Last 7 days
Bookmark and Share    
Peer Reviewed
See detailLa référence à l’Alsace-Lorraine dans le rattachement et l’intégration d’Eupen-Malmedy à la Belgique (1918-1925)
Brüll, Christoph UL

Scientific Conference (2018, February 09)

En novembre 1910, le Journal des Tribunaux, principal organe d’information des juristes belges, qualifie la partie wallonne du Kreis allemand de Malmedy de « notre Alsace-Lorraine » où se trouveraient des ... [more ▼]

En novembre 1910, le Journal des Tribunaux, principal organe d’information des juristes belges, qualifie la partie wallonne du Kreis allemand de Malmedy de « notre Alsace-Lorraine » où se trouveraient des « frères de race et de langue, exilés et emprisonnés en Prusse. » Le 20 septembre 1920, ce Kreis ainsi que celui d’Eupen, presque exclusivement germanophone, sont rattachés à la Belgique, suite au traité de Versailles et à un simulacre de consultation populaire. Dans notre contribution qui traitera de la période qui s’étend de l’occupation de la région par des troupes belges en août 1919 à la fin du régime transitoire en mars 1925, nous voudrions nous interroger sur la signification de la référence à l’Alsace-Lorraine pendant cette phase du changement de la nationalité. Des indices donnent à penser que cette référence n’est pas limitée aux discours de légitimation de l’annexion du territoire par la Belgique, mais que les autorités belges ont, à certaines occasions (comme l’introduction du service militaire), contacté leurs homologues français afin de connaître la politique d’intégration menée en Alsace-Lorraine. En revanche, il n’y a jamais eu d’étude systématique de cette référence idéelle et pratique. Notre proposition voudrait combler cette lacune et constituerait également une contribution à une histoire comparée de la transition étatique dans les deux territoires. [less ▲]

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailSimulation-Based Fault Injection as a Verification Oracle for the Engineering of Time-Triggered Ethernet networks
Fejoz, Loïc; Regnier, Bruno; Miramont, Philippe et al

Scientific Conference (2018, February 02)

TTEthernet (TTE) is considered for use as high-speed backbone in the avionics of next-generation orbital space launchers. Given the key role of communication in launchers, the OEM must acquire a precise ... [more ▼]

TTEthernet (TTE) is considered for use as high-speed backbone in the avionics of next-generation orbital space launchers. Given the key role of communication in launchers, the OEM must acquire a precise understanding of TTE’s functioning and its performances in nominal and error conditions. This holds especially true for the clock synchronization algorithm, the cornerstone of time-triggered communication in TTE, which involves complex distributed algorithms. In this study, we use both an experimental platform and fault-injection on a simulation model to gain quantified insights in these questions. We first describe a fine-grained simulation model of TTE model and discuss how it has been validated against communication traces recorded on the TTE platform. We then present experiments that evaluate the accuracy of the clock synchronization in TTE in the fault-free case as well as considering permanent link failure and transient transmission errors. Finally, we discuss what we have learned during the project in terms of development process and programming language support for complex simulation models used in the design of critical systems. [less ▲]

Detailed reference viewed: 22 (5 UL)
Full Text
Peer Reviewed
See detailInsights on the Performance and Configuration of AVB and TSN in Automotive Ethernet Networks
Migge, Jörn; Villanueva, Josetxo; Navet, Nicolas UL et al

Scientific Conference (2018, February 02)

Switched Ethernet is profoundly reshaping in-car communications. To meet the diverse real-time requirements in automotive communications, Quality-of-Service protocols that go beyond the mere use of ... [more ▼]

Switched Ethernet is profoundly reshaping in-car communications. To meet the diverse real-time requirements in automotive communications, Quality-of-Service protocols that go beyond the mere use of priorities are required. In this work, the basic questions that we investigate on a case-study with diverse and demanding communication requirements is what can we expect from the various protocols aimed at providing a better timing Quality of Service on top of Ethernet? And how to use them? Especially how to use them in a combined manner. We will focus on the Credit-Based Shaper of AVB, the Time-Aware Shaper of TSN and the use of priorities as defined in IEEE802.1Q. The performance metrics considered are the distributions of the communication latencies, obtained by simulation, as well as upper bounds on these quantities obtained by worst-case schedulability analysis. If there have been over the last 5 years numerous studies on the performance of AVB CBS, the literature on comparing AVB to TSN and other candidate protocols is still sparse. To the best of our knowledge, this empirical study is the first to consider most protocols currently considered in the automotive domain, with the aim to gain insights into the different technological, design and configurations alternatives. In particular, an objective of this study is to identify key problems that need to be solved in order to further automate network design and configuration. [less ▲]

