References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailIntegration of Learning Material into an Advanced Project-Based Learning Support Platform
Grevisse, Christian UL; Botev, Jean UL; Rothkugel, Steffen UL

in INTED2017 Proceedings (in press)

The retrieval of appropriate learning material from a heterogeneous, open corpus is a challenge in project-based learning. In addition, with the authoring of high-quality learning resources being a time ... [more ▼]

The retrieval of appropriate learning material from a heterogeneous, open corpus is a challenge in project-based learning. In addition, with the authoring of high-quality learning resources being a time-intensive task, reusability in different contexts is desirable. In this paper, we propose to move from a material-centric to a student-centric approach, integrating learning material in an advanced project-based learning support platform. Our ecosystem, relying on semantic web technologies, comprises plugins for common authoring and project realization tools. [less ▲]

Detailed reference viewed: 33 (8 UL)
Full Text
Peer Reviewed
See detailCustomary international law in the legal order of the European Union
Neframi, Eleftheria UL

in Lopez Escudero, Manuel (Ed.) THE EUROPEAN UNION'S EXTERNAL ACTION IN TIME OF CRISIS (in press)

Article 3(5) TEU does not unify the status of conventional and customary rules in the legal order of the European Union, but underlines their difference, by its nature as a provision regulating the ... [more ▼]

Article 3(5) TEU does not unify the status of conventional and customary rules in the legal order of the European Union, but underlines their difference, by its nature as a provision regulating the exercise of competences with the view to attain an ultimate, constitutional objective of being a credible actor in the international scene. [less ▲]

Detailed reference viewed: 91 (14 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 50 (3 UL)
Full Text
Peer Reviewed
See detailHybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems
Tsinos, Christos UL; Maleki, Sina UL; Chatzinotas, Symeon UL et al

in Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems (in press)

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the ... [more ▼]

Recent advances in Milimeter wave (mmWave) band mobile communications may provide solutions to the increasing traffic demand in modern wireless systems. Even though mmWave bands are scarcely occupied, the design of a prospect transceiver should guarantee the efficient coexistence with the incumbent services in these bands. To that end, in this paper, two underlay cognitive transceiver designs are proposed based on a hybrid Analog/Digital transceiver architecture that enables the mmWave spectrum access while controlling the interference to the incumbent users with low hardware complexity and power consumption. The first cognitive solution designs a codebook free cognitive hybrid pre-coder by maximizing the mutual information between its two ends subject to interference, power and hardware constraints related to the analog counterpart. The second solution is codebook based and exhibits less complexity than the first one at the cost of inferior spectral efficiency. A novel codebook free solution for the post-coder at the cognitive receiver part is further proposed, based on a hardware constrained Minimum Mean Square Error criterion. Simulations study the performance of both the proposed hybrid approaches and compare it to the one of a fully digital solution for typical wireless environments. [less ▲]

Detailed reference viewed: 87 (7 UL)
Full Text
Peer Reviewed
See detailRESTful API Automated Test Case Generation
Arcuri, Andrea UL

in IEEE International Conference on Software Quality, Reliability & Security (QRS) (in press)

Nowadays, web services play a major role in the development of enterprise applications. Many such applications are now developed using a service-oriented architecture (SOA), where microservices is one of ... [more ▼]

Nowadays, web services play a major role in the development of enterprise applications. Many such applications are now developed using a service-oriented architecture (SOA), where microservices is one of its most popular kind. A RESTful web service will provide data via an API over the network using HTTP, possibly interacting with databases and other web services. Testing a RESTful API poses challenges, as inputs/outputs are sequences of HTTP requests/responses to a remote server. Many approaches in the literature do black-box testing, as the tested API is a remote service whose code is not available. In this paper, we consider testing from the point of view of the developers, which do have full access to the code that they are writing. Therefore, we propose a fully automated white-box testing approach, where test cases are automatically generated using an evolutionary algorithm. Tests are rewarded based on code coverage and fault finding metrics. We implemented our technique in a tool called EVOMASTER, which is open-source. Experiments on two open-source, yet non-trivial RESTful services and an industrial one, do show that our novel technique did automatically find 38 real bugs in those applications. However, obtained code coverage is lower than the one achieved by the manually written test suites already existing in those services. Research directions on how to further improve such approach are therefore discussed. [less ▲]

Detailed reference viewed: 11 (1 UL)
Full Text
Peer Reviewed
See detailService Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL

in Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (in press)

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible ... [more ▼]

The knowledge of service performance of cloud providers is essential for cloud service users to choose the cloud services that meet their requirements. Instantaneous performance readings are accessible, but prolonged observations provide more reliable information. However, due to technical complexities and costs of monitoring services, it may not be possible to access the service performance of cloud provider for longer time durations. The extended observation periods are also a necessity for prediction of future behavior of services. These predictions have very high value for decision making both for private and corporate cloud users, as the uncertainty about the future performance of purchased cloud services is an important risk factor. Predictions can be used by specialized entities, such as cloud service brokers (CSBs) to optimally recommend cloud services to the cloud users. In this paper, we address the challenge of prediction. To achieve this, the current service performance patterns of cloud providers are analyzed and future performance of cloud providers are predicted using to the observed service performance data. It is done using two automatic predicting approaches: ARIMA and ETS. Error measures of entire service performance prediction of cloud providers are evaluated against the actual performance of the cloud providers computed over a period of one month. Results obtained in the performance prediction show that the methodology is applicable for both short- term and long-term performance prediction. [less ▲]

Detailed reference viewed: 35 (3 UL)
Full Text
Peer Reviewed
See detailArea exploration with a swarm of UAVs combining deterministic Chaotic Ant Colony Mobility with position MPC
Rosalie, Martin UL; Dentler, Jan Eric UL; Danoy, Grégoire UL et al

in 2017 International Conference on Unmanned Aircraft Systems (ICUAS) (in press)

The recent advances in Unmanned Aerial Vehicles (UAVs) technology permit to develop new usages for them. One of the current challenges is to operate UAVs as an autonomous swarm. In this domain we already ... [more ▼]

The recent advances in Unmanned Aerial Vehicles (UAVs) technology permit to develop new usages for them. One of the current challenges is to operate UAVs as an autonomous swarm. In this domain we already proposed a new mobility model using Ant Colony Algorithms combined with chaotic dynamics (CACOC) to enhance the coverage of an area by a swarm of UAVs. In this paper we propose to consider this mobility model as waypoints for real UAVs. A control model of the UAVs is deployed to test the efficiency of the coverage of an area by the swarm. We have tested our approach in a realistic robotics simulator (V-Rep) which is connected with ROS. We compare the performance in terms of coverage using several metrics to ensure that this mobility model is efficient for real UAVs. [less ▲]

Detailed reference viewed: 9 (1 UL)
Full Text
Peer Reviewed
See detailHistorical outline and chromatic properties of purpura rubra Tarentina and its potential identification with purple dye extracted from Bolinus brandaris
Meiers, Fabienne UL

in Enegren, Hedvig; Meo, Francesco (Eds.) Treasures from the Sea : Sea-Silk and Shell purple dye in antiquity. Proceedings from the International workshop, 26.-28.05. (in press)

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded ... [more ▼]

This paper presents a historical overview of the importance of the red dye found in spiny dye-murices (Bolinus brandaris) and its production in Taranto, one of the most industrious Greek colonies founded in southern Italy in the 8th century BC and renowned for its luxury products. Written evidence as well as numismatic and archaeological sources dating from the 5th century BC to the 5th century AD have been analysed in this context to identify purpura rubra Tarentina. In addition, the results of a series of dye experiments with hypobranchial glands from the same species are treated in order to detect chromatic properties and potential manufacturing processes for Tarentine Red. The methods for vatting the dye glands are discussed in relation to historical validity and chromatic outcome. To conclude, comparisons are drawn between the colour characteristics of Bolinus brandaris and Hexaplex trunculus (banded dye-murex), and the possibility of mixing both dyes is taken into consideration. The synthesis of historical and experimental approach finally shows that purpura rubra Tarentina can potentially be identified with purple dye extracted from Bolinus brandaris. [less ▲]

Detailed reference viewed: 66 (6 UL)
Full Text
Peer Reviewed
See detailComparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers
Wagle, Shyam Sharan UL; Guzek, Mateusz UL; Bouvry, Pascal UL et al

in Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers (in press)

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to ... [more ▼]

Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances while recommending cloud services to the cloud users, using all available data. In this paper, we compare our two approaches to do so: a min-max-min decomposition based on Intuitionistic Fuzzy Logic (IFL) and a Performance Heat Map technique, to evaluate the performance of commercially available cloud providers. While the IFL technique provides simple, total order of the evaluated CSPs, Performance Heat Map provides transparent and explanatory, yet consistent evaluation of service performance of commercially available CSPs. The identified drawbacks of the IFL technique are: 1) It does not return the accurate performance evaluation over multiple decision alternatives due to highly influenced by critical feedback of the evaluators; 2) Overall ranking of the CSPs is not as expected according to the performance measurement. As a result, we recommend to use performance Heat Map for this problem. [less ▲]

Detailed reference viewed: 24 (2 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 212 (3 UL)
Full Text
Peer Reviewed
See detailLes Trévires vus par le jésuite luxembourgeois Alexandre Wiltheim
Binsfeld, Andrea UL

in Hébert, Oriane; Pechoux, Ludivine (Eds.) Quand l’usage fait l’image. Les Gaulois, de la manipulation historique à l’archétype (in press)

Detailed reference viewed: 22 (2 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 110 (5 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 38 (9 UL)
Full Text
Peer Reviewed
See detailMany Independent Objective (MIO) Algorithm for Test Suite Generation
Arcuri, Andrea UL

in Symposium on Search-Based Software Engineering (SSBSE) (in press)

Automatically generating test suites is intrinsically a multi- objective problem, as any of the testing targets (e.g, statements to exe- cute or mutants to kill) is an objective on its own. Test suite ... [more ▼]

Automatically generating test suites is intrinsically a multi- objective problem, as any of the testing targets (e.g, statements to exe- cute or mutants to kill) is an objective on its own. Test suite generation has peculiarities that are quite di erent from other more regular optimi- sation problems. For example, given an existing test suite, one can add more tests to cover the remaining objectives. One would like the smallest number of small tests to cover as many objectives as possible, but that is a secondary goal compared to covering those targets in the rst place. Furthermore, the amount of objectives in software testing can quickly become unmanageable, in the order of (tens/hundreds of) thousands, es- pecially for system testing of industrial size systems. Traditional multi- objective optimisation algorithms can already start to struggle with just four or ve objectives to optimize. To overcome these issues, di erent techniques have been proposed, like for example the Whole Test Suite (WTS) approach and the Many-Objective Sorting Algorithm (MOSA). However, those techniques might not scale well to very large numbers of objectives and limited search budgets (a typical case in system test- ing). In this paper, we propose a novel algorithm, called Many Indepen- dent Objective (MIO) algorithm. This algorithm is designed and tailored based on the speci c properties of test suite generation. An empirical study, on a set of arti cial and actual software, shows that the MIO al- gorithm can achieve higher coverage compared to WTS and MOSA, as it can better exploit the peculiarities of test suite generation. [less ▲]

