References of "Paper published in a book"
     in
Bookmark and Share    
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 91 (11 UL)
See detailThe legacy of coal mining – a view on examples in Belgium and France
Helfer, Malte UL

in Deutsches Bergbau-Museum Bochum (Ed.) Boom – Crisis – Heritage. King Coal and Energy Revolutions after 1945; proceedings of the international conference March 14th-16th 2018, Technische Hochschule Georg Agricola, Bochum (in press)

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s ... [more ▼]

Following the end of coalmining in Belgium (1992) and France (2004), the year 2018 marks the end of hard coal mining in Germany as well. This contribution looks at the legacy of coalmining of Germany’s French-speaking neighbours and presents the most important remaining coal mining heritage sites as well as some extraordinary converted sites in France and the Belgian province Wallonia. [less ▲]

Detailed reference viewed: 58 (0 UL)
Full Text
Peer Reviewed
See detailA Multilayer Low-Altitude Airspace Model for UAV Traffic Management
Samir Labib, Nader UL; Danoy, Grégoire UL; Musial, Jedrzej et al

in Samir Labib, Nader; Danoy, Grégoire; Musial, Jedrzej (Eds.) et al 9th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (DIVANet '19) (in press)

Over the recent years, Unmanned Aerial Vehicles' (UAVs) technology developed rapidly. In turn shedding light on a wide range of potential civil and commercial applications ranging from mapping and ... [more ▼]

Over the recent years, Unmanned Aerial Vehicles' (UAVs) technology developed rapidly. In turn shedding light on a wide range of potential civil and commercial applications ranging from mapping and surveillance, parcel delivery to more demanding ones that require UAVs to operate in heterogeneous swarms. However, with the great advantages UAVs bring, they are expected to soon dominate the shared, low-altitude airspace over populated cities, introducing multiple new research challenges in safely managing the unprecedented traffic demands. The main contribution of this work is addressing the complex problem of UAV traffic management at an abstract level by proposing a structure for the uncontrolled low-altitude airspace. The paper proposes a model of the airspace as a weighted multilayer network of nodes and airways and presents a set of experimental simulations of UAV traffic for the verification and validation of the model. Finally, the paper outlines our intended future work. [less ▲]

Detailed reference viewed: 67 (16 UL)
Full Text
See detailUpdate Internationales und Europäisches Steuerrecht
Sinnig, Julia UL

in Taeger, Jürgen (Ed.) Tagungsband Herbstakademie 2019 (in press)

Im Juni 2019 stellte die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) das Arbeitsprogramm zur weiteren Ausarbeitung einer Anpassung des internationalen Ertragsteuerrechts an die ... [more ▼]

Im Juni 2019 stellte die Organisation für wirtschaftliche Zusammenarbeit und Entwicklung (OECD) das Arbeitsprogramm zur weiteren Ausarbeitung einer Anpassung des internationalen Ertragsteuerrechts an die neue wirtschaftliche Realität der digitalisierten Welt vor. Auf Ebene der Europäischen Union (EU) gilt die Verabschiedung der im März 2018 von der Europäischen Kommission vorgestellten Richtlinien-Vorschläge (RL-Vorschläge) zu einer Digitalsteuer und einer sog. signifikanten digitalen Präsenz, nach intensiver Diskussion im Rat, als unwahrscheinlich. Der Gerichtshof der Europäischen Union beschäftigt sich derzeit mit der unionsrechtlichen Vereinbarkeit nationaler Sonderabgaben, die umsatzbasiert erhoben werden. Dieser Beitrag bietet einen Überblick über wesentliche Entwicklungen im internationalen und europäischen Steuerrecht bzgl. der Besteuerung digitalisierter Unternehmen. Der Beitrag knüpft an den Vortrag von Prof. Dr. Jens M. Schmittmann und der Verfasserin anlässlich der Herbstakademie 2018 in Bochum, sowie dem Vortrag der Verfasserin anlässlich der Herbstakademie 2017 in Heidelberg an. [less ▲]

Detailed reference viewed: 66 (2 UL)
Full Text
Peer Reviewed
See detailExternalisation de la politique migratoire et identité de l'Union européenne
Neframi, Eleftheria UL; Gatti, Mauro UL

in Benlolo, Myriam (Ed.) L'Union européenne et les migrations (in press)

Detailed reference viewed: 94 (5 UL)
Full Text
Peer Reviewed
See detailFeasibility of Stellar as a Blockchain-based Micropayment System
Khan, Nida UL; Ahmad, Tabrez; State, Radu UL

in Springer SmartBlock 2019 - 2nd International Conference on Smart Blockchain (in press)

The advent of Bitcoin was heralded as an innovation in the global monetary system, that could bring down transaction fees by circumventing the need for third parties and conduct transactions in real time ... [more ▼]

The advent of Bitcoin was heralded as an innovation in the global monetary system, that could bring down transaction fees by circumventing the need for third parties and conduct transactions in real time. The divisibility of a blockchain cryptocurrency to even fractions of a cent, caused microtransactions to become feasible to formerly non-existent denominations. These microtransactions have spurred the development of novel ways of monetizing online resources and hold the potential to aid in alleviation of poverty. The paper conducts a feasibility study on Stellar as a blockchain-based micropayment system. It highlights the computational and other issues that impedes its progress and utilizes a characterization model for micropayment systems to evaluate the efficacy of the Stellar platform. The paper conducts a comparison with the micropayment solutions from Bitcoin, Ethereum and PayPal. The paper analyzes a subset of transactions from the Stellar blockchain to aid in drawing a conclusion on the undertaken study and elaborates on the mitigation tools to enable fraud prevention in online monetary transactions. [less ▲]

Detailed reference viewed: 79 (12 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 54 (1 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 242 (24 UL)
Full Text
Peer Reviewed
See detailCoercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme
Roenne, Peter UL; Atashpendar, Arash UL; Kristian, Gjøsteen et al

in Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC (in press)

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE ... [more ▼]

We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the path towards making JCJ quantum-resistant, while leaving the underlying structure of JCJ intact. The pairwise comparison-based approach of JCJ using plaintext equivalence tests leads to a quadratic blow-up in the number of votes, which makes the tallying process rather impractical in realistic settings with a large number of voters. We show how the removal of invalid votes can be done in linear time via a solution based on recent advances in various FHE primitives such as hashing, zero-knowledge proofs of correct decryption, verifiable shuffles and threshold FHE. We conclude by touching upon some of the advantages and challenges of such an approach, followed by a discussion of further security and post-quantum considerations. [less ▲]

Detailed reference viewed: 240 (66 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 79 (12 UL)
Full Text
Peer Reviewed
See detailQuantifying information flow in interactive systems
Mestel, David UL

in 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) (in press)

We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is ... [more ▼]

We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is deterministic then the information flow is either logarithmic or linear, and there is a polynomial-time algorithm to distinguish the two cases and compute the rate of logarithmic flow. To achieve this we first extend the theory of information leakage through channels to the case of interactive systems, and establish a number of results which greatly simplify computation. We then show that for deterministic systems the information flow corresponds to the growth rate of antichains inside a certain regular language, a property called the width of the language. In a companion work we have shown that there is a dichotomy between polynomial and exponential antichain growth, and a polynomial time algorithm to distinguish the two cases and to compute the order of polynomial growth. We observe that these two cases correspond to logarithmic and linear information flow respectively. Finally, we formulate several attractive open problems, covering the cases of probabilistic systems, systems with more than two users and nondeterministic systems where the nondeterminism is assumed to be innocent rather than demonic. [less ▲]

Detailed reference viewed: 62 (5 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 141 (6 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 86 (0 UL)
Full Text
Peer Reviewed
See detailCase Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in 3rd Central European Cybersecurity Conference (in press)

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples ... [more ▼]

Malware is one of the most popular cyber-attack methods in the digital world. According to the independent test company AV-TEST, 350,000 new malware samples are created every day. To analyze all samples by hand to discover whether they are malware does not scale, so antivirus companies automate the process e.g., using sand- boxes where samples can be run, observed, and classified. Malware authors are aware of this fact, and try to evade detection. In this paper we describe one of such evasion technique: unprecedented, we discovered it while analyzing a ransomware sample. Analyzed in a Cuckoo Sandbox, the sample was able to avoid triggering malware indicators, thus scoring significantly below the minimum severity level. Here, we discuss what strategy the sample follows to evade the analysis, proposing practical defense methods to nullify, in our turn, the sample’s furtive strategy. [less ▲]

Detailed reference viewed: 40 (2 UL)
Full Text
See detailDatenbank für Zweisprachige Historische Luxemburgische Bekanntmachungen
Gilles, Peter UL; Ziegler, Evelyn

in Wallmeier, Nadine; Tophinke, Doris (Eds.) Historische Stadtsprachenforschung (in press)

Detailed reference viewed: 67 (1 UL)
Full Text
Peer Reviewed
See detailWidths of regular and context-free languages
Mestel, David UL

in 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2019) (in press)

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 190 (6 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 357 (7 UL)
Full Text
Peer Reviewed
See detailThe Impact of Human Mobility on Edge Data Center Deployment in Urban Environments
Vitello, Piergiorgio UL; Capponi, Andrea UL; Fiandrino, Claudio UL et al

in IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019 (2019, December)

Multi-access Edge Computing (MEC) brings storage and computational capabilities at the edge of the network into so-called Edge Data Centers (EDCs) to better low-latency applications. To this end ... [more ▼]

Multi-access Edge Computing (MEC) brings storage and computational capabilities at the edge of the network into so-called Edge Data Centers (EDCs) to better low-latency applications. To this end, effective placement of EDCs in urban environments is key for proper load balance and to minimize outages. In this paper, we specifically tackle this problem. To fully understand how the computational demand of EDCs varies, it is fundamental to analyze the complex dynamics of cities. Our work takes into account the mobility of citizens and their spatial patterns to estimate the optimal placement of MEC EDCs in urban environments in order to minimize outages. To this end, we propose and compare two heuristics. In particular, we present the mobility-aware deployment algorithm (MDA) that outperforms approaches that do not consider citizens mobility. Simulations are conducted in Luxembourg City by extending the CrowdSenSim simulator and show that efficient EDCs placement significantly reduces outages. [less ▲]

Detailed reference viewed: 60 (7 UL)
Full Text
Peer Reviewed
See detailA Personalized Sentiment Model with Textual and Contextual Information
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in The SIGNLL Conference on Computational Natural Language Learning, Hong Kong 3-4 November 2019 (2019, November)

In this paper, we look beyond the traditional population-level sentiment modeling and consider the individuality in a person's expressions by discovering both textual and contextual information. In ... [more ▼]

In this paper, we look beyond the traditional population-level sentiment modeling and consider the individuality in a person's expressions by discovering both textual and contextual information. In particular, we construct a hierarchical neural network that leverages valuable information from a person's past expressions, and offer a better understanding of the sentiment from the expresser's perspective. Additionally, we investigate how a person's sentiment changes over time so that recent incidents or opinions may have more effect on the person's current sentiment than the old ones. Psychological studies have also shown that individual variation exists in how easily people change their sentiments. In order to model such traits, we develop a modified attention mechanism with Hawkes process applied on top of a recurrent network for a user-specific design. Implemented with automatically labeled Twitter data, the proposed model has shown positive results employing different input formulations for representing the concerned information. [less ▲]

Detailed reference viewed: 183 (3 UL)
Full Text
Peer Reviewed
See detailEnhanced Sketchnoting through Semantic Integration of Learning Material
Atashpendar, Aryobarzan UL; Grevisse, Christian UL; Rothkugel, Steffen UL

in Applied Informatics (2019, November)

