argumentation (2018)

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that ... [more ▼]

We propose ASPIC-END, an adaptation of the structured argumentation framework ASPIC+ which can incorporate explanations and natural deduction style arguments. We discuss an instantiation of ASPIC-END that models argumentation about explanations of semantic paradoxes (e.g. the Liar paradox), and we show that ASPIC-END satisfies rationality postulates akin to those satisfied by ASPIC+. [less ▲]

Detailed reference viewed: 66 (8 UL)
Full Text
Peer Reviewed
See detailSecure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
Seo, Hwajeong; Liu, Zhe UL; Park, Taehwan et al

in The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 (2017, December 30)

Detailed reference viewed: 3 (0 UL)
Full Text
Peer Reviewed
See detailOn the Risk of Tool Over-tuning in Runtime Verification Competitions
Bianculli, Domenico UL; Krstic, Srdan

in Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (2017, December 14)

Detailed reference viewed: 31 (7 UL)
Full Text
Peer Reviewed
See detailTemPsy-Check: a Tool for Model-driven Trace Checking of Pattern-based Temporal Properties
Dou, Wei UL; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (2017, December 14)

Detailed reference viewed: 38 (6 UL)
Full Text
Peer Reviewed
See detailTightly-Secure PAK(E)
Lopez Becerra, José Miguel UL; Iovino, Vincenzo UL; Ostrev, Dimiter UL et al

in Cryptology and Network Security (2017, December 02)

We present a security reduction for the PAK protocol instantiated over Gap Diffie-Hellman Groups that is tighter than previously known reductions. We discuss the implications of our results for concrete ... [more ▼]

We present a security reduction for the PAK protocol instantiated over Gap Diffie-Hellman Groups that is tighter than previously known reductions. We discuss the implications of our results for concrete security. Our proof is the first to show that the PAK protocol can provide meaningful security guarantees for values of the parameters typical in today’s world. [less ▲]

Detailed reference viewed: 21 (2 UL)
Full Text
Peer Reviewed
See detailFast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
Xinwei, Gao; Li, Lin; Jintai, Ding et al

in The 13th International Conference on Information Security Practice and Experience - ISPEC 2017 (2017, December 01)

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailEvaluating the Impact of Juice Filming Charging Attack in Practical Environments
Meng, Weizhi; Lee, Wanghao; Liu, Zhe UL et al

in The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 (2017, December 01)

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailModel-Driven Interaction Design for Social Robots
Cornelius, Gary Philippe UL; Hochgeschwender, Nico UL; Voos, Holger UL

in 4th International Workshop on Model-driven Robot Software Engineering, Marburg, Germany, 2017 (2017, December)

Robotic software development frameworks lack a possibility to present,validate and generate qualitative complex human robot interactions and robot de-velopers are mostly left with unclear informal project ... [more ▼]

Robotic software development frameworks lack a possibility to present,validate and generate qualitative complex human robot interactions and robot de-velopers are mostly left with unclear informal project specifications. The devel-opment of a human-robot interaction is a complex task and involves different ex-perts, for example, the need for human-robot interaction (HRI) specialists, whoknow about the psychological impact of the robot’s movements during the in-teraction in order to design the best possible user experience. In this paper, wepresent a new project that aims to provide exactly this. Focusing on the interac-tion flow and movements of a robot for human-robot interactions we aim to pro-vide a set of modelling languages for human-robot interaction which serves as acommon, more formal, discussion point between the different stakeholders. Thisis a new project and the main topics of this publication are the scenario descrip-tion, the analysis of the different stakeholders, our experience as robot applicationdevelopers for our partner, as well as the future work we plan to achieve. [less ▲]

Detailed reference viewed: 35 (13 UL)
Full Text
Peer Reviewed
See detailCombined Use of Lifecycle Management and IoT in Smart Cities
Hefnawy, Ahmed; Elhariri, Taha; Bouras, Abdelaziz et al

in Combined Use of Lifecycle Management and IoT in Smart Cities (2017, December)

Detailed reference viewed: 23 (2 UL)
Full Text
Peer Reviewed
See detailOn low complexity detection for QAM isomorphic constellations
Kayhan, Farbod UL

in Kayhan, Farbod (Ed.) On low compelxity detection for QAM isomorphic constellations (2017, December)

Despite of the known gap from the Shannon's capacity, several standards are still employing QAM or star shape constellations, mainly due to the existing low complexity detectors. In this paper, we ... [more ▼]

Despite of the known gap from the Shannon's capacity, several standards are still employing QAM or star shape constellations, mainly due to the existing low complexity detectors. In this paper, we investigate the low complexity detection for a family of QAM isomorphic constellations. These constellations are known to perform very close to the peak-power limited capacity, outperforming the DVB-S2X standard constellations. The proposed strategy is to first remap the received signals to the QAM constellation using the existing isomorphism and then break the log likelihood ratio computations to two one dimensional PAM constellations. Gains larger than 0.6 dB with respect to QAM can be obtained over the peak power limited channels without any increase in detection complexity. Our scheme also provides a systematic way to design constellations with low complexity one dimensional detectors. Several open problems are discussed at the end of the paper. [less ▲]

Detailed reference viewed: 17 (2 UL)
Full Text
Peer Reviewed
See detailA Framework for Optimizing Multi-cell NOMA: Delivering Demand with Less Resource
You, Lei; Lei, Lei UL; Yuan, Di et al

in 2017 IEEE Global Communications Conference (GLOBECOM) (2017, December)

Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far ... [more ▼]

Non-orthogonal multiple access (NOMA) allows multiple users to simultaneously access the same time-frequency resource by using superposition coding and successive interference cancellation (SIC). Thus far, most papers on NOMA have focused on performance gain for one or sometimes two base stations. In this paper, we study multi-cell NOMA and provide a general framework for user clustering and power allocation, taking into account inter-cell interference, for optimizing resource allocation of NOMA in multi-cell networks of arbitrary topology. We provide a series of theoretical analysis, to algorithmically enable optimization approaches. The resulting algorithmic notion is very general. Namely, we prove that for any performance metric that monotonically increases in the cells’ resource consumption, we have convergence guarantee for global optimum. We apply the framework with its algorithmic concept to a multi-cell scenario to demonstrate the gain of NOMA in achieving significantly higher efficiency. [less ▲]

Detailed reference viewed: 66 (15 UL)
Full Text
Peer Reviewed
See detailComparison of design for composite beams in steel and concrete according to Eurocode 4 and Chinese Design Codes
Zhang, Qingjie UL; Schäfer, Markus UL

in XI Conference on Steel and Composite Construction (2017, November 23)

Parallel to the investigation in the second generation of Eurocodes, the Chinese design standards are also updated. At 01/12/2016, a new Chinese Code for the design of composite structures JGJ138-2016 was ... [more ▼]

Parallel to the investigation in the second generation of Eurocodes, the Chinese design standards are also updated. At 01/12/2016, a new Chinese Code for the design of composite structures JGJ138-2016 was put in practice to replace the old JGJ138-2001. Benefit from the vast experience of composite structure applications blooming recently in Chinese, the new code covers much wider topics and is more comparable to Eurocodes 4. Generally, both codes cover topics of composite beams and columns, composite slabs and composite connections. However, JGJ138-2016 covers also the design of composite shear walls, while Eurocode 4 considers more about durability and time effects. It is necessary to compare the materials used for both of codes. In this article, it covers comparison of the mechanic properties such as elastic modulus, characteristic strength and design strength. The analysis includes concrete, reinforcement, and structural steel. The main comparison is the design procedure of composite columns. The application range of the codes will be pointed out first. Both codes allow the design of concrete encased sections and concrete filled rectangular and circular tubes. However different limitations on cross-section sizes and materials can be found. Eurocode 4 represents three different design methods: the simplified method for centric loading, based on the buckling curves; the general method based on 2nd order calculation for action effects and N-M interaction for the determination of resistances; as well as the non-linear method based on stress-strain limitation of material and FE-Analysis. Chinese code gives a simplified method of the calculation of column resistance for centric and eccentric loading. Also the impact of second-order effect are to proof if needed. According to the EN1994-1-1 the impact of creep is to consider for the denervation of the bending stiffness and for ideal buckling resistance and non-dimensional slenderness. JGJ138-2016 do not consider impact of creep for the design. Besides, JGJ138-2016 includes also design for seismic situation. The axial cross-section resistance and normal force-moment interaction curves (N-M curves) will be compared through theoretical analysis and parameter studies. JGJ138-2016 considers mainly transversal shear resistances, while Eurocode 4 further considers shear connection, load introduction and longitudinal shear outside the areas of load introduction. The design shear resistance will be compared in general and within parameter study. [less ▲]

Detailed reference viewed: 27 (3 UL)
Full Text
Peer Reviewed
See detailEvasive Maneuvering for UAVs: An MPC Approach
Castillo Lopez, Manuel UL; Olivares Mendez, Miguel Angel UL; Voos, Holger UL

in ROBOT'2017 - Third Iberian Robotics Conference, Sevilla, Spain, 2017 (2017, November 22)

Flying autonomously in a workspace populated by obstacles is one of the main goals when working with Unmanned Aerial Vehicles (UAV). To address this challenge, this paper presents a model predictive ... [more ▼]

