Last 7 days
Bookmark and Share    
Full Text
Peer Reviewed
See detailPETrA: a software-based tool for estimating the energy profile of Android applications
Di Nucci, Dario; Palomba, Fabio; Prota, Antonio et al

in 39th International Conference on Software Engineering (ICSE) 2017 (2017, May 24)

Energy efficiency is a vital characteristic of any mobile application, and indeed is becoming an important factor for user satisfaction. For this reason, in recent years several approaches and tools for ... [more ▼]

Energy efficiency is a vital characteristic of any mobile application, and indeed is becoming an important factor for user satisfaction. For this reason, in recent years several approaches and tools for measuring the energy consumption of mobile devices have been proposed. Hardware-based solutions are highly precise, but at the same time they require costly hardware toolkits. Model-based techniques require a possibly difficult calibration of the parameters needed to correctly create a model on a specific hardware device. Finally, software-based solutions are easier to use, but they are possibly less precise than hardware-based solution. In this demo, we present PETrA, a novel software-based tool for measuring the energy consumption of Android apps. With respect to other tools, PETrA is compatible with all the smartphones with Android 5.0 or higher, not requiring any device specific energy profile. We also provide evidence that our tool is able to perform similarly to hardware-based solutions. [less ▲]

Detailed reference viewed: 14 (0 UL)
Full Text
Peer Reviewed
See detailJava Unit Testing Tool Competition — Fifth Round
Panichella, Annibale UL; Urko, Rueda

in 10th International Workshop on Search- Based Software Testing (SBST) 2017 (2017, May 22)

After four successful JUnit tool competitions, we report on the achievements of a new Java Unit Testing Tool Competition. This 5th contest introduces statistical analyses in the benchmark infrastructure ... [more ▼]

After four successful JUnit tool competitions, we report on the achievements of a new Java Unit Testing Tool Competition. This 5th contest introduces statistical analyses in the benchmark infrastructure and has been validated with significance against the results of the previous 4th edition. Overall, the competition evaluates four automated JUnit testing tools taking as baseline human written test cases from real projects. The paper details the modifications performed to the methodology and provides full results of the competition. [less ▲]

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailEuphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware
Hurier, Médéric UL; Suarez-Tangil, Guillermo; Dash, Santanu Kumar et al

in MSR 2017 (2017, May 21)

Android malware is now pervasive and evolving rapidly. Thousands of malware samples are discovered every day with new models of attacks. The growth of these threats has come hand in hand with the ... [more ▼]

Android malware is now pervasive and evolving rapidly. Thousands of malware samples are discovered every day with new models of attacks. The growth of these threats has come hand in hand with the proliferation of collective repositories sharing the latest specimens. Having access to a large number of samples opens new research directions aiming at efficiently vetting apps. However, automatically inferring a reference ground-truth from those repositories is not straightforward and can inadvertently lead to unforeseen misconceptions. On the one hand, samples are often mis-labeled as different parties use distinct naming schemes for the same sample. On the other hand, samples are frequently mis-classified due to conceptual errors made during labeling processes. In this paper, we analyze the associations between all labels given by different vendors and we propose a system called EUPHONY to systematically unify common samples into family groups. The key novelty of our approach is that no a-priori knowledge on malware families is needed. We evaluate our approach using reference datasets and more than 0.4 million additional samples outside of these datasets. Results show that EUPHONY provides competitive performance against the state-of-the-art. [less ▲]

Detailed reference viewed: 11 (5 UL)
Full Text
See detailDemountable construction enables structural diversity
Waldmann, Danièle UL

in Adjacent open access (2017)

Detailed reference viewed: 9 (2 UL)
Peer Reviewed
See detailBecoming entrepreneurs: From disadvantage to actualising an entrepreneurship
Iannone, Rosa Lisa UL

Scientific Conference (2017, May 12)

In response to existing gaps in relation to entrepreneurship by vulnerable populations, the paper presents a conceptual framework, encompassing social capital – more specifically, a network-based ... [more ▼]

In response to existing gaps in relation to entrepreneurship by vulnerable populations, the paper presents a conceptual framework, encompassing social capital – more specifically, a network-based understanding of social capital – and an emancipatory perspective for a case study to be undertaken in Luxembourg. [less ▲]

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailChronic Social Stress Time-Dependently Affects Neuropathic Pain-Related Cold Allodynia and Leads to Altered Expression of Spinal Biochemical Mediators
Le Coz, Glenn Marie; Genty, Julien UL; Anton, Fernand UL et al

in Frontiers in Behavioral Neuroscience (2017), 11

Clinical data have shown that chronic exposure to stress may be accompanied by an enhancement of inflammation-related pain sensitivity. In this context, little is however known on the impact of stress on ... [more ▼]