Within the transition from pen-and-paper to digital solutions, many tablet-based note-taking apps have been developed. In addition, sketchnoting, a highly visual form of note-taking, has gained in ... [more ▼]

Within the transition from pen-and-paper to digital solutions, many tablet-based note-taking apps have been developed. In addition, sketchnoting, a highly visual form of note-taking, has gained in popularity, especially in teaching and learning. While current solutions already reduce the burden of organizing and searching through stacks of paper, they provide little support in finding additional information related to the notes, and search capabilities are mostly limited to textual queries and content. In this paper, we present a novel solution for digital sketchnoting aimed at enhancing the learning experience of students. In addition to common capabilities such as handwriting recognition, our note-taking app integrates semantic annotation and drawing recognition. Handwritten notes are recognized and passed through concept recognition and entity linking tools to enable a knowledge graph-based integration of contextually relevant learning resources. We extend traditional search capabilities by including the semantic metadata from the related material as well as enabling visual queries to find recognized sketches. Finally, resembling the exchange of paper notes among students, our app allows to share the semantically enhanced notes with other devices. [less ▲]

Detailed reference viewed: 82 (18 UL)
Full Text
Peer Reviewed
See detailVPGA: an SDN-based Location Privacy Zones Placement Scheme for Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 38th IEEE International Performance Computing and Communications Conference (IPCCC) (2019, October 29)

Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track ... [more ▼]

Making personal data anonymous is crucial to ensure the adoption of connected vehicles. One of the privacy-sensitive information is location, which once revealed can be used by adversaries to track drivers during their journey. Vehicular Location Privacy Zones (VLPZs) is a promising approach to ensure unlinkability. These logical zones can be easily deployed over roadside infrastructures (RIs) such as gas station or electric charging stations. However, the placement optimization problem of VLPZs is NP-hard and thus an efficient allocation of VLPZs to these RIs is needed to avoid their overload and the degradation of the QoS provided within theses RIs. This work considers the optimal placement of the VLPZs and proposes a genetic-based algorithm in a software defined vehicular network to ensure minimized trajectory cost of involved vehicles and hence less consumption of their pseudonyms. The analytical evaluation shows that the proposed approach is cost-efficient and ensures a shorter response time. [less ▲]

Detailed reference viewed: 76 (12 UL)
Full Text
Peer Reviewed
See detailSoftwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection
Rinaldi, Giulia UL; Adamsky, Florian UL; Soua, Ridha UL et al

in 10th International Conference on Networks of the Future (NoF) (2019, October 04)

The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to ... [more ▼]

The increasing connectivity of restricted areas suchas Critical Infrastructures (CIs) raises major security concernsfor Supervisory Control And Data Acquisition (SCADA) systems,which are deployed to monitor their operation. Given the impor-tance of an early anomaly detection, Intrusion Detection Systems(IDSs) are introduced in SCADA systems to detect malicious ac-tivities as early as possible. Agents or probes form the cornerstoneof any IDS by capturing network packets and extracting relevantinformation. However, IDSs are facing unprecedented challengesdue to the escalation in the number, scale and diversity of attacks.Software-Defined Network (SDN) then comes into play and canprovide the required flexibility and scalability. Building on that,we introduce Traffic Agent Controllers (TACs) that monitor SDN-enabled switches via OpenFlow. By using lightweight statisticalmetrics such as Kullback-Leibler Divergence (KLD), we are ableto detect the slightest anomalies, such as stealth port scans, evenin the presence of background traffic. The obtained metrics canalso be used to locate the anomalies with precision over 90%inside a hierarchical network topology. [less ▲]

Detailed reference viewed: 82 (13 UL)
Full Text
Peer Reviewed
See detailSDN-based Pseudonym-Changing Strategy for Privacy Preservation in Vehicular Networks
Boualouache, Abdelwahab UL; Soua, Ridha UL; Engel, Thomas UL

in 15th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob'19) (2019, October)

The pseudonym-changing approach is the de-factolocation privacy solution proposed by security standards toensure that drivers are not tracked during their journey. SeveralPseudonym Changing Strategies ... [more ▼]

The pseudonym-changing approach is the de-factolocation privacy solution proposed by security standards toensure that drivers are not tracked during their journey. SeveralPseudonym Changing Strategies (PCSs) have been proposed tosynchronize Pseudonym Changing Processes (PCPs) between con-nected vehicles. However, most of the existing strategies are static,rigid and do not adapt to the vehicles’ context. In this paper, weexploit the Software Defined Network (SDN) paradigm to proposea context-aware pseudonym changing strategy (SDN-PCS) whereSDN controllers orchestrate the dynamic update of the securityparameters of the PCS. Simulation results demonstrate that SDN-PCS strategy outperforms typical static PCSs to perform efficientPCPs and protect the location privacy of vehicular network users [less ▲]

Detailed reference viewed: 94 (15 UL)
Full Text
Peer Reviewed
See detailUser Experience Design for E-Voting: How mental models align with security mechanisms
Zollinger, Marie-Laure UL; Distler, Verena UL; Roenne, Peter UL et al

in Electronic Voting (2019, October)

This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design ... [more ▼]

This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with 38 participants, and user experience data was collected via questionnaires and semi-structured interviews on user experience and perceived security. Results concerning the impact of displaying security mechanisms on UX were presented in a complementary paper. Here we expand on this analysis by studying the mental models revealed during the interviews and compare them with theoretical security notions. Finally, we propose a list of improvements for designs of future voting protocols. [less ▲]

Detailed reference viewed: 76 (5 UL)
Full Text
Peer Reviewed
See detailSimultaneous State and False-Data Injection Attacks Reconstruction for NonLinear Systems: an LPV Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Automation, Control and Robots (2019, October)

The present contribution addresses simultaneous state and actuator/sensor false-data injection attacks reconstruction for nonlinear systems. The considered actuator/sensor attacks are modeled as time ... [more ▼]

The present contribution addresses simultaneous state and actuator/sensor false-data injection attacks reconstruction for nonlinear systems. The considered actuator/sensor attacks are modeled as time-varying parameters with a multiplicative effect on the actuator input signal and the sensor output signal, respectively. Based on the sector non-linearity approach and the convex polytopic transformation, the nonlinear model is written in a Linear Parameter-Varying (LPV) form, then an observer allowing both state and attack reconstruction is designed by solving an LMI optimization problem. [less ▲]

Detailed reference viewed: 33 (0 UL)
Full Text
Peer Reviewed
See detailOn the Event-based Attack-tolerant Control: A Polytopic Representation
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Automation, Control and Robots (2019, October)

In the present contribution, we present a new event-based control representation. Based on the polytopic approach, more specifically the sector nonlinear transformation, an event-based attack-tolerant ... [more ▼]

In the present contribution, we present a new event-based control representation. Based on the polytopic approach, more specifically the sector nonlinear transformation, an event-based attack-tolerant control, and scheduling co-design strategy are proposed. From the event triggering definition (sample-and-hold strategy), polytopic writing of the event-triggered feedback control is first presented and then incorporated into the system dynamics for analysis. Our goal is to present a unique model that is able to deal with the co-design problem simultaneously and that can be handled by classical control synthesis tools. The novel representation, including data deception and attack tolerant control is formulated as a BMI optimization problem ensuring both stability and some level performance requirements (L2 attenuation of the cyber-attack). [less ▲]

Detailed reference viewed: 30 (0 UL)
Full Text
Peer Reviewed
See detailNoCry: No More Secure Encryption Keys for Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

in 2nd International Workshop on Emerging Technologies for Authorization and Authentication (2019, September 27)

Since the appearance of ransomware in the cyber crime scene, researchers and anti-malware companies have been offering solutions to mitigate the threat. Anti-malware solutions differ on the specific ... [more ▼]

Since the appearance of ransomware in the cyber crime scene, researchers and anti-malware companies have been offering solutions to mitigate the threat. Anti-malware solutions differ on the specific strategy they implement, and all have pros and cons. However, three requirements concern them all: their implementation must be secure, be effective, and be efficient. Recently, Genç et al. proposed to stop a specific class of ransomware, the cryptographically strong one, by blocking unauthorized calls to cryptographically secure pseudo-random number generators, which are required to build strong encryption keys. Here, in adherence to the requirements, we discuss an implementation of that solution that is more secure (with components that are not vulnerable to known attacks), more effective (with less false negatives in the class of ransomware addressed) and more efficient (with minimal false positive rate and negligible overhead) than the original, bringing its security and technological readiness to a higher level. [less ▲]

Detailed reference viewed: 51 (2 UL)
Full Text
See detailEvaluation von bauphysikalischen Vormessungen im Rahmen von komplexen Innendämmprojekten
Latz, Sebastian Joachim UL; Thewes, Andreas; Scholzen, Frank UL et al

in Vogel, Albert (Ed.) Bauphysiktage 2019 in Weimar - Bauphysik in Forschung und Praxis (2019, September 25)

The installation of internal insulation systems within the scope of refurbishment changes the hygrothermal behaviour of the existing masonry of a building in the long term. The internal insulation layer ... [more ▼]

The installation of internal insulation systems within the scope of refurbishment changes the hygrothermal behaviour of the existing masonry of a building in the long term. The internal insulation layer reduces the temperature of the masonry during the heating period and considerably reduces the drying potential. If the moisture content is too high due to the absorption of driving rain from the outside and moisture from the interior climate, the masonry may be permanently damaged and mould may form. The proof of function can be achieved by hygrothermal simulations. These simulations require the input of sensitive boundary conditions and different material parameters. In order to obtain precise simulation results, these input values should be validated by building physics measurements. In order to be able to better assess the simulation parameters, various physical measurements for the preparation of a field test for interior insulation systems in a conference room were carried out on behalf of the administration of the bâtiments publics at the University of Luxembourg as part of the research project "Possibilities and limitations of interior insulation in the renovation of public buildings in Luxembourg". [less ▲]

Detailed reference viewed: 61 (6 UL)
Full Text
Peer Reviewed
See detailBODYFITR: Robust Automatic 3D Human Body Fitting
Saint, Alexandre Fabian A UL; Shabayek, Abd El Rahman UL; Cherenkova, Kseniya UL et al

in Proceedings of the 2019 IEEE International Conference on Image Processing (ICIP) (2019, September 22)

This paper proposes BODYFITR, a fully automatic method to fit a human body model to static 3D scans with complex poses. Automatic and reliable 3D human body fitting is necessary for many applications ... [more ▼]

This paper proposes BODYFITR, a fully automatic method to fit a human body model to static 3D scans with complex poses. Automatic and reliable 3D human body fitting is necessary for many applications related to healthcare, digital ergonomics, avatar creation and security, especially in industrial contexts for large-scale product design. Existing works either make prior assumptions on the pose, require manual annotation of the data or have difficulty handling complex poses. This work addresses these limitations by providing a novel automatic fitting pipeline with carefully integrated building blocks designed for a systematic and robust approach. It is validated on the 3DBodyTex dataset, with hundreds of high-quality 3D body scans, and shown to outperform prior works in static body pose and shape estimation, qualitatively and quantitatively. The method is also applied to the creation of realistic 3D avatars from the high-quality texture scans of 3DBodyTex, further demonstrating its capabilities. [less ▲]

Detailed reference viewed: 57 (7 UL)
Full Text
Peer Reviewed
See detailImpact of reinforcement to moment resistance of composite slabs
Zhang, Qingjie UL; Schäfer, Markus UL; Kurz, Wolfgang

in The 2019 World Congress on Advances in Structural Engineering and Mechanics (ASEM19) (2019, September 17)