Flying autonomously in a workspace populated by obstacles is one of the main goals when working with Unmanned Aerial Vehicles (UAV). To address this challenge, this paper presents a model predictive flight controller that drives the UAV through collision-free trajectories to reach a given pose or follow a way-point path. The major advantage of this approach lies on the inclusion of three-dimensional obstacle avoidance in the control layer by adding ellipsoidal constraints to the optimal control problem. The obstacles can be added, moved and resized online, providing a way to perform waypoint navigation without the need of motion planning. In addition, the delays of the system are considered in the prediction by an experimental first order with delay model of the system. Successful experiments in 3D path tracking and obstacle avoidance validates its effectiveness for sense-and-avoid and surveillance applications presenting the proper structure to extent its autonomy and applications. [less ▲]

Detailed reference viewed: 35 (5 UL)
Full Text
Peer Reviewed
See detailA Perspective of Security for Mobile Service Robots
Cornelius, Gary Philippe UL; Hochgeschwender, Nico UL; Voos, Holger UL et al

in Iberian Robotics Conference, Seville, Spain, 2017 (2017, November 22)

Future homes will contain Mobile Service Robots (MSR) with diverse functionality. MSRs act in close proximity to humans and have the physical capabilities to cause serious harm to their environment ... [more ▼]

Future homes will contain Mobile Service Robots (MSR) with diverse functionality. MSRs act in close proximity to humans and have the physical capabilities to cause serious harm to their environment. Furthermore, they have sensors that gather large amounts of data, which might contain sensitive information. A mobile service robot’s physical capabilities are controlled by networked computers susceptible to faults and intrusions. The proximity to humans and the possibility to physically interact with them makes it critical to think about the security issues of MSRs. In this work, we investigate possible attacks on mobile service robots. We survey adversary motivations to attack MSRs, analyse threat vectors and list different available defence mechanisms against attacks on MSRs. [less ▲]

Detailed reference viewed: 90 (43 UL)
Full Text
Peer Reviewed
See detailLearning Resource Management through Semantic Annotation Features in Popular Authoring Software
Grevisse, Christian UL; Botev, Jean UL; Rothkugel, Steffen UL

in ICERI 2017 Proceedings (2017, November 16)

The ever-growing set of learning material challenges both students and teachers. While students often need to quickly retrieve resources on a certain topic, teachers have to author high quality documents ... [more ▼]

The ever-growing set of learning material challenges both students and teachers. While students often need to quickly retrieve resources on a certain topic, teachers have to author high quality documents in a limited amount of time, preferably using their favourite tools. In this paper, we propose an open ecosystem of plugins for popular authoring software, enabling teachers to annotate learning resources using domain concepts from ontologies. In addition, a plugin for the Moodle Learning Management System extracts these annotations from the metadata of the provided resources to allow students to get an overview of important concepts and efficiently retrieve corresponding material. [less ▲]

Detailed reference viewed: 14 (3 UL)
Full Text
See detailRecent Successes with a Meta-Logical Approach to Universal Logical Reasoning (Extended Abstract)
Benzmüller, Christoph UL

in Benzmüller, Christoph (Ed.) Formal Methods: Foundations and Applications - 20th Brazilian Symposium SBMF 2017, Recife, Brazil, November 29 - December 1, 2017, Proceedings (2017, November 11)

The quest for a most general framework supporting universal reasoning is very prominently represented in the works of Leibniz. He envisioned a scientia generalis founded on a characteristica universalis ... [more ▼]

The quest for a most general framework supporting universal reasoning is very prominently represented in the works of Leibniz. He envisioned a scientia generalis founded on a characteristica universalis, that is, a most universal formal language in which all knowledge about the world and the sciences can be encoded. A quick study of the survey literature on logical formalisms suggests that quite the opposite to Leibniz’ dream has become reality. Instead of a characteristica universalis, we are today facing a very rich and heterogenous zoo of different logical systems, and instead of converging towards a single superior logic, this logic zoo is further expanding, eventually even at accelerated pace. As a consequence, the unified vision of Leibniz seems farther away than ever before. However, there are also some promising initiatives to counteract these diverging developments. Attempts at unifying approaches to logic include categorial logic algebraic logic and coalgebraic logic. [less ▲]

Detailed reference viewed: 32 (5 UL)
Full Text
Peer Reviewed
See detailOptimising Packet Forwarding in Multi-Tenant Networks using Rule Compilation
Hommes, Stefan UL; Valtchev, Petko; Blaiech, Khalil et al

in Optimising Packet Forwarding in Multi-Tenant Networks using Rule Compilation (2017, November)

Packet forwarding in Software-Defined Networks (SDN) relies on a centralised network controller which enforces network policies expressed as forwarding rules. Rules are deployed as sets of entries into ... [more ▼]

Packet forwarding in Software-Defined Networks (SDN) relies on a centralised network controller which enforces network policies expressed as forwarding rules. Rules are deployed as sets of entries into network device tables. With heterogeneous devices, deployment is strongly bounded by the respective table constraints (size, lookup time, etc.) and forwarding pipelines. Hence, minimising the overall number of entries is paramount in reducing resource consumption and speeding up the search. Moreover, since multiple control plane applications can deploy own rules, conflicts may occur. To avoid those and ensure overall correctness, a rule validation mechanism is required. Here, we present a compilation mechanism for rules of diverging origins that minimises the number of entries. Since it exploits the semantics of rules and entries, our compiler fits a heterogeneous landscape of network devices. We evaluated compiler implementations on both software and hardware switches using a realistic testbed. Experimental results show a reduction in both produced table entries and forwarding delay. [less ▲]

Detailed reference viewed: 17 (2 UL)
Full Text
Peer Reviewed
See detailDeadzone-Quadratic Penalty Function for Predictive Extended Cruise Control with Experimental Validation
Sajadi Alamdari, Seyed Amin UL; Voos, Holger UL; Darouach, Mohamed

in ROBOT 2017: Third Iberian Robotics Conference, Sevilla, Spain 22-24 November 2017 (2017, November)

Battery Electric Vehicles have high potentials for the modern transportations, however, they are facing limited cruising range. To address this limitation, we present a semi-autonomous ecological driver ... [more ▼]

Battery Electric Vehicles have high potentials for the modern transportations, however, they are facing limited cruising range. To address this limitation, we present a semi-autonomous ecological driver assistance system to regulate the velocity with energy-efficient techniques. The main contribution of this paper is the design of a real-time nonlinear receding horizon optimal controller to plan the online cost-effective cruising velocity. Instead of conventional L2-norms, a deadzone-quadratic penalty function for the nonlinear model predictive controller is proposed. Obtained field experimental results demonstrate the effectiveness of the proposed method for a semi-autonomous electric vehicle in terms of real-time energy-efficient velocity regulation and constraints satisfaction. [less ▲]

Detailed reference viewed: 26 (5 UL)
Full Text
Peer Reviewed
See detailFatigue of rocks
Pytlik, Robert Stanislaw UL; Van Baars, Stefan UL

in Johansson, Erik; Raasakka, Ville (Eds.) Proceedings of the 3rd Nordic Rock Mechanics Symposium, NRMS 2017 (2017, November)

Cyclic loading on civil structures can lead to a reduction of strength of the used materials. For the materials concrete and especially steel, there are clear design codes about how to account for the ... [more ▼]

Cyclic loading on civil structures can lead to a reduction of strength of the used materials. For the materials concrete and especially steel, there are clear design codes about how to account for the reduction of the material shear strength due to this cyclic loading, which is called fatigue. For the material rock, however, there are no design codes or standards for fatigue, in terms of shear strength reduction. For this reason, a large number of laboratory triaxial tests have been performed, in order to evaluate the fatigue of rocks by comparing the shear strength parameters obtained in cyclic triaxial tests with the static shear strength. Tests have been performed on artificial gypsum, a mixture of sand and cement (mortar) and soft sedimentary limestone. Correlations of the fatigue, for both the number of cycles and the cyclic stress ratio, have been obtained. All triaxial tests were conducted on dry samples (no pore pressure) in the natural state. The range of the confining pressure was between 0 MPa and 0.5 MPa. The frequency was kept low to allow for a precise application of the cyclic load and also accurate readings. The number of applied cycles was from a few cycles up to a few hundred thousand. The imperfections in the artificial gypsum have a significant impact on the results of the (especially cyclic) strength tests. Therefore another man made material was used – a mixture of sand and cement (mortar). As the first static test results were very promising, mortar was used in further tests. The cyclic tests, however, presented a similar, high scatter of results as for artificial gypsum. Due to the complex behaviour of the cohesive materials and high scatter of the results, many tests were required. Two different strategies were used to investigate the fatigue of the cohesive geomaterials: 1. the remaining shear strength curve: after a given number of cycles, a final single load test until failure, measures the remaining shear strength of the sample. 2. the typical S-N curve (Wöhler curves): one counts the number of constant loading cycles until failure. The fatigue of rocks can be seen as a reduction of the cohesion. In this way, the fatigue of a cohesive geomaterial can be described by (a reduction of) the remaining cohesion. An unexpected observation for both artificial gypsum and mortar was that unlike the number of cycles, the size of the cyclic stress ratio has little influence on the remaining shear strength, and therefore on fatigue. The remaining shear strength (or strength reduction) curve has been compared with the standard S-N curve, and is found to be rather similar for both artificial gypsum and mortar. The reason for this is this unexpected observation. Because of this, the S-N curve and the remaining shear strength curve should be theoretically identical. The results of the triaxial tests show however that, the S-N curve gives a bit steeper slope than the remaining shear strength curve, which would imply a shorter life and a faster reduction in comparison to the remaining shear strength curve, but this is only because, the prematurely failed samples are not included in the remaining shear strength curve, while a significant number of the S-N samples are prematurely failed samples from the remaining shear strength tests. [less ▲]