Detailed reference viewed: 14 (1 UL)
Full Text
See detailBeware: Nobody Wants to Be Lonely
Tkalec, Igor UL

Article for general public (2018)

Detailed reference viewed: 7 (1 UL)
Full Text
See detailSteuerrecht und Daten - Die virtuelle Betriebsstätte
Sinnig, Julia UL

Presentation (2018, January 12)

Detailed reference viewed: 8 (0 UL)
Full Text
See detailAttacks and Countermeasures for White-box Designs
Biryukov, Alex UL; Udovenko, Aleksei UL

E-print/Working paper (2018)

In the traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the ... [more ▼]

In the traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implementation. He can use both static and dynamic analysis as well as fault analysis in order to break the cryptosystem, e.g. to extract embedded secret key. Implementations secure in such model have many applications in industry. However, creating such implementations turns out to be a very challenging if not an impossible task. Recently, Bos et al. proposed a generic attack on white-box primitives called differential computation analysis (DCA). This attack applies to most existent white-box implementations both from academia and industry. The attack comes from side-channel cryptanalysis method. The most common method protecting against such side-channel attacks is masking. Therefore, masking can be used in white-box implementations to protect against the DCA attack. In this paper we investigate this possibility and present multiple generic attacks against masked white-box implementations. We use the term “masking” in a very broad sense. As a result, we deduce new constraints that any secure white-box implementation must satisfy. We suggest partial countermeasures against the attacks. Some of our attacks were successfully applied to the WhibOx 2017 challenges. [less ▲]

Detailed reference viewed: 175 (2 UL)
Peer Reviewed
See detailSurmonter les barrières linguistiques avec « MaGrid » - un outil de formation de pré-mathématiques pour un contexte scolaire multilingue
Cornu, Véronique UL; Pazouki, Tahereh UL; Schiltz, Christine UL et al

Scientific Conference (2018, January 11)

Le contexte scolaire luxembourgeois est caractérisé par le multilinguisme et une population scolaire hétérogène, ce qui nécessite la mise en place de pratiques pédagogiques qui prennent en compte ... [more ▼]

Le contexte scolaire luxembourgeois est caractérisé par le multilinguisme et une population scolaire hétérogène, ce qui nécessite la mise en place de pratiques pédagogiques qui prennent en compte l’hétérogénéité des élèves. Dans le domaine des mathématiques, qui semble être non-verbal à première vue, des résultats scientifiques montrent que les enfants dont la langue maternelle est différente de la langue d’instruction, atteignent sur des tests d’aptitudes pré-mathématiques des résultats significativement inférieurs à ceux de leurs camarades natifs. Ceci est d’autant plus inquiétant, sachant que ces aptitudes pré-mathématiques sont prédictives des apprentissages ultérieurs. Par conséquent, nous avons développé l’outil de formation de pré-mathématiques non-verbale « MaGrid ». « MaGrid » permet à chaque enfant de bénéficier pleinement d’une instruction préscolaire en mathématiques, indépendamment de ses compétences langagières. Cet outil se caractérise par sa nature visuelle et il est implémenté sur tablette tactile. Jusqu’à présent, nous avons implémenté et évalué « MaGrid » lors de deux études scientifiques. Les résultats quantitatifs des évaluations empiriques sont prometteurs, comme ils montrent des effets positifs sur les habilités entraînées chez les enfants ayant utilisé cet outil comparé à un groupe contrôle. Dans une première étude, l’outil a été utilisé auprès de cinq classes durant 10 semaines, comprenant deux séances de 20 minutes par semaine. Les résultats lors de petites épreuves spécifiques ont été comparés aux résultats d’élèves de cinq classes n’ayant pas d’entraînement spécifique, et des effets d’intervention ont été observés. Dans une deuxième étude, nous nous sommes focalisés sur un groupe d’enfants de langue minoritaire (le portugais). « MaGrid » a été utilisé lors d’un programme d’intervention de pré-mathématiques s’étendant sur les deux années scolaires de l’école préscolaire. Les analyses préliminaires ont abouti à des résultats positifs. Des effets bénéfiques se sont manifestés sur différentes mesures de pré-mathématiques chez les enfants ayant suivi notre programme par rapport aux enfants du groupe contrôle. [less ▲]

