Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Full Text
Peer Reviewed
See detailLa baignoire, le lit et la porte. La vie sociale des objets de la psychiatrie
Majerus, Benoît UL

in Geneses (2011), 82(1), 95--119

Detailed reference viewed: 222 (4 UL)
Full Text
See detailDie bakterielle Signalverarbeitung am Beispiel des Sucrose Phosphotransferasesystems in Escherichia coli : Modellierung und experimentelle Überprüfung
Sauter, Thomas UL

Doctoral thesis (2003)

Bacterial signal processing was investigated concerning the sucrose phosphotransferase system (sucrose PTS) in the bacterium Escherichia coli as an example. The about 20 different phosphotransferase ... [more ▼]

Bacterial signal processing was investigated concerning the sucrose phosphotransferase system (sucrose PTS) in the bacterium Escherichia coli as an example. The about 20 different phosphotransferase systems (PTSs) of the cell fulfil besides the transport of various carbohydrates, also the function of one signal processing system. Extra- and intracellular signals are converted within the PTS protein chain to important regulatory signals affecting e.g. carbon metabolism and chemotaxis. A detailed dynamical model of the sucrose PTS was developed describing transport and signal processing function. It was formulated using a detailed description of complex formation and phosphate transfer between the chain proteins. Model parameters were taken from literature or were identified with own experiments. Using a formal algorithm including cluster analysis, PTS and glycolysis could be identified as biological functional units with limited autonomy. Simulation studies together with experimental hints showed that the dynamic behaviour of phosphate transfer in the PTS runs within one second. Therefore a description of steady state characteristics is sufficient for describing the signaling properties of the sucrose PTS. A steady state characteristic field describes the degree of phosphorylation of the PTS protein EIIACrr as a function of the input variables extracellular sucrose concentration and intracellular PEP:pyruvate ratio. The model has been validated with different experiments performed in a CSTR using an sucrose positive Escherichia coli W3110 derivative. A method for determining intracellular metabolite concentrations has been developed. A sample preparation technique using a boiling ethanol buffer solution was successfully applied. The PTS output signal degree of phosphorylation of EIIACrr was also measured. Steady state conditions with varying dilution rate and dissolved oxygen concentration and dynamical variations applying different stimuli to the culture were considered. Pulse, and stop feeding experiments with limiting sucrose concentrations were performed. Simulation and experimental results matched well. The same holds for the expanded sucrose PTS and glycolysis model. [less ▲]

Detailed reference viewed: 225 (7 UL)
Full Text
Peer Reviewed
See detailThe Balance Between Security, Privacy and Data Protection in IoT Data Sharing: a Critique to Traditional "Security&Privacy" Surveys
Chiara, Pier Giorgio UL

in European Data Protection Law Review (2021), 7(1), 18-30

The paper examines the normative challenges of the Internet of Things (IoT), in particular, taking into account today’s debate on privacy, data protection, and security issues brought about by IoT. Three ... [more ▼]

The paper examines the normative challenges of the Internet of Things (IoT), in particular, taking into account today’s debate on privacy, data protection, and security issues brought about by IoT. Three different layers of complexity are under scrutiny. They regard (i) moral and political theories on the concept of ‘security’; (ii) whether and to what extent information security technologies, in the context of IoT, may affect fundamental rights, such as privacy and data protection; and, (iii) new legal challenges for individual and group privacy and data protection. The overall aim of the paper is, on the one hand, to stress basic differences between privacy and data protection and why the distinction matters vis-à-vis the flow of information and data sharing on IoT. On the other hand, the intent is to stress the different meanings security has in this context, since the word is often used interchangeably to address information security, cybersecurity, or safety issues. We should take these distinctions firm, when striking balances between privacy, data protection, and ‘security’ on IoT. [less ▲]

Detailed reference viewed: 100 (1 UL)
Full Text
Peer Reviewed
See detailBalance is the challenge--the impact of mitochondrial dynamics in Parkinson's disease.
Burbulla, Lena F.; Krebiehl, Guido; Krüger, Rejko UL

in European journal of clinical investigation (2010), 40(11), 1048-60

Impaired mitochondrial function has been implicated in neurodegeneration in Parkinson's disease (PD) based on biochemical and pathoanatomical studies in brains of PD patients. This observation was further ... [more ▼]

Impaired mitochondrial function has been implicated in neurodegeneration in Parkinson's disease (PD) based on biochemical and pathoanatomical studies in brains of PD patients. This observation was further substantiated by the identification of exogenic toxins, i.e. complex I inhibitors that directly affect mitochondrial energy metabolism and cause Parkinsonism in humans and various animal models. Recently, insights into the underlying molecular signalling pathways leading to alterations in mitochondrial homeostasis were gained based on the functional characterization of mitoprotective genes identified in rare forms of inherited PD. Using in vitro and in vivo loss of function models of the Parkin, PINK1, DJ-1 and Omi/HtrA2 gene, the emerging field of mitochondrial dynamics in PD was established as being critical for the maintenance of mitochondrial function in neurons. This underscored the concept that mitochondria are highly dynamic organelles, which are tightly regulated to continuously adapt shape to functional and anatomical requirements during axonal transport, synaptic signalling, organelle degradation and cellular energy supply. The dissection of pathways involved in mitochondrial quality control clearly established the PINK1/Parkin-pathway in the clearance of dysfunctional mitochondria by autophagy and hints to a complex interplay between PD-associated proteins acting at the mitochondrial interface. The elucidation of this mitoprotective signalling network may help to define novel therapeutic targets for PD via molecular modelling of mitochondria and/or pharmacological modulation of mitochondrial dynamics. [less ▲]

