References of "Paper published in a book"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailCurves over finite fields and moduli spaces
van der Geer, Gerard UL

in Curves over finite fields: past, present and future. (in press)

Detailed reference viewed: 47 (0 UL)
Full Text
Peer Reviewed
See detailÉcologie culturelle d’une petite littérature européenne
Thiltges, Sébastian UL

in Écocritique : nouvelles territorialités 2 (in press)

Detailed reference viewed: 21 (0 UL)
Full Text
Peer Reviewed
See detailL’écolittérature jeunesse face à demain
Thiltges, Sébastian UL

in Littérature de jeunesse et écologie (in press)

Detailed reference viewed: 27 (1 UL)
Full Text
Peer Reviewed
See detailConclusion : La parole donnée à la littérature jeunesse
Thiltges, Sébastian UL; Raus, Tonia UL

in Peut-on tout leur dire ? Formes de l’indicible en littérature jeunesse (in press)

Detailed reference viewed: 21 (0 UL)
Full Text
Peer Reviewed
See detailWide-Beamwidth Circular Polarized Antenna for Diversity Combining Applications
Vasquez-Peralvo, Juan Andres UL; Merlano Duncan, Juan Carlos UL; Eappen, Geoffrey UL et al

in Vasquez-Peralvo, Juan Andres; Merlano Duncan, Juan Carlos; Eappen, Geoffrey (Eds.) et al Global Communications Conference, Rio de Janeiro, 4 - 9 December 2022 (in press)

This paper presents the design, simulation, and manufacturing of a right-hand circularly polarized antenna working in the frequency band 17.7-20.2 GHz with a beamwidth of 42.4$^\circ$ and 5.4$^\circ$ for ... [more ▼]

This paper presents the design, simulation, and manufacturing of a right-hand circularly polarized antenna working in the frequency band 17.7-20.2 GHz with a beamwidth of 42.4$^\circ$ and 5.4$^\circ$ for the H-plane and E-plane, respectively. The presented antenna is part of a set of three antennas, two high-gain antennas, and, presented in this paper, a low directive antenna used for reception. The application we describe in this paper combines the radio-frequency signals obtained from the O3b satellite constellation, using three antennas to apply path diversity later to reconstruct the original signal. Moreover, using an antenna with a beamwidth in one plane allows receiving two satellite signals at the same time, increasing by 3 dB the overall gain. The wide-band capabilities of the antenna are obtained using aperture coupling. In particular, the circular polarization of the antenna is generated using a truncated corner square patch. Further, a metasurface is placed at the top to enhance the axial ratio. Importantly, the simulation results obtained using CST Microwave Studio show that the antenna has a reflection coefficient below -10 dB and an axial ratio below -3 dB in the intended frequency range. [less ▲]

Detailed reference viewed: 99 (33 UL)
Full Text
Peer Reviewed
See detailTowards Modeling and Predicting the Resilience of Ecosystems
Sousa, Tiago UL

in Sousa, Tiago (Ed.) Towards Modeling and Predicting the Resilience of Ecosystems (in press)

Since the Stockholm Declaration on the human environment in 1972, there has been a growing recognition of the impact of human activities on Earth's ecosystems. This has created an increasing need for ... [more ▼]

Since the Stockholm Declaration on the human environment in 1972, there has been a growing recognition of the impact of human activities on Earth's ecosystems. This has created an increasing need for modeling and predicting the resilience of ecosystems, which is crucial not only for understanding ecosystem patterns and processes but also for addressing climate change and implementing effective conservation and management strategies. Despite the importance of this issue, the intrinsic complexity of ecosystems and the lack of sufficient data present considerable challenges. To address these challenges, we propose an approach that combines model-driven engineering and artificial intelligence. Specifically, we propose a formalization for modeling and verifying ecosystem requirements, a method for synthesizing heterogeneous ecosystem resilience data, and a product line of neural network architectures adaptable to diverse properties and types of ecosystem scenarios to study. Additionally, we propose a model-driven process specification detailing the different artifacts, stakeholder roles, tasks, and model transformations of the proposed approach. This paper outlines the problem and preliminary work, presents the proposed approach, which is the current focus of an ongoing Ph.D. thesis, and discusses the future research contributions. [less ▲]

Detailed reference viewed: 43 (9 UL)
Full Text
Peer Reviewed
See detailDéchets radioactifs : que dire aux générations futures ?
Thiltges, Sébastian UL

in Peut-on tout leur dire ? Formes de l’indicible en littérature jeunesse (in press)

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailDaMAT: A Data-driven Mutation Analysis Tool
Vigano, Enrico UL; Cornejo Olivares, Oscar Eduardo UL; Pastore, Fabrizio UL et al

in Proceedings of the 45th International Conference on Software Engineering (ICSE ’23) (in press)

We present DaMAT, a tool that implements data- driven mutation analysis. In contrast to traditional code-driven mutation analysis tools it mutates (i.e., modifies) the data ex- changed by components ... [more ▼]

We present DaMAT, a tool that implements data- driven mutation analysis. In contrast to traditional code-driven mutation analysis tools it mutates (i.e., modifies) the data ex- changed by components instead of the source of the software under test. Such an approach helps ensure that test suites appropriately exercise components interoperability — essential for safety-critical cyber-physical systems. A user-provided fault model drives the mutation process. We have successfully evalu- ated DaMAT on software controlling a microsatellite and a set of libraries used in deployed CubeSats. A demo video of DaMAT is available at https://youtu.be/s5M52xWCj84 [less ▲]

Detailed reference viewed: 203 (1 UL)
Full Text
Peer Reviewed
See detailAML/CFT/CPF endeavors in the crypto space: from blockchain analytics to machine learning
Pocher, Nadia UL; Zichichi, Mirko; Ferretti, Stefano

in Proceedings of Artificial Intelligence Governance Ethics and Law (AIGEL) (in press)

Financial applications of distributed ledger technologies (DLTs) generate regulatory concerns. In the crypto sphere, pseudonymity may safeguard privacy and data protection, but lack of identifiability ... [more ▼]

Financial applications of distributed ledger technologies (DLTs) generate regulatory concerns. In the crypto sphere, pseudonymity may safeguard privacy and data protection, but lack of identifiability cripples investigation and enforcement. This challenges the fight against money laundering and the financing of terrorism and proliferation (AML/CFT/CPF). Nonetheless, forensic techniques trace transfers across blockchain ecosystems and provide intelligence to regulated entities. This working paper addresses anomaly detection in the crypto space, the role of machine learning, and the impact of disintermediation. [less ▲]

Detailed reference viewed: 53 (0 UL)
Full Text
Peer Reviewed
See detailVon Objekt- und Meta-Ebenen: Analyse der Softwareanforderungen computergestützter juristischer Entscheidungen
Adrian, Axel; Rapp, Max; Steen, Alexander UL

in Recht DIGITAL – 25 Jahre IRIS, Proceedings of the International Legal Informatics Symposium (IRIS 2022) (in press)

Die Interpretation und Anwendung von Gesetzestexten auf einem konkreten Lebenssachverhalt erfordert von menschlichen Experten ein hohes Maß an Wissen, Erfahrung und die Fähigkeit zahlreiche kontextuelle ... [more ▼]

Die Interpretation und Anwendung von Gesetzestexten auf einem konkreten Lebenssachverhalt erfordert von menschlichen Experten ein hohes Maß an Wissen, Erfahrung und die Fähigkeit zahlreiche kontextuelle Überlegungen anzustellen. Die Formalisierung und Automatisierung solch eines Prozesses in einem computergestützten Verfahren muss dies entsprechend reflektieren. Ausgehend von einer Fallstudie werden in dieser Arbeit erforderliche juridische Schritte der Rechtsanwendung identifiziert und verschiedenen Objekt- und Meta-Ebenen zugeordnet. Diese Zuordnung erlaubt eine abstrakte Analyse von Softwareanforderungen, die juristische Assistenzsysteme erfüllen müssen, um bei juristischen Fallentscheidungen unterstützen zu können. [less ▲]

Detailed reference viewed: 87 (1 UL)
Full Text
Peer Reviewed
See detailDiscrete-Phase Sequence Design with Stopband and PSL Constraints for Cognitive Radar
Alaeekerahroodi, Mohammad UL; Kumar, Sumit UL; Mysore Rama Rao, Bhavani Shankar UL et al

in Proceedings of EuRAD 2020 (in press)

We present the design of discrete-phase sequences considering simultaneously the peak sidelobe level (PSL) and avoiding reserved frequency bands which are occupied by narrowband interferers or ... [more ▼]

We present the design of discrete-phase sequences considering simultaneously the peak sidelobe level (PSL) and avoiding reserved frequency bands which are occupied by narrowband interferers or communications. We use the coordinate descent framework and propose an algorithm to design discrete-phase sequences with spectral power suppressed in arbitrary bands and with low auto-correlation sidelobes in terms of PSL. Our proposed algorithm exploits fast Fourier transform and is, therefore, computationally efficient. The over-the-air experiments using implementation on software-defined radio show reasonable agreement with numerical simulations and feasibility for field-deployment [less ▲]

Detailed reference viewed: 141 (9 UL)
Full Text
Peer Reviewed
See detailA New Perspective on the Luxembourgish Genitive
Döhmer, Caroline UL

in Germanic Genitives (in press)

Detailed reference viewed: 526 (15 UL)
Full Text
Peer Reviewed
See detailTriangular Intertwined Frequency Selective Surface
Vasquez-Peralvo, Juan Andres UL; Merlano Duncan, Juan Carlos UL; Chatzinotas, Symeon UL et al

in Vasquez-Peralvo, Juan Andres; Merlano Duncan, Juan Carlos; Chatzinotas, Symeon (Eds.) et al International symposium on antennas and propagation (in press)

This paper presents a frequency selective surface design and simulation using intertwined triangular structures. It has been discovered that by using the proposed tessellated intertwined lattice, the ... [more ▼]

This paper presents a frequency selective surface design and simulation using intertwined triangular structures. It has been discovered that by using the proposed tessellated intertwined lattice, the reduction of the resonance frequency of a frequency selective surface can be improved by 22.58% compared with other triangular structures. Additionally, this structure is used as a MEFSS to improve the miniaturization of the structure and obtain a compact, angular stable band-pass filter. The simulations presented in this paper have been obtained using CST Microwave Studio. [less ▲]

Detailed reference viewed: 49 (9 UL)
Full Text
Peer Reviewed
See detailThe Effect of Rapport on Delegation to Virtual Agents
Sun, Ningyuan UL; Botev, Jean UL; Simoens, Pieter

in Proceedings of the 23rd ACM International Conference on Intelligent Virtual Agents (IVA) (in press)

Detailed reference viewed: 54 (4 UL)
Full Text
Peer Reviewed
See detailLa littérature luxembourgeoise à l’école : une didactique interculturelle de la littérature en contexte multilingue
Thiltges, Sébastian UL; Raus, Tonia UL

in Transnationale und interkulturelle Literaturwissenschaft und Litertaturdidaktik : Konzeptionelle und digitale Transformationen (in press)

In Luxembourg, multilingual requirements are a corollary of the country’s historical trilingualism and characterize its school system: Luxembourgish is the national language, French and German the ... [more ▼]

In Luxembourg, multilingual requirements are a corollary of the country’s historical trilingualism and characterize its school system: Luxembourgish is the national language, French and German the official languages. Like other European countries, English tends to occupy an increasingly important place, as a language taught in secondary school, while Luxembourgish plays only a minor role as a school subject. Rooted in the traditional association of language and literature, Luxembourg’s school environment is still largely organized according to a juxtaposed multilingualism, with clear linguistic separations and specific disciplinary cultures. These characteristics considerably hinder, among others, the entry of works from the Luxembourg literary field into the curricular path of secondary education. In fact, Luxembourgish literature, an essentially multilingual (Luxembourgish, French, German and more recently English, Italian, Portuguese) and small literature, is hardly taught in schools: the national literature struggles to impose itself compared to the cultural references of the large neighboring countries. At the same time, the weak literary production intended for adolescent readers, which translates socio-literarily into the absence of specific editorial collections, finds only a slight echo with its recipients. Starting from this double literary and didactic context, we wish to present our project to publish a novel by a French-language Luxembourg author in a digital format, thus remediatizing the texts, and broadening them with educational content and activities. The development of these new media considers the multilingual and intercultural particularities of Luxembourg’s literary and school environments and targets a readership fond of new reading practices. By adopting a research-action approach, we’d like to cover multiple research areas (multilingual children's literature in a small literary field, digital reading practices, teaching of literary reading in a multilingual school context) and we could integrate the project in our teaching in the Master in Secondary Education to train future teachers. [less ▲]

Detailed reference viewed: 56 (1 UL)
Full Text
Peer Reviewed
See detailShort-Packet Communication Assisted Reliable Control of UAV for Optimum Coverage Range
Solanki, Sourabh UL; Singh, Vibhum UL; Gautam, Sumit et al

in Short-Packet Communication Assisted Reliable Control of UAV for Optimum Coverage Range (in press)

The reliability of command and control (C2) operation of the UAV is one of the crucial aspects for the success of UAV applications beyond 5G wireless networks. In this paper, we focus on the short-packet ... [more ▼]

