Last 7 days     Results 1-20 of 314. 1 2 3 4 5 6   Lessons from social network analysis to Industry 4.0Omar, Yamila ; Minoufekr, Meysam ; Plapper, Peter in Manufacturing Letters (in press)With the advent of Industry 4.0, a growing number of sensors within modern production lines generate high volumes of data. This data can be used to optimize the manufacturing industry in terms of complex ... [more ▼]With the advent of Industry 4.0, a growing number of sensors within modern production lines generate high volumes of data. This data can be used to optimize the manufacturing industry in terms of complex network topology metrics commonly used in the analysis of social and communication networks. In this work, several such metrics are presented along with their appropriate interpretation in the field of manufacturing. Furthermore, the assumptions under which such metrics are defined are assessed in order to determine their suitability. Finally, their potential application to identify performance limiting resources, allocate maintenance resources and guarantee quality assurance are discussed. [less ▲]Detailed reference viewed: 11 (1 UL) An Investigation of Compression Techniques to Speed up Mutation TestingZhu; Panichella, Annibale ; Zaidman, Andyin 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (in press)Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]Detailed reference viewed: 21 (6 UL) A generalization of the concept of distance based on the simplex inequalityKiss, Gergely ; Marichal, Jean-Luc ; Teheux, Bruno in Beiträge zur Algebra und Geometrie / Contributions to Algebra and Geometry (in press)We introduce and discuss the concept of \emph{$n$-distance}, a generalization to $n$ elements of the classical notion of distance obtained by replacing the triangle inequality with the so-called simplex ... [more ▼]We introduce and discuss the concept of \emph{$n$-distance}, a generalization to $n$ elements of the classical notion of distance obtained by replacing the triangle inequality with the so-called simplex inequality $d(x_1, \ldots, x_n)~\leq~K\, \sum_{i=1}^n d(x_1, \ldots, x_n)_i^z{\,}, \qquad x_1, \ldots, x_n, z \in X,$ where $K=1$. Here $d(x_1,\ldots,x_n)_i^z$ is obtained from the function $d(x_1,\ldots,x_n)$ by setting its $i$th variable to $z$. We provide several examples of $n$-distances, and for each of them we investigate the infimum of the set of real numbers $K\in\left]0,1\right]$ for which the inequality above holds. We also introduce a generalization of the concept of $n$-distance obtained by replacing in the simplex inequality the sum function with an arbitrary symmetric function. [less ▲]Detailed reference viewed: 20 (7 UL) Partizipation in Großschutzgebieten - untersucht am Beispiel der Beteiligung an den Workshops zur Erstellung des Rahmenkonzeptes des Biosphärenreservates Bliesgau 2014Nienaber, Birte in Weber, Friedericke; Weber, Florian; Jenal, Corinna (Eds.) Wohin des Weges? Regionalentwicklung in Großschutzgebieten (in press)In 2014 a process of public participation was initiated in order to produce a framework concept for the future configuration of the “Biosphere Bliesgau”. This paper presents characteristics of ... [more ▼]In 2014 a process of public participation was initiated in order to produce a framework concept for the future configuration of the “Biosphere Bliesgau”. This paper presents characteristics of participation, both in general and in large-scale protected areas in particular, and discusses what various forms of participation (ranging from pure information as non-participation to bottom-up partnerships as the strongest form of participation) are possible. The empirical-analytical section of the paper investigates the 2014 process of participation in Biosphere Bliesgau, using publically available protocols and interviews. It can be seen that the top-down process – e. g. involving concrete agreements between individuals or groups – involves the selection of participants – intended or otherwise – and that the highest level of participation could therefore not be achieved. [less ▲]Detailed reference viewed: 9 (1 UL) Security of Distance−Bounding: A SurveyGildas, Avoine; Muhammed, Ali Bingöl; Ioana, Boureanu et alin ACM Computing Surveys (in press)Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e ... [more ▼]Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g. electronic payment or access control systems, which are vulnerable to distance-based frauds. This survey analyzes and compares in a unified manner many existing distance bounding protocols with respect to several key security and complexity features. [less ▲]Detailed reference viewed: 5 (0 UL) Pointwise regularity of parameterized affine zipper fractal curves fractal curvesBárány, Balázs; Kiss, Gergely ; Kolossváry, Istvánin Nonlinearity (in press)We