References of "2021"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailBinary blended cement pastes and concrete using gravel wash mud (GWM) powders
Thapa, Vishojit; Waldmann, Daniele UL

in Construction and Building Materials (2021)

Detailed reference viewed: 63 (3 UL)
Full Text
See detailRéflexions sur la signification historique du 11 septembre 2001
Scuto, Denis UL

Article for general public (2021)

The Tageblatt today reproduces for the 20th anniversary of 9/11 excerpts from an article published by the historian Denis Scuto almost twenty years ago in the same Luxembourg newspaper Tageblatt, on 13 ... [more ▼]

The Tageblatt today reproduces for the 20th anniversary of 9/11 excerpts from an article published by the historian Denis Scuto almost twenty years ago in the same Luxembourg newspaper Tageblatt, on 13 December 2001, on the historical meaning of the attacks of 11 September 2001. Three months after the attacks, Denis Scuto explained the changes, imagined or real, and the hopes, legitimate but quickly disappointed. [less ▲]

Detailed reference viewed: 7 (1 UL)
Full Text
Peer Reviewed
See detailMachine learning in mix design of Miscanthus lightweight concrete
Pereira Dias, Patrick; Jayasinghe, Laddu Bhagya; Waldmann, Daniele UL

in Construction and Building Materials (2021)

Detailed reference viewed: 22 (5 UL)
Full Text
See detailOn the Maintenance of System User Interactive Tests
Rwemalika, Renaud UL

Doctoral thesis (2021)

Many companies rely on software testing to verify that their software products meet their requirements. As such, software testing is a keystone of the quality process. It offers means to assess that both ... [more ▼]

Many companies rely on software testing to verify that their software products meet their requirements. As such, software testing is a keystone of the quality process. It offers means to assess that both functional and technical requirements are met. However, scaling the number of tests while preserving their quality poses challenges, just as in any software artifact. This is particularly true in the case of complex tests interacting with the SUT through its Graphical User Interface (GUI), i.e. System User Interactive Test (SUIT). The problem becomes challenging because as the System Under Test (SUT) evolves, the SUIT suites need to adapt and conform to the evolved software. Indeed, because the user interface is a part of the system that tends to undergo rapid evolutions, SUITs are particularly prompt to break. As the first contribution of this dissertation, we aim to demonstrate the problem of test maintenance and overall improve the understanding of SUIT scripts evolution. To that end, we identify, collect and analyze test code changes across the evolution of an industrial test suite. We show that the problem of test maintenance is largely due to test fragility (most commonly performed changes are due to locator and synchronization issues) and bad practices (over 30% of keywords are duplicated). To further investigate the question of bad test code practices such as test clones, we perform a multivocal study to identify which bad practices, i.e. SUIT smells, are already studied in both industry and academia. This process yields a catalog of 35 test code smells. For 16 of them, we derive metrics to analyze their diffusion across tests as well as potential refactoring actions removing the test code smells. Through an empirical study including both industrial and open-source test suites, we show that test code smells are largely present in SUITs, potentially contributing to SUIT fragility and hindering the maintenance process. Interestingly, refactoring actions remain rare during the lifespan of the tests. Yet, symptoms tend to disappear as old tests are discarded and new ones are introduced. However, during the analysis of SUIT smells, we observe that bad practices impacting locators do not appear often in the test code. This observation contrasts with the analysis of the evolution of the SUIT presented in our first empirical study. This apparent contradiction arises from the limitation of property-based locators which rely on the structure of the representation layer of the SUT. Indeed, such approaches are sensitive to internal iso-functional changes occurring during the normal evolution of the SUT. To account for this limitation, we introduce a new way of expressing locators, HPath. Instead of relying on the internal representation of the presentation layer, HPath relies on the rendered characteristics of the GUI. Our results suggest that despite what is presented in the literature on locators, expressions relying on a smaller number of GUI elements to fully qualify a target do not necessarily lead to more robust locators. On the contrary, the choice of the GUI element properties seems to play a stronger role in the robustness to change. Overall, this dissertation provides insights into how SUITs evolve and shows that SUIT fragility plays a major role in the associated maintenance effort. It also proposes techniques that effectively facilitate SUIT maintenance with the early detection of sub-optimal patterns and the introduction of a locator representation more robust to SUT evolution. [less ▲]