The reliability of command and control (C2) operation of the UAV is one of the crucial aspects for the success of UAV applications beyond 5G wireless networks. In this paper, we focus on the short-packet communication to maximize the coverage range of reliable UAV control. We quantify the reliability performance of the C2 transmission from a multi-antenna ground control station (GCS), which also leverages maximal-ratio transmission beamforming, by deriving the closed-form expression for the average block error rate (BLER). To obtain additional insights, we also derive the asymptotic expression of the average BLER in the high-transmit power regime and subsequently analyze the possible UAV configuration space to find the optimum altitude. Based on the derived average BLER, we formulate a joint optimization problem to maximize the range up to which a UAV can be reliably controlled from a GCS. The solution to this problem leads to the optimal resource allocation parameters including blocklength and transmit power while exploiting the vertical degrees of freedom for UAV placement. Finally, we present numerical and simulation results to corroborate the analysis and to provide various useful design insights. [less ▲]

Detailed reference viewed: 96 (18 UL)
Full Text
Peer Reviewed
See detailFuzzing for CPS Mutation Testing
Lee, Jaekwon; Vigano, Enrico UL; Cornejo, Oscar et al

in Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering (in press)

Detailed reference viewed: 45 (0 UL)
See detail« … Eripuit servus mihi vitam » - Représentations médiatiques de la violence et de la criminalité dans les provinces occidentales de l'Empire romain
Binsfeld, Andrea UL

in Amodio, Mara (Ed.) The imagery of violence in Roman society (I-VI cent.). Persistence, innovations and interrelations from the Roman to the Christian Empire (in press)

Detailed reference viewed: 159 (18 UL)
Full Text
Peer Reviewed
See detailIntroduction : Indicible et littérature jeunesse, une antinomie ?
Thiltges, Sébastian UL; Raus, Tonia UL

in Peut-on tout leur dire ? Formes de l’indicible en littérature jeunesse (in press)

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailConservazione e ricezione dei documenti pontifici in Italia settentrionale: il caso del monastero cistercense di Chiaravalle Milanese (secoli XII-XVI)
Salemme, Timothy UL

in Salemme, Timothy; Renault, Jean-Baptiste (Eds.) Conservation et réception des documents pontificaux par les Ordres religieux (XIe-XVe siècles). Actes du colloque international. Nancy, 12-13 décembre 2013 (in press)

Detailed reference viewed: 69 (2 UL)
Full Text
Peer Reviewed
See detailBlockchain Governance: An Overview and Prediction of Optimal Strategies Using Nash Equilibrium
Khan, Nida UL; Ahmad, Tabrez; Patel, Anass et al

in 3rd AUE International Research Conference (in press)

Blockchain governance is a subject of ongoing research and an interdisciplinary view of blockchain governance is vital to aid in further research for establishing a formal governance framework for this ... [more ▼]

Blockchain governance is a subject of ongoing research and an interdisciplinary view of blockchain governance is vital to aid in further research for establishing a formal governance framework for this nascent technology. In this paper, the position of blockchain governance within the hierarchy of Institutional governance is discussed. Blockchain governance is analyzed from the perspective of IT governance using Nash equilibrium to predict the outcome of different governance decisions. A payoff matrix for blockchain governance is created and simulation of different strategy profiles is accomplished for computation of all Nash equilibria. We also create payoff matrices for different kinds of blockchain governance, which were used to propose novel mathematical formulae usable to predict the best governance strategy that minimizes the occurrence of a hard fork as well as predicts the behavior of the majority during protocol updates. [less ▲]

Detailed reference viewed: 347 (29 UL)
Full Text
Peer Reviewed
See detailSur les pas des poètes ? Une comparaison de deux sentiers littéraires luxembourgeois
Thiltges, Sébastian UL

in Penser la promenade littéraire (in press)

At the center of this communication are two literary hiking trails: the Sentier des poètes in the Fond-de-Gras in the mining south of Luxembourg, inaugurated in 2011 on the occasion of the international ... [more ▼]

At the center of this communication are two literary hiking trails: the Sentier des poètes in the Fond-de-Gras in the mining south of Luxembourg, inaugurated in 2011 on the occasion of the international year of the forest, and the Ettelbrécker Literaturwee [The Literary Trail of the city of Ettelbruck] in the north, on the edge of the Ardennes, which is currently under construction and whose inauguration is scheduled for spring 2022. The two paths are conceived as original creative projects and therefore do neither retrace a historical path nor the work or life of a particular writer. Their comparison offers interesting points of analysis as to the targeted objectives (target audiences, promotion of literature, creative writing project), to the participating authors (literary socialization, geographical link to the places), to the installations (panels displaying the texts and presenting the authors, geolocation, additional digital content), and to the texts themselves (literary genres, representations of nature, relationship to place and territory). My participation, in an action-research approach, in the organizing committee of the Ettelbécker Literaturwee allows me to describe the interdisciplinary scope of this project, bringing together approaches and interests of its various partners: regional library and tourist office, Centre national de littérature, university, or the association Natur&Ëmwelt which works for the protection of the environment. More broadly, my research and observations – within the framework of cultural ecology which studies the material and symbolic scope of literary texts in their “ecocultural ” context – relate on the one hand to the writing and reception of texts in situ, which paradoxically de-naturalizes our reading habits. On the other hand, I question the importance of territorial anchoring of texts in the context of Luxembourg: What does 21st century writing of place mean in a small literary field which has struggled to dissociate itself from regional and/or rural literature? [less ▲]

Detailed reference viewed: 31 (0 UL)
Full Text
See detailEaux polymorphes dans l’œuvre de Jean Portante. Lecture-entretien avec l’auteur
Thiltges, Sébastian UL; Portante, Jean

in Breaking the Waves: Water (Issues) in Contemporary Verbal and Visual Arts (in press)

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailA Methodology for Handling Data Movements by Anticipation: Position Paper
Bleuse, Raphaël UL; Lucarelli, Giorgio; Trystram, Denis

in Euro-Par 2018 Workshops (in press)

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on ... [more ▼]

The enhanced capabilities of large scale parallel and distributed platforms produce a continuously increasing amount of data which have to be stored, exchanged and used by various tasks allocated on different nodes of the system. The management of such a huge communication demand is crucial for reaching the best possible performance of the system. Meanwhile, we have to deal with more interferences as the trend is to use a single all-purpose interconnection network whatever the interconnect (tree-based hierarchies or topology-based heterarchies). There are two different types of communications, namely, the flows induced by data exchanges during the computations, and the flows related to Input/Output operations. We propose in this paper a general model for interference-aware scheduling, where explicit communications are replaced by external topological constraints. Specifically, the interferences of both communication types are reduced by adding geometric constraints on the allocation of tasks into machines. The proposed constraints reduce implicitly the data movements by restricting the set of possible allocations for each task. This methodology has been proved to be efficient in a recent study for a restricted interconnection network (a line/ring of processors which is an intermediate between a tree and higher dimensions grids/torus). The obtained results illustrated well the difficulty of the problem even on simple topologies, but also provided a pragmatic greedy solution, which was assessed to be efficient by simulations. We are currently extending this solution for more complex topologies. This work is a position paper which describes the methodology, it does not focus on the solving part. [less ▲]

Detailed reference viewed: 171 (1 UL)
Full Text
Peer Reviewed
See detailMEC-assisted Low Latency Communication for Autonomous Flight Control of 5G-Connected UAV
Solanki, Sourabh UL; Mahmood, Asad UL; Singh, Vibhum UL et al

in MEC-assisted Low Latency Communication for Autonomous Flight Control of 5G-Connected UAV (in press)

Proliferating applications of unmanned aerial vehicles (UAVs) impose new service requirements, leading to several challenges. One of the crucial challenges in this vein is to facilitate the autonomous ... [more ▼]

Proliferating applications of unmanned aerial vehicles (UAVs) impose new service requirements, leading to several challenges. One of the crucial challenges in this vein is to facilitate the autonomous navigation of UAVs. Concretely, the UAV needs to individually process the visual data and subsequently plan its trajectories. Since the UAV has limited onboard storage constraints, its computational capabilities are often restricted and it may not be viable to process the data locally for trajectory planning. Alternatively, the UAV can send the visual inputs to the ground controller which, in turn, feeds back the command and control signals to the UAV for its safe navigation. However, this process may introduce some delays, which is not desirable for autonomous UAVs’ safe and reliable navigation. Thus, it is essential to devise techniques and approaches that can potentially offer low-latency solutions for planning the UAV’s flight. To this end, this paper analyzes a multi-access edge computing aided UAV and aims to minimize the latency of the task processing. More specifically, we propose an offloading strategy for a UAV by optimally designing the offloading parameter, local computational resources, and altitude of the UAV. The numerical and simulation results are presented to offer various design insights, and the benefits of the proposed strategy are also illustrated in contrast to the other baseline approaches. [less ▲]

Detailed reference viewed: 131 (18 UL)
Full Text
Peer Reviewed
See detailNuclear Incidents as Metaphors for Ecocatastrophe in Anticipatory Fiction from Luxembourg
Thiltges, Sébastian UL

in Storying the Ecocatastrophe: The Aesthetics and Politics of Ecological Narratives (in press)

This chapter on “Narrating the Nuclear” is based on an analysis of two contemporary fictional texts from Luxembourg: a short story written in Luxembourgish by Yorick Schmit, “Eng Stëmm an der Stëllt” ... [more ▼]

This chapter on “Narrating the Nuclear” is based on an analysis of two contemporary fictional texts from Luxembourg: a short story written in Luxembourgish by Yorick Schmit, “Eng Stëmm an der Stëllt” [= “A Voice in the Silence”] (2018), and a novel by French-speaking author Pierre Decock, Luxembourg Zone Rouge (2019). Both texts depict a nuclear disaster in a neighboring French atomic powerplant that has a significant and overall impact on the territory and the population of the small country of Luxembourg. Abundant risk theory has already emerged from the study of major nuclear attacks and industrial incidents during the 20th and 21st centuries. Alongside nuclear criticism and ecocriticism in the Anthropocene, this framework provides insight to impending ecocatastrophes, which are cataclysms with multiple impacts on very large spatial and temporal scales, related to the flawed relationship between humans and the nonhuman environment. My claim is that both literary texts use the nuclear catastrophe as a metaphor for global and ecological collapse, with its multidimensional effects. Decock imagines how a whole nation becomes deprived of its territory, thus illustrating B. Latour’s vision that the “New Climatic Regime” will confront all societies with the loss of land (Down to Earth, 2018). Drawing upon the biography of a Japanese farmer who took care of abandoned animals after the Fukushima disaster, Schmit provides a more optimistic vision in exploring how to “liv[e] on a damaged planet” (A. Tsing et al., Arts of Living on a Damaged Planet, 2017). In the small literary field of Luxembourg, both texts reinterpret the local homeland imagery in the context of global environmental change, in which local disasters are increasingly related to planetary instability. Because a whole country or even culture can be eradicated by a nuclear incident, the small country of Luxembourg becomes a metaphor for Earth facing ecological collapse. [less ▲]

Detailed reference viewed: 32 (2 UL)
See detailLe dialogue entre les juges en matière de protection des droits de l'homme
Pelin Raducu, Ioana UL

in Menetrey, Séverine; Hess, Burkhard (Eds.) Les dialogues des juges en Europe (in press)

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard ... [more ▼]

Dans cet article, nous allons mettre en exergue quelques aspects des arrêts récents provenant de la Cour de justice de l’UE (Akerberg Frasson, Melloni, Kamberaj)qui démontrent l’émergence d’un standard propre de l’UE en matière des droits de l’homme. Cette tendance de la C.J.U.E. contredira le prescrit normatif découlant du « dialogue des juges » d’interprétation conforme à la jurisprudence de la C.E.D.H. avant que l’adhésion de l’UE à la Convention E.D.H. ne soit formellement acquise. [less ▲]

Detailed reference viewed: 152 (19 UL)
Full Text
Peer Reviewed
See detailL’exposition d’objets ou de collections de « marque » : cobranding, réécriture, réénonciation
Schall, Céline UL

in Laval, Sylvie (Ed.) Marques muséales : un espace public revisité ? (in press)

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités  ... [more ▼]

Le cobranding est une pratique habituelle du secteur marchand. Mais lorsque deux musées réalisent ensemble une exposition, peut-on parler de cobranding muséal ? Quelles en seraient les spécificités ? Quels effets peut avoir cette démarche sur la communication ou sur l’exposition ? Notamment, le musée d’accueil s’approprie-t-il simplement l’imaginaire et les valeurs de la marque invitée par un phénomène de « transfert » ? Pour répondre à ces questions, nous étudions trois expositions qui reprennent des objets ou collections de musées dont la marque est internationalement reconnue. L’analyse sémiotique des images de marque du musée d’accueil et du musée invité ainsi que l’analyse sémiopragmatique des expositions montrent l’impact de la présence d’une grande marque internationale sur l’exposition et réciproquement, l’impact de l’exposition sur l’image de marque du musée d’accueil. Plus qu’un simple cobranding, c’est une réécriture impliquant une réénonciation du discours et des valeurs portés par les marques qui est proposée à travers ces expositions. Le processus aboutit à la création de nouveaux espaces symboliques et d’expositions réflexives, avec plusieurs niveaux de lecture. [less ▲]