Composite slabs lead to slim and economic structural solutions with a low selfweight. The determination of their moment resistance follows the regulations presented in EN 1994-1-1 (2004) which are based ... [more ▼]

Composite slabs lead to slim and economic structural solutions with a low selfweight. The determination of their moment resistance follows the regulations presented in EN 1994-1-1 (2004) which are based on plastic design methods. The current version of Eurocode 4 does not consider explicitly additional reinforcement in the ribs for sagging moment resistance. However, the construction industry requires this possibility in order to provide economical and flexible design. Regarding this situation, further investigations are necessary to prove the applicability of plastic design methods. In the case of high bottom reinforcement ratio, a deep position of the plastic neutral axis occurs, and concrete compression failure may happen before most parts of the profiled steel sheeting and reinforcement yield. This leads to an overestimation of the bending resistance according to the plastic design method. A parametric study, based on approximately 290.000 different combinations of various cross-section geometries and materials, is provided to compare the plastic moment resistance with the resistance determined by strain-limited design. The results show that limitations are necessary to be enabled for the general application of plastic design methods. [less ▲]

Detailed reference viewed: 27 (1 UL)
Full Text
Peer Reviewed
See detailUnravelling the border-facade of France : a multi-level modelling of cross-border commuting
Pigeron-Piroth, Isabelle UL; Caruso, Geoffrey UL; Le Texier, Marion

in Caruso, Geoffrey; Gerber, Philippe; Jones, Catherine (Eds.) et al 21st European Colloquium on Theoretical and Quantitative Geography (ECTQG), Book of Abstracts, Mondorf-las-Bains, 5-9 septembre 2019 (2019, September 09)

Given its central position in Western Europe, France is the European country where cross-border commuting is most intense. Over 350000 residents cross the national border everyday to go to work. Cross ... [more ▼]

Given its central position in Western Europe, France is the European country where cross-border commuting is most intense. Over 350000 residents cross the national border everyday to go to work. Cross-border commuting raises a lot of concerns for planners on both side of each border, especially for provisioning transport infrastructure and local public services but also because it impacts land and housing markets, especially when salary differentials are high. While there is a lot of research about the daily functioning of specific borders (e.g. France-Switzerland or France-Luxembourg), generalization is lacking and spatial heterogeneities impede our understanding of the very determinants of cross-border commuting, such as the role of benefits differentials, transport costs and distance, or the relative availability of jobs at residential places and across the border. Further, these effects are most likely mediated differently by the socio-demographic characteristics of workers, their employment sector, and the quality of their residential environment at large. This suggests that an individual approach and a spatially detailed approach is needed, which contrasts sharply with the fact that most European-wide studies of cross-border commuting are conducted at very aggregated spatial scales (NUTS 2 or 3). [less ▲]

Detailed reference viewed: 39 (4 UL)
Full Text
Peer Reviewed
See detail“It felt wrong to me to play that way” Understanding moral decision-making in video games through focus group discussions
Holl, Elisabeth UL; Bernard, Steve; Melzer, André UL

in Nebel, Steve; Pietschmann, Daniel; Schneider, Sascha (Eds.) et al Proceedings of the Media Psychology Division (2019, September 05)

Detailed reference viewed: 34 (3 UL)
Full Text
Peer Reviewed
See detailOn the Use of Vertex-Frequency Analysis for Anomaly Detection in Graph Signals
Lewenfus, Gabriela; Alves Martins, Wallace UL; Chatzinotas, Symeon UL et al

in Anais do XXXVII Simpósio Brasileiro de Telecomunicações e Processamento de Sinais (SBrT 2019) (2019, September)

Detailed reference viewed: 51 (4 UL)
Full Text
Peer Reviewed
See detailIntersymbol and Intercarrier Interference in OFDM Transmissions Through Highly Dispersive Channels
Alves Martins, Wallace UL; Cruz-Roldán, Fernando; Moonen, Marc et al

in Proc. of the 27th European Signal Processing Conference (EUSIPCO-2019) (2019, September)

Detailed reference viewed: 35 (3 UL)
Full Text
Peer Reviewed
See detailOn Fairness Optimization for NOMA-Enabled Multi-Beam Satellite Systems
Wang, Anyue UL; Lei, Lei UL; Lagunas, Eva UL et al

in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 2019 (2019, September)

Detailed reference viewed: 35 (6 UL)
Full Text
Peer Reviewed
See detailTime-Deconvolutive CNMF for Multichannel Blind Source Separation
Dias, Thadeu; Biscainho, Luiz Wagner; Alves Martins, Wallace UL

in Anais do XXXVII Simpósio Brasileiro de Telecomunicações e Processamento de Sinais (SBrT 2019) (2019, September)

Detailed reference viewed: 31 (2 UL)
Full Text
Peer Reviewed
See detailAn Approximate Solution for Symbol-Level Multiuser Precoding Using Support Recovery
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL; Ottersten, Björn UL

in IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes 2-5 July 2019 (2019, August 29)

In this paper, we propose a low-complexity method to approximately solve the SINR-constrained optimization problem of symbol-level precoding (SLP). First, assuming a generic modulation scheme, the ... [more ▼]

In this paper, we propose a low-complexity method to approximately solve the SINR-constrained optimization problem of symbol-level precoding (SLP). First, assuming a generic modulation scheme, the precoding optimization problem is recast as a standard non-negative least squares (NNLS). Then, we improve an existing closed-form SLP (CF-SLP) scheme using the conditions for nearly perfect recovery of the optimal solution support, followed by solving a reduced system of linear equations. We show through simulation results that in comparison with the CF-SLP method, the improved approximate solution of this paper, referred to as ICF-SLP, significantly enhances the performance with a negligible increase in complexity. We also provide comparisons with a fast-converging iterative NNLS algorithm, where it is shown that the ICF-SLP method is comparable in performance to the iterative algorithm with a limited maximum number of iterations. Analytic discussions on the complexities of different methods are provided, verifying the computational efficiency of the proposed method. Our results further indicate that the ICF-SLP scheme performs quite close to the optimal SLP, particularly in the large system regime. [less ▲]

Detailed reference viewed: 38 (4 UL)
Full Text
Peer Reviewed
See detailModelling of interfacial crack propagation in strongly heterogeneous materials by using phase field method
Nguyen, Thanh-Tung; Yvonnet, Julien; Waldmann, Danièle UL et al

in Proceedings of the 8th GACM Colloquium on Computational Mechanics for Young Scientists from Academia and Industry (2019, August 28)

Phase field model has been proved to be a useful tool to study the fracture behaviors in heterogeneous materials. This method is able to model complex, multiple crack fronts, and branching in both 2D/3D ... [more ▼]

Phase field model has been proved to be a useful tool to study the fracture behaviors in heterogeneous materials. This method is able to model complex, multiple crack fronts, and branching in both 2D/3D without ad-hoc numerical treatments. In this study, a new interfacial cracking model in the phase field framework is proposed. The effects of both stiff and soft interphases on the fracture response of composite materials are considered. A dimensional-reduced model based on a rigorous asymptotic analysis is adapted to derive the null thickness imperfect interface models from an original configuration containing thin interphase. The idea of mixing the bulk and interfacial energy within the phase field framework is then used to describe the material degradation both on the interface and in bulk. Moreover, in order to ensure the physical crack propagation patterns, a unilateral contact condition is also proposed for the case of spring imperfect interface. The complex cracking phenomena on interfaces such as initiation, delamination, coalescence, deflection, as well as the competition between the interface and bulk cracking are successfully predicted by the present method. Concerning the numerical aspect, the one-pass staggered algorithm is adapted, providing an extremely robust approach to study interfacial cracking phenomena in a broad class of heterogeneous materials. [less ▲]

Detailed reference viewed: 22 (1 UL)
Full Text
Peer Reviewed
See detailHarnessing Higher-Order (Meta-)Logic to Represent and Reason with Complex Ethical Theories
Fuenmayor, David; Benzmüller, Christoph UL

in Nayak, A.; Sharma, A. (Eds.) PRICAI 2019: Trends in Artificial Intelligence (2019, August 23)

Detailed reference viewed: 66 (0 UL)
Full Text
Peer Reviewed
See detailDatabase Processing-in-Memory: A Vision
Kepe, Tiago rodrigo; Almeida, Eduardo Cunha; Alves, Marcos A.Z. et al

in Database Processing-in-Memory: A Vision (2019, August 03)

Detailed reference viewed: 39 (0 UL)
Full Text
See detailChapter 18: Luxembourg
Sinnig, Julia UL

in Maisto, Guglielmo (Ed.) New Trends in the Definition of Permanent Establishment (2019, August)

Detailed reference viewed: 69 (7 UL)
Full Text
Peer Reviewed
See detailKeynote lecture: Potential of the Deformation Area Difference (DAD)-Method for Condition Assessment of Bridge Structures
Waldmann, Danièle UL; Erdenebat, Dolgion

in Proceedings of SMAR 2019 - Fifth Conference on Smart Monitoring, Assessment and Rehabilitation of Civil Structures (2019, August)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailiFixR: bug report driven program repair
Koyuncu, Anil UL; Liu, Kui UL; Bissyande, Tegawendé François D Assise UL et al

in ESEC/FSE 2019 Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (2019, August)

Issue tracking systems are commonly used in modern software development for collecting feedback from users and developers. An ultimate automation target of software maintenance is then the systematization ... [more ▼]

Issue tracking systems are commonly used in modern software development for collecting feedback from users and developers. An ultimate automation target of software maintenance is then the systematization of patch generation for user-reported bugs. Although this ambition is aligned with the momentum of automated program repair, the literature has, so far, mostly focused on generate-and- validate setups where fault localization and patch generation are driven by a well-defined test suite. On the one hand, however, the common (yet strong) assumption on the existence of relevant test cases does not hold in practice for most development settings: many bugs are reported without the available test suite being able to reveal them. On the other hand, for many projects, the number of bug reports generally outstrips the resources available to triage them. Towards increasing the adoption of patch generation tools by practitioners, we investigate a new repair pipeline, iFixR, driven by bug reports: (1) bug reports are fed to an IR-based fault localizer; (2) patches are generated from fix patterns and validated via regression testing; (3) a prioritized list of generated patches is proposed to developers. We evaluate iFixR on the Defects4J dataset, which we enriched (i.e., faults are linked to bug reports) and carefully-reorganized (i.e., the timeline of test-cases is naturally split). iFixR generates genuine/plausible patches for 21/44 Defects4J faults with its IR-based fault localizer. iFixR accurately places a genuine/plausible patch among its top-5 recommendation for 8/13 of these faults (without using future test cases in generation-and-validation). [less ▲]

Detailed reference viewed: 40 (3 UL)
Full Text
Peer Reviewed
See detailGenerating Automated and Online Test Oracles for Simulink Models with Continuous and Uncertain Behaviors
Menghi, Claudio UL; Nejati, Shiva UL; Gaaloul, Khouloud UL et al

in Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE ’19), (2019, August)

Test automation requires automated oracles to assess test outputs. For cyber physical systems (CPS), oracles, in addition to be automated, should ensure some key objectives: (i) they should check test ... [more ▼]

