References of "Paper published in a book"
     in
Bookmark and Share    
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 52 (3 UL)
Full Text
Peer Reviewed
See detailLes Trévires vus par le jésuite luxembourgeois Alexandre Wiltheim
Binsfeld, Andrea UL

in Hébert, Oriane; Pechoux, Ludivine (Eds.) Quand l’usage fait l’image. Les Gaulois, de la manipulation historique à l’archétype (in press)

Detailed reference viewed: 27 (2 UL)
Full Text
Peer Reviewed
See detailAn Empirical Evaluation of Evolutionary Algorithms for Test Suite Generation
Campos, Jose; Ge, Yan; Fraser, Gordon et al

in Symposium on Search-Based Software Engineering (SSBSE) (in press)

Evolutionary algorithms have been shown to be effective at generating unit test suites optimised for code coverage. While many aspects of these algorithms have been evaluated in detail (e.g., test length ... [more ▼]

Evolutionary algorithms have been shown to be effective at generating unit test suites optimised for code coverage. While many aspects of these algorithms have been evaluated in detail (e.g., test length and different kinds of techniques aimed at improving performance, like seeding), the influence of the specific algorithms has to date seen less attention in the literature. As it is theoretically impossible to design an algorithm that is best on all possible problems, a common approach in software engineering problems is to first try a Genetic Algorithm, and only afterwards try to refine it or compare it with other algorithms to see if any of them is more suited for the addressed problem. This is particularly important in test generation, since recent work suggests that random search may in practice be equally effective, whereas the reformulation as a many-objective problem seems to be more effective. To shed light on the influence of the search algorithms, we empirically evaluate six different algorithms on a selection of non-trivial open source classes. Our study shows that the use of a test archive makes evolutionary algorithms clearly better than random testing, and it confirms that the many-objective search is the most effective. [less ▲]

Detailed reference viewed: 50 (14 UL)
Full Text
Peer Reviewed
See detailMany Independent Objective (MIO) Algorithm for Test Suite Generation
Arcuri, Andrea UL

in Symposium on Search-Based Software Engineering (SSBSE) (in press)

Automatically generating test suites is intrinsically a multi- objective problem, as any of the testing targets (e.g, statements to exe- cute or mutants to kill) is an objective on its own. Test suite ... [more ▼]

Automatically generating test suites is intrinsically a multi- objective problem, as any of the testing targets (e.g, statements to exe- cute or mutants to kill) is an objective on its own. Test suite generation has peculiarities that are quite di erent from other more regular optimi- sation problems. For example, given an existing test suite, one can add more tests to cover the remaining objectives. One would like the smallest number of small tests to cover as many objectives as possible, but that is a secondary goal compared to covering those targets in the rst place. Furthermore, the amount of objectives in software testing can quickly become unmanageable, in the order of (tens/hundreds of) thousands, es- pecially for system testing of industrial size systems. Traditional multi- objective optimisation algorithms can already start to struggle with just four or ve objectives to optimize. To overcome these issues, di erent techniques have been proposed, like for example the Whole Test Suite (WTS) approach and the Many-Objective Sorting Algorithm (MOSA). However, those techniques might not scale well to very large numbers of objectives and limited search budgets (a typical case in system test- ing). In this paper, we propose a novel algorithm, called Many Indepen- dent Objective (MIO) algorithm. This algorithm is designed and tailored based on the speci c properties of test suite generation. An empirical study, on a set of arti cial and actual software, shows that the MIO al- gorithm can achieve higher coverage compared to WTS and MOSA, as it can better exploit the peculiarities of test suite generation. [less ▲]

Detailed reference viewed: 51 (12 UL)
Full Text
Peer Reviewed
See detailHybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems
Tsinos, Christos UL; Maleki, Sina UL; Chatzinotas, Symeon UL et al

in Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems (in press)

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the ... [more ▼]

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the design of a prospect transceiver should guarantee the efficient coexistence with the incumbent services in these bands. To that end, in this paper, two underlay cognitive transceiver designs are proposed based on a hybrid Analog/Digital transceiver architecture that enables the mmWave spectrum access while controlling the interference to the incumbent users with low hardware complexity and power consumption. The first cognitive solution designs a codebook free cognitive hybrid pre-coder by maximizing the mutual information between its two ends subject to interference, power and hardware constraints related to the analog counterpart. The second solution is codebook based and exhibits less complexity than the first one at the cost of inferior spectral efficiency. A novel codebook free solution for the post-coder at the cognitive receiver part is further proposed, based on a hardware constrained Minimum Mean Square Error criterion. Simulations study the performance of both the proposed hybrid approaches and compare it to the one of a fully digital solution for typical wireless environments. [less ▲]

Detailed reference viewed: 114 (12 UL)
Full Text
Peer Reviewed
See detailIntroducing automated GUI testing and observing its benefits: an industrial case study in the context of law-practice management software
Garousi, Vahid UL; Yıldırım, Erdem

in Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) (in press)

Motivated by a real-world industrial need in the context of a large IT solutions company based in Turkey, the authors and their colleagues developed and introduced automated test suites for GUI testing of ... [more ▼]

Motivated by a real-world industrial need in the context of a large IT solutions company based in Turkey, the authors and their colleagues developed and introduced automated test suites for GUI testing of two large-scale law-practice management software (comprising of 414 and 105 KLOC). We report in this paper our experience in developing and introducing a set of large automated test suites (more than 50 KLOC in total), using best practices in state-of-the art and –practice, and to report its observed benefits by conducting cost-benefit analysis in the specific industrial context. The project was conducted based on the principles of case-study and “action research” in which the real industrial needs drove the research. Among the best practices that we used are the followings: (1) the page-object test pattern, (2) modularity in test code, (3) creating test-specific libraries, and (4) using systematic guidelines to decide when and what (test cases) to automate. To assess the cost-benefit and Return On Investment (ROI) of test automation, we followed a hybrid measurement approach to assess both the quantitative and qualitative (intangible) benefits of test automation. The empirical findings showed that the automated GUI testing approach has indeed benefitted the test and QA team in the company under study and automation has been highly welcome by the test engineers. By serving as a success story and experience report in development and introduction of automated test suites in an industrial setting, this paper adds to the body of evidence in this area and it aims at sharing both technical (e.g., using automated test patterns) and process aspects (e.g., test process improvement) of our project with other practitioners and researchers with the hope of encouraging more industry-academia collaborations in test automation. [less ▲]

Detailed reference viewed: 22 (4 UL)
Full Text
Peer Reviewed
See detailAere 'octroyed constitutions' of the 19th century to be considered as 'imposed constitutions'?
Gerkrath, Jörg UL

in Contiades, Xenophon (Ed.) ‘Imposed Constitutions: Aspects of Imposed Constitutionalism’ (in press)

Detailed reference viewed: 5 (1 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 119 (5 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 41 (9 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 72 (6 UL)
Full Text
Peer Reviewed
See detailRESTful API Automated Test Case Generation
Arcuri, Andrea UL

in IEEE International Conference on Software Quality, Reliability & Security (QRS) (in press)

Nowadays, web services play a major role in the development of enterprise applications. Many such applications are now developed using a service-oriented architecture (SOA), where microservices is one of ... [more ▼]

Nowadays, web services play a major role in the development of enterprise applications. Many such applications are now developed using a service-oriented architecture (SOA), where microservices is one of its most popular kind. A RESTful web service will provide data via an API over the network using HTTP, possibly interacting with databases and other web services. Testing a RESTful API poses challenges, as inputs/outputs are sequences of HTTP requests/responses to a remote server. Many approaches in the literature do black-box testing, as the tested API is a remote service whose code is not available. In this paper, we consider testing from the point of view of the developers, which do have full access to the code that they are writing. Therefore, we propose a fully automated white-box testing approach, where test cases are automatically generated using an evolutionary algorithm. Tests are rewarded based on code coverage and fault finding metrics. We implemented our technique in a tool called EVOMASTER, which is open-source. Experiments on two open-source, yet non-trivial RESTful services and an industrial one, do show that our novel technique did automatically find 38 real bugs in those applications. However, obtained code coverage is lower than the one achieved by the manually written test suites already existing in those services. Research directions on how to further improve such approach are therefore discussed. [less ▲]

Detailed reference viewed: 28 (2 UL)
Full Text
Peer Reviewed
See detailComparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL et al

in Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers (in press)

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to ... [more ▼]

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances while recommending cloud services to the cloud users, using all available data. In this paper, we compare our two approaches to do so: a min-max-min decomposition based on Intuitionistic Fuzzy Logic (IFL) and a Performance Heat Map technique, to evaluate the performance of commercially available cloud providers. While the IFL technique provides simple, total order of the evaluated CSPs, Performance Heat Map provides transparent and explanatory, yet consistent evaluation of service performance of commercially available CSPs. The identified drawbacks of the IFL technique are: 1) It does not return the accurate performance evaluation over multiple decision alternatives due to highly influenced by critical feedback of the evaluators; 2) Overall ranking of the CSPs is not as expected according to the performance measurement. As a result, we recommend to use performance Heat Map for this problem. [less ▲]

Detailed reference viewed: 27 (2 UL)
Full Text
Peer Reviewed
See detailMulti-objective regression test selection in practice: an empirical study in the defense software industry
Özkan, Ramazan; Garousi, Vahid UL; Betin-Can, Aysu

in Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM) (in press)

Executing an entire regression test suite after every code change is often costly in large software projects. To address this challenge, various regression test selection techniques have been proposed in ... [more ▼]

Executing an entire regression test suite after every code change is often costly in large software projects. To address this challenge, various regression test selection techniques have been proposed in the literature. One of those approaches is the Multi-Objective Regression Test Optimization (MORTO) approach, which is applied when there are multiple objectives during regression testing (e.g., minimizing the number of test cases and maximizing test coverage). This paper reports an action research type of study which was conducted to improve regression test-selection practices of a safety-critical industrial software in the defence domain based on the MORTO approach. The problem is formulated and solved by converting the multi-objective genetic-algorithm (GA) problem into a custom-built scalarized single-objective GA. The empirical results demonstrate that this approach yields a more efficient test suite (in terms of testing cost and benefits) compared to the old (manual) test-selection approach and another approach from the literature, i.e., the selective requirement coverage-based approach. Based on the context and need of the company, we developed the GA-based solution on a set of five cost objectives and four benefit objectives for regression testing while providing full coverage of the affected (changed) requirements. Since our proposed approach has been beneficial in the industrial context, it is currently in active use in the company. [less ▲]

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailLa force intégrative du statut de l'Etat membre sur la fonction juridictionnelle
Neframi, Eleftheria UL

in Potvin Solis, Laurence (Ed.) Le statut d'Etat membre de l'Union européenne (in press)

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields ... [more ▼]

The integrative force of the Member States’ status on the judicial function is expressed through the loyalty obligation to provide remedies sufficient to ensure effective legal protection in the fields covered by Union law (Art 19, par 1, subpar 2, TEU). Member States have to ensure access to the national judge, who has been entrusted with a European mandate, and who is in measure to cooperate with the Court of Justice through the preliminary reference procedure. The Member States establish in this way an integrated judicial function. The exercise of such a function by the national judge, in cooperation with the Court of Justice and under the control of the Member State, implies integrative dynamic, which however depends on the balancing exercise with national procedural autonomy and the margin of appreciation of the national judge. [less ▲]

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailModelling Metrics for Transparency in Medical Systems
Pierina Brustolin Spagnuelo, Dayana UL; Bartolini, Cesare UL; Lenzini, Gabriele UL

in Proceedings of TrustBus 2017 (in press)

