WWII: Die Suche nach dem alten FreundGanschow, Inna ![]() Article for general public (2017) The article treats a friendship between a Soviet POW and a Luxemburger in 1944, both working at the Reichsbahn under the German occupation in Luxembourg. Detailed reference viewed: 64 (4 UL) Tightly-Secure PAK(E)Lopez Becerra, José Miguel ; Iovino, Vincenzo ; Ostrev, Dimiter et alin Cryptology and Network Security (2017, December 02) We present a security reduction for the PAK protocol instantiated over Gap Diffie-Hellman Groups that is tighter than previously known reductions. We discuss the implications of our results for concrete ... [more ▼] We present a security reduction for the PAK protocol instantiated over Gap Diffie-Hellman Groups that is tighter than previously known reductions. We discuss the implications of our results for concrete security. Our proof is the first to show that the PAK protocol can provide meaningful security guarantees for values of the parameters typical in today’s world. [less ▲] Detailed reference viewed: 216 (36 UL)![]() Ontologically stepping-up: A model for refugee entrepreneurship; Iannone, Rosa Lisa ![]() Scientific Conference (2017, December 01) This paper is a first attempt at proposing an integrated conceptual model that would bridge this gap in our knowledge of refugee entrepreneurship. Such a model might then enable for the understanding of ... [more ▼] This paper is a first attempt at proposing an integrated conceptual model that would bridge this gap in our knowledge of refugee entrepreneurship. Such a model might then enable for the understanding of the super-diverse entrepreneurial strategies being employed by super-diverse refugees, within complex and super-diverse socio-economic and political settings – thereby, ontologically stepping-up our theoretical approaches and empirical insights into the phenomenon. [less ▲] Detailed reference viewed: 271 (10 UL) Joint signature of two or more systems with applications to multistate systems made up of two-state componentsMarichal, Jean-Luc ; ; et alin European Journal of Operational Research (2017), 263(2), 559-570 The structure signature of a system made up of n components having continuous and i.i.d. lifetimes was defined in the eighties by Samaniego as the n-tuple whose k-th coordinate is the probability that the ... [more ▼] The structure signature of a system made up of n components having continuous and i.i.d. lifetimes was defined in the eighties by Samaniego as the n-tuple whose k-th coordinate is the probability that the k-th component failure causes the system to fail. More recently, a bivariate version of this concept was considered as follows. The joint structure signature of a pair of systems built on a common set of components having continuous and i.i.d. lifetimes is a square matrix of order n whose (k,l)-entry is the probability that the k-th failure causes the first system to fail and the l-th failure causes the second system to fail. This concept was successfully used to derive a signature-based decomposition of the joint reliability of the two systems. In the first part of this paper we provide an explicit formula to compute the joint structure signature of two or more systems and extend this formula to the general non-i.i.d. case, assuming only that the distribution of the component lifetimes has no ties. We also provide and discuss a necessary and sufficient condition on this distribution for the joint reliability of the systems to have a signature-based decomposition. In the second part of this paper we show how our results can be efficiently applied to the investigation of the reliability and signature of multistate systems made up of two-state components. The key observation is that the structure function of such a multistate system can always be additively decomposed into a sum of classical structure functions. Considering a multistate system then reduces to considering simultaneously several two-state systems. [less ▲] Detailed reference viewed: 180 (19 UL) Preparing Future Teachers for Strategic Uses of Educational Technology: A Project-Based ApproachReuter, Robert ; Busana, Gilbert ![]() Scientific Conference (2017, December 01) Given (1) the need for teachers who are willing and able to design, implement and reflect meaningful and successful educational technology practices in schools and (2) the current rarity of strategic uses ... [more ▼] Given (1) the need for teachers who are willing and able to design, implement and reflect meaningful and successful educational technology practices in schools and (2) the current rarity of strategic uses of ICT in education in Luxembourgish schools, the self-declared lack of competencies and the low confidence of teachers when it comes to teaching with ICT (Reuter, Busana & Linckels, 2016), we have designed, implemented and tested a project-based approach to the development of practice- oriented TPACK in pre-service teachers. Future teacher students are instructed to define an educational problem they want to solve, to explore existing pedagogical and technological solutions and to design an original solution that involves the strategic use of ICT (theoretically grounded and practically meaningful). They then have to implement the designed learning & teaching scenario in a classroom, to document the teaching & learning processes, to analyse, evaluate and to critically reflect them. Finally, they are required to write a structured report about their project and to present it to their peers and to interested teachers from schools. Overall, we observe that while most students become able to design and implement relatively meaningful educational technology practices, they still tend to feel that they are not ready to teach with technology in a more general sense, because their work was focused on one or two tools and does not give them access to a broader range of meaningful ICT-enriched teaching scenarios for their later professional career. [less ▲] Detailed reference viewed: 156 (13 