Last 7 days     Results 41-60 of 1665.   1 2 3 4 5 6 7 8   Im Schatten der Geschichte. Die (vergessene) Gewaltkommission der Bundesregierung zur Analyse und Prävention politisch motivierter Gewalt (1987 bis 1990)Eckert, Roland; Schumacher, Anette ; Willems, Helmut in Zeithistorische Forschungen (in press)Detailed reference viewed: 17 (10 UL) The Politics of Church Land Administration: the Case of the Orthodox Patriarchate of Jerusalem in Ottoman and Mandatory PalestinePapastathis, Konstantinos ; Kark, Ruthin Byzantine & Modern Greek Studies (in press)Detailed reference viewed: 37 (0 UL) An Investigation of Compression Techniques to Speed up Mutation TestingZhu; Panichella, Annibale ; Zaidman, Andyin 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (in press)Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]Detailed reference viewed: 62 (15 UL) A generalization of the concept of distance based on the simplex inequalityKiss, Gergely ; Marichal, Jean-Luc ; Teheux, Bruno in Beiträge zur Algebra und Geometrie / Contributions to Algebra and Geometry (in press)We introduce and discuss the concept of \emph{$n$-distance}, a generalization to $n$ elements of the classical notion of distance obtained by replacing the triangle inequality with the so-called simplex ... [more ▼]We introduce and discuss the concept of \emph{$n$-distance}, a generalization to $n$ elements of the classical notion of distance obtained by replacing the triangle inequality with the so-called simplex inequality $d(x_1, \ldots, x_n)~\leq~K\, \sum_{i=1}^n d(x_1, \ldots, x_n)_i^z{\,}, \qquad x_1, \ldots, x_n, z \in X,$ where $K=1$. Here $d(x_1,\ldots,x_n)_i^z$ is obtained from the function $d(x_1,\ldots,x_n)$ by setting its $i$th variable to $z$. We provide several examples of $n$-distances, and for each of them we investigate the infimum of the set of real numbers $K\in\left]0,1\right]$ for which the inequality above holds. We also introduce a generalization of the concept of $n$-distance obtained by replacing in the simplex inequality the sum function with an arbitrary symmetric function. [less ▲]Detailed reference viewed: 54 (14 UL) Environmental and sustainability education in the Benelux countries: Research, policy and practices at the intersection of education and societal transformationVan Poeck, Katrien; König, Ariane ; Wals, Arjen E.J.in Environmental Education Research (in press), (Special Issue), As an introductory article of a Special Issue on Environmental and Sustainability Education (ESE) in the Benelux region, this paper provides an overview of ESE research, policy and practice in Belgium ... [more ▼]As an introductory article of a Special Issue on Environmental and Sustainability Education (ESE) in the Benelux region, this paper provides an overview of ESE research, policy and practice in Belgium, The Netherlands and Luxembourg. It discusses the different contributions in this collection with regard to how the central theme of this issue, the relation between education and societal transformation, is approached in each paper. The main characteristics of the ESE research fields in the Benelux are described in general terms, and placed within the context of how ESE policy and practice are organised in these countries. Next, different conceptualisations of the relation between educational and political spaces reflected in the collection are discussed and the varied contributions to this issue are positioned in relation to three distinguished traditions of approaching the place of democracy in ESE. The authors conclude with commenting on how this relates to different approaches to the research-policy-practice interface. [less ▲]Detailed reference viewed: 89 (5 UL) Environmental and Sustainability Education in the Benelux RegionVan Poeck, Katrien; Wals, Arjen E.J.; König, Ariane in Environmental Education Research (in press), (Special Issue), Detailed reference viewed: 19 (2 UL) Modeling Security and Privacy Requirements: a Use Case-Driven ApproachMai, Xuan Phu ; Göknil, Arda ; Shar, Lwin Khin et alin Information and Software Technology (in press)Context: Modern internet-based services, ranging from food-delivery to home-caring, leverage the availability of multiple programmable devices to provide handy services tailored to end-user needs. These ... [more ▼]Context: Modern internet-based services, ranging from food-delivery to home-caring, leverage the availability of multiple programmable devices to provide handy services tailored to end-user needs. These services are delivered through an ecosystem of device-specific