Last 7 days
Bookmark and Share    
See detailVon Pong zur Panik? Videospiele als gesellschaftlich relevantes Forschungsthema
Melzer, André UL

in Amann, Wilhelm; Sieburg, Heinz (Eds.) Spiel-Räume. Das "Spiel" in Diskursen der Kultur und Wissenschaften (in press)

Detailed reference viewed: 19 (1 UL)
See detailAlchemie und Magie als poetologische Verfahren in der Literatur um 1800. Prolegomena zu einem literatur- und wissensgeschichtlichen Spannungsfeld.
Küpper, Achim UL

in Ulbrechtová, Helena; Grub, Frank Thomas; Platen, Edgar (Eds.) et al Literatur und menschliches Wissen. Analysen zu einer grenzüberschreitenden Beziehung. (in press)

Detailed reference viewed: 13 (0 UL)
See detailFörderung von Deutsch als Fremd- und Amtssprache in den Benelux-Staaten
Leuschner, Torsten; Radke, Henning; Küpper, Achim UL

in Ammon, Ulrich (Ed.) Förderung von Deutsch weltweit. (in press)

Detailed reference viewed: 25 (0 UL)
See detailSchrift und Bild im Horizont des Liquiden. Christoph Ransmayrs und Willy Puchners strahlende Untergänge in Wasser und Wüste.
Küpper, Achim UL

in Brittnacher, Hans Richard; Küpper, Achim (Eds.) Seenöte, Schiffbrüche, feindliche Wasserwelten. Maritime Schreibweisen der Gefährdung und des Untergangs. (in press)

Detailed reference viewed: 11 (0 UL)
See detailDie Wüstenzone zwischen Klimadiagnostik, Anti-Anthropozentrismus und Autoreferenzialität. Bild- und Zeitordnungen der Wüste in Raoul Schrotts Die fünfte Welt.
Küpper, Achim UL

in Dürbeck, Gabriele; Kanz, Christine; Zschachlitz, Ralf (Eds.) Ökologischer Wandel in der deutschen Literatur des 20. und 21. Jahrhunderts – neue Perspektiven und Ansätze. (in press)

Detailed reference viewed: 12 (0 UL)
See detailÖkologie und Poetologie der Versandung: Raoul Schrotts Novelle Die Wüste Lop Nor als literarische Wüstenfiguration der Gegenwart.
Küpper, Achim UL

in Dürbeck, Gabriele; Zschachlitz, Ralf (Eds.) Ökologie und Umweltwandel in der deutschsprachigen Gegenwartsliteratur. (in press)

Detailed reference viewed: 12 (0 UL)
See detailEinleitung. Seenöte, Schiffbrüche, feindliche Wasserwelten: Ein Diskurs der fließenden Grenzen.
Brittnacher, Hans Richard; Küpper, Achim UL

in Brittnacher, Hans Richard; Küpper, Achim (Eds.) Seenöte, Schiffbrüche, feindliche Wasserwelten. Maritime Schreibweisen der Gefährdung und des Untergangs. (in press)

Detailed reference viewed: 27 (0 UL)
See detailÖkologie, Umwelt.
Küpper, Achim UL

in Vogl, Joseph; Wolf, Burkhardt (Eds.) Handbuch Literatur und Ökonomie. (in press)

Detailed reference viewed: 17 (0 UL)
Full Text
See detailModalités de dépôt et de retrait d'une demande de protection internationale et de protection subsidiaire
Sinnig, Julia UL

in Gerkrath, Jörg; Silga, Janine; Chaouche, Fatima (Eds.) et al Droit d'Asile au Grand-Duché de Luxembourg - Guide pratique (in press)

Detailed reference viewed: 32 (5 UL)
Peer Reviewed
See detailFrontières et identités spatiales dans / de la Grande Région SaarLorLux. Approches analytiques et résultats empiriques
Wille, Christian UL

in Hamez, Grégory (Ed.) Réalités, perceptions et représentations des frontières de l'Union Européenne (in press)

Cette contribution a pour objet d'analyser l'importance des frontières nationales pour les identités spatiales dans des régions transfrontalières. À cet effet, elle élaborera un modèle d'analyse ... [more ▼]

Cette contribution a pour objet d'analyser l'importance des frontières nationales pour les identités spatiales dans des régions transfrontalières. À cet effet, elle élaborera un modèle d'analyse pluridimensionnel permettant d'étudier les identités et, à l'exemple de la Grande Région SaarLorLux, posera la question de savoir comment les habitants se représentent l'espace et organisent leurs pratiques de vie quotidienne sur le plan spatial. Par ailleurs, l'analyse révèlera des projections spatiales dans le discours politique et montrera dans quelle mesure celles-ci constituent une base de processus identitaires. La contribution démontre que, malgré des imbrications transfrontalières, les frontières nationales jouent un rôle important dans les processus de projection et d'appropriation identitaires des habitants de la Grande Région SaarLorLux, mais pas nécessairement en tant que catégories rigides. [less ▲]

Detailed reference viewed: 25 (0 UL)
Full Text
Peer Reviewed
See detailFinite-Time Attitude Synchronization with Distributed Discontinuous Protocols
Wei, Jieqiang; Zhang, Silun; Adaldo, Antonio et al

in IEEE Transactions on Automatic Control (in press)

The finite-time attitude synchronization problem is considered in this paper, where the rotation of each rigid body is expressed using the axis-angle representation. Two discontinuous and distributed ... [more ▼]