Detailed reference viewed: 11 (1 UL)
Full Text
Peer Reviewed
See detailObserver-based Event-triggered Attack-Tolerant Control Design for Cyber-physical Systems
Bezzaoucha, Souad UL; Voos, Holger UL; Darouach, Mohamed

in 14th International Workshop on Advanced Control and Diagnosis, Bucharest, Romania, November 2017 (2017, November)

In the present paper, a model-based fault/attack tolerant scheme is proposed to cope with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback ... [more ▼]

In the present paper, a model-based fault/attack tolerant scheme is proposed to cope with cyber-threats on Cyber Physicals Systems. A common scheme based on observers is designed and a state feedback control based on an aperiodic event-triggered framework is given with control synthesis and condition on the switching time. Classical fault tolerant control with Bilinear Matrix Inequality (BMI) approaches are used to achieve novel and better security strategy based on an event-triggered control implementation. The purpose in using the event-based implementation would be to reduce (limit) the total number of transmissions to only instances when the networked control system (NCS) needs attention. An illustrative example of the proposed approach applied to a three-tank system is presented. [less ▲]

Detailed reference viewed: 39 (3 UL)
Full Text
Peer Reviewed
See detailYour Moves, Your Device: Establishing Behavior Profiles Using Tensors
Falk, Eric UL; Charlier, Jérémy Henri J. UL; State, Radu UL

in Advanced Data Mining and Applications - 13th International Conference, ADMA 2017 (2017, November)

Smartphones became a person's constant companion. As the strictly personal devices they are, they gradually enable the replacement of well established activities as for instance payments, two factor ... [more ▼]

Smartphones became a person's constant companion. As the strictly personal devices they are, they gradually enable the replacement of well established activities as for instance payments, two factor authentication or personal assistants. In addition, Internet of Things (IoT) gadgets extend the capabilities of the latter even further. Devices such as body worn fitness trackers allow users to keep track of daily activities by periodically synchronizing data with the smartphone and ultimately with the vendor's computational centers in the cloud. These fitness trackers are equipped with an array of sensors to measure the movements of the device, to derive information as step counts or make assessments about sleep quality. We capture the raw sensor data from wrist-worn activity trackers to model a biometric behavior profile of the carrier. We establish and present techniques to determine rather the original person, who trained the model, is currently wearing the bracelet or another individual. Our contribution is based on CANDECOMP/PARAFAC (CP) tensor decomposition so that computational complexity facilitates: the execution on light computational devices on low precision settings, or the migration to stronger CPUs or to the cloud, for high to very high granularity. This precision parameter allows the security layer to be adaptable, in order to be compliant with the requirements set by the use cases. We show that our approach identifies users with high confidence. [less ▲]

Detailed reference viewed: 22 (5 UL)
Full Text
Peer Reviewed
See detailAnalysis of Fingerprinting Techniques for Tor Hidden Services
Panchenko, Andriy UL; Mitseva, Asya UL; Henze, Martin et al

in Proceedings of the 24th ACM Computer and Communications Security (ACM CCS) 16th Workshop on Privacy in the Electronic Society (ACM WPES 2017) (2017, October 31)

Detailed reference viewed: 96 (12 UL)
Full Text
See detail2017 AIChE Annual Meeting
Qi, Fenglei UL; Wright, Mark

in Qi, Fenglei; Wright, Mark (Eds.) A DEM modeling of biomass fast pyrolysis in a double screw reactor (2017, October 31)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailVariant-DB: A Tool for Efficiently Exploring Millions of Human Genetic Variants and Their Annotations
Kutzera, Joachim UL; May, Patrick UL

in Da Silveira, Marcos; Pruski, Cédric; Schneider, Reinhard (Eds.) DILS 2017: Data Integration in the Life Sciences (2017, October 24)

Next Generation Sequencing (NGS) allows sequencing of a human genome within hours, enabling large scale applications such as sequencing the genome of each patient in a clinical study. Each individual ... [more ▼]

Next Generation Sequencing (NGS) allows sequencing of a human genome within hours, enabling large scale applications such as sequencing the genome of each patient in a clinical study. Each individual human genome has about 3.5 Million genetic differences to the so called reference genome, the consensus genome of a healthy human. These differences, called variants, determine individual phenotypes, and certain variants are known to indicate disease predispositions. Finding associations from variant patterns and affected genes to these diseases requires combined analysis of variants from multiple individuals and hence, efficient solutions for accessing and filtering the variant data. We present Variant-DB, our in-house database solution that allows such efficient access to millions of variants from hundreds to thousands of individuals. Variant-DB stores individual variant genotypes and annotations. It features a REST-API and a web-based front-end for filtering variants based on annotations, individuals, families and studies. We explain Variant-DB and its front-end and demonstrate how the Variant-DB API can be included in data integration workflows. [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailAutomatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks
Appelt, Dennis; Panichella, Annibale UL; Briand, Lionel UL

in The 28th IEEE International Symposium on Software Reliability Engineering (ISSRE) (2017, October 23)

Testing and fixing WAFs are two relevant and complementary challenges for security analysts. Automated testing helps to cost-effectively detect vulnerabilities in a WAF by generating effective test cases ... [more ▼]

Testing and fixing WAFs are two relevant and complementary challenges for security analysts. Automated testing helps to cost-effectively detect vulnerabilities in a WAF by generating effective test cases, i.e., attacks. Once vulnerabilities have been identified, the WAF needs to be fixed by augmenting its rule set to filter attacks without blocking legitimate requests. However, existing research suggests that rule sets are very difficult to understand and too complex to be manually fixed. In this paper, we formalise the problem of fixing vulnerable WAFs as a combinatorial optimisation problem. To solve it, we propose an automated approach that combines machine learning with multi-objective genetic algorithms. Given a set of legitimate requests and bypassing SQL injection attacks, our approach automatically infers regular expressions that, when added to the WAF's rule set, prevent many attacks while letting legitimate requests go through. Our empirical evaluation based on both open-source and proprietary WAFs shows that the generated filter rules are effective at blocking previously identified and successful SQL injection attacks (recall between 54.6% and 98.3%), while triggering in most cases no or few false positives (false positive rate between 0% and 2%). [less ▲]

Detailed reference viewed: 144 (14 UL)
Full Text
Peer Reviewed
See detailHistorical overview of CPT-based design methods
Rica, Shilton UL; Van Baars, Stefan UL

in Proceedings of the International Conference of Civil Engineering, ICCE 2017, Tirana 12-14 October 2017 (2017, October 12)

The Cone Penetration Test (CPT) is used for many decades in order to evaluate the pile bearing capacity. Pieter Barentsen developed the CPT around 1930 in order to investigate the soil resistance. However ... [more ▼]

The Cone Penetration Test (CPT) is used for many decades in order to evaluate the pile bearing capacity. Pieter Barentsen developed the CPT around 1930 in order to investigate the soil resistance. However, Boonstra was the first, in 1940, to used the cone resistance of the CPT as the unit pile bearing capacity. From this moment, the CPT became very important in the evaluation of the pile bearing capacity. An overview is given about the most common pile design methods, which are based on the in-situ Cone Penetration Test (CPT). This overview will start with the evolution of the CPT, followed by a brief presentation of the methods in use. An important part, in pile design methods, is the averaging procedure of the cone resistance over an influence zone around the pile tip. Since the pile tip is much wider than the tip of the CPT cone, the influence zone of the pile is also much larger, therefore the cone resistance has to be averaged over the influence zone around the pile tip. Unfortunately, the definition of this zone is different for each method in use. Finally, several methods for the pile tip bearing capacity near the interface of a soil layer will be discussed, including related methods from De Beer [1] and White & Bolton [2]. [less ▲]

Detailed reference viewed: 24 (7 UL)
Full Text
Peer Reviewed
See detailSecurity in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals
Lenzini, Gabriele UL; Samir, Ouchani; Roenne, Peter UL et al

in Proc. of the 9th IEEE Workshop on Information Forensics and Security (2017, October 02)

We describe the application in security of shells of Cholesteric Liquid Crystals (ChLCs). Such shells have a diameter in the microns range and can be gathered in hundreds in a surface area as small as a ... [more ▼]

We describe the application in security of shells of Cholesteric Liquid Crystals (ChLCs). Such shells have a diameter in the microns range and can be gathered in hundreds in a surface area as small as a nail’s head. Because of their structural properties, a bundle of them reflects light, creating colorful patterns that we argue to be unique and computationally hard to predict. We argue also that the bundle itself is unclonable. These are typical properties of Physically Unclonable Functions, a family to which shells of ChLCs belong too. Herein we discuss their physical and security properties and their potential use in object authentication. [less ▲]

Detailed reference viewed: 68 (1 UL)
Full Text
Peer Reviewed
See detailDesign of an Electromechanical Prosthetic Finger using Shape Memory Alloy Wires
van der Elst, Louis UL; Quintanar Guzman, Serket UL; Hadji-Minaglou, Jean-Régis UL

in IEEE 5th International Symposium on Robotics and Intelligent Sensors, Ottawa, Canada, 5-7 October 2017 (2017, October)

This research concerns the design and prototyping of an artificial middle finger, using Shape Memory Alloys (SMAs), PolyLactic Acid (PLA), and other technologies. The design is a biomimicry of the human ... [more ▼]