Detailed reference viewed: 262 (7 UL)
Full Text
Peer Reviewed
See detailAdvancing the Meet-in-the-Filter Technique: Applications to CHAM and KATAN
Biryukov, Alexei UL; Teh, Je Sen UL; Udovenko, Aleksei UL

in Smith, Benjamin; Wu, Huapeng (Eds.) Selected Areas in Cryptography (in press)

Recently, Biryukov et al. presented a new technique for key recovery in differential cryptanalysis, called meet-in-the-filter (MiF). In this work, we develop theoretical and practical aspects of the ... [more ▼]

Recently, Biryukov et al. presented a new technique for key recovery in differential cryptanalysis, called meet-in-the-filter (MiF). In this work, we develop theoretical and practical aspects of the technique, which helps understanding and simplifies application. In particular, we show bounds on MiF complexity and conditions when the MiF-enhanced attack may reach them. We present a method based on trail counting which allows to estimate filtering strength of involved rounds and perform consequent complexity analysis with pen and paper, compared to the computer-aided approach of the original work. Furthermore, we show how MiF can be combined with plaintext structures for linear key schedules, allowing to increase the number of attacked rounds or to reduce the data complexity. We illustrate our methods on block cipher families CHAM and KATAN and show best-to-date single-key differential attacks for these ciphers. [less ▲]

Detailed reference viewed: 62 (8 UL)
Full Text
Peer Reviewed
See detailLes archevêques de Milan face aux premières expériences seigneuriales: stratégies et positionnements (milieu XIIIe-début XIVe s.)
Salemme, Timothy UL

in Barralis, Christine (Ed.) L’évêque face à son métier. Actes du colloque international, Metz. 15-17 novembre 2017 (in press)

Detailed reference viewed: 52 (2 UL)
See detailDa Melusina al melusinismo: la féerie epica, una macchina per pensare la filiazione
Erchadi, Armand UL

in Baglioni, Igor (Ed.) Atti del convegno “Di Melusine e Gorgoni. Le entità mostruose femminili dall’antichità ai nostri giorni” (2024, December)

A forza di essere isolata, essenzializzata e statualizzata, la figura di Melusina (Mélusine) ha subito un certo impoverimento, persino una paradossale sterilizzazione, nella misura in cui dovrebbe, al ... [more ▼]

A forza di essere isolata, essenzializzata e statualizzata, la figura di Melusina (Mélusine) ha subito un certo impoverimento, persino una paradossale sterilizzazione, nella misura in cui dovrebbe, al contrario, collocarsi sul versante dell’eccesso e della fertilità. Risalendo ai tre testi principali – i romanzi di Giovanni di Arras (completato nel 1393), Coudrette (scritto poco dopo il 1401) e Thüring von Ringoltingen (scritto nel 1456) – questo articolo propugna il ritorno a una Melusina storicizzata ed epica. Né mostro solitario né vice del demonio, la madre dei Lusignani si comprende attraverso i suoi discendenti fatati: è tramite i suoi prodigiosi figli che rivela, al ritmo della narrazione, la sua verità. In ogni muscolo, in ogni deformità facciale, in ogni tratto di grandezza o di follia dei suoi dieci figli, emerge la presenza di Melusina. Il personaggio chiave della storia è Goffredo dal Grande Dente (Geoffroy la Grand-Dent), il suo sesto figlio: in una discesa agli inferi che è allo stesso tempo geologica e genealogica, egli scopre i segreti di famiglia e l’origine del male. Ritornando a questo motivo, ci proponiamo di restituire la singolarità della narrazione melusiniana: quella di un’intensa interrogazione sulla filiazione, da cui dipendono le moderne riflessioni sull’individuo e sulla famiglia, sulle pulsioni di vita e sull’istinto di morte. [less ▲]

Detailed reference viewed: 50 (1 UL)
Full Text
Peer Reviewed
See detailInk and Paper in the Camp. Ego-Documents of Luxembourger Conscripts in the Soviet Captivity
Ganschow, Inna UL

in Janz, Nina; Scuto, Denis (Eds.) The Impact of War Experiences in Europe (2024)

In the paper by Inna Ganschow, the camp experience in the Soviet Union as a result of forced conscription will be treated, specifically in its artistic processing: secretly written diaries and letters by ... [more ▼]

In the paper by Inna Ganschow, the camp experience in the Soviet Union as a result of forced conscription will be treated, specifically in its artistic processing: secretly written diaries and letters by Luxembourg Wehrmacht soldiers. Contemporary historical research today calls them ego documents – private, handwritten texts of a personal nature. The range of texts to be examined in the lecture ranges from the smuggled out notes and letters that their released comrades took with them to Luxembourg, through diaries, speeches and self-made dictionaries to poems, short stories and drawings, some of which were in the camp and some immediately after the return from Tambov and other camps in the Soviet Union. The focus is on the question of dealing with the thesis of the Auschwitz concentration camp survivor Viktor Frankl, psychiatrist and neurologist from Vienna, that the meaning of camp life - logotherapy - can have a self-healing effect and increase the self-healing powers, which increases the chances of survival. [less ▲]

Detailed reference viewed: 53 (3 UL)
Full Text
Peer Reviewed
See detailAutomated Anonymization of Court Decisions: Facilitating the Publication of Court Decisions through Algorithmic Systems
Terzidou, Kalliopi UL

in ICAIL: International Conference on Artificial Intelligence and Law (Ed.) ICAIL '23: Proceedings of the Nineteenth International Conference on Artificial Intelligence and Law (2023, September 07)

The practice of anonymization of court decisions has been further systematized by EU Member States’ courts, after the entry into force of the General Data Protection Regulation and its transposition into ... [more ▼]

The practice of anonymization of court decisions has been further systematized by EU Member States’ courts, after the entry into force of the General Data Protection Regulation and its transposition into national laws. Anonymization of the parties’ personal information protects their privacy during the publication of judgments, which is necessary for the scrutiny of the judiciary’s reasoning in a given case and the filing of an appeal whenever a party disagrees with the court’s reasoning and/or order. European courts have recently resorted to algorithmic approaches to automate the process of anonymization, which can bestow prompt and consistent application of anonymization rules for court administrations to comply with the applicable personal data protection legislation. These automated solutions can also encompass technical and administrative challenges, ranging from re-ιdentification risks that compromise the protection of the parties’ personal data to the lack of acceptance of the algorithmic system by court staff during their daily work routine. The present paper reviews current anonymization practices conducted through algorithmic techniques by, first, explaining the legal framework underlying the publication and anonymization of court decisions, second, examining three algorithmic solutions for the anonymization of court decisions by different EU Member States, and third, reflecting on their efficiencies and challenges for court administrations. [less ▲]

Detailed reference viewed: 48 (3 UL)
Full Text
Peer Reviewed
See detailSelf-Determination Theory Applied To Museum Website Experiences: Fulfill Visitor Needs, Increase Motivation, and Promote Engagement
Lushnikova, Alina UL; Morse, Christopher UL; Doublet, Sophie UL et al

in European Conference in Cognitive Ergonomics (ECCE ’23) (2023, September)

The rise of online experiences in the domain of cultural heritage offers new forms of interaction that are no longer limited by the physical presence of museums. However, sustaining online visitors’ ... [more ▼]

The rise of online experiences in the domain of cultural heritage offers new forms of interaction that are no longer limited by the physical presence of museums. However, sustaining online visitors’ engagement is challenging, and museum professionals seek to understand how to increase motivation. We conducted a user study (N = 32) of three museum websites to investigate users’ intrinsic motivations to engage with the sites through observation, questionnaires, and semi-structured interviews. Building on self- determination theory, we identified design characteristics that meet users’ psychological needs, such as autonomy, competence, and relatedness, and increase their intrinsic motivation to interact with the interface. Our results show that this could consequently lead to higher user engagement. We contribute new empirical insights into the intrinsic motivation mechanisms of museum website visitors, which have relevant implications for the design of museum websites to improve user engagement. [less ▲]

Detailed reference viewed: 63 (0 UL)
Full Text
Peer Reviewed
See detailComparing Pre-Training Schemes for Luxembourgish BERT Models
Lothritz, Cedric UL; Ezzini, Saad UL; Purschke, Christoph UL et al

in Proceedings of the 19th Conference on Natural Language Processing (KONVENS 2023) (2023, September)

Despite the widespread use of pre-trained models in NLP, well-performing pre-trained models for low-resource languages are scarce. To address this issue, we propose two novel BERT models for the ... [more ▼]

Despite the widespread use of pre-trained models in NLP, well-performing pre-trained models for low-resource languages are scarce. To address this issue, we propose two novel BERT models for the Luxembourgish language that improve on the state of the art. We also present an empirical study on both the performance and robustness of the investigated BERT models. We compare the models on a set of downstream NLP tasks and evaluate their robustness against different types of data perturbations. Additionally, we provide novel datasets to evaluate the performance of Luxembourgish language models. Our findings reveal that pre-training a pre-loaded model has a positive effect on both the performance and robustness of fine-tuned models and that using the German GottBERT model yields a higher performance while the multilingual mBERT results in a more robust model. This study provides valuable insights for researchers and practitioners working with low-resource languages and highlights the importance of considering pre-training strategies when building language models. [less ▲]

Detailed reference viewed: 181 (0 UL)
Full Text
Peer Reviewed
See detailPour une approche hydrocritique du genre épique : Les Lusiades de Camões comme méta-épopée de l’eau
Erchadi, Armand UL

in Roelens, Nathalie; Erchadi, Armand; MacLeod (Eds.) et al Water and Sea in Word and Image / L'Eau et la mer dans les textes et les images (2023, August 31)

Detailed reference viewed: 45 (1 UL)
Full Text
Peer Reviewed
See detailTowards a peer-to-peer residential short-term load forecasting with federated learning
Delgado Fernandez, Joaquin UL; Potenciano Menci, Sergio UL; Pavić, Ivan UL

in Proceedings of the 2023 IEEE Belgrade PowerTech (2023, August 09)

The inclusion of intermittent and renewable energy sources has increased the importance of demand forecasting in the power systems. Smart meters play a critical role in modern load forecasting due to the ... [more ▼]

The inclusion of intermittent and renewable energy sources has increased the importance of demand forecasting in the power systems. Smart meters play a critical role in modern load forecasting due to the high granularity of the measurement data. Federated Learning can enable accurate residential load forecasting in a distributed manner. In this regard, to compensate for the variability of households, clustering them in groups with similar patterns can lead to more accurate forecasts. Usually, clustering requires a central server that has access to the entire dataset, which collides with the decentralized nature of federated learning. In order to complement federated learning, this study proposes a decentralized Peer-to-Peer strategy that employs agent-based modeling. We evaluate it in comparison to a typical centralized k-means clustering. To create clusters, we compare Euclidian and Dynamic time warping distances. We employ these clusters to build short-term load forecasting models using federated learning. Our results reveal the possibility of using Peer-to-Peer clustering along with simple Euclidean distances and Federated Learning to obtain highly performant load forecasting models in a fully decentralized setting. [less ▲]

Detailed reference viewed: 76 (8 UL)
Full Text
Peer Reviewed
See detailEXPLORING THE USE OF PHONOLOGICAL FEATURES FOR PARKINSON’S DISEASE DETECTION
Hosseini Kivanani, Nina UL; Vásquez-Correa, Juan Camilo; Schommer, Christoph UL et al

in Hosseini Kivanani, Nina; Vásquez-Correa, Juan Camilo; Schommer, Christoph (Eds.) et al EXPLORING THE USE OF PHONOLOGICAL FEATURES FOR PARKINSON’S DISEASE DETECTION (2023, August)

Parkinson’s disease (PD) is a neurodegenerative disorder that causes motor and non-motor symptoms. Speech impairments are one of the early symptoms of PD, but they are not always fully exploited by ... [more ▼]

Parkinson’s disease (PD) is a neurodegenerative disorder that causes motor and non-motor symptoms. Speech impairments are one of the early symptoms of PD, but they are not always fully exploited by clinicians. In this study, the use of phonological features extracted from speech data collected from Spanish-speaking patients was explored to predict PD patients from healthy subjects using phonet, which was trained on Spanish data, and PhonVoc, which was trained on English data. These features were then used to train and test several machine learning models. The XGBoost model achieved the best performance in classifying patients from HCs, with an accuracy of over 0.76. However, the model performed better when using a phonological model trained on Spanish data rather than English data. [less ▲]

Detailed reference viewed: 28 (0 UL)
Full Text
Peer Reviewed
See detailCUI'23: Proceedings of the 5th Conference on Conversational User Interfaces 2023
Dubiel, Mateusz UL; Bongard, Kerstin UL; Leiva, Luis A. UL et al

in Are you sure you want to order that? On Appropriateness of Voice-only Proactive Feedback Strategies (2023, July 20)

Conversational agents (CAs) that deliver proactive interventions can benefit users by reducing their cognitive workload and improving performance. However, little is known regarding how such interventions ... [more ▼]

