![]() Chou, Hung-Pu ![]() Report (2023) In this paper, a technique for the Berlekamp Massey(BM) algorithm is provided to reduce the latency of decoding and save decoding power by early termination or early stopped checking. We investigate the ... [more ▼] In this paper, a technique for the Berlekamp Massey(BM) algorithm is provided to reduce the latency of decoding and save decoding power by early termination or early stopped checking. We investigate the consecutive zero discrepan cies during the decoding iteration and decide to early stop the decoding process. This technique is subject to decoding failure in exchange for the decoding latency. We analyze our propose d technique by considering the weight distribution of BCH code and estimating the bounds of undetected error probability as the event of enormous stop checking. The proposed method is effective in numerical results and the probability of decoding failure is lower than 10 −119 for decoding 16383 code length of BCH codes. Furthermore, the complexity compared the conventional early termination method with the proposed approach for decoding the long BCH code. The proposed approach reduces the complexity of the conventional approach by up to 80%. As a result, the FPGA testing on a USB device validates the reliability of the proposed method [less ▲] Detailed reference viewed: 42 (2 UL)![]() Janz, Nina ![]() Report (2023) Detailed reference viewed: 56 (0 UL)![]() Chou, Hung-Pu ![]() Report (2023) Random numbers [1] are widely used in numerical computing, statistical simulation, random sampling, etc. The security of random numbers is getting more attention. In addition to random numbers ... [more ▼] Random numbers [1] are widely used in numerical computing, statistical simulation, random sampling, etc. The security of random numbers is getting more attention. In addition to random numbers, information and network environment security [2] are also very important in real life, such as the generation of verification code for login, QR code for online payment, etc. All random numbers that involve important identity information must have extremely high security to protect personal privacy from being leaked or illegally stolen. At present, the mechanism for generating random numbers by computers is at risk of being attacked which is subject that the generated random numbers may be predicted in some cases. Random number generation (RNG) [3] has always been one of the biggest problems. The problem with classic random number generators, i.e., pseudorandom number generators, consists in the possibility to know the deterministic process of pseudorandom generation by unwanted persons. This may result, in the case of cryptography, in compromising a myth of security. Another problem may be the incorrect handling of the generated sequence—mostly in cryptographic uses, the generated random sequence is applied once. Its multiple usage may lead to a security breach (e.g., in the case of the OTP cipher, a sufficiently long key should be truly random and used once in that protocol, otherwise it will be possible to break the code). [less ▲] Detailed reference viewed: 140 (8 UL)![]() Chou, Hung-Pu ![]() Report (2022) SNT Team finalized the provider selection for QKD equipment to be installed. The selection process included the request for equipment quotation from Toshiba Europe and Aurea technologies. • Due to ... [more ▼] SNT Team finalized the provider selection for QKD equipment to be installed. The selection process included the request for equipment quotation from Toshiba Europe and Aurea technologies. • Due to maturity, availability, and proofness, the team selected the Cerberis XCR platform provided by the company ID Quantique. Additionally, IDQ devices allow the user to perform research and his own developments in an open architecture. • The procurement process started at the beginning of 2022, and due to the total amount, it took until the last week of June to retrieve the equipment at UniLu premises. The procurement process required a formal derogation process to avoid public tendering. The justification for the derogation was the lack of other providers of QKD equipment that allows performing development and research while at the same time providing a finalized prototype that can be used as a starting point for the custom developments. • The current delays in the supplier’s chain have created a delay in finishing some procurements of auxiliary equipment related to the Lab. • The team started the physical space request from the University Logistics to have the place to deploy the QKD experiments. The space in the JFK building is an underground room of around 70 square meters. The space on the MSO building in Esch-Sur-Alzette will be a standard office space with fibre optic connectivity. • The team has been evaluating if installing a temperature control system in the JFK lab is required. For this purpose, we have been taking temperature measurements since the beginning of the year. In any case, the vendor specifications state that there are no stringent requirements in terms of temperature control other than an average room