Detailed reference viewed: 10 (3 UL)
Full Text
Peer Reviewed
See detailAn Empirical Evaluation of Evolutionary Algorithms for Test Suite Generation
Campos, Jose; Ge, Yan; Fraser, Gordon et al

in Symposium on Search-Based Software Engineering (SSBSE) (in press)

Evolutionary algorithms have been shown to be effective at generating unit test suites optimised for code coverage. While many aspects of these algorithms have been evaluated in detail (e.g., test length ... [more ▼]

Evolutionary algorithms have been shown to be effective at generating unit test suites optimised for code coverage. While many aspects of these algorithms have been evaluated in detail (e.g., test length and different kinds of techniques aimed at improving performance, like seeding), the influence of the specific algorithms has to date seen less attention in the literature. As it is theoretically impossible to design an algorithm that is best on all possible problems, a common approach in software engineering problems is to first try a Genetic Algorithm, and only afterwards try to refine it or compare it with other algorithms to see if any of them is more suited for the addressed problem. This is particularly important in test generation, since recent work suggests that random search may in practice be equally effective, whereas the reformulation as a many-objective problem seems to be more effective. To shed light on the influence of the search algorithms, we empirically evaluate six different algorithms on a selection of non-trivial open source classes. Our study shows that the use of a test archive makes evolutionary algorithms clearly better than random testing, and it confirms that the many-objective search is the most effective. [less ▲]

Detailed reference viewed: 8 (1 UL)
Full Text
Peer Reviewed
See detailLe quotidien d’un poilu de la première guerre mondiale sur Facebook : nouvelle forme de médiation, nouvelle expérience ?
Schall, Céline UL; Vilatte, Jean-Christophe

in Les mondes de la médiation culturelle (in press)

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une ... [more ▼]

« En 2013, le Musée de la Grande Guerre du Pays de Meaux et l’agence de communication DDB ont élaboré une page Facebook d’un genre nouveau. Facebook 1914, le quotidien de la première guerre offre une forme de médiation a priori inédite pour un musée français. Elle présente l’histoire d’un personnage de fiction, Léon Vivien, qui raconte son quotidien lors de la première guerre mondiale, sur Facebook, comme si ce réseau social avait existé à cette époque. Cette contribution met en évidence certains des effets de sens de la page par une analyse sémiotique du dispositif et une analyse thématique de ses contenus. Nous questionnons ensuite cette « nouvelle » forme de médiation qui se dit « participante » et qui, en réalité, reste assez classique dans son contenu et sous-exploite le potentiel de Facebook. » [less ▲]

Detailed reference viewed: 19 (1 UL)
Full Text
Peer Reviewed
See detailLIPS vs MOSA: a Replicated Em- pirical Study on Automated Test Case Generation
Panichella, Annibale UL; Kifetew, Fitsum; Tonella, Paolo

in International Symposium on Search Based Software Engineering (SSBSE) 2017 (2017, September 09)

Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The ... [more ▼]

Replication is a fundamental pillar in the construction of scientific knowledge. Test data generation for procedural programs can be tackled using a single-target or a many-objective approach. The proponents of LIPS, a novel single-target test generator, conducted a preliminary empirical study to compare their approach with MOSA, an alternative many-objective test generator. However, their empirical investigation suffers from several external and internal validity threats, does not consider complex programs with many branches and does not include any qualitative analysis to interpret the results. In this paper, we report the results of a replication of the original study designed to address its major limitations and threats to validity. The new findings draw a completely different picture on the pros and cons of single-target vs many-objective approaches to test case generation. [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailIs Big Data Sufficient for a Reliable Detection of Non-Technical Losses?
Glauner, Patrick UL; Migliosi, Angelo UL; Meira, Jorge Augusto UL et al

in Proceedings of the 19th International Conference on Intelligent System Applications to Power Systems (ISAP 2017) (2017, September)

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to ... [more ▼]

Non-technical losses (NTL) occur during the distribution of electricity in power grids and include, but are not limited to, electricity theft and faulty meters. In emerging countries, they may range up to 40% of the total electricity distributed. In order to detect NTLs, machine learning methods are used that learn irregular consumption patterns from customer data and inspection results. The Big Data paradigm followed in modern machine learning reflects the desire of deriving better conclusions from simply analyzing more data, without the necessity of looking at theory and models. However, the sample of inspected customers may be biased, i.e. it does not represent the population of all customers. As a consequence, machine learning models trained on these inspection results are biased as well and therefore lead to unreliable predictions of whether customers cause NTL or not. In machine learning, this issue is called covariate shift and has not been addressed in the literature on NTL detection yet. In this work, we present a novel framework for quantifying and visualizing covariate shift. We apply it to a commercial data set from Brazil that consists of 3.6M customers and 820K inspection results. We show that some features have a stronger covariate shift than others, making predictions less reliable. In particular, previous inspections were focused on certain neighborhoods or customer classes and that they were not sufficiently spread among the population of customers. This framework is about to be deployed in a commercial product for NTL detection. [less ▲]

Detailed reference viewed: 23 (5 UL)
Full Text
Peer Reviewed
See detailWhat do we need to say about a design method?
Gericke, Kilian UL; Eckert, Claudia; Stacey, Martin

in Proceedings of the 21st International Conference on Engineering Design (2017, August)

Method development is one of the raisons d’etre of engineering design research and method uptake by industry is perceived as an important success criterion. This paper argues that one of the problems with ... [more ▼]

Method development is one of the raisons d’etre of engineering design research and method uptake by industry is perceived as an important success criterion. This paper argues that one of the problems with methods is the lack of clarity about what is actually proposed to industry and the academic community when a new method is put forward, in terms of how detailed, strict, precise and rigorous the method is and what it can deliver. This paper puts the concept of method in the context of related concepts and proposes a multi-level model of the elements of a method to argue that a contribution on each of these levels can be of value and that the introduction of methods can fail on each of these levels. Implications thereof for industry and academia are discussed, concluding that a clear description of methods and their intended use is important for enabling proper validation of each of the method’s elements and for communicating methods to academia and industry. [less ▲]

Detailed reference viewed: 11 (2 UL)
Full Text
Peer Reviewed
See detailSpatial PAPR Reduction in Symbol-level Precoding for the Multi-beam Satellite Downlink
Spano, Danilo UL; Alodeh, Maha UL; Chatzinotas, Symeon UL et al

in IEEE SPAWC 2017 (2017, July)

In this work, a novel symbol-level precoding scheme is proposed, for managing the multi-user interference in the forward downlink channel of a multi-beam satellite system. Besides exploiting the ... [more ▼]

In this work, a novel symbol-level precoding scheme is proposed, for managing the multi-user interference in the forward downlink channel of a multi-beam satellite system. Besides exploiting the constructive interference effect, the proposed scheme aims at improving the robustness of the transmitted signals to the non-linear distortions of practical satellite systems. This is done by reducing the imbalances between the instantaneous power transmitted by the multiple antennas, which are detrimental in non-linear systems. More specifically, this work proposes a symbol-level precoding scheme performing the minimization of the spatial peak-to-average power ratio, under Quality-of-Service constraints. An iterative algorithm is proposed to solve the related optimization problem. Numerical results are presented to assess the performance of the proposed scheme, which outperforms the state of the art symbol-level precoding techniques in terms of spatial peak-to-average power ratio across the transmitting antennas. [less ▲]

Detailed reference viewed: 31 (8 UL)
Full Text
Peer Reviewed
See detailPower Allocation for In-Band Full-Duplex Self-Backhauling
Lagunas, Eva UL; Lei, Lei UL; Maleki, Sina UL et al

in International Conference on Telecommunications and Signal Processing (TSP), Barcelona, Spain, July 2017 (2017, July)

Detailed reference viewed: 15 (3 UL)
Full Text
Peer Reviewed
See detailProceedings of International Conference on Software and Systems Process (ICSSP)
Kuhrmann, Marco; Diebold, Philipp; Münch, Jürgen et al

in Hybrid software and system development in practice: Waterfall, scrum, and beyond (2017, July)

Software and system development faces numerous challenges of rapidly changing markets. To address such challenges, companies and projects design and adopt specific development approaches by combining well ... [more ▼]

Software and system development faces numerous challenges of rapidly changing markets. To address such challenges, companies and projects design and adopt specific development approaches by combining well-structured comprehensive methods and flexible agile practices. Yet, the number of methods and practices is large, and available studies argue that the actual process composition is carried out in a fairly ad-hoc manner. The present paper reports on a survey on hybrid software development approaches. We study which approaches are used in practice, how different approaches are combined, and what contextual factors influence the use and combination of hybrid software development approaches. Our results from 69 study participants show a variety of development approaches used and combined in practice. We show that most combinations follow a pattern in which a traditional process model serves as framework in which several fine-grained (agile) practices are plugged in. We further show that hybrid software development approaches are independent from the company size and external triggers. We conclude that such approaches are the results of a natural process evolution, which is mainly driven by experience, learning, and pragmatism. [less ▲]

Detailed reference viewed: 18 (8 UL)
Full Text
Peer Reviewed
See detailASIMUT project: Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques
Bouvry, Pascal UL; Chaumette, Serge; Danoy, Grégoire UL et al

in DroNet'17 Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications (2017, June 23)

This document summarizes the activities and results of the ASIMUT project (Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques) carried out by the consortium ... [more ▼]

This document summarizes the activities and results of the ASIMUT project (Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques) carried out by the consortium composed of Thales, Fraunhofer IOSB, Fly-n-Sense, University of Bordeaux and University of Luxembourg. Funded by the European Defence Agency (EDA), the objectives of the ASIMUT project are to design, implement and validate algorithms that will allow the efficient usage of autonomous swarms of Unmanned Aerial Vehicles (UAVs) for surveillance missions. [less ▲]

Detailed reference viewed: 11 (2 UL)
Full Text
Peer Reviewed
See detailIndustry-academia collaborations in software engineering: an empirical analysis of challenges, patterns and anti-patterns in research projects
Garousi, Vahid UL; Felderer, Michael; Fernandes, João et al

in Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (2017, June 15)

Research collaboration between industry and academia supports improvement and innovation in industry and helps to ensure industrial relevance in academic research. However, many researchers and ... [more ▼]

Research collaboration between industry and academia supports improvement and innovation in industry and helps to ensure industrial relevance in academic research. However, many researchers and practitioners believe that the level of joint industry-academia collaboration (IAC) in software engineering (SE) research is still relatively low, compared to the amount of activity in each of the two communities. The goal of the empirical study reported in this paper is to exploratory characterize the state of IAC with respect to a set of challenges, patterns and anti-patterns identified by a recent Systematic Literature Review study. To address the above goal, we gathered the opinions of researchers and practitioners w.r.t. their experiences in IAC projects. Our dataset includes 47 opinion data points related to a large set of projects conducted in 10 different countries. We aim to contribute to the body of evidence in the area of IAC, for the benefit of researchers and practitioners in conducting future successful IAC projects in SE. As an output, the study presents a set of empirical findings and evidence-based recommendations to increase the success of IAC projects. [less ▲]

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailWhat industry wants from academia in software testing? Hearing practitioners’ opinions
Garousi, Vahid UL; Felderer, Michael; Kuhrmann, Marco et al

in Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (2017, June 15)