This research concerns the design and prototyping of an artificial middle finger, using Shape Memory Alloys (SMAs), PolyLactic Acid (PLA), and other technologies. The design is a biomimicry of the human biological anatomical and muscular systems. After briefly describing the operational features and functioning of natural striated muscles, the document reviews the features, advantages and disadvantages of SMAs in the perspective of their use as an actuator of a prosthetic finger.Using different design parameters, such as the lightness of the device, actuation complexity, and resilience, a working prototype is proposed meeting the established criteria. [less ▲]

Detailed reference viewed: 37 (2 UL)
Full Text
Peer Reviewed
See detailOptical Feeder Links Study towards Future Generation MEO VHTS Systems
Mengali, Alberto UL; Lyras, Nikos K.; Shankar, Bhavani UL et al

in Proceedings of the 35th AIAA International Communications Satellite Systems Conference (ICSSC) (2017, October)

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailSur les uninormes discrètes idempotentes
Couceiro, Miguel; Devillet, Jimmy UL; Marichal, Jean-Luc UL

in Couceiro, Miguel; Devillet, Jimmy; Marichal, Jean-Luc (Eds.) LFA 2017 - Rencontres francophones sur la logique floue et ses applications (2017, October)

In this paper we provide two axiomatizations of the class of idempotent discrete uninorms as conservative binary operations, where an operation is conservative if it always outputs one of its input values ... [more ▼]

In this paper we provide two axiomatizations of the class of idempotent discrete uninorms as conservative binary operations, where an operation is conservative if it always outputs one of its input values. More precisely we first show that the idempotent discrete uninorms are exactly those operations that are conservative, symmetric, and nondecreasing. Then we show that, in this characterization, symmetry can be replaced with both bisymmetry and existence of a neutral element. [less ▲]

Detailed reference viewed: 15 (5 UL)
Full Text
Peer Reviewed
See detailRelay Selection Strategies for SWIPT-Enabled Cooperative Wireless Systems
Gautam, Sumit UL; Lagunas, Eva UL; Sharma, Shree K. et al

in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, Oct. 2017 (2017, October)

Detailed reference viewed: 110 (28 UL)
Full Text
Peer Reviewed
See detailPlease Stand By: TV-based indoor localization
Popleteev, Andrei UL

in 28th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC-2017) (2017, October)

Despite the decades of efforts, indoor positioning remains an open research challenge. While existing solutions already demonstrate high accuracy, their in-building infrastructure --- such as Wi-Fi access ... [more ▼]

Despite the decades of efforts, indoor positioning remains an open research challenge. While existing solutions already demonstrate high accuracy, their in-building infrastructure --- such as Wi-Fi access points or Bluetooth beacons --- provides only a limited coverage. This paper investigates feasibility of accurate indoor positioning using broadcast digital TV signals, readily available in populated areas worldwide. We experiment with the classic received signal strength (RSS) fingerprinting, and introduce a novel approach based on channel state information (CSI), which leverages frequency-selective multipath fading of wideband TV signals. The proposed methods are experimentally evaluated on an extensive dataset of DVB-T signals, systematically collected in two large buildings over the course of 8 months. The results show that the proposed approach consistently outperforms RSS fingerprinting and achieves 92--98% localization accuracy. While this study is based on the European DVB-T signals, the proposed method is directly generalizable to other TV standards (such as ATSC, ISDB, DTMB and DMB) and wide-area TV white space (TVWS) networks. [less ▲]

Detailed reference viewed: 25 (5 UL)
Full Text
Peer Reviewed
See detailHeterogeneous models and analyses in the design of real-time embedded systems - an avionic case-study
Brau, Guillaume UL; Navet, Nicolas UL; Hugues, Jérôme

in 25th International Conference on Real-Time Networks and Systems, Grenoble 4-6 October 2017 (2017, October)

The development of embedded systems according to Model-Driven Development relies on two complementary activities: system modeling on the one hand and analysis of the non-functional properties, such as ... [more ▼]

The development of embedded systems according to Model-Driven Development relies on two complementary activities: system modeling on the one hand and analysis of the non-functional properties, such as timing properties, on the other hand. Yet, the coupling between models and analyses remains largely disregarded so far: e.g., how to apply an analysis on a model? How to manage the analysis process? This paper presents an application of our research on this topic. In particular, we show that our approach makes it possible to combine heterogeneous models and analyses in the design of an avionic system. We use two languages to model the system at different levels of abstraction: the industry standard AADL (Architecture Analysis and Design Language) and the more recent implementation-oriented CPAL language (Cyber-Physical Action Language). We then combine different real-time scheduling analyses so as to gradually define the task and network parameters and finally validate the schedulability of all activities of the system. [less ▲]

Detailed reference viewed: 6 (1 UL)
Full Text
Peer Reviewed
See detailWi-Fi butterfly effect in indoor localization: The impact of imprecise ground truth and small-scale fading
Popleteev, Andrei UL

in 14th IEEE Workshop on Positioning, Navigation and Communications (WPNC-2017) (2017, October)

The increasing accuracy of indoor positioning systems makes their evaluation an increasingly challenging task. A number of factors are already known to affect performance of fingerprint-based systems ... [more ▼]

The increasing accuracy of indoor positioning systems makes their evaluation an increasingly challenging task. A number of factors are already known to affect performance of fingerprint-based systems: hardware diversity, device orientation, environment dynamics. This paper presents a new butterfly-like effect in localization experiments. The effect is caused by minor ground truth (GT) errors --- that is, small deviations between calibration and test positions. While such deviations are widely considered as purely additive and thus negligible, we demonstrate that even centimeter-scale GT errors are amplified by small-scale radio fading and lead to severe multi-meter Wi-Fi positioning errors. The results show that fingerprint-based localization accuracy quickly deteriorates as GT errors increase towards 0.4 wavelength (5 cm for 2.4 GHz). Beyond that threshold, system's accuracy saturates to about one-third of its original level achievable with precise GT. This effect challenges the impact of the already known accuracy-limiting factors (such as cross-user tests, receiver diversity, device orientation and temporal variations), as they can be partially explained by minor GT errors. Moreover, for smartphone-in-a-hand experiments, this effect directly associates the evaluation outcomes with experimenters' diligence. [less ▲]

Detailed reference viewed: 21 (0 UL)
Full Text
See detailUsage public normalisé ou anormal: Kant et les Lumières face à Jeffrey Stout
Burks, Deven UL

in Ruffing, Margit; Grapotte, Sophie; Lequan, Mai (Eds.) Kant: L’année 1784: Droit et philosophie de l’histoire (2017, October)

Dans “Réponse à la question: Qu’est-ce que les Lumières?”, Kant se donne pour tâche de garantir “la plus inoffensive de toutes les libertés, celle de faire publiquement usage de sa raison en toutes ... [more ▼]

Dans “Réponse à la question: Qu’est-ce que les Lumières?”, Kant se donne pour tâche de garantir “la plus inoffensive de toutes les libertés, celle de faire publiquement usage de sa raison en toutes choses” et, par là même, de fonder le progrès des lumières dans un discours public de type normalisé. La démarche de Kant se révèle normalisante dans la mesure où elle “rend commensurable toute contribution au discours dans un domaine” (Jeffrey Stout, Ethics After Babel, p. 294, ma traduction): dans l’usage public, tout interlocuteur part d’un vocabulaire épuré, “à titre de savant”, pour s’adresser à un public de “lecteurs” de sorte que tout autre interlocuteur peut accepter les raisons du premier, peu importe sa fonction dans la société. Une telle normalisation des conditions de pratiques discursives peut-elle réellement faire progresser la société humaine comme le prétend Kant? Certes, un discours normalisé rend compte de la fragmentation de l’autorité dans la société moderne. Mais il résiste à l’effort de certains interlocuteurs, peu satisfaits de ses prétentions libérales fondationnalistes, d’y apporter des éléments justificatifs issus non pas des usages publics de la raison mais de ceux dits “privés”. Car, pour Jeffrey Stout, la discussion qui fait réellement progresser la société cosmopolite passe par l’écoute, “l’interaction conversationnelle” et la critique improvisée dans un “discours anormal” (idem.). À force de vouloir fixer les critères du débat en avance, on le rendrait en même temps stérile. Si cela constitue une critique forte d’un discours normalisé kantien dont les principes sont fondationnalistes, il n’exclut nullement un discours normalisé kantien de type non-fondationnaliste. A cet effet, il suffirait de supposer une raison pratique et un discours modaux, sensibles aux particularités des interlocuteurs, selon lesquels l’usage public exige des interlocuteurs des raisons qui pourraient être adoptées de façon cohérente par tout interlocuteur dans le domaine en question (cf. Towards justice and virtue, Onora O’Neill). Dans cet optique modal, l’usage public résiste-il mieux ou finit-il par se rapprocher de ses critiques plus qu’on ne le soupçonne? [less ▲]

Detailed reference viewed: 9 (0 UL)
Full Text
See detailTowards Automatic Human Body Model Fitting to a 3D Scan
Saint, Alexandre Fabian A UL; Shabayek, Abd El Rahman UL; Aouada, Djamila UL et al

in D'APUZZO, Nicola (Ed.) Proceedings of 3DBODY.TECH 2017 - 8th International Conference and Exhibition on 3D Body Scanning and Processing Technologies, Montreal QC, Canada, 11-12 Oct. 2017 (2017, October)

This paper presents a method to automatically recover a realistic and accurate body shape of a person wearing clothing from a 3D scan. Indeed, in many practical situations, people are scanned wearing ... [more ▼]