temperature. (10 to 30 Degrees in specs).University Logistics accomplished maintenance activities in the Lab facilities on JFK, basically to the floor and the electrical and communication network. The JFK Quantum Lab settlement is accomplished: the deployment of optical network fibre from the Lab to the JFK Data centre, server installation and mount rack setup. • The team has been evaluating if installing a temperature control system in the JFK lab is required. For this purpose, we have been taking temperature measurements since the beginning of the year. In any case, the vendor specifications state that there are no stringent requirements in terms of temperature control other than an average room temperature. (10 to 30 Degrees in specs). • The team is accomplishing the first experiments on the in-situ quantum link. The experiments include the basic setup of one pair of QKD devices, the “network setup,” and the “Quantum Channel Setup.” • The team has accomplished the preliminary configuration and testing on 3 pairs of QKD devices and presented the testing report in Technical Report 1: Integration and testing results which include the initial device setting in the log file and statistic testing result. • The second training provided by IDQ was presented physically in early November. The next milestone is implementing the Evedropping and provide the testing result. [less ▲] Detailed reference viewed: 81 (18 UL)![]() Biewers, Sandra ![]() ![]() ![]() Report (2022) Detailed reference viewed: 89 (10 UL)![]() Blanco, Braulio ![]() ![]() Report (2022) 4th deliverable SCRIPT Project Detailed reference viewed: 47 (11 UL)![]() Wang, Xin Lin ![]() ![]() ![]() Report (2022) The third deliverable for the SCRIPT Project Detailed reference viewed: 61 (16 UL)![]() Göbel, Sabrina ![]() ![]() ![]() Report (2022) Detailed reference viewed: 69 (5 UL)![]() Francis, Olivier ![]() Report (2022) Detailed reference viewed: 40 (7 UL)![]() Göbel, Sabrina ![]() ![]() ![]() Report (2022) Detailed reference viewed: 96 (3 UL)![]() Francis, Olivier ![]() Report (2022) Detailed reference viewed: 35 (7 UL)![]() Danescu, Elena ![]() ![]() Report (2022) Following its participation in the European Commission call for proposals in 2017, the University of Luxembourg was selected as a partner to run a Europe Direct Information Centre (EDIC) for the period ... [more ▼] Following its participation in the European Commission call for proposals in 2017, the University of Luxembourg was selected as a partner to run a Europe Direct Information Centre (EDIC) for the period 2018-2021. The agreement establishing EDIC University of Luxembourg was signed on 28 March 2019 by Prof. Dr Stéphane Pallage, Rector of the University, and Yuriko Backes, Head of the European Commission Representation in Luxembourg. EDIC University of Luxembourg is geared towards a broad audience, with the aim of informing students, researchers, teachers and the general public about issues related to the European Union’s history and current affairs, as well as reflecting on potential future challenges. 29 Marc 2019 to 30 April 2021, EDIC University of Luxembourg had organized wide range of of lectures, seminars, discussions and exhibitions in cooperation with numerous partners from Luxembourg and worldwide. In the meantime, it had offered a vast variety of information about the history of European integration, the EU institutions, the workings and policies of a united Europe, as well as the place of Luxembourg and its key figures in the European integration history. Based in the Luxembourg Learning Centre (LLC) on Belval Campus, EDIC University of Luxembourg is managed by Dr Elena Danescu, a Research Scientist at the Luxembourg Centre for Contemporary and Digital History (C2DH) - the third interdisciplinary centre of the University of Luxembourg. [less ▲] Detailed reference viewed: 77 (7 UL)![]() Chou, Hung-Pu ![]() Report (2022) BCH codes are being widely used in commercial NAND flash controllers, and the decoding algorithm based on the Berlekamp-Massey (BM) algorithm is a classic solution for solving the key equation used for ... [more ▼] BCH codes are being widely used in commercial NAND flash controllers, and the decoding algorithm based on the Berlekamp-Massey (BM) algorithm is a classic solution for solving the key equation used for error correction. The latency of BM decoding is the bottleneck of the Bose-Chaudhuri Hocquenghem (BCH) decoder when correcting a high number of bit errors. However, the flash memory has an error distribution that degrades with usage: few errors occur in the new memory and a low number of errors occur within a code block. With usage, the system performance degrades and BM decoding needs t iterations in order to correct a larger number t of errors. In an attempt to improve the system performance for high speed applications, early termination of the BM decoding is necessary to overcome this degradation. In this paper, a practical solution for early termination checking for BM algorithm is provided. The analysis of proposed method is presented by means of considering the weight distribution of BCH code and deriving