Eine innovative Stahlverbundlösung für komplexe innerstädtische BauprojekteSchäfer, Markus ; ; et alin Stahlbau - Nachrichten (2016), 04/16 The real estate project KONS encountered a two and a half year process of demolition of an existing building and construction of a new building complex in a central, urban location of Luxembourg City ... [more ▼] The real estate project KONS encountered a two and a half year process of demolition of an existing building and construction of a new building complex in a central, urban location of Luxembourg City opposite of the main railway station. Thereby the ambitious specifications of the investor as well as the requirements of the local authorities could be met only through a comprehensive and intelligent planning process. The complex interrelation between logistics and construction management processes, detailing and overall economic assessment found the solution of steel-composite design highly performant and efficient in every aspect. [less ▲] Detailed reference viewed: 68 (11 UL) IMP: a pipeline for reproducible referenceindependent integrated metagenomic and metatranscriptomic analysesNarayanasamy, Shaman ; Jarosz, Yohan ; Muller, Emilie et alin Genome Biology (2016), 17 Existing workflows for the analysis of multi-omic microbiome datasets are lab-specific and often result in sub-optimal data usage. Here we present IMP, a reproducible and modular pipeline for the ... [more ▼] Existing workflows for the analysis of multi-omic microbiome datasets are lab-specific and often result in sub-optimal data usage. Here we present IMP, a reproducible and modular pipeline for the integrated and reference-independent analysis of coupled metagenomic and metatranscriptomic data. IMP incorporates robust read preprocessing, iterative co-assembly, analyses of microbial community structure and function, automated binning, as well as genomic signature-based visualizations. The IMP-based data integration strategy enhances data usage, output volume, and output quality as demonstrated using relevant use-cases. Finally, IMP is encapsulated within a user-friendly implementation using Python and Docker. IMP is available at http://r3lab.uni.lu/web/imp/ (MIT license). [less ▲] Detailed reference viewed: 337 (23 UL) A parallel algorithm for energy efficiency maximization in massive MIMO networksYang, Yang ; in Proc. 2016 IEEE Global Communications Conference (2016, December) Detailed reference viewed: 96 (1 UL) An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux KernelJimenez, Matthieu ; Papadakis, Mike ; Le Traon, Yves ![]() in 2016 Asia-Pacific Software Engineering Conference (APSEC) (2016, December) Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify ... [more ▼] Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify many of them with severe consequences. Vulnerabilities are hard to discover since they appear in various forms, caused by many different issues and their identification requires an attacker’s mindset. In this paper, we aim at increasing the understanding of vulnerabilities by investigating their characteristics on two major open-source software systems, i.e., the Linux kernel and OpenSSL. In particular, we seek to analyse and build a profile for vulnerable code, which can ultimately help researchers in building automated approaches like vulnerability prediction models. Thus, we examine the location, criticality and category of vulnerable code along with its relation with software metrics. To do so, we collect more than 2,200 vulnerable files accounting for 863 vulnerabilities and compute more than 35 software metrics. Our results indicate that while 9 Common Weakness Enumeration (CWE) types of vulnerabilities are prevalent, only 3 of them are critical in OpenSSL and 2 of them in the Linux kernel. They also indicate that different types of vulnerabilities have different characteristics, i.e., metric profiles, and that vulnerabilities of the same type have different profiles in the two projects we examined. We also found that the file structure of the projects can provide useful information related to the vulnerabilities. Overall, our results demonstrate the need for making project specific approaches that focus on specific types of vulnerabilities. [less ▲] Detailed reference viewed: 297 (17 UL) Graph-based Software Knowledge: Storage and Semantic Querying of Domain Models for Run-Time AdaptationHochgeschwender, Nico ; ; Voos, Holger et alin IEEE International Conference on Simulation, Modeling, and Programming for Autonomous Robots SIMPAR, San Francisco, Dec 2016 (2016, December) Software development for robots is a knowledge intensive exercise. To capture this knowledge explicitly and formally in the form of various domain models, roboticists have recently employed model-driven ... [more ▼] Software development for robots is a knowledge intensive exercise. To capture this knowledge explicitly and formally in the form of various domain models, roboticists have recently employed model-driven engineering (MDE) approaches. However, these models are merely seen as a way to support humans during the robot's software design process. We argue that the robots themselves should be first-class consumers of this knowledge to autonomously adapt their software to the various and changing run-time