Conversational agents (CAs) that deliver proactive interventions can benefit users by reducing their cognitive workload and improving performance. However, little is known regarding how such interventions would impact perception of CA’s appropriateness in voice-only, decision-making tasks. We conducted a within-subjects experiment (N=30) to evaluate the effect of CA’s feedback delivery strategy at three levels (no feedback, unsolicited, and solicited feedback) in an interactive food ordering scenario. We discovered that unsolicited feedback was perceived to be more appropriate than solicited feedback. Our results provide preliminary insights regarding the impact of proactive feedback on CA perception in decision-making tasks. [less ▲]

Detailed reference viewed: 56 (3 UL)
Full Text
Peer Reviewed
See detailEvaluation of PTP Security Controls on gPTP
Fotouhi, Mahdi UL; Buscemi, Alessio; Jomrich, Florian et al

in 28th IEEE International Symposium on Computers and Communications (ISCC 2023), Tunis, July 2023 (2023, July 09)

In recent years, the scientific community has been focusing on deterministic Ethernet, which has helped drive the adoption of Time-Sensitive Networking (TSN) standards. Precision Time Protocol (PTP ... [more ▼]

In recent years, the scientific community has been focusing on deterministic Ethernet, which has helped drive the adoption of Time-Sensitive Networking (TSN) standards. Precision Time Protocol (PTP), specified in IEEE1588, is a TSN standard that enables network devices to be synchronized with a degree of precision that is noticeably higher than other Ethernet synchronization protocols. Generic Precision Time Protocol (gPTP), a profile of PTP, is designed to have low latency and jitter, which makes it suitable for industrial applications. However, like PTP, gPTP does not have any built-in security measures. In this work, we assess the efficacy of additional security mechanisms that were suggested for inclusion in IEEE 1588 (PTP) 2019. The analysis consists of implementing these security mechanisms on a physical gPTP-capable testbed and evaluating them on several high-risk attacks against gPTP. [less ▲]

Detailed reference viewed: 111 (18 UL)
Full Text
Peer Reviewed
See detailFrom FMTV to WATERS: Lessons Learned from the First Verification Challenge at ECRTS
Altmeyer, Sebastian; André, Etienne; Dal Zilio, Silvano et al

in 35th Euromicro Conference on Real-Time Systems (ECRTS 2023) (2023, July 03)

We present here the main features and lessons learned from the first edition of what has now become the ECRTS industrial challenge, together with the final description of the challenge and a comparative ... [more ▼]

We present here the main features and lessons learned from the first edition of what has now become the ECRTS industrial challenge, together with the final description of the challenge and a comparative overview of the proposed solutions. This verification challenge, proposed by Thales, was first discussed in 2014 as part of a dedicated workshop (FMTV, a satellite event of the FM 2014 conference), and solutions were discussed for the first time at the WATERS 2015 workshop. The use case for the verification challenge is an aerial video tracking system. A specificity of this system lies in the fact that periods are constant but known with a limited precision only. The first part of the challenge focuses on the video frame processing system. It consists in computing maximum values of the end-to-end latency of the frames sent by the camera to the display, for two different buffer sizes, and then the minimum duration between two consecutive frame losses. The second challenge is about computing end-to-end latencies on the tracking and camera control for two different values of jitter. Solutions based on five different tools - Fiacre/Tina, CPAL (simulation and analysis), IMITATOR, UPPAAL and MAST - were submitted for discussion at WATERS 2015. While none of these solutions provided a full answer to the challenge, a combination of several of them did allow to draw some conclusions. [less ▲]

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailFrom Awareness to Action: Energy Literacy and Household Energy Use
Andolfi, Laura UL; Akkouch, Rawan UL; Pavić, Ivan UL

in Proceedings of the 18th IAEE European Conference. Milan, 24-27 July 2023 (2023, July)

Detailed reference viewed: 34 (2 UL)
Full Text
Peer Reviewed
See detailThe Rallye Platform: Mobile Location-Based Serious Games for Digital Cultural Heritage
Botev, Jean UL; Camarda, Sandra UL; Ohlhoff, Claude

in Proceedings of the 25th International Conference on Human-Computer Interaction (HCI International) (2023, July)

Detailed reference viewed: 74 (17 UL)
Full Text
Peer Reviewed
See detailAn Intrusion Detection System Against Rogue Master Attacks on gPTP
Buscemi, Alessio UL; Ponaka, Manasvi UL; Fotouhi, Mahdi UL et al

in Buscemi, Alessio; Ponaka, Manasvi; Fotouhi, Mahdi (Eds.) et al IEEE Vehicular Technology Conference (VTC2023-Spring), Florence 20-23 June 2023 (2023, July)

Due to the promise of deterministic Ethernet networking, Time Sensitive Network (TSN) standards are gaining popularity in the vehicle on-board networks sector. Among these, Generalized Precision Time ... [more ▼]

Due to the promise of deterministic Ethernet networking, Time Sensitive Network (TSN) standards are gaining popularity in the vehicle on-board networks sector. Among these, Generalized Precision Time Protocol (gPTP) allows network devices to be synchronized with a greater degree of precision than other synchronization protocols, such as Network Time Protocol (NTP). However, gPTP was developed without security measures, making it susceptible to a variety of attacks. Adding security controls is the initial step in securing the protocol. However, due to current gPTP design limitations, this countermeasure is insufficient to protect against all types of threats. In this paper, we present a novel supervised Machine Learning (ML)-based pipeline for the detection of high-risk rogue master attacks. [less ▲]

Detailed reference viewed: 140 (22 UL)
Full Text
Peer Reviewed
See detailSubstituting Animals with Biohybrid Robots: Speculative Interactions with Animal-Robot Hybrids
Wang, Ziming UL; Barker, Ned; Wu, Yiqian et al

in DIS '23 Companion: Companion Publication of the 2023 ACM Designing Interactive Systems Conference (2023, July)

What if animals were substituted with biohybrid robots? The replacement of pets with bioinspired robots has long existed within technological imaginaries and HRI research. Addressing developments of ... [more ▼]

What if animals were substituted with biohybrid robots? The replacement of pets with bioinspired robots has long existed within technological imaginaries and HRI research. Addressing developments of bioengineering and biohybrid robots, we depart from such replacement to study futures inhabited by animal-robot hybrids. In this paper, we introduce a speculative concept of assembling and eating biohybrid robots. With this provocation as a starting point, we intend to initiate cross-disciplinary and cross-cultural discussions around human-food interaction practices and related topics. [less ▲]

Detailed reference viewed: 58 (3 UL)
Full Text
Peer Reviewed
See detailTogether Yet Apart: Multimodal Representation Learning for Personalised Visual Art Recommendation
Yilma, Bereket Abera UL; Leiva, Luis A. UL

in Yilma, Bereket Abera; Leiva, Luis A. (Eds.) Proceedings of the ACM Conference on User Modeling, Adaptation and Personalization (UMAP 2023) (2023, June 26)

With the advent of digital media, the availability of art content has greatly expanded, making it increasingly challenging for individuals to discover and curate works that align with their personal ... [more ▼]

With the advent of digital media, the availability of art content has greatly expanded, making it increasingly challenging for individuals to discover and curate works that align with their personal preferences and taste. The task of providing accurate and personalised Visual Art (VA) recommendations is thus a complex one, requiring a deep understanding of the intricate interplay of multiple modalities such as images, textual descriptions, or other metadata. In this paper, we study the nuances of modalities involved in the VA domain (image and text) and how they can be effectively harnessed to provide a truly personalised art experience to users. Particularly, we develop four fusion-based multimodal VA recommendation pipelines and conduct a large-scale user-centric evaluation. Our results indicate that early fusion (i.e, joint multimodal learning of visual and textual features) is preferred over a late fusion of ranked paintings from unimodal models (state-of-the-art baselines) but only if the latent representation space of the multimodal painting embeddings is entangled. Our findings open a new perspective for a better representation learning in the VA RecSys domain. [less ▲]

Detailed reference viewed: 208 (36 UL)
Full Text
Peer Reviewed
See detailThe impact of executive functioning and age-related cognitive decline on distraction from pain
Dierolf, Angelika UL; van der Meulen, Marian UL; Miltner, Wolfgang

in Merz, Simon; Frings, Christian; Leuchtenberg, Bettina (Eds.) et al Abstracts of the 65th TeaP (2023, June 21)

Older people, suffering from pain and its consequences more often than younger people, would benefit significantly from non-pharmacological pain treatment. So far, little is known about how age affects ... [more ▼]

Older people, suffering from pain and its consequences more often than younger people, would benefit significantly from non-pharmacological pain treatment. So far, little is known about how age affects psychological pain modulation strategies. Preliminary findings hint towards a less efficient pain inhibition through cognition-based pain modulation strategies, as cognitive distraction from pain. Here, executive functions (EFs) have been considered a key factor in the age – pain relationship, with age-related cognitive decline in EFs being associated with reduced pain relief through distraction in older adults. We investigated influence of four core EFs on distraction from pain in aging. In a two-session design, healthy young (18-30 years) and older participants (60+ years) performed a Go-Nogo task, the Stroop-Color-Word-Task, the Sternberg-Task, and the Attentional Network Task. Afterwards, participants performed a pain distraction task, namely a n-Back working memory task with low and high cognitive load, during which participants received individually adjusted transdermal electrical pulse trains in non-painful and moderately painful intensities to the inner forearm. Ratings of intensity and unpleasantness were collected and stimulus-related (EF tasks) and pain-related evoked potentials were recorded with a 64-channel EEG. Unexpectedly, first analyses on the currently small sample suggest a more efficient pain relief through distraction under low relative to high cognitive load in older adults. The distraction effect was related to EFs, some of which showed age-related cognitive impairment. Our findings could lead to a better understanding how to adapt pain treatments in this population by including selective cognitive trainings and optimizing distraction task difficulty. [less ▲]

Detailed reference viewed: 94 (6 UL)
Full Text
Peer Reviewed
See detailRealistic Cooperative Perception for Connected and Automated Vehicles: A Simulation Review
Hawlader, Faisal UL; Frank, Raphaël UL

in Hawlader, Faisal; Frank, Raphaël (Eds.) 2023 8th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS) (2023, June 16)

Detailed reference viewed: 113 (30 UL)
Full Text
Peer Reviewed
See detailUsing Emotions and Topics to Understand Online Misinformation
Chuai, Yuwei UL; Rossi, Arianna UL; Lenzini, Gabriele UL

in Web Engineering. ICWE 2023. Lecture Notes in Computer Science, vol 13893. Springer, Cham. (2023, June 16)

Misinformation has become one of the most pressing social issues in the twenty-first century. How the combinations of emotions and topics trigger the spread of misinformation, however, still remains to be ... [more ▼]

Misinformation has become one of the most pressing social issues in the twenty-first century. How the combinations of emotions and topics trigger the spread of misinformation, however, still remains to be revealed. This study comprehensively examines misinformation and its diffusion by correlating emotions and topics. First, we examine how specific emotions and topics are combined in misinformation. Second, we identify the effects of emotions and topics on the virality of misinformation. Finally, we further explore how to employ users’ topic preferences and emotion reactions to detect and analyze echo chambers in misinformation cascades. The findings can help construct a detailed and consistent understanding on misinformation diffusion in terms of emotions and topics. Potential practical implications are also provided to prevent the spread of misinformation online. [less ▲]

Detailed reference viewed: 67 (7 UL)
Full Text
Peer Reviewed
See detailMediating the Tension between Data Sharing and Privacy: The Case of DMA and GDPR
Weigl, Linda UL; Barbereau, Tom Josua UL; Sedlmeir, Johannes UL et al

in Proceedings of the 31st European Conference on Information Systems (ECIS) (2023, June 11)

The Digital Markets Act (DMA) constitutes a crucial part of the European legislative framework addressing the dominance of 'Big Tech'. It intends to foster fairness and competition in Europe's digital ... [more ▼]

The Digital Markets Act (DMA) constitutes a crucial part of the European legislative framework addressing the dominance of 'Big Tech'. It intends to foster fairness and competition in Europe's digital platform economy by imposing obligations on 'gatekeepers' to share end-user-related information with business users. Yet, this may involve the processing of personal data subject to the General Data Protection Regulation (GDPR). The obligation to provide access to personal data in a GDPR-compliant manner poses a regulatory and technical challenge and can serve as a justification for gatekeepers to refrain from data sharing. In this research-in-progress paper, we analyze key tensions between the DMA and the GDPR through the paradox perspective. We argue through a task-technology fit approach how privacy-enhancing technologies-particularly anonymization techniques-and portability could help mediate tensions between data sharing and privacy. Our contribution provides theoretical and practical insights to facilitate legal compliance. [less ▲]

Detailed reference viewed: 138 (22 UL)
Full Text
Peer Reviewed
See detailPersonal Informatics at the Office: User-Driven, Situated Sensor Kits in the Workplace
van den Heuvel; Lallemand, Carine UL

in CHIWORK '23: Proceedings of the 2nd Annual Meeting of the Symposium on Human-Computer Interaction for Work (2023, June)