the probability of malfunction as the event of undetectable error. The proposed method is presented to be effective by the numerical results and the probability of malfunction for the proposed method is lower than 10−26. As a result, the FPGA testing on a USB device validate the reliability of the proposed method for applying to a commercial product. [less ▲] Detailed reference viewed: 40 (11 UL)![]() Nienaber, Birte ![]() ![]() ![]() Report (2022) Ad-hoc childcare at the University of Luxembourg is possible! The following document is based on the experiences gained from the planning of a large-scale conference at the Faculty of Humanities ... [more ▼] Ad-hoc childcare at the University of Luxembourg is possible! The following document is based on the experiences gained from the planning of a large-scale conference at the Faculty of Humanities, Education and Social Sciences and can be used as a checklist how to proceed to implement ad-hoc childcare for events at the University of Luxembourg. [less ▲] Detailed reference viewed: 32 (5 UL)![]() Francis, Olivier ![]() Report (2021) Detailed reference viewed: 55 (5 UL)![]() Jahic, Benjamin ![]() ![]() ![]() Report (2021) Neural networks are becoming increasingly part of today’s software systems. These neural networks are simplified models of the human brain that are mainly capable of learning from large datasets to ... [more ▼] Neural networks are becoming increasingly part of today’s software systems. These neural networks are simplified models of the human brain that are mainly capable of learning from large datasets to compute some function based on recognized data. Engineering these datasets and these neural network-based software systems is a complicated and challenging task. Software engineers require methods and tools to engineer these datasets and neural networks for their customers and to satisfy their requirements. In general, they lack methods and tools to support the engineering of dataset and neural networks that satisfy the customer’s requirements. They follow traditional approaches consisting of time-consuming, imprecise and manual activities. Typically, these approaches are not supported by any tool that precisely analyse and specify the neural network’s recognition skills. In our previous work, we have introduced the notion of key-properties for describing the neural network’s recognition skills. In this paper, we define a domain-specific language to support our SEMKIS software engineering methodology for the dataset augmentation to improve network’s key-properties. We present the SEMKIS-DSL for the specification of the key-properties of a neural network. We illustrate the concepts of our DSL with a running example specifying a neural network for recognizing a digital meter counter state. This running example demonstrates a specification of the neural network’s key-properties using the SEMKIS-DSL and a successful improvement of the neural network’s recognition skills. [less ▲] Detailed reference viewed: 199 (18 UL)![]() Blanco, Braulio ![]() ![]() Report (2021) The second deliverable for the Script Project: API Specification Detailed reference viewed: 71 (17 UL)![]() Wang, Xin Lin ![]() ![]() ![]() Report (2021) Detailed reference viewed: 112 (31 UL)![]() ; ; Ma, Qin ![]() Report (2021) Detailed reference viewed: 74 (4 UL)![]() Dehghani, Hamidreza ![]() ![]() Report (2021) Detailed reference viewed: 96 (4 UL)![]() Bandiera, Claudia ![]() ![]() ![]() Report (2021) Detailed reference viewed: 126 (15 UL)![]() Colling, Joanne ![]() ![]() ![]() Report (2021) Detailed reference viewed: 97 (9 UL)![]() Yusifli, Zahra ![]() Report (2021) Detailed reference viewed: 21 (3 UL)![]() Chou, Hung-Pu ![]() Report (2020) Virtual Machines (VM) consolidation is an efficient way towards energy conservation in cloud data centers. The VM consolidation technique is applied to migrate VMs into lesser number of active Physical ... [more ▼] Virtual Machines (VM) consolidation is an efficient way towards energy conservation in cloud data centers. The VM consolidation technique is applied to migrate VMs into lesser number of active Physical Machines (PMs), so that the PMs which have no VMs can be turned into sleep state. VM consolidation technique can reduce energy consumption of cloud data centers because of the energy consumption by the PM which is in sleep state. Because of VMs sharing the underlying physical resources, aggressive consolidation of VMs can lead to performance degradation. Furthermore, an application may encounter an unexpected resources requirement which may lead to increased response times or even failures. Before providing cloud services, cloud providers should sign Service Level Agreements (SLA) with customers. To provide reliable Quality of Service (QoS) for cloud providers is quite important of considering this research topic. To strike a tradeoff between energy and performance, minimizing energy consumption on the premise of meeting SLA is considered. One of the optimization challenges is to decide which VMs to migrate, when to migrate, where to migrate, and when and which servers to turn on/off. To achieve