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailAutomatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks
Appelt, Dennis; Panichella, Annibale UL; Briand, Lionel UL

in The 28th IEEE International Symposium on Software Reliability Engineering (ISSRE) (in press)

Testing and fixing WAFs are two relevant and complementary challenges for security analysts. Automated testing helps to cost-effectively detect vulnerabilities in a WAF by generating effective test cases ... [more ▼]

Testing and fixing WAFs are two relevant and complementary challenges for security analysts. Automated testing helps to cost-effectively detect vulnerabilities in a WAF by generating effective test cases, i.e., attacks. Once vulnerabilities have been identified, the WAF needs to be fixed by augmenting its rule set to filter attacks without blocking legitimate requests. However, existing research suggests that rule sets are very difficult to understand and too complex to be manually fixed. In this paper, we formalise the problem of fixing vulnerable WAFs as a combinatorial optimisation problem. To solve it, we propose an automated approach that combines machine learning with multi-objective genetic algorithms. Given a set of legitimate requests and bypassing SQL injection attacks, our approach automatically infers regular expressions that, when added to the WAF's rule set, prevent many attacks while letting legitimate requests go through. Our empirical evaluation based on both open-source and proprietary WAFs shows that the generated filter rules are effective at blocking previously identified and successful SQL injection attacks (recall between 54.6% and 98.3%), while triggering in most cases no or few false positives (false positive rate between 0% and 2%). [less ▲]

Detailed reference viewed: 50 (0 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 216 (3 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 23 (1 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 48 (3 UL)
Full Text
Peer Reviewed
See detailComparing automated visual GUI testing tools: an industrial case study
Garousi, Vahid UL; Afzal, Wasif; Çağlar, Adem et al

in Proceedings of International Workshop on Automated Software Testing (A-TEST) (in press)

Visual GUI testing (VGT) is a tool-driven technique, which uses image recognition for interaction and assertion of the behaviour of system under test. Motivated by a real industrial need, in the context ... [more ▼]

Visual GUI testing (VGT) is a tool-driven technique, which uses image recognition for interaction and assertion of the behaviour of system under test. Motivated by a real industrial need, in the context of a large Turkish software and systems company providing solutions in the areas of defense and IT sector, we systematically planned and applied a VGT project in this industrial context. The goal of the initial phase of the project was to empirically evaluate two well-known VGT tools (Sikuli and JAutomate) to help the company select the best tool for a given testing project. Our results show that both two tools suffer from similar test ‘Replay’ problems such as the inability to find smaller-sized images. The repeatability of test executions was better for JAutomate in case of one of the two software under test (SUT) while it was comparable for the other. In terms of test development effort, for both tools, there were high correlations with number of steps in test suites, however the effort is reduced if test code is reused. The study has already provided benefits to the test engineers and managers in the company by increasing the know-how in the company w.r.t. VGT, and by identifying the challenges and their workarounds in using the tools. The industrial case study in this paper intends to add to the body of evidence in VGT and help other researchers and practitioners. [less ▲]

Detailed reference viewed: 33 (3 UL)
Full Text
Peer Reviewed
See detailLes bourgeois de Bohême et l’impossible légitimation ? La conjuration de Prague et de Kutná Hora de février 1309
Vomacka, Eloïse UL

in Contester au Moyen Âge : de la désobéissance à la révolte XLIXe congrès de la SHMESP (2018)

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailEstimating Urban Road Traffic States Using Mobile Network Signaling Data
Derrmann, Thierry UL; Frank, Raphaël UL; Viti, Francesco UL et al

in Derrmann, Thierry; Frank, Raphaël; Viti, Francesco (Eds.) et al Estimating Urban Road Traffic States Using Mobile Network Signaling Data (2017, October)

It is intuitive that there is a causal relationship between human mobility and signaling events in mobile phone networks. Among these events, not only the initiation of calls and data sessions can be used ... [more ▼]

It is intuitive that there is a causal relationship between human mobility and signaling events in mobile phone networks. Among these events, not only the initiation of calls and data sessions can be used in analyses, but also handovers between different locations that reflect mobility. In this work, we investigate if handovers can be used as a proxy metric for flows in the underlying road network, especially in urban environments. More precisely, we show that characteristic profiles of handovers within and between clusters of mobile network cells exist. We base these profiles on models from road traffic flow theory, and show that they can be used for traffic state estimation using floating-car data as ground truth. The presented model can be beneficial in areas with good mobile network coverage but low road traffic counting infrastructure, e.g. in developing countries, but also serve as an additional predictor for existing traffic state monitoring systems. [less ▲]

Detailed reference viewed: 28 (2 UL)
Full Text
Peer Reviewed
See detailMechanical Model to Predict the Resistance of the Shear Connection in Composite Beams with Deep Steel Decking
Odenbreit, Christoph UL; Nellinger, Sebastian UL

in Eurosteel 2017 (2017, September 13)

The resistance of a typical shear connection with headed shear studs in a composite beam is analysed in the normal case in accordance with EN 1994-1-1. The reducing effect of a trapezoidal metal decking ... [more ▼]

The resistance of a typical shear connection with headed shear studs in a composite beam is analysed in the normal case in accordance with EN 1994-1-1. The reducing effect of a trapezoidal metal decking onto the ultimate load bearing capacity is considered with empirically derived reduction factors and equations, which have been developed in the last century between the late 70th and the early 80th. The RFCS research project “DISCCO” investigated the shear stud resistance with novel types of steel decking. In many cases, the shear resistance, which was predicted by EN 1994-1-1 was not reached in tests. In the respective experiments with composite beams and deep decking, a concrete cone failure mode was identified and not a pure shear failure of the stud. This failure mode acted in combination with the load bearing capacity of the shear stud, which formed one or two plastic hinges in the shaft - depending on the available geometry. Based on these observations, new equations have been developed to predict the shear connection’s resistance with more accurcy. The yield hinge mechanism of the shear stud, which was developed by Lungershausen, was extended by the above mentioned load bearing component ‘concrete cone’. The formulae consider the geometry of the stud and the steel decking, the material strength of the stud and of the concrete material. The statistical evaluation of the developed equations shows a good accordance with test results. [less ▲]

Full Text
Peer Reviewed
See detailLIPS vs MOSA: a Replicated Em- pirical Study on Automated Test Case Generation
Panichella, Annibale UL; Kifetew, Fitsum; Tonella, Paolo

in International Symposium on Search Based Software Engineering (SSBSE) 2017 (2017, September 09)

Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The ... [more ▼]

Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The proponents of LIPS, a novel single-target test generator, conducted a preliminary empirical study to compare their approach with MOSA, an alternative many-objective test generator. However, their empirical investigation suffers from several external and internal validity threats, does not consider complex programs with many branches and does not include any qualitative analysis to interpret the results. In this paper, we report the results of a replication of the original study designed to address its major limitations and threats to validity. The new findings draw a completely different picture on the pros and cons of single-target vs many-objective approaches to test case generation. [less ▲]

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailIs Big Data Sufficient for a Reliable Detection of Non-Technical Losses?
Glauner, Patrick UL; Migliosi, Angelo UL; Meira, Jorge Augusto UL et al

in Proceedings of the 19th International Conference on Intelligent System Applications to Power Systems (ISAP 2017) (2017, September)

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to ... [more ▼]

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to 40% of the total electricity distributed. In order to detect NTLs, machine learning methods are used that learn irregular consumption patterns from customer data and inspection results. The Big Data paradigm followed in modern machine learning reflects the desire of deriving better conclusions from simply analyzing more data, without the necessity of looking at theory and models. However, the sample of inspected customers may be biased, i.e. it does not represent the population of all customers. As a consequence, machine learning models trained on these inspection results are biased as well and therefore lead to unreliable predictions of whether customers cause NTL or not. In machine learning, this issue is called covariate shift and has not been addressed in the literature on NTL detection yet. In this work, we present a novel framework for quantifying and visualizing covariate shift. We apply it to a commercial data set from Brazil that consists of 3.6M customers and 820K inspection results. We show that some features have a stronger covariate shift than others, making predictions less reliable. In particular, previous inspections were focused on certain neighborhoods or customer classes and that they were not sufficiently spread among the population of customers. This framework is about to be deployed in a commercial product for NTL detection. [less ▲]

Detailed reference viewed: 35 (6 UL)
Full Text
Peer Reviewed
See detailMining AndroZoo: A Retrospect
Li, Li UL

in The International Conference on Software Maintenance and Evolution (ICSME) (2017, September)

This paper presents a retrospect of an Android app collection named AndroZoo and some research works conducted on top of the collection. AndroZoo is a growing collection of Android apps from various ... [more ▼]

This paper presents a retrospect of an Android app collection named AndroZoo and some research works conducted on top of the collection. AndroZoo is a growing collection of Android apps from various markets including the official Google Play. At the moment, over five million Android apps have been collected. Based on AndroZoo, we have explored several directions that mine Android apps for resolving various challenges. In this work, we summarize those resolved mining challenges in three research dimensions, including code analysis, app evolution analysis, malware analysis, and present in each dimension several case studies that experimentally demonstrate the usefulness of AndroZoo. [less ▲]

Detailed reference viewed: 38 (3 UL)
Full Text
Peer Reviewed
See detailA Model-Driven Approach to Trace Checking of Pattern-based Temporal Properties
Dou, Wei; Bianculli, Domenico UL; Briand, Lionel UL

in Proceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017 ) (2017, September)

Detailed reference viewed: 27 (4 UL)
Full Text
Peer Reviewed
See detailLegal Markup Generation in the Large: An Experience Report
Sannier, Nicolas UL; Adedjouma, Morayo UL; Sabetzadeh, Mehrdad UL et al

in the 25th International Requirements Engineering Conference (RE'17), Lisbon, 4-8 September 2017 (2017, September)

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailJoanAudit: A Tool for Auditing Common Injection Vulnerabilities
Thome, Julian UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (2017, September)

JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies ... [more ▼]

JoanAudit is a static analysis tool to assist security auditors in auditing Web applications and Web services for common injection vulnerabilities during software development. It automatically identifies parts of the program code that are relevant for security and generates an HTML report to guide security auditors audit the source code in a scalable way. JoanAudit is configured with various security-sensitive input sources and sinks relevant to injection vulnerabilities and standard sanitization procedures that prevent these vulnerabilities. It can also automatically fix some cases of vulnerabilities in source code — cases where inputs are directly used in sinks without any form of sanitization — by using standard sanitization procedures. Our evaluation shows that by using JoanAudit, security auditors are required to inspect only 1% of the total code for auditing common injection vulnerabilities. The screen-cast demo is available at https://github.com/julianthome/joanaudit. [less ▲]

Detailed reference viewed: 64 (25 UL)
Full Text
Peer Reviewed
See detailA Deep Learning Approach for Optimizing Content Delivering in Cache-Enabled HetNet
Lei, Lei UL; You, Lei; Dai, Gaoyang et al

in IEEE International Symposium on Wireless Communication Systems (ISWCS), Bologna, Aug. 2017 (2017, August 31)

Detailed reference viewed: 21 (2 UL)
Full Text
Peer Reviewed
See detailCoverage optimization with connectivity preservation for UAV swarms applying chaotic dynamics
Rosalie, Martin UL; Brust, Matthias UL; Danoy, Grégoire UL et al

in IEEE International Conference on Autonomic Computing (ICAC), Columbus 17-21 July 2017 (2017, August 11)

Cooperative usage of multiple UAVs as a swarm can deliver high-quality surveillance performance. However, the communication capabilities within the UAV swarm must be maintained for local data propagation ... [more ▼]