Detailed reference viewed: 20 (3 UL)
Full Text
See detailTransforming Time Series for Efficient and Accurate Classification
Li, Daoyuan UL

Doctoral thesis (2018)

Time series data refer to sequences of data that are ordered either temporally, spatially or in another defined order. They can be frequently found in a variety of domains, including financial data ... [more ▼]

Time series data refer to sequences of data that are ordered either temporally, spatially or in another defined order. They can be frequently found in a variety of domains, including financial data analysis, medical and health monitoring and industrial automation applications. Due to their abundance and wide application scenarios, there has been an increasing need for efficient machine learning algorithms to extract information and build knowledge from these data. One of the major tasks in time series mining is time series classification (TSC), which consists of applying a learning algorithm on labeled data to train a model that will then be used to predict the classes of samples from an unlabeled data set. Due to the sequential characteristic of time series data, state-of-the-art classification algorithms (such as SVM and Random Forest) that performs well for generic data are usually not suitable for TSC. In order to improve the performance of TSC tasks, this dissertation proposes different methods to transform time series data for a better feature extraction process as well as novel algorithms to achieve better classification performance in terms of computation efficiency and classification accuracy. In the first part of this dissertation, we conduct a large scale empirical study that takes advantage of discrete wavelet transform (DWT) for time series dimensionality reduction. We first transform real-valued time series data using different families of DWT. Then we apply dynamic time warping (DTW)-based 1NN classification on 39 datasets and find out that existing DWT-based lossy compression approaches can help to overcome the challenges of storage and computation time. Furthermore, we provide assurances to practitioners by empirically showing, with various datasets and with several DWT approaches, that TSC algorithms yield similar accuracy on both compressed (i.e., approximated) and raw time series data. We also show that, in some datasets, wavelets may actually help in reducing noisy variations which deteriorate the performance of TSC tasks. In a few cases, we note that the residual details/noises from compression are more useful for recognizing data patterns. In the second part, we propose a language model-based approach for TSC named Domain Series Corpus (DSCo), in order to take advantage of mature techniques from both time series mining and Natural Language Processing (NLP) communities. After transforming real-valued time series into texts using Symbolic Aggregate approXimation (SAX), we build per-class language models (unigrams and bigrams) from these symbolized text corpora. To classify unlabeled samples, we compute the fitness of each symbolized sample against all per-class models and choose the class represented by the model with the best fitness score. Through extensive experiments on an open dataset archive, we demonstrate that DSCo performs similarly to approaches working with original uncompressed numeric data. We further propose DSCo-NG to improve the computation efficiency and classification accuracy of DSCo. In contrast to DSCo where we try to find the best way to recursively segment time series, DSCo-NG breaks time series into smaller segments of the same size, this simplification also leads to simplified language model inference in the training phase and slightly higher classification accuracy. The third part of this dissertation presents a multiscale visibility graph representation for time series as well as feature extraction methods for TSC, so that both global and local features are fully extracted from time series data. Unlike traditional TSC approaches that seek to find global similarities in time series databases (e.g., 1NN-DTW) or methods specializing in locating local patterns/subsequences (e.g., shapelets), we extract solely statistical features from graphs that are generated from time series. Specifically, we augment time series by means of their multiscale approximations, which are further transformed into a set of visibility graphs. After extracting probability distributions of small motifs, density, assortativity, etc., these features are used for building highly accurate classification models using generic classifiers (e.g., Support Vector Machine and eXtreme Gradient Boosting). Based on extensive experiments on a large number of open datasets and comparison with five state-of-the-art TSC algorithms, our approach is shown to be both accurate and efficient: it is more accurate than Learning Shapelets and at the same time faster than Fast Shapelets. Finally, we list a few industrial applications that relevant to our research work, including Non-Intrusive Load Monitoring as well as anomaly detection and visualization by means for hierarchical clustering for time series data. In summary, this dissertation explores different possibilities to improve the efficiency and accuracy of TSC algorithms. To that end, we employ a range of techniques including wavelet transforms, symbolic approximations, language models and graph mining algorithms. We experiment and evaluate our approaches using publicly available time series datasets. Comparison with the state-of-the-art shows that the approaches developed in this dissertation perform well, and contribute to advance the field of TSC. [less ▲]