this goal optimally, it is important to predict the future host state accurately and make plan for migration of VMs based on the prediction. For example, if a host will be overloaded at next time unit, some VMs should be migrated from the host to keep the host from overloading, and if a host will be underloaded at next time unit, all VMs should be migrated from the host, so that the host can be turned off to save power. The design goal of the controller is to achieve the balance between server energy consumption and application performance. Because of the heterogeneity of cloud resources and various applications in the cloud environment, the workload on hosts is dynamically changing over time. It is essential to develop accurate workload prediction models for effective resource management and allocation. The disadvantage of VM consolidation process in cloud data centers is that they only concentrate on primitive system characteristics such as CPU utilization, memory and the number of active hosts. When originating their models and approaches as the decisive factors, these characteristics ignore the discrepancy in performance-to-power efficiency between heterogeneous infrastructures. Therefore, this is the reason that leads to unreasonable consolidation which may cause redundant number of VM migrations and energy waste. Advance artificial intelligence such as reinforcement learning can learn a management strategy without prior knowledge, which enables us to design a model-free resource allocation control system. For example, VM consolidation could be predicted by using artificial intelligence rather than based on the current resources utilization usage [less ▲] Detailed reference viewed: 24 (4 UL)![]() Bordas, Stéphane ![]() ![]() ![]() Report (2019) https://www.cambridge.org/core/journals/data-centric-engineering Detailed reference viewed: 149 (9 UL)![]() Francis, Olivier ![]() Report (2019) Detailed reference viewed: 26 (4 UL)![]() ; Kedziora, Slawomir ![]() Report (2019) As the people’s needs develop, so does the technology. Bicycles exist already for a long time, and ever since the appearance of electrically driven ones, the necessity to change their drivetrain and ... [more ▼] As the people’s needs develop, so does the technology. Bicycles exist already for a long time, and ever since the appearance of electrically driven ones, the necessity to change their drivetrain and transmission started getting more important. What makes the development of bicycles even more impressive is the fact that their efficiency ranks first among travelling animals and machines, if we consider the energy consumed by moving a certain distance as a function of body weight. Different bicycle drivetrains are researched and explained in this report, especially CVT hubs. A continuously variable transmission based on a patent of Hiroyuki Urabe has been designed with the CAD method, and their main parts were analysed using the FEA method. The final construction has a theoretical total ratio of 400% and a mass of about 2.7kg (without lubricant). This transmission is using the principles of frictional traction to transfer torque. In general, this work shows how the designing process proceeded and gives an idea, how this type of gearbox could be constructed. [less ▲] Detailed reference viewed: 179 (10 UL)![]() ; ; Capozucca, Alfredo ![]() Report (2019) DevOps processes comply with principles and offer practices with main objective to support efficiently the evolution of IT systems. To be efficient a DevOps process relies on a set of integrated tools ... [more ▼] DevOps processes comply with principles and offer practices with main objective to support efficiently the evolution of IT systems. To be efficient a DevOps process relies on a set of integrated tools. DevOps is among the first competencies together with Agile method required by the industry. As a new approach it is necessary to develop and offer to the academy and to the industry training programs to prepare our engineers in the best possible way. In this chapter we present the main aspects of the educational effort made in the recent years to educate to the concepts and values of the DevOps philosophy. This includes principles, practices, tools and architectures, primarily the microservices architectural style, which shares many aspects of DevOps approaches especially the modularity and flexibility which enables continuous change and delivery. Two experiences have been made, one at academic level as a master program course and the other, as an industrial training. Based on those two experiences, we provide a comparative analysis and some proposals in order to develop and improve DevOps education for the future. [less ▲] Detailed reference viewed: 117 (4 UL)![]() ; ; Capozucca, Alfredo ![]() Report (2019) This paper describes our experience of delivery educational programs in academia and in industry on DevOps, compare the two approaches and sum-up the lessons learnt. We also propose a vision to implement ... [more ▼] This paper describes our experience of delivery educational programs in academia and in industry on DevOps, compare the