Cooperative usage of multiple UAVs as a swarm can deliver high-quality surveillance performance. However, the communication capabilities within the UAV swarm must be maintained for local data propagation to swarm members in favor of achieving an efficient global behavior. In this paper, we address the problem of optimizing two adversary criteria for such a UAV swarm: (a) maximizing the area coverage, while (b) preserving network connectivity. Our approach, called CACOC², solves the problem with a novel chaotic ant colony optimization approach, which combines an Ant Colony Optimization approach (ACO) with a chaotic dynamical system. CACOC² employs swarming behavior to obtain UAV clustering that result in maximized area coverage and preserved network connectivity. We show by extensive simulations how the size of the UAV swarm influences the coverage and connectivity. A metrics comparison chart shows the correlation of coverage and connectivity metrics. [less ▲]

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailWhat do we need to say about a design method?
Gericke, Kilian UL; Eckert, Claudia; Stacey, Martin

in Proceedings of the 21st International Conference on Engineering Design (2017, August)

Method development is one of the raisons d’etre of engineering design research and method uptake by industry is perceived as an important success criterion. This paper argues that one of the problems with ... [more ▼]

Method development is one of the raisons d’etre of engineering design research and method uptake by industry is perceived as an important success criterion. This paper argues that one of the problems with methods is the lack of clarity about what is actually proposed to industry and the academic community when a new method is put forward, in terms of how detailed, strict, precise and rigorous the method is and what it can deliver. This paper puts the concept of method in the context of related concepts and proposes a multi-level model of the elements of a method to argue that a contribution on each of these levels can be of value and that the introduction of methods can fail on each of these levels. Implications thereof for industry and academia are discussed, concluding that a clear description of methods and their intended use is important for enabling proper validation of each of the method’s elements and for communicating methods to academia and industry. [less ▲]

Detailed reference viewed: 18 (2 UL)
Full Text
Peer Reviewed
See detailBelief Change in a Preferential Non-Monotonic Framework
Casini, Giovanni UL; Meyer, Thomas

in Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (2017, August)

Belief change and non-monotonic reasoning are usually viewed as two sides of the same coin, with results showing that one can formally be defined in terms of the other. In this paper we show that we can ... [more ▼]

Belief change and non-monotonic reasoning are usually viewed as two sides of the same coin, with results showing that one can formally be defined in terms of the other. In this paper we show that we can also integrate the two formalisms by studying belief change within a (preferential) non-monotonic framework. This integration relies heavily on the identification of the monotonic core of a non-monotonic framework. We consider belief change operators in a non-monotonic propositional setting with a view towards preserving consistency. These results can also be applied to the preservation of coherence—an important notion within the field of logic-based ontologies. We show that the standard AGM approach to belief change can be adapted to a preferential non-monotonic framework, with the definition of expansion, contraction, and revision operators, and corresponding representation results. Surprisingly, preferential AGM belief change, as defined here, can be obtained in terms of classical AGM belief change. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailAn Extensible and Lightweight Modular Ontology for Programming Education
Grevisse, Christian UL; Botev, Jean UL; Rothkugel, Steffen UL

in Advances in Computing - 12th Colombian Conference, CCC 2017, Cali, Colombia, September 19-22, 2017, Proceedings (2017, August)

Semantic web technologies such as ontologies can foster the reusability of learning material by introducing common sets of concepts for annotation purposes. However, suggesting learning material from an ... [more ▼]

Semantic web technologies such as ontologies can foster the reusability of learning material by introducing common sets of concepts for annotation purposes. However, suggesting learning material from an open, heterogeneous corpus is a nontrivial problem. In this paper, we propose an extensible and lightweight modular ontology for programming education. Its main purpose is to integrate annotated learning material related to programming into an IDE such as Eclipse. Our ontology is based on a modular architecture, which is extensible with respect to different programming languages. Aligning language-specific concepts with user-specific tags allows us to suggest learning resources for code elements in a fine-grained and cross-curricular way. Our concrete implementation establishes relations between learning aspects in Java or C code and annotated resources such as articles on online question-and-answer sites. [less ▲]

Detailed reference viewed: 26 (4 UL)
Full Text
Peer Reviewed
See detailDevelopment of a new push test for Eurocode 4
Hicks, Stephen; Ciutina, Adrian; Odenbreit, Christoph UL

in 8th International Conference on Composite Construction in Steel and Concrete (2017, July 30)

The standard push test specimen in the current version of Eurocode 4 does not provide any information on what modifications should be made when profiled steel sheeting is introduced. Whilst the lack of ... [more ▼]

The standard push test specimen in the current version of Eurocode 4 does not provide any information on what modifications should be made when profiled steel sheeting is introduced. Whilst the lack of information was intended to encourage innovation, this has sometimes lead to test results implying that stud connectors possess a lower resistance and ductility than assumed in current Standards. From full-scale beam and companion push tests in Europe, it has been shown that modifying the push test through the introduction of a normal force to the face of the test slabs provides comparable load-slip performance to that encountered within a beam. Within the work programme for developing the second generation of Eurocodes, this paper presents part of the background to Sub-task 1 of SC4.T3, whose aim is to develop an improved push test for Eurocode 4 when stud connectors are welded within profiled steel sheeting. [less ▲]

Full Text
Peer Reviewed
See detailArea exploration with a swarm of UAVs combining deterministic Chaotic Ant Colony Mobility with position MPC
Rosalie, Martin UL; Dentler, Jan Eric UL; Danoy, Grégoire UL et al

in 2017 International Conference on Unmanned Aircraft Systems (ICUAS) (2017, July 27)

The recent advances in Unmanned Aerial Vehicles (UAVs) technology permit to develop new usages for them. One of the current challenges is to operate UAVs as an autonomous swarm. In this domain we already ... [more ▼]

The recent advances in Unmanned Aerial Vehicles (UAVs) technology permit to develop new usages for them. One of the current challenges is to operate UAVs as an autonomous swarm. In this domain we already proposed a new mobility model using Ant Colony Algorithms combined with chaotic dynamics (CACOC) to enhance the coverage of an area by a swarm of UAVs. In this paper we propose to consider this mobility model as waypoints for real UAVs. A control model of the UAVs is deployed to test the efficiency of the coverage of an area by the swarm. We have tested our approach in a realistic robotics simulator (V-Rep) which is connected with ROS. We compare the performance in terms of coverage using several metrics to ensure that this mobility model is efficient for real UAVs. [less ▲]

Detailed reference viewed: 47 (11 UL)
Full Text
Peer Reviewed
See detailChanging (multi-)cultural contexts through the lense of the receiving society
Murdock, Elke UL; Albert, Isabelle UL; Ferring, Dieter UL

in 9th European IACCP Conference - Program and the book of abstracts (2017, July 17)

Using the natural laboratory of Luxembourg with a foreign population of 47% as case study example, we outline the diversification of diversity. The immigrant population is increasingly heterogeneous in ... [more ▼]

Using the natural laboratory of Luxembourg with a foreign population of 47% as case study example, we outline the diversification of diversity. The immigrant population is increasingly heterogeneous in terms of countries of origin, length of stay/ generation status, economic participation and acculturation choices. Who is a Luxembourger is increasingly difficult to define and minority or majority becomes ever more fluid. Empirical findings concerning the attitude of the receiving society towards multiculturalism will be presented including implications for national identification. We aim to shed light on inter-individual differences in terms of views on immigration among the receiving society, also taking into consideration regional demographic differences. We draw on two different samples, one from the center of Luxembourg (N = 507), where the native population is in the minority and a more regionally diversified sample (N = 238). Similarities and differences will be highlighted and implications discussed. [less ▲]

Detailed reference viewed: 14 (1 UL)
Full Text
Peer Reviewed
See detailRisk-averse Stochastic Nonlinear Model Predictive Control for Real-time Safety-critical Systems
Sajadi Alamdari, Seyed Amin UL; Voos, Holger UL; Darouach, Mohamed

in The 20th World Congress of the International Federation of Automatic Control, IFAC 2017 World Congress, Toulouse, France, 9-14 July 2017 (2017, July 11)

Stochastic nonlinear model predictive control has been developed to systematically find an optimal decision with the aim of performance improvement in dynamical systems that involve uncertainties. However ... [more ▼]

Stochastic nonlinear model predictive control has been developed to systematically find an optimal decision with the aim of performance improvement in dynamical systems that involve uncertainties. However, most of the current methods are risk-neutral for safety-critical systems and depend on computationally expensive algorithms. This paper investigates on the risk-averse optimal stochastic nonlinear control subject to real-time safety-critical systems. In order to achieve a computationally tractable design and integrate knowledge about the uncertainties, bounded trajectories generated to quantify the uncertainties. The proposed controller considers these scenarios in a risk-sensitive manner. A certainty equivalent nonlinear model predictive control based on minimum principle is reformulated to optimise nominal cost and expected value of future recourse actions. The capability of proposed method in terms of states regulations, constraints fulfilment, and real-time implementation is demonstrated for a semi-autonomous ecological advanced driver assistance system specified for battery electric vehicles. This system plans for a safe and energy-efficient cruising velocity profile autonomously. [less ▲]

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailProceedings of International Conference on Software and Systems Process (ICSSP)
Kuhrmann, Marco; Diebold, Philipp; Münch, Jürgen et al

in Hybrid software and system development in practice: Waterfall, scrum, and beyond (2017, July)

Software and system development faces numerous challenges of rapidly changing markets. To address such challenges, companies and projects design and adopt specific development approaches by combining well ... [more ▼]

Software and system development faces numerous challenges of rapidly changing markets. To address such challenges, companies and projects design and adopt specific development approaches by combining well-structured comprehensive methods and flexible agile practices. Yet, the number of methods and practices is large, and available studies argue that the actual process composition is carried out in a fairly ad-hoc manner. The present paper reports on a survey on hybrid software development approaches. We study which approaches are used in practice, how different approaches are combined, and what contextual factors influence the use and combination of hybrid software development approaches. Our results from 69 study participants show a variety of development approaches used and combined in practice. We show that most combinations follow a pattern in which a traditional process model serves as framework in which several fine-grained (agile) practices are plugged in. We further show that hybrid software development approaches are independent from the company size and external triggers. We conclude that such approaches are the results of a natural process evolution, which is mainly driven by experience, learning, and pragmatism. [less ▲]

Detailed reference viewed: 37 (11 UL)
Full Text
Peer Reviewed
See detailSpatial PAPR Reduction in Symbol-level Precoding for the Multi-beam Satellite Downlink
Spano, Danilo UL; Alodeh, Maha UL; Chatzinotas, Symeon UL et al

in IEEE SPAWC 2017 (2017, July)

In this work, a novel symbol-level precoding scheme is proposed, for managing the multi-user interference in the forward downlink channel of a multi-beam satellite system. Besides exploiting the ... [more ▼]

In this work, a novel symbol-level precoding scheme is proposed, for managing the multi-user interference in the forward downlink channel of a multi-beam satellite system. Besides exploiting the constructive interference effect, the proposed scheme aims at improving the robustness of the transmitted signals to the non-linear distortions of practical satellite systems. This is done by reducing the imbalances between the instantaneous power transmitted by the multiple antennas, which are detrimental in non-linear systems. More specifically, this work proposes a symbol-level precoding scheme performing the minimization of the spatial peak-to-average power ratio, under Quality-of-Service constraints. An iterative algorithm is proposed to solve the related optimization problem. Numerical results are presented to assess the performance of the proposed scheme, which outperforms the state of the art symbol-level precoding techniques in terms of spatial peak-to-average power ratio across the transmitting antennas. [less ▲]