Detailed reference viewed: 108 (1 UL)
Peer Reviewed
See detailThe balance model : Hindrance or support for the solving of linear equations with one unknown
Vlassis, Joëlle UL

in Educational Studies in Mathematics (2002)

Detailed reference viewed: 108 (0 UL)
Full Text
Peer Reviewed
See detailA Balanced Scorecard for Managing the Aging Workforce
VOELPEL, S. C.; Streb, Christoph Klaus UL

in Organizational Dynamics (2010), 39(1), 84-90

Detailed reference viewed: 92 (0 UL)
Full Text
Peer Reviewed
See detailA balancing act: Parameter estimation for biological models with steady-state measurements
Mizera, Andrzej UL; Pang, Jun UL; Sauter, Thomas UL et al

in Proceedings of 11th Conference on Computational Methods in Systems Biology (CMSB'13) (2013)

Detailed reference viewed: 87 (8 UL)
Peer Reviewed
See detailBalancing approaches to Migration Security in Europe and Asia
Searle, Martin; Koff, Harlan UL

in Tan, See Sang; Christiansen, Thomas; Kirchner, Emil (Eds.) The European Union’s Security Relations with Asian Powers (2021)

Migration has recently been framed as a threat to security in many parts of the world. Numerous advanced industrial states have in fact, securitized migration by implementing measures to control and even ... [more ▼]

Migration has recently been framed as a threat to security in many parts of the world. Numerous advanced industrial states have in fact, securitized migration by implementing measures to control and even extend external borders, through increased policing and financial contributions to neighbouring countries that are linked to migration control strategies. This process has led to the spread of formal and informal regionalization strategies in migration affairs. However, levels and types of securitization of migration reflect different perspectives on regional integration. This chapter compares migration governance in Europe and Asia and illustrates how relatively uniform regionalization in Europe has led to institutionalized responses promoting securitization whereas the divergent bottom-up approach to regionalism in Asia has resulted in significant policy variation amongst Asian states. Consequently, Asia’s seeming patchwork response differs from the European Union’s blanket approach, thus impeding close inter-regional collaboration in this policy arena. [less ▲]

Detailed reference viewed: 84 (10 UL)
See detailBalancing competitiveness and social fairness
Muñoz, Susana UL

Scientific Conference (2017, March 29)

This contribution provides a preliminary analysis of the first outline of the European Pillar of Social Rights launched in Mach 2016, pending the European Commission's final proposal expected in early ... [more ▼]

This contribution provides a preliminary analysis of the first outline of the European Pillar of Social Rights launched in Mach 2016, pending the European Commission's final proposal expected in early 2017. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
See detailBALANCING NON-FUNCTIONAL REQUIREMENTS IN CLOUD-BASED SOFTWARE: AN APPROACH BASED ON SECURITY-AWARE DESIGN AND MULTI-OBJECTIVE SOFTWARE DYNAMIC MANAGEMENT
El Kateb, Donia UL

Doctoral thesis (2015)

Beyond its functional requirements, architectural design, the quality of a software system is also defined by the degree to which it meets its non-functional requirements. The complexity of managing these ... [more ▼]