study the pointwise regularity of zipper fractal curves generated by affine mappings. Under the assumption of dominated splitting of index-1, we calculate the Hausdorff dimension of the level sets of ... [more ▼]We study the pointwise regularity of zipper fractal curves generated by affine mappings. Under the assumption of dominated splitting of index-1, we calculate the Hausdorff dimension of the level sets of the pointwise Hölder exponent for a subinterval of the spectrum. We give an equivalent characterization for the existence of regular pointwise Hölder exponent for Lebesgue almost every point. In this case, we extend the multifractal analysis to the full spectrum. In particular, we apply our results for de Rham’s curve. [less ▲]Detailed reference viewed: 5 (0 UL) Intertemporal material deprivation: a proposal and an application to EU countriesD'Ambrosio, Conchita ; Bossert, Walterin Dasgupta, Indraneel; Mitra, Manipushpak (Eds.) Deprivation, Inequality and Polarization: Essays in Honour of Satya Ranjan Chakravarty (in press)This paper analyzes the effects of the inclusion of past experiences in measuring current material deprivation. The method followed generalizes the proposal of Bossert, Ceriani, Chakravarty and D'Ambrosio ... [more ▼]This paper analyzes the effects of the inclusion of past experiences in measuring current material deprivation. The method followed generalizes the proposal of Bossert, Ceriani, Chakravarty and D'Ambrosio (2014) by adapting the class of indices on the measurement of poverty over time of Dutta, Roope and Zank (2013). An application to the analysis of material deprivation within EU countries is then provided. Following the path of material deprivation experienced by each individual over time yields a picture which differs from that in the annual results. Since the measurement of material deprivation is used by the EU member states and the European Commission to monitor national and EU progress in the fight against poverty and social exclusion, the results suggest that time cannot be neglected. Countries should not only be compared based on their year-by-year results, but additional information is gained by following individuals over time and producing an aggregate measure once dynamic considerations are taken into consideration. [less ▲]Detailed reference viewed: 7 (0 UL) Their ‘Apple of Discord’ or the Apple of Their Eye: How the British Secured Eastern Mediterranean and Western European Security, 1947-1948Paravantis, Spero in Kamouzis, Dimitris; Nafpliotis, Alexandros (Eds.) Αnglo-Hellenic relations in the 20th Century (2019)This chapter examines the role the British policy in Greece played in the shift in American foreign policy that was manifested in 1947-48, that led directly to these alliances, namely the Western European ... [more ▼]This chapter examines the role the British policy in Greece played in the shift in American foreign policy that was manifested in 1947-48, that led directly to these alliances, namely the Western European Union and NATO. To achieve this shift (which also included support of British strategic interests in the Eastern Mediterranean) this chapter argues that the British used Greece, first as a way to draw the United States further into European affairs, and then as a way to anchor the United States in Europe, achieving a guarantee of security for the Eastern Mediterranean and for Western Europe. Drawing on both published and unpublished British and American sources, this chapter will also examine perceptions of the conflicts in and about Greece, and what it represented for Western European and Eastern Mediterranean security, and Western ideas of democracy when confronted with supporting a right-wing Greek government. In so doing, it clarifies how American foreign policy changed from its pre-war focus on non-intervention, to the cold-war politics of containment and intervention. [less ▲]Detailed reference viewed: 15 (0 UL) BENELUX, EUROPE AND THE COLD WAR: THE POWER OF NON-POWERSParavantis, Spero Book published by IB Tauris (2018)What was/is European security in the context of the Cold War? How was and is it conceived? What role did “non-powers” play in European security, and how did they help define it? These were the main ... [more ▼]What was/is European security in the context of the Cold War? How was and is it conceived? What role did “non-powers” play in European security, and how did they help define it? These were the main questions discussed during the conference held by the C²DH in March 2017. This edited volume brings together the final, peer-reviewed contributions of the participants, and brings them together in a common publication. [less ▲]Detailed reference viewed: 18 (0 UL) Constructions contestées et contrastées de la notion de terroir. Symbolique Politique, Savoir