Clinical data have shown that chronic exposure to stress may be accompanied by an enhancement of inflammation-related pain sensitivity. In this context, little is however known on the impact of stress on neuropathic pain. In the present study we addressed this issue by combining the chronic constriction injury (CCI) model with an ongoing social stress (OSS) paradigm. Cold plate and von Frey tests were performed in 48 rats divided into four groups: OSS exposed to OSS, CCI subjected to chronic nerve constriction, OSS+CCI with a combination of neuropathy and stress and CON, a control group lacking any manipulation. While we did not observe any stress-related differences in mechanical sensitivity throughout the observation period, CCI rats were more sensitive to cold stimulation than OSS+CCI in the initial phase of neuropathy. A switch was observed at a later stage, leading to a hypersensitivity of the OSS+CCI compared to the CCI rats. At this time point we investigated the spinal mRNA expression of neuron and glia related molecules potentially involved in neuropathic pain and stress. The combination of psychosocial stress and neuropathic pain seemed to enhance glial cell activation, pro-inflammatory cytokine and neurotrophic factor mRNA levels, rather than glutamatergic transmission. Our data show that long lasting social stress may lead to time-dependent alteration of neuropathy-related cold pain sensitivity while mechanicallyinduced pain remains unchanged. [less ▲]

Detailed reference viewed: 9 (0 UL)
Full Text
See detailBrexit: Mind the gap! Die Bedeutung regionaler Disparitäten auf politische Weichenstellungen
Bissinger, Jutta UL; Evrard, Estelle UL

Article for general public (2017)

Die Ergebnisse des Referendums am 23. Juni 2016 im Vereinigten Königreich (VK) sind ein Beweis dafür, dass regionale Disparitäten und der territoriale Zusammenhalt innerhalb eines Landes politisch ... [more ▼]

Die Ergebnisse des Referendums am 23. Juni 2016 im Vereinigten Königreich (VK) sind ein Beweis dafür, dass regionale Disparitäten und der territoriale Zusammenhalt innerhalb eines Landes politisch relevante Faktoren darstellen [less ▲]

Detailed reference viewed: 16 (1 UL)
Full Text
Peer Reviewed
See detailLab Testing Beyond Usability: Challenges and Recommendations for Assessing User Experiences
Lallemand, Carine UL; Koenig, Vincent UL

in Journal of Usability Studies (2017), 12(3), 133-154

In the “third wave” of human-computer interaction (HCI), the advent of the conceptual approach of UX broadens and changes the HCI landscape. Methods approved before, mainly within the conceptual approach ... [more ▼]

In the “third wave” of human-computer interaction (HCI), the advent of the conceptual approach of UX broadens and changes the HCI landscape. Methods approved before, mainly within the conceptual approach of usability, are still widely used, and yet their adequacy for UX evaluation remains uncertain in many applications. Laboratory testing is undoubtedly the most prominent example of such a method. Hence, in this study, we investigated how the more comprehensive and emotional scope of UX can be assessed by laboratory testing. In this paper, we report on a use case study involving 70 participants. They first took part in user/laboratory tests and then were asked to evaluate their experience with the two systems (perceived UX) by filling out an AttrakDiff scale and a UX needs fulfillment questionnaire. We conducted post-test interviews to better understand participants’ experiences. We analyzed how the participants’ perceived UX depends on quantitative (e.g., task completion time, task sequence, level of familiarity with the system) and qualitative aspects (think aloud, debriefing interviews) within the laboratory context. Results indicate that the laboratory setting has a strong impact on the participants’ perceived UX, and support a discussion of the quality and limitations of laboratory evaluations regarding UX assessment. In this paper, we have identified concrete challenges and have provided solutions and tips useful for both practitioners and researchers who seek to account for the subjective, situated, and temporal nature of the UX in their assessments. [less ▲]

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailA Study of Temperature and Aging Effects on Eigenfrequencies of Concrete Bridges for Health Monitoring
Nguyen, Viet Ha UL; Mahowald, Jean UL; Schommer, Sebastian UL et al

in Engineering (2017), 9

This paper discusses the influence of environmental factors and of normal material aging on the eigenfrequencies of concrete bridges based on monitoring data registered during 4 years of a specific bridge ... [more ▼]

This paper discusses the influence of environmental factors and of normal material aging on the eigenfrequencies of concrete bridges based on monitoring data registered during 4 years of a specific bridge. It is a new composite steel-concrete bridge built in 2006 in Luxembourg. The measurements are analyzed and compared to literature data. The final objective is the use of real monitored eigenfrequencies for structural health monitoring and damage detection based on identification of stiffness losses in practical applications. Therefore, it is very important to identify and compensate for outdoor influences namely temperature, excitation force level and normal aging effects, like creep and shrinkage of concrete and their impact on material properties. The present paper aims at describing these effects in order to separate them from damage effects. It is shown that temperature change rates and temperature gradients within the bridge have an influence on the eigenfrequencies. Hence the key idea for assessment from the full database is to select only measurements with small temperature differences and slow temperature change rates. [less ▲]

