La baignoire, le lit et la porte. La vie sociale des objets de la psychiatrieMajerus, Benoît ![]() in Geneses (2011), 82(1), 95--119 Detailed reference viewed: 222 (4 UL) Bail-in and Retail Investors; where regulatory and political disequilibria meetAsimakopoulos, Ioannis ![]() Presentation (2018, April 12) Detailed reference viewed: 53 (4 UL) Die bakterielle Signalverarbeitung am Beispiel des Sucrose Phosphotransferasesystems in Escherichia coli : Modellierung und experimentelle ÜberprüfungSauter, Thomas ![]() Doctoral thesis (2003) Bacterial signal processing was investigated concerning the sucrose phosphotransferase system (sucrose PTS) in the bacterium Escherichia coli as an example. The about 20 different phosphotransferase ... [more ▼] Bacterial signal processing was investigated concerning the sucrose phosphotransferase system (sucrose PTS) in the bacterium Escherichia coli as an example. The about 20 different phosphotransferase systems (PTSs) of the cell fulfil besides the transport of various carbohydrates, also the function of one signal processing system. Extra- and intracellular signals are converted within the PTS protein chain to important regulatory signals affecting e.g. carbon metabolism and chemotaxis. A detailed dynamical model of the sucrose PTS was developed describing transport and signal processing function. It was formulated using a detailed description of complex formation and phosphate transfer between the chain proteins. Model parameters were taken from literature or were identified with own experiments. Using a formal algorithm including cluster analysis, PTS and glycolysis could be identified as biological functional units with limited autonomy. Simulation studies together with experimental hints showed that the dynamic behaviour of phosphate transfer in the PTS runs within one second. Therefore a description of steady state characteristics is sufficient for describing the signaling properties of the sucrose PTS. A steady state characteristic field describes the degree of phosphorylation of the PTS protein EIIACrr as a function of the input variables extracellular sucrose concentration and intracellular PEP:pyruvate ratio. The model has been validated with different experiments performed in a CSTR using an sucrose positive Escherichia coli W3110 derivative. A method for determining intracellular metabolite concentrations has been developed. A sample preparation technique using a boiling ethanol buffer solution was successfully applied. The PTS output signal degree of phosphorylation of EIIACrr was also measured. Steady state conditions with varying dilution rate and dissolved oxygen concentration and dynamical variations applying different stimuli to the culture were considered. Pulse, and stop feeding experiments with limiting sucrose concentrations were performed. Simulation and experimental results matched well. The same holds for the expanded sucrose PTS and glycolysis model. [less ▲] Detailed reference viewed: 225 (7 UL) The Balance Between Security, Privacy and Data Protection in IoT Data Sharing: a Critique to Traditional "Security&Privacy" SurveysChiara, Pier Giorgio ![]() in European Data Protection Law Review (2021), 7(1), 18-30 The paper examines the normative challenges of the Internet of Things (IoT), in particular, taking into account today’s debate on privacy, data protection, and security issues brought about by IoT. Three ... [more ▼] The paper examines the normative challenges of the Internet of Things (IoT), in particular, taking into account today’s debate on privacy, data protection, and security issues brought about by IoT. Three different layers of complexity are under scrutiny. They regard (i) moral and political theories on the concept of ‘security’; (ii) whether and to what extent information security technologies, in the context of IoT, may affect fundamental rights, such as privacy and data protection; and, (iii) new legal challenges for individual and group privacy and data protection. The overall aim of the paper is, on the one hand, to stress basic differences between privacy and data protection and why the distinction matters vis-à-vis the flow of information and data sharing on IoT. On the other hand, the intent is to stress the different meanings security has in this context, since the word is often used interchangeably to address information security, cybersecurity, or safety issues. We should take these distinctions firm, when striking balances between privacy, data protection, and ‘security’ on IoT. [less ▲] Detailed reference viewed: 100 (1 UL) Balance is the challenge--the impact of mitochondrial dynamics in Parkinson's disease.; ; Krüger, Rejko ![]() in European journal of clinical investigation (2010), 40(11), 1048-60 Impaired mitochondrial function has been implicated in neurodegeneration in Parkinson's disease (PD) based on biochemical and pathoanatomical studies in brains of PD patients. This observation was further ... [more ▼] Impaired mitochondrial function has been implicated in neurodegeneration in Parkinson's disease (PD) based on biochemical and pathoanatomical studies in brains of PD patients. This observation was further substantiated by the identification of exogenic toxins, i.e. complex I inhibitors that directly affect mitochondrial energy metabolism and cause Parkinsonism in humans and various animal models. Recently, insights into the underlying molecular signalling pathways leading to alterations in mitochondrial homeostasis were gained based on the functional characterization of mitoprotective genes identified in rare forms of inherited PD. Using in vitro and in vivo loss of function models of the Parkin, PINK1, DJ-1 and Omi/HtrA2 gene, the emerging field of mitochondrial dynamics in PD was established as being critical for the maintenance of mitochondrial function in neurons. This underscored the concept that mitochondria are highly dynamic organelles, which are tightly regulated to continuously adapt shape to functional and anatomical requirements during axonal