Scientifique, Typicité Culturale et CulturelleReckinger, Rachel in Yengué, Louis; Stengel, Kilien (Eds.) Terroir viticole. Espace et figures de qualité (2018)Detailed reference viewed: 7 (0 UL) ‘Pas de fraises pour Noël’. Le rôle de la régionalité locavore dans la (re)prise de conscience de la saisonnalité des aliments Reckinger, Rachel in Adamiec, Camille; Julien, Marie-Pierre; Régnier, Faustine (Eds.) L’alimentation au fil des saisons. La saisonnalité des pratiques alimentaires (2018)Detailed reference viewed: 6 (0 UL) The Metonymical Institutionnalisation of Wine Production and Consumption in Luxembourg. Convergence of Terroir Typicity, Political Symbolism, Regulations and Scientific KnowledgeReckinger, Rachel in Tedeschi, Paolo (Ed.) The Evolution of the Viticulture and Winemaking in Europe: Production, Retail System, Oenological Techniques, Terroir and Local Culture (19th-20th Centuries) (2018)Detailed reference viewed: 5 (0 UL) Towards the Systematic Analysis of Non-Functional Properties in Model-Based Engineering for Real-Time Embedded SystemsBrau, Guillaume ; Navet, Nicolas ; Hugues, Jérômein Science of Computer Programming (2018), 156The real-time scheduling theory provides analytical methods to assess the temporal predictability of embedded systems. Nevertheless, their use is limited in a Model-Based Systems Engineering approach. In ... [more ▼]The real-time scheduling theory provides analytical methods to assess the temporal predictability of embedded systems. Nevertheless, their use is limited in a Model-Based Systems Engineering approach. In fact, the large number of applicability conditions makes the use of real-time scheduling analysis tedious and error-prone. Key issues are left to the engineers: when to apply a real-time scheduling analysis? What to do with the analysis results?} This article presents an approach to systematize and then automate the analysis of non-functional properties in Model-Based Systems Engineering. First, preconditions and postconditions define the applicability of an analysis. In addition, contracts specify the analysis interfaces, thereby enabling to reason about the analysis process. We present a proof-of-concept implementation of our approach using a combination of constraint languages (REAL for run-time analysis) and specification languages (Alloy for describing interfaces and reasoning about them). This approach is experimented on architectural models written with the Architecture Analysis and Design Language (AADL). [less ▲]Detailed reference viewed: 12 (1 UL) De gevolgen van de restkracht bij een paalfunderingRica, Shilton ; Van Baars, Stefan in Geotechniek (2018), MaartAlhoewel de funderingspaal al lang in gebruik is, is de bepaling van de draagkracht nog steeds een complexe zaak. Uit een verzameling eerder gemaakte veldproeven, die in Nederland, België en Frankrijk ... [more ▼]Alhoewel de funderingspaal al lang in gebruik is, is de bepaling van de draagkracht nog steeds een complexe zaak. Uit een verzameling eerder gemaakte veldproeven, die in Nederland, België en Frankrijk waren uitgevoerd, werd de conclusie getrokken dat het berekende puntdraagvermogen, per 2017, met 30% gereduceerd moest worden. Bij deze proeven werd verondersteld dat de spanningen op de onbelaste paal na installatie kunnen worden verwaarloosd, en daarmee ook de resulterende restkracht in de paal. Uit andere veldproeven genoemd in de wetenschappelijke literatuur, blijkt echter dat deze restkracht niet te verwaarlozen is. Numerieke berekeningen uit deze publicatie ondersteunen deze conclusie. Deze verwaarlozing leidt nu tot een te klein puntdraagvermogen, en een te groot schachtdraagvermogen. Naast het probleem van de verwaarlozing van de restkracht speelt er nog een belangrijk probleem: de gehanteerde invloedszone bij de methode Koppejan is gebaseerd op een destijds aangenomen bezwijkmechanisme, die volgens numerieke berekeningen uit deze publicatie onjuist is. Dit leidt tot nog meer onnauwkeurigheden. [less ▲]Detailed reference viewed: 11 (1 UL) La référence à l’Alsace-Lorraine dans le rattachement et l’intégration d’Eupen-Malmedy à la Belgique (1918-1925)Brüll, Christoph Scientific Conference (2018, February 09)En novembre 1910, le Journal des Tribunaux, principal organe d’information des juristes belges, qualifie la partie wallonne du Kreis allemand de Malmedy de « notre Alsace-Lorraine » où se trouveraient des ... [more ▼]En novembre 1910, le Journal des Tribunaux, principal organe d’information des juristes belges, qualifie la partie wallonne du Kreis allemand de Malmedy de « notre Alsace-Lorraine » où se trouveraient des « frères de race et de langue, exilés et emprisonnés en Prusse. » Le 20 septembre 1920, ce Kreis ainsi que celui d’Eupen, presque exclusivement germanophone, sont rattachés à la Belgique, suite au traité de Versailles