two approaches and sum-up the lessons learnt. We also propose a vision to implement a shift in the Software Engineering Higher Education curricula. [less ▲] Detailed reference viewed: 145 (11 UL)![]() Francis, Olivier ![]() Report (2018) Detailed reference viewed: 17 (4 UL)![]() Francis, Olivier ![]() Report (2018) Detailed reference viewed: 15 (1 UL)![]() Bartel, Alexandre ![]() ![]() ![]() Report (2018) Detailed reference viewed: 242 (20 UL)![]() Gonzalez Perez, Carlos Alberto ![]() ![]() ![]() Report (2018) Detailed reference viewed: 276 (36 UL)![]() ; Vögele, Claus ![]() Report (2018) The Community- and MHealth-Based Integrated Management of Diabetes in Primary Healthcare in Rwanda: the D²Rwanda Study (which stands for Digital Diabetes Study in Rwanda) is a twin PhD project, developed ... [more ▼] The Community- and MHealth-Based Integrated Management of Diabetes in Primary Healthcare in Rwanda: the D²Rwanda Study (which stands for Digital Diabetes Study in Rwanda) is a twin PhD project, developed in collaboration with Aarhus University (AU) and the University of Luxembourg (UL), and under the auspices of the University of Rwanda and Rwanda Biomedical Centre. The project involves two PhD students, Jean Paul Uwizihiwe (enrolled at AU) and Charilaos Lygidakis (enrolled at UL), and is kindly sponsored by the Karen Elise Jensens Foundation, alongside AU and UL. In this report we wished to narrate what we had been working on for the past two years: from the first steps to understanding better the context and mapping the territory; from obtaining the necessary authorisations to developing the app and translating the questionnaires. [less ▲] Detailed reference viewed: 163 (2 UL)![]() Bouvry, Pascal ![]() ![]() Report (2018) The Proceedings summarizes the 12 lectures that have taken place within the ILIAS Dinstguished Lecture series 2017. It contains a brief abstract of the talks as well as some additional information about ... [more ▼] The Proceedings summarizes the 12 lectures that have taken place within the ILIAS Dinstguished Lecture series 2017. It contains a brief abstract of the talks as well as some additional information about each speaker. [less ▲] Detailed reference viewed: 465 (50 UL)![]() Bordas, Stéphane ![]() ![]() Report (2018) Detailed reference viewed: 2389 (215 UL)![]() Hauseux, Paul ![]() ![]() Report (2018) Detailed reference viewed: 112 (3 UL)![]() Jahic, Benjamin ![]() Report (2018) Today, there is a high demand on intelligent systems (e.g chatbots, ob- ject decetors, translators, etc). Engineers have to develop these systems in a lots of di erent domains (e.g. medicine, nance, car ... [more ▼] Today, there is a high demand on intelligent systems (e.g chatbots, ob- ject decetors, translators, etc). Engineers have to develop these systems in a lots of di erent domains (e.g. medicine, nance, car industry). More- over, these intelligent systems are trained on data collected from these do- mains using an iterative training process. Et each training iteration, the parameters of such system are updated intuitivly based on the engineer's experience. However, gathering and labelling these data is very costly and time consuming. Moreover, the systems are often complex. It is recom- mended to have a strong mathematical background. Thus, engineers often design these systems based on their own experience and collected informa- tion about the system. We present the road towards a novel methodology, called SEMKIS, for the design ang generation of intelligent systems and synthetic learning data. We use the model-driven engineering approach in our methodology to specify and design our systems. We generate speci - cations, designs and implementation of our intelligent systems. We used the mathematical set theory to de ne the concepts for the speci cation of intelligent systems and data synthetis within a formal conceptual frame- work. The concepts have been used in a small executable illustration that focuses on the recognition of handwritten digits on a picture. The results show that our concepts are usable and that we reduce the complexitiy of specifying and designing intelligent systems. [less ▲] Detailed reference viewed: 134 (20 UL)![]() Li, Daoyuan ![]() ![]() ![]() Report (2017) Nowadays, a significant portion of the total energy consumption is attributed to the buildings sector. In order to save energy and protect the environment, energy consumption in buildings must be more ... [more ▼] Nowadays, a significant portion of the total energy consumption is attributed to the buildings sector. In order to save energy and protect the environment, energy consumption in buildings must be more efficient. At the same time, buildings should offer the same (if not more) comfort to their occupants. Consequently, modern buildings have been equipped with various sensors and actuators and interconnected control systems to meet occupants’ requirements. Unfortunately, so far, Building Automation Systems data have not been well-exploited due to technical and cost limitations. Yet, it can be exceptionally beneficial to take full advantage of the data flowing inside buildings