Detailed reference viewed: 21 (0 UL)
Full Text
See detailReview of Adam Crymble: Technology and the Historian. Transformations in the Digital Age
Zaagsma, Gerben UL

in H-Soz-Kult: Kommunikation und Fachinformation für die Geschichtswissenschaften (2021)

Detailed reference viewed: 36 (2 UL)
Peer Reviewed
See detailFacets of conscientiousness and their relation to academic achievement: a person-centered approach
Franzen, Patrick UL; Niepel, Christoph UL; Arens, A Katrin et al

Scientific Conference (2021, September 16)

Detailed reference viewed: 28 (0 UL)
Full Text
See detailWeb Archives of the COVID Crisis: Digital Voices, Preservation and Loss
Schafer, Valerie UL

Presentation (2021, September 16)

This roundtable, which is organized by the WARCnet network and chaired by Valérie Schafer (C2DH, University of Luxembourg), aims to shed light on the issues, challenges, values and limits of web archiving ... [more ▼]

This roundtable, which is organized by the WARCnet network and chaired by Valérie Schafer (C2DH, University of Luxembourg), aims to shed light on the issues, challenges, values and limits of web archiving during the COVID crisis. It will combine analysis by web archivists and scholars and entwine analysis of web archiving practices and preserved web content, in order to address several key issues related to the conference, such as the “silences” and “noises” of these archives. The first part of the roundtable will focus on web archives collections that have been created during the COVID-19 crisis by many institutions throughout Europe. Friedel Geeraert (The State Archives of Belgium and the Royal Library of Belgium) will provide a short comparative overview of the strategies of web archiving institutions in Europe, that the team documented through an oral history campaign, while Nicola Bingham (The British Library, UK) will offer more precise overviews of the collections that were gathered respectively by the UK Web Archive and the IIPC (International Internet Preservation Consortium). Claude Mussou (Ina THEQUE, France) will explore the archiving of Twitter at the Institut national de l’audiovisuel (France). Niels Brügger (Aarhus University, Denmark) and Jane Winters (SAS, University of London) will then discuss memories and heritage of the COVID-crisis through the lens of these web archives. Finally the last part will focus on research approaches, notably close and distant reading, and the collective and individual traces, social and political expressions at stake in these web archives: Valérie Schafer will comment on the distant reading approach within these archives. Sophie Gebeil (Aix-Marseille University, France) will underline issues related to “carers” and social struggles. Valérie Schafer will also briefly mention the gendered approach of the COVID crisis that the working group is currently conducting. This roundtable will be followed by a discussion with the audience in order to deepen the topics that are at the core of the conference, whether it be loss, preservation, the political “we”, feelings, etc. [less ▲]

Detailed reference viewed: 40 (0 UL)
Full Text
See detailAnalysis and Probing of Parallel Channels in the Lightning Network
Biryukov, Alexei UL; Naumenko, Gleb; Tikhomirov, Sergei UL

E-print/Working paper (2021)

Bitcoin can process only a few transactions per second, which is insufficient for a global payment network. The Lightning Network (LN) aims to address this challenge. The LN allows for low-latency bitcoin ... [more ▼]

Bitcoin can process only a few transactions per second, which is insufficient for a global payment network. The Lightning Network (LN) aims to address this challenge. The LN allows for low-latency bitcoin transfers through a network of payment channels. In contrast to regular Bitcoin transactions, payments in the LN are not globally broadcast. Thus it may improve not only Bitcoin's scalability but also privacy. However, the probing attack allows an adversary to discover channel balances, threatening users' privacy. Prior work on probing did not account for the possibility of multiple (parallel) channels between two nodes. Naive probing algorithms yield false results for parallel channels. In this work, we develop a new probing model that accurately accounts for parallel channels. We describe jamming-enhanced probing that allows for full balance information extraction in multi-channel hops, which was impossible with earlier probing methods. We quantify the attacker's information gain and propose an optimized algorithm for choosing probe amounts for N-channel hops. We demonstrate its efficiency based on real-world data using our own probing-focused LN simulator. Finally, we discuss countermeasures such as new forwarding strategies, intra-hop payment split, rebalancing, and unannounced channels. [less ▲]