et à un simulacre de consultation populaire. Dans notre contribution qui traitera de la période qui s’étend de l’occupation de la région par des troupes belges en août 1919 à la fin du régime transitoire en mars 1925, nous voudrions nous interroger sur la signification de la référence à l’Alsace-Lorraine pendant cette phase du changement de la nationalité. Des indices donnent à penser que cette référence n’est pas limitée aux discours de légitimation de l’annexion du territoire par la Belgique, mais que les autorités belges ont, à certaines occasions (comme l’introduction du service militaire), contacté leurs homologues français afin de connaître la politique d’intégration menée en Alsace-Lorraine. En revanche, il n’y a jamais eu d’étude systématique de cette référence idéelle et pratique. Notre proposition voudrait combler cette lacune et constituerait également une contribution à une histoire comparée de la transition étatique dans les deux territoires. [less ▲]Detailed reference viewed: 13 (1 UL) Simulation-Based Fault Injection as a Verification Oracle for the Engineering of Time-Triggered Ethernet networksFejoz, Loïc; Regnier, Bruno; Miramont, Philippe et alScientific Conference (2018, February 02)TTEthernet (TTE) is considered for use as high-speed backbone in the avionics of next-generation orbital space launchers. Given the key role of communication in launchers, the OEM must acquire a precise ... [more ▼]TTEthernet (TTE) is considered for use as high-speed backbone in the avionics of next-generation orbital space launchers. Given the key role of communication in launchers, the OEM must acquire a precise understanding of TTE’s functioning and its performances in nominal and error conditions. This holds especially true for the clock synchronization algorithm, the cornerstone of time-triggered communication in TTE, which involves complex distributed algorithms. In this study, we use both an experimental platform and fault-injection on a simulation model to gain quantified insights in these questions. We first describe a fine-grained simulation model of TTE model and discuss how it has been validated against communication traces recorded on the TTE platform. We then present experiments that evaluate the accuracy of the clock synchronization in TTE in the fault-free case as well as considering permanent link failure and transient transmission errors. Finally, we discuss what we have learned during the project in terms of development process and programming language support for complex simulation models used in the design of critical systems. [less ▲]Detailed reference viewed: 23 (5 UL) Insights on the Performance and Configuration of AVB and TSN in Automotive Ethernet NetworksMigge, Jörn; Villanueva, Josetxo; Navet, Nicolas et alScientific Conference (2018, February 02)Switched Ethernet is profoundly reshaping in-car communications. To meet the diverse real-time requirements in automotive communications, Quality-of-Service protocols that go beyond the mere use of ... [more ▼]Switched Ethernet is profoundly reshaping in-car communications. To meet the diverse real-time requirements in automotive communications, Quality-of-Service protocols that go beyond the mere use of priorities are required. In this work, the basic questions that we investigate on a case-study with diverse and demanding communication requirements is what can we expect from the various protocols aimed at providing a better timing Quality of Service on top of Ethernet? And how to use them? Especially how to use them in a combined manner. We will focus on the Credit-Based Shaper of AVB, the Time-Aware Shaper of TSN and the use of priorities as defined in IEEE802.1Q. The performance metrics considered are the distributions of the communication latencies, obtained by simulation, as well as upper bounds on these quantities obtained by worst-case schedulability analysis. If there have been over the last 5 years numerous studies on the performance of AVB CBS, the literature on comparing AVB to TSN and other candidate protocols is still sparse. To the best of our knowledge, this empirical study is the first to consider most protocols currently considered in the automotive domain, with the aim to gain insights into the different technological, design and configurations alternatives. In particular, an objective of this study is to identify key problems that need to be solved in order to further automate network design and configuration. [less ▲]Detailed reference viewed: 14 (1 UL) The Effects of Skills Underutilization and Unemployment on Hiring DecisionsSamuel, Robin ; Sacchi, StefanPresentation (2018, January 23)Research suggests negative effects of unemployment and skill underutilization on subsequent labor market outcomes. Among others, signaling theory has been used to explain why