Detailed reference viewed: 14 (0 UL)
Peer Reviewed
See detailCredit Risk Characteristics of Small Business Loan Portfolios
Wolff, Christian UL

Scientific Conference (2017, April 18)

Detailed reference viewed: 1 (0 UL)
See detailBest Paper Award
Wolff, Christian UL

Diverse speeches and writings (2017)

Detailed reference viewed: 2 (0 UL)
Full Text
See detailBenelux, Europe and the Cold War, the power of non-powers
Paravantis, Spero UL

E-print/Working paper (2017)

The conference “Benelux, Europe and the Cold War, the power of non-powers”, which took place on 30 and 31 March 2017 at the University of Luxembourg, was the first of three events planned in the FNR ... [more ▼]

The conference “Benelux, Europe and the Cold War, the power of non-powers”, which took place on 30 and 31 March 2017 at the University of Luxembourg, was the first of three events planned in the FNR-funded CORE junior project “Benelux”, as part of its public outreach and academic output objectives. The conference sought to highlight asymmetrical power relations in the Cold War period of European integration by examining European security. What was/is European security in the context of the Cold War? How was and is it conceived? What role did “non-powers” play in European security, and how did they help define it? This conference investigated these and other related questions by re-examining the US/European relationship in the early Cold War and the role that developments during this period played in the European integration movement. In so doing, the conference also showcased findings which helped unify historiographies of the Cold War and European integration. [less ▲]

Detailed reference viewed: 13 (1 UL)
Full Text
See detailTo Pay or Not to Pay’: A Historical and Legal Overview of the Question of WWII Reparations, and its Impact On European (dis?) Integration
Paravantis, Spero UL

Presentation (2017, March 30)

The conference “Benelux, Europe and the Cold War, the power of non-powers”, which took place on 30 and 31 March 2017 at the University of Luxembourg, was the first of three events planned in the FNR ... [more ▼]

The conference “Benelux, Europe and the Cold War, the power of non-powers”, which took place on 30 and 31 March 2017 at the University of Luxembourg, was the first of three events planned in the FNR-funded CORE junior project “Benelux”, as part of its public outreach and academic output objectives. The conference sought to highlight asymmetrical power relations in the Cold War period of European integration by examining European security. What was/is European security in the context of the Cold War? How was and is it conceived? What role did “non-powers” play in European security, and how did they help define it? This conference investigated these and other related questions by re-examining the US/European relationship in the early Cold War and the role that developments during this period played in the European integration movement. In so doing, the conference also showcased findings which helped unify historiographies of the Cold War and European integration. [less ▲]

Detailed reference viewed: 9 (0 UL)
Full Text
See detailChercheurs à l'école 2017 – When researchers went back to school
Weyer, Dany UL

Speeches/Talks (2017)

One of the main goals of the ‘Chercheurs à l’école’ campaign is to present and promote the profession of researcher, still relatively unknown to the general public. Scientists of all scientific ... [more ▼]

One of the main goals of the ‘Chercheurs à l’école’ campaign is to present and promote the profession of researcher, still relatively unknown to the general public. Scientists of all scientific disciplines from public institutions and the private sector go back to school to meet school pupils to speak to them about their life as a researcher: the life as a student, their motivation for one or the other scientific discipline, first steps in their professional lives, career challenges and opportunities. Pupils are given the opportunity to meet researchers “in flesh and bone” and to receive information on the advantages and also the possible disadvantages of being a scientist. [less ▲]

Detailed reference viewed: 9 (1 UL)
Full Text
Peer Reviewed
See detailRobust BELBIC-Extension for Trajectory Tracking Control
Klecker, Sophie UL; Hichri, Bassem UL; Plapper, Peter UL

in Journal of Mechanics Engineering and Automation (2017), 7(2),

In real-life trajectory tracking applications of robotic manipulators uncertain robot dynamics, external disturbances and switching constraints which cannot be accommodated for by a conventional ... [more ▼]

In real-life trajectory tracking applications of robotic manipulators uncertain robot dynamics, external disturbances and switching constraints which cannot be accommodated for by a conventional controller affect the system performance. We suggested an additional control element combining sliding mode and bio-mimetic, neurologically-inspired BELBIC (brain emotional learning-based intelligent control). The former is invariant to internal and external uncertainties and guarantees robust behavior. The latter is based on an interplay of inputs relating to environmental information through error-signals of position and sliding surfaces and of emotional signals regulating the learning rate and adapting the future behaviour based on prior experiences and with the goal to maximize a reward function. We proofed the stability and the performance of the suggested control scheme through Lyapunov theory and numerical simulations, respectively. [less ▲]