Detailed reference viewed: 65 (10 UL)
Full Text
Peer Reviewed
See detailNumerical Check of the Meyerhof Bearing Capacity Equation for Shallow Foundations
Van Baars, Stefan UL

in Shehata, Hany; Rashed, Youssef (Eds.) Congress and Exhibition on Sustainable Civil Infrastructures (2017, July)

In 1920 Prandtl published an analytical solution for the bearing capacity of a strip load on a weightless infinite half-space. This solution was extended with a surrounding surcharge by Reissner and with ... [more ▼]

In 1920 Prandtl published an analytical solution for the bearing capacity of a strip load on a weightless infinite half-space. This solution was extended with a surrounding surcharge by Reissner and with the soil weight by Keverling Buisman. It was Terzaghi who wrote this with three separate bearing capacity factors for the cohesion, surcharge and soil-weight. Meyerhof extended this to the equation which is nowadays used; with shape and inclination factors. He also proposed equations for the inclination factors, based on his own laboratory experiments. Since then, several people proposed updated equations for the soil-weight bearing capacity factor, and also for the shape and inclination factors. The common idea is that failure of a footing occurs in all cases with a Prandtl-wedge failure mechanism. In order to check the failure mechanisms and the currently used equations for the bearing capacity factors and shape factors, a large number of finite element calculations of strip and circular footings have been made. These calculations proof that for some cases there are also a few other failure mechanisms possible. Also the currently used bearing capacity factors and shape factors are not correct. In fact, for footings on a soil with a higher friction angle, all three bearing capacity factors and all three shape factors can be much lower than the currently used values. This means that the currently used equations for the soil-weight bearing capacity factors and the shape factors are inaccurate and unsafe. Therefore, based on the finite element calculations, new equations have been presented in this paper. [less ▲]

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailTowards Semantic Interoperability in an Open IoT Ecosystem for Connected Vehicle Services
Kolbe, Niklas UL; Kubler, Sylvain UL; Robert, Jérémy UL et al

in 2017 IEEE Global Internet of Things Summit (GIoTS) Proceedings (2017, July)

A present challenge in today’s Internet of Things (IoT) ecosystem is to enable interoperability across hetero- geneous systems and service providers. Restricted access to data sources and services limits ... [more ▼]

A present challenge in today’s Internet of Things (IoT) ecosystem is to enable interoperability across hetero- geneous systems and service providers. Restricted access to data sources and services limits the capabilities of a smart city to improve social, environmental and economic aspects. Interoperability in the IoT is concerned with both, messaging interfaces and semantic understanding of heterogeneous data. In this paper, the first building blocks of an emerging open IoT ecosystem developed at the EU level are presented. Se- mantic web technologies are applied to the existing messaging components to support and improve semantic interoperability. The approach is demonstrated with a proof-of-concept for connected vehicle services in a smart city setting. [less ▲]

Detailed reference viewed: 59 (0 UL)
Full Text
Peer Reviewed
See detailAnalyzing Complex Data in Motion at Scale with Temporal Graphs
Hartmann, Thomas UL; Fouquet, François UL; Jimenez, Matthieu UL et al

in Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering (2017, July)

Modern analytics solutions succeed to understand and predict phenomenons in a large diversity of software systems, from social networks to Internet-of-Things platforms. This success challenges analytics ... [more ▼]

Modern analytics solutions succeed to understand and predict phenomenons in a large diversity of software systems, from social networks to Internet-of-Things platforms. This success challenges analytics algorithms to deal with more and more complex data, which can be structured as graphs and evolve over time. However, the underlying data storage systems that support large-scale data analytics, such as time-series or graph databases, fail to accommodate both dimensions, which limits the integration of more advanced analysis taking into account the history of complex graphs, for example. This paper therefore introduces a formal and practical definition of temporal graphs. Temporal graphs pro- vide a compact representation of time-evolving graphs that can be used to analyze complex data in motion. In particular, we demonstrate with our open-source implementation, named GREYCAT, that the performance of temporal graphs allows analytics solutions to deal with rapidly evolving large-scale graphs. [less ▲]

Detailed reference viewed: 27 (3 UL)
Full Text
Peer Reviewed
See detailEnriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components
Kolbe, Niklas UL; Zaslavsky, Arkady; Kubler, Sylvain UL et al

in Modeling and Using Context (2017, July)

Theimportanceofsystem-levelcontext-andsituationaware- ness increases with the growth of the Internet of Things (IoT). This paper proposes an integrated approach to situation awareness by providing a ... [more ▼]

Theimportanceofsystem-levelcontext-andsituationaware- ness increases with the growth of the Internet of Things (IoT). This paper proposes an integrated approach to situation awareness by providing a semantically rich situation model together with reliable situation infer- ence based on Context Spaces Theory (CST) and Situation Theory (ST). The paper discusses benefits of integrating the proposed situation aware- ness framework with knowledge base and efficient reasoning techniques taking into account uncertainty and incomplete knowledge about situa- tions. The paper discusses advantages and impact of proposed context adaptation in dynamic IoT environments. Practical issues of two-way mapping between IoT messaging standards and CST are also discussed. [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailPower Allocation for In-Band Full-Duplex Self-Backhauling
Lagunas, Eva UL; Lei, Lei UL; Maleki, Sina UL et al

in International Conference on Telecommunications and Signal Processing (TSP), Barcelona, Spain, July 2017 (2017, July)

Detailed reference viewed: 29 (5 UL)
Full Text
Peer Reviewed
See detailFast Stochastic Non-linear Model Predictive Control for Electric Vehicle Advanced Driver Assistance Systems
Sajadi Alamdari, Seyed Amin UL; Voos, Holger UL; Darouach, Mohamed

in 13th IEEE International Conference on Vehicular Electronics and Safety, Vienna, Austria 27-28 June 2017 (2017, June 27)

Semi-autonomous driving assistance systems have a high potential to improve the safety and efficiency of the battery electric vehicles that are enduring limited cruising range. This paper presents an ... [more ▼]

Semi-autonomous driving assistance systems have a high potential to improve the safety and efficiency of the battery electric vehicles that are enduring limited cruising range. This paper presents an ecologically advanced driver assistance system to extend the functionality of the adaptive cruise control system. A real-time stochastic non-linear model predictive controller with probabilistic constraints is presented to compute on-line the safe and energy-efficient cruising velocity profile. The individual chance-constraint is reformulated into a convex second-order cone constraint which is robust for a general class of probability distributions. Finally, the performance of proposed approach in terms of states regulation, constraints fulfilment, and energy efficiency is evaluated on a battery electric vehicle. [less ▲]

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailHow Mobile Phone Handovers reflect Urban Mobility: A Simulation Study
Derrmann, Thierry UL; Frank, Raphaël UL; Engel, Thomas UL et al

in Derrmann, Thierry; Frank, Raphaël; Engel, Thomas (Eds.) et al How Mobile Phone Handovers reflect Urban Mobility: A Simulation Study (2017, June 26)

Detailed reference viewed: 19 (1 UL)
Full Text
Peer Reviewed
See detailKeynote: Cultural heritage, musical diversity and functionality of music education
Sagrillo, Damien UL

in Andrea Kárpáti (Ed.) New landscapes in science and art - in focus: teaching Visual Culture. Book of Proceedings (2017, June 23)

cf. attachment

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailASIMUT project: Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques
Bouvry, Pascal UL; Chaumette, Serge; Danoy, Grégoire UL et al

in DroNet'17 Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications (2017, June 23)

This document summarizes the activities and results of the ASIMUT project (Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques) carried out by the consortium ... [more ▼]

This document summarizes the activities and results of the ASIMUT project (Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques) carried out by the consortium composed of Thales, Fraunhofer IOSB, Fly-n-Sense, University of Bordeaux and University of Luxembourg. Funded by the European Defence Agency (EDA), the objectives of the ASIMUT project are to design, implement and validate algorithms that will allow the efficient usage of autonomous swarms of Unmanned Aerial Vehicles (UAVs) for surveillance missions. [less ▲]

Detailed reference viewed: 29 (5 UL)
Full Text
Peer Reviewed
See detailWhat industry wants from academia in software testing? Hearing practitioners’ opinions
Garousi, Vahid UL; Felderer, Michael; Kuhrmann, Marco et al

in Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (2017, June 15)

The level of industry-academia collaboration (IAC) in software engineering in general and in software testing in particular is quite low. Many researchers and practitioners are not collaborating with the ... [more ▼]

The level of industry-academia collaboration (IAC) in software engineering in general and in software testing in particular is quite low. Many researchers and practitioners are not collaborating with the “other side” to solve industrial problems. To shed light on the above issue and to characterize precisely what industry wants from academia in software testing, we solicited practitioners’ opinions on their challenges in different testing activities and also the particularly relevant topics that they want the research community to work on. This short paper aims to draw the community’s attention to the important issue of strengthening IAC with the hope of more IAC in software testing in the areas of most importance to the industry. [less ▲]

Detailed reference viewed: 17 (3 UL)
Full Text
Peer Reviewed
See detailIndustry-academia collaborations in software engineering: an empirical analysis of challenges, patterns and anti-patterns in research projects
Garousi, Vahid UL; Felderer, Michael; Fernandes, João et al

in Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (2017, June 15)

Research collaboration between industry and academia supports improvement and innovation in industry and helps to ensure industrial relevance in academic research. However, many researchers and ... [more ▼]

Research collaboration between industry and academia supports improvement and innovation in industry and helps to ensure industrial relevance in academic research. However, many researchers and practitioners believe that the level of joint industry-academia collaboration (IAC) in software engineering (SE) research is still relatively low, compared to the amount of activity in each of the two communities. The goal of the empirical study reported in this paper is to exploratory characterize the state of IAC with respect to a set of challenges, patterns and anti-patterns identified by a recent Systematic Literature Review study. To address the above goal, we gathered the opinions of researchers and practitioners w.r.t. their experiences in IAC projects. Our dataset includes 47 opinion data points related to a large set of projects conducted in 10 different countries. We aim to contribute to the body of evidence in the area of IAC, for the benefit of researchers and practitioners in conducting future successful IAC projects in SE. As an output, the study presents a set of empirical findings and evidence-based recommendations to increase the success of IAC projects. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailChoosing the Right Test Automation Tool: a Grey Literature Review of Practitioner Sources
Raulamo-Jurvanen, Päivi; Mäntylä, Mika; Garousi, Vahid UL

in Choosing the Right Test Automation Tool: a Grey Literature Review of Practitioner Sources (2017, June 15)

Background: Choosing the right software test automation tool is not trivial, and recent industrial surveys indicate lack of right tools as the main obstacle to test automation. Aim: In this paper, we ... [more ▼]

Background: Choosing the right software test automation tool is not trivial, and recent industrial surveys indicate lack of right tools as the main obstacle to test automation. Aim: In this paper, we study how practitioners tackle the problem of choosing the right test automation tool. Method: We synthesize the “voice” of the practitioners with a grey literature review originating from 53 different companies. The industry experts behind the sources had roles such as “Software Test Automation Architect”, and “Principal Software Engineer”. Results: Common consensus about the important criteria exists but those are not applied systematically. We summarize the scattered steps from individual sources by presenting a comprehensive process for tool evaluation with 12 steps and a total of 14 different criteria for choosing the right tool. Conclusions: The practitioners tend to have general interest in and be influenced by related grey literature as about 78% of our sources had at least 20 backlinks (a reference comparable to a citation) while the variation was between 3 and 759 backlinks. There is a plethora of different software testing tools available, yet the practitioners seem to prefer and adopt the widely known and used tools. The study helps to identify the potential pitfalls of existing processes and opportunities for comprehensive tool evaluation. [less ▲]