requirements induced, for instance, by the robot's tasks or environment. Motivated by knowledge-enabled approaches, we address this problem by employing a graph-based knowledge representation that allows us not only to persistently store domain models, but also to formulate powerful queries for the sake of run time adaptation. We have evaluated our approach in an integrated, real-world system using the neo4j graph database and we report some lessons learned. Further, we show that the graph database imposes only little overhead on the system's overall performance. [less ▲] Detailed reference viewed: 136 (14 UL) Numerical methods for fracture/cutting of heterogeneous materialsSutula, Danas ; Agathos, Konstantinos ; Ziaei Rad, Vahid et alPresentation (2016, December) Detailed reference viewed: 192 (15 UL) Optimality Results on the Security of Lookup-Based ProtocolsMauw, Sjouke ; Toro Pozo, Jorge Luis ; Trujillo Rasua, Rolando ![]() in Hancke, Gerard P.; Markantonakis, Konstantinos (Eds.) Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (2016, December) Distance-bounding protocols use the round-trip time of a challenge-response cycle to provide an upper-bound on the distance between prover and verifier. In order to obtain an accurate upper-bound, the ... [more ▼] Distance-bounding protocols use the round-trip time of a challenge-response cycle to provide an upper-bound on the distance between prover and verifier. In order to obtain an accurate upper-bound, the computation time at the prover’s side should be as short as possible, which can be achieved by precomputing the responses and storing them in a lookup table. However, such lookup-based distance bounding protocols suffer from a trade-off between the achieved security level and the size of the lookup table. In this paper, we study this security-memory trade-off problem for a large class of lookup-based distance bounding protocols; called layered protocols. Relying on an automata-based security model, we provide mathematical definitions for different design decisions used in previous lookup-based protocols, and perform general security analyses for each of them. We also formalize an interpretation of optimal trade-off and find a non-trivial protocol transformation approach towards optimality. That is to say, our transformation applied to any layered protocol results in either an improved or an equal protocol with respect to the optimality criterion. This transformation allows us to provide a subclass of lookup-based protocol that cannot be improved further, which means that it contains an optimal layered protocol. [less ▲] Detailed reference viewed: 87 (5 UL) Nuclear Energy for Peaceful Purposes:Al Hajjaji, Shams Al Din ![]() Presentation (2016, December) Detailed reference viewed: 25 (0 UL) Raising the Achievement of all Learners in Inclusive Education Project: Rosmini and SereniLimbach-Reich, Arthur ![]() Scientific Conference (2016, December) Detailed reference viewed: 97 (2 UL) Assessing Performance of Internet of Things-based Mobile Crowdsensing Systems for Sensing as a Service Applications in Smart CitiesCapponi, Andrea ; Fiandrino, Claudio ; Franck, Christian et alin 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (2016, December) The Internet of Things (IoT) paradigm makes the Internet more pervasive. IoT devices are objects equipped with computing, storage and sensing capabilities and they are interconnected with communication ... [more ▼] The Internet of Things (IoT) paradigm makes the Internet more pervasive. IoT devices are objects equipped with computing, storage and sensing capabilities and they are interconnected with communication technologies. Smart cities exploit the most advanced information technologies to improve public services. For being effective, smart cities require a massive amount of data, typically gathered from sensors. The application of the IoT paradigm to smart cities is an excellent solution to build sustainable Information and Communication Technology (ICT) platforms and to produce a large amount of data following Sensing as a Service (S^2aaS) business models. Having citizens involved in the process through mobile crowdsensing (MCS) techniques unleashes potential benefits as MCS augments the capabilities of existing sensing platforms. To this date, it remains an open challenge to quantify the costs the users sustain to contribute data with IoT devices such as the energy from the batteries and the amount of data generated at city-level. In this paper, we analyze existing solutions, we provide guidelines to design a large-scale urban level simulator and we present preliminary results from a prototype. [less ▲] Detailed reference viewed: 316 (29 UL) The European Association for Data Science, its main goals and tasks; Böhmer, Matthias ![]() Presentation (2016, December) Detailed reference viewed: 44 (2 UL) On the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced DataRial, Alfredo ![]() in Abstract book of 2016 IEEE 8th International Conference on Cloud Computing Technology and Science (CloudCom) (2016, December) The protection of sensitive data stored in the cloud is paramount. Among the techniques proposed to provide protection, attribute-based access control, which frequently uses ciphertext-policy attribute ... [more ▼] The protection of sensitive data stored in the cloud is paramount. Among the techniques proposed to provide protection, attribute-based access control, which frequently uses ciphertext-policy attribute-based encryption (CPABE), has received a lot of attention in the last years. Recently, Jahan et al.