This paper presents a method to automatically recover a realistic and accurate body shape of a person wearing clothing from a 3D scan. Indeed, in many practical situations, people are scanned wearing clothing. The underlying body shape is thus partially or completely occluded. Yet, it is very desirable to recover the shape of a covered body as it provides non-invasive means of measuring and analysing it. This is particularly convenient for patients in medical applications, customers in a retail shop, as well as in security applications where suspicious objects under clothing are to be detected. To recover the body shape from the 3D scan of a person in any pose, a human body model is usually fitted to the scan. Current methods rely on the manual placement of markers on the body to identify anatomical locations and guide the pose fitting. The markers are either physically placed on the body before scanning or placed in software as a postprocessing step. Some other methods detect key points on the scan using 3D feature descriptors to automate the placement of markers. They usually require a large database of 3D scans. We propose to automatically estimate the body pose of a person from a 3D mesh acquired by standard 3D body scanners, with or without texture. To fit a human model to the scan, we use joint locations as anchors. These are detected from multiple 2D views using a conventional body joint detector working on images. In contrast to existing approaches, the proposed method is fully automatic, and takes advantage of the robustness of state-of-art 2D joint detectors. The proposed approach is validated on scans of people in different poses wearing garments of various thicknesses and on scans of one person in multiple poses with known ground truth wearing close-fitting clothing. [less ▲]

Detailed reference viewed: 45 (11 UL)
Full Text
Peer Reviewed
See detailRecurrent Neural Network based control of an Oil Well
Jordanou, Jean Panaioti; Antonelo, Eric Aislan UL; Camponogara, Eduardo et al

in Brazilian Symposium on Intelligent Automation, Porto Alegre 1-4 October 2017 (2017, October)

Detailed reference viewed: 15 (3 UL)
Full Text
Peer Reviewed
See detailHuman-Robot Cooperation in Surface Inspection Aerial Missions
Molina, Martin; Frau, Pedro; Maraval, Dario et al

in 2017 International Micro Air Vehicle Conference and Flight Competition (IMAV), Toulouse, France, 18-21 Septembre 2017 (2017, September 21)

The goal of the work presented in this paper is to facilitate the cooperation between human opera- tors and aerial robots to perform surface inspec- tion missions. Our approach is based on a model of ... [more ▼]

The goal of the work presented in this paper is to facilitate the cooperation between human opera- tors and aerial robots to perform surface inspec- tion missions. Our approach is based on a model of human collaborative control with a mixed ini- tiative interaction. In the paper, we present our human-robot cooperation model based on the combination of a supervisory mode and an as- sistance mode with a set of interaction patterns. We developed a software system implementing this interaction model and carried out several real flight experiments that proved that this ap- proach can be used in aerial robotics for sur- face inspection missions (e.g., in vision based indoor missions). Compared to a conventional tele-operated inspection system, the solution pre- sented in this paper gives more autonomy to the aerial systems, reducing the cognitive load of the operator during the mission development. [less ▲]

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailMechanical Model to Predict the Resistance of the Shear Connection in Composite Beams with Deep Steel Decking
Odenbreit, Christoph UL; Nellinger, Sebastian UL

in Eurosteel 2017 (2017, September 13)

The resistance of a typical shear connection with headed shear studs in a composite beam is analysed in the normal case in accordance with EN 1994-1-1. The reducing effect of a trapezoidal metal decking ... [more ▼]

The resistance of a typical shear connection with headed shear studs in a composite beam is analysed in the normal case in accordance with EN 1994-1-1. The reducing effect of a trapezoidal metal decking onto the ultimate load bearing capacity is considered with empirically derived reduction factors and equations, which have been developed in the last century between the late 70th and the early 80th. The RFCS research project “DISCCO” investigated the shear stud resistance with novel types of steel decking. In many cases, the shear resistance, which was predicted by EN 1994-1-1 was not reached in tests. In the respective experiments with composite beams and deep decking, a concrete cone failure mode was identified and not a pure shear failure of the stud. This failure mode acted in combination with the load bearing capacity of the shear stud, which formed one or two plastic hinges in the shaft - depending on the available geometry. Based on these observations, new equations have been developed to predict the shear connection’s resistance with more accurcy. The yield hinge mechanism of the shear stud, which was developed by Lungershausen, was extended by the above mentioned load bearing component ‘concrete cone’. The formulae consider the geometry of the stud and the steel decking, the material strength of the stud and of the concrete material. The statistical evaluation of the developed equations shows a good accordance with test results. [less ▲]

Detailed reference viewed: 14 (2 UL)
Full Text
Peer Reviewed
See detailExperimental investigations on semi-continuous encased composite joints
Duarte Da Costa, Job UL; Obiala, Renata UL; Odenbreit, Christoph UL

in Eurosteel 2017 (2017, September 13)

The benefits brought to composite construction by the use of semi-continuous joints are well recognised and confirmed by the significant amount of research which has been performed in this area. It has ... [more ▼]

The benefits brought to composite construction by the use of semi-continuous joints are well recognised and confirmed by the significant amount of research which has been performed in this area. It has been analytically proven that at serviceability limit state (SLS) the performance of composite beams benefits from the use of semi-continuous composite joints [1]. At ultimate limit state (ULS) it is of common knowledge that the use of semi-continuous composite joints is only judicious in combination with the plastic hinge theory, which requires the verification of the rotation capacity of the joint. Despite all the effort done in this area, a concise and well-defined method to determine the rotation capacity of composite joints is lacking. Hence, a research programme with a large experimental part has been designed to investigate the behaviour of the connection between a column and a composite slim-floor beam subjected to a negative bending moment. It is the first time that the rotation capacity of an encased composite joint is analysed. The experimental campaign, presented in here, aims at determining the influence of each joint component on the rotation capacity of composite joints. Three test series have been performed; on boltless beam-to-column connections using variable longitudinal reinforcement ratio and bar diameter of the slab, on a bare bolted end-plate steel connection without reinforced concrete slab and finally on the encased composite joint with the complete bolted end-plate connection. This paper presents a detailed description of the tested specimen, shows the main results of the experimental investigations and gives an outlook on future work regarding this research project. The final goal of the research project is to develop a comprehensive methodology to predict the rotation capacity for traditional and slim-floor type of composite beams. [less ▲]

Detailed reference viewed: 19 (5 UL)
Full Text
Peer Reviewed
See detailLimits of plastic design for composite beams
Schäfer, Markus UL

in Eurosteel 2017 (2017, September 13)

Due to the demand for sustainable constructions, composite structures become more important and lead to slim and economic solutions. The determination of moment resistance for composite beams follows the ... [more ▼]

Due to the demand for sustainable constructions, composite structures become more important and lead to slim and economic solutions. The determination of moment resistance for composite beams follows the rules for composite structures according to EN 1994-1-1. For the plastic design it is still assumed, that each cross-sectional fibre can plastify without any limitation of strains. For normal composite beams in case of sagging moments and a high-lying plastic neutral axis, the real moment resistance is slightly higher than the plastic resistance. This is based on the large strains at the bottom side of the section, so that the lower steel flange reaches the solidification range. In case of sections with a large compression zone height xpl, a concrete failure in the compression zone can happen before reaching the plastic moment resistance. In these cases a strain limit design, based on the strain-stress relationships of concrete and steel, becomes decisive. EN 1994-1-1 provides only for cross-sections of classes 1 and 2 in steel grades S420 and S460 a limitation of plastic design. It is to point out, that the rotation capacity of a composite section is not only conditioned by the b/t ratio of the steel section, but also the concrete part has a significant impact. This applies not only for high steel grades. Though, in Eurocode 4 there are no further regulations given for sections with lower steel grades. Especially, the more and more upcoming integrated and compact composite sections underline the importance of such requirements. Therefore, the objective of the recent research is concentrated on the development of additional regulations, to consider the influence of concrete compression zone height onto the moment resistance of composite beams. [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailSpecification and Analysis of Resource Utilization Policies for Human-Intensive Systems (Extended Abstract)
Shin, Seung Yeob UL

in Proceedings of the BPM Demo Track and BPM Dissertation Award co-located with 15th International Conference on Business Process Management (BPM 2017) (2017, September 10)

Societal processes, such as those used in healthcare, typically depend on the effective utilization of resources, both human and non-human. Sound policies for the management of these resources are crucial ... [more ▼]

Societal processes, such as those used in healthcare, typically depend on the effective utilization of resources, both human and non-human. Sound policies for the management of these resources are crucial in assuring that these processes achieve their goals. But complex utilization policies may govern the use of such resources, increasing the difficulty of accurately incorporating resource considerations into complex processes. This dissertation presents an approach to the specification, allocation, and analysis of the management of such resources. [less ▲]

Detailed reference viewed: 40 (20 UL)
Full Text
Peer Reviewed
See detailLIPS vs MOSA: a Replicated Empirical Study on Automated Test Case Generation
Panichella, Annibale UL; Kifetew, Fitsum; Tonella, Paolo

in International Symposium on Search Based Software Engineering (SSBSE) 2017 (2017, September 09)

Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The ... [more ▼]

Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The proponents of LIPS, a novel single-target test generator, conducted a preliminary empirical study to compare their approach with MOSA, an alternative many-objective test generator. However, their empirical investigation suffers from several external and internal validity threats, does not consider complex programs with many branches and does not include any qualitative analysis to interpret the results. In this paper, we report the results of a replication of the original study designed to address its major limitations and threats to validity. The new findings draw a completely different picture on the pros and cons of single-target vs many-objective approaches to test case generation. [less ▲]