The level of industry-academia collaboration (IAC) in software engineering in general and in software testing in particular is quite low. Many researchers and practitioners are not collaborating with the ... [more ▼]

The level of industry-academia collaboration (IAC) in software engineering in general and in software testing in particular is quite low. Many researchers and practitioners are not collaborating with the “other side” to solve industrial problems. To shed light on the above issue and to characterize precisely what industry wants from academia in software testing, we solicited practitioners’ opinions on their challenges in different testing activities and also the particularly relevant topics that they want the research community to work on. This short paper aims to draw the community’s attention to the important issue of strengthening IAC with the hope of more IAC in software testing in the areas of most importance to the industry. [less ▲]

Detailed reference viewed: 8 (3 UL)
Full Text
Peer Reviewed
See detailChoosing the Right Test Automation Tool: a Grey Literature Review of Practitioner Sources
Raulamo-Jurvanen, Päivi; Mäntylä, Mika; Garousi, Vahid UL

in Choosing the Right Test Automation Tool: a Grey Literature Review of Practitioner Sources (2017, June 15)

Background: Choosing the right software test automation tool is not trivial, and recent industrial surveys indicate lack of right tools as the main obstacle to test automation. Aim: In this paper, we ... [more ▼]

Background: Choosing the right software test automation tool is not trivial, and recent industrial surveys indicate lack of right tools as the main obstacle to test automation. Aim: In this paper, we study how practitioners tackle the problem of choosing the right test automation tool. Method: We synthesize the “voice” of the practitioners with a grey literature review originating from 53 different companies. The industry experts behind the sources had roles such as “Software Test Automation Architect”, and “Principal Software Engineer”. Results: Common consensus about the important criteria exists but those are not applied systematically. We summarize the scattered steps from individual sources by presenting a comprehensive process for tool evaluation with 12 steps and a total of 14 different criteria for choosing the right tool. Conclusions: The practitioners tend to have general interest in and be influenced by related grey literature as about 78% of our sources had at least 20 backlinks (a reference comparable to a citation) while the variation was between 3 and 759 backlinks. There is a plethora of different software testing tools available, yet the practitioners seem to prefer and adopt the widely known and used tools. The study helps to identify the potential pitfalls of existing processes and opportunities for comprehensive tool evaluation. [less ▲]

Detailed reference viewed: 16 (3 UL)
Full Text
Peer Reviewed
See detailOn idempotent discrete uninorms
Couceiro, Miguel; Devillet, Jimmy UL; Marichal, Jean-Luc UL

in De Baets, Bernard; Torra, Vicenç; Mesiar, Radko (Eds.) Aggregation Functions in Theory and in Practice (2017, June)

In this paper we provide two axiomatizations of the class of idempotent discrete uninorms as conservative binary operations, where an operation is conservative if it always outputs one of its input values ... [more ▼]

In this paper we provide two axiomatizations of the class of idempotent discrete uninorms as conservative binary operations, where an operation is conservative if it always outputs one of its input values. More precisely we first show that the idempotent discrete uninorms are exactly those operations that are conservative, symmetric, and nondecreasing in each variable. Then we show that, in this characterization, symmetry can be replaced with both bisymmetry and existence of a neutral element. [less ▲]

Detailed reference viewed: 33 (8 UL)
Full Text
Peer Reviewed
See detailSpectrum Sharing in Hybrid Terrestrial-Satellite Backhaul Networks in the Ka Band
Artiga, Xavier; Vázquez, Miguel Ángel; Pérez-Neira, Ana et al

in European Conference on Networks and Communications (EuCNC), June 2017 (2017, June)

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailExperience-based guidelines for effective and efficient data extraction in systematic reviews in software engineering
Garousi, Vahid UL; Felderer, Michael

in Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (2017, June)

To systematically collect evidence and to structure a given area in software engineering (SE), Systematic Literature Reviews (SLR) and Systematic Mapping (SM) studies have become common. Data extraction ... [more ▼]

To systematically collect evidence and to structure a given area in software engineering (SE), Systematic Literature Reviews (SLR) and Systematic Mapping (SM) studies have become common. Data extraction is one of the main phases (activities) when conducting an SM or an SLR, whose objective is to extract required data from the primary studies and to accurately record the information researchers need to answer the questions of the SM/SLR study. Based on experience in a large number of SM/SLR studies, we and many other researchers have found the data extraction in SLRs to be time consuming and error-prone, thus raising the real need for heuristics and guidelines for effective and efficient data extraction in these studies, especially to be learnt by junior and young researchers. As a ‘guideline’ paper, this paper contributes a synthesized list of challenges usually faced during SLRs’ data extraction phase and the corresponding solutions (guidelines). For our synthesis, we consider two data sources: (1) the pool of 16 SLR studies in which the authors have been involved in, as well as (2) a review of challenges and guidelines in the existing literature. Our experience in utilizing the presented guidelines in the near past have helped our junior colleagues to conduct data extractions more effectively and efficiently. [less ▲]

Detailed reference viewed: 38 (7 UL)
Full Text
Peer Reviewed
See detailAn Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption
Titcheu Chekam, Thierry UL; Papadakis, Mike UL; Le Traon, Yves UL et al

in International Conference on Software Engineering (ICSE 2017) (2017, May 28)

Many studies suggest using coverage concepts, such as branch coverage, as the starting point of testing, while others as the most prominent test quality indicator. Yet the relationship between coverage ... [more ▼]

Many studies suggest using coverage concepts, such as branch coverage, as the starting point of testing, while others as the most prominent test quality indicator. Yet the relationship between coverage and fault-revelation remains unknown, yielding uncertainty and controversy. Most previous studies rely on the Clean Program Assumption, that a test suite will obtain similar coverage for both faulty and fixed (‘clean’) program versions. This assumption may appear intuitive, especially for bugs that denote small semantic deviations. However, we present evidence that the Clean Program Assumption does not always hold, thereby raising a critical threat to the validity of previous results. We then conducted a study using a robust experimental methodology that avoids this threat to validity, from which our primary finding is that strong mutation testing has the highest fault revelation of four widely-used criteria. Our findings also revealed that fault revelation starts to increase significantly only once relatively high levels of coverage are attained. [less ▲]

Detailed reference viewed: 107 (11 UL)
Full Text
Peer Reviewed
See detailPETrA: a software-based tool for estimating the energy profile of Android applications
Di Nucci, Dario; Palomba, Fabio; Prota, Antonio et al

in 39th International Conference on Software Engineering (ICSE) 2017 (2017, May 24)

Energy efficiency is a vital characteristic of any mobile application, and indeed is becoming an important factor for user satisfaction. For this reason, in recent years several approaches and tools for ... [more ▼]

Energy efficiency is a vital characteristic of any mobile application, and indeed is becoming an important factor for user satisfaction. For this reason, in recent years several approaches and tools for measuring the energy consumption of mobile devices have been proposed. Hardware-based solutions are highly precise, but at the same time they require costly hardware toolkits. Model-based techniques require a possibly difficult calibration of the parameters needed to correctly create a model on a specific hardware device. Finally, software-based solutions are easier to use, but they are possibly less precise than hardware-based solution. In this demo, we present PETrA, a novel software-based tool for measuring the energy consumption of Android apps. With respect to other tools, PETrA is compatible with all the smartphones with Android 5.0 or higher, not requiring any device specific energy profile. We also provide evidence that our tool is able to perform similarly to hardware-based solutions. [less ▲]

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailJava Unit Testing Tool Competition — Fifth Round
Panichella, Annibale UL; Urko, Rueda

in 10th International Workshop on Search- Based Software Testing (SBST) 2017 (2017, May 22)

After four successful JUnit tool competitions, we report on the achievements of a new Java Unit Testing Tool Competition. This 5th contest introduces statistical analyses in the benchmark infrastructure ... [more ▼]

After four successful JUnit tool competitions, we report on the achievements of a new Java Unit Testing Tool Competition. This 5th contest introduces statistical analyses in the benchmark infrastructure and has been validated with significance against the results of the previous 4th edition. Overall, the competition evaluates four automated JUnit testing tools taking as baseline human written test cases from real projects. The paper details the modifications performed to the methodology and provides full results of the competition. [less ▲]

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailEuphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware
Hurier, Médéric UL; Suarez-Tangil, Guillermo; Dash, Santanu Kumar et al

in MSR 2017 (2017, May 21)

Android malware is now pervasive and evolving rapidly. Thousands of malware samples are discovered every day with new models of attacks. The growth of these threats has come hand in hand with the ... [more ▼]

Android malware is now pervasive and evolving rapidly. Thousands of malware samples are discovered every day with new models of attacks. The growth of these threats has come hand in hand with the proliferation of collective repositories sharing the latest specimens. Having access to a large number of samples opens new research directions aiming at efficiently vetting apps. However, automatically inferring a reference ground-truth from those repositories is not straightforward and can inadvertently lead to unforeseen misconceptions. On the one hand, samples are often mis-labeled as different parties use distinct naming schemes for the same sample. On the other hand, samples are frequently mis-classified due to conceptual errors made during labeling processes. In this paper, we analyze the associations between all labels given by different vendors and we propose a system called EUPHONY to systematically unify common samples into family groups. The key novelty of our approach is that no a-priori knowledge on malware families is needed. We evaluate our approach using reference datasets and more than 0.4 million additional samples outside of these datasets. Results show that EUPHONY provides competitive performance against the state-of-the-art. [less ▲]

Detailed reference viewed: 11 (5 UL)
Full Text
Peer Reviewed
See detailRule Compilation in Multi-Tenant Networks
Blaiech, Khalil; Hamadi, Salaheddine; Hommes, Stefan UL et al

in Rule Compilation in Multi-Tenant Networks (2017, May 18)

Detailed reference viewed: 22 (1 UL)
Full Text
Peer Reviewed
See detailLow Complexity Symbol-Level Design for Linear Precoding Systems
Krivochiza, Jevgenij UL; Kalantari, Ashkan UL; Chatzinotas, Symeon UL et al

in Heusdens, Richard; Weber, Jos H. (Eds.) PROCEEDINGS of the 2017 Symposium on Information Theory and Signal Processing in the Benelux (2017, May 11)

The practical utilization of the symbol-level precoding in MIMO systems is challenging since the implementation of the sophisticated optimization algorithms must be done with reasonable computational ... [more ▼]

The practical utilization of the symbol-level precoding in MIMO systems is challenging since the implementation of the sophisticated optimization algorithms must be done with reasonable computational resources. In the real implementation of MIMO precoding systems, the processing time for each set of symbols is a crucial parameter, especially in the high-throughput mode. In this work, a symbol-level optimization algorithm with reduced complexity is devised. Performance of a symbol-level precoder is shown to improve in terms of the processing times per set of symbols. [less ▲]

Detailed reference viewed: 30 (16 UL)
Full Text
Peer Reviewed
See detailEnergy Efficient Data Collection in Opportunistic Mobile Crowdsensing Architectures for Smart Cities
Capponi, Andrea UL; Fiandrino, Claudio UL; Kliazovich, Dzmitry UL et al

in 3rd IEEE INFOCOM Workshop on Smart Cites and Urban Computing (2017, May)

Smart cities employ latest information and communication technologies to enhance services for citizens. Sensing is essential to monitor current status of infrastructures and the environment. In Mobile ... [more ▼]