software components and interfaces (e.g., mobile and wearable device applications). Since they often handle private information (e.g., location and health status), their security and privacy requirements are of crucial importance. Defining and analyzing those requirements is a significant challenge due to the multiple types of software components and devices integrated into software ecosystems. Each software component presents peculiarities that often depend on the context and the devices the component interact with, and that must be considered when dealing with security and privacy requirements. Objective: In this paper, we propose, apply, and assess a modeling method that supports the specification of security and privacy requirements in a structured and analyzable form. Our motivation is that, in many contexts, use cases are common practice for the elicitation of functional requirements and should also be adapted for describing security requirements. Method: We integrate an existing approach for modeling security and privacy requirements in terms of security threats, their mitigations, and their relations to use cases in a misuse case diagram. We introduce new security-related templates, i.e., a mitigation template and a misuse case template for specifying mitigation schemes and misuse case specifications in a structured and analyzable manner. Natural language processing can then be used to automatically report inconsistencies among artifacts and between the templates and specifications. Results: We successfully applied our approach to an industrial healthcare project and report lessons learned and results from structured interviews with engineers. Conclusion: Since our approach supports the precise specification and analysis of security threats, threat scenarios and their mitigations, it also supports decision making and the analysis of compliance to standards. [less ▲]Detailed reference viewed: 20 (4 UL) Conflicting temporalities of social and environmental changeLockie, Stewart; Wong, Catherine in Boström, M.; Davidson, D. (Eds.) Environment and Society: Concepts and Challenges. (in press)This chapter explores how time and temporality – that is, the rhythms and tempos of social and environmental change – have been considered in social theory before going on to explore the conceptual ... [more ▼]This chapter explores how time and temporality – that is, the rhythms and tempos of social and environmental change – have been considered in social theory before going on to explore the conceptual frameworks and practices through which policy-makers seek to influence temporal processes in the specific context of climate change policy. The chapter highlights conflict between the temporalities of climate change and the temporalities of politics, as well as conflict between the temporalities of competing political and decision-making processes. While policy-makers advocate strategies to depoliticize climate policy in response to these conflicts, the chapter argues this is neither possible nor desirable. Instead, it advocates more democratic and deliberative approaches to the challenge of synchronizing ever more visible ecological temporalities with the multiple temporalities of the social. [less ▲]Detailed reference viewed: 9 (1 UL) Environmental and Sustainability Education (ESE) in the Benelux regionVan Poeck, Katrien; Wals, Arjen E.J.; König, Ariane in Environmental Education Research (in press)Detailed reference viewed: 15 (3 UL) Security of Distance−Bounding: A SurveyGildas, Avoine; Muhammed, Ali Bingöl; Ioana, Boureanu et alin ACM Computing Surveys (in press)Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e ... [more ▼]Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g. electronic payment or access control systems, which are vulnerable to distance-based frauds. This survey analyzes and compares in a unified manner many existing distance bounding protocols with respect to several key security and complexity features. [less ▲]Detailed reference viewed: 41 (0 UL) Intertemporal material deprivation: a proposal and an application to EU countriesD'Ambrosio, Conchita ; Bossert, Walterin Dasgupta, Indraneel; Mitra, Manipushpak (Eds.) Deprivation, Inequality and Polarization: Essays in Honour of Satya Ranjan Chakravarty (in press)This paper analyzes the effects of the inclusion of past experiences in measuring current material deprivation. The method followed generalizes the proposal of Bossert, Ceriani, Chakravarty and D'Ambrosio ... [more ▼]This paper analyzes the effects of the