Test automation requires automated oracles to assess test outputs. For cyber physical systems (CPS), oracles, in addition to be automated, should ensure some key objectives: (i) they should check test outputs in an online manner to stop expensive test executions as soon as a failure is detected; (ii) they should handle time- and magnitude-continuous CPS behaviors; (iii) they should provide a quantitative degree of satisfaction or failure measure instead of binary pass/fail outputs; and (iv) they should be able to handle uncertainties due to CPS interactions with the environment. We propose an automated approach to translate CPS requirements specified in a logic-based language into test oracles specified in Simulink - a widely-used development and simulation language for CPS. Our approach achieves the objectives noted above through the identification of a fragment of Signal First Order logic (SFOL) to specify requirements, the definition of a quantitative semantics for this fragment and a sound translation of the fragment into Simulink. The results from applying our approach on 11 industrial case studies show that: (i) our requirements language can express all the 98 requirements of our case studies; (ii) the time and effort required by our approach are acceptable, showing potentials for the adoption of our work in practice, and (iii) for large models, our approach can dramatically reduce the test execution time compared to when test outputs are checked in an offline manner. [less ▲]

Detailed reference viewed: 88 (17 UL)
Full Text
Peer Reviewed
See detailOn idempotent n-ary uninorms
Devillet, Jimmy UL; Kiss, Gergely; Marichal, Jean-Luc UL

in Torra, Vicenç; Narukawa, Yasuo; Pasi, Gabriella (Eds.) et al Modeling Decisions for Artifical Intelligence (2019, July 24)

In this paper we describe the class of idempotent n-ary uninorms on a given chain.When the chain is finite, we axiomatize the latter class by means of the following conditions: associativity ... [more ▼]

In this paper we describe the class of idempotent n-ary uninorms on a given chain.When the chain is finite, we axiomatize the latter class by means of the following conditions: associativity, quasitriviality, symmetry, and nondecreasing monotonicity. Also, we show that associativity can be replaced with bisymmetry in this new axiomatization. [less ▲]

Detailed reference viewed: 49 (7 UL)
Full Text
Peer Reviewed
See detailAnalysis of Multi-path Onion Routing-based Anonymization Networks
de La Cadena Ramos, Augusto Wladimir UL; Kaiser, Daniel UL; Mitseva, Asya UL et al

in Data and Applications Security and Privacy XXXIII, 2019 (2019, July 15)

Detailed reference viewed: 119 (15 UL)
Full Text
Peer Reviewed
See detailTBar: Revisiting Template-based Automated Program Repair
Liu, Kui UL; Koyuncu, Anil UL; Kim, Dongsun et al

in 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) (2019, July)

We revisit the performance of template-based APR to build com-prehensive knowledge about the effectiveness of fix patterns, andto highlight the importance of complementary steps such as faultlocalization ... [more ▼]

We revisit the performance of template-based APR to build com-prehensive knowledge about the effectiveness of fix patterns, andto highlight the importance of complementary steps such as faultlocalization or donor code retrieval. To that end, we first investi-gate the literature to collect, summarize and label recurrently-usedfix patterns. Based on the investigation, we buildTBar, a straight-forward APR tool that systematically attempts to apply these fixpatterns to program bugs. We thoroughly evaluateTBaron the De-fects4J benchmark. In particular, we assess the actual qualitative andquantitative diversity of fix patterns, as well as their effectivenessin yielding plausible or correct patches. Eventually, we find that,assuming a perfect fault localization,TBarcorrectly/plausibly fixes74/101 bugs. Replicating a standard and practical pipeline of APRassessment, we demonstrate thatTBarcorrectly fixes 43 bugs fromDefects4J, an unprecedented performance in the literature (includ-ing all approaches, i.e., template-based, stochastic mutation-basedor synthesis-based APR). [less ▲]

Detailed reference viewed: 60 (3 UL)
Full Text
Peer Reviewed
See detailA Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL et al

in Information Systems Security and Privacy (2019, July)

Password-based authentication is a widespread method to access into systems, thus password files are a valuable resource often target of attacks. To detect when a password file has been stolen, Juels and ... [more ▼]

Password-based authentication is a widespread method to access into systems, thus password files are a valuable resource often target of attacks. To detect when a password file has been stolen, Juels and Rivest introduced the Honeywords System in 2013. The core idea is to store the password with a list of decoy words that are ``indistinguishable'' from the password, called honeywords. An adversary that obtains the password file and, by dictionary attack, retrieves the honeywords can only guess the password when attempting to log in: but any incorrect guess will set off an alarm, warning that file has been compromised. In a recent conference paper, we studied the security of the Honeywords System in a scenario where the intruder also manages to corrupt the server's code (with certain limiting assumptions); we proposed an authentication protocol and proved it secure despite the corruption. In this extended journal version, we detail the analysis and we extend it, under the same attacker model, to the other two protocols of the original Honeywords System, the setup and change of password. We formally verify the security of both of them; further, we discuss that our design suggests a completely new approach that diverges from the original idea of the Honeywords System but indicates an alternative way to authenticate users which is robust to server's code-corruption. [less ▲]

Detailed reference viewed: 82 (4 UL)
Full Text
Peer Reviewed
See detailCrowdsensed Data Learning-Driven Prediction of Local Businesses Attractiveness in Smart Cities
Capponi, Andrea UL; Vitello, Piergiorgio UL; Fiandrino, Claudio UL et al

in IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 2019 (2019, July)

Urban planning typically relies on experience-based solutions and traditional methodologies to face urbanization issues and investigate the complex dynamics of cities. Recently, novel data-driven ... [more ▼]

Urban planning typically relies on experience-based solutions and traditional methodologies to face urbanization issues and investigate the complex dynamics of cities. Recently, novel data-driven approaches in urban computing have emerged for researchers and companies. They aim to address historical urbanization issues by exploiting sensing data gathered by mobile devices under the so-called mobile crowdsensing (MCS) paradigm. This work shows how to exploit sensing data to improve traditionally experience-based approaches for urban decisions. In particular, we apply widely known Machine Learning (ML) techniques to achieve highly accurate results in predicting categories of local businesses (LBs) (e.g., bars, restaurants), and their attractiveness in terms of classes of temporal demands (e.g., nightlife, business hours). The performance evaluation is conducted in Luxembourg city and the city of Munich with publicly available crowdsensed datasets. The results highlight that our approach does not only achieve high accuracy, but it also unveils important hidden features of the interaction of citizens and LBs. [less ▲]

Detailed reference viewed: 122 (14 UL)
Full Text
Peer Reviewed
See detailPLASTIC DESIGN FOR COMPOSITE BEAMS - ARE THERE ANY LIMITS?
Schäfer, Markus UL; Zhang, Qingjie UL; Braun et al

in Proceedings of the 9th International Conference on Steel and Aluminium Structures ICSAS19 (2019, July)

Due to the demand for sustainable constructions, composite structures have become more important and lead to slim and economic solutions with a low structural self-weight. EN 1994-1-1 differentiate four ... [more ▼]

Due to the demand for sustainable constructions, composite structures have become more important and lead to slim and economic solutions with a low structural self-weight. EN 1994-1-1 differentiate four different cross-section classes for the determination of moment resistance. For the plastic design of the moment resistance it is assumed, that each cross-sectional fibre can plastify without any limitation of the strains. For standard composite beams in case of sagging moments and a high-lying plastic neutral axis, plastic design and strain-limited design give similar results. In the case of sections with a large compression zone height xpl and limited rotation capacity, a concrete failure in the compression zone can occur before the plastic moment resistance Mpl,Rd, is reached. The strain limit design becomes decisive. This paper points out the impact of the concrete part on the design of composite beams. A parametric study comparing plastic and strain limited moment resistance of a considerable variety of cross-sections has been carried out to develop the beam design methods considering high compression zone height of next generation of Eurocodes. [less ▲]

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detailWhispering Botnet Command and Control Instructions
Steichen, Mathis UL; Ferreira Torres, Christof UL; Fiz Pontiveros, Beltran UL et al

in 2nd Crypto Valley Conference on Blockchain Technology, Zug 24-26 June 2019 (2019, June 25)

Detailed reference viewed: 63 (0 UL)
Full Text
Peer Reviewed
See detailBridging the Gap between Requirements Modeling and Behavior-driven Development
Alferez, Mauricio UL; Pastore, Fabrizio UL; Sabetzadeh, Mehrdad UL et al

in Proceedings of 22nd IEEE / ACM International Conference on Model Driven Engineering Languages and Systems (MODELS) (2019, June 20)

Acceptance criteria (AC) are implementation agnostic conditions that a system must meet to be consistent with its requirements and be accepted by its stakeholders. Each acceptance criterion is typically ... [more ▼]

Acceptance criteria (AC) are implementation agnostic conditions that a system must meet to be consistent with its requirements and be accepted by its stakeholders. Each acceptance criterion is typically expressed as a natural-language statement with a clear pass or fail outcome. Writing AC is a tedious and error-prone activity, especially when the requirements specifications evolve and there are different analysts and testing teams involved. Analysts and testers must iterate multiple times to ensure that AC are understandable and feasible, and accurately address the most important requirements and workflows of the system being developed. In many cases, analysts express requirements through models, along with natural language, typically in some variant of the UML. AC must then be derived by developers and testers from such models. In this paper, we bridge the gap between requirements models and AC by providing a UML-based modeling methodology and an automated solution to generate AC. We target AC in the form of Behavioral Specifications in the context of Behavioral-Driven Development (BDD), a widely used agile practice in many application domains. More specially we target the well-known Gherkin language to express AC, which then can be used to generate executable test cases. We evaluate our modeling methodology and AC generation solution through an industrial case study in the financial domain. Our results suggest that (1) our methodology is feasible to apply in practice, and (2) the additional modeling effort required by our methodology is outweighed by the benefits the methodology brings in terms of automated and systematic AC generation and improved model precision. [less ▲]

Detailed reference viewed: 302 (78 UL)
Full Text
Peer Reviewed
See detailOn Deception-Based Protection Against Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Sgandurra, Daniele

in 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (2019, June 19)

In order to detect malicious file system activity, some commercial and academic anti-ransomware solutions implement deception-based techniques, specifically by placing decoy files among user files. While ... [more ▼]

In order to detect malicious file system activity, some commercial and academic anti-ransomware solutions implement deception-based techniques, specifically by placing decoy files among user files. While this approach raises the bar against current ransomware, as any access to a decoy file is a sign of malicious activity, the robustness of decoy strategies has not been formally analyzed and fully tested. In this paper, we analyze existing decoy strategies and discuss how they are effective in countering current ransomware by defining a set of metrics to measure their robustness. To demonstrate how ransomware can identify existing deception-based detection strategies, we have implemented a proof-of-concept anti-decoy ransomware that successfully bypasses decoys by using a decision engine with few rules. Finally, we discuss existing issues in decoy-based strategies and propose practical solutions to mitigate them. [less ▲]

Detailed reference viewed: 27 (1 UL)
Full Text
Peer Reviewed
See detailAn enhanced interface model for friction fatigue problems of axially loaded piles
Kullolli, Borana; Baeßler, Matthias; Cuéllar, Pablo et al

in Proceedings of the ASME 2019 38th, International Conference on Ocean, Offshore and Arctic Engineering, Glasgow 9-14 June 2019 (2019, June 09)

The shaft bearing capacity often plays a dominant role for the overall structural behaviour of axially loaded piles in offshore deep foundations. Under cyclic loading, a narrow zone of soil at the pile ... [more ▼]