Workplaces are increasingly leveraging data-driven technological interventions to optimize employee productivity, health, and wellbeing. Yet employees are rarely involved in designing these initiatives ... [more ▼]

Workplaces are increasingly leveraging data-driven technological interventions to optimize employee productivity, health, and wellbeing. Yet employees are rarely involved in designing these initiatives, nor have access to the data collected to act upon it. Building on approaches from personal informatics, we investigate the use of user-driven, open-ended sensor kits in an office context. We conducted a 3-week field study, deploying a research probe at a workplace (N=5). Findings show that users explored aspects meaningful to them yet highlight discrepancies between the envisioned self-tracking goals and participants’ practices. Regarding sensors’ open-endedness, a balance between the burden of data collection and the value derived from it appeared critical. We contribute new insights into how an open-ended sensor kit can be designed to support self-tracking practices in the underexplored context of office work. We discuss implications for the use of personal informatics at the office and highlight opportunities for future research. [less ▲]

Detailed reference viewed: 39 (1 UL)
Full Text
Peer Reviewed
See detailEnhancing the Reliability of Perception Systems using N-version Programming and Rejuvenation
Rodrigues de Mendonça Neto, Júlio UL; Machida, Fumio; Volp, Marcus UL

in Rodrigues de Mendonça Neto, Júlio; Machida, Fumio; Volp, Marcus (Eds.) Enhancing the Reliability of Perception Systems using N-version Programming and Rejuvenation (2023, June)

Machine Learning (ML) has become indispensable for real-world complex systems, such as perception systems of autonomous systems and vehicles. However, ML-based systems are sensitive to input data, faults ... [more ▼]

Machine Learning (ML) has become indispensable for real-world complex systems, such as perception systems of autonomous systems and vehicles. However, ML-based systems are sensitive to input data, faults, and malicious threats that can degrade output quality and compromise the complete system's correctness. Ensuring a reliable output of ML-based components is crucial, especially for safety-critical systems. In this paper, we investigate architectures of perception systems using N-version programming for ML to mitigate the dependence on a singular ML component and combine it with a time-based rejuvenation mechanism to maintain a healthy system over extended periods. We propose models and functions to evaluate the reliability of N-version perception systems subject to faults, malicious threats, and rejuvenation. Our numerical experiments show that a rejuvenation mechanism could benefit a multiple-version system, with a reliability improvement superior to 13%. Also, the results indicate that rejuvenation could improve output reliability when ML modules' accuracy is high. [less ▲]

Detailed reference viewed: 103 (11 UL)
Full Text
Peer Reviewed
See detailSDN-based Testbed for Emerging Use Cases in Beyond 5G NTN-Terrestrial Networks
Minardi, Mario UL; Drif, Youssouf UL; Vu, Thang Xuan UL et al

in IEEE/IFIP Network Operations and Management Symposium (NOMS) 2023, Miami, Florida, USA, 8-12 May 2023 (2023, June)

Detailed reference viewed: 68 (9 UL)
Full Text
Peer Reviewed
See detailManaging Fahsionable Organizing Visions: Evidence From the European Blockchain Services Infrastructure
Höß, Alexandra UL; Rieger, Alexander; Roth, Tamara et al

in Proceedings of the Thirty-first European Conference on Information Systems (2023, June)

Grand visions for organizational transformation increasingly build on fashionable information technologies. Organizational leaders may be tempted to adopt these visions due the high degree of legitimacy ... [more ▼]

Grand visions for organizational transformation increasingly build on fashionable information technologies. Organizational leaders may be tempted to adopt these visions due the high degree of legitimacy and mobilization they afford. However, their fashionable nature makes adoption risky. In this paper, we explore how organizations can manage this risk and successfully navigate the adoption of fashionable organizing visions. Specifically, we track how over the last five years the European Blockchain Partnership adopted a self-sovereign identity organizing vision based on blockchain. We find that successful adoption requires dynamic coupling and decoupling between vision and IT – both on a discursive and the material levels. Moreover, it requires effective management of ‘sensegiving’ and ‘sensebreaking’ by the innovation community. [less ▲]

Detailed reference viewed: 44 (1 UL)
Full Text
Peer Reviewed
See detailModelling Attention Levels with Ocular Responses in a Speech-in-Noise Recall Task
Dubiel, Mateusz UL; Nakayama, Minoru; Wang, Xin

in ETRA '23: Proceedings of the 2023 Symposium on Eye Tracking Research and Applications (2023, May 30)

We applied state-space modelling technique to estimate the cognitive workload of a speech-in-noise (SIN) recall task, based on participants’ oculo-motor responses to speech signals. We estimated common ... [more ▼]

We applied state-space modelling technique to estimate the cognitive workload of a speech-in-noise (SIN) recall task, based on participants’ oculo-motor responses to speech signals. We estimated common latent attention levels in 15 time bins and observed temporal changes between pupillary dilations and saccade frequencies, given that the both conditions were independent. We also compared two speech type factors (natural vs. synthetic) and three levels of signal-to-noise (-1dB, -3dB, and -5dB) using the estimated parameter distribution. The comparison of experimental factors provided us with insights into differences in participants’ processing of spoken information during a SIN recall task. [less ▲]

Detailed reference viewed: 46 (3 UL)
Full Text
Peer Reviewed
See detailDigital Identity Wallets and their Semantic Contradictions
Smethurst, Reilly UL

in Smethurst, Reilly (Ed.) ECIS 2023 Research Papers (2023, May 11)

In the fight for individual privacy against online surveillance and personal data breaches, blockchain developers often pitch encrypted wallets as solutions. Five examples from 2021 and 2022 involve Big ... [more ▼]

In the fight for individual privacy against online surveillance and personal data breaches, blockchain developers often pitch encrypted wallets as solutions. Five examples from 2021 and 2022 involve Big Tech companies or large European governments. On the private side, Jack Dorsey’s Block company announced the Web5 Self-Sovereign Identity (SSI) Service. Meta and Twitter added support for fictional identities – tokenised avatars or profile pictures like Bored Apes and CryptoPunks, registered to Web3 wallets that putatively offer “self-sovereign ownership”. On the public side, the European Commission funded SSI wallet trials for digital diploma credentials. Germany’s federal government launched a mobile driving licence (mDL), stored in a SSI wallet. This one term, “SSI”, is associated with varying sets of technologies and ethical principles. Following complaints that “SSI” generates confusion, I offer a typology that highlights four semantic contradictions as well as a concept map to guide future research. [less ▲]

Detailed reference viewed: 81 (11 UL)
Full Text
Peer Reviewed
See detailMany-Objective Reinforcement Learning for Online Testing of DNN-Enabled Systems
Ul Haq, Fitash UL; Shin, Donghwan UL; Briand, Lionel UL

in 45th International Conference on Software Engineering (ICSE ’23) (2023, May)

Deep Neural Networks (DNNs) have been widely used to perform real-world tasks in cyber-physical systems such as Autonomous Driving Systems (ADS). Ensuring the correct behavior of such DNN-Enabled Systems ... [more ▼]

Deep Neural Networks (DNNs) have been widely used to perform real-world tasks in cyber-physical systems such as Autonomous Driving Systems (ADS). Ensuring the correct behavior of such DNN-Enabled Systems (DES) is a crucial topic. Online testing is one of the promising modes for testing such systems with their application environments (simulated or real) in a closed loop, taking into account the continuous interaction between the systems and their environments. However, the environmental variables (e.g., lighting conditions) that might change during the systems' operation in the real world, causing the DES to violate requirements (safety, functional), are often kept constant during the execution of an online test scenario due to the two major challenges: (1) the space of all possible scenarios to explore would become even larger if they changed and (2) there are typically many requirements to test simultaneously. In this paper, we present MORLOT (Many-Objective Reinforcement Learning for Online Testing), a novel online testing approach to address these challenges by combining Reinforcement Learning (RL) and many-objective search. MORLOT leverages RL to incrementally generate sequences of environmental changes while relying on many-objective search to determine the changes so that they are more likely to achieve any of the uncovered objectives. We empirically evaluate MORLOT using CARLA, a high-fidelity simulator widely used for autonomous driving research, integrated with Transfuser, a DNN-enabled ADS for end-to-end driving. The evaluation results show that MORLOT is significantly more effective and efficient than alternatives with a large effect size. In other words, MORLOT is a good option to test DES with dynamically changing environments while accounting for multiple safety requirements. [less ▲]

Detailed reference viewed: 40 (0 UL)
Full Text
Peer Reviewed
See detailUsing Empathy-Centric Design in Industry: Reflections from the UX Researcher, the Client, and the Method Expert
Drouet, Luce UL; Sleeswijk Visser, Froukje; Lallemand, Carine UL

in EMPATHICH '23: Proceedings of the 2nd Empathy-Centric Design Workshop (2023, May)

Empathic design provides tools and frameworks supporting designers to understand users’ experiences with products or services. However, how does one hand over this empathic understanding of users to other ... [more ▼]

Empathic design provides tools and frameworks supporting designers to understand users’ experiences with products or services. However, how does one hand over this empathic understanding of users to other internal stakeholders shaping the service experience? In this contribution, we reflect on a three-year implementation of an empathy-centric design approach in an industrial context with a low user experience maturity from three different professional viewpoints: ours as UX researchers, the one of a company manager, and an expert researcher on empathy in design. These narrative introspective accounts unveil some of the main benefits, opportunities, and challenges of implementing an empathy-centric design approach in the industry. We discuss and confront them to prior work. We contribute to the field of empathic design with rich in-situ research insights and principles for a successful empathic approach. [less ▲]

Detailed reference viewed: 34 (1 UL)
Full Text
Peer Reviewed
See detailAI-based Question Answering Assistance for Analyzing Natural-language Requirements
Ezzini, Saad UL; Abualhaija, Sallam UL; Arora, Chetan UL et al

in In Proceedings of the 45th International Conference on Software Engineering (ICSE'23), Melbourne 14-20 May 2023 (2023, May)

Abstract—By virtue of being prevalently written in natural language (NL), requirements are prone to various defects, e.g., inconsistency and incompleteness. As such, requirements are frequently subject to ... [more ▼]

Abstract—By virtue of being prevalently written in natural language (NL), requirements are prone to various defects, e.g., inconsistency and incompleteness. As such, requirements are frequently subject to quality assurance processes. These processes, when carried out entirely manually, are tedious and may further overlook important quality issues due to time and budget pressures. In this paper, we propose QAssist – a question-answering (QA) approach that provides automated assistance to stakeholders, including requirements engineers, during the analysis of NL requirements. Posing a question and getting an instant answer is beneficial in various quality-assurance scenarios, e.g., incompleteness detection. Answering requirements-related questions automatically is challenging since the scope of the search for answers can go beyond the given requirements specification. To that end, QAssist provides support for mining external domain-knowledge resources. Our work is one of the first initiatives to bring together QA and external domain knowledge for addressing requirements engineering challenges. We evaluate QAssist on a dataset covering three application domains and containing a total of 387 question-answer pairs. We experiment with state-of-the-art QA methods, based primarily on recent large-scale language models. In our empirical study, QAssist localizes the answer to a question to three passages within the requirements specification and within the external domain-knowledge resource with an average recall of 90.1% and 96.5%, respectively. QAssist extracts the actual answer to the posed question with an average accuracy of 84.2%. Index Terms—Natural-language Requirements, Question Answering (QA), Language Models, Natural Language Processing (NLP), Natural Language Generation (NLG), BERT, T5. [less ▲]

Detailed reference viewed: 131 (10 UL)
Full Text
Peer Reviewed
See detailSensitive and Personal Data: What Exactly Are You Talking About?
Kober, Maria; Samhi, Jordan UL; Arzt, Steven et al

in 10th International Conference on Mobile Software Engineering and Systems 2023 (2023, May)

Mobile devices are pervasively used for a variety of tasks, including the processing of sensitive data in mobile apps. While in most cases access to this data is legitimate, malware often targets ... [more ▼]

Mobile devices are pervasively used for a variety of tasks, including the processing of sensitive data in mobile apps. While in most cases access to this data is legitimate, malware often targets sensitive data and even benign apps collect more data than necessary for their task. Therefore, researchers have proposed several frameworks to detect and track the use of sensitive data in apps, so as to disclose and prevent unauthorized access and data leakage. Unfortunately, a review of the literature reveals a lack of consensus on what sensitive data is in the context of technical frameworks like Android. Authors either provide an intuitive definition or an ad-hoc definition, derive their definition from the Android permission model, or rely on previous research papers which do or do not give a definition of sensitive data. In this paper, we provide an overview of existing definitions of sensitive data in literature and legal frameworks. We further provide a sound definition of sensitive data derived from the definition of personal data of several legal frameworks. To help the scientific community further advance in this field, we publicly provide a list of sensitive sources from the Android framework, thus starting a community project leading to a complete list of sensitive API methods across different frameworks and programming languages. [less ▲]

Detailed reference viewed: 59 (0 UL)
Full Text
Peer Reviewed
See detailA Lightweight 5G-V2X Intra-slice Intrusion Detection System Using Knowledge Distillation
Hossain, Shajjad; Boualouache, Abdelwahab UL; Brik, Bouziane et al

in A Lightweight 5G-V2X Intra-slice Intrusion Detection System Using Knowledge Distillation (2023, May)