UL) Das postfaktische Drängen des Buchstaben in Zeiten rechtlich-sprachlicher EntgrenzungBecker, Katrin ![]() Presentation (2017, December 01) Detailed reference viewed: 118 (7 UL) Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite; ; et al in The 13th International Conference on Information Security Practice and Experience - ISPEC 2017 (2017, December 01) Detailed reference viewed: 121 (0 UL) Evaluating the Impact of Juice Filming Charging Attack in Practical Environments; ; Liu, Zhe et alin The 20th Annual International Conference on Information Security and Cryptology - ICISC2017 (2017, December 01) Detailed reference viewed: 113 (0 UL)![]() Value-Added Modelling in Primary and Secondary School: An Integrative Review of 674 PublicationsLevy, Jessica ; Keller, Ulrich ; et alScientific Conference (2017, December) Value-added (VA) modelling aims to quantify the effect of pedagogical actions on students’ achievement, independent of students’ backgrounds (e.g., [1]); in other words, VA strives to model the added ... [more ▼] Value-added (VA) modelling aims to quantify the effect of pedagogical actions on students’ achievement, independent of students’ backgrounds (e.g., [1]); in other words, VA strives to model the added value of teaching. VA is typically used for teacher and/or school accountability (e.g., [2]). Although, VA models have gained popularity in recent years—a substantial increase of publications is to be observed over the last decade—, there is no consensus on how to calculate VA, nor is there a consensus whether and which covariates should be included in the statistical models (e.g., [3]). The aim of the present study is to conduct a to date non-existent integrative review on VA modelling in primary and secondary education. Starting with an exhaustive literature research in the ERIC, Scopus, PsycINFO, and Psyndex databases, we reviewed and thoroughly classified 674 VA publications from 32 different countries. Half of the studies investigated VA models at teacher level; the remaining looked at school or principal level. 370 studies used empirical data to calculate VA models. Most of these studies explained their covariates, but approximately 15% did not specify the model. Most studies used prior achievement as a covariate, but cognitive and/or motivational student data were almost never taken into consideration. Moreover, most of the studies did not adjust for methodological issues such as missing data or measurement error. To conclude, given the high relevance of VA—it is primarily used for high-stakes decisions— more transparency, rigor and consensus are needed, especially concerning methodological details. References [1] Braun, H. I. (2005). Using student progress to evaluate teachers: A primer on value-added models. Princeton, NJ: Educational Testing Service. [2] Sanders, W. L. (2000). Value-added assessment from student achievement data: Opportunities and hurdles. Journal of Personnel Evaluation in Education, 14(4), 329–339. [3] Newton, X., Darling-Hammond, L., Haertel, E., & Thomas, E. (2010). Value-added modeling of teacher effectiveness: An exploration of stability across models and contexts. Education Policy Analysis Archives, 18(23). [less ▲] Detailed reference viewed: 150 (25 UL) Systembasierte Analyse von Wirkstoffresistenzen bei MelanomLucarelli, Philippe ; De Landtsheer, Sébastien ; Sauter, Thomas ![]() E-print/Working paper (2017) Detailed reference viewed: 76 (5 UL) Neuro-Inspired Reward-Based Tracking Control for Robotic Manipulators with Unknown DynamicsKlecker, Sophie ; Hichri, Bassem ; Plapper, Peter ![]() in Proceedings of the 2017 2nd International Conference on Robotics and Automation Engineering (ICRAE) (2017, December) Tracking control for robotic manipulators is required for numerous automation tasks in manufacturing engineering. For this purpose, model-free PD-controllers are largely implemented by default in ... [more ▼] Tracking control for robotic manipulators is required for numerous automation tasks in manufacturing engineering. For this purpose, model-free PD-controllers are largely implemented by default in commercially available robot arms and provide satisfactory performance for simple path following applications. Ever more complex automation tasks however ask for novel intelligent and adaptive tracking control strategies. In surface finishing processes, discontinuous freeform paths as well as changing constraints between the robotic end-effector and its surrounding environment affect the tracking control by undermining the stable system performance. The lacking knowledge of industrial robot dynamic parameters presents an additional challenge for the tracking control algorithms. In this paper the control problem of robotic manipulators with unknown dynamics and varying constraints is addressed. A robust sliding mode controller is combined with an RBF (Radial Basis Function) Neural Network-estimator and an intelligent, biomimetic BELBIC (Brain Emotional Learning-Based Intelligent Control) term to approximate the nonlinear robot dynamics function and achieve a robust and adaptive tracking performance. [less ▲] Detailed reference viewed: 129 (17 UL) NATO, the EU and the Arab Refugees Crisis in EuropeAl Hajjaji, Shams Al Din ![]() Presentation (2017, December) Detailed reference viewed: 21 (0 UL) Facing the Safety-Security Gap in RTES: the Challenge of TimelinessVolp, Marcus ; Kozhaya, David ; Verissimo, Paulo ![]() Scientific Conference (2017, December) Safety-critical real-time systems, including real-time cyber-physical and industrial control systems, need not be solely correct but also timely. Untimely (stale) results may have severe consequences that ... [more ▼] Safety-critical real-time systems, including real-time cyber-physical and industrial control systems, need not be solely correct but also timely. Untimely (stale) results may have severe consequences that could render the control system’s behaviour hazardous to the physical world. To ensure predictability and timeliness, developers