Detailed reference viewed: 25 (3 UL)
Full Text
See detailAttaques et preuves de sécurité des protocoles d'échange de clés authentifiés
Sala, Petra UL

Doctoral thesis (2021)

The vast majority of communication on the Internet and private networks heavily relies on Public-key infrastructure (PKI). One possible solution, to avoid complexities around PKI, is to use Password ... [more ▼]

The vast majority of communication on the Internet and private networks heavily relies on Public-key infrastructure (PKI). One possible solution, to avoid complexities around PKI, is to use Password Authenticated Key-Exchange (PAKE) protocols. PAKE protocols enable a secure communication link between the two parties who only share a low-entropy secret (password). PAKEs were introduced in the 1990s, and with the introduction of the first security models and security proofs in the early 2000s, it was clear that PAKEs have a potential for wide deployment - filling the gap where PKI falls short. PAKEs' PKI-free nature, resistance to phishing attacks and forward secrecy are just some of the properties that make them interesting and important to study. This dissertation includes three works on various aspects of PAKEs: an attack on an existing PAKE proposal, an application of PAKEs in login (for password leak detection) and authentication protocols (HoneyPAKEs), and a security analysis of the J-PAKE protocol, that is used in practice, and its variants. In our first work, we provide an empirical analysis of the zkPAKE protocol proposed in 2015. Our findings show that zkPAKE is not safe against offline dictionary attacks, which is one of the basic security requirements of the PAKE protocols. Further, we demonstrate an implementation of an efficient offline dictionary attack, which emphasizes that, it is necessary to provide a rigorous security proof when proposing a new protocol. In our second contribution, we propose a combined security mechanism called HoneyPAKE. The HoneyPAKE construction aims to detect the loss of password files and ensures that PAKE intrinsically protects that password. This makes the PAKE part of the HoneyPAKE more resilient to server-compromise and pre-computation attacks which are a serious security threat in a client-server communication. Our third contribution facilitates the wider adoption of PAKEs. In this work, we revisit J-PAKE and simplify it by removing a non-interactive zero knowledge proof from the last round of the protocol and derive a lighter and more efficient version called sJ-PAKE. Furthermore, we prove sJ-PAKE secure in the indistinguishability game-based model, the so-called Real-or-Random, also satisfying the notion of perfect forward secrecy. [less ▲]

Detailed reference viewed: 30 (4 UL)
Full Text
Peer Reviewed
See detailNonequilibrium thermodynamics of light-induced reactions
Penocchio, Emanuele UL; Rao, Riccardo; Esposito, Massimiliano UL

in Journal of Chemical Physics (2021), 155

Current formulations of nonequilibrium thermodynamics of open chemical reaction networks only consider chemostats as free-energy sources sustaining nonequilibrium behaviors. Here, we extend the theory to ... [more ▼]

Current formulations of nonequilibrium thermodynamics of open chemical reaction networks only consider chemostats as free-energy sources sustaining nonequilibrium behaviors. Here, we extend the theory to include incoherent light as a source of free energy. We do so by relying on a local equilibrium assumption to derive the chemical potential of photons relative to the system they interact with. This allows us to identify the thermodynamic potential and the thermodynamic forces driving light-reacting chemical systems out-of-equilibrium. We use this framework to treat two paradigmatic photochemical mechanisms describing light-induced unimolecular reactions—namely, the adiabatic and diabatic mechanisms—and highlight the different thermodynamics they lead to. Furthermore, using a thermodynamic coarse-graining procedure, we express our findings in terms of commonly measured experimental quantities, such as quantum yields. [less ▲]

Detailed reference viewed: 17 (0 UL)
Full Text
See detailСоветские военнопленные в Люксембурге и люксембургские военнопленные в СССР
Ganschow, Inna UL

Speeches/Talks (2021)

The bilateral seminar for Luxembourger and Russian history students was shown in the short presentation on the Russian forum "Moya strana - moya Rossiya" as an example of teaching Russian history abroad.