Smart cities employ latest information and communication technologies to enhance services for citizens. Sensing is essential to monitor current status of infrastructures and the environment. In Mobile Crowdsensing (MCS), citizens participate in the sensing process contributing data with their mobile devices such as smartphones, tablets and wearables. To be effective, MCS systems require a large number of users to contribute data. While several studies focus on developing efficient incentive mechanisms to foster user participation, data collection policies still require investigation. In this paper, we propose a novel distributed and energy-efficient framework for data collection in opportunistic MCS architectures. Opportunistic sensing systems require minimal intervention from the user side as sensing decisions are application- or device-driven. The proposed framework minimizes the cost of both sensing and reporting, while maximizing the utility of data collection and, as a result, the quality of contributed information. We evaluate performance of the framework with simulations, performed in a real urban environment and with a large number of participants. The simulation results verify cost-effectiveness of the framework and assess efficiency of the data generation process. [less ▲]

Detailed reference viewed: 77 (9 UL)
Full Text
Peer Reviewed
See detailSearch-driven String Constraint Solving for Vulnerability Detection
Thome, Julian UL; Shar, Lwin Khin UL; Bianculli, Domenico UL et al

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, May)

Constraint solving is an essential technique for detecting vulnerabilities in programs, since it can reason about input sanitization and validation operations performed on user inputs. However, real-world ... [more ▼]

Constraint solving is an essential technique for detecting vulnerabilities in programs, since it can reason about input sanitization and validation operations performed on user inputs. However, real-world programs typically contain complex string operations that challenge vulnerability detection. State-of-the-art string constraint solvers support only a limited set of string operations and fail when they encounter an unsupported one; this leads to limited effectiveness in finding vulnerabilities. In this paper we propose a search-driven constraint solving technique that complements the support for complex string operations provided by any existing string constraint solver. Our technique uses a hybrid constraint solving procedure based on the Ant Colony Optimization meta-heuristic. The idea is to execute it as a fallback mechanism, only when a solver encounters a constraint containing an operation that it does not support. We have implemented the proposed search-driven constraint solving technique in the ACO-Solver tool, which we have evaluated in the context of injection and XSS vulnerability detection for Java Web applications. We have assessed the benefits and costs of combining the proposed technique with two state-of-the-art constraint solvers (Z3-str2 and CVC4). The experimental results, based on a benchmark with 104 constraints derived from nine realistic Web applications, show that our approach, when combined in a state-of-the-art solver, significantly improves the number of detected vulnerabilities (from 4.7% to 71.9% for Z3-str2, from 85.9% to 100.0% for CVC4), and solves several cases on which the solver fails when used stand-alone (46 more solved cases for Z3-str2, and 11 more for CVC4), while still keeping the execution time affordable in practice. [less ▲]

Detailed reference viewed: 551 (58 UL)
Full Text
Peer Reviewed
See detailCost analysis of Smart Lighting Solutions for Smart Cities
Cacciatore, Giuseppe; Fiandrino, Claudio UL; Kliazovich, Dzmitry UL et al

in IEEE International Conference on Communications (ICC), Paris, France, 2017 (2017, May)

Lighting is an essential community service, but current implementations are not energy efficient and impact on the energy budget of the municipalities for at least 40\%. In this paper, we propose ... [more ▼]

Lighting is an essential community service, but current implementations are not energy efficient and impact on the energy budget of the municipalities for at least 40\%. In this paper, we propose heuristics and devise a comparison methodology for new smart lighting solutions in next generation smart cities. The proposed smart lighting techniques make use of Internet of Things (IoT) augmented lamppost, which save energy by turning off or dimming the light according to the presence of citizens. Assessing costs and benefits in adopting the new smart lighting solutions is a pillar step for municipalities to foster real implementation. For evaluation purposes, we have developed a custom simulator which enables the deployment of lampposts in realistic urban environments. The citizens travel on foot along the streets and trigger activation of the lampposts according to the proposed heuristics. For the city of Luxembourg, the results highlight that replacing all existing lamps with LEDs and dimming light intensity according to the presence of users nearby the lampposts is convenient and provides an economical return already after the first year of deployment. [less ▲]

Detailed reference viewed: 87 (8 UL)
Full Text
Peer Reviewed
See detailDifferentially Private Neighborhood-based Recommender Systems
Wang, Jun UL; Tang, Qiang

in IFIP Information Security & Privacy Conference (2017, May)

Privacy issues of recommender systems have become a hot topic for the society as such systems are appearing in every corner of our life. In contrast to the fact that many secure multi-party computation ... [more ▼]

Privacy issues of recommender systems have become a hot topic for the society as such systems are appearing in every corner of our life. In contrast to the fact that many secure multi-party computation protocols have been proposed to prevent information leakage in the process of recommendation computation, very little has been done to restrict the information leakage from the recommendation results. In this paper, we apply the differential privacy concept to neighborhood-based recommendation methods (NBMs) under a probabilistic framework. We first present a solution, by directly calibrating Laplace noise into the training process, to differential-privately find the maximum a posteriori parameters similarity. Then we connect differential privacy to NBMs by exploiting a recent observation that sampling from the scaled posterior distribution of a Bayesian model results in provably differentially private systems. Our experiments show that both solutions allow promising accuracy with a modest privacy budget, and the second solution yields better accuracy if the sampling asymptotically converges. We also compare our solutions to the recent differentially private matrix factorization (MF) recommender systems, and show that our solutions achieve better accuracy when the privacy budget is reasonably small. This is an interesting result because MF systems often offer better accuracy when differential privacy is not applied. [less ▲]

Detailed reference viewed: 24 (5 UL)
Full Text
Peer Reviewed
See detailA Guided Genetic Algorithm for Automated Crash Reproduction
Soltani, Mozhan; Panichella, Annibale UL; van Deursen, Arie

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, May)

To reduce the effort developers have to make for crash debugging, researchers have proposed several solutions for automatic failure reproduction. Recent advances proposed the use of symbolic execution ... [more ▼]

To reduce the effort developers have to make for crash debugging, researchers have proposed several solutions for automatic failure reproduction. Recent advances proposed the use of symbolic execution, mutation analysis, and directed model checking as underling techniques for post-failure analysis of crash stack traces. However, existing approaches still cannot reproduce many real-world crashes due to such limitations as environment dependencies, path explosion, and time complexity. To address these challenges, we present EvoCrash, a post-failure approach which uses a novel Guided Genetic Algorithm (GGA) to cope with the large search space characterizing real-world software programs. Our empirical study on three open-source systems shows that EvoCrash can replicate 41 (82%) of real-world crashes, 34 (89%) of which are useful reproductions for debugging purposes, outperforming the state-of-the-art in crash replication. [less ▲]

Detailed reference viewed: 63 (1 UL)
Full Text
Peer Reviewed
See detailCarrier Allocation for Hybrid Satellite-Terrestrial Backhaul Networks
Lagunas, Eva UL; Maleki, Sina UL; Lei, Lei UL et al

in ICC Workshop on Satellite Communications: Challenges and Integration in the 5G ecosystem, Paris, France, May 2017 (2017, May)

Detailed reference viewed: 25 (5 UL)
Full Text
Peer Reviewed
See detailUsing Selene to Verify your Vote in JCJ
Iovino, Vincenzo UL; Rial Duran, Alfredo UL; Roenne, Peter UL et al

in Workshop on Advances in Secure Electronic Voting (VOTING'17) (2017, April 07)

Detailed reference viewed: 13 (8 UL)
Full Text
See detailTo Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification
Pejo, Balazs UL; Tang, Qiang

in Fifth ACM International Workshop on Security in Cloud Computing, Abu Dhabi 2 April 2017 (2017, April 02)

In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their com- putations to third-party cloud servers. In order to protect service quality, the ... [more ▼]

In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their com- putations to third-party cloud servers. In order to protect service quality, the integrity of computation results need to be guaranteed. In this paper, we develop a game theoretic framework which helps the outsourcer to maximize its pay- o while ensuring the desired level of integrity for the out- sourced computation. We de ne two Stackelberg games and analyze the optimal setting's sensitivity for the parameters of the model. [less ▲]

Detailed reference viewed: 15 (3 UL)
Full Text
Peer Reviewed
See detailTopics and Research Directions for Symmetric Cryptography
Biryukov, Alex UL; Daemen, Joan; Lucks, Stefan et al

in Proceedings of Early Symmetric Crypto workshop, 2017 (2017, April)

This is a summary of the open discussion on future research topics for symmetric cryptography chaired by Stefan Lucks. During this session participants were suggesting topics of potential future interest.

Detailed reference viewed: 34 (5 UL)
Full Text
Peer Reviewed
See detailMechanical characterisation of alkali activated clay - based geopolymer binder made out of gravel wash mud
Thapa, Vishojit Bahadur UL; Waldmann, Danièle UL; Wagner, Jean-Frank et al

in Iacobescu, Remus Ion; Malfliet, Annelies (Eds.) Proceedings of the 5th International Slag Valorisation Symposium (2017, April)

One of the most promising cement alternatives are geopolymer cements. The term “geopolymer” was mentioned for the first time by Davidovits1 and classifies all forms of inorganic polymeric material ... [more ▼]

One of the most promising cement alternatives are geopolymer cements. The term “geopolymer” was mentioned for the first time by Davidovits1 and classifies all forms of inorganic polymeric material synthesised by chemical reaction of aluminosilicates and an alkaline activating solution. The production of geopolymer binder comprises in two main procedures: calcination and geopolymerisation. The synthesised geopolymer shows interesting characteristics like good mechanical properties, high strength and good durability. [less ▲]

Detailed reference viewed: 27 (6 UL)
Full Text
Peer Reviewed
See detailSummary of an Open Discussion on IoT and Lightweight Cryptography
Shamir, Adi; Biryukov, Alex UL; Perrin, Léo Paul UL

in Proceedings of Early Symmetric Crypto workshop, 2017 (2017, April)

This is a summary of the open discussion on IoT security and regulation which took place at the Early Symmetric Crypto (ESC) seminar. Participants have identified that IoT poses critical threat to ... [more ▼]

This is a summary of the open discussion on IoT security and regulation which took place at the Early Symmetric Crypto (ESC) seminar. Participants have identified that IoT poses critical threat to security and privacy. It was agreed that government regulation and dialogue of security researchers with engineers and manufacturers is necessary in order to find proper control mechanisms. [less ▲]

Detailed reference viewed: 76 (8 UL)
Full Text
Peer Reviewed
See detailWhen An Educational Ideology Travels: The Experience Of The New Math Reform In Luxembourg
Nadimi Amiri, Shaghayegh UL

in Mathematics Education and Life at Times of Crisis (2017, April)

Since 1958 a series of new reform programmes, known as “New Math reform” tried to fundamentally deconstruct the mathematics education of schools in the United States. This reform aimed to promote the ... [more ▼]

Since 1958 a series of new reform programmes, known as “New Math reform” tried to fundamentally deconstruct the mathematics education of schools in the United States. This reform aimed to promote the “problem-solving” abilities in students and was a means to modernise not just the school math education but also the idea of why students should learn mathematics. Later, the reform project travelled to Europe through the support of the OECD and some other international or European organisation. This paper briefly reviews the process of the adaptation of this reform project in Luxembourg during the 1960s and 1970s. The aim is to look at how the ideological background about mathematics education, and in general education, mattered in the preceding of this school reform. [less ▲]