The shaft bearing capacity often plays a dominant role for the overall structural behaviour of axially loaded piles in offshore deep foundations. Under cyclic loading, a narrow zone of soil at the pile-soil interface is subject to cyclic shearing solicitations. Thereby, the soil may densify and lead to a decrease of confining stress around the pile due to micro-phenomena such as particle crushing, migration and rearrangement. This reduction of radial stress has a direct impact on the shaft capacity, potentially leading in extreme cases to pile failure. An adequate interface model is needed in order to model this behaviour numerically. Different authors have proposed models that take typical interface phenomena in account such as densification, grain breakage, normal pressure effect and roughness. However, as the models become more complex, a great number of material parameters need to be defined and calibrated. This paper proposes the adoption and transformation of an existing soil bulk model (Pastor- Zienkiewicz) into an interface model. To calibrate the new interface model, the results of an experimental campaign with the ring shear device under cyclic loading conditions are here presented. The constitutive model shows a good capability to reproduce typical features of sand behaviour such as cyclic compaction and dilatancy, which in saturated partially-drained conditions may lead to liquefaction and cyclic mobility phenomena. [less ▲]

Detailed reference viewed: 66 (4 UL)
Full Text
Peer Reviewed
See detailDesigning collaborative scenarios on tangible tabletop interfaces - insights from the implementation of paper prototypes in the context of a multidisciplinary design workshop
Sunnen, Patrick UL; Arend, Béatrice UL; Heuser, Svenja UL et al

in Proceedings of the 17th European Conference on Computer-Supported Cooperative Work: The International Venue on Practice-centred Computing and the Design of Cooperation Technologies - Exploratory Papers, Reports of the European Society for Socially Embedded Technologies (2019, June)

Within the context of the research project ORBIT (Overcoming Breakdowns in Teams with Interactive Tabletops), we design and study a joint problem-solving activity at an interactive tabletop, that gives ... [more ▼]

Within the context of the research project ORBIT (Overcoming Breakdowns in Teams with Interactive Tabletops), we design and study a joint problem-solving activity at an interactive tabletop, that gives participants the opportunity to develop their collaboration methods. To gain design insights for the development of a scenario soliciting participants to collaborate, we set up a multidisciplinary design workshop. During the latter, we explored and discussed three different collaborative scenarios, implemented as paper prototypes. In this paper, we report on first results gained from an exploratory analysis of the video data that was recorded in the context of this workshop. [less ▲]

Detailed reference viewed: 81 (10 UL)
Full Text
Peer Reviewed
See detailA GP Hyper-Heuristic Approach for Generating TSP Heuristics
Duflo, Gabriel UL; Kieffer, Emmanuel UL; Brust, Matthias R. UL et al

in 33rd IEEE International Parallel & Distributed Processing Symposium (IPDPS 2019) (2019, May 20)

Detailed reference viewed: 99 (37 UL)
Full Text
Peer Reviewed
See detailBlockZoom: Large-Scale Blockchain Testbed
Shbair, Wazen UL; Steichen, Mathis UL; Francois, Jerome et al

in IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019) (2019, May 14)

Future blockchain applications are anticipated to serve millions of users. Thus the evaluation of new blockchain applications have to consider large-scale assessment of the technologies behind the scene ... [more ▼]

Future blockchain applications are anticipated to serve millions of users. Thus the evaluation of new blockchain applications have to consider large-scale assessment of the technologies behind the scene. Most of current testing approaches have been done either on simulators or via local small blockchain networks. Hence, the performance in real world conditions is unpredictable. This demonstration introduces BlockZoom, a large-scale blockchain testbed that runs on top of a highly reconfigurable and controllable HPC platform. BlockZoom presents a reproducible environment for experimenting distributed ledgers technologies and smart contract applications. Through different configuration scenarios developers can evaluate the applications performance and the blockchain behavior at a scale comparable to the production environment. The target audience of this demonstration includes researchers and developers in blockchain technology. [less ▲]

Detailed reference viewed: 80 (7 UL)
Full Text
Peer Reviewed
See detailDemo: Blockchain for the Simplification and Automation of KYC Result Sharing
Norvill, Robert UL; Steichen, Mathis UL; Shbair, Wazen UL et al

in IEEE International Conference on Blockchain and Cryptocurrency (ICBC 2019) (2019, May 14)

Know Your Customer (KYC) processes performed by banks on their customers are redundant, cumbersome and costly. Therefore, a system is proposed to automate menial tasks and allow sharing of data related to ... [more ▼]

Know Your Customer (KYC) processes performed by banks on their customers are redundant, cumbersome and costly. Therefore, a system is proposed to automate menial tasks and allow sharing of data related to KYC. A blockchain dictates the collaboration between different participants and several services are built around it to support the functionality of the system as a whole. An access control system is used to share data legitimately. [less ▲]

Detailed reference viewed: 79 (4 UL)
Full Text
Peer Reviewed
See detailVIEW-INVARIANT ACTION RECOGNITION FROM RGB DATA VIA 3D POSE ESTIMATION
Baptista, Renato UL; Ghorbel, Enjie UL; Papadopoulos, Konstantinos UL et al

in IEEE International Conference on Acoustics, Speech and Signal Processing, Brighton, UK, 12–17 May 2019 (2019, May)

In this paper, we propose a novel view-invariant action recognition method using a single monocular RGB camera. View-invariance remains a very challenging topic in 2D action recognition due to the lack of ... [more ▼]

In this paper, we propose a novel view-invariant action recognition method using a single monocular RGB camera. View-invariance remains a very challenging topic in 2D action recognition due to the lack of 3D information in RGB images. Most successful approaches make use of the concept of knowledge transfer by projecting 3D synthetic data to multiple viewpoints. Instead of relying on knowledge transfer, we propose to augment the RGB data by a third dimension by means of 3D skeleton estimation from 2D images using a CNN-based pose estimator. In order to ensure view-invariance, a pre-processing for alignment is applied followed by data expansion as a way for denoising. Finally, a Long-Short Term Memory (LSTM) architecture is used to model the temporal dependency between skeletons. The proposed network is trained to directly recognize actions from aligned 3D skeletons. The experiments performed on the challenging Northwestern-UCLA dataset show the superiority of our approach as compared to state-of-the-art ones. [less ▲]

Detailed reference viewed: 163 (28 UL)
Full Text
Peer Reviewed
See detailParallel coordinate descent algorithms for sparse phase retrieval
Yang, Yang UL; Pesavento, Marius; Eldar, Yonina C. et al

in Proc. 2019 IEEE International Conference on Acoustics, Speech and Signal (ICASSP) (2019, May)

Detailed reference viewed: 161 (17 UL)
Full Text
Peer Reviewed
See detailConvex Combination of Constraint Vectors for Set-membership Affine Projection Algorithms
Nagashima Ferreira, Tadeu; Alves Martins, Wallace UL; Lima, Markus et al

in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2019, May)

Set-membership affine projection (SM-AP) adaptive filters have been increasingly employed in the context of online data-selective learning. A key aspect for their good performance in terms of both ... [more ▼]

Set-membership affine projection (SM-AP) adaptive filters have been increasingly employed in the context of online data-selective learning. A key aspect for their good performance in terms of both convergence speed and steady-state mean-squared error is the choice of the so-called constraint vector. Optimal constraint vectors were recently proposed relying on convex optimization tools, which might some- times lead to prohibitive computational burden. This paper proposes a convex combination of simpler constraint vectors whose performance approaches the optimal solution closely, utilizing much fewer computations. Some illustrative examples confirm that the sub-optimal solution follows the accomplishments of the optimal one. [less ▲]

Detailed reference viewed: 27 (1 UL)
Full Text
Peer Reviewed
See detailLearning to Spot and Refactor Inconsistent Method Names
Liu, Kui UL; Kim, Dongsun; Bissyande, Tegawendé François D Assise UL et al

in 41st ACM/IEEE International Conference on Software Engineering (ICSE) (2019, May)

To ensure code readability and facilitate software maintenance, program methods must be named properly. In particular, method names must be consistent with the corresponding method implementations ... [more ▼]

To ensure code readability and facilitate software maintenance, program methods must be named properly. In particular, method names must be consistent with the corresponding method implementations. Debugging method names remains an important topic in the literature, where various approaches analyze commonalities among method names in a large dataset to detect inconsistent method names and suggest better ones. We note that the state-of-the-art does not analyze the implemented code itself to assess consistency. We thus propose a novel automated approach to debugging method names based on the analysis of consistency between method names and method code. The approach leverages deep feature representation techniques adapted to the nature of each artifact. Experimental results on over 2.1 million Java methods show that we can achieve up to 15 percentage points improvement over the state-of-the-art, establishing a record performance of 67.9% F1-measure in identifying inconsistent method names. We further demonstrate that our approach yields up to 25% accuracy in suggesting full names, while the state-of-the-art lags far behind at 1.1% accuracy. Finally, we report on our success in fixing 66 inconsistent method names in a live study on projects in the wild. [less ▲]

Detailed reference viewed: 229 (16 UL)
Full Text
Peer Reviewed
See detailROS-Defender: SDN-based Security Policy Enforcement for Robotic Applications
Rivera, Sean UL; Lagraa, Sofiane UL; State, Radu UL et al

in IEEE Workshop on the Internet of Safe Things, Co-located with IEEE Security and Privacy 2019 (2019, May)

Abstract—In this paper we propose ROS-Defender, a holistic approach to secure robotics systems, which integrates a Security Event Management System (SIEM), an intrusion prevention system (IPS) and a ... [more ▼]

Abstract—In this paper we propose ROS-Defender, a holistic approach to secure robotics systems, which integrates a Security Event Management System (SIEM), an intrusion prevention system (IPS) and a firewall for a robotic system. ROS-Defender combines anomaly detection systems at application (ROS) level and network level, with dynamic policy enforcement points using software defined networking (SDN) to provide protection against a large class of attacks. Although SIEMs, IPS, and firewall have been previously used to secure computer networks, ROSDefender is applying them for the specific use case of robotic systems, where security is in many cases an afterthought. [less ▲]

Detailed reference viewed: 44 (4 UL)
Full Text
Peer Reviewed
See detailMCP: A Security Testing Tool Driven by Requirements
Mai, Xuan Phu UL; Pastore, Fabrizio UL; Goknil, Arda et al

in 2019 IEEE/ACM 41st International Conference on Software Engineering (2019, May)

We present MCP, a tool for automatically generating executable security test cases from misuse case specifications in natural language (i.e., use case specifications capturing the behavior of malicious ... [more ▼]

We present MCP, a tool for automatically generating executable security test cases from misuse case specifications in natural language (i.e., use case specifications capturing the behavior of malicious users). MCP relies on Natural Language Processing (NLP), a restricted form of misuse case specifications, and a test driver API implementing basic utility functions for security testing. NLP is used to identify the activities performed by the malicious user and the control flow of misuse case specifications. MCP matches the malicious user’s activities to the methods of the provided test driver API in order to generate executable security test cases that perform the activities described in the misuse case specifications. MCP has been successfully evaluated on an industrial case study. [less ▲]

Detailed reference viewed: 93 (14 UL)
Full Text
Peer Reviewed
See detailEnseignants non spécialisés et (trans)disciplinarité. L’exemple de l’enseignement musical
Sagrillo, Damien UL

in Karsenti, T.; Goyer, S. (Eds.) Programme du colloque international en éducation et du Somme du numérique en éducation, 25 et 26 avril 2019. Montréal, QC: Centre de recherche interuniversitaire sur la formation et la profession enseignante, Chaire de recherche du Canada sur les technologies de l’information et de la communication (TIC) en éducation. (2019, April 25)