As the automotive industry grows, modern vehicles will be connected to 5G networks, creating a new Vehicular-to-Everything (V2X) ecosystem. Network Slicing (NS) supports this 5G-V2X ecosystem by enabling ... [more ▼]

As the automotive industry grows, modern vehicles will be connected to 5G networks, creating a new Vehicular-to-Everything (V2X) ecosystem. Network Slicing (NS) supports this 5G-V2X ecosystem by enabling network operators to flexibly provide dedicated logical networks addressing use case specific-requirements on top of a shared physical infrastructure. Despite its benefits, NS is highly vulnerable to privacy and security threats, which can put Connected and Automated Vehicles (CAVs) in dangerous situations. Deep Learning-based Intrusion Detection Systems (DL-based IDSs) have been proposed as the first defense line to detect and report these attacks. However, current DL-based IDSs are processing and memory-consuming, increasing security costs and jeopardizing 5G-V2X acceptance. To this end, this paper proposes a lightweight intrusion detection scheme for 5G-V2X sliced networks. Our scheme leverages DL and Knowledge Distillation (KD) for training in the cloud and offloading knowledge to slice-tailored lightweight DL models running on CAVs. Our results show that our scheme provides an optimal trade-off between detection accuracy and security overhead. Specifically, it can reduce security overhead in computation and memory complexity to more than 50% while keeping almost the same performance as heavy DL-based IDSs. [less ▲]

Detailed reference viewed: 86 (1 UL)
Full Text
Peer Reviewed
See detailFlakyCat: Predicting Flaky Tests Categories using Few-Shot Learning
Akli, Amal UL; Haben, Guillaume UL; Habchi, Sarra et al

in FlakyCat: Predicting Flaky Tests Categories using Few-Shot Learning (2023, May)

Flaky tests are tests that yield different outcomes when run on the same version of a program. This non-deterministic behaviour plagues continuous integration with false signals, wasting developers’ time ... [more ▼]

Flaky tests are tests that yield different outcomes when run on the same version of a program. This non-deterministic behaviour plagues continuous integration with false signals, wasting developers’ time and reducing their trust in test suites. Studies highlighted the importance of keeping tests flakiness-free. Recently, the research community has been pushing towards the detection of flaky tests by suggesting many static and dynamic approaches. While promising, those approaches mainly focus on classifying tests as flaky or not and, even when high performances are reported, it remains challenging to understand the cause of flakiness. This part is crucial for researchers and developers that aim to fix it. To help with the comprehension of a given flaky test, we propose FlakyCat, the first approach to classify flaky tests based on their root cause category. FlakyCat relies on CodeBERT for code representation and leverages Siamese networks to train a multi-class classifier. We train and evaluate FlakyCat on a set of 451 flaky tests collected from open-source Java projects. Our evaluation shows that FlakyCat categorises flaky tests accurately, with an F1 score of 73%. Furthermore, we investigate the performance of our approach for each category, revealing that Async waits, Unordered collections and Time-related flaky tests are accurately classified, while Concurrency-related flaky tests are more challenging to predict. Finally, to facilitate the comprehension of FlakyCat’s predictions, we present a new technique for CodeBERT-based model interpretability that highlights code statements influencing the categorization. [less ▲]

Detailed reference viewed: 63 (1 UL)
See detailAnwendung einer Kombination von KI-Methoden für die automatische Fehlererkennung und -diagnose an raumlufttechnischen Anlagen
Dietz, Sebastian UL; Scholzen, Frank UL; Rèhault, Nicolas

in TGA-Kongress 2023 - Kongressband (2023, May)

Detailed reference viewed: 61 (2 UL)
Full Text
Peer Reviewed
See detailPoster: Lightweight Features Sharing for Real-Time Object Detection in Cooperative Driving
Hawlader, Faisal UL; Robinet, François UL; Frank, Raphaël UL

in 2023 IEEE Vehicular Networking Conference (VNC) (2023, April 26)

In model partitioning for real-time object detection, part of the model is deployed on a vehicle, and the remaining layers are processed in the cloud. Model partitioning requires transmitting intermediate ... [more ▼]

In model partitioning for real-time object detection, part of the model is deployed on a vehicle, and the remaining layers are processed in the cloud. Model partitioning requires transmitting intermediate features to the cloud, which can be problematic, given that the latency requirements are strict. This paper addresses this issue by demonstrating a lightweight featuresharing strategy while investigating a trade-off between detection quality and latency. We report details on layer partitioning, such as which layers to split in order to achieve the desired accuracy. [less ▲]

Detailed reference viewed: 128 (38 UL)
Full Text
See detailDie Grenzen aufgezeigt:Technische Innovation und räumliche Abstraktion am Beispiel früher Landkarten der Grenzregion zwischen dem Herzogtum Luxemburg und dem Kurfürstentum Trier
Solchenbach, Karl UL

in Schröder, Lina; Wegewitz, Markus (Eds.) Raum- und Grenzkonzeptionen in der Erforschung europäischer Regionen (2023, April 13)

Die Ausbildung und Verfestigung der kurtrierischen und luxemburgischen Landesherrschaften war im 14. Jahrhundert weitgehend zum Abschluss gekommen. Die Transformation vom Personenverbands- zum ... [more ▼]

Die Ausbildung und Verfestigung der kurtrierischen und luxemburgischen Landesherrschaften war im 14. Jahrhundert weitgehend zum Abschluss gekommen. Die Transformation vom Personenverbands- zum Flächenstaat frühneuzeitlicher Prägung hatte die Ausbildung einer zunehmend deutlicheren Grenze zwischen beiden Territorien zur Folge. Ebenso formierte sich auch eine Grenze im Grenzraum mit Frankreich und Lothringen. Die vereinfachende Darstellung komplexer teils überlagerter Grenzzonen in Form von abstrahierenden Linien musste von den zeitgenössischen Kartographen jedoch erst noch entwickelt werden. Die älteste regionale Karte mit einer angedeuteten partiellen Grenzmarkierung stammt aus dem Jahr 1555. Eine zunehmende Professionalisierung der Kartographie gelang ab der zweiten Hälfte des 16. Jahrhunderts durch Landesaufnahmen, initiiert von den jeweiligen Landesherren. Die Intention der Auftraggeber war dabei ähnlich: einerseits sollte das jeweilige Territorium durch die Karte möglichst als geschlossen beherrschter Raum dargestellt werden, andererseits galt es, die bisher nur verbal beschriebenen teils strittigen Grenzen als abstrakte Linien deutlich sichtbar zu machen. Die Karten der Landesaufnahmen waren zunächst geheim, dennoch fanden sie bereits nach wenigen Jahren Eingang in die Atlanten von Ortelius, de Jode und Mercator. Diese beeinflussten wiederum die Karten der Region in den späteren Atlanten der niederländischen, französischen und süddeutschen Kartenverleger. Der Beitrag beschreibt, ab wann und in welcher Form Grenzen in frühen Karten (16.-18. Jahrhundert) dargestellt wurden. Besonders in den Blick genommen wird der Prozess der Ausbildung von Linien zur abstrakten Darstellung unklarer, teils strittiger Grenzräume sowie die zunehmende Professionalisierung und Genauigkeit in der kartographischen Darstellung durch Vermessungen im Feld. [less ▲]

Detailed reference viewed: 47 (1 UL)
Full Text
Peer Reviewed
See detailLessons from Investment Treaty Arbitration
Garcia Olmedo, Javier UL

in Haslehner, Werner; Rust, Alexander; Kofler, Georg (Eds.) et al Alternative Dispute Resolution in Taxation (2023, April 01)

Detailed reference viewed: 54 (15 UL)
Full Text
Peer Reviewed
See detailThe Elements of Visual Art Recommendation: Learning Latent Semantic Representations of Paintings
Yilma, Bereket Abera UL; Leiva, Luis A. UL

in Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (CHI ’23) (2023, April)

Artwork recommendation is challenging because it requires understanding how users interact with highly subjective content, the complexity of the concepts embedded within the artwork, and the emotional and ... [more ▼]

Artwork recommendation is challenging because it requires understanding how users interact with highly subjective content, the complexity of the concepts embedded within the artwork, and the emotional and cognitive reflections they may trigger in users. In this paper, we focus on efficiently capturing the elements (i.e., latent semantic relationships) of visual art for personalized recommendation. We propose and study recommender systems based on textual and visual feature learning techniques, as well as their combinations. We then perform a small-scale and a large-scale user-centric evaluation of the quality of the recommendations. Our results indicate that textual features compare favourably with visual ones, whereas a fusion of both captures the most suitable hidden semantic relationships for artwork recommendation. Ultimately, this paper contributes to our understanding of how to deliver content that suitably matches the user's interests and how they are perceived. [less ▲]

Detailed reference viewed: 286 (77 UL)
Full Text
Peer Reviewed
See detailTowards Log Slicing
Dawes, Joshua UL; Shin, Donghwan; Bianculli, Domenico UL

in Dawes, Joshua; Shin, Donghwan; Bianculli, Domenico (Eds.) Towards Log Slicing (2023, April)

This short paper takes initial steps towards developing a novel approach, called log slicing, that aims to answer a practical question in the field of log analysis: Can we automatically identify log ... [more ▼]

This short paper takes initial steps towards developing a novel approach, called log slicing, that aims to answer a practical question in the field of log analysis: Can we automatically identify log messages related to a specific message (e.g., an error message)? The basic idea behind log slicing is that we can consider how different log messages are "computationally related" to each other by looking at the corresponding logging statements in the source code. These logging statements are identified by 1) computing a backwards program slice, using as criterion the logging statement that generated a problematic log message; and 2) extending that slice to include relevant logging statements. The paper presents a problem definition of log slicing, describes an initial approach for log slicing, and discusses a key open issue that can lead towards new research directions. [less ▲]

Detailed reference viewed: 75 (10 UL)
See detailEduCHI 2023 - 5th Annual Symposium on HCI Education
Gray, Colin; Macdonald, Craig; Lallemand, Carine UL et al

in CHI'23 Extended Abstracts (2023, April)

Detailed reference viewed: 83 (0 UL)
Full Text
Peer Reviewed
See detailAssessing the Impact of Attacks on an Automotive Ethernet Time Synchronization Testbed
Fotouhi, Mahdi UL; Buscemi, Alessio UL; Boualouache, Abdelwahab UL et al

in Fotouhi, Mahdi; Buscemi, Alessio; Boualouache, Abdelwahab (Eds.) et al 2023 IEEE Vehicular Networking Conference (VNC), Istanbul 26-28 April 2023 (2023, April)

Time Sensitive Network (TSN) standards are gaining traction in the scientific community and automotive Original Equipment Manufacturers (OEMs) due their promise of deterministic Ethernet networking. Among ... [more ▼]

Time Sensitive Network (TSN) standards are gaining traction in the scientific community and automotive Original Equipment Manufacturers (OEMs) due their promise of deterministic Ethernet networking. Among these standards, Generalized Precision Time Protocol (gPTP) - IEEE 802.1AS - allows network devices to be synchronized with a precision far higher than other synchronization standards, such as Network Time Protocol (NTP). gPTP is a profile of Precision Time Protocol (PTP) which, due to its robustness to delay variations, has been designated for automotive applications. Nonetheless, gPTP was designed without security controls, which makes it vulnerable to a number of attacks. This work reveals a critical vulnerability caused by a common implementation practice that opens the door to spoofing attacks on gPTP. To assess the impact of this vulnerability, we built two real gPTP-capable testbeds. Our results show high risks of this vulnerability destabilizing the system functionality. [less ▲]

Detailed reference viewed: 180 (30 UL)
See detailVisual Narratives of the Great War in Luxembourg: One Hundred Years of History Manuals
Camarda, Sandra UL; Scuto, Denis UL

in Morin, Denis; Prévot, Cédric (Eds.) Guerres en images, images de guerres : L’illustration des conflits en Europe dans les manuels d’histoire (2023, April)

Detailed reference viewed: 45 (3 UL)
Full Text
Peer Reviewed
See detailRefining the Mandatory Cybersecurity Incident Reporting under the NIS Directive 2.0: Event Types and Reporting Processes
Schmitz, Sandra UL

in Onwubiko, Cyril; Rosati, Pierangelo; Rege, Aunshul (Eds.) et al Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media (2023, March 08)

Detailed reference viewed: 59 (0 UL)
Full Text
Peer Reviewed
See detailRecursive UE Localization for a Multi-RIS-Assisted Wireless System in an Obstacle-Dense Environment
Zhao, Sibo; Liu, Yuan UL; Wu, Linlong UL et al

in 2023 17th European Conference on Antennas and Propagation (EuCAP) (2023, March)

Accurate user equipment (UE) localization in an obstacle-dense environment is quite challenging due to the insufficiency of line-of-sight (LoS) links. However, the reconfigurable intelligent surface (RIS ... [more ▼]