Detailed reference viewed: 20 (9 UL)
Full Text
Peer Reviewed
See detailSensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements
Li, Daoyuan UL; Bissyande, Tegawendé François D Assise UL; Klein, Jacques UL et al

in The 32nd ACM Symposium on Applied Computing (SAC 2017) (2017, April)

As the concept of Internet of Things (IoT) develops, buildings are equipped with increasingly heterogeneous sensors to track building status as well as occupant activities. As users become more and more ... [more ▼]

As the concept of Internet of Things (IoT) develops, buildings are equipped with increasingly heterogeneous sensors to track building status as well as occupant activities. As users become more and more concerned with their privacy in buildings, explicit sensing techniques can lead to uncomfortableness and resistance from occupants. In this paper, we adapt a sensing by proxy paradigm that monitors building status and coarse occupant activities through agglomerative clustering of indoor temperature movements. Through extensive experimentation on 86 classrooms, offices and labs in a five-story school building in western Europe, we prove that indoor temperature movements can be leveraged to infer latent information about indoor environments, especially about rooms' relative physical locations and rough type of occupant activities. Our results evidence a cost-effective approach to extending commercial building control systems and gaining extra relevant intelligence from such systems. [less ▲]

Detailed reference viewed: 64 (12 UL)
Full Text
Peer Reviewed
See detailPower Allocation for Energy Efficiency Maximization in Downlink CoMP Systems With NOMA
Liu, Zhengxuan; Kang, Guixia; Lei, Lei UL et al

in IEEE Wireless Communications and Networking Conference (WCNC), 2017 (2017, March 19)

This paper investigates a power allocation problem for maximizing energy efficiency (EE) in downlink Coordinated Multi-Point (CoMP) systems with non-orthogonal multiple access (NOMA). First, users’ ... [more ▼]

This paper investigates a power allocation problem for maximizing energy efficiency (EE) in downlink Coordinated Multi-Point (CoMP) systems with non-orthogonal multiple access (NOMA). First, users’ achievable data rate and network throughput are analysed under three transmission schemes: 1) all users’ signals are jointly transmitted by coordinated base stations (BSs); 2) only cell-edge users’ signals are jointly transmitted by coordinated BSs; 3) each user’s signals are transmitted by only one BS. Next, we formulate EE maximization problems for the three schemes under the constraints of minimum users’ data rate and maximum BS transmit power. The considered problem is non-convex and hard to tackle. To address it, an iterative sub-optimal algorithm is proposed by adopting fractional programming and difference of convex programming. Numerical results show that the near optimality performance of EE can be achieved by using the proposed algorithm with advantages of fast convergence and low complexity. Three transmission schemes of NOMA have superior EE performance compared with conventional orthogonal multiple access scheme in the same CoMP networks. [less ▲]

Detailed reference viewed: 77 (26 UL)
Full Text
Peer Reviewed
See detailSpeeding-Up Mutation Testing via Data Compression and State Infection
Zhu, Qianqian; Panichella, Annibale UL; Zaidman, Andy

in IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) 2017 (2017, March 13)

Mutation testing is widely considered as a high-end test criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing ... [more ▼]

Mutation testing is widely considered as a high-end test criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, its scalability issue remains in practice. In this paper, we introduce a novel method to speed up mutation testing based on state infection information. In addition to filtering out uninfected test executions, we further select a subset of mutants and a subset of test cases to run leveraging data-compression techniques. In particular, we adopt Formal Concept Analysis (FCA) to group similar mutants together and then select test cases to cover these mutants. To evaluate our method, we conducted an experimental study on six open source Java projects. We used EvoSuite to automatically generate test cases and to collect mutation data. The initial results show that our method can reduce the execution time by 83.93% with only 0.257% loss in precision. [less ▲]

Detailed reference viewed: 5 (1 UL)
Full Text
See detailSystem Testing of Timing Requirements based on Use Cases and Timed Automata
Wang, Chunhui UL; Pastore, Fabrizio UL; Briand, Lionel UL

in 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), Tokyo 13-18 March 2017 (2017, March 13)

In the context of use-case centric development and requirements-driven testing, this paper addresses the problem of automatically deriving system test cases to verify timing requirements. Inspired by ... [more ▼]

In the context of use-case centric development and requirements-driven testing, this paper addresses the problem of automatically deriving system test cases to verify timing requirements. Inspired by engineering practice in an automotive software development context, we rely on an analyzable form of use case specifications and augment such functional descriptions with timed automata, capturing timing requirements, following a methodology aiming at minimizing modeling overhead. We automate the generation of executable test cases using a test strategy based on maximizing test suite diversity and building over the UPPAAL model checker. Initial empirical results based on an industrial case study provide evidence of the effectiveness of the approach. [less ▲]

Detailed reference viewed: 222 (17 UL)
Full Text
Peer Reviewed
See detailMusic and Social Health
Sagrillo, Damien UL

in Devosa, Iván; Maródi, Ágnes; Buzás, Zsuzsanna (Eds.) et al International HEART 2017 Conference Health – Economy – Art (2017, March 08)

Former German minister of the interior Otto Schily highlighted: “Anyone who closes music schools jeopardizes inner security.” In his large study at primary schools in Berlin at the end of the 1990th, Hans ... [more ▼]

Former German minister of the interior Otto Schily highlighted: “Anyone who closes music schools jeopardizes inner security.” In his large study at primary schools in Berlin at the end of the 1990th, Hans Günter Bastian found out that common music practice and extended music education can lead to more social competence. In my lecture, I will give three examples of how music making cannot only avoid violence and criminality, but can also contribute to well-being among like-minded people. 1) The movie The Choir (les choristes) is a perfect demonstration, how common singing is able to weld together an initial heterogenous group of difficult educable children living in institutions of care 2) El Sistema is a famous programme for children in Venezuela financed by the state with the main objective that “music has to be recognised as an agent of social development” as José Antonio Abreu, its initiator highlights. 3) In my last year’s lecture, I presented my mail choir with an age average beyond 70 years. Recently I published a study on interviews conducted with the choristers to find out their views of social well-being." [less ▲]

Detailed reference viewed: 4 (1 UL)
Full Text
Peer Reviewed
See detailFaster-than-Nyquist Spatiotemporal Symbol-level Precoding in the Downlink of Multiuser MISO Channels
Alodeh, Maha UL; Spano, Danilo UL; Chatzinotas, Symeon UL et al

in The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing (2017, March)

Detailed reference viewed: 24 (6 UL)
Full Text
Peer Reviewed
See detailIncremental Reconfiguration of Product Specific Use Case Models for Evolving Configuration Decisions
Hajri, Ines UL; Göknil, Arda UL; Briand, Lionel UL et al

in 23rd International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017) (2017, March)

[Context and motivation] Product Line Engineering (PLE) is increasingly common practice in industry to develop complex systems for multiple customers with varying needs. In many business contexts, use ... [more ▼]

[Context and motivation] Product Line Engineering (PLE) is increasingly common practice in industry to develop complex systems for multiple customers with varying needs. In many business contexts, use cases are central development artifacts for requirements engineering and system testing. In such contexts, use case configurators can play a significant role to capture variable and common requirements in Product Line (PL) use case models and to generate Product Specific (PS) use case models for each new customer in a product family. [Question/Problem] Although considerable research has been devoted to use case configurators, little attention has been paid to supporting the incremental reconfiguration of use case models with evolving configuration decisions. [Principal ideas/results] We propose, apply, and assess an incremental reconfiguration approach to support evolving configuration decisions in PL use case models. PS use case models are incrementally reconfigured by focusing only on the changed decisions and their side effects. In our prior work, we proposed and applied Product line Use case modeling Method (PUM) to support variability modeling in PL use case diagrams and specifications. We also developed a use case configurator, PUMConf, which interactively collects configuration decisions from analysts to generate PS use case models from PL models. Our approach is built on top of PUM and PUMConf. [Contributions] We provide fully automated tool support for incremental configuration as an extension of PUMConf. Our approach has been evaluated in an industrial case study in the automotive domain, which provided evidence it is practical and beneficial. [less ▲]

Detailed reference viewed: 129 (58 UL)
Full Text
Peer Reviewed
See detailImpact du mécanisme chaotique sur l’optimisation d’un modèle de mobilité pour un essaim de drones devant réaliser une couverture de zone
Rosalie, Martin UL; Danoy, Grégoire UL; Chaumette, Serge et al

in Falcon, Eric; Lefranc, Marc; Pétrélis, François (Eds.) et al Comptes-rendus de la 20e Rencontre du Non Linéaire (2017, March)

Solution of differential equations system can be chaotic attractors with various chaotic mechanisms. In this paper we highlight that the use of these chaotic mechanisms permits to enhance the ... [more ▼]

Solution of differential equations system can be chaotic attractors with various chaotic mechanisms. In this paper we highlight that the use of these chaotic mechanisms permits to enhance the diversification of metaheuristics. We applied our approach to the coverage problem using a swarm of UAVs where the diversification of an ant colony algorithm is enhanced by chaos coming from Ma system and Rössler system. [less ▲]

Detailed reference viewed: 21 (3 UL)
Full Text
Peer Reviewed
See detailLightweight Detection of Android-specific Code Smells: the aDoctor Project
Palomba, Fabio; Di Nucci, Dario; Panichella, Annibale UL et al

in Proceedings of the 39th International Conference on Software Engineering (ICSE 2017) (2017, February 21)

Code smells are symptoms of poor design solutions applied by programmers during the development of software systems. While the research community devoted a lot of effort to studying and devising ... [more ▼]

Code smells are symptoms of poor design solutions applied by programmers during the development of software systems. While the research community devoted a lot of effort to studying and devising approaches for detecting the traditional code smells defined by Fowler, little knowledge and support is available for an emerging category of Mobile app code smells. Recently, Reimann etal proposed a new catalogue of Android-specific code smells that may be a threat for the maintainability and the efficiency of Android applications. However, current tools working in the context of Mobile apps provide limited support and, more importantly, are not available for developers interested in monitoring the quality of their apps. To overcome these limitations, we propose a fully automated tool, coined aDoctor, able to identify 15 Android-specific code smells from the catalogue by Reimann et al. An empirical study conducted on the source code of 18 Android applications reveals that the proposed tool reaches, on average, 98% of precision and 98% of recall. We made aDoctor publicly available. [less ▲]

Detailed reference viewed: 51 (18 UL)
Full Text
Peer Reviewed
See detailSoftware-Based Energy Profiling of Android Apps: Simple, Efficient and Reliable?
Di Nucci, Dario; Palomba, Fabio; Prota, Antonio et al

in Proceedings of the 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017) (2017, February 21)

Modeling the power profile of mobile applications is a crucial activity to identify the causes behind energy leaks. To this aim, researchers have proposed hardware-based tools as well as model-based and ... [more ▼]