Detailed reference viewed: 24 (12 UL)
See detailHistoriker und die Konstruktion von Zeitgenossenschaft. Eine Projektskizze am Beispiel der Militärverwaltung Belgien-Nordfrankreich im Zweiten Weltkrieg
Brüll, Christoph UL

Presentation (2018, January 09)

Gegenstand des Projekts ist die Konstruktion des Zeitzeugendiskurses mehrerer führender Mitglieder der deutschen Militärverwaltung in Brüssel. Arbeitshypothese ist, dass die Konstruktion in drei Phasen ... [more ▼]

Gegenstand des Projekts ist die Konstruktion des Zeitzeugendiskurses mehrerer führender Mitglieder der deutschen Militärverwaltung in Brüssel. Arbeitshypothese ist, dass die Konstruktion in drei Phasen verlief: Der „Generalprozess“ (1950-1951) gegen Alexander von Falkenhausen und Eggert Reeder (gefolgt von einer Reihe anderer Prozesse bis in die 1980er Jahre hinein). Die Legitimierungs- und Verteidigungsdiskurse einiger Akteure gegenüber Anschuldigungen, die ihre Tätigkeiten während des Krieges betrafen. Ihre Tätigkeit als Zeitzeuge für belgische und deutsche Historiker und Journalisten seit den 1970er Jahren. [less ▲]

Detailed reference viewed: 12 (0 UL)
Full Text
See detailProceedings - 2017 ILILAS Distinguished Lectures
Bouvry, Pascal UL; Bisdorff, Raymond; Schommer, Christoph UL et al

Report (2018)

The Proceedings summarizes the 12 lectures that have taken place within the ILIAS Dinstguished Lecture series 2017. It contains a brief abstract of the talks as well as some additional information about ... [more ▼]

The Proceedings summarizes the 12 lectures that have taken place within the ILIAS Dinstguished Lecture series 2017. It contains a brief abstract of the talks as well as some additional information about each speaker. [less ▲]

Detailed reference viewed: 49 (5 UL)
Full Text
See detailBrexit Seen from Luxembourg
Högenauer, Anna-Lena UL

E-print/Working paper (2018)

Detailed reference viewed: 11 (3 UL)
Full Text
Peer Reviewed
See detailThe Temporary Reintroduction of Border Controls Inside the Schengen Area: Towards a Spatial Perspective
Evrard, Estelle UL; Nienaber, Birte UL; Sommarribas, Adolfo UL

in Journal of Borderlands Studies (2018)

Following the terrorist attacks in Paris (November 2015) and Brussels (March 2016), several EU Member States have decided to re-establish border controls or to build walls inside the Schengen Area ... [more ▼]

Following the terrorist attacks in Paris (November 2015) and Brussels (March 2016), several EU Member States have decided to re-establish border controls or to build walls inside the Schengen Area. Although these decisions are temporary and legally framed by the Schengen code, their extent disrupts the free movement within the Schengen Area, in particular in border areas. While lawyers and economists have analyzed the impacts of this situation, the spatial perspective has remained rather neglected. This exploratory contribution aims to address this gap in the literature by outlining the spatial significance of reintroduced controls for border areas inside the Schengen Area. This contribution firstly undertakes a literature review of the different conceptual tools at hand. These are then compared with a set of exploratory empirical materials. The article focuses more precisely on the Greater Region where France and Germany have reintroduced border controls, thus disrupting in particular daily cross-border flows with Luxembourg and Belgium. The analysis demonstrates that the border acts as a filter, disrupting cross-border flows and cooperation. Also, it sheds some light on the important role played by the ideational perception of the border for practitioners and decision-makers. This contribution concludes by suggesting several paths for a future research agenda. [less ▲]