Accurate user equipment (UE) localization in an obstacle-dense environment is quite challenging due to the insufficiency of line-of-sight (LoS) links. However, the reconfigurable intelligent surface (RIS) has the potential for offering alternative RIS-assisted LoS links to refine the localization results. In this paper, a recursive localization scheme is proposed based on an iterative RIS selection strategy, with the help of prior knowledge of the propagation environment. And numerical results based on a geometry-based channel simulator in a typical composite urban environment exhibit the improvement of localization accuracy. [less ▲]

Detailed reference viewed: 91 (9 UL)
Full Text
See detailInternships in Times of Crisis: Collaborative Production of Instructional Videos at a Distance
Reuter, Robert UL; Reeff, Alain; Busana, Gilbert UL

in Willemse, Martijn (Ed.) EAPRIL 2022 CONFERENCE PROCEEDINGS (2023, March)

The Bachelor in Educational Sciences (BScE) at the University of Luxembourg offers a thorough and demanding teacher training program that combines academic and practical knowledge. As in many other ... [more ▼]

The Bachelor in Educational Sciences (BScE) at the University of Luxembourg offers a thorough and demanding teacher training program that combines academic and practical knowledge. As in many other initial teacher training programs, internships are a key part of each semester in the BScE. In the face of the COVID-19 health crisis, this essential part of our teacher training program could not be maintained. Indeed, the schools were closed, and the pupils were taught at a distance by their teachers. We therefore had to quickly innovate and set up alternative learning activities that best met the objectives of the internships. We thus asked our students to design and produce educational videos, in dyads, for the country's schools. The aim was to enable our students to develop the necessary skills to produce such learning resources and to make them available to schools via the Internet. We will describe, analyse, and evaluate the solution we had to urgently put in place and the videos that were produced as a result. We will also discuss possible lessons learned that might lead to adaptations in our training program. [less ▲]

Detailed reference viewed: 42 (3 UL)
Full Text
Peer Reviewed
See detailNegative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection
Samhi, Jordan UL; Kober, Kober; Kabore, Abdoul Kader UL et al

in 30th IEEE International Conference on Software Analysis, Evolution and Reengineering (2023, March)

Apps on mobile phones manipulate all sorts of data, including sensitive data, leading to privacy related concerns. Recent regulations like the European GDPR provide rules for the processing of personal ... [more ▼]

Apps on mobile phones manipulate all sorts of data, including sensitive data, leading to privacy related concerns. Recent regulations like the European GDPR provide rules for the processing of personal and sensitive data, like that no such data may be leaked without the consent of the user. Researchers have proposed sophisticated approaches to track sensitive data within mobile apps, all of which rely on specific lists of sensitive source and sink methods. The data flow analysis results greatly depend on these lists' quality. Previous approaches either used incomplete hand-written lists and quickly became outdated or relied on machine learning. The latter, however, leads to numerous false positives, as we show. This paper introduces CoDoC that aims to revive the machine-learning approach to precisely identify the privacy-related source and sink API methods. In contrast to previous approaches, CoDoC uses deep learning techniques and combines the source code with the documentation of API methods. Firstly, we propose novel definitions that clarify the concepts of taint analysis, source, and sink methods. Secondly, based on these definitions, we build a new ground truth of Android methods representing sensitive source, sink, and neither methods that will be used to train our classifier. We evaluate CoDoC and show that, on our validation dataset, it achieves a precision, recall, and F1 score of 91%, outperforming the state-of-the-art SuSi. However, similarly to existing tools, we show that in the wild, i.e., with unseen data, CoDoC performs poorly and generates many false-positive results. Our findings suggest that machine-learning models for abstract concepts such as privacy fail in practice despite good lab results. To encourage future research, we release all our artifacts to the community. [less ▲]

Detailed reference viewed: 108 (10 UL)
Full Text
Peer Reviewed
See detailImproving Long-Term Retention through Personalized Recall Testing and Immediate Feedback
Atashpendar, Aryobarzan UL; Rothkugel, Steffen UL

in Proceedings of the 2023 11th International Conference on Information and Education Technology (ICIET) (2023, March)

Tests have been shown to improve the long-term retention of students, referred to as the "testing effect". Different question formats, such as multiple choice and recall, have varying properties. While ... [more ▼]

Tests have been shown to improve the long-term retention of students, referred to as the "testing effect". Different question formats, such as multiple choice and recall, have varying properties. While recall questions induce a longer retention than multiple choice ones, they are harder for students since answers must be actively retrieved from memory. Moreover, regular testing inherently increases the teacher's workload, particularly since feedback on each test is paramount for an effective bearing on the student's understanding and learning. This work introduces BEACON Q, a digital quiz application combining different question formats and progressively adapting their difficulty to each student’s level. The level is derived from past answers as well as ratings provided by the students which constitute their perceived understanding of each topic. BEACON Q delivers immediate feedback through detailed explanations, without requiring manual assessment by the teacher. Tests are scheduled for periods of time, thus giving the students the flexibility to choose an appropriate time to take the test. An initial evaluation of BEACON Q has been performed in the context of three different computer science classes at our university. Preliminary results are presented in this paper. [less ▲]

Detailed reference viewed: 76 (7 UL)
Full Text
Peer Reviewed
See detailPerformance Analysis and Benchmarking of a Temperature Downscaling Deep Learning Model
Panner Selvam, Karthick UL; Brorsson, Mats Hakan UL

in 31st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, Naples, Italy 1-3 March 2023 (2023, March)

We are presenting here a detailed analysis and performance characterization of a statistical temperature downscaling application used in the MAELSTROM EuroHPC project. This application uses a deep ... [more ▼]

We are presenting here a detailed analysis and performance characterization of a statistical temperature downscaling application used in the MAELSTROM EuroHPC project. This application uses a deep learning methodology to convert low-resolution atmospheric temperature states into high-resolution. We have performed in-depth profiling and roofline analysis at different levels (Operators, Training, Distributed Training, Inference) of the downscaling model on different hardware architectures (Nvidia V100 & A100 GPUs). Finally, we compare the training and inference cost of the downscaling model with various cloud providers. Our results identify the model bottlenecks which can be used to enhance the model architecture and determine hardware configuration for efficiently utilizing the HPC. Furthermore, we provide a comprehensive methodology for in-depth profiling and benchmarking of the deep learning models. [less ▲]

Detailed reference viewed: 83 (14 UL)
Full Text
Peer Reviewed
See detailUser Requirement Analysis for a Real-Time NLP-Based Open Information Retrieval Meeting Assistant
Alcaraz, Benoît UL; Hosseini Kivanani, Nina UL; Najjar, Amro et al

in Alcaraz, Benoît; Hosseini Kivanani, Nina; Najjar, Amro (Eds.) et al Advances in Information Retrieval (2023, March)

Meetings are recurrent organizational tasks intended to drive progress in an interdisciplinary and collaborative manner. They are, however, prone to inefficiency due to factors such as differing knowledge ... [more ▼]

Meetings are recurrent organizational tasks intended to drive progress in an interdisciplinary and collaborative manner. They are, however, prone to inefficiency due to factors such as differing knowledge among participants. The research goal of this paper is to design a recommendation-based meeting assistant that can improve the efficiency of meetings by helping to contextualize the information being discussed and reduce distractions for listeners. Following a Wizard-of-Oz setup, we gathered user feedback by thematically analyzing focus group discussions and identifying this kind of system’s key challenges and requirements. The findings point to shortcomings in contextualization and raise concerns about distracting listeners from the main content. Based on the findings, we have developed a set of design recommendations that address context, interactivity and personalization issues. These recommendations could be useful for developing a meeting assistant that is tailored to the needs of meeting participants, thereby helping to optimize the meeting experience. [less ▲]

Detailed reference viewed: 93 (6 UL)
Full Text
Peer Reviewed
See detailRegional heterogeneity and individual characteristics in the development of a European tax policy: historical insights from Luxembourg
Danescu, Elena UL

in Danescu, Elena; Dima, Alina Mihaela (Eds.) Fostering recovery through metaverse business modelling - An interdisciplinary analysis of the new paradigm shift (2023, March)

Luxembourg is currently one of the most politically stable, consensus-oriented, and prosperous countries in the world, characterised by am advanced social market economy, and a level of material wellbeing ... [more ▼]

Luxembourg is currently one of the most politically stable, consensus-oriented, and prosperous countries in the world, characterised by am advanced social market economy, and a level of material wellbeing above the EU average. Its strong fiscal position is well illustrated by a longstanding AAA credit rating, a significant accumulation of government financial assets, and a distinct fiscal approach. In this light, this paper aims to investigate the specific features of the tax system in Luxembourg from a multidisciplinary perspective by analysing historical sources and exploring the development of these particularities over time, their impact on the socioeconomic context and their repercussions for the European integration process, especially in the design and completion of Economic and Monetary Union (EMU). [less ▲]

Detailed reference viewed: 70 (2 UL)
Full Text
Peer Reviewed
See detailExploring the Embodied Experience of Walking Meetings through Bodystorming – Implications for Design
Jacob, Melodie; Damen, Ida; Lallemand, Carine UL

in TEI'23 Seventeenth International Conference on Tangible, Embedded, and Embodied Interaction (2023, February)

Walking meetings are a promising way to reduce unhealthy sedentary behavior at the office. Some aspects of walking meetings are however hard to assess using traditional research approaches that do not ... [more ▼]

Walking meetings are a promising way to reduce unhealthy sedentary behavior at the office. Some aspects of walking meetings are however hard to assess using traditional research approaches that do not account well for the embodied experience of walking meetings. We conducted a series of 16 bodystorming sessions, featuring unusual walking meeting situations to engage participants (N=45) in a reflective experience. After each bodystorming, participants completed three tasks: a body map, an empathy map, and a rating of workload using the NASA-TLX scale. These embodied explorations provide insights on key themes related to walking meetings: material and tools, physical and mental demand, connection with the environment, social dynamics, and privacy. We discuss the role of technology and opportunities for technology-mediated walking meetings. We draw implications for the design of walking meeting technologies or services to account for embodied experiences, and the individual, social, and environmental factors at play. [less ▲]

Detailed reference viewed: 104 (1 UL)
Full Text
Peer Reviewed
See detailBringing Movement to Digital Tasks at the Office: Designing an Acceptably Active Interface Interaction for Sending Emails
Keller, Philip; van den Heuvel, Roy; Lallemand, Carine UL

in Proceedings of the Seventeenth International Conference on Tangible, Embedded, and Embodied Interaction TEI'23 (2023, February)

While working on a computer typically involves sitting for prolonged periods of time, sedentary work routines are associated with numerous health issues. To address this societal concern, existing ... [more ▼]

While working on a computer typically involves sitting for prolonged periods of time, sedentary work routines are associated with numerous health issues. To address this societal concern, existing solutions trigger physical activity as a break from work, rather than a part of it. In this research, we explore a vision for physically active ways of working, by transforming mundane digital tasks into physically active ones. As a research artifact and design exemplar, we present A2-I2, an innovative tangible system for sending emails. After loading their email onto a physical “letter” token, office workers must walk to a physical mailbox located in the office space. Understanding what design qualities influence the experience and acceptability of such systems is a necessary step toward the design of acceptably active interface interactions. We report on a preliminary user test with 8 participants. With this project, we aim to inspire future tangible and embodied systems addressing the timely issue of sedentary behavior at work. [less ▲]

Detailed reference viewed: 104 (3 UL)
Full Text
Peer Reviewed
See detailTerminal-Aware Multi-Connectivity Scheduler for Uplink Multi-Layer Non-Terrestrial Networks
Dazhi, Michael UL; Al-Hraishawi, Hayder UL; Mysore Rama Rao, Bhavani Shankar UL et al

in IEEE Global Communications Conference (Globecom) (2023, January 12)

This paper introduces the concept of multi-connectivity (MC) to the multi-orbit non-terrestrial networks (NTNs), where user terminals can be served by more than one satellite to achieve higher peak ... [more ▼]

This paper introduces the concept of multi-connectivity (MC) to the multi-orbit non-terrestrial networks (NTNs), where user terminals can be served by more than one satellite to achieve higher peak throughput. MC is a technique initially introduced by the 3rd Generation Partnership Project (3GPP) for terrestrial communications in 4G and 5G, it has shown much gain in the terrestrial domain and this paper explores areas where this concept can benefit the satellite domain. MC can increase throughput, but this entails increased power consumption at user terminal for uplink transmissions. The energy efficiency of uplink communications can be improved by designing efficient scheduling schemes, and to this end, we developed a terminal aware multi-connectivity scheduling algorithm. This proposed algorithm uses the available radio resources and propagation information to intelligently define a dynamic resource allocation pattern, that optimally routes traffic so as to maximize uplink data rate while minimizing the energy consumption at the UT. The algorithm operates with the terminal differentiating multi-layer NTN resource scheduling architecture, which has a softwarized dispatcher at the network layer that classifies and differentiates the packets based on terminal type. The performance of the proposed algorithm was compared with round robin and joint carrier schedulers in terms of uplink data rate and energy efficiency. We also provide architectural design of implementable schedulers for multi-orbital satellite networks that can operate with different classes of terminals. [less ▲]