Modeling the power profile of mobile applications is a crucial activity to identify the causes behind energy leaks. To this aim, researchers have proposed hardware-based tools as well as model-based and software-based techniques to approximate the actual energy profile. However, all these solutions present their own advantages and disadvantages. Hardware-based tools are highly precise, but at the same time their use is bound to the acquisition of costly hardware components. Model-based tools require the calibration of parameters needed to correctly create a model on a specific hardware device. Software-based approaches do not need any hardware components, but they rely on battery measurements and, thus, they are hardware-assisted. These tools are cheaper and easier to use than hardware-based tools, but they are believed to be less precise. In this paper, we take a deeper look at the pros and cons of software-based solutions investigating to what extent their measurements depart from hardware-based solutions. To this aim, we propose a software-based tool named PETRA that we compare with the hardware-based MONSOON toolkit on 54 Android apps. The results show that PETRA performs similarly to MONSOON despite not using any sophisticated hardware components. In fact, in all the apps the mean relative error with respect to MONSOON is lower than 0.05. Moreover, for 95% of the analyzed methods the estimation error is within 5% of the actual values measured using the hardware-based toolkit. [less ▲]

Detailed reference viewed: 60 (23 UL)
Full Text
Peer Reviewed
See detailIntegration of sparse electrophysiological measurements with preoperative MRI using 3D surface estimation in deep brain stimulation surgery
Husch, Andreas Dominik UL; Gemmar, Peter; Thunberg, Johan UL et al

in Webster, Robert; Fei, Baowei (Eds.) Medical Imaging 2017: Image-Guided Procedures, Robotic Interventions, and Modeling (2017, February 14)

Intraoperative microelectrode recordings (MER) have been used for several decades to guide neurosurgeons during the implantation of Deep Brain Stimulation (DBS) electrodes, especially when targeting the ... [more ▼]

Intraoperative microelectrode recordings (MER) have been used for several decades to guide neurosurgeons during the implantation of Deep Brain Stimulation (DBS) electrodes, especially when targeting the subthalamic nucleus (STN) to suppress the symptoms of Parkinson’s Disease. The standard approach is to use an array of up to five MER electrodes in a fixed configuration. Interpretation of the recorded signals yields a spatiallyvery sparse set of information about the morphology of the respective brain structures in the targeted area. However, no aid is currently available for surgeons to intraoperatively integrate this information with other data available on the patient’s individual morphology (e.g. MR imaging data used for surgical planning). This integration might allow surgeons to better determine the most probable position of the electrodes within the target structure during surgery. This paper suggests a method for reconstructing a surface patch from the sparse MER dataset utilizing additional a-priori knowledge about the geometrical configuration of the measurement electrodes. The conventional representation of MER measurements as intervals of target region/non-target region is therefore transformed into an equivalent boundary set representation, allowing efficient point-based calculations. Subsequently, the problem is to integrate the resulting patch with a preoperative model of the target structure, which can be formulated as registration problem minimizing a distance measure between the two surfaces. When restricting this registration procedure to translations, which is reasonable given certain geometric considerations, the problem can be solved globally by employing an exhaustive search with arbitrary precision in polynomial time. The proposed method is demonstrated using bilateral STN/Substantia Nigra segmentation data from preoperative MRIs of 17 Patients with simulated MER electrode placement. When using simulated data of heavily perturbed electrodes and subsequent MER measuremen [less ▲]

Detailed reference viewed: 10 (0 UL)
Full Text
Peer Reviewed
See detailModel predictive control for cooperative control of space robots
Kannan, Somasundar UL; Sajadi Alamdari, Seyed Amin UL; Dentler, Jan Eric UL et al

in Model predictive control for cooperative control of space robots (2017, January)

The problem of Orbital Manipulation of Passive body is discussed here. Two scenarios including passive object rigidly attached to robotic servicers and passive body attached to servicers through ... [more ▼]

The problem of Orbital Manipulation of Passive body is discussed here. Two scenarios including passive object rigidly attached to robotic servicers and passive body attached to servicers through manipulators are discussed. The Model Predictive Control (MPC) technique is briefly presented and successfully tested through simulations on two cases of position control of passive body in the orbit. [less ▲]

Detailed reference viewed: 35 (3 UL)
Full Text
Peer Reviewed
See detailThe Justification of Tyrannicide in the Chronicle of Dalimil. The Czech Nobility as the “Mystical Body” of the Realm.
Vomacka, Eloïse UL

in Valdoliso, Covadonga (Ed.) Debuerit habere regnum. Deposing and Proclaiming Kings in the Middle Ages (2017)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailUnsupervised Vanishing Point Detection and Camera Calibration from a Single Manhattan Image with Radial Distortion
Goncalves Almeida Antunes, Michel UL; Barreto, Joao P.; Aouada, Djamila UL et al

in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017 (2017)

The article concerns the automatic calibration of a camera with radial distortion from a single image. It is known that, under the mild assumption of square pixels and zero skew, lines in the scene ... [more ▼]

The article concerns the automatic calibration of a camera with radial distortion from a single image. It is known that, under the mild assumption of square pixels and zero skew, lines in the scene project into circles in the image, and three lines suffice to calibrate the camera up to an ambiguity between focal length and radial distortion. The calibration results highly depend on accurate circle estimation, which is hard to accomplish, because lines tend to project into short circular arcs. To overcome this problem, we show that, given a short circular arc edge, it is possible to robustly determine a line that goes through the center of the corresponding circle. These lines, henceforth called Lines of Circle Centres (LCCs), are used in a new method that detects sets of parallel lines and estimates the calibration parameters, including the center and amount of distortion, focal length, and camera orientation with respect to the Manhattan frame. Extensive experiments in both semi-synthetic and real images show that our algorithm outperforms state- of-the-art approaches in unsupervised calibration from a single image, while providing more information. [less ▲]

Detailed reference viewed: 151 (17 UL)
Full Text
Peer Reviewed
See detailEnergy Optimization for Full-Duplex Self-Backhauled HetNet with Non-Orthogonal Multiple Access
Lei, Lei UL; Lagunas, Eva UL; Maleki, Sina UL et al

in International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, July 2017 (2017)

Detailed reference viewed: 10 (1 UL)
Full Text
Peer Reviewed
See detailMehrsprachigkeit in der juristischen Ausbildung an der Universität Luxemburg. Rechtswissenschaft trifft Mehrsprachigkeitsforschung
Uwera, Francine UL; Heuschling, Luc UL

in Warto, Patrick; Zumbach, Jörg; Lagodny, Otto (Eds.) et al Rechtdidaktik - Pflicht oder Kür? (2017)

Detailed reference viewed: 103 (29 UL)
Full Text
Peer Reviewed
See detailAn Industrial Evaluation of Unit Test Generation: Finding Real Faults in a Financial Application
Almasi, Moein; Hemmati, Hadi; Fraser, Gordon et al

in ACM/IEEE International Conference on Software Engineering (ICSE) (2017)

Automated unit test generation has been extensively studied in the literature in recent years. Previous studies on open source systems have shown that test generation tools are quite effective at ... [more ▼]

Automated unit test generation has been extensively studied in the literature in recent years. Previous studies on open source systems have shown that test generation tools are quite effective at detecting faults, but how effective and applicable are they in an industrial application? In this paper, we investigate this question using a life insurance and pension products calculator engine owned by SEB Life & Pension Holding AB Riga Branch. To study fault-finding effectiveness, we extracted 25 real faults from the version history of this software project, and applied two up-to-date unit test generation tools for Java, EvoSuite and Randoop, which implement search-based and feedback-directed random test generation, respectively. Automatically generated test suites detected up to 56.40% (EvoSuite) and 38.00% (Randoop) of these faults. The analysis of our results demonstrates challenges that need to be addressed in order to improve fault detection in test generation tools. In particular, classification of the undetected faults shows that 97.62% of them depend on either “specific primitive values” (50.00%) or the construction of “complex state configuration of objects” (47.62%). To study applicability, we surveyed the developers of the application under test on their experience and opinions about the test generation tools and the generated test cases. This leads to insights on requirements for academic prototypes for successful technology transfer from academic research to industrial practice, such as a need to integrate with popular build tools, and to improve the readability of the generated tests. [less ▲]

Detailed reference viewed: 195 (5 UL)
Full Text
Peer Reviewed
See detailWeak Interference Detection with Signal Cancellation in Satellite Communications
Politis, Christos UL; Maleki, Sina UL; Tsinos, Christos UL et al

in The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2017 (2017)

Interference is identified as a critical issue for satellite communication (SATCOM) systems and services. There is a growing concern in the satellite industry to manage and mitigate interference ... [more ▼]

Interference is identified as a critical issue for satellite communication (SATCOM) systems and services. There is a growing concern in the satellite industry to manage and mitigate interference efficiently. While there are efficient techniques to monitor strong interference in SATCOM, weak interference is not so easily detected because of its low interference to signal and noise ratio (ISNR). To address this issue, this paper proposes and develops a technique which takes place on-board the satellite by decoding the desired signal, removing it from the total received signal and applying an Energy Detector (ED) in the remaining signal for the detection of interference. Different from the existing literature, this paper considers imperfect signal cancellation, examining how the decoding errors affect the sensing performance, derives the expressions for the probability of false alarm and provides a set of simulations results, verifying the efficiency of the technique. [less ▲]

Detailed reference viewed: 99 (12 UL)
Full Text
Peer Reviewed
See detailA Simple and Correct Even-Odd Algorithm for the Point-in-Polygon Problem for Complex Polygons
Galetzka, Michael; Glauner, Patrick UL

in Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017), Volume 1: GRAPP (2017)

Determining if a point is in a polygon or not is used by a lot of applications in computer graphics, computer games and geoinformatics. Implementing this check is error-prone since there are many special ... [more ▼]

Determining if a point is in a polygon or not is used by a lot of applications in computer graphics, computer games and geoinformatics. Implementing this check is error-prone since there are many special cases to be considered. This holds true in particular for complex polygons whose edges intersect each other creating holes. In this paper we present a simple even-odd algorithm to solve this problem for complex polygons in linear time and prove its correctness for all possible points and polygons. We furthermore provide examples and implementation notes for this algorithm. [less ▲]

Detailed reference viewed: 59 (8 UL)
Full Text
Peer Reviewed
See detailFormally Verified Differential Dynamic Logic
Bohrer, Brandon; Rahli, Vincent UL; Vukotic, Ivana UL et al

in CPP 2017 (2017)

Detailed reference viewed: 75 (16 UL)
See detailLuxemburg, Brabant und die Karolinger. Versuch einer Neubewertung der Selbstdarstellung der beiden ersten Kaiser aus dem Hause Luxemburg
Vomacka, Eloïse UL; Margue, Michel UL

in Dolezalova, Eva (Ed.) Ověnčený slávou, láskou i pohrdáním. Jan Lucemburský a Karel IV. v historické paměti (2017)

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detail"Communauté du royaume" et affirmation de la noblesse dans les pays tchèques (XIIIe-XIVe siècles)
Vomacka, Eloïse UL

in Lachaud, Frédérique (Ed.) La « communauté du royaume » (Angleterre, Écosse, France, Empire, Scandinavie), de la fin du Xe siècle au début du XIVe siècle, théories et pratiques, Nancy – 6 novembre / 8 novembre 2014 (2017)

Detailed reference viewed: 21 (2 UL)
Full Text
Peer Reviewed
See detailFrom Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis
Huynen, Jean-Louis UL; Lenzini, Gabriele UL

in Proceedings of the 3rd International Conference on Information Systems Security and Privacy (2017)

Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied ... [more ▼]

Inspired by the root cause analysis procedures common in safety, we propose a methodology for a prospective and a retrospective analysis of security and a tool that implements it. When applied prospectively, the methodology guides analysts to assess socio-technical vulnerabilities in a system, helping them to evaluate their choices in designing security policies and controls. But the methodology works also retrospectively. It assists analysts in retrieving the causes of an observed socio-technical attack, guiding them to understand where the information security management of the system has failed. The methodology is tuned to find causes that root in the human-related factors that an attacher can exploit to execute its intrusion. [less ▲]

Detailed reference viewed: 60 (6 UL)
See detailL'incidence des lois de police étrangères sur l'activité bancaire
Kinsch, Patrick UL

in Le banquier luxembourgeois et le droit international privé (2017)

Detailed reference viewed: 6 (1 UL)
See detailDie deutschsprachige Übersetzung der Dalimil-Chronik. Ein Versuch der politischen Legitimation der städtischen Eliten im Böhmen der Luxemburger?
Vomacka, Eloïse UL

in Sieburg, Heinz (Ed.) Prag in der Zeit der Luxemburger. Literatur, religiöse Ideen und Herrschaftskulturen zwischen Bereicherung und Behauptung (2017)

Detailed reference viewed: 9 (0 UL)
Full Text
Peer Reviewed
See detailCross-factor analysis of software modeling practices versus practitioner demographics in the embedded software industry
Akdur, Deniz; Garousi, Vahid UL; Demirörs, Onur

in 6th Mediterranean Conference on Embedded Computing (MECO) (2017)

Software-intensive embedded systems have evolved to be essential tools of our lives. To cope with growing complexities in embedded software industry, software modeling and model-driven engineering (MDE ... [more ▼]

Software-intensive embedded systems have evolved to be essential tools of our lives. To cope with growing complexities in embedded software industry, software modeling and model-driven engineering (MDE) have become popular for design, development and testing of these systems. However, the usage of models in embedded software industry and the relevant practices usually vary since challenges, requirements and purposes differ among systems as well as among sectors. To understand the state-of-the-practice of software modeling in embedded systems industry, we designed and conducted a world-wide survey, which accepted 627 responses from 27 different countries. The goal of this paper is to present our work built on this survey to better understand and characterize the cross-factor analysis of software modeling versus practitioner demographics, e.g., degree of using software modeling versus target sectors of the products. [less ▲]

Detailed reference viewed: 77 (19 UL)
Full Text
Peer Reviewed
See detailEnhanced Trajectory-based Action Recognition using Human Pose
Papadopoulos, Konstantinos UL; Goncalves Almeida Antunes, Michel UL; Aouada, Djamila UL et al

in IEEE International Conference on Image Processing, Beijing 17-20 Spetember 2017 (2017)

Action recognition using dense trajectories is a popular concept. However, many spatio-temporal characteristics of the trajectories are lost in the final video representation when using a single Bag-of ... [more ▼]

Action recognition using dense trajectories is a popular concept. However, many spatio-temporal characteristics of the trajectories are lost in the final video representation when using a single Bag-of-Words model. Also, there is a significant amount of extracted trajectory features that are actually irrelevant to the activity being analyzed, which can considerably degrade the recognition performance. In this paper, we propose a human-tailored trajectory extraction scheme, in which trajectories are clustered using information from the human pose. Two configurations are considered; first, when exact skeleton joint positions are provided, and second, when only an estimate thereof is available. In both cases, the proposed method is further strengthened by using the concept of local Bag-of-Words, where a specific codebook is generated for each skeleton joint group. This has the advantage of adding spatial human pose awareness in the video representation, effectively increasing its discriminative power. We experimentally compare the proposed method with the standard dense trajectories approach on two challenging datasets. [less ▲]

Detailed reference viewed: 26 (18 UL)
Full Text
Peer Reviewed
See detailVideo-Based Feedback for Assisting Physical Activity
Baptista, Renato UL; Goncalves Almeida Antunes, Michel UL; Aouada, Djamila UL et al

in 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP) (2017)

In this paper, we explore the concept of providing feedback to a user moving in front of a depth camera so that he is able to replicate a specific template action. This can be used as a home based ... [more ▼]

In this paper, we explore the concept of providing feedback to a user moving in front of a depth camera so that he is able to replicate a specific template action. This can be used as a home based rehabilitation system for stroke survivors, where the objective is for patients to practice and improve their daily life activities. Patients are guided in how to correctly perform an action by following feedback proposals. These proposals are presented in a human interpretable way. In order to align an action that was performed with the template action, we explore two different approaches, namely, Subsequence Dynamic Time Warping and Temporal Commonality Discovery. The first method aims to find the temporal alignment and the second one discovers the interval of the subsequence that shares similar content, after which standard Dynamic Time Warping can be used for the temporal alignment. Then, feedback proposals can be provided in order to correct the user with respect to the template action. Experimental results show that both methods have similar accuracy rate and the computational time is a decisive factor, where Subsequence Dynamic Time Warping achieves faster results. [less ▲]

Detailed reference viewed: 89 (28 UL)
Full Text
Peer Reviewed
See detailYactul: An Extensible Game-Based Student Response Framework for Active Learning
Grevisse, Christian UL; Botev, Jean UL; Rothkugel, Steffen UL

in Ponencias del XVIII Encuentro Internacional Virtual Educa, Colombia 2017 (2017)

Student response systems as an active learning strategy have shown to be useful in different study domains. With the advent of gamification, these environments have become very popular to improve student ... [more ▼]

Student response systems as an active learning strategy have shown to be useful in different study domains. With the advent of gamification, these environments have become very popular to improve student engagement. However, existing solutions only provide a static set of activity types and limit their use to classrooms. In this paper, we present Yactul, an extensible game-based student response framework for active learning. Our ecosystem fosters continuous learning both in the collaborative setting of the classroom and the private study environment of the student. Our modular architecture enables a seamless integration of activities from a broad and extensible set. In addition, a mobile app for offline learning extends the experience outside the classroom and allows to replay quizzes anywhere and anytime, track the progress of an individual learner and suggest activities on topics that require more studying. [less ▲]

Detailed reference viewed: 8 (1 UL)
Full Text
Peer Reviewed
See detailThe Top 10 Topics in Machine Learning Revisited: A Quantitative Meta-Study
Glauner, Patrick UL; Du, Manxing UL; Paraschiv, Victor et al

in Proceedings of the 25th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2017) (2017)

Which topics of machine learning are most commonly addressed in research? This question was initially answered in 2007 by doing a qualitative survey among distinguished researchers. In our study, we ... [more ▼]

Which topics of machine learning are most commonly addressed in research? This question was initially answered in 2007 by doing a qualitative survey among distinguished researchers. In our study, we revisit this question from a quantitative perspective. Concretely, we collect 54K abstracts of papers published between 2007 and 2016 in leading machine learning journals and conferences. We then use machine learning in order to determine the top 10 topics in machine learning. We not only include models, but provide a holistic view across optimization, data, features, etc. This quantitative approach allows reducing the bias of surveys. It reveals new and up-to-date insights into what the 10 most prolific topics in machine learning research are. This allows researchers to identify popular topics as well as new and rising topics for their research. [less ▲]

Detailed reference viewed: 40 (4 UL)
Full Text
Peer Reviewed
See detailHigh-Precision Gestural Input for Immersive Large-Scale Distributed Virtual Environments
Botev, Jean UL; Rothkugel, Steffen UL

in Proceedings of the 8th ACM Multimedia Systems Conference (MMSys) (2017)

Detailed reference viewed: 9 (2 UL)
Full Text
Peer Reviewed
See detailAutomata Language Equivalence vs. Simulations for Model-based Mutant Equivalence: An Empirical Evaluation
Devroey, Xavier; Perrouin, Gilles UL; Papadakis, Mike UL et al

in 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017) (2017)

Detailed reference viewed: 18 (3 UL)
Full Text
Peer Reviewed
See detailDeepCity: A Feature Learning Framework for Mining Location Check-Ins
Pang, Jun UL; Zhang, Yang

in Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17) (2017)

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailEVOSUITE at the SBST 2017 Tool Competition
Fraser, Gordon; Rojas, José Miguel; Campos, José et al

in IEEE/ACM International Workshop on Search-Based Software Testing (SBST) (2017)

EVOSUITE is a search-based tool that automatically generates unit tests for Java code. This paper summarises the results and experiences of EVOSUITE’s participation at the fifth unit testing competition ... [more ▼]

EVOSUITE is a search-based tool that automatically generates unit tests for Java code. This paper summarises the results and experiences of EVOSUITE’s participation at the fifth unit testing competition at SBST 2017, where EVOSUITE achieved the highest overall score. [less ▲]

Detailed reference viewed: 13 (5 UL)
Full Text
Peer Reviewed
See detailTowards Security-aware Mutation Testing
Loise, Thomas; Devroey, Xavier; Perrouin, Gilles et al

in The 12th International Workshop on Mutation Analysis (Mutation 2017) (2017)

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailShould We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study
Wang, Jingyi; Sun, Jun; Yuan, Qixia UL et al

in Proceedings of 20th International Conference on Fundamental Approaches to Software Engineering (2017)

Detailed reference viewed: 21 (3 UL)
Full Text
Peer Reviewed
See detailPrivate API Access and Functional Mocking in Automated Unit Test Generation
Arcuri, Andrea UL; Fraser, Gordon; Just, Rene

in IEEE International Conference on Software Testing, Verification and Validation (ICST) (2017)

Not all object oriented code is easily testable: Dependency objects might be difficult or even impossible to instantiate, and object-oriented encapsulation makes testing potentially simple code difficult ... [more ▼]

Not all object oriented code is easily testable: Dependency objects might be difficult or even impossible to instantiate, and object-oriented encapsulation makes testing potentially simple code difficult if it cannot easily be accessed. When this happens, then developers can resort to mock objects that simulate the complex dependencies, or circumvent objectoriented encapsulation and access private APIs directly through the use of, for example, Java reflection. Can automated unit test generation benefit from these techniques as well? In this paper we investigate this question by extending the EvoSuite unit test generation tool with the ability to directly access private APIs and to create mock objects using the popular Mockito framework. However, care needs to be taken that this does not impact the usefulness of the generated tests: For example, a test accessing a private field could later fail if that field is renamed, even if that renaming is part of a semantics-preserving refactoring. Such a failure would not be revealing a true regression bug, but is a false positive, which wastes the developer’s time for investigating and fixing the test. Our experiments on the SF110 and Defects4J benchmarks confirm the anticipated improvements in terms of code coverage and bug finding, but also confirm the existence of false positives. However, by ensuring the test generator only uses mocking and reflection if there is no other way to reach some part of the code, their number remains small. [less ▲]

Detailed reference viewed: 36 (5 UL)
Full Text
Peer Reviewed
See detailControlled Homomorphic Encryption: Definition and Construction
Desmedt, Yvo; Iovino, Vincenzo UL; Persiano, Giuseppe et al

in FC 2017 International Workshops - WAHC'17 - 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography (2017)

In this work we put forth the notion of a Controllable Homomorphic Encryption scheme (CHES), a new primitive that includes features of both FHEs and FunctEs. In a CHES it is possible (similarly to a FHE ... [more ▼]