Detailed reference viewed: 11 (0 UL)
Full Text
See detailVerification of design models of cyber-physical systems specified in Simulink
Gaaloul, Khouloud UL

Doctoral thesis (2021)

Recent advances in cyber-physical systems (CPS) have allowed highly available and approachable technologies with interconnected systems between the physical assets and the computational software ... [more ▼]

Recent advances in cyber-physical systems (CPS) have allowed highly available and approachable technologies with interconnected systems between the physical assets and the computational software components. This has resulted in more complex systems with wider capabilities. For example, they can be applied in various domains such as safe transport, efficient medical devices, integrated systems, critical infrastructure control and more. The development of such critical systems requires advanced new models, algorithms, methods and tools to verify and validate the software components and the entire system. The verification of cyber-physical systems has become challenging: (1) The complex and dynamical behaviour of systems requires resilient automated monitors and test oracles that can cope with time-varying variables of CPS. (2) Given the wide range of existing verification and testing techniques from formal to empirical methods, there is no clear guidance as to how different techniques fare in the context of CPS. (3) Due to serious issues when applying exhaustive verification to complex systems, a common practice is needed to verify system components separately. This requires adding implicit assumptions about the operational environment of system components to ensure correct verification. However, identifying environment assumptions for cyber-physical systems with complex, mathematical behaviors is not trivial. In this dissertation, we focus on addressing these challenges. In this dissertation, we propose a set of effective approaches to verify design models of CPS. The work presented in this dissertation is motivated by ESAIL maritime micro-satellite system, developed by LuxSpace, a leading provider of space systems, applications and services in Luxembourg. In addition to ESAIL, we use a benchmark of eleven public-domain Simulink models provided by Lockheed Martin, which are representative of different categories of CPS models in the aerospace and defence sector. To address the aforementioned challenges, we propose (1) an automated approach to translate CPS requirements specified in a logic-based language into test oracles specified in Simulink. The generated oracles are able to deal with CPS complex behaviours and interactions with the system environment; (2) An empirical study to evaluate the fault-finding capabilities of model testing and model checking techniques for Simulink models. We also provide a categorization of model types and a set of common logical patterns for CPS requirements; (3) An automated approach to synthesize environment assumptions for a component under analysis by combining search-based testing, machine learning and model checking procedures. We also propose a novel technique to guide the test generation based on the feedback received from the machine learning process; and (4) An extension of (3) to learn more complex assumptions with arithmetic expressions over multiple signals and numerical variables. [less ▲]

Detailed reference viewed: 81 (3 UL)
Full Text
Peer Reviewed
See detailTesting market regulations in experimental asset markets –The case of margin purchases
Neugebauer, Tibor UL; Füllbrunn, Sascha

in Journal of Economic Behavior and Organization (2021)

Detailed reference viewed: 100 (15 UL)
Full Text
See detailQKD parameter estimation by two-universal hashing leads to faster convergence to the asymptotic rate
Ostrev, Dimiter UL

E-print/Working paper (2021)

This paper proposes and proves security of a QKD protocol which uses two-universal hashing instead of random sampling to estimate the number of bit flip and phase flip errors. For this protocol, the ... [more ▼]

This paper proposes and proves security of a QKD protocol which uses two-universal hashing instead of random sampling to estimate the number of bit flip and phase flip errors. For this protocol, the difference between asymptotic and finite key rate decreases with the number $n$ of qubits as $cn^{-1}$, where $c$ depends on the security parameter. For comparison, the same difference decreases no faster than $c'n^{-1/3}$ for an optimized protocol that uses random sampling and has the same asymptotic rate, where $c'$ depends on the security parameter and the error rate. [less ▲]