Detailed reference viewed: 53 (4 UL)
Full Text
Peer Reviewed
See detailExperience-based guidelines for effective and efficient data extraction in systematic reviews in software engineering
Garousi, Vahid UL; Felderer, Michael

in Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (2017, June)

To systematically collect evidence and to structure a given area in software engineering (SE), Systematic Literature Reviews (SLR) and Systematic Mapping (SM) studies have become common. Data extraction ... [more ▼]

To systematically collect evidence and to structure a given area in software engineering (SE), Systematic Literature Reviews (SLR) and Systematic Mapping (SM) studies have become common. Data extraction is one of the main phases (activities) when conducting an SM or an SLR, whose objective is to extract required data from the primary studies and to accurately record the information researchers need to answer the questions of the SM/SLR study. Based on experience in a large number of SM/SLR studies, we and many other researchers have found the data extraction in SLRs to be time consuming and error-prone, thus raising the real need for heuristics and guidelines for effective and efficient data extraction in these studies, especially to be learnt by junior and young researchers. As a ‘guideline’ paper, this paper contributes a synthesized list of challenges usually faced during SLRs’ data extraction phase and the corresponding solutions (guidelines). For our synthesis, we consider two data sources: (1) the pool of 16 SLR studies in which the authors have been involved in, as well as (2) a review of challenges and guidelines in the existing literature. Our experience in utilizing the presented guidelines in the near past have helped our junior colleagues to conduct data extractions more effectively and efficiently. [less ▲]

Detailed reference viewed: 40 (7 UL)
Full Text
Peer Reviewed
See detailThe pragmatic oddity in a norm-based semantics
Parent, Xavier UL; van der Torre, Leon UL

in Governatori, Guido (Ed.) 16th International Conference on Artificial Intelligence & Law (ICAIL-17) (2017, June)

The ideal worlds of a possible worlds semantics may satisfy both a primary obligation and an associated secondary obligation, for example the obligation to keep a promise and the obligation to apologise ... [more ▼]

The ideal worlds of a possible worlds semantics may satisfy both a primary obligation and an associated secondary obligation, for example the obligation to keep a promise and the obligation to apologise for not keeping it. This is known as the pragmatic oddity introduced by Prakken and Sergot. We argue that an adequate treatment of the pragmatic oddity within a norm-based semantics can be obtained, by not allowing primary and secondary obligations to aggregate, because they are obligations of a di erent kind. On the basis of this conceptual analysis, we introduce two logics, depending on the stance taken on the representation of normative con icts, and we present sound and complete proof systems for these logics. We then give a formal analysis, discuss extensions, and highlight various topics for further research. [less ▲]

Detailed reference viewed: 22 (4 UL)
Full Text
Peer Reviewed
See detailSpectrum Sharing in Hybrid Terrestrial-Satellite Backhaul Networks in the Ka Band
Artiga, Xavier; Vázquez, Miguel Ángel; Pérez-Neira, Ana et al

in European Conference on Networks and Communications (EuCNC), June 2017 (2017, June)

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailSide-Channel Attacks meet Secure Network Protocols
Biryukov, Alex UL; Dinu, Dumitru-Daniel UL; Le Corre, Yann UL

in Gollmann, Dieter; Miyaji, Atsuko; Kikuchi, Hiroaki (Eds.) Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017. Proceedings (2017, June)

Side-channel attacks are powerful tools for breaking systems that implement cryptographic algorithms. The Advanced Encryption Standard (AES) is widely used to secure data, including the communication ... [more ▼]

Side-channel attacks are powerful tools for breaking systems that implement cryptographic algorithms. The Advanced Encryption Standard (AES) is widely used to secure data, including the communication within various network protocols. Major cryptographic libraries such as OpenSSL or ARM mbed TLS include at least one implementation of the AES. In this paper, we show that most implementations of the AES present in popular open-source cryptographic libraries are vulnerable to side-channel attacks, even in a network protocol scenario when the attacker has limited control of the input. We present an algorithm for symbolic processing of the AES state for any input configuration where several input bytes are variable and known, while the rest are fixed and unknown as is the case in most secure network protocols. Then, we classify all possible inputs into 25 independent evaluation cases depending on the number of bytes controlled by attacker and the number of rounds that must be attacked to recover the master key. Finally, we describe an optimal algorithm that can be used to recover the master key using Correlation Power Analysis (CPA) attacks. Our experimental results raise awareness of the insecurity of unprotected implementations of the AES used in network protocol stacks. [less ▲]

Detailed reference viewed: 32 (9 UL)
Full Text
See detailSilicone sealants: A Finite Fracture Mechanics failure model for non-linear materials
Rosendahl, Philipp L.; Staudt, Yves UL; Odenbreit, Christoph UL et al

in 14th International Conference on Fracture (ICF 14) (2017, June)

A finite fracture mechanics failure model for hyperelastic silicone sealants is presented. The model is in very good agreement with simple shear tests of different adhesive joint geometries.

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailOn idempotent discrete uninorms
Couceiro, Miguel; Devillet, Jimmy UL; Marichal, Jean-Luc UL

in De Baets, Bernard; Torra, Vicenç; Mesiar, Radko (Eds.) Aggregation Functions in Theory and in Practice (2017, June)

In this paper we provide two axiomatizations of the class of idempotent discrete uninorms as conservative binary operations, where an operation is conservative if it always outputs one of its input values ... [more ▼]

In this paper we provide two axiomatizations of the class of idempotent discrete uninorms as conservative binary operations, where an operation is conservative if it always outputs one of its input values. More precisely we first show that the idempotent discrete uninorms are exactly those operations that are conservative, symmetric, and nondecreasing in each variable. Then we show that, in this characterization, symmetry can be replaced with both bisymmetry and existence of a neutral element. [less ▲]

Detailed reference viewed: 50 (14 UL)
Full Text
Peer Reviewed
See detailAn Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption
Titcheu Chekam, Thierry UL; Papadakis, Mike UL; Le Traon, Yves UL et al

in International Conference on Software Engineering (ICSE 2017) (2017, May 28)

Many studies suggest using coverage concepts, such as branch coverage, as the starting point of testing, while others as the most prominent test quality indicator. Yet the relationship between coverage ... [more ▼]

Many studies suggest using coverage concepts, such as branch coverage, as the starting point of testing, while others as the most prominent test quality indicator. Yet the relationship between coverage and fault-revelation remains unknown, yielding uncertainty and controversy. Most previous studies rely on the Clean Program Assumption, that a test suite will obtain similar coverage for both faulty and fixed (‘clean’) program versions. This assumption may appear intuitive, especially for bugs that denote small semantic deviations. However, we present evidence that the Clean Program Assumption does not always hold, thereby raising a critical threat to the validity of previous results. We then conducted a study using a robust experimental methodology that avoids this threat to validity, from which our primary finding is that strong mutation testing has the highest fault revelation of four widely-used criteria. Our findings also revealed that fault revelation starts to increase significantly only once relatively high levels of coverage are attained. [less ▲]

Detailed reference viewed: 152 (12 UL)
Full Text
Peer Reviewed
See detailPETrA: a software-based tool for estimating the energy profile of Android applications
Di Nucci, Dario; Palomba, Fabio; Prota, Antonio et al

in 39th International Conference on Software Engineering (ICSE) 2017 (2017, May 24)

Energy efficiency is a vital characteristic of any mobile application, and indeed is becoming an important factor for user satisfaction. For this reason, in recent years several approaches and tools for ... [more ▼]

Energy efficiency is a vital characteristic of any mobile application, and indeed is becoming an important factor for user satisfaction. For this reason, in recent years several approaches and tools for measuring the energy consumption of mobile devices have been proposed. Hardware-based solutions are highly precise, but at the same time they require costly hardware toolkits. Model-based techniques require a possibly difficult calibration of the parameters needed to correctly create a model on a specific hardware device. Finally, software-based solutions are easier to use, but they are possibly less precise than hardware-based solution. In this demo, we present PETrA, a novel software-based tool for measuring the energy consumption of Android apps. With respect to other tools, PETrA is compatible with all the smartphones with Android 5.0 or higher, not requiring any device specific energy profile. We also provide evidence that our tool is able to perform similarly to hardware-based solutions. [less ▲]

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailJava Unit Testing Tool Competition — Fifth Round
Panichella, Annibale UL; Urko, Rueda

in 10th International Workshop on Search- Based Software Testing (SBST) 2017 (2017, May 22)

After four successful JUnit tool competitions, we report on the achievements of a new Java Unit Testing Tool Competition. This 5th contest introduces statistical analyses in the benchmark infrastructure ... [more ▼]

After four successful JUnit tool competitions, we report on the achievements of a new Java Unit Testing Tool Competition. This 5th contest introduces statistical analyses in the benchmark infrastructure and has been validated with significance against the results of the previous 4th edition. Overall, the competition evaluates four automated JUnit testing tools taking as baseline human written test cases from real projects. The paper details the modifications performed to the methodology and provides full results of the competition. [less ▲]

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailEuphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware
Hurier, Médéric UL; Suarez-Tangil, Guillermo; Dash, Santanu Kumar et al

in MSR 2017 (2017, May 21)

Android malware is now pervasive and evolving rapidly. Thousands of malware samples are discovered every day with new models of attacks. The growth of these threats has come hand in hand with the ... [more ▼]

Android malware is now pervasive and evolving rapidly. Thousands of malware samples are discovered every day with new models of attacks. The growth of these threats has come hand in hand with the proliferation of collective repositories sharing the latest specimens. Having access to a large number of samples opens new research directions aiming at efficiently vetting apps. However, automatically inferring a reference ground-truth from those repositories is not straightforward and can inadvertently lead to unforeseen misconceptions. On the one hand, samples are often mis-labeled as different parties use distinct naming schemes for the same sample. On the other hand, samples are frequently mis-classified due to conceptual errors made during labeling processes. In this paper, we analyze the associations between all labels given by different vendors and we propose a system called EUPHONY to systematically unify common samples into family groups. The key novelty of our approach is that no a-priori knowledge on malware families is needed. We evaluate our approach using reference datasets and more than 0.4 million additional samples outside of these datasets. Results show that EUPHONY provides competitive performance against the state-of-the-art. [less ▲]

Detailed reference viewed: 82 (9 UL)
Full Text
Peer Reviewed
See detailRule Compilation in Multi-Tenant Networks
Blaiech, Khalil; Hamadi, Salaheddine; Hommes, Stefan UL et al

in Rule Compilation in Multi-Tenant Networks (2017, May 18)

Detailed reference viewed: 37 (2 UL)
Full Text
Peer Reviewed
See detailLow Complexity Symbol-Level Design for Linear Precoding Systems
Krivochiza, Jevgenij UL; Kalantari, Ashkan UL; Chatzinotas, Symeon UL et al

in Heusdens, Richard; Weber, Jos H. (Eds.) PROCEEDINGS of the 2017 Symposium on Information Theory and Signal Processing in the Benelux (2017, May 11)

The practical utilization of the symbol-level precoding in MIMO systems is challenging since the implementation of the sophisticated optimization algorithms must be done with reasonable computational ... [more ▼]

The practical utilization of the symbol-level precoding in MIMO systems is challenging since the implementation of the sophisticated optimization algorithms must be done with reasonable computational resources. In the real implementation of MIMO precoding systems, the processing time for each set of symbols is a crucial parameter, especially in the high-throughput mode. In this work, a symbol-level optimization algorithm with reduced complexity is devised. Performance of a symbol-level precoder is shown to improve in terms of the processing times per set of symbols. [less ▲]