L’effet bénéfique qu’apportent la musique et l’enseignement musical à l’enseignement général, mais aussi à l’individu a été le sujet d’un certain nombre d’études (d’ailleurs controversées), comme ... [more ▼]

L’effet bénéfique qu’apportent la musique et l’enseignement musical à l’enseignement général, mais aussi à l’individu a été le sujet d’un certain nombre d’études (d’ailleurs controversées), comme l’observation à long terme dans des écoles fondamentales à Berlin. H. G. Bastian et son équipe (2002) ont démontré l’effet social bénéfique d’un enseignement musical approfondi. D’autres recherches ont dévoilé un manque de confiance tenace à l’égard de l’enseignement musical chez les étudiants et les enseignants (Holden et Button, 2006). D’autres encore ont analysé les potentialités d’un enseignement musical extrascolaire (Kivi, 2018). L’angoisse des formateurs non spécialisés devant l’éducation musicale se reflète souvent dans les arguments clichés comme : « Je n’ai pas fait du solfège; je ne suis pas musical; je ne peux pas chanter ». Le manque de connaissances déclaratives empêche donc le développement des savoir-faire. Nous présenterons des concepts développés relativement à deux traditions musicales (allemande et française) au Grand-Duché de Luxembourg. Notre objectif est de mettre à la disposition des futurs enseignants un éventail didactique. [less ▲]

Detailed reference viewed: 48 (2 UL)
Full Text
Peer Reviewed
See detailYou Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems
Liu, Kui UL; Koyuncu, Anil UL; Bissyande, Tegawendé François D Assise UL et al

in The 12th IEEE International Conference on Software Testing, Verification and Validation (ICST-2019) (2019, April 24)

Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure ... [more ▼]

Properly benchmarking Automated Program Repair (APR) systems should contribute to the development and adoption of the research outputs by practitioners. To that end, the research community must ensure that it reaches significant milestones by reliably comparing state-of-the-art tools for a better understanding of their strengths and weaknesses. In this work, we identify and investigate a practical bias caused by the fault localization (FL) step in a repair pipeline. We propose to highlight the different fault localization configurations used in the literature, and their impact on APR systems when applied to the Defects4J benchmark. Then, we explore the performance variations that can be achieved by "tweaking'' the FL step. Eventually, we expect to create a new momentum for (1) full disclosure of APR experimental procedures with respect to FL, (2) realistic expectations of repairing bugs in Defects4J, as well as (3) reliable performance comparison among the state-of-the-art APR systems, and against the baseline performance results of our thoroughly assessed kPAR repair tool. Our main findings include: (a) only a subset of Defects4J bugs can be currently localized by commonly-used FL techniques; (b) current practice of comparing state-of-the-art APR systems (i.e., counting the number of fixed bugs) is potentially misleading due to the bias of FL configurations; and (c) APR authors do not properly qualify their performance achievement with respect to the different tuning parameters implemented in APR systems. [less ▲]

Detailed reference viewed: 142 (14 UL)
Full Text
Peer Reviewed
See detailIoT Device Fingerprinting: Machine Learning based Encrypted Traffic Analysis
Msadek, Mohamed Nizar UL; Soua, Ridha UL; Engel, Thomas UL

in The IEEE Wireless Communications and Networking Conference (WCNC) (2019, April 19)

Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface ... [more ▼]

Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration across sectors such as e-health, energy, transportation, and entertainment is expanding the attack surface, which can seriously harm users’ privacy. We demonstrate in this paper that an attacker is able to disclose sensitive information about the IoT device, such as its type,by identifying specific patterns in IoT traffic. To perform the fingerprint attack, we train machine-learning algorithms based on selected features extracted from the encrypted IoT traffic.Extensive simulations involving the baseline approach show that we achieve not only a significant mean accuracy improvement of 18.5% and but also a speedup of 18.39 times for finding the best estimators. Obtained results should spur the attention of policymakers and IoT vendors to secure the IoT devices they bring to market. [less ▲]

Detailed reference viewed: 427 (14 UL)
Full Text
Peer Reviewed
See detailWhy do String Players Perform Easier per Memory than Wind Music Players? – Testing Instrumentalist Students’ Attention Levels During Music Reading
Buzás, Zsuzsanna; Sagrillo, Damien UL

in Molnár, Edit Katalin; Dancs, Katinka (Eds.) 17thConference on Educational Assessment (2019, April 13)

Developing music reading skills is considered a central part of music education. The knowledge of musical notation is essential to participate in orchestras or in choral ensembles. In musical practice ... [more ▼]

Developing music reading skills is considered a central part of music education. The knowledge of musical notation is essential to participate in orchestras or in choral ensembles. In musical practice, pianists who play as soloists with an orchestra do notneed written support as opposed to brass instrument soloists. Until now, no research has been conducted to discoverthe reasons why pianists and string players play easier by heart than brass instrument players.Music related activities involve numerous psychological processes, including perception and rapid processing of audio stimuli, attention and auditory, sensory and visual memory activation. Students with working memory impairments have difficulties with concentration as well as with organizing and monitoring the quality of their own work (Alloway et al., 2009).If the attention level is normal or high, the student is in an appropriate state for learning. It has been shown that participants with high working memory capacity perform significantly better on a variety of attention tasks (Fougnie, 2008).Attention supports the development of emerging reading skills by helping students regulate the cognitive demands inherently part of learning (Sáez et al., 2011).Thisstudy aims to test instrumentalist students’ attention and mediation levels during music reading by means of NeuroSky’s MindWave EEG device that translates brainwaves into digital information and beams it wirelessly to acomputer. We investigated 22right-handed wind instrumentalists, 12-14 years of age, and compared them with 21 violin players,matched for age and grade level. Students were asked to play an eight-bar composition bySzilvay. We analyzed attention and mediation levels, as well as alpha, beta and gamma band oscillatory responses to the musical piece during reading. The results of the data analysis were evaluated using e-Sense Metric. According to this metric, attention and meditation data arescaled between 1 and 100. The findings ofthe study revealed that the average attention level of the violin players was slightly highat61.53;while that of the wind players was 39.98, that is,slightly low. A significant difference was found between the averages of attention levelsbetween the string and the wind players (t=2.656, p=.026).With the use of EEG, the appearance of fatiguecan be detectedand the concentration levelscan be differentiatedfor the same exercise for different pupils. The results help us to improve instructionalmethods, and can also help us to reveal the processesof attention and mediation duringthe students’ music reading. Further research can involve the replication of the studywith pianists,comparing them with string players and wind music players. In an even more refined desing, a replication study could be carried out to compare pianists and brass instrument players. These further studies can serve as a basis for developing training programs of music reading comprehension for different instrumentalists. [less ▲]

Detailed reference viewed: 59 (1 UL)
Full Text
Peer Reviewed
See detailAn Effective Hybrid Imperialist Competitive Algorithm and Tabu Search for an Extended Flexible Job Shop Scheduling Problem
Tessaro Lunardi, Willian UL; Voos, Holger UL; Cherri, Luiz Henrique

in 34th ACM/SIGAPP Symposium On Applied Computing, Limassol, Cyprus April 8-12, 2019 (2019, April 08)

An extended version of the flexible job shop problem is tackled in this work. The investigated extension of the classical flexible job shop problem allows the precedences between the operations to be ... [more ▼]

An extended version of the flexible job shop problem is tackled in this work. The investigated extension of the classical flexible job shop problem allows the precedences between the operations to be given by an arbitrary directed acyclic graph instead of a linear order. The problem consists of designating the operations to the machines and sequencing them in compliance with the supplied precedences. The goal in the present work is the minimization of the makespan. In order to produce reasonable outcomes in acceptable time, a hybrid imperialist competitive algorithm and tabu search is proposed to solve the problem. Numerical experiments assess the efficiency of the proposed method and compare it with well-known scheduling algorithms. [less ▲]

Detailed reference viewed: 168 (28 UL)
Full Text
Peer Reviewed
See detailFog Computing as the Key for Seamless Connectivity Handover in Future Vehicular Networks
Palattella, Maria Rita UL; Soua, Ridha UL; Abdelmajid, Khelil et al

in The 34th ACM Symposium On Applied Computing (SAC (2019, April)

Detailed reference viewed: 181 (16 UL)
Full Text
Peer Reviewed
See detailTime Series Modeling of Market Price in Real-Time Bidding
Du, Manxing UL; Hammerschmidt, Christian UL; Varisteas, Georgios UL et al

in 27th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (2019, April)

Real-Time-Bidding (RTB) is one of the most popular online advertisement selling mechanisms. Modeling the highly dynamic bidding environment is crucial for making good bids. Market prices of auctions ... [more ▼]

Real-Time-Bidding (RTB) is one of the most popular online advertisement selling mechanisms. Modeling the highly dynamic bidding environment is crucial for making good bids. Market prices of auctions fluctuate heavily within short time spans. State-of-the-art methods neglect the temporal dependencies of bidders’ behaviors. In this paper, the bid requests are aggregated by time and the mean market price per aggregated segment is modeled as a time series. We show that the Long Short Term Memory (LSTM) neural network outperforms the state-of-the-art univariate time series models by capturing the nonlinear temporal dependencies in the market price. We further improve the predicting performance by adding a summary of exogenous features from bid requests. [less ▲]

Detailed reference viewed: 74 (13 UL)
Full Text
Peer Reviewed
See detailTopic-based Historical Information Selection for Personalized Sentiment Analysis
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, Bruges 24-26 April 2019 (2019, April)

In this paper, we present a selection approach designed for personalized sentiment analysis with the aim of extracting related information from a user's history. Analyzing a person's past is key to ... [more ▼]

In this paper, we present a selection approach designed for personalized sentiment analysis with the aim of extracting related information from a user's history. Analyzing a person's past is key to modeling individuality and understanding the current state of the person. We consider a user's expressions in the past as historical information, and target posts from social platforms for which Twitter texts are chosen as exemplary. While implementing the personalized model PERSEUS, we observed information loss due to the lack of flexibility regarding the design of the input sequence. To compensate this issue, we provide a procedure for information selection based on the similarities in the topics of a user's historical posts. Evaluation is conducted comparing different similarity measures, and improvements are seen with the proposed method. [less ▲]

Detailed reference viewed: 97 (26 UL)
Full Text
Peer Reviewed
See detailStability Analysis of Power Networks under Cyber-Physical Attacks: an LPV-Descriptor Approach
Bezzaoucha, Souad UL; Voos, Holger UL

in Bezzaoucha, Souad (Ed.) International Conference on Control, Decision and Information Technologies (2019, April)

This paper proposes a unified and advanced framework for the modeling, stability study and stabilization of a Power Networks subject to an omniscient adversary (i.e. cyber-attack). From the system model ... [more ▼]

This paper proposes a unified and advanced framework for the modeling, stability study and stabilization of a Power Networks subject to an omniscient adversary (i.e. cyber-attack). From the system model developed in [24], based on the well-known sector non-linearity approach and the convex polytopic transformation, the attacked system (descriptor model) is re-written in a more convenient form (Linear Parameter Varying-LPV) with unmeasurable premise variables. The so-called Lyapunov-based methods are applied in order to study the stability and security problems despite the presence of cyber-attacks. The conditions will be given in terms of Linear- Bilinear Matrix Inequality LMI- BMI constraints. [less ▲]

Detailed reference viewed: 56 (0 UL)
Full Text
Peer Reviewed
See detailLooking into the Past: Evaluating the Effect of Time Gaps in a Personalized Sentiment Model
Guo, Siwen UL; Höhn, Sviatlana UL; Schommer, Christoph UL

in ACM/SIGAPP Symposium On Applied Computing, Limassol 8-12 April 2019 (2019, April)