Detailed reference viewed: 50 (5 UL)
Full Text
Peer Reviewed
See detailPile load test at the west coast of Mexico
Rica, Shilton UL; Van Baars, Stefan UL; Jung, Stefan

in Proceedings of Pile 2017 (2017, September)

Five pile tests have been performed, at the west coast of Mexico, in order to evaluate their pile bearing capacity. The Kentledge system (a test pile loaded in between two tension piles) has been used to ... [more ▼]

Five pile tests have been performed, at the west coast of Mexico, in order to evaluate their pile bearing capacity. The Kentledge system (a test pile loaded in between two tension piles) has been used to execute the pile tests. The soil stratigraphy has been surveyed with standard penetration tests, cone penetration tests and borings, and consists of a ten to twelve meter soft clayey soil on top of a hard clay layer. Three identical pile tests have been performed on bored piles with a pile diameter of 0.6 m and a pile length of 30 m. In addition, two identical pile tests have been performed on driven piles with a squared cross section of 0.5 m × 0.5 m and a pile length of about 21 m. The aims of these tests were, first to evaluate the pile bearing capacity for both the bored and the driven pile types, in order to decide which pile type will be used finally, for the foundation of a factory; and second, to study the influence of the pile installation process on the pile bearing capacity of both pile types. During the testing of the bored piles, load measurements in different sections of the pile suggested that almost all bearing capacity came from the pile section in the upper soft clay layer. Since it is impossible to have such a relative large friction along the pile shaft in the soft soil, and because far more concrete was used for making the pile than expected, it had to be concluded that the liquid concrete has widened the pile diameter just above the hard soil layer, leading to a bulking effect in the pile. Therefore, the pile was leaning on this hard soil layer. For the driven test piles, the measurements showed a normal behaviour of both the pile shaft friction and the pile tip bearing capacity. [less ▲]

Detailed reference viewed: 35 (7 UL)
Full Text
Peer Reviewed
See detailA Model-Driven Approach to Trace Checking of Pattern-based Temporal Properties
Dou, Wei; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017 ) (2017, September)

Detailed reference viewed: 54 (8 UL)
Full Text
Peer Reviewed
See detailMining AndroZoo: A Retrospect
Li, Li UL

in The International Conference on Software Maintenance and Evolution (ICSME) (2017, September)

This paper presents a retrospect of an Android app collection named AndroZoo and some research works conducted on top of the collection. AndroZoo is a growing collection of Android apps from various ... [more ▼]

This paper presents a retrospect of an Android app collection named AndroZoo and some research works conducted on top of the collection. AndroZoo is a growing collection of Android apps from various markets including the official Google Play. At the moment, over five million Android apps have been collected. Based on AndroZoo, we have explored several directions that mine Android apps for resolving various challenges. In this work, we summarize those resolved mining challenges in three research dimensions, including code analysis, app evolution analysis, malware analysis, and present in each dimension several case studies that experimentally demonstrate the usefulness of AndroZoo. [less ▲]

Detailed reference viewed: 103 (9 UL)
Full Text
Peer Reviewed
See detailAmbiLoc: A year-long dataset of FM, TV and GSM fingerprints for ambient indoor localization
Popleteev, Andrei UL

in 8th International Conference on Indoor Positioning and Indoor Navigation (IPIN-2017) (2017, September)

Ambient indoor localization - an approach that leverages ambient radio signals - has been previously shown to provide promising positioning performance using the globally available infrastructure of FM ... [more ▼]

Ambient indoor localization - an approach that leverages ambient radio signals - has been previously shown to provide promising positioning performance using the globally available infrastructure of FM, TV and cellular stations. However, the need for specialized equipment and laborious data collection constitute a high entry barrier for follow-up studies. This paper presents AmbiLoc - a dataset of radio signals for ambient indoor localization research. The dataset has been systematically collected in multiple testbeds, including large-scale and multi-floor buildings, over the course of one year. Due to the use of a software-defined radio receiver, raw signal samples in AmbiLoc allow extraction of arbitrary fingerprinting features. The first edition of AmbiLoc, introduced in this paper, includes received signals strength (RSS) fingerprints of FM, TV and GSM signals, along with the relevant metadata (such as weather conditions). The dataset is available online at AmbiLoc.org. As the first public dataset of ambient localization signals, AmbiLoc provides an easy entry and a common reference for researchers exploring novel indoor localization methods. [less ▲]

Detailed reference viewed: 37 (0 UL)
Full Text
Peer Reviewed
See detailIs Big Data Sufficient for a Reliable Detection of Non-Technical Losses?
Glauner, Patrick UL; Migliosi, Angelo UL; Meira, Jorge Augusto UL et al

in Proceedings of the 19th International Conference on Intelligent System Applications to Power Systems (ISAP 2017) (2017, September)

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to ... [more ▼]

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to 40% of the total electricity distributed. In order to detect NTLs, machine learning methods are used that learn irregular consumption patterns from customer data and inspection results. The Big Data paradigm followed in modern machine learning reflects the desire of deriving better conclusions from simply analyzing more data, without the necessity of looking at theory and models. However, the sample of inspected customers may be biased, i.e. it does not represent the population of all customers. As a consequence, machine learning models trained on these inspection results are biased as well and therefore lead to unreliable predictions of whether customers cause NTL or not. In machine learning, this issue is called covariate shift and has not been addressed in the literature on NTL detection yet. In this work, we present a novel framework for quantifying and visualizing covariate shift. We apply it to a commercial data set from Brazil that consists of 3.6M customers and 820K inspection results. We show that some features have a stronger covariate shift than others, making predictions less reliable. In particular, previous inspections were focused on certain neighborhoods or customer classes and that they were not sufficiently spread among the population of customers. This framework is about to be deployed in a commercial product for NTL detection. [less ▲]

Detailed reference viewed: 51 (7 UL)
Full Text
Peer Reviewed
See detailFrom RELAW Research to Practice: Reflections on an Ongoing Technology Transfer Project
Sannier, Nicolas UL; Sabetzadeh, Mehrdad UL; Briand, Lionel UL

in the IEEE 25th International Requirements Engineering Conference, Lisbon, Portugal, 4-8 September 2017 (2017, September)

Detailed reference viewed: 11 (4 UL)
Full Text
Peer Reviewed
See detailAutomating Emendations of the Ontological Argument in Intensional Higher-Order Modal Logic
Fuenmayor, David; Benzmüller, Christoph UL

in KI 2017: Advances in Artificial Intelligence 40th Annual German Conference on AI (2017, September)

A shallow semantic embedding of an intensional higher-order modal logic (IHOML) in Isabelle/HOL is presented. IHOML draws on Montague/Gallin intensional logics and has been introduced by Melvin Fitting in ... [more ▼]

A shallow semantic embedding of an intensional higher-order modal logic (IHOML) in Isabelle/HOL is presented. IHOML draws on Montague/Gallin intensional logics and has been introduced by Melvin Fitting in his textbook Types, Tableaus and Gödel’s God in order to discuss his emendation of Gödel’s ontological argument for the existence of God. Utilizing IHOML, the most interesting parts of Fitting’s textbook are formalized, automated and verified in the Isabelle/HOL proof assistant. A particular focus thereby is on three variants of the ontological argument which avoid the modal collapse, which is a strongly criticized side-effect in Gödel’s resp. Scott’s original work. [less ▲]

Detailed reference viewed: 21 (5 UL)
See detailDie steuerrechtlichen Herausforderungen der digitalen Wirtschaft - Was passiert in Europa?
Sinnig, Julia UL

in Taeger, Juergen (Ed.) Tagungsband Herbstakademie 2017: Recht 4.0 - Innovationen aus den rechtswissenschaftlichen Laboren (2017, September)

Detailed reference viewed: 43 (5 UL)
Peer Reviewed
See detailA Model for the Optimization of Beacon Message Age-of-Information in a VANET
Baiocchi, Andrea; Turcanu, Ion UL

in A Model for the Optimization of Beacon Message Age-of-Information in a VANET (2017, September)

Beaconing is a basic communication process taking place in Vehicular Ad Hoc Networks (VANETs) to achieve cooperative awareness among vehicles on the road. It is actually a paradigm of information ... [more ▼]

Beaconing is a basic communication process taking place in Vehicular Ad Hoc Networks (VANETs) to achieve cooperative awareness among vehicles on the road. It is actually a paradigm of information spreading among peer-agents, where each node of a networks sends periodically broadcast messages containing information collected by the node itself. A trade-off arises between the update frequency of the broadcast information and the congestion induced in the wireless shared channel used to send the messages, which is based on the IEEE 802.11p standard in case of a VANET. For periodic updates, the primary metric is the Age-of-Information (AoI), i.e., the age of the latest update received by neighboring nodes. We define an analytical model to evaluate the AoI of a VANET, given the connectivity graph of the vehicles. Analytical results are compared to simulation to assess the accuracy of the model. The model provides a handy tool to optimize the AoI trade-off. [less ▲]

Detailed reference viewed: 22 (4 UL)
Full Text
Peer Reviewed
See detailRaising Time Awareness in Model-Driven Engineering
Benelallam, Amine; Hartmann, Thomas UL; Mouline, Ludovic UL et al

in 2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (2017, September)

The conviction that big data analytics is a key for the success of modern businesses is growing deeper, and the mobilisation of companies into adopting it becomes increasingly important. Big data ... [more ▼]