Detailed reference viewed: 27 (4 UL)
Full Text
Peer Reviewed
See detailAnticipating Suspicious Actions using a Small Dataset of Action Templates
Baptista, Renato UL; Antunes, Michel; Aouada, Djamila UL et al

in 13th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP) (2018, January)

In this paper, we propose to detect an action as soon as possible and ideally before it is fully completed. The objective is to support the monitoring of surveillance videos for preventing criminal or ... [more ▼]

In this paper, we propose to detect an action as soon as possible and ideally before it is fully completed. The objective is to support the monitoring of surveillance videos for preventing criminal or terrorist attacks. For such a scenario, it is of importance to have not only high detection and recognition rates but also low time latency for the detection. Our solution consists in an adaptive sliding window approach in an online manner, which efficiently rejects irrelevant data. Furthermore, we exploit both spatial and temporal information by constructing feature vectors based on temporal blocks. For an added efficiency, only partial template actions are considered for the detection. The relationship between the template size and latency is experimentally evaluated. We show promising preliminary experimental results using Motion Capture data with a skeleton representation of the human body. [less ▲]

Detailed reference viewed: 26 (4 UL)
Full Text
Peer Reviewed
See detail‘Cruise to the Edge’. How 1970s prog-rock dinos found a safe haven on the cruise ship
Hesse, Markus UL

in Monios, Jason; Wilmsmeier, Gordon (Eds.) Maritime Mobilities (2018)

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailThe Controlled Foreign Company Regime
Haslehner, Werner UL

in Weber, Dennis; Van de Streek, Jan (Eds.) The EU Common Consolidated Corporate Tax Base - Critical Analysis (2018)

The Controlled Foreign Company (CFC) regime proposed by the Commission as part of the newly launched Common Corporate Tax Base (CCTB) project reflects the perceived need to strengthen the Union’s anti-tax ... [more ▼]

The Controlled Foreign Company (CFC) regime proposed by the Commission as part of the newly launched Common Corporate Tax Base (CCTB) project reflects the perceived need to strengthen the Union’s anti-tax avoidance measures, and specifically to discourage profit shifting to low-tax jurisdictions. The proposed rule largely reflects previous work done by the OECD as part of the BEPS project and the EU implementation measures in the Anti-Tax Avoidance Directive (ATAD), but it deviates from both in a number of its details. This contribution aims to provide a first technical analysis of the provision to reveal its scope, its mechanism, and apparent shortcomings. It furthermore tries to imbed it in its context of existing primary and secondary EU law. [less ▲]

Detailed reference viewed: 34 (2 UL)
Full Text
See detailInherently Unneutral Investment Treaty Arbitration: The Formation of Decisive Arguments in Jurisdictional Determinations
Radović, Relja UL

in Journal of Dispute Resolution (2018), 2018(1), 143-183

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailImpact of the height imperfections of masonry blocks on the load bearing capacity of dry-stack masonry walls
Chewe Ngapeya, Gelen Gael UL; Waldmann, Danièle UL; Scholzen, Frank UL

in in press ELSEVIER Construction and Building Materials (TOP10 journal) (2018)

Dry-stacked masonry walls gives rise to geometric imperfections: the height variation of different masonry blocks ΔH and the roughness of the support area Δh. This paper studies the effect of ΔH on the ... [more ▼]

Dry-stacked masonry walls gives rise to geometric imperfections: the height variation of different masonry blocks ΔH and the roughness of the support area Δh. This paper studies the effect of ΔH on the structural response and the load bearing capacity of masonry walls by highlighting the load percolation. Furthermore, an algorithm was developed to define a stress multiplier coefficient respecting the imperfections ΔH. The algorithm allowed predicting 77% of the amplified stress compared to the FE analysis and showed that the geometric imperfections govern the load percolation in a wall as well as the cracking mode and the bearing capacity. [less ▲]

Detailed reference viewed: 36 (13 UL)