The finite-time attitude synchronization problem is considered in this paper, where the rotation of each rigid body is expressed using the axis-angle representation. Two discontinuous and distributed controllers using the vectorized signum function are proposed, which guarantee almost global and local convergence, respectively. Filippov solutions and non-smooth analysis techniques are adopted to handle the discontinuities. Sufficient conditions are provided to guarantee finite-time convergence and boundedness of the solutions. Simulation examples are provided to verify the performances of the control protocols designed in this paper. [less ▲]

Detailed reference viewed: 17 (1 UL)
Full Text
Peer Reviewed
See detailAutomatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications
Jan, Sadeeq UL; Panichella, Annibale UL; Arcuri, Andrea UL et al

in IEEE Transactions on Software Engineering (in press)

Modern enterprise systems can be composed of many web services (e.g., SOAP and RESTful). Users of such systems might not have direct access to those services, and rather interact with them through a ... [more ▼]

Modern enterprise systems can be composed of many web services (e.g., SOAP and RESTful). Users of such systems might not have direct access to those services, and rather interact with them through a single-entry point which provides a GUI (e.g., a web page or a mobile app). Although the interactions with such entry point might be secure, a hacker could trick such systems to send malicious inputs to those internal web services. A typical example is XML injection targeting SOAP communications. Previous work has shown that it is possible to automatically generate such kind of attacks using search-based techniques. In this paper, we improve upon previous results by providing more efficient techniques to generate such attacks. In particular, we investigate four different algorithms and two different fitness functions. A large empirical study, involving also two industrial systems, shows that our technique is effective at automatically generating XML injection attacks. [less ▲]

Detailed reference viewed: 171 (28 UL)
Peer Reviewed
See detailDatemi gli occhi
Cicotti, Claudio UL

in Cicotti, Claudio (Ed.) The many faces of 1918 (in press)

Detailed reference viewed: 32 (0 UL)
Peer Reviewed
See detailCross-border cooperation as practice formation. Perspectives for an alternative research approach
Wille, Christian UL; Connor, Ulla UL

in Beck, Joachim; Wassenberg, Birte (Eds.) Interdisciplinary discourses on cross-border cooperation in Europe (in press)

In order to achieve our objective, we will first provide an overview of the development of cooperation research, its characterizing orientations and establish a link to the topic of this contribution ... [more ▼]

In order to achieve our objective, we will first provide an overview of the development of cooperation research, its characterizing orientations and establish a link to the topic of this contribution (chapter 2). The following presentation of practice theories introduces praxeological thinking and provides a condensed outline of the state of the art of this cultural sociological theory (chapter 3). Building on this, we will develop our idea of a cross-border practice formation that breaks with the premises of traditional cooperation research, and we provide an alternative perspectivation by outlining four challenges of CBC (chapter 4). In consideration of some research-practical particularities which are linked to the suggested analytical perspective, we eventually offer (chapter 5) an outlook on the development of an alternative research approach which is compatible within a multidisciplinary context. [less ▲]

Detailed reference viewed: 48 (1 UL)
See detailNaturwissenschaftliche Bildung aus lerntheoretischer Perspektive
Andersen, Katja Natalie UL

in Hugoth, Matthias (Ed.) Handbuch für Träger von Kindertageseinrichtungen (in press)

Detailed reference viewed: 20 (2 UL)
Full Text
Peer Reviewed
See detailSmart Bound Selection for the Verification of UML/OCL Class Diagrams
Clarisó, Robert; Gonzalez Perez, Carlos Alberto UL; Cabot, Jordi

in IEEE Transactions on Software Engineering (in press)

Correctness of UML class diagrams annotated with OCL constraints can be checked using bounded verification techniques, e.g., SAT or constraint programming (CP) solvers. Bounded verification detects faults ... [more ▼]

Correctness of UML class diagrams annotated with OCL constraints can be checked using bounded verification techniques, e.g., SAT or constraint programming (CP) solvers. Bounded verification detects faults efficiently but, on the other hand, the absence of faults does not guarantee a correct behavior outside the bounded domain. Hence, choosing suitable bounds is a non-trivial process as there is a trade-off between the verification time (faster for smaller domains) and the confidence in the result (better for larger domains). Unfortunately, bounded verification tools provide little support in the bound selection process. In this paper, we present a technique that can be used to (i) automatically infer verification bounds whenever possible, (ii) tighten a set of bounds proposed by the user and (iii) guide the user in the bound selection process. This approach may increase the usability of UML/OCL bounded verification tools and improve the efficiency of the verification process. [less ▲]

Detailed reference viewed: 64 (18 UL)
Full Text
Peer Reviewed
See detailLessons from social network analysis to Industry 4.0
Omar, Yamila UL; Minoufekr, Meysam UL; Plapper, Peter UL

in Manufacturing Letters (in press)

With the advent of Industry 4.0, a growing number of sensors within modern production lines generate high volumes of data. This data can be used to optimize the manufacturing industry in terms of complex ... [more ▼]

With the advent of Industry 4.0, a growing number of sensors within modern production lines generate high volumes of data. This data can be used to optimize the manufacturing industry in terms of complex network topology metrics commonly used in the analysis of social and communication networks. In this work, several such metrics are presented along with their appropriate interpretation in the field of manufacturing. Furthermore, the assumptions under which such metrics are defined are assessed in order to determine their suitability. Finally, their potential application to identify performance limiting resources, allocate maintenance resources and guarantee quality assurance are discussed. [less ▲]

Detailed reference viewed: 94 (8 UL)