transport, synaptic signalling, organelle degradation and cellular energy supply. The dissection of pathways involved in mitochondrial quality control clearly established the PINK1/Parkin-pathway in the clearance of dysfunctional mitochondria by autophagy and hints to a complex interplay between PD-associated proteins acting at the mitochondrial interface. The elucidation of this mitoprotective signalling network may help to define novel therapeutic targets for PD via molecular modelling of mitochondria and/or pharmacological modulation of mitochondrial dynamics. [less ▲] Detailed reference viewed: 108 (1 UL)![]() The balance model : Hindrance or support for the solving of linear equations with one unknownVlassis, Joëlle ![]() in Educational Studies in Mathematics (2002) Detailed reference viewed: 108 (0 UL) Balance y perspectivas de las relaciones parlamentarias Unión Europea-México (Conferencia de apertura - Espacio Parlamento Europeo)Velasco Pufleau, Monica ![]() Scientific Conference (2014) Detailed reference viewed: 50 (7 UL) A Balanced Scorecard for Managing the Aging Workforce; Streb, Christoph Klaus ![]() in Organizational Dynamics (2010), 39(1), 84-90 Detailed reference viewed: 92 (0 UL) A balancing act: Parameter estimation for biological models with steady-state measurementsMizera, Andrzej ; Pang, Jun ; Sauter, Thomas et alin Proceedings of 11th Conference on Computational Methods in Systems Biology (CMSB'13) (2013) Detailed reference viewed: 87 (8 UL)![]() Balancing approaches to Migration Security in Europe and Asia; Koff, Harlan ![]() in Tan, See Sang; Christiansen, Thomas; Kirchner, Emil (Eds.) The European Union’s Security Relations with Asian Powers (2021) Migration has recently been framed as a threat to security in many parts of the world. Numerous advanced industrial states have in fact, securitized migration by implementing measures to control and even ... [more ▼] Migration has recently been framed as a threat to security in many parts of the world. Numerous advanced industrial states have in fact, securitized migration by implementing measures to control and even extend external borders, through increased policing and financial contributions to neighbouring countries that are linked to migration control strategies. This process has led to the spread of formal and informal regionalization strategies in migration affairs. However, levels and types of securitization of migration reflect different perspectives on regional integration. This chapter compares migration governance in Europe and Asia and illustrates how relatively uniform regionalization in Europe has led to institutionalized responses promoting securitization whereas the divergent bottom-up approach to regionalism in Asia has resulted in significant policy variation amongst Asian states. Consequently, Asia’s seeming patchwork response differs from the European Union’s blanket approach, thus impeding close inter-regional collaboration in this policy arena. [less ▲] Detailed reference viewed: 84 (10 UL) Balancing competitiveness and social fairnessMuñoz, Susana ![]() Scientific Conference (2017, March 29) This contribution provides a preliminary analysis of the first outline of the European Pillar of Social Rights launched in Mach 2016, pending the European Commission's final proposal expected in early ... [more ▼] This contribution provides a preliminary analysis of the first outline of the European Pillar of Social Rights launched in Mach 2016, pending the European Commission's final proposal expected in early 2017. [less ▲] Detailed reference viewed: 22 (0 UL) BALANCING NON-FUNCTIONAL REQUIREMENTS IN CLOUD-BASED SOFTWARE: AN APPROACH BASED ON SECURITY-AWARE DESIGN AND MULTI-OBJECTIVE SOFTWARE DYNAMIC MANAGEMENTEl Kateb, Donia ![]() Doctoral thesis (2015) Beyond its functional requirements, architectural design, the quality of a software system is also defined by the degree to which it meets its non-functional requirements. The complexity of managing these ... [more ▼] Beyond its functional requirements, architectural design, the quality of a software system is also defined by the degree to which it meets its non-functional requirements. The complexity of managing these non-functional requirements is exacerbated by the fact that they are potentially conflicting with one another. For cloud-based software, i.e., software whose service is delivered through a cloud infrastructure, other constraints related to the features of the hosting data center, such as cost, security and performance, have to be considered by system and software designers. For instance, the evaluation of requests to access sensitive resources results in performance overhead introduced by policy rules evaluation and message exchange between the different geographically distributed components of the authorization system. Duplicating policy rule evaluation engines traditionally solves such performance issues, however such a decision has an impact on security since it introduces additional potential private data leakage points. Taking into account all the aforementioned features is a key factor to enhance the perceived quality of service (QoS) of the cloud as a whole. Maximizing users and software developers satisfaction with cloud-based software is a challenging task since trade-off decisions have to be dynamically taken between these conflicting quality attributes to adapt to system requirements evolution. In this thesis, we tackle the challenges of building a decision support method to optimize software deployment in a cloud environment. Our proposed holistic method operates both at the level of 1) Platform as a service (PaaS) by handling software components deployment to achieve an efficient runtime optimization to satisfy cloud providers and customers objectives 2) Guest applications by making inroads into the design of applications to enable the design of secure systems that also meet flexibility, performance and cost requirements. To thoroughly investigate these challenges, we identify three main objectives that