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating ... [more ▼]

This paper concerns personalized sentiment analysis, which aims at improving the prediction of the sentiment expressed in a piece of text by considering individualities. Mostly, this is done by relating to a person’s past expressions (or opinions), however the time gaps between the messages are not considered in the existing works. We argue that the opinion at a specific time point is affected more by recent opinions that contain related content than the earlier or unrelated ones, thus a sentiment model ought to include such information in the analysis. By using a recurrent neural network with an attention layer as a basic model, we introduce three cases to integrate time gaps in the model. Evaluated on Twitter data with frequent users, we have found that the performance is improved the most by including the time information in the Hawkes process, and it is also more effective to add the time information in the attention layer than at the input. [less ▲]

Detailed reference viewed: 141 (41 UL)
Full Text
Peer Reviewed
See detailEvaluation of End-To-End Learning for Autonomous Driving: The Good, the Bad and the Ugly
Varisteas, Georgios UL; Frank, Raphaël UL; Sajadi Alamdari, Seyed Amin UL et al

in 2nd International Conference on Intelligent Autonomous Systems, Singapore, Feb. 28 to Mar. 2, 2019 (2019, March 01)

Detailed reference viewed: 180 (41 UL)
Full Text
Peer Reviewed
See detailArt in Rich-Prospect: Evaluating Next-Generation User Interfaces for Cultural Heritage
Morse, Christopher UL; Koenig, Vincent UL; Lallemand, Carine UL et al

in Morse, Christopher; Koenig, Vincent; Lallemand, Carine (Eds.) et al MW2019: Museums and the Web, Boston 2-6 April 2019 (2019, March)

The present study reports on the user experience (UX) of rich-prospect browsing, an emerging interface design trend for digital cultural heritage. Building on research that suggests online museum ... [more ▼]

The present study reports on the user experience (UX) of rich-prospect browsing, an emerging interface design trend for digital cultural heritage. Building on research that suggests online museum collections are used only infrequently by the general public, this study investigates the role of next-generation user interfaces in the design of optimal browsing experiences. Moreover, it describes the results of user testing for three different arts and culture collections that make use of rich-prospect. The study recruited 30 participants of varying ages, nationalities, and museum visiting habits to discuss their museum experiences and test three different applications: Coins, Curator Table, and Museum of the World. The results of the study provide insights into the user experience of a new browsing medium and reveal the information-seeking habits and patterns that occurred within these information environments. Moreover, the study isolated the core features of rich-prospect in order to define opportunities and pain points during the browsing experience and indicated which features in particular are most important to people during the browsing experience. Finally, we suggest some best practices going forward in the design of rich-prospect. [less ▲]

Detailed reference viewed: 90 (16 UL)
Full Text
Peer Reviewed
See detailA Hybrid Machine Learning and Schedulability Method for the Verification of TSN Networks
Mai, Tieu Long UL; Navet, Nicolas UL; Migge, Jörn

in 15th IEEE International Workshop on Factory Communication Systems (WFCS2019) (2019, March)

Machine learning (ML), and supervised learning in particular, can be used to learn what makes it hard for a network to be feasible and try to predict whether a network configuration will be feasible ... [more ▼]

Machine learning (ML), and supervised learning in particular, can be used to learn what makes it hard for a network to be feasible and try to predict whether a network configuration will be feasible without executing a conventional schedulability analysis. A disadvantage of ML-based timing verification with respect to schedulability analysis is the possibility of "false positives": configurations deemed feasible while they are not. In this work, in order to minimize the rate of false positives, we propose the use of a measure of the uncertainty of the prediction to drop it when the uncertainty is too high, and rely instead on schedulability analysis. In this hybrid verification strategy, the clear-cut decisions are taken by ML, while the more difficult ones are taken by a conventional schedulability analysis. Importantly, the trade-off achieved between prediction accuracy and computing time can be controlled. We apply this hybrid verification method to Ethernet TSN networks and obtain, for instance in the case of priority scheduling with 8 traffic classes, a 99% prediction accuracy with a speedup factor of 5.7 with respect to conventional schedulability analysis and a reduction of 46% of the false positives compared to ML alone. [less ▲]

Detailed reference viewed: 155 (24 UL)
Full Text
Peer Reviewed
See detailAVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations
Liu, Kui UL; Koyuncu, Anil UL; Dongsun, Kim et al

in The 26th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER-2019) (2019, February 24)

Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained ... [more ▼]

Fix pattern-based patch generation is a promising direction in Automated Program Repair (APR). Notably, it has been demonstrated to produce more acceptable and correct patches than the patches obtained with mutation operators through genetic programming. The performance of pattern-based APR systems, however, depends on the fix ingredients mined from fix changes in development histories. Unfortunately, collecting a reliable set of bug fixes in repositories can be challenging. In this paper, we propose to investigate the possibility in an APR scenario of leveraging code changes that address violations by static bug detection tools. To that end, we build the AVATAR APR system, which exploits fix patterns of static analysis violations as ingredients for patch generation. Evaluated on the Defects4J benchmark, we show that, assuming a perfect localization of faults, AVATAR can generate correct patches to fix 34/39 bugs. We further find that AVATAR yields performance metrics that are comparable to that of the closely-related approaches in the literature. While AVATAR outperforms many of the state-of-the-art pattern-based APR systems, it is mostly complementary to current approaches. Overall, our study highlights the relevance of static bug finding tools as indirect contributors of fix ingredients for addressing code defects identified with functional test cases. [less ▲]

Detailed reference viewed: 132 (12 UL)
Full Text
Peer Reviewed
See detailShould You Consider Adware as Malware in Your Study?
Gao, Jun UL; Li, Li; Kong, Pingfan UL et al

in 26th edition of the IEEE International Conference on Software Analysis, Evolution and Reengineering (2019, February 24)

Empirical validations of research approaches eventually require a curated ground truth. In studies related to Android malware, such a ground truth is built by leveraging Anti-Virus (AV) scanning reports ... [more ▼]

Empirical validations of research approaches eventually require a curated ground truth. In studies related to Android malware, such a ground truth is built by leveraging Anti-Virus (AV) scanning reports which are often provided free through online services such as VirusTotal. Unfortunately, these reports do not offer precise information for appropriately and uniquely assigning classes to samples in app datasets: AV engines indeed do not have a consensus on specifying information in labels. Furthermore, labels often mix information related to families, types, etc. In particular, the notion of “adware” is currently blurry when it comes to maliciousness. There is thus a need to thoroughly investigate cases where adware samples can actually be associated with malware (e.g., because they are tagged as adware but could be considered as malware as well). In this work, we present a large-scale analytical study of Android adware samples to quantify to what extent “adware should be considered as malware”. Our analysis is based on the Androzoo repository of 5 million apps with associated AV labels and leverages a state-of-the-art label harmonization tool to infer the malicious type of apps before confronting it against the ad families that each adware app is associated with. We found that all adware families include samples that are actually known to implement specific malicious behavior types. Up to 50% of samples in an ad family could be flagged as malicious. Overall the study demonstrates that adware is not necessarily benign. [less ▲]

Detailed reference viewed: 125 (12 UL)
Full Text
Peer Reviewed
See detailRobust Design of Power Minimizing Symbol-Level Precoder under Channel Uncertainty
Haqiqatnejad, Alireza UL; Kayhan, Farbod UL; Ottersten, Björn UL

in IEEE Global Communications Conference (GLOBECOM), Abu Dhabi 9-13 December 2018 (2019, February 21)

In this paper, we investigate the downlink transmission of a multiuser multiple-input single-output (MISO) channel under a symbol-level precoding (SLP) scheme, having imperfect channel knowledge at the ... [more ▼]

In this paper, we investigate the downlink transmission of a multiuser multiple-input single-output (MISO) channel under a symbol-level precoding (SLP) scheme, having imperfect channel knowledge at the transmitter. In defining the SLP design problem, a general category of constructive interference regions (CIR) called distance preserving CIR (DPCIR) is adopted. In particular, we are interested in a robust SLP design minimizing the total transmit power subject to individual quality-of-service (QoS) requirements. We consider two common models for the channel uncertainty region, namely, spherical (norm-bounded) and stochastic. For the spherical uncertainty model, a worst-case robust precoder is proposed, while for the stochastically known uncertainties, we derive a convex optimization problem with probabilistic constraints. We simulate the performance of the proposed robust approaches, and compare them with the existing methods. Through the simulation results, we also show that there is an essential trade-off between the two robust approaches. [less ▲]

Detailed reference viewed: 101 (14 UL)
Full Text
Peer Reviewed
See detailCharacterizations of idempotent n-ary uninorms
Devillet, Jimmy UL; Kiss, Gergely; Marichal, Jean-Luc UL

in 38th Linz Seminar on Fuzzy Set Theory (2019, February 05)

In this paper we provide a characterization of the class of idempotent n-ary uninorms on a given chain. When the chain is finite, we also provide anaxiomatic characterization of the latter class by means ... [more ▼]

In this paper we provide a characterization of the class of idempotent n-ary uninorms on a given chain. When the chain is finite, we also provide anaxiomatic characterization of the latter class by means of four conditions only: associativity, quasitriviality, symmetry, and nondecreasing monotonicity. In particular, we show that associativity can be replaced with bisymmetry in this axiomatization. [less ▲]

Detailed reference viewed: 77 (18 UL)
Full Text
Peer Reviewed
See detailA View-invariant Framework for Fast Skeleton-based Action Recognition Using a Single RGB Camera
Ghorbel, Enjie UL; Papadopoulos, Konstantinos UL; Baptista, Renato UL et al

in 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Prague, 25-27 February 2018 (2019, February)

View-invariant action recognition using a single RGB camera represents a very challenging topic due to the lack of 3D information in RGB images. Lately, the recent advances in deep learning made it ... [more ▼]

View-invariant action recognition using a single RGB camera represents a very challenging topic due to the lack of 3D information in RGB images. Lately, the recent advances in deep learning made it possible to extract a 3D skeleton from a single RGB image. Taking advantage of this impressive progress, we propose a simple framework for fast and view-invariant action recognition using a single RGB camera. The proposed pipeline can be seen as the association of two key steps. The first step is the estimation of a 3D skeleton from a single RGB image using a CNN-based pose estimator such as VNect. The second one aims at computing view-invariant skeleton-based features based on the estimated 3D skeletons. Experiments are conducted on two well-known benchmarks, namely, IXMAS and Northwestern-UCLA datasets. The obtained results prove the validity of our concept, which suggests a new way to address the challenge of RGB-based view-invariant action recognition. [less ▲]

Detailed reference viewed: 203 (21 UL)
Full Text
Peer Reviewed
See detailReal-time attack detection on robot cameras: A self-driving car application
Lagraa, Sofiane UL; Cailac, Maxime; Rivera, Sean UL et al

in International Conference on Robotic Computing (2019, February)

The Robot Operating System (ROS) are being deployed for multiple life critical activities such as self-driving cars, drones, and industries. However, the security has been persistently neglected ... [more ▼]

The Robot Operating System (ROS) are being deployed for multiple life critical activities such as self-driving cars, drones, and industries. However, the security has been persistently neglected, especially the image flows incoming from camera robots. In this paper, we perform a structured security assessment of robot cameras using ROS. We points out a relevant number of security flaws that can be used to take over the flows incoming from the robot cameras. Furthermore, we propose an intrusion detection system to detect abnormal flows. Our defense approach is based on images comparisons and unsupervised anomaly detection method. We experiment our approach on robot cameras embedded on a self-driving car. [less ▲]