Detailed reference viewed: 180 (49 UL)
Full Text
Peer Reviewed
See detailFederated Learning as a Solution for Problems Related to Intergovernmental Data Sharing
Sprenkamp, Kilian; Delgado Fernandez, Joaquin UL; Eckhardt, Sven et al

in Proceedings of the 56th Hawaii International Conference on System Sciences (2023, January 03)

To address global problems, intergovernmental collaboration is needed. Modern solutions to these problems often include data-driven methods like artificial intelligence (AI), which require large amounts ... [more ▼]

To address global problems, intergovernmental collaboration is needed. Modern solutions to these problems often include data-driven methods like artificial intelligence (AI), which require large amounts of data to perform well. However, data sharing between governments is limited. A possible solution is federated learning (FL), a decentralised AI method created to utilise personal information on edge devices. Instead of sharing data, governments can build their own models and just share the model parameters with a centralised server aggregating all parameters, resulting in a superior overall model. By conducting a structured literature review, we show how major intergovernmental data sharing challenges like disincentives, legal and ethical issues as well as technical constraints can be solved through FL. Enhanced AI while maintaining privacy through FL thus allows governments to collaboratively address global problems, which will positively impact governments and citizens. [less ▲]

Detailed reference viewed: 60 (3 UL)
Full Text
Peer Reviewed
See detailFederated Learning for Credit Risk Assessment
Lee, Chul Min UL; Delgado Fernandez, Joaquin UL; Potenciano Menci, Sergio UL et al

in Proceedings of the 56th Hawaii International Conference on System Sciences (2023, January 03)

Credit risk assessment is a standard procedure for financial institutions (FIs) when estimating their credit risk exposure. It involves the gathering and processing quantitative and qualitative datasets ... [more ▼]

Credit risk assessment is a standard procedure for financial institutions (FIs) when estimating their credit risk exposure. It involves the gathering and processing quantitative and qualitative datasets to estimate whether an individual or entity will be able to make future required payments. To ensure effective processing of this data, FIs increasingly use machine learning methods. Large FIs often have more powerful models as they can access larger datasets. In this paper, we present a Federated Learning prototype that allows smaller FIs to compete by training in a cooperative fashion a machine learning model which combines key data derived from several smaller datasets. We test our prototype on an historical mortgage dataset and empirically demonstrate the benefits of Federated Learning for smaller FIs. We conclude that smaller FIs can expect a significant performance increase in their credit risk assessment models by using collaborative machine learning. [less ▲]

Detailed reference viewed: 133 (40 UL)
Full Text
Peer Reviewed
See detailAstute Approach to Handling Memory Layouts of Regular Data Structures
Šmelko, Adam; Kruliš, Martin; Kratochvil, Miroslav UL et al

in Algorithms and Architectures for Parallel Processing (2023, January)

Programmers of high-performance applications face many challenging aspects of contemporary hardware architectures. One of the critical aspects is the efficiency of memory operations which is affected not ... [more ▼]

Programmers of high-performance applications face many challenging aspects of contemporary hardware architectures. One of the critical aspects is the efficiency of memory operations which is affected not only by the hardware parameters such as memory throughput or cache latency but also by the data-access patterns, which may influence the utilization of the hardware, such as re-usability of the cached data or coalesced data transactions. Therefore, a performance of an algorithm can be highly impacted by the layout of its data structures or the order of data processing which may translate into a more or less optimal sequence of memory operations. These effects are even more pronounced on highly-parallel platforms, such as GPUs, which often employ specific execution models (lock-step) or memory models (shared memory). In this work, we propose a modern, astute approach for managing and implementing memory layouts with first-class structures that is very efficient and straightforward. This approach was implemented in Noarr, a GPU-ready portable C++ library that utilizes generic programming, functional design, and compile-time computations to allow the programmer to specify and compose data structure layouts declaratively while minimizing the indexing and coding overhead. We describe the main principles on code examples and present a performance evaluation that verifies our claims regarding its efficiency. [less ▲]

Detailed reference viewed: 35 (3 UL)
Full Text
Peer Reviewed
See detailVehicle-to-Infrastructure Communication for Real-Time Object Detection in Autonomous Driving
Hawlader, Faisal UL; Robinet, François UL; Frank, Raphaël UL

in 18th Wireless On-demand Network systems and Services Conference (WONS-23) (2023, January)

Environmental perception is a key element of autonomous driving because the information receive from the perception module influences core driving decisions. An outstanding challenge in real-time ... [more ▼]

Environmental perception is a key element of autonomous driving because the information receive from the perception module influences core driving decisions. An outstanding challenge in real-time perception for autonomous driving lies in finding the best trade-off between detection quality and latency. Major constraints on both computation and power have to be taken into account for real-time perception in autonomous vehicles. Larger object detection models tend to produce the best results, but are also slower at runtime. Since the most accurate detectors cannot run in real-time locally, we investigate the possibility of offloading computation to edge and cloud platforms, which are less resource-constrained. We create a synthetic dataset to train an object detection model and evaluate different offloading strategies. Using real hardware and network simulations, we compare different trade-offs between prediction quality and end-to-end delay. Since sending raw frames over the network implies additional transmission delays, we also explore the use of JPEG compression at varying qualities and measure its impact on prediction metrics. We show that models with adequate compression can be run in real-time on the cloud while outperforming local detection performance. [less ▲]

Detailed reference viewed: 219 (59 UL)
Full Text
Peer Reviewed
See detailIntegrated Access and Backhaul via Satellites
Abdullah, Zaid UL; Kisseleff, Steven UL; Lagunas, Eva UL et al

in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Toronto, Canada, Sept. 2023 (2023)

Detailed reference viewed: 25 (5 UL)
Full Text
Peer Reviewed
See detailASRLUX: AUTOMATIC SPEECH RECOGNITION FOR THE LOW-RESOURCE LANGUAGE LUXEMBOURGISH
Gilles, Peter UL; Hillah, Léopold Edem Ayité UL; Hosseini Kivanani, Nina UL

in Skarnitzl, Radek; Volín, Jan (Eds.) Proceedings of the 20th International Congress of Phonetic Sciences (2023)

We have developed an automatic speech recognition (ASR) system tailored to Luxembourgish, a low-resource language that poses distinct challenges for conventional ASR approaches due to the limited ... [more ▼]

We have developed an automatic speech recognition (ASR) system tailored to Luxembourgish, a low-resource language that poses distinct challenges for conventional ASR approaches due to the limited availability of training data and inherent multilingual nature. By employing transfer learning, we meticulously fine-tuned an array of models derived from pre-trained wav2vec 2.0 and Whisper checkpoints. These models have been trained on an extensive corpus of various languages and several hundred thousand hours of audio data, utilizing unsupervised and weak supervised methodologies, respectively. This includes linguistically related languages such as German, Dutch, and French, which expedite the cross-lingual training process for Luxembourgish-specific models. Fine-tuning was executed utilizing 67 hours of annotated Luxembourgish speech data sourced from a diverse range of speakers. The optimal word error rate (WER) achieved for wav2vec 2.0 and Whisper models were 9.5 and 12.1, respectively. The remarkably low WERs obtained serve to substantiate the efficacy of transfer learning in the context of ASR for low-resource languages. [less ▲]

Detailed reference viewed: 54 (1 UL)
Full Text
Peer Reviewed
See detailDisentangling Online Manipulation Strategies from the Perspective of Digital Inequalities
Sanchez Chamorro, Lorena UL

in Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (2023)

Detailed reference viewed: 40 (0 UL)
Full Text
Peer Reviewed
See detailShorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices
Sageloli, Éric; Pébereau, Pierre; Meaux, Pierrick UL et al

in Applied Cryptography and Network Security - 21st International Conference ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I (2023)

We provide identity-based signature (IBS) schemes with tight security against adaptive adversaries, in the (classical or quantum) random oracle model (ROM or QROM), in both unstructured and structured ... [more ▼]

We provide identity-based signature (IBS) schemes with tight security against adaptive adversaries, in the (classical or quantum) random oracle model (ROM or QROM), in both unstructured and structured lattices, based on the SIS or RSIS assumption. These signatures are short (of size independent of the message length). Our schemes build upon a work from Pan and Wagner (PQCrypto’21) and improve on it in several ways. First, we prove their transformation from nonadaptive to adaptive IBS in the QROM. Then, we simplify the parameters used and give concrete values. Finally, we simplify the signature scheme by using a non-homogeneous relation, which helps us reduce the size of the signature and get rid of one costly trapdoor delegation. On the whole, we get better security bounds, shorter signatures and faster algorithms. [less ▲]

Detailed reference viewed: 52 (0 UL)
Full Text
Peer Reviewed
See detailUL \& UM6P at SemEval-2023 Task 10: Semi-Supervised Multi-task Learning for Explainable Detection of Online Sexism
Lamsiyah, Salima UL; El Mahdaouy, Abdelkader; Alami, Hamza et al

in Proceedings of the 17th International Workshop on Semantic Evaluation (SemEval-2023) (2023)

This paper introduces our participating system to the Explainable Detection of Online Sexism (EDOS) SemEval-2023 - Task 10: Explainable Detection of Online Sexism. The EDOS shared task covers three ... [more ▼]

This paper introduces our participating system to the Explainable Detection of Online Sexism (EDOS) SemEval-2023 - Task 10: Explainable Detection of Online Sexism. The EDOS shared task covers three hierarchical sub-tasks for sexism detection, coarse-grained and fine-grained categorization. We have investigated both single-task and multi-task learning based on RoBERTa transformer-based language models. For improving the results, we have performed further pre-training of RoBERTa on the provided unlabeled data. Besides, we have employed a small sample of the unlabeled data for semi-supervised learning using the minimum class-confusion loss. Our system has achieved macro F1 scores of 82.25\textbackslash\%, 67.35\textbackslash\%, and 49.8\textbackslash\% on Tasks A, B, and C, respectively. [less ▲]

Detailed reference viewed: 234 (1 UL)
Full Text
Peer Reviewed
See detailSoftware Model for Robot Programming and Example of Implementation for Navigation System
Chaychi, Samira UL; Reis, Sandro UL; Zampunieris, Denis UL

in Proceedings of 9th International Conference on Automation, Robotics and Applications (ICARA 2023) (2023)

In this paper, we are going to consider a current challenge in a robotic software system. We consider a problem, which is the lack of separation of concerns in robotic systems, and propose a software ... [more ▼]

In this paper, we are going to consider a current challenge in a robotic software system. We consider a problem, which is the lack of separation of concerns in robotic systems, and propose a software model to address the problem and resolve the current challenges. The core purpose of this paper is to demonstrate the advantages of using separation of concerns principles to create a well-ordered model of independent components that address separated concerns individually. Considering the problem, we developed a software model with the help of a proactive engine to address the challenges. We use robotic operating systems to help us to implement the robot simulator. [less ▲]

Detailed reference viewed: 59 (10 UL)
Full Text
Peer Reviewed
See detailNuances are the Key: Unlocking ChatGPT to Find Failure-Inducing Tests with Differential Prompting
Li, Tsz-On; Zong, Wenxi; Wang, Yibo et al

in Nuances are the Key: Unlocking ChatGPT to Find Failure-Inducing Tests with Differential Prompting (2023)

Detailed reference viewed: 62 (0 UL)
Full Text
Peer Reviewed
See detailNGSO-To-GSO Satellite Interference Detection Based on Autoencoder
Saifaldawla, Almoatssimbillah UL; Ortiz Gomez, Flor de Guadalupe UL; Lagunas, Eva UL et al

in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Toronto, Canada, Sept. 2023 (2023)

Detailed reference viewed: 69 (27 UL)
Full Text
Peer Reviewed
See detailArtificial Intelligence Based Robotic Automation of Manual Assembly Tasks for Intelligent Manufacturing
Simeth, Alexej UL; Plapper, Peter UL

in von Leipzig, Konrad; Sacks, Natasha; Mc Clelland, Michelle (Eds.) Smart, Sustainable Manufacturing in an Ever-Changing World (2023)

Increasing product customization and shortening product life cycles in an ever-changing world is challenging for automation. This is especially true for assembly tasks, requiring a high level of ... [more ▼]

Increasing product customization and shortening product life cycles in an ever-changing world is challenging for automation. This is especially true for assembly tasks, requiring a high level of perception, skill, and adaptability. With the rise of smart manufacturing, intelligent manufacturing, and other aspects related to Industry 4.0, the hurdles for automation of the aforementioned tasks are getting reduced. Especially Artificial Intelligence (AI) is expected to enable smart and flexible automation since it is possible to deduct decisions from unknown multidimensional correlations in sensor data, which is critical for the assembly of highly customized products. In this research paper, three different conventional and AI-based glue detection models are proposed with the target to automate a gluing process in a manual assembly of highly customized products in a batch size one production scenario. A conventional, one-dimensional rule-based model, and two hybrid models using a support vector machine image classifier (SVM) and either Tamura features or convolutional neural network (CNN) feature extraction are presented and compared. The obtained results demonstrate the efficiency and robustness of AI-based algorithms, as the CNN and SVM hybrid model outperforms the other two approaches achieving a prediction accuracy of >99\% at the fastest classification speed. [less ▲]

Detailed reference viewed: 37 (3 UL)