The conviction that big data analytics is a key for the success of modern businesses is growing deeper, and the mobilisation of companies into adopting it becomes increasingly important. Big data integration projects enable companies to capture their relevant data, to efficiently store it, turn it into domain knowledge, and finally monetize it. In this context, historical data, also called temporal data, is becoming increasingly available and delivers means to analyse the history of applications, discover temporal patterns, and predict future trends. Despite the fact that most data that today’s applications are dealing with is inherently temporal current approaches, methodologies, and environments for developing these applications don’t provide sufficient support for handling time. We envision that Model-Driven Engineering (MDE) would be an appropriate ecosystem for a seamless and orthogonal integration of time into domain modelling and processing. In this paper, we investigate the state-of-the-art in MDE techniques and tools in order to identify the missing bricks for raising time-awareness in MDE and outline research directions in this emerging domain. [less ▲]

Detailed reference viewed: 40 (3 UL)
Full Text
Peer Reviewed
See detailEmbedding of the Personalized Sentiment Engine PERSEUS in an Artificial Companion
Guo, Siwen UL; Schommer, Christoph UL

in International Conference on Companion Technology, Ulm 11-13 September 2017 (2017, September)

The term Artificial Companion has originally been introduced by Y. Wilks [1] as “...an intelligent and helpful cognitive agent, which appears to know its owner and their habits, chats to them and diverts ... [more ▼]

The term Artificial Companion has originally been introduced by Y. Wilks [1] as “...an intelligent and helpful cognitive agent, which appears to know its owner and their habits, chats to them and diverts them, assists them with simple tasks. . . ”. To serve the users’ interests by considering a personal knowledge is, furthermore, demanded. The following position paper takes this request as motivation for the embedding of the PERSEUS system, which is a personalized sentiment framework based on a Deep Learning approach. We discuss how such an embedding with a group of users should be realized and why the utilization of PERSEUS is beneficial. [less ▲]

Detailed reference viewed: 63 (24 UL)
Full Text
Peer Reviewed
See detailProfiling Smart Contracts Interactions Tensor Decomposition and Graph Mining.
Charlier, Jérémy Henri J. UL; Lagraa, Sofiane UL; State, Radu UL et al

in Proceedings of the Second Workshop on MIning DAta for financial applicationS (MIDAS 2017) co-located with the 2017 European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD 2017), Skopje, Macedonia, September 18, 2017. (2017, September)

Smart contracts, computer protocols designed for autonomous execution on predefined conditions, arise from the evolution of the Bitcoin’s crypto-currency. They provide higher transaction security and ... [more ▼]

Smart contracts, computer protocols designed for autonomous execution on predefined conditions, arise from the evolution of the Bitcoin’s crypto-currency. They provide higher transaction security and allow economy of scale through the automated process. Smart contracts provides inherent benefits for financial institutions such as investment banking, retail banking, and insurance. This technology is widely used within Ethereum, an open source block-chain platform, from which the data has been extracted to conduct the experiments. In this work, we propose an multi-dimensional approach to find and predict smart contracts interactions only based on their crypto-currency exchanges. This approach relies on tensor modeling combined with stochastic processes. It underlines actual exchanges between smart contracts and targets the predictions of future interactions among the community. The tensor analysis is also challenged with the latest graph algorithms to assess its strengths and weaknesses in comparison to a more standard approach. [less ▲]

Detailed reference viewed: 21 (3 UL)
Full Text
Peer Reviewed
See detailRefinement-Aware Generation of Attack Trees
Gadyatskaya, Olga UL; Ravi, Jhawar; Mauw, Sjouke UL et al

in Livraga, Giovanni; Mitchell, Chris J. (Eds.) Security and Trust Management - 13th International Workshop (2017, September)

Detailed reference viewed: 29 (3 UL)
Full Text
Peer Reviewed
See detailPrivate Verification of Access on Medical Data: An Initial Study
Bardini Idalino, Thaís; Pierina Brustolin Spagnuelo, Dayana UL; Everson Martina, Jean

in Private Verification of Access on Medical Data: An Initial Study (2017, September)

Patient-centered medical systems promote empowerment of patients, who can decide on the accesses and usage of their personal data. To inspire a sense of trust and encourage the adoption of such systems ... [more ▼]

Patient-centered medical systems promote empowerment of patients, who can decide on the accesses and usage of their personal data. To inspire a sense of trust and encourage the adoption of such systems, it is desired to allow one to verify whether the system has acted in accordance with the patients’ preferences. However, it is argued that even audit logs and usage policies, normally used when verifying such property, may already be enough for one to learn sensitive information, e.g., the medical specialists a given patient has visited in the past. This is not only damaging for the patients, but is also against the interests of the medical system, which may lose back the trust earned and gain a bad reputation. Verifiability should not come at the expense of patients’ privacy. It is, therefore, imperative that these systems take necessary precautions towards patient’s information when providing means for verifiability. In this work we study how to realize that. In particular, we explore how searchable encryption techniques could be applied to allow the verification of systems in a private fashion, providing no information on patient’s sensitive data. [less ▲]

Detailed reference viewed: 29 (1 UL)
Full Text
Peer Reviewed
See detailJoanAudit: A Tool for Auditing Common Injection Vulnerabilities
Thome, Julian UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (2017, September)

JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies ... [more ▼]

JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies parts of the program code that are relevant for security and generates an HTML report to guide security auditors audit the source code in a scalable way. JoanAudit is configured with various security-sensitive input sources and sinks relevant to injection vulnerabilities and standard sanitization procedures that prevent these vulnerabilities. It can also automatically fix some cases of vulnerabilities in source code — cases where inputs are directly used in sinks without any form of sanitization — by using standard sanitization procedures. Our evaluation shows that by using JoanAudit, security auditors are required to inspect only 1% of the total code for auditing common injection vulnerabilities. The screen-cast demo is available at https://github.com/julianthome/joanaudit. [less ▲]

Detailed reference viewed: 175 (28 UL)
Full Text
Peer Reviewed
See detailLaboratory experiment for damage assessment using the DAD-method
Erdenebat, Dolgion UL; Waldmann, Danièle UL; Teferle, Felix Norman UL

in Conference proceedings SMAR 2017 (2017, September)

In the following, a new analytical method, the Deformation Area Difference (DAD) method for damage assessment of bridge structures is applied using experimental test results of a statically loaded beam ... [more ▼]

In the following, a new analytical method, the Deformation Area Difference (DAD) method for damage assessment of bridge structures is applied using experimental test results of a statically loaded beam. An essential prerequisite for the application of this method is a high precise measurement of the deflection line. In this paper, the results from a laboratory experiment using modern measurement techniques such as photogrammetry and displacement sensors are discussed. A reinforced concrete beam is stepwise loaded until reaching the ultimate limit state. The DAD-method is applied to the resulting data from the measurements and the outcome is discussed for further optimisation of the method. In principle, the measured deflection line of the beam contains already essential information on discontinuities which occur due to cracking. These entries are processed and visualised using the DAD-method. This study shows that a high accuracy of the measurement techniques in combination with the DAD-method can become an effective tool for damage detection. [less ▲]

Detailed reference viewed: 45 (12 UL)
Full Text
Peer Reviewed
See detailFORMACIÓN SANITARIA EN VIOLENCIA DE GÉNERO. HERRAMIENTAS ONLINE PARA LA CAPACITACIÓN Y TRANSFERENCIA PRÁCTICA
Fernández Alonso, Carmen; Gomez Bravo, Raquel UL; Herrero Velázquez, Sonia et al

in González López-Valcárcel, Beatriz (Ed.) XVII CONGRESO SESPAS XXXV REUNIÓN CIENTÍFICA DE LA SOCIEDAD ESPAÑOLA DE EPIDEMIOLOGÍA Y XII CONGRESSO DA ASSOCIAÇÃO PORTUGUESA DE EPIDEMIOLOGIA XXXVII JORNADAS DE ECONOMÍA DE LA SALUD Ciencia para la Acción (2017, September)

Antecedentes/Objetivos: La formación en VG de los y las profesionales de la salud es una necesidad incuestionable y urgente. De poco sirven las recomendaciones de actuación para la detección de casos y ... [more ▼]

Antecedentes/Objetivos: La formación en VG de los y las profesionales de la salud es una necesidad incuestionable y urgente. De poco sirven las recomendaciones de actuación para la detección de casos y para la atención a las victimas si no disponemos de profesionales formados para llevarlo a cabo. La violencia contra la mujer no está presente en los contenidos curriculares de la mayor parte de las profesiones sanitarias. Por ello la formación en VG supone en muchos casos partir de cero. Supone sensibilizar y convencer que se trata de un problema de salud y nos compete, y luego de capacitar al profesional para una práctica adecuada. Objetivo del estudio: Identificar necesidades de formación de los y las profesionales en VG, los contenidos básicos y los métodos mejor valorados Elaborar un kit de herramientas de ayuda para la formación dirigido a formadores/as en VG. Métodos: Compartir experiencias formativas de 4 organizaciones europeas que trabajan en VG. Análisis de la práctica formativa, diseñar, consensuar y evaluar las herramientas de ayuda a la formación en VG. Resultados: 1. Kit de 28 herramientas para las distintas fases de la formación (preparación, desarrollo, aplicación, seguimiento y evaluación) con ejemplos que facilitan su aplicación práctica. 2. Documento que recoge las herramientas y materiales disponibles para los docentes y discentes. 3. Página web con todo el material (Toolkik) en inglés y en español accesible: www.toolner.com. En 18 meses ha tenido 40.000 visitas 1ª evaluación de una actividad formativa siguiendo esta metodología ha mejorado los conocimientos y actitudes del alumnado. Conclusiones/Recomendaciones: Esta herramienta on-line puede facilitar el trabajo a los formadores/as y contribuir a la mejora de la capacitación de profesionales y la transferencia a la práctica Se trata de una herramienta dinámica que permite realizar cambios y adaptarse a distintos perfiles y necesidades. Accesible en abierto para cualquier usuario. Financiación: Lifelong Learning Programme, acción Leonardo da Vinci (2013-1-DE2-LEO04-16120 4). [less ▲]