in order to diagnose issues, explore solutions and improve occupant-building interactions. This paper presents a plug-and-play and holistic data mining framework named PHoliData for smart buildings to collect, store, visualize and mine useful information and domain knowledge from data in smart buildings. PHoliData allows non technical experts to easily explore and understand their buildings with minimum IT support. An architecture of this framework has been introduced and a prototype has been implemented and tested against real-world settings. Discussions with industry experts have suggested the system to be extremely helpful for understanding buildings, since it can provide hints about energy efficiency improvements. Finally, extensive experiments have demonstrated the feasibility of such a framework in practice and its advantage and potential for buildings operators. [less ▲] Detailed reference viewed: 183 (7 UL)![]() Mai, Xuan Phu ![]() ![]() ![]() Report (2017) Defining and addressing security and privacy requirements in mobile apps is a significant challenge due to the high level of transparency regarding users' (private) information. In this paper, we propose ... [more ▼] Defining and addressing security and privacy requirements in mobile apps is a significant challenge due to the high level of transparency regarding users' (private) information. In this paper, we propose, apply, and assess a modeling method that supports the specification of security and privacy requirements of mobile apps in a structured and analyzable form. Our motivation is that, in many contexts including mobile app development, use cases are common practice for the elicitation and analysis of functional requirements and should also be adapted for describing security requirements. We integrate and adapt an existing approach for modeling security and privacy requirements in terms of security threats, their mitigations, and their relations to use cases in a misuse case diagram. We introduce new security-related templates, i.e., a mitigation template and a misuse case template for specifying mitigation schemes and misuse case specifications in a structured and analyzable manner. Natural language processing can then be used to automatically detect and report inconsistencies among artifacts and between the templates and specifications. Since our approach supports stakeholders in precisely specifying and checking security threats, threat scenarios and their mitigations, it is expected to help with decision making and compliance with standards for improving security. We successfully applied our approach to industrial mobile apps and report lessons learned and results from structured interviews with engineers. [less ▲] Detailed reference viewed: 466 (30 UL)![]() Biryukov, Alex ![]() ![]() ![]() Report (2017) In this paper we describe how to couple reputation systems with distributed consensus protocols to provide high-throughput highly-scalable consensus for large peer-to-peer networks of untrusted validators ... [more ▼] In this paper we describe how to couple reputation systems with distributed consensus protocols to provide high-throughput highly-scalable consensus for large peer-to-peer networks of untrusted validators. We introduce reputation module Guru, which can be laid on top of various consensus protocols such as PBFT or HoneyBadger. It ranks nodes based on the outcomes of consensus rounds run by a small committee, and adaptively selects the committee based on the current reputation. The protocol can also take external reputation ranking as input. Guru can tolerate larger threshold of malicious nodes (up to slightly above 1/2) compared to the 1/3 limit of BFT consensus algorithms. [less ▲] Detailed reference viewed: 558 (31 UL)![]() Limbach-Reich, Arthur ![]() Report (2017) Detailed reference viewed: 142 (10 UL)![]() Francis, Olivier ![]() Report (2017) This report contains the preliminary results of absolute gravity measurements carried out in Haiti in November 2016 at three locations: Port-au-Prince, Jacmel and Fond des Blancs. Detailed reference viewed: 52 (0 UL)![]() Steinmetz, Sara ![]() ![]() ![]() Report (2017) Detailed reference viewed: 266 (48 UL)![]() Joachim, Patrice ![]() ![]() ![]() Report (2017) Detailed reference viewed: 88 (7 UL)![]() Heinen, Andreas ![]() Report (2017) This report is part of a research initiative entitled Mapping Educational Paths of Youth Workers and Gathering Knowledge on Youth Work. Its main objective is to contribute to a better understanding and ... [more ▼] This report is part of a research initiative entitled Mapping Educational Paths of Youth Workers and Gathering Knowledge on Youth Work. Its main objective is to contribute to a better understanding and sharing of information about the education and training of youth workers across Europe and what employment/ career paths it prepares them for. The data collected will be part of a report by the EU-CoE youth partnership. [less ▲] Detailed reference viewed: 114 (5 UL)![]() Paraschivescu, Claudia ![]() Report (2017) The report investigates the daily experiences of mature students at the University of