Detailed reference viewed: 53 (23 UL)
Full Text
Peer Reviewed
See detailCost analysis of Smart Lighting Solutions for Smart Cities
Cacciatore, Giuseppe; Fiandrino, Claudio UL; Kliazovich, Dzmitry UL et al

in IEEE International Conference on Communications (ICC), Paris, France, 2017 (2017, May)

Lighting is an essential community service, but current implementations are not energy efficient and impact on the energy budget of the municipalities for at least 40\%. In this paper, we propose ... [more ▼]

Lighting is an essential community service, but current implementations are not energy efficient and impact on the energy budget of the municipalities for at least 40\%. In this paper, we propose heuristics and devise a comparison methodology for new smart lighting solutions in next generation smart cities. The proposed smart lighting techniques make use of Internet of Things (IoT) augmented lamppost, which save energy by turning off or dimming the light according to the presence of citizens. Assessing costs and benefits in adopting the new smart lighting solutions is a pillar step for municipalities to foster real implementation. For evaluation purposes, we have developed a custom simulator which enables the deployment of lampposts in realistic urban environments. The citizens travel on foot along the streets and trigger activation of the lampposts according to the proposed heuristics. For the city of Luxembourg, the results highlight that replacing all existing lamps with LEDs and dimming light intensity according to the presence of users nearby the lampposts is convenient and provides an economical return already after the first year of deployment. [less ▲]

Detailed reference viewed: 112 (8 UL)
Full Text
Peer Reviewed
See detailEnergy Efficient Data Collection in Opportunistic Mobile Crowdsensing Architectures for Smart Cities
Capponi, Andrea UL; Fiandrino, Claudio UL; Kliazovich, Dzmitry UL et al

in 3rd IEEE INFOCOM Workshop on Smart Cites and Urban Computing (2017, May)

Smart cities employ latest information and communication technologies to enhance services for citizens. Sensing is essential to monitor current status of infrastructures and the environment. In Mobile ... [more ▼]

Smart cities employ latest information and communication technologies to enhance services for citizens. Sensing is essential to monitor current status of infrastructures and the environment. In Mobile Crowdsensing (MCS), citizens participate in the sensing process contributing data with their mobile devices such as smartphones, tablets and wearables. To be effective, MCS systems require a large number of users to contribute data. While several studies focus on developing efficient incentive mechanisms to foster user participation, data collection policies still require investigation. In this paper, we propose a novel distributed and energy-efficient framework for data collection in opportunistic MCS architectures. Opportunistic sensing systems require minimal intervention from the user side as sensing decisions are application- or device-driven. The proposed framework minimizes the cost of both sensing and reporting, while maximizing the utility of data collection and, as a result, the quality of contributed information. We evaluate performance of the framework with simulations, performed in a real urban environment and with a large number of participants. The simulation results verify cost-effectiveness of the framework and assess efficiency of the data generation process. [less ▲]

Detailed reference viewed: 96 (10 UL)
Full Text
Peer Reviewed
See detailSearch-driven String Constraint Solving for Vulnerability Detection
Thome, Julian UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, May)

Constraint solving is an essential technique for detecting vulnerabilities in programs, since it can reason about input sanitization and validation operations performed on user inputs. However, real-world ... [more ▼]

Constraint solving is an essential technique for detecting vulnerabilities in programs, since it can reason about input sanitization and validation operations performed on user inputs. However, real-world programs typically contain complex string operations that challenge vulnerability detection. State-of-the-art string constraint solvers support only a limited set of string operations and fail when they encounter an unsupported one; this leads to limited effectiveness in finding vulnerabilities. In this paper we propose a search-driven constraint solving technique that complements the support for complex string operations provided by any existing string constraint solver. Our technique uses a hybrid constraint solving procedure based on the Ant Colony Optimization meta-heuristic. The idea is to execute it as a fallback mechanism, only when a solver encounters a constraint containing an operation that it does not support. We have implemented the proposed search-driven constraint solving technique in the ACO-Solver tool, which we have evaluated in the context of injection and XSS vulnerability detection for Java Web applications. We have assessed the benefits and costs of combining the proposed technique with two state-of-the-art constraint solvers (Z3-str2 and CVC4). The experimental results, based on a benchmark with 104 constraints derived from nine realistic Web applications, show that our approach, when combined in a state-of-the-art solver, significantly improves the number of detected vulnerabilities (from 4.7% to 71.9% for Z3-str2, from 85.9% to 100.0% for CVC4), and solves several cases on which the solver fails when used stand-alone (46 more solved cases for Z3-str2, and 11 more for CVC4), while still keeping the execution time affordable in practice. [less ▲]

Detailed reference viewed: 603 (60 UL)
Full Text
Peer Reviewed
See detailCarrier Allocation for Hybrid Satellite-Terrestrial Backhaul Networks
Lagunas, Eva UL; Maleki, Sina UL; Lei, Lei UL et al

in ICC Workshop on Satellite Communications: Challenges and Integration in the 5G ecosystem, Paris, France, May 2017 (2017, May)

Detailed reference viewed: 38 (5 UL)
Full Text
Peer Reviewed
See detailA Guided Genetic Algorithm for Automated Crash Reproduction
Soltani, Mozhan; Panichella, Annibale UL; van Deursen, Arie

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, May)

To reduce the effort developers have to make for crash debugging, researchers have proposed several solutions for automatic failure reproduction. Recent advances proposed the use of symbolic execution ... [more ▼]

To reduce the effort developers have to make for crash debugging, researchers have proposed several solutions for automatic failure reproduction. Recent advances proposed the use of symbolic execution, mutation analysis, and directed model checking as underling techniques for post-failure analysis of crash stack traces. However, existing approaches still cannot reproduce many real-world crashes due to such limitations as environment dependencies, path explosion, and time complexity. To address these challenges, we present EvoCrash, a post-failure approach which uses a novel Guided Genetic Algorithm (GGA) to cope with the large search space characterizing real-world software programs. Our empirical study on three open-source systems shows that EvoCrash can replicate 41 (82%) of real-world crashes, 34 (89%) of which are useful reproductions for debugging purposes, outperforming the state-of-the-art in crash replication. [less ▲]

Detailed reference viewed: 66 (1 UL)
Full Text
Peer Reviewed
See detailDifferentially Private Neighborhood-based Recommender Systems
Wang, Jun UL; Tang, Qiang

in IFIP Information Security & Privacy Conference (2017, May)

Privacy issues of recommender systems have become a hot topic for the society as such systems are appearing in every corner of our life. In contrast to the fact that many secure multi-party computation ... [more ▼]

Privacy issues of recommender systems have become a hot topic for the society as such systems are appearing in every corner of our life. In contrast to the fact that many secure multi-party computation protocols have been proposed to prevent information leakage in the process of recommendation computation, very little has been done to restrict the information leakage from the recommendation results. In this paper, we apply the differential privacy concept to neighborhood-based recommendation methods (NBMs) under a probabilistic framework. We first present a solution, by directly calibrating Laplace noise into the training process, to differential-privately find the maximum a posteriori parameters similarity. Then we connect differential privacy to NBMs by exploiting a recent observation that sampling from the scaled posterior distribution of a Bayesian model results in provably differentially private systems. Our experiments show that both solutions allow promising accuracy with a modest privacy budget, and the second solution yields better accuracy if the sampling asymptotically converges. We also compare our solutions to the recent differentially private matrix factorization (MF) recommender systems, and show that our solutions achieve better accuracy when the privacy budget is reasonably small. This is an interesting result because MF systems often offer better accuracy when differential privacy is not applied. [less ▲]

Detailed reference viewed: 33 (6 UL)
Full Text
Peer Reviewed
See detailUsing Selene to Verify your Vote in JCJ
Iovino, Vincenzo UL; Rial Duran, Alfredo UL; Roenne, Peter UL et al

in Workshop on Advances in Secure Electronic Voting (VOTING'17) (2017, April 07)

Detailed reference viewed: 22 (11 UL)
Full Text
See detailTo Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification
Pejo, Balazs UL; Tang, Qiang

in Fifth ACM International Workshop on Security in Cloud Computing, Abu Dhabi 2 April 2017 (2017, April 02)

In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their com- putations to third-party cloud servers. In order to protect service quality, the ... [more ▼]

In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their com- putations to third-party cloud servers. In order to protect service quality, the integrity of computation results need to be guaranteed. In this paper, we develop a game theoretic framework which helps the outsourcer to maximize its pay- o while ensuring the desired level of integrity for the out- sourced computation. We de ne two Stackelberg games and analyze the optimal setting's sensitivity for the parameters of the model. [less ▲]

Detailed reference viewed: 17 (3 UL)
Full Text
Peer Reviewed
See detailWhen An Educational Ideology Travels: The Experience Of The New Math Reform In Luxembourg
Nadimi Amiri, Shaghayegh UL

in Mathematics Education and Life at Times of Crisis (2017, April)

Since 1958 a series of new reform programmes, known as “New Math reform” tried to fundamentally deconstruct the mathematics education of schools in the United States. This reform aimed to promote the ... [more ▼]

Since 1958 a series of new reform programmes, known as “New Math reform” tried to fundamentally deconstruct the mathematics education of schools in the United States. This reform aimed to promote the “problem-solving” abilities in students and was a means to modernise not just the school math education but also the idea of why students should learn mathematics. Later, the reform project travelled to Europe through the support of the OECD and some other international or European organisation. This paper briefly reviews the process of the adaptation of this reform project in Luxembourg during the 1960s and 1970s. The aim is to look at how the ideological background about mathematics education, and in general education, mattered in the preceding of this school reform. [less ▲]

Detailed reference viewed: 22 (9 UL)
See detailDeep Learning for Place Name OCR in Early Maps
Höhn, Winfried UL

in Proceedings of the 2nd International Workshop on Exploring Old Maps (2017, April)

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailWeaving Rules into Models@run.time for Embedded Smart Systems
Mouline, Ludovic UL; Hartmann, Thomas UL; Fouquet, François UL et al

in Mouline, Ludovic; Hartmann, Thomas; Fouquet, François (Eds.) et al Weaving Rules into Models@run.time for Embedded Smart Systems (2017, April)

Smart systems are characterised by their ability to analyse measured data in live and to react to changes according to expert rules. Therefore, such systems exploit appropriate data models together with ... [more ▼]

Smart systems are characterised by their ability to analyse measured data in live and to react to changes according to expert rules. Therefore, such systems exploit appropriate data models together with actions, triggered by domain-related conditions. The challenge at hand is that smart systems usually need to process thousands of updates to detect which rules need to be triggered, often even on restricted hardware like a Raspberry Pi. Despite various approaches have been investigated to efficiently check conditions on data models, they either assume to fit into main memory or rely on high latency persistence storage systems that severely damage the reactivity of smart systems. To tackle this challenge, we propose a novel composition process, which weaves executable rules into a data model with lazy loading abilities. We quantitatively show, on a smart building case study, that our approach can handle, at low latency, big sets of rules on top of large-scale data models on restricted hardware. [less ▲]

Detailed reference viewed: 22 (4 UL)
Full Text
Peer Reviewed
See detailSensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements
Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL et al

in The 32nd ACM Symposium on Applied Computing (SAC 2017) (2017, April)

As the concept of Internet of Things (IoT) develops, buildings are equipped with increasingly heterogeneous sensors to track building status as well as occupant activities. As users become more and more ... [more ▼]