follow a rigorous process, which essentially ensures real-time properties a priori, in all but the most unlikely combinations of circumstances. However, we have seen the complexity of both real-time applications, and the environments they run on, increase. If this is matched with the also increasing sophistication of attacks mounted to RTES systems, the case for ensuring both safety and security through aprioristic predictability loses traction, and presents an opportunity, which we take in this paper, for discussing current practices of critical realtime system design. To this end, with a slant on low-level task scheduling, we first investigate the challenges and opportunities for anticipating successful attacks on real-time systems. Then, we propose ways for adapting traditional fault- and intrusiontolerant mechanisms to tolerate such hazards. We found that tasks which typically execute as analyzed under accidental faults, may exhibit fundamentally different behavior when compromised by malicious attacks, even with interference enforcement in place. [less ▲] Detailed reference viewed: 163 (15 UL) Energy efficient transmission in MIMO interference channels with QoS constraintsYang, Yang ; in Proc. 8th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (2017, December) Detailed reference viewed: 145 (4 UL) Cellular models as tools for the study of the role of alpha-synuclein in Parkinson's diseasePavlou, Maria Angeliki ; ; in Experimental Neurology (2017) Neurodegenerative diseases are highly debilitating conditions characterised primarily by progressive neuronal loss and impairment of the nervous system. Parkinson's disease (PD) is one of the most common ... [more ▼] Neurodegenerative diseases are highly debilitating conditions characterised primarily by progressive neuronal loss and impairment of the nervous system. Parkinson's disease (PD) is one of the most common of these disorders, affecting 1-2% of the population above the age of 65. Although the underlying mechanisms of PD have been extensively studied, we still lack a full understanding of the molecular underpinnings of the disease. Thus, the in vitro and in vivo models currently used are able to only partially recapitulate the typical phenotypes of the disease. Here, we review various cell culture models currently used to study the molecular basis of PD, with a focus on alpha-synuclein-associated molecular pathologies. We also discuss how different cell models may constitute powerful tools for high-throughput screening of molecules capable of modulating alpha-synuclein toxicity. [less ▲] Detailed reference viewed: 82 (3 UL) Computer-based assessments in PISA. Challenges and potentials for research and policyGreiff, Samuel ; Speeches/Talks (2017) Detailed reference viewed: 33 (2 UL) Surface and subsurface continuous gravimetric monitoring of groundwater recharge processes through the karst vadose zone at Rochefort Cave (Belgium); ; Francis, Olivier et alScientific Conference (2017, December) Detailed reference viewed: 66 (7 UL) On definition and inference of nonlinear Boolean dynamic networksYue, Zuogong ; Thunberg, Johan ; et alin On definition and inference of nonlinear Boolean dynamic networks (2017, December) Network reconstruction has become particularly important in systems biology, and is now expected to deliver information on causality. Systems in nature are inherently nonlinear. However, for nonlinear ... [more ▼] Network reconstruction has become particularly important in systems biology, and is now expected to deliver information on causality. Systems in nature are inherently nonlinear. However, for nonlinear dynamical systems with hidden states, how to give a useful definition of dynamic networks is still an open question. This paper presents a useful definition of Boolean dynamic networks for a large class of nonlinear systems. Moreover, a robust inference method is provided. The well-known Millar-10 model in systems biology is used as a numerical example, which provides the ground truth of causal networks for key mRNAs involved in eukaryotic circadian clocks. In addition, as second contribution of this paper, we suggest definitions of linear network identifiability, which helps to unify the available work on network identifiability. [less ▲] Detailed reference viewed: 163 (5 UL)![]() The Time-Varying Risk of Macroeconomic DisastersPenasse, Julien ![]() Scientific Conference (2017, December) Detailed reference viewed: 71 (0 UL) Probabilistic Analysis of Low-Criticality Execution; ; et al Scientific Conference (2017, December) The mixed-criticality toolbox promises system architects a powerful framework for consolidating real-time tasks with different safety properties on a single computing platform. Thanks to the research ... [more ▼] The mixed-criticality toolbox promises system architects a powerful framework for consolidating real-time tasks with different safety properties on a single computing platform. Thanks to the research efforts in the mixed-criticality field, guarantees provided to the highest criticality level are well understood. However, lower-criticality job execution depends on the condition that all high-criticality jobs complete within their more optimistic low-criticality execution time bounds. Otherwise, no guarantees are made. In this paper, we add to the mixed-criticality toolbox by providing a probabilistic analysis method for low-criticality tasks. While deterministic models reduce task behavior to constant numbers, probabilistic analysis captures varying runtime behavior. We introduce a novel algorithmic approach for probabilistic timing analysis, which we call symbolic scheduling. For restricted task sets, we also present an analytical solution. We use this method to calculate per-job success probabilities for low-criticality tasks, in order to quantify, how low-criticality tasks behave in case of high-criticality jobs overrunning their optimistic low-criticality reservation. [less ▲] Detailed reference viewed: 82 (4 UL) |
||