inclusion of past experiences in measuring current material deprivation. The method followed generalizes the proposal of Bossert, Ceriani, Chakravarty and D'Ambrosio (2014) by adapting the class of indices on the measurement of poverty over time of Dutta, Roope and Zank (2013). An application to the analysis of material deprivation within EU countries is then provided. Following the path of material deprivation experienced by each individual over time yields a picture which differs from that in the annual results. Since the measurement of material deprivation is used by the EU member states and the European Commission to monitor national and EU progress in the fight against poverty and social exclusion, the results suggest that time cannot be neglected. Countries should not only be compared based on their year-by-year results, but additional information is gained by following individuals over time and producing an aggregate measure once dynamic considerations are taken into consideration. [less ▲]Detailed reference viewed: 54 (2 UL) A Machine Learning-Driven Evolutionary Approach for Testing Web Application FirewallsAppelt, Dennis; Nguyen, Cu D.; Panichella, Annibale et alin IEEE Transactions on Reliability (in press)Web application firewalls (WAF) are an essential protection mechanism for online software systems. Because of the relentless flow of new kinds of attacks as well as their increased sophistication, WAFs ... [more ▼]Web application firewalls (WAF) are an essential protection mechanism for online software systems. Because of the relentless flow of new kinds of attacks as well as their increased sophistication, WAFs have to be updated and tested regularly to prevent attackers from easily circumventing them. In this paper, we focus on testing WAFs for SQL injection attacks, but the general principles and strategy we propose can be adapted to other contexts. We present ML-Driven, an approach based on machine learning and an evolutionary algorithm to automatically detect holes in WAFs that let SQL injection attacks bypass them. Initially, ML-Driven automatically generates a diverse set of attacks and submit them to the system being protected by the target WAF. Then, ML-Driven selects attacks that exhibit patterns (substrings) associated with bypassing the WAF and evolve them to generate new successful bypassing attacks. Machine learning is used to incrementally learn attack patterns from previously generated attacks according to their testing results, i.e., if they are blocked or bypass the WAF. We implemented ML-Driven in a tool and evaluated it on ModSecurity, a widely used open-source WAF, and a proprietary WAF protecting a financial institution. Our empirical results indicate that ML-Driven is effective and efficient at generating SQL injection attacks bypassing WAFs and identifying attack patterns. [less ▲]Detailed reference viewed: 153 (10 UL) Gute Kindheit. Wohlbefinden, Kindeswohl und UngleichheitBetz, Tanja; Bollig, Sabine; Joos, Magdalena et alBook published by Beltz Juventa (in press)Detailed reference viewed: 57 (5 UL) Bildung für nachhaltige Entwicklung in der Grundschule: Praxisrelevante Ergebnisse einer international-vergleichenden Studie in Deutschland und LuxemburgAndersen, Katja Natalie in Peschel, Markus; Carla, Ursula (Eds.) Dimensionen des Sachunterrichts: Kinder - Sachen - Welten (in press)Detailed reference viewed: 24 (3 UL) Erloubet mir die selben vart. Episodisches Erzählen hoch zu Ross und in der Luft. Mittelalterliche und moderne Helden auf Aventiure-FahrtBendheim, Amelie ; Schuh, Dominikin Sieber, Andrea; Müller, Carla (Eds.) âventiure/Abenteuer − Literarisches Lernen mit mittelalterlichen und modernen Medienverbünden (in press)Detailed reference viewed: 23 (0 UL) Fiscalité personelle et droits sociaux des demandeurs de protection internationale au GDLChaouche, Fatima Book published by Pasicrisie Luxembourg - 1st (in press)Detailed reference viewed: 45 (6 UL) Theater International IIIBloch, Natalie ; Heimböckel, Dieter Book published by Hydre Edition (in press)Detailed reference viewed: 40 (1 UL) Caring for the elderly: Effects on Family and Adolescents.Schumacher, Anette ; Willems, Helmut in Boll, Thomas; Ferring, Dieter; Valsiner, Jaan (Eds.) Cultures of care in aging (in press)Detailed reference viewed: 21 (2 UL) Reductions of algebraic integers IIPerucca, Antonella in Proceedings of WINE2 (in press)Detailed reference viewed: 34 (4 UL) Reductions of one-dimensional tori II,Perucca, Antonella in Proceedings of WINE2 (in press)Detailed reference viewed: 23 (0 UL)