As the concept of Internet of Things (IoT) develops, buildings are equipped with increasingly heterogeneous sensors to track building status as well as occupant activities. As users become more and more concerned with their privacy in buildings, explicit sensing techniques can lead to uncomfortableness and resistance from occupants. In this paper, we adapt a sensing by proxy paradigm that monitors building status and coarse occupant activities through agglomerative clustering of indoor temperature movements. Through extensive experimentation on 86 classrooms, offices and labs in a five-story school building in western Europe, we prove that indoor temperature movements can be leveraged to infer latent information about indoor environments, especially about rooms' relative physical locations and rough type of occupant activities. Our results evidence a cost-effective approach to extending commercial building control systems and gaining extra relevant intelligence from such systems. [less ▲]

Detailed reference viewed: 70 (14 UL)
Full Text
Peer Reviewed
See detailSummary of an Open Discussion on IoT and Lightweight Cryptography
Shamir, Adi; Biryukov, Alex UL; Perrin, Léo Paul UL

in Proceedings of Early Symmetric Crypto workshop, 2017 (2017, April)

This is a summary of the open discussion on IoT security and regulation which took place at the Early Symmetric Crypto (ESC) seminar. Participants have identified that IoT poses critical threat to ... [more ▼]

This is a summary of the open discussion on IoT security and regulation which took place at the Early Symmetric Crypto (ESC) seminar. Participants have identified that IoT poses critical threat to security and privacy. It was agreed that government regulation and dialogue of security researchers with engineers and manufacturers is necessary in order to find proper control mechanisms. [less ▲]

Detailed reference viewed: 151 (8 UL)
Full Text
Peer Reviewed
See detailTopics and Research Directions for Symmetric Cryptography
Biryukov, Alex UL; Daemen, Joan; Lucks, Stefan et al

in Proceedings of Early Symmetric Crypto workshop, 2017 (2017, April)

This is a summary of the open discussion on future research topics for symmetric cryptography chaired by Stefan Lucks. During this session participants were suggesting topics of potential future interest.

Detailed reference viewed: 66 (6 UL)
Full Text
Peer Reviewed
See detailMechanical characterisation of alkali activated clay - based geopolymer binder made out of gravel wash mud
Thapa, Vishojit Bahadur UL; Waldmann, Danièle UL; Wagner, Jean-Frank et al

in Iacobescu, Remus Ion; Malfliet, Annelies (Eds.) Proceedings of the 5th International Slag Valorisation Symposium (2017, April)

One of the most promising cement alternatives are geopolymer cements. The term “geopolymer” was mentioned for the first time by Davidovits1 and classifies all forms of inorganic polymeric material ... [more ▼]

One of the most promising cement alternatives are geopolymer cements. The term “geopolymer” was mentioned for the first time by Davidovits1 and classifies all forms of inorganic polymeric material synthesised by chemical reaction of aluminosilicates and an alkaline activating solution. The production of geopolymer binder comprises in two main procedures: calcination and geopolymerisation. The synthesised geopolymer shows interesting characteristics like good mechanical properties, high strength and good durability. [less ▲]

Detailed reference viewed: 37 (10 UL)
Full Text
Peer Reviewed
See detailPower Allocation for Energy Efficiency Maximization in Downlink CoMP Systems With NOMA
Liu, Zhengxuan; Kang, Guixia; Lei, Lei UL et al

in IEEE Wireless Communications and Networking Conference (WCNC), 2017 (2017, March 19)

This paper investigates a power allocation problem for maximizing energy efficiency (EE) in downlink Coordinated Multi-Point (CoMP) systems with non-orthogonal multiple access (NOMA). First, users’ ... [more ▼]

This paper investigates a power allocation problem for maximizing energy efficiency (EE) in downlink Coordinated Multi-Point (CoMP) systems with non-orthogonal multiple access (NOMA). First, users’ achievable data rate and network throughput are analysed under three transmission schemes: 1) all users’ signals are jointly transmitted by coordinated base stations (BSs); 2) only cell-edge users’ signals are jointly transmitted by coordinated BSs; 3) each user’s signals are transmitted by only one BS. Next, we formulate EE maximization problems for the three schemes under the constraints of minimum users’ data rate and maximum BS transmit power. The considered problem is non-convex and hard to tackle. To address it, an iterative sub-optimal algorithm is proposed by adopting fractional programming and difference of convex programming. Numerical results show that the near optimality performance of EE can be achieved by using the proposed algorithm with advantages of fast convergence and low complexity. Three transmission schemes of NOMA have superior EE performance compared with conventional orthogonal multiple access scheme in the same CoMP networks. [less ▲]

Detailed reference viewed: 85 (26 UL)
Full Text
Peer Reviewed
See detailSpeeding-Up Mutation Testing via Data Compression and State Infection
Zhu, Qianqian; Panichella, Annibale UL; Zaidman, Andy

in IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) 2017 (2017, March 13)

Mutation testing is widely considered as a high-end test criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing ... [more ▼]

Mutation testing is widely considered as a high-end test criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, its scalability issue remains in practice. In this paper, we introduce a novel method to speed up mutation testing based on state infection information. In addition to filtering out uninfected test executions, we further select a subset of mutants and a subset of test cases to run leveraging data-compression techniques. In particular, we adopt Formal Concept Analysis (FCA) to group similar mutants together and then select test cases to cover these mutants. To evaluate our method, we conducted an experimental study on six open source Java projects. We used EvoSuite to automatically generate test cases and to collect mutation data. The initial results show that our method can reduce the execution time by 83.93% with only 0.257% loss in precision. [less ▲]

Detailed reference viewed: 8 (1 UL)
Full Text
See detailSystem Testing of Timing Requirements based on Use Cases and Timed Automata
Wang, Chunhui UL; Pastore, Fabrizio UL; Briand, Lionel UL

in 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), Tokyo 13-18 March 2017 (2017, March 13)

In the context of use-case centric development and requirements-driven testing, this paper addresses the problem of automatically deriving system test cases to verify timing requirements. Inspired by ... [more ▼]

In the context of use-case centric development and requirements-driven testing, this paper addresses the problem of automatically deriving system test cases to verify timing requirements. Inspired by engineering practice in an automotive software development context, we rely on an analyzable form of use case specifications and augment such functional descriptions with timed automata, capturing timing requirements, following a methodology aiming at minimizing modeling overhead. We automate the generation of executable test cases using a test strategy based on maximizing test suite diversity and building over the UPPAAL model checker. Initial empirical results based on an industrial case study provide evidence of the effectiveness of the approach. [less ▲]

Detailed reference viewed: 234 (19 UL)
Full Text
Peer Reviewed
See detailMusic and Social Health
Sagrillo, Damien UL

in Devosa, Iván; Maródi, Ágnes; Buzás, Zsuzsanna (Eds.) et al International HEART 2017 Conference Health – Economy – Art (2017, March 08)

Former German minister of the interior Otto Schily highlighted: “Anyone who closes music schools jeopardizes inner security.” In his large study at primary schools in Berlin at the end of the 1990th, Hans ... [more ▼]

Former German minister of the interior Otto Schily highlighted: “Anyone who closes music schools jeopardizes inner security.” In his large study at primary schools in Berlin at the end of the 1990th, Hans Günter Bastian found out that common music practice and extended music education can lead to more social competence. In my lecture, I will give three examples of how music making cannot only avoid violence and criminality, but can also contribute to well-being among like-minded people. 1) The movie The Choir (les choristes) is a perfect demonstration, how common singing is able to weld together an initial heterogenous group of difficult educable children living in institutions of care 2) El Sistema is a famous programme for children in Venezuela financed by the state with the main objective that “music has to be recognised as an agent of social development” as José Antonio Abreu, its initiator highlights. 3) In my last year’s lecture, I presented my mail choir with an age average beyond 70 years. Recently I published a study on interviews conducted with the choristers to find out their views of social well-being." [less ▲]

Detailed reference viewed: 10 (1 UL)
Full Text
Peer Reviewed
See detailFaster-than-Nyquist Spatiotemporal Symbol-level Precoding in the Downlink of Multiuser MISO Channels
Alodeh, Maha UL; Spano, Danilo UL; Chatzinotas, Symeon UL et al

in The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing (2017, March)

Detailed reference viewed: 40 (8 UL)
Full Text
Peer Reviewed
See detailImpact du mécanisme chaotique sur l’optimisation d’un modèle de mobilité pour un essaim de drones devant réaliser une couverture de zone
Rosalie, Martin UL; Danoy, Grégoire UL; Chaumette, Serge et al

in Falcon, Eric; Lefranc, Marc; Pétrélis, François (Eds.) et al Comptes-rendus de la 20e Rencontre du Non Linéaire (2017, March)

Solution of differential equations system can be chaotic attractors with various chaotic mechanisms. In this paper we highlight that the use of these chaotic mechanisms permits to enhance the ... [more ▼]

Solution of differential equations system can be chaotic attractors with various chaotic mechanisms. In this paper we highlight that the use of these chaotic mechanisms permits to enhance the diversification of metaheuristics. We applied our approach to the coverage problem using a swarm of UAVs where the diversification of an ant colony algorithm is enhanced by chaos coming from Ma system and Rössler system. [less ▲]

Detailed reference viewed: 29 (3 UL)
Full Text
Peer Reviewed
See detailIncremental Reconfiguration of Product Specific Use Case Models for Evolving Configuration Decisions
Hajri, Ines UL; Göknil, Arda UL; Briand, Lionel UL et al

in 23rd International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017) (2017, March)

[Context and motivation] Product Line Engineering (PLE) is increasingly common practice in industry to develop complex systems for multiple customers with varying needs. In many business contexts, use ... [more ▼]

[Context and motivation] Product Line Engineering (PLE) is increasingly common practice in industry to develop complex systems for multiple customers with varying needs. In many business contexts, use cases are central development artifacts for requirements engineering and system testing. In such contexts, use case configurators can play a significant role to capture variable and common requirements in Product Line (PL) use case models and to generate Product Specific (PS) use case models for each new customer in a product family. [Question/Problem] Although considerable research has been devoted to use case configurators, little attention has been paid to supporting the incremental reconfiguration of use case models with evolving configuration decisions. [Principal ideas/results] We propose, apply, and assess an incremental reconfiguration approach to support evolving configuration decisions in PL use case models. PS use case models are incrementally reconfigured by focusing only on the changed decisions and their side effects. In our prior work, we proposed and applied Product line Use case modeling Method (PUM) to support variability modeling in PL use case diagrams and specifications. We also developed a use case configurator, PUMConf, which interactively collects configuration decisions from analysts to generate PS use case models from PL models. Our approach is built on top of PUM and PUMConf. [Contributions] We provide fully automated tool support for incremental configuration as an extension of PUMConf. Our approach has been evaluated in an industrial case study in the automotive domain, which provided evidence it is practical and beneficial. [less ▲]

Detailed reference viewed: 139 (59 UL)
Full Text
Peer Reviewed
See detailLightweight Detection of Android-specific Code Smells: the aDoctor Project
Palomba, Fabio; Di Nucci, Dario; Panichella, Annibale UL et al

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, February 21)

Code smells are symptoms of poor design solutions applied by programmers during the development of software systems. While the research community devoted a lot of effort to studying and devising ... [more ▼]

Code smells are symptoms of poor design solutions applied by programmers during the development of software systems. While the research community devoted a lot of effort to studying and devising approaches for detecting the traditional code smells defined by Fowler, little knowledge and support is available for an emerging category of Mobile app code smells. Recently, Reimann etal proposed a new catalogue of Android-specific code smells that may be a threat for the maintainability and the efficiency of Android applications. However, current tools working in the context of Mobile apps provide limited support and, more importantly, are not available for developers interested in monitoring the quality of their apps. To overcome these limitations, we propose a fully automated tool, coined aDoctor, able to identify 15 Android-specific code smells from the catalogue by Reimann et al. An empirical study conducted on the source code of 18 Android applications reveals that the proposed tool reaches, on average, 98% of precision and 98% of recall. We made aDoctor publicly available. [less ▲]