Detailed reference viewed: 140 (15 UL)
Full Text
Peer Reviewed
See detailROSploit: Cybersecurity tool for ROS
Rivera, Sean UL; Lagraa, Sofiane UL; State, Radu UL

in International Conference on Robotic Computing (2019, February)

Abstract—Robotic Operating System(ROS) security research is currently in a preliminary state, with limited research in tools or models. Considering the trend of digitization of robotic systems, this lack ... [more ▼]

Abstract—Robotic Operating System(ROS) security research is currently in a preliminary state, with limited research in tools or models. Considering the trend of digitization of robotic systems, this lack of foundational knowledge increases the potential threat posed by security vulnerabilities in ROS. In this article, we present a new tool to assist further security research in ROS, ROSploit. ROSploit is a modular two-pronged offensive tool covering both reconnaissance and exploitation of ROS systems, designed to assist researchers in testing exploits for ROS. [less ▲]

Detailed reference viewed: 108 (1 UL)
Full Text
Peer Reviewed
See detailAssessing the impact of attacks on OPC-UA applications in the Industry 4.0 era
Polge, Julien UL; Robert, Jérémy UL; Le Traon, Yves UL

in 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, 11-14 January 2019 (2019, January 11)

Detailed reference viewed: 103 (13 UL)
Full Text
Peer Reviewed
See detailSimulation-based Optimisation Of Selective Laser Sintering/Melting Process
Kabore, Brice Wendlassida UL; Peters, Bernhard UL

in Euro PM2019 Congress Proceedings (2019)

In order to adapt Selective Laser Sintering (SLS) and Melting (SLM) to final products and volume production, many scientists have turned to statistical analysis for quality and process stability. Most of ... [more ▼]

In order to adapt Selective Laser Sintering (SLS) and Melting (SLM) to final products and volume production, many scientists have turned to statistical analysis for quality and process stability. Most of which are based on extensive experiments aiming at finding statistical correlations between input parameters such as layer thickness, orientation, scan speed, powder bed temperature, laser power... and resulting strength and residual stress of the manufactured part. However, the rise of computer simulation based on mathematical models allows predictions at a much lower cost. Mathematical modelling of SLS/SLM involves molecular level thermodynamics and thermo-mechanical behaviour of the powder material. In this study, we employ the newly developed Extended Discrete Element Model to reproduce the SLS process including the mechanisms of sintering and the evolution of fracture properties and self-supporting ability. Results show that such microscale model offers high precision and flexibility for finding optimal process parameters. [less ▲]

Detailed reference viewed: 25 (7 UL)
Full Text
Peer Reviewed
See detailA Machine Learning-Based Approach for Demarcating Requirements in Textual Specifications
Abualhaija, Sallam UL; Arora, Chetan UL; Sabetzadeh, Mehrdad UL et al

in 27th IEEE International Requirements Engineering Conference (RE'19) (2019)

A simple but important task during the analysis of a textual requirements specification is to determine which statements in the specification represent requirements. In principle, by following suitable ... [more ▼]

A simple but important task during the analysis of a textual requirements specification is to determine which statements in the specification represent requirements. In principle, by following suitable writing and markup conventions, one can provide an immediate and unequivocal demarcation of requirements at the time a specification is being developed. However, neither the presence nor a fully accurate enforcement of such conventions is guaranteed. The result is that, in many practical situations, analysts end up resorting to after-the-fact reviews for sifting requirements from other material in a requirements specification. This is both tedious and time-consuming. We propose an automated approach for demarcating requirements in free-form requirements specifications. The approach, which is based on machine learning, can be applied to a wide variety of specifications in different domains and with different writing styles. We train and evaluate our approach over an independently labeled dataset comprised of 30 industrial requirements specifications. Over this dataset, our approach yields an average precision of 81.2% and an average recall of 95.7%. Compared to simple baselines that demarcate requirements based on the presence of modal verbs and identifiers, our approach leads to an average gain of 16.4% in precision and 25.5% in recall. [less ▲]

Detailed reference viewed: 321 (25 UL)
Full Text
Peer Reviewed
See detailAssessing Transition-based Test Selection Algorithms at Google
Leong, Claire; Abhayendra, Singh; Papadakis, Mike UL et al

in International Conference on Software Engineering (ICSE) (2019)

Detailed reference viewed: 44 (3 UL)
Full Text
Peer Reviewed
See detailCHARIOT – Towards a Continuous High-level Adaptive Runtime Integration Testbed
Barnes, Chloe M.; Bellman, Kirstie; Botev, Jean UL et al

in Proceedings of the 13th IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO) (2019)

Detailed reference viewed: 44 (0 UL)
Full Text
Peer Reviewed
See detailAn Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier Ensembles
Kaiafas, Georgios UL; Hammerschmidt, Christian UL; Lagraa, Sofiane UL et al

in Kaiafas, Georgios; Hammerschmidt, Christian; State, Radu (Eds.) 16th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2019) (2019)

Detailed reference viewed: 30 (9 UL)
Full Text
Peer Reviewed
See detailDetecting misalignments between system security and user perceptions: a preliminary socio-technical analysis of an E2E email encryption system
Stojkovski, Borce UL; Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL

in 4th European Workshop on Usable Security - 2019 IEEE European Symposium on Security and Privacy Workshops (2019)

The set of impressions that a user has about distinct aspects of a system depends on the experience perceived while interacting with the system. Considering the effects of these interactions in a security ... [more ▼]

The set of impressions that a user has about distinct aspects of a system depends on the experience perceived while interacting with the system. Considering the effects of these interactions in a security analysis allows for a new class of security properties in terms of misalignments between the system’s technical guarantees and the user’s impressions of them. For instance, a property that we call “false sense of insecurity” identifies a situation in which a secure system injects uncertainty in users, thus improperly transmitting the degree of protection that it actually provides; another, which we call “false sense of security”, captures situations in which a system instills a false sense of security beyond what a technical analysis would justify. Both situations leave room for attacks. In this paper we propose a model to define and reason about such socio-technical misalignments. The model refers to and builds on the concept of security ceremonies, but relies on user experience notions and on security analysis techniques to put together the information needed to verify misalignment properties about user’s impressions and system’s security guarantees. We discuss the innovative insight of this pilot model for a holistic understanding of a system’s security. We also propose a formal model that can be used with existing model checkers for an automatic analysis of misalignments. We exemplify the approach by modelling one specific application for end-to-end email encryption within which we analyze a few instances of misalignment properties. [less ▲]

Detailed reference viewed: 107 (25 UL)
Full Text
Peer Reviewed
See detailComputational Arithmetic of Modular Forms
Wiese, Gabor UL

in Buyukasik, Engin; Inam, Ilker (Eds.) Notes from the International Autumn School on Computational Number Theory: Izmir Institute of Technology 2017 (2019)

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as ... [more ▼]

These course notes are about computing modular forms and some of their arithmetic properties. Their aim is to explain and prove the modular symbols algorithm in as elementary and as explicit terms as possible, and to enable the devoted student to implement it over any ring (such that a sufficient linear algebra theory is available in the chosen computer algebra system). The chosen approach is based on group cohomology and along the way the needed tools from homological algebra are provided. [less ▲]

Detailed reference viewed: 77 (1 UL)
Full Text
See detailThe LuNa Open Toolbox for the Luxembourgish Language
Sirajzade, Joshgun UL; Schommer, Christoph UL

in Perner, Petra (Ed.) Advances in Data Mining, Applications and Theoretical Aspects, Poster Proceedings 2019 (2019)

Despite some recent work, the ongoing research for the processing of Luxembourgish is still largely in its infancy. While a rich variety of linguistic processing tools exist, especially for English, these ... [more ▼]

Despite some recent work, the ongoing research for the processing of Luxembourgish is still largely in its infancy. While a rich variety of linguistic processing tools exist, especially for English, these software tools offer little scope for the Luxembourgish language. LuNa (a Tool for Luxembourgish National Corpus) is an Open Toolbox that allows researchers to annotate a text corpus written in Luxembourgish language and to build/query an annotated corpus. The aim of the paper is to demonstrate the components of the system and its usage for Machine Learning applications like Topic Modelling and Sentiment Detection. Overall, LuNa bases on a XML-database to store the data and to define the XML scheme, it offers a Graphical User Interface (GUI) for a linguistic data preparation such as tokenization, Part-Of-Speech tagging, and morphological analysis -- just to name a few. [less ▲]

Detailed reference viewed: 31 (6 UL)
Full Text
Peer Reviewed
See detailOn the use of supervised machine learning for assessing schedulability: application to Ethernet TSN
Mai, Tieu Long UL; Navet, Nicolas UL; Migge, Jörn

in 27th International Conference on Real-Time Networks and Systems (RTNS 2019) (2019)

In this work, we ask if Machine Learning (ML) can provide a viable alternative to conventional schedulability analysis to determine whether a real-time Ethernet network meets a set of timing constraints ... [more ▼]

In this work, we ask if Machine Learning (ML) can provide a viable alternative to conventional schedulability analysis to determine whether a real-time Ethernet network meets a set of timing constraints. Otherwise said, can an algorithm learn what makes it difficult for a system to be feasible and predict whether a configuration will be feasible without executing a schedulability analysis? To get insights into this question, we apply a standard supervised ML technique, k-nearest neighbors (k-NN), and compare its accuracy and running times against precise and approximate schedulability analyses developed in Network-Calculus. The experiments consider different TSN scheduling solutions based on priority levels combined for one of them with traffic shaping. The results obtained on an automotive network topology suggest that k-NN is efficient at predicting the feasibility of realistic TSN networks, with an accuracy ranging from 91.8% to 95.9% depending on the exact TSN scheduling mechanism and a speedup of 190 over schedulability analysis for 10^6 configurations. Unlike schedulability analysis, ML leads however to a certain rate "false positives'' (i.e., configurations deemed feasible while they are not). Nonetheless ML-based feasibility assessment techniques offer new trade-offs between accuracy and computation time that are especially interesting in contexts such as design-space exploration where false positives can be tolerated during the exploration process. [less ▲]

Detailed reference viewed: 49 (3 UL)
Full Text
Peer Reviewed
See detailConversational Interfaces for Explainable AI: A Human-Centered Approach
Jenzsch, Sophie; Höhn, Sviatlana UL; Hochgeschwender, Nico UL

in Proceedings of EXTRAAMAS 2019 (2019)

One major goal of Explainable Artificial Intelligence (XAI), in order to enhance trust in technology, is to enable the user to enquire information and explanation about its functionality directly from an ... [more ▼]

One major goal of Explainable Artificial Intelligence (XAI), in order to enhance trust in technology, is to enable the user to enquire information and explanation about its functionality directly from an intelligent agent. We propose conversational interfaces (CI) to be the perfect setting, since they are intuitive for humans and computationally processible. While there are many approaches addressing technical issues of this human-agent communication problem, the user perspective appears to be widely neglected. With the purpose of better requirement understanding and identification of implicit expectations from a human-centered view, a Wizard of Oz experiment was conducted, where participants tried to elicit basic information from a pretended artificial agent (What are your capabilities?). The hypothesis that users pursue fundamentally different strategies could be verified with the help of Conversation Analysis. Results illustrate the vast variety in human communication and disclose both requirements of users and obstacles in the implementation of protocols for interacting agents. Finally, we infer essential indications for the implementation of such a CI. [less ▲]

Detailed reference viewed: 60 (1 UL)