Detailed reference viewed: 34 (2 UL)
Full Text
Peer Reviewed
See detailLegal Markup Generation in the Large: An Experience Report
Sannier, Nicolas UL; Adedjouma, Morayo UL; Sabetzadeh, Mehrdad UL et al

in the 25th International Requirements Engineering Conference (RE'17), Lisbon, 4-8 September 2017 (2017, September)

Detailed reference viewed: 32 (2 UL)
Full Text
Peer Reviewed
See detailComparing Broad-Phase Interaction Detection Algorithms for Multiphysics DEM Applications
Rousset, Alban UL; Mainassara Chekaraou, Abdoul Wahid UL; Liao, Yu-Chung UL et al

in AIP Conference Proceedings ICNAAM 2017 (2017, September)

Collision detection is an ongoing source of research and optimization in many fields including video-games and numerical simulations [6, 7, 8]. The goal of collision detection is to report a geometric ... [more ▼]

Collision detection is an ongoing source of research and optimization in many fields including video-games and numerical simulations [6, 7, 8]. The goal of collision detection is to report a geometric contact when it is about to occur or has actually occurred. Unfortunately, detailed and exact collision detection for large amounts of objects represent an immense amount of computations, naively n 2 operation with n being the number of objects [9]. To avoid and reduce these expensive computations, the collision detection is decomposed in two phases as it shown on Figure 1: the Broad-Phase and the Narrow-Phase. In this paper, we focus on Broad-Phase algorithm in a large dynamic three-dimensional environment. We studied two kinds of Broad-Phase algorithms: spatial partitioning and spatial sorting. Spatial partitioning techniques operate by dividing space into a number of regions that can be quickly tested against each object. Two types of spatial partitioning will be considered: grids and trees. The grid-based algorithms consist of a spatial partitioning processing by dividing space into regions and testing if objects overlap the same region of space. And this reduces the number of pairwise to test. The tree-based algorithms use a tree structure where each node spans a particular space area. This reduces the pairwise checking cost because only tree leaves are checked. The spatial sorting based algorithm consists of a sorted spatial ordering of objects. Axis-Aligned Bounding Boxes (AABBs) are projected onto x, y and z axes and put into sorted lists. By sorting projection onto axes, two objects collide if and only if they collide on the three axes. This axis sorting reduces the number of pairwise to tested by reducing the number of tests to perform to only pairs which collide on at least one axis. For this study, ten different Broad-Phase collision detection algorithms or framework have been considered. The Bullet [6], CGAL [10, 11] frameworks have been used. Concerning the implemented algorithms most of them come from papers or given implementation. [less ▲]

Detailed reference viewed: 51 (14 UL)
Full Text
Peer Reviewed
See detailflexfringe: A Passive Automaton Learning Package
Verwer, Sicco E.; Hammerschmidt, Christian UL

in Software Maintenance and Evolution (ICSME), 2017 IEEE International Conference on (2017, September)

Detailed reference viewed: 14 (0 UL)
Full Text
See detailWWII: СОВЕТСКИЕ ВОЕННОПЛЕННЫЕ И ВОСТОЧНЫЕ РАБОЧИЕ В ЛЮКСЕМБУРГЕ В 1942-1944 гг.
Ganschow, Inna UL

in Ganschow, Inna (Ed.) СОЦИАЛЬНАЯ ИСТОРИЯ ВТОРОЙ МИРОВОЙ ВОЙНЫ МАТЕРИАЛЫ МЕЖДУНАРОДНОЙ КОНФЕРЕНЦИИ 26-28 августа 2016 г. (2017, September)

This publication is the first scientific treatise in the Russian language and covers the use of the labor force of Soviet prisoners of war and Eastern workers in the Luxembourg economy. The essay deals ... [more ▼]

This publication is the first scientific treatise in the Russian language and covers the use of the labor force of Soviet prisoners of war and Eastern workers in the Luxembourg economy. The essay deals with questions of demographic composi- tion, as well as living and working conditions, which until now have only been dis- cussed on the margins of two other publications on the economy of Luxembourg. Moreover, the essay deals with an unexplored theme of the repatriation of the Soviet citizens from Luxembourg after the liberation of the country in September 1944. [less ▲]

Detailed reference viewed: 25 (3 UL)
Full Text
Peer Reviewed
See detailA Deep Learning Approach for Optimizing Content Delivering in Cache-Enabled HetNet
Lei, Lei UL; You, Lei; Dai, Gaoyang et al

in IEEE International Symposium on Wireless Communication Systems (ISWCS), Bologna, Aug. 2017 (2017, August 31)

Detailed reference viewed: 101 (8 UL)
Full Text
Peer Reviewed
See detailImplementation and validation of an event-based real-time nonlinear model predictive control framework with ROS interface for single and multi-robot systems
Dentler, Jan Eric UL; Kannan, Somasundar UL; Olivares Mendez, Miguel Angel UL et al

in 2017 IEEE Conference on Control Technology and Applications (CCTA) (2017, August 30)

This paper presents the implementation and experimental validation of a central control framework. The presented framework addresses the need for a controller, which provides high performance combined ... [more ▼]

This paper presents the implementation and experimental validation of a central control framework. The presented framework addresses the need for a controller, which provides high performance combined with a low-computational load while being on-line adaptable to changes in the control scenario. Examples for such scenarios are cooperative control, task-based control and fault-tolerant control, where the system's topology, dynamics, objectives and constraints are changing. The framework combines a fast Nonlinear Model Predictive Control (NMPC), a communication interface with the Robot Operating System (ROS) [1] as well as a modularization that allows an event-based change of the NMPC scenario. To experimentally validate performance and event-based adaptability of the framework, this paper is using a cooperative control scenario of Unmanned Aerial Vehicles (UAVs). The source code of the proposed framework is available under [2]. [less ▲]

Detailed reference viewed: 35 (13 UL)
Full Text
Peer Reviewed
See detailFourQ on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks
Liu, Zhe UL; Longa, Patrick; Pereira, Geovandro et al

in Homma, Naofumi; Fischer, Wieland (Eds.) International Conference on Cryptographic Hardware and Embedded Systems - CHES2017 (2017, August 25)

Detailed reference viewed: 17 (13 UL)
Full Text
Peer Reviewed
See detailFacial Expression Recognition via Joint Deep Learning of RGB-Depth Map Latent Representations
Oyedotun, Oyebade UL; Demisse, Girum UL; Shabayek, Abd El Rahman UL et al

in 2017 IEEE International Conference on Computer Vision Workshop (ICCVW) (2017, August 21)

Humans use facial expressions successfully for conveying their emotional states. However, replicating such success in the human-computer interaction domain is an active research problem. In this paper, we ... [more ▼]

Humans use facial expressions successfully for conveying their emotional states. However, replicating such success in the human-computer interaction domain is an active research problem. In this paper, we propose deep convolutional neural network (DCNN) for joint learning of robust facial expression features from fused RGB and depth map latent representations. We posit that learning jointly from both modalities result in a more robust classifier for facial expression recognition (FER) as opposed to learning from either of the modalities independently. Particularly, we construct a learning pipeline that allows us to learn several hierarchical levels of feature representations and then perform the fusion of RGB and depth map latent representations for joint learning of facial expressions. Our experimental results on the BU-3DFE dataset validate the proposed fusion approach, as a model learned from the joint modalities outperforms models learned from either of the modalities. [less ▲]

Detailed reference viewed: 149 (39 UL)
Full Text
Peer Reviewed
See detailCoverage optimization with connectivity preservation for UAV swarms applying chaotic dynamics
Rosalie, Martin UL; Brust, Matthias UL; Danoy, Grégoire UL et al

in IEEE International Conference on Autonomic Computing (ICAC), Columbus 17-21 July 2017 (2017, August 11)

Cooperative usage of multiple UAVs as a swarm can deliver high-quality surveillance performance. However, the communication capabilities within the UAV swarm must be maintained for local data propagation ... [more ▼]

Cooperative usage of multiple UAVs as a swarm can deliver high-quality surveillance performance. However, the communication capabilities within the UAV swarm must be maintained for local data propagation to swarm members in favor of achieving an efficient global behavior. In this paper, we address the problem of optimizing two adversary criteria for such a UAV swarm: (a) maximizing the area coverage, while (b) preserving network connectivity. Our approach, called CACOC², solves the problem with a novel chaotic ant colony optimization approach, which combines an Ant Colony Optimization approach (ACO) with a chaotic dynamical system. CACOC² employs swarming behavior to obtain UAV clustering that result in maximized area coverage and preserved network connectivity. We show by extensive simulations how the size of the UAV swarm influences the coverage and connectivity. A metrics comparison chart shows the correlation of coverage and connectivity metrics. [less ▲]

Detailed reference viewed: 35 (5 UL)
Full Text
Peer Reviewed
See detailMultiprecision Multiplication on ARMv8
Liu, Zhe UL; Järvinen, Kimmo; Liu, Weiqiang et al

in IEEE 24th Symposium on Computer Arithmetic - ARITH24 (2017, August 01)

Detailed reference viewed: 5 (1 UL)