recruiters may evaluate ... [more ▼]Research suggests negative effects of unemployment and skill underutilization on subsequent labor market outcomes. Among others, signaling theory has been used to explain why recruiters may evaluate competence and commitment of some job applicants less favorably than others. However, various country-, firm-, occupation-, and job-specific context factors may moderate such scarring effects. For example, a high youth unemployment rate may be associated with more scarring of previous unemployment spells and these effects might be different for occupations with different skill requirements. In this contribution, we explore the moderating role of transaction costs, i.e., the direct and indirect costs of recruiting and training new employees for scarring due to previous unemployment and skill underutilization. Furthermore, we investigate the extent to which the perceived difficulty of recruiting moderates these effects. Using data from a recent large-scale factorial survey of recruiters in four European countries (N~=~2,000) and employing multilevel linear regression models, we found, overall, scarring due to skill underutilization to exceed scarring due to unemployment. Skill underutilization was especially penalized when recruiting for a particular position was considered easy. Indirect transaction costs, particularly anticipated time required for organizational socialization, were negatively associated with unemployment scarring, but positively with scarring due to skill underutilization. Unemployment spells only had a negative effect on hiring chances, for jobs where there were monetary expenses for introductory trainings. Our findings constitute new evidence on the heterogeneity of scarring effects on hiring chances. We further contribute to the literature by highlighting the role of transaction costs and labor market performance. [less ▲]Detailed reference viewed: 15 (0 UL) Exome-wide analysis of mutational burden in patients with typical and atypical Rolandic EpilepsyBobbili, Dheeraj Reddy ; Lal, Dennis; May, Patrick et alin European Journal of Human Genetics (2018)Rolandic Epilepsy (RE) is the most common focal epilepsy in childhood. To date no hypothesis-free exome-wide mutational screen has been conducted for RE and Atypical RE (ARE). Here we report on whole ... [more ▼]Rolandic Epilepsy (RE) is the most common focal epilepsy in childhood. To date no hypothesis-free exome-wide mutational screen has been conducted for RE and Atypical RE (ARE). Here we report on whole-exome sequencing of 194 unrelated patients with RE/ARE and 567 ethnically matched population controls. We identified an exome-wide significantly enriched burden for deleterious and loss-of-function variants only for the established RE/ARE gene GRIN2A. The statistical significance of the enrichment disappeared after removing ARE patients. For several disease-related gene-sets, an odds ratio > 1 was detected for loss-of-function variants. [less ▲]Detailed reference viewed: 17 (2 UL) Contemporary Russia: Gefangen im Kreml - Die russischen First LadiesBaumeister, Annette; Ganschow, Inna in Hartung, Florian (Ed.) Februar Film (2018)Als 1917 die Revolution Frauen den Männern gleichstellt, ist die Sowjetunion das fortschrittlichste Land der Welt: Frauen dürfen wählen, studieren und in die Politik gehen. Allen voran Nadeschda Krupskaja ... [more ▼]Als 1917 die Revolution Frauen den Männern gleichstellt, ist die Sowjetunion das fortschrittlichste Land der Welt: Frauen dürfen wählen, studieren und in die Politik gehen. Allen voran Nadeschda Krupskaja, die Ehefrau und Kampfgefährtin von Revolutionsführer Lenin. Mit seinem Nachfolger Stalin jedoch verschwinden die Frauen im Kreml wieder von der Bildfläche. Der Diktator entmachtet Krupskaja, seine Ehefrau Nadeschda Allilujewa darf nicht mehr öffentlich auftreten. Sie vereinsamt und nimmt sich 1932 das Leben. Den anderen Kremlfrauen verordnet Stalin ein traditionelles Lebensmodell, das bis heute gilt. Während damals gewöhnliche Russinnen zur Arbeit gehen mussten, bleiben sie meist unfreiwillig zuhause. So ergeht es auch Nina Petrowna, der Lebensgefährtin von Nikita Chruschtschow, und der Ehefrau von Leonid Breschnew, Viktoria Breschnewa. Beide geben zugunsten der Karriere ihrer Männer den Beruf auf und ebnen damit ihren Männern den Weg an die Spitze des Staates. Dies ändert sich erst gegen Ende der Sowjetunion. Trotz politischer Umwälzungen wird auch von Raissa Gorbatschowa, der Ehefrau von Michail Gorbatschow erwartet, dass sie sich zurückhält und gehorcht. Doch sie lehnt sich auf und handelt eigenständig. Am Ende zerbricht die Frau des großen Reformers, Raissa Gorbatschowa, am starren Kremlapparat. Nur einer gelingt es, sich aus dem Bann der Macht zu befreien: Ljudmila Putina. [less ▲]Detailed reference viewed: 5 (0 UL)