Detailed reference viewed: 32 (1 UL)
Full Text
Peer Reviewed
See detailEconomic development, weather shocks and child marriage in South Asia: A machine learning approach
Dietrich, Stephan; Meysonnat, Aline; Rosales, Francisco et al

E-print/Working paper (2021)

Detailed reference viewed: 43 (0 UL)
Full Text
Peer Reviewed
See detailDemocracy, Freedom and Truth at a Time of Digital Disruption: An equation with three unknowns?
Danescu, Elena UL

in IntechOpen (2021)

The pattern of a knowledge-based society relies to a large extent on digital technologies and intangible outputs and generate considerable transnational financial flows and gains. These technologies also ... [more ▼]

The pattern of a knowledge-based society relies to a large extent on digital technologies and intangible outputs and generate considerable transnational financial flows and gains. These technologies also play a key role in providing free access to data and information, encouraging citizen participation in public decision-making, fostering transparency and scrutiny of government action and mobilising new players capable of identifying alternative means of civic and political participation worldwide. At the same time, the increasingly impact of online platforms in manipulating transnational public debates, and the surge in extremist groups using the digital ecosystem to incite hatred, hostility and violence are a warning sign that these modes of communication may be having an adverse effect on democracy and that the boundary between fact and fiction is not as clear as we may like to think. The US presidential election campaign and the Brexit referendum (2016), the theories about COVID-19 (that have flooded the web since 2019), the terrorist attack against French teacher Samuel Paty (16 October 2020) all highlight these trends. When the majority of the world’s citizens are using online media as their main source of information, the proliferation of disinformation and the related threat of radicalism and extremism have led to a growing awareness of these issues at international- and European Union level. What can be done to tackle the situation? How should the democratic states with new forms of private power in the algorithmic society? Where should the line be drawn between freedom of expression and media pluralism on the one hand, and intrusion and censorship of dissenting opinions on the other? How should information be defended as a fundamental right? Is there a moral or ethical code when it comes to information? How can be created an environment that is conducive to inclusive, pluralistic public debate? How to equip citizens to develop a critical approach and to take informed decisions? How to balance innovation with the need to ensure transparency and fairness? Could we be witnessing a situation in which algorithms are “dissolving” democracy? Drawing on the archives of the international and European multilateral organisations (UN/UNESCO, Council of Europe, the Organisation for Security and Cooperation in Europe, the European Union) and several public and private stakeholders worldwide, this chapter proposes: a) to take stock of the issues and challenges raised by the proliferation of fake news, social media and algorithms, and their impact on freedom and democracy; b) to review the regulatory provisions implemented in this area at European and international level; and c) to identify future prospects. [less ▲]

Detailed reference viewed: 92 (2 UL)
Full Text
Peer Reviewed
See detailLa cybersecurity come bene pubblico: alcune riflessioni normative a partire dai recenti sviluppi nel diritto UE
Brighi, Raffaella; Chiara, Pier Giorgio UL

in Federalismi.it (2021), 21

The article casts the light on how and to what extent the recent EU legislative developments can uphold the thesis that would identify cybersecurity as a public good, in particular, taking into account ... [more ▼]

The article casts the light on how and to what extent the recent EU legislative developments can uphold the thesis that would identify cybersecurity as a public good, in particular, taking into account systems’ robustness. The doctrine of the public good, which is typically an economic concept, in its normative dimension reveals a framework of shared responsibilities, in view of the common interest in having a satisfactory level of security of the information systems at the basis of our societies. Improving cybersecurity is essential, on the one hand, to trust and benefit from innovation, connectivity and automation; on the other hand, for safeguarding fundamental rights and freedoms, including the rights to privacy and to the protection of personal data, and the freedom of expression and information. Against this background, the new strategy of the European Commission on cybersecurity, the proposal for an NIS 2.0 Directive and, at a lower level of abstraction, the inclusion of minimum cybersecurity requirements for connected devices in the Directives and Regulations of the “New Legislative Framework” (NLF), testify the firm will of the Commission to outline a clear, coherent and inclusive regulatory framework, in order to increase the global level of security within the Union. [less ▲]

Detailed reference viewed: 31 (1 UL)