In this work we put forth the notion of a Controllable Homomorphic Encryption scheme (CHES), a new primitive that includes features of both FHEs and FunctEs. In a CHES it is possible (similarly to a FHE) to homomorphically evaluate a ciphertext Ct = Enc(m) and a circuit C therefore obtaining Enc(C(m)) but only if (similarly to a FunctE) a token for C has been received from the owner of the secret key. We discuss difficulties in constructing a CHES and then show a construction based on any FunctE. As a byproduct our CHES also represents a FunctE supporting the re-encryption functionality and in that respect improves existing solutions. [less ▲]

Detailed reference viewed: 40 (7 UL)
Full Text
Peer Reviewed
See detailGenerating Unit Tests with Structured System Interactions
Havrikov, Nikolas; Gambi, Alessio; Zeller, Andreas et al

in IEEE/ACM International Workshop on Automation of Software Test (AST) (2017)

There is a large body of work in the literature about automatic unit tests generation, and many successful results have been reported so far. However, current approaches target library classes, but not ... [more ▼]

There is a large body of work in the literature about automatic unit tests generation, and many successful results have been reported so far. However, current approaches target library classes, but not full applications. A major obstacle for testing full applications is that they interact with the environment. For example, they establish connections to remote servers. Thoroughly testing such applications requires tests that completely control the interactions between the application and its environment. Recent techniques based on mocking enable the generation of tests which include environment interactions; however, generating the right type of interactions is still an open problem. In this paper, we describe a novel approach which addresses this problem by enhancing search-based testing with complex test data generation. Experiments on an artificial system show that the proposed approach can generate effective unit tests. Compared with current techniques based on mocking, we generate more robust unit tests which achieve higher coverage and are, arguably, easier to read and understand. [less ▲]

Detailed reference viewed: 7 (1 UL)
Full Text
Peer Reviewed
See detailDEFORMATION TRANSFER OF 3D HUMAN SHAPES AND POSES ON MANIFOLDS
Shabayek, Abd El Rahman UL; Aouada, Djamila UL; Saint, Alexandre Fabian A UL et al

in IEEE International Conference on Image Processing, Beijing 17-20 Spetember 2017 (2017)

Detailed reference viewed: 23 (1 UL)
Full Text
Peer Reviewed
See detailCoded Caching and Storage Planning in Heterogeneous Networks
Vu, Thang Xuan UL; Chatzinotas, Symeon UL; Ottersten, Björn UL

in 2017 IEEE Wireless Communications and Networking Conference (WCNC) (2017)

Detailed reference viewed: 9 (1 UL)
Full Text
Peer Reviewed
See detailAssessing and Improving the Mutation Testing Practice of PIT
Laurent, Thomas; Papadakis, Mike UL; Kintis, Marinos UL et al

in 10th IEEE International Conference on Software Testing, Verification and Validation (2017)

Detailed reference viewed: 30 (2 UL)
Full Text
Peer Reviewed
See detailImproving Fault Localization for Simulink Models using Search-Based Testing and Prediction Models
Liu, Bing UL; Lucia, Lucia; Nejati, Shiva UL et al

in 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017) (2017)

One promising way to improve the accuracy of fault localization based on statistical debugging is to increase diversity among test cases in the underlying test suite. In many practical situations, adding ... [more ▼]

One promising way to improve the accuracy of fault localization based on statistical debugging is to increase diversity among test cases in the underlying test suite. In many practical situations, adding test cases is not a cost-free option because test oracles are developed manually or running test cases is expensive. Hence, we require to have test suites that are both diverse and small to improve debugging. In this paper, we focus on improving fault localization of Simulink models by generating test cases. We identify three test objectives that aim to increase test suite diversity. We use these objectives in a search-based algorithm to generate diversified but small test suites. To further minimize test suite sizes, we develop a prediction model to stop test generation when adding test cases is unlikely to improve fault localization. We evaluate our approach using three industrial subjects. Our results show (1) the three selected test objectives are able to significantly improve the accuracy of fault localization for small test suite sizes, and (2) our prediction model is able to maintain almost the same fault localization accuracy while reducing the average number of newly generated test cases by more than half. [less ▲]

Detailed reference viewed: 171 (14 UL)
Full Text
Peer Reviewed
See detailTowards Formal Security Analysis of Industrial Control Systems
Rocchetto, Marco UL

in Towards Formal Security Analysis of Industrial Control Systems (2017)

Detailed reference viewed: 3 (0 UL)
Full Text
Peer Reviewed
See detailA Search-based Testing Approach for XML Injection Vulnerabilities in Web Applications
Jan, Sadeeq UL; Nguyen, Duy Cu UL; Andrea, Arcuri UL et al

in 10th IEEE International Conference on Software Testing, Verification and validation (ICST 2017), Tokyo 13-18 March 2017 (2017)

In most cases, web applications communicate with web services (SOAP and RESTful). The former act as a front-end to the latter, which contain the business logic. A hacker might not have direct access to ... [more ▼]

In most cases, web applications communicate with web services (SOAP and RESTful). The former act as a front-end to the latter, which contain the business logic. A hacker might not have direct access to those web services (e.g., they are not on public networks), but can still provide malicious inputs to the web application, thus potentially compromising related services. Typical examples are XML injection attacks that target SOAP communications. In this paper, we present a novel, search-based approach used to generate test data for a web application in an attempt to deliver malicious XML messages to web services. <br />Our goal is thus to detect XML injection vulnerabilities in web applications. The proposed approach is evaluated on two studies, including an industrial web application with millions of users. Results show that we are able to effectively generate test data (e.g., input values in an HTML form) that detect such vulnerabilities. [less ▲]

Detailed reference viewed: 169 (20 UL)
Full Text
Peer Reviewed
See detailHow representative are EAP listening books of real lectures?
Deroey, Katrien UL

in Kemp, Jenny (Ed.) Proceedings of the 2015 BALEAP Conference. EAP in a rapidly changing landscape: Issues, challenges and solutions (2017)

Lecture listening and note-taking classes are a common component of EAP programmes and the list of listening course books is accordingly long. In deciding which of these to use, a key consideration is ... [more ▼]

Lecture listening and note-taking classes are a common component of EAP programmes and the list of listening course books is accordingly long. In deciding which of these to use, a key consideration is arguably whether it prepares students for lectures. In this regard, the availability of spoken academic corpora (e.g. BASE, MICASE, ELFA) and the research arising from these provides insights into lecture discourse that could be usefully integrated in such materials. However, as I will here show, the integration of corpus findings in EAP course books is surprisingly limited, raising the question of whether training based on such materials forms an adequate preparation for the demands of real lectures. I illustrate the gap between authentic lecture discourse and various current listening books by comparing the treatment of importance markers (e.g. the important point is; remember; I want to emphasize this) with their realisation in a lecture corpus. (Deroey and Taverniers 2012; Deroey 2013). Since these discourse organisational signals alert students to key points, being able to identify these markers may facilitate lecture comprehension and note-taking. Importance markers were retrieved from all 160 lectures of the British Academic Spoken English corpus using corpus-driven and corpus-based methods. The investigation revealed that while listening books typically highlight the importance of identifying the lecturer’s main points, students are either not or inadequately trained to recognise importance markers. Where examples of such markers are included, they are few and prototypical (e.g. the important point is). However, in the lecture corpus prototypical markers are relatively uncommon; instead less explicit, multifunctional markers such as ‘the thing is’ and ‘remember’ predominate. The findings suggest that much remains to be done to make lecture listening books more representative of real lectures. References Deroey, K. L. B. and Taverniers, M. 2012. “‘Just remember this’: Lexicogrammatical relevance markers in lectures”. English for Specific Purposes 31 (4): 221-233. Deroey, K. L. B. (2015). Marking importance in lectures: Interactive and textual orientation. Applied Linguistics, 36(1), 51-72. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailDistilling Provider-Independent Data for General Detection of Non-Technical Losses
Meira, Jorge Augusto UL; Glauner, Patrick UL; State, Radu UL et al

in Power and Energy Conference, Illinois 23-24 February 2017 (2017)

Non-technical losses (NTL) in electricity distribution are caused by different reasons, such as poor equipment maintenance, broken meters or electricity theft. NTL occurs especially but not exclusively in ... [more ▼]

Non-technical losses (NTL) in electricity distribution are caused by different reasons, such as poor equipment maintenance, broken meters or electricity theft. NTL occurs especially but not exclusively in emerging countries. Developed countries, even though usually in smaller amounts, have to deal with NTL issues as well. In these countries the estimated annual losses are up to six billion USD. These facts have directed the focus of our work to the NTL detection. Our approach is composed of two steps: 1) We compute several features and combine them in sets characterized by four criteria: temporal, locality, similarity and infrastructure. 2) We then use the sets of features to train three machine learning classifiers: random forest, logistic regression and support vector vachine. Our hypothesis is that features derived only from provider-independent data are adequate for an accurate detection of non-technical losses. [less ▲]

Detailed reference viewed: 62 (14 UL)
Full Text
Peer Reviewed
See detailA Combinatorial Solution to Non-Rigid 3D Shape-to-Image Matching
Bernard, Florian UL; Schmidt, Frank R.; Thunberg, Johan UL et al

in The proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017)

We propose a combinatorial solution for the problem of non-rigidly matching a 3D shape to 3D image data. To this end, we model the shape as a triangular mesh and allow each triangle of this mesh to be ... [more ▼]

We propose a combinatorial solution for the problem of non-rigidly matching a 3D shape to 3D image data. To this end, we model the shape as a triangular mesh and allow each triangle of this mesh to be rigidly transformed to achieve a suitable matching to the image. By penalising the distance and the relative rotation between neighbouring triangles our matching compromises between the image and the shape information. In this paper, we resolve two major challenges: Firstly, we address the resulting large and NP-hard combinatorial problem with a suitable graph-theoretic approach. Secondly, we propose an efficient discretisation of the unbounded 6-dimensional Lie group SE(3). To our knowledge this is the first combinatorial formulation for non-rigid 3D shape-to-image matching. In contrast to existing local (gradient descent) optimisation methods, we obtain solutions that do not require a good initialisation and that are within a bound of the optimal solution. We evaluate the proposed combinatorial method on the two problems of non-rigid 3D shape-to-shape and non-rigid 3D shape-to-image registration and demonstrate that it provides promising results. [less ▲]

Detailed reference viewed: 13 (4 UL)
Full Text
Peer Reviewed
See detailEffects of adsorptive properties of sludge on engineered nanoparticles (Ag, TiO2, ZnO) during anaerobic digestion process
Rahimi, Anahita; Hansen, Joachim UL

in Proceeding of Nanoimpact Conference, Nanomaterial Fate and Speciation in the Environment, Monte Verita 2017 (2017)

Detailed reference viewed: 16 (4 UL)
Full Text
Peer Reviewed
See detailA Tool for Energy Management and Cost Assessment of Pumps in Waste Water Treatment Plant
Torregrossa, Dario; Leopold, Ulrich; Hernández-Sancho, Francesc et al

in Data, Information and Knowledge Visualization in Decision Support Systems, 282 (2017)

Detailed reference viewed: 5 (3 UL)