~(IEEE 40th Conference on Local Computer Networks, 2015) propose a scheme based on CPABE where users have reading and writing access to the outsourced data. We analyze the scheme by Jahan et al.\ and we show that it has several security vulnerabilities. For instance, the cloud server can get information about encrypted messages by using a stored ciphertext and an update of that ciphertext. As another example, users with writing access are able to decrypt all the messages regardless of their attributes. We discuss the security claims made by Jahan et al.\ and point out the reasons why they do not hold. We also explain that existing schemes can already provide the advantages claimed by Jahan et al. [less ▲] Detailed reference viewed: 136 (5 UL) Discrete Pompeiu problem on the plainKiss, Gergely ![]() Presentation (2016, December) Detailed reference viewed: 44 (3 UL) Erinnerungen an die Zwangsrekrutierung im Großherzogtum LuxemburgKlos, Eva Maria ![]() in Stroh, Frédéric; Quadflieg, Peter M. (Eds.) L’incorporation de force dans les territoires annexés par le IIIe Reich. Die Zwangsrekrutierung in den vom Dritten Reich annektierten Gebieten 1939-1945 (2016, December) Detailed reference viewed: 130 (15 UL) Towards Integration on Colored SupermanifoldsPoncin, Norbert ![]() in Banach Center Publications (2016, December), 110 Detailed reference viewed: 324 (66 UL) Tutorial Reproducible Research at the Cloud Era: Overview, Hands-on and Open challengesVarrette, Sébastien ![]() Learning material (2016) The term Reproducible Research (RR) refers to “the idea that the ultimate product of academic research is the paper along with the full computational environment used to produce the results in the paper ... [more ▼] The term Reproducible Research (RR) refers to “the idea that the ultimate product of academic research is the paper along with the full computational environment used to produce the results in the paper such as the code, data, etc. that can be used to reproduce the results and create new work based on the research.” Source: Wikipedia. The need for reproducibility is increasing dramatically as data analyses become more complex, involving larger datasets and more sophisticated computations. Obviously, the advent of the Cloud Computing paradigm is expected to provide the appropriate means for RR. This tutorial is meant to provide an overview of sensible tools every researcher (in computer science but not only) should be aware of to enable RR in its own work. In particular, and after a general talk presenting RR and the existing associated tools and workflow, this tutorial will propose several practical exercises and hands-on meant to be performed on each attendee’s laptop, to cover the management of sharable Development environment using Vagrant. Resources of this tutorial will be available on Github. [less ▲] Detailed reference viewed: 37 (1 UL) Bubbles and Trading Frenzies: Evidence from the Art MarketPenasse, Julien ![]() Scientific Conference (2016, December) Detailed reference viewed: 33 (4 UL) Interpreting Finite Automata for Sequential DataHammerschmidt, Christian ; ; et alin Interpretable Machine Learning for Complex Systems: NIPS 2016 workshop proceedings (2016) Detailed reference viewed: 235 (26 UL) Shear strength and stiffness degradation of geomaterials in cyclic loadingPytlik, Robert Stanislaw ; Van Baars, Stefan ![]() in Soils and Rocks (2016), 39(3), 273-283 Cyclic loading on civil structures can lead to a reduction of strength and stiffness in the loaded materials. The life span of many cyclically loaded structures such as wind turbines, high-speed train ... [more ▼] Cyclic loading on civil structures can lead to a reduction of strength and stiffness in the loaded materials. The life span of many cyclically loaded structures such as wind turbines, high-speed train tracks and bridges strongly depends on the foundation. The soils and rocks in the foundation can be subjected to cyclic loads from natural and human sources. In order to evaluate the fatigue behaviour of geomaterials, this paper presents static and cyclic triaxial test results for several geomaterials. It was concluded that cyclic loading on different geomaterials can cause different types of effects. The shear strength of cohesionless crumbled limestone increases during cyclic loading; while for cohesive materials, such as gypsum and mortar, the strength decreases. The strength decrease can be seen as a degradation of the cohesion. The most significant factor in the cohesion reduction was found to be the number of applied cycles. It was also noticed that the friction angle for sands does not reduce under cyclic loading. A fatigue limit was not found for cohesive geomaterials; neither a dependence of the strength reduction on the cyclic loading ratios. [less ▲] Detailed reference viewed: 215 (5 UL) Cargo-Kulte. Magie im Zeitalter der Globalisierung.Amann, Wilhelm ![]() in Zeitschrift für Interkulturelle Germanistik (2016), 2(2016), 80-89 Detailed reference viewed: 213 (9 UL) |
||