Beyond its functional requirements, architectural design, the quality of a software system is also defined by the degree to which it meets its non-functional requirements. The complexity of managing these non-functional requirements is exacerbated by the fact that they are potentially conflicting with one another. For cloud-based software, i.e., software whose service is delivered through a cloud infrastructure, other constraints related to the features of the hosting data center, such as cost, security and performance, have to be considered by system and software designers. For instance, the evaluation of requests to access sensitive resources results in performance overhead introduced by policy rules evaluation and message exchange between the different geographically distributed components of the authorization system. Duplicating policy rule evaluation engines traditionally solves such performance issues, however such a decision has an impact on security since it introduces additional potential private data leakage points. Taking into account all the aforementioned features is a key factor to enhance the perceived quality of service (QoS) of the cloud as a whole. Maximizing users and software developers satisfaction with cloud-based software is a challenging task since trade-off decisions have to be dynamically taken between these conflicting quality attributes to adapt to system requirements evolution. In this thesis, we tackle the challenges of building a decision support method to optimize software deployment in a cloud environment. Our proposed holistic method operates both at the level of 1) Platform as a service (PaaS) by handling software components deployment to achieve an efficient runtime optimization to satisfy cloud providers and customers objectives 2) Guest applications by making inroads into the design of applications to enable the design of secure systems that also meet flexibility, performance and cost requirements. To thoroughly investigate these challenges, we identify three main objectives that we address as follows: The first objective is to achieve a runtime optimization of cloud-based software deployment at the Platform as a service (PaaS) layer, by considering both cloud customers and providers constraints. To fulfill this objective, we leverage the models@run.time paradigm to build an abstraction layer to model a cloud infrastructure. In a second step, we model the software placement problem as a multi-objective optimization problem and we use multi-objective evolutionary algorithms (MOEAs) to identify a set of possible cloud optimal configurations that exhibit best trade-offs between conflicting objectives. The approach is validated through a case study that we defined with EBRC1, a cloud provider in Luxembourg, as a representative of a software component placement problem in heterogeneous distributed cloud nodes. The second objective is to ameliorate the convergence speed of MOEAs that we have used to achieve a run-time optimization of cloud-based software. To cope with elasticity requirements of cloud-based applications, we improve the way the search strategy operates by proposing a hyper-heuristic that operates on top of MOEAs. Our hyper-heuristic uses the history of mutation effect on fitness functions to select the most relevant mutation operators. Our evaluation shows that MOEAs in conjunction with our hyper-heuristic has a significant performance improvement in terms of resolution time over the original MOEAs. The third objective aims at optimizing cloud-based software trade-offs by exploring applications design as a complementary step to the optimization at the level of the cloud infrastructure, tackled in the first and second objectives. We aimed at achieving security trade-offs at the level of guest applications by revisiting current practices in software methods. We focus on access control as a main security concern and we opt for guest applications that manage resources regulated by access control policies specified in XACML2. This focus is mainly motivated by two key factors: 1) Access control is the pillar of computer security as it allows to protect sensitive resources in a given system from unauthorized accesses 2) XACML is the de facto standard language to specify access control policies and proposes an access control architectural model that supports several advanced access requirements such as interoperability and portability. To attain this objective, we advocate the design of applications based on XACML architectural model to achieve a trade-off between security and flexibility and we adopt a three-step approach: First, we identify a lack in the literature in XACML with obligation handling support. Obligations enable to specify user actions that have to be performed before/during/after the access to resources. We propose an extension of the XACML reference model and language to use the history of obligations states at the decision making time. In this step, we extend XACML access control architecture to support a wider range of usage control scenarios. Second, in order to avoid degrading performance while using a secure architecture based on XACML, we propose a refactoring technique applied on access control policies to enhance request evaluation time. Our approach, evaluated on three Java policy-based systems, enables to substantially reduce request evaluation time. Finally, to achieve a trade-off between a safe security policy evolution and regression testing costs, we develop a regression-test-selection approach for selecting test cases that reveal faults caused by policy changes. To sum up, in all aforementioned objectives, we pursue the goal of analysing and improving the current landscape in the development of cloud-based software. Our focus on security quality attributes is driven by its crucial role in widening the adoption of cloud computing. Our approach brings to light a security-aware design of guest applications that is based on XACML architecture. We provide useful guidelines, methods with underlying algorithms and tools for developers and cloud solution designers to enhance tomorrow’s cloud-based software design. Keywords: XACML-policy based systems, Cloud Computing, Trade-offs, Multi-Objective Optimization [less ▲]

Detailed reference viewed: 275 (51 UL)
See detailBalancing the core activities of universities: For a university that teaches.
Biesta, Gert UL

in Sugden, R; Wilson, J; Valania, M (Eds.) Leadership and cooperation in academia: Reflecting on the roles and responsibilities of university faculty and management (2013)

Detailed reference viewed: 109 (0 UL)
Full Text
See detailBalancing the interests in the context of data retention
Cole, Mark UL; Boehm, Franziska

E-print/Working paper (2013)

Detailed reference viewed: 60 (1 UL)
Full Text
Peer Reviewed
See detailBalancing validity, utility and public health considerations in disorders due to addictive behaviours.
Stein, Dan J.; Billieux, Joël UL; Bowden-Jones, Henrietta et al

in World psychiatry : official journal of the World Psychiatric Association (WPA) (2018), 17(3), 363-364

Detailed reference viewed: 84 (1 UL)
Peer Reviewed
See detailBalduin von Trier, der Luxemburger
Pauly, Michel UL

in Balduin aus dem Hause Luxemburg, Erzbischof und Kurfürst von Trier 1285-1354 (2009)

Detailed reference viewed: 66 (1 UL)
Full Text
See detailBallsportler oder Tänzer? Ballkorobics als Möglichkeit der integrativen Sportvermittlung
Heck, Sandra UL

in Sportunterricht (2009), 58(11), 7-12

Detailed reference viewed: 43 (1 UL)
See detailDas Baltikum - 3 unabhängige Staaten?
Nienaber, Birte UL

Conference given outside the academic context (2010)

The presentation showed to the broader public similarities and differences of the Baltic States.

Detailed reference viewed: 39 (0 UL)