Detailed reference viewed: 18 (5 UL)
See detailCredit Risk Characterististics of US Small Business Loan Portfolios
Wolff, Christian UL

Presentation (2017, January 25)

Detailed reference viewed: 2 (0 UL)
Full Text
See detailKey-Recovery Attacks Against Somewhat Homomorphic Encryption Schemes
Chenal, Massimo UL

Doctoral thesis (2017)

In 1978, Rivest, Adleman and Dertouzos introduced the concept of privacy homomorphism and asked whether it is possible to perform arbitrary operations on encrypted ciphertexts. Thirty years later, Gentry ... [more ▼]

In 1978, Rivest, Adleman and Dertouzos introduced the concept of privacy homomorphism and asked whether it is possible to perform arbitrary operations on encrypted ciphertexts. Thirty years later, Gentry gave a positive answer in his seminal paper at STOC 2009, by proposing an ingenious approach to construct fully homomorphic encryption (FHE) schemes. With this approach, one starts with a somewhat homomorphic encryption (SHE) scheme that can perform only limited number of operations on ciphertexts (i.e. it can evaluate only low-degree polynomials). Then, through the so-called bootstrapping step, it is possible to turn this SHE scheme into an FHE scheme. After Gentry's work, many SHE and FHE schemes have been proposed; in total, they can be divided into four categories, according to the hardness assumptions underlying each SHE (and hence, FHE) scheme: hard problems on lattices, the approximate common divisor problem, the (ring) learning with errors problem, and the NTRU encryption scheme. Even though SHE schemes are less powerful than FHE schemes, they can already be used in many useful real-world applications, such as medical and financial applications. It is therefore of primary concern to understand what level of security these SHE schemes provide. By default, all the SHE schemes developed so far offer IND-CPA security - i.e. resistant against a chosen-plaintext attack - but nothing is said about their IND-CCA1 security - i.e. secure against an adversary who is able to perform a non-adaptive chosen-ciphertext attack. Considering such an adversary is in fact a more realistic scenario. Gentry emphasized it as a future work to investigate SHE schemes with IND-CCA1 security, and the task to make some clarity about it was initiated by Loftus, May, Smart and Vercauteren: at SAC 2011 they showed how one family of SHE schemes is not IND-CCA1 secure, opening the doors to an interesting investigation on the IND-CCA1 security of the existing schemes in the other three families of schemes. In this work we therefore continue this line of research and show that most existing somewhat homomorphic encryption schemes are not IND-CCA1 secure. In fact, we show that these schemes suffer from key recovery attacks (stronger than a typical IND-CCA1 attack), which allow an adversary to completely recover the private keys through a number of decryption oracle queries. As a result, this dissertation shows that all known SHE schemes fail to provide IND-CCA1 security. While it is true that IND-CPA security may be enough to construct cryptographic protocols in presence of semi-honest attackers, key recovery attacks will pose serious threats for practical usage of SHE and FHE schemes: if a malicious attacker (or a compromised honest party) submits manipulated ciphertexts and observes the behavior (side channel leakage) of the decryptor, then it may be able to recover all plaintexts in the system. Therefore, it is very desirable to design SHE and FHE with IND-CCA1 security, or at least design them to prevent key recovery attacks. This raises the interesting question whether it is possible or not to develop such IND-CCA1 secure SHE scheme. Up to date, the only positive result in this direction is a SHE scheme proposed by Loftus et al. at SAC 2011 (in fact, a modification of an existing SHE scheme and IND-CCA1 insecure). However, this IND-CCA1 secure SHE scheme makes use of a non standard knowledge assumption, while it would be more interesting to only rely on standard assumptions. We propose then a variant of the SHE scheme proposed by Lopez-Alt, Tromer, and Vaikuntanathan at STOC 2012, which offers good indicators about its possible IND-CCA1 security. [less ▲]

Detailed reference viewed: 18 (3 UL)
See detailLa transformation de la constitution économique européenne
Hofmann, Herwig UL; Pantazatou, Aikaterini UL

in Auby, Jean - Bernard; Idoux, Pascale (Eds.) Le Gouvernement économique européen (2017)

Detailed reference viewed: 6 (0 UL)
Full Text
Peer Reviewed
See detailHigh-Precision Gestural Input for Immersive Large-Scale Distributed Virtual Environments
Botev, Jean UL; Rothkugel, Steffen UL

in Proceedings of the 8th ACM Multimedia Systems Conference (MMSys) (2017)

Detailed reference viewed: 9 (2 UL)
Full Text
See detailHomotopical algebraic context over differential operators
Di Brino, Gennaro; Pistalo, Damjan UL; Poncin, Norbert UL

E-print/Working paper (2017)

Detailed reference viewed: 10 (1 UL)