Detailed reference viewed: 55 (18 UL)
Full Text
Peer Reviewed
See detailSoftware-Based Energy Profiling of Android Apps: Simple, Efficient and Reliable?
Di Nucci, Dario; Palomba, Fabio; Prota, Antonio et al

in Proceedings of the 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017) (2017, February 21)

Modeling the power profile of mobile applications is a crucial activity to identify the causes behind energy leaks. To this aim, researchers have proposed hardware-based tools as well as model-based and ... [more ▼]

Modeling the power profile of mobile applications is a crucial activity to identify the causes behind energy leaks. To this aim, researchers have proposed hardware-based tools as well as model-based and software-based techniques to approximate the actual energy profile. However, all these solutions present their own advantages and disadvantages. Hardware-based tools are highly precise, but at the same time their use is bound to the acquisition of costly hardware components. Model-based tools require the calibration of parameters needed to correctly create a model on a specific hardware device. Software-based approaches do not need any hardware components, but they rely on battery measurements and, thus, they are hardware-assisted. These tools are cheaper and easier to use than hardware-based tools, but they are believed to be less precise. In this paper, we take a deeper look at the pros and cons of software-based solutions investigating to what extent their measurements depart from hardware-based solutions. To this aim, we propose a software-based tool named PETRA that we compare with the hardware-based MONSOON toolkit on 54 Android apps. The results show that PETRA performs similarly to MONSOON despite not using any sophisticated hardware components. In fact, in all the apps the mean relative error with respect to MONSOON is lower than 0.05. Moreover, for 95% of the analyzed methods the estimation error is within 5% of the actual values measured using the hardware-based toolkit. [less ▲]

Detailed reference viewed: 64 (23 UL)
Full Text
Peer Reviewed
See detailIntegration of sparse electrophysiological measurements with preoperative MRI using 3D surface estimation in deep brain stimulation surgery
Husch, Andreas Dominik UL; Gemmar, Peter; Thunberg, Johan UL et al

in Webster, Robert; Fei, Baowei (Eds.) Medical Imaging 2017: Image-Guided Procedures, Robotic Interventions, and Modeling (2017, February 14)

Intraoperative microelectrode recordings (MER) have been used for several decades to guide neurosurgeons during the implantation of Deep Brain Stimulation (DBS) electrodes, especially when targeting the ... [more ▼]

Intraoperative microelectrode recordings (MER) have been used for several decades to guide neurosurgeons during the implantation of Deep Brain Stimulation (DBS) electrodes, especially when targeting the subthalamic nucleus (STN) to suppress the symptoms of Parkinson’s Disease. The standard approach is to use an array of up to five MER electrodes in a fixed configuration. Interpretation of the recorded signals yields a spatiallyvery sparse set of information about the morphology of the respective brain structures in the targeted area. However, no aid is currently available for surgeons to intraoperatively integrate this information with other data available on the patient’s individual morphology (e.g. MR imaging data used for surgical planning). This integration might allow surgeons to better determine the most probable position of the electrodes within the target structure during surgery. This paper suggests a method for reconstructing a surface patch from the sparse MER dataset utilizing additional a-priori knowledge about the geometrical configuration of the measurement electrodes. The conventional representation of MER measurements as intervals of target region/non-target region is therefore transformed into an equivalent boundary set representation, allowing efficient point-based calculations. Subsequently, the problem is to integrate the resulting patch with a preoperative model of the target structure, which can be formulated as registration problem minimizing a distance measure between the two surfaces. When restricting this registration procedure to translations, which is reasonable given certain geometric considerations, the problem can be solved globally by employing an exhaustive search with arbitrary precision in polynomial time. The proposed method is demonstrated using bilateral STN/Substantia Nigra segmentation data from preoperative MRIs of 17 Patients with simulated MER electrode placement. When using simulated data of heavily perturbed electrodes and subsequent MER measuremen [less ▲]

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailModel predictive control for cooperative control of space robots
Kannan, Somasundar UL; Sajadi Alamdari, Seyed Amin UL; Dentler, Jan Eric UL et al

in Model predictive control for cooperative control of space robots (2017, January)

The problem of Orbital Manipulation of Passive body is discussed here. Two scenarios including passive object rigidly attached to robotic servicers and passive body attached to servicers through ... [more ▼]

The problem of Orbital Manipulation of Passive body is discussed here. Two scenarios including passive object rigidly attached to robotic servicers and passive body attached to servicers through manipulators are discussed. The Model Predictive Control (MPC) technique is briefly presented and successfully tested through simulations on two cases of position control of passive body in the orbit. [less ▲]

Detailed reference viewed: 69 (10 UL)
Full Text
Peer Reviewed
See detailA Simple and Correct Even-Odd Algorithm for the Point-in-Polygon Problem for Complex Polygons
Galetzka, Michael; Glauner, Patrick UL

in Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017), Volume 1: GRAPP (2017)

Determining if a point is in a polygon or not is used by a lot of applications in computer graphics, computer games and geoinformatics. Implementing this check is error-prone since there are many special ... [more ▼]

Determining if a point is in a polygon or not is used by a lot of applications in computer graphics, computer games and geoinformatics. Implementing this check is error-prone since there are many special cases to be considered. This holds true in particular for complex polygons whose edges intersect each other creating holes. In this paper we present a simple even-odd algorithm to solve this problem for complex polygons in linear time and prove its correctness for all possible points and polygons. We furthermore provide examples and implementation notes for this algorithm. [less ▲]

Detailed reference viewed: 67 (10 UL)
Full Text
Peer Reviewed
See detailEnhanced Trajectory-based Action Recognition using Human Pose
Papadopoulos, Konstantinos UL; Goncalves Almeida Antunes, Michel UL; Aouada, Djamila UL et al

in IEEE International Conference on Image Processing, Beijing 17-20 Spetember 2017 (2017)

Action recognition using dense trajectories is a popular concept. However, many spatio-temporal characteristics of the trajectories are lost in the final video representation when using a single Bag-of ... [more ▼]

Action recognition using dense trajectories is a popular concept. However, many spatio-temporal characteristics of the trajectories are lost in the final video representation when using a single Bag-of-Words model. Also, there is a significant amount of extracted trajectory features that are actually irrelevant to the activity being analyzed, which can considerably degrade the recognition performance. In this paper, we propose a human-tailored trajectory extraction scheme, in which trajectories are clustered using information from the human pose. Two configurations are considered; first, when exact skeleton joint positions are provided, and second, when only an estimate thereof is available. In both cases, the proposed method is further strengthened by using the concept of local Bag-of-Words, where a specific codebook is generated for each skeleton joint group. This has the advantage of adding spatial human pose awareness in the video representation, effectively increasing its discriminative power. We experimentally compare the proposed method with the standard dense trajectories approach on two challenging datasets. [less ▲]

Detailed reference viewed: 38 (19 UL)
Full Text
Peer Reviewed
See detailDeepCity: A Feature Learning Framework for Mining Location Check-Ins
Pang, Jun UL; Zhang, Yang

in Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17) (2017)

Detailed reference viewed: 21 (0 UL)
Full Text
Peer Reviewed
See detailHigh-Precision Gestural Input for Immersive Large-Scale Distributed Virtual Environments
Botev, Jean UL; Rothkugel, Steffen UL

in Proceedings of the 8th ACM Multimedia Systems Conference (MMSys) (2017)

Detailed reference viewed: 21 (5 UL)
Full Text
Peer Reviewed
See detailPOSTER: Detection of Information Leaks via Reflection in Android Apps
Gajrani, Jyoti; Li, Li UL; Laxmi, Vijay et al

in The 2017 ACM on Asia Conference on Computer and Communications Security (AsiaCCS 2017) (2017)

Reflection is a language feature which allows to analyze and transform the behavior of classes at the runtime. Reflection is used for software debugging and testing. Malware authors can leverage ... [more ▼]

Reflection is a language feature which allows to analyze and transform the behavior of classes at the runtime. Reflection is used for software debugging and testing. Malware authors can leverage reflection to subvert the malware detection by static analyzers. Reflection initializes the class, invokes any method of class, or accesses any field of class. But, instead of utilizing usual programming language syntax, reflection passes classes/methods etc. as parameters to reflective APIs. As a consequence, these parameters can be constructed dynamically or can be encrypted by malware. These cannot be detected by state-of-the-art static tools. We propose EspyDroid, a system that combines dynamic analysis with code instrumentation for a more precise and automated detection of malware employing reflection. We evaluate EspyDroid on 28 benchmark apps employing major reflection categories. Our technique show improved results over FlowDroid via detection of additional undetected flows. These flows have potential to leak sensitive and private information of the users, through various sinks. [less ▲]

Detailed reference viewed: 19 (1 UL)
Full Text
Peer Reviewed
See detailPrivate API Access and Functional Mocking in Automated Unit Test Generation
Arcuri, Andrea UL; Fraser, Gordon; Just, Rene

in IEEE International Conference on Software Testing, Verification and Validation (ICST) (2017)

Not all object oriented code is easily testable: Dependency objects might be difficult or even impossible to instantiate, and object-oriented encapsulation makes testing potentially simple code difficult ... [more ▼]

Not all object oriented code is easily testable: Dependency objects might be difficult or even impossible to instantiate, and object-oriented encapsulation makes testing potentially simple code difficult if it cannot easily be accessed. When this happens, then developers can resort to mock objects that simulate the complex dependencies, or circumvent objectoriented encapsulation and access private APIs directly through the use of, for example, Java reflection. Can automated unit test generation benefit from these techniques as well? In this paper we investigate this question by extending the EvoSuite unit test generation tool with the ability to directly access private APIs and to create mock objects using the popular Mockito framework. However, care needs to be taken that this does not impact the usefulness of the generated tests: For example, a test accessing a private field could later fail if that field is renamed, even if that renaming is part of a semantics-preserving refactoring. Such a failure would not be revealing a true regression bug, but is a false positive, which wastes the developer’s time for investigating and fixing the test. Our experiments on the SF110 and Defects4J benchmarks confirm the anticipated improvements in terms of code coverage and bug finding, but also confirm the existence of false positives. However, by ensuring the test generator only uses mocking and reflection if there is no other way to reach some part of the code, their number remains small. [less ▲]

Detailed reference viewed: 41 (5 UL)
Full Text
Peer Reviewed
See detailEVOSUITE at the SBST 2017 Tool Competition
Fraser, Gordon; Rojas, José Miguel; Campos, José et al

in IEEE/ACM International Workshop on Search-Based Software Testing (SBST) (2017)

EVOSUITE is a search-based tool that automatically generates unit tests for Java code. This paper summarises the results and experiences of EVOSUITE’s participation at the fifth unit testing competition ... [more ▼]

EVOSUITE is a search-based tool that automatically generates unit tests for Java code. This paper summarises the results and experiences of EVOSUITE’s participation at the fifth unit testing competition at SBST 2017, where EVOSUITE achieved the highest overall score. [less ▲]

Detailed reference viewed: 18 (5 UL)
Full Text
Peer Reviewed
See detailEnergy Optimization for Full-Duplex Self-Backhauled HetNet with Non-Orthogonal Multiple Access
Lei, Lei UL; Lagunas, Eva UL; Maleki, Sina UL et al

in International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, July 2017 (2017)

Detailed reference viewed: 22 (3 UL)