we address as follows: The first objective is to achieve a runtime optimization of cloud-based software deployment at the Platform as a service (PaaS) layer, by considering both cloud customers and providers constraints. To fulfill this objective, we leverage the models@run.time paradigm to build an abstraction layer to model a cloud infrastructure. In a second step, we model the software placement problem as a multi-objective optimization problem and we use multi-objective evolutionary algorithms (MOEAs) to identify a set of possible cloud optimal configurations that exhibit best trade-offs between conflicting objectives. The approach is validated through a case study that we defined with EBRC1, a cloud provider in Luxembourg, as a representative of a software component placement problem in heterogeneous distributed cloud nodes. The second objective is to ameliorate the convergence speed of MOEAs that we have used to achieve a run-time optimization of cloud-based software. To cope with elasticity requirements of cloud-based applications, we improve the way the search strategy operates by proposing a hyper-heuristic that operates on top of MOEAs. Our hyper-heuristic uses the history of mutation effect on fitness functions to select the most relevant mutation operators. Our evaluation shows that MOEAs in conjunction with our hyper-heuristic has a significant performance improvement in terms of resolution time over the original MOEAs. The third objective aims at optimizing cloud-based software trade-offs by exploring applications design as a complementary step to the optimization at the level of the cloud infrastructure, tackled in the first and second objectives. We aimed at achieving security trade-offs at the level of guest applications by revisiting current practices in software methods. We focus on access control as a main security concern and we opt for guest applications that manage resources regulated by access control policies specified in XACML2. This focus is mainly motivated by two key factors: 1) Access control is the pillar of computer security as it allows to protect sensitive resources in a given system from unauthorized accesses 2) XACML is the de facto standard language to specify access control policies and proposes an access control architectural model that supports several advanced access requirements such as interoperability and portability. To attain this objective, we advocate the design of applications based on XACML architectural model to achieve a trade-off between security and flexibility and we adopt a three-step approach: First, we identify a lack in the literature in XACML with obligation handling support. Obligations enable to specify user actions that have to be performed before/during/after the access to resources. We propose an extension of the XACML reference model and language to use the history of obligations states at the decision making time. In this step, we extend XACML access control architecture to support a wider range of usage control scenarios. Second, in order to avoid degrading performance while using a secure architecture based on XACML, we propose a refactoring technique applied on access control policies to enhance request evaluation time. Our approach, evaluated on three Java policy-based systems, enables to substantially reduce request evaluation time. Finally, to achieve a trade-off between a safe security policy evolution and regression testing costs, we develop a regression-test-selection approach for selecting test cases that reveal faults caused by policy changes. To sum up, in all aforementioned objectives, we pursue the goal of analysing and improving the current landscape in the development of cloud-based software. Our focus on security quality attributes is driven by its crucial role in widening the adoption of cloud computing. Our approach brings to light a security-aware design of guest applications that is based on XACML architecture. We provide useful guidelines, methods with underlying algorithms and tools for developers and cloud solution designers to enhance tomorrow’s cloud-based software design. Keywords: XACML-policy based systems, Cloud Computing, Trade-offs, Multi-Objective Optimization [less ▲] Detailed reference viewed: 275 (51 UL) Balancing the core activities of universities: For a university that teaches.Biesta, Gert ![]() in Sugden, R; Wilson, J; Valania, M (Eds.) Leadership and cooperation in academia: Reflecting on the roles and responsibilities of university faculty and management (2013) Detailed reference viewed: 109 (0 UL) Balancing the interests in the context of data retentionCole, Mark ; E-print/Working paper (2013) Detailed reference viewed: 60 (1 UL) Balancing validity, utility and public health considerations in disorders due to addictive behaviours.; Billieux, Joël ; et alin World psychiatry : official journal of the World Psychiatric Association (WPA) (2018), 17(3), 363-364 Detailed reference viewed: 84 (1 UL) Balans voor de toekomst. Impressies van het 12e congres van de Deutsche Gesellschaft für Erziehungswissenschaft te Bielefeld, 19-21 maart 1990.; Biesta, Gert ![]() in Pedagogisch Tijdschrift. (1990), 15(4), 233-239 Detailed reference viewed: 22 (0 UL)![]() Balduin von Trier, der LuxemburgerPauly, Michel ![]() in Balduin aus dem Hause Luxemburg, Erzbischof und Kurfürst von Trier 1285-1354 (2009) Detailed reference viewed: 66 (1 UL) BaleineBis: Une enquête sur un marché linguistique multilingue en profonde mutation Luxemburgs Sprachenmarkt im WandelFehlen, Fernand ![]() Book published by SESOPI (2009) Detailed reference viewed: 428 (46 UL) Ballsportler oder Tänzer? Ballkorobics als Möglichkeit der integrativen SportvermittlungHeck, Sandra ![]() in Sportunterricht (2009), 58(11), 7-12 Detailed reference viewed: 43 (1 UL) Das Baltikum - 3 unabhängige Staaten?Nienaber, Birte ![]() Conference given outside the academic context (2010) The presentation showed to the broader public similarities and differences of the Baltic States. Detailed reference viewed: 39 (0 UL) |
||