Leeds, UK. Detailed reference viewed: 67 (2 UL)![]() Bordas, Stéphane ![]() Report (2016) Born from a bottom-up initiative of Mathematics, Computer Science, Physics and Computational Engineering, Computational Sciences (CoSc) have contributed to create at UL a positive and symbiotic research ... [more ▼] Born from a bottom-up initiative of Mathematics, Computer Science, Physics and Computational Engineering, Computational Sciences (CoSc) have contributed to create at UL a positive and symbiotic research environment relying on a strong fundamental scientific research core. CoSc will continue to rationalize research efforts across a range of strategic innovation domains by centralizing research and development tools and building upon the existing strengths of the Luxembourgish research and socio-economic landscape. [less ▲] Detailed reference viewed: 121 (4 UL)![]() Paravantis, Spero ![]() Report (2016) Core Junior Web Page Announcement Detailed reference viewed: 59 (2 UL)![]() ; ; Bordas, Stéphane ![]() Report (2016) Detailed reference viewed: 379 (5 UL)![]() ; Kedziora, Slawomir ![]() Report (2016) A goal of the project was done to develop a new good-looking racing rim of a sports car which would be lighter than existing ones. To achieve the goal, lightweight magnesium alloy Mg ZK60-T5 was applied ... [more ▼] A goal of the project was done to develop a new good-looking racing rim of a sports car which would be lighter than existing ones. To achieve the goal, lightweight magnesium alloy Mg ZK60-T5 was applied for the rim, and its preliminary shape was developed employing topology op-timisation. The rim was designed for forging technology; this means that it had to have all manu-facturing features required by that production process. Based on a literature review, loads, boundary conditions and structural requirements were established, which are crucial for a further development process. The initial design was created using the topology optimisation, and then a parametric model was developed using a CAD system. As a next step, the first part of validation was done employing FEA in order to meet strength and stiffness targets; some modifications of the CAD model were imposed. As the last step, the final validation was done employing simply fatigue assessment. The optimisation and FEA were completed using Hyperworks 14/ Inspire 2015 software and the CAD model employing Autodesk Inventor 2015. The results show that the rim design meets theoretically all structural requirements and a good-looking shape was reached. The total mass of 7.9 kg of the designed rim is obtained, which means a reduction about 1.8 kg with the comparison with a reference rim. The 3D model and a technical drawing are completed; this means that the rim can be sent to a production phase. The results of the project also show that the topology optimisation technology provided by Hyperworks and the advanced CAD system can be used to generate competitive designs with any design offices without difficulties. [less ▲] Detailed reference viewed: 332 (18 UL)![]() Dierendonck, Christophe ![]() ![]() ![]() Report (2016) Le projet Accompagnement est une courte recherche de six mois (janvier à juin 2016), financée par le MENJE (Ministère de l’Education nationale, de l’Enfance et de la Jeunesse), et plus précisément par la ... [more ▼] Le projet Accompagnement est une courte recherche de six mois (janvier à juin 2016), financée par le MENJE (Ministère de l’Education nationale, de l’Enfance et de la Jeunesse), et plus précisément par la division du SCRIPT (Service de coordination de la recherche et de l’innovation pédagogiques et technologiques), et conduite par l’Université du Luxembourg. L’étude poursuit quatre objectifs spécifiques : (1) dresser un état des lieux du soutien et de l’accompagnement actuellement proposés au Luxembourg aux écoles fondamentales dans leurs démarches de développement de la qualité scolaire, (2) décrire ce qui est mis en œuvre dans d’autres systèmes scolaires pour poursuivre cet objectif, (3) identifier des éléments intéressants et formuler des perspectives pour, le cas échéant, améliorer le dispositif actuel et (4) examiner l’intérêt et les conditions de réalisation d’études ultérieures en matière d’accompagnement des établissements scolaires au Luxembourg. [less ▲] Detailed reference viewed: 157 (15 UL)![]() Dierendonck, Christophe ![]() ![]() ![]() Report (2016) Le projet Accompagnement est une courte recherche de six mois (janvier à juin 2016), financée par le MENJE (Ministère de l’Education nationale, de l’Enfance et de la Jeunesse), et plus précisément par la ... [more ▼] Le projet Accompagnement est une courte recherche de six mois (janvier à juin 2016), financée par le MENJE (Ministère de l’Education nationale, de l’Enfance et de la Jeunesse), et plus précisément par la division du SCRIPT (Service de coordination de la recherche et de l’innovation pédagogiques et technologiques), et conduite par l’Université du Luxembourg. L’étude poursuit quatre objectifs spécifiques : (1) dresser un état des lieux du soutien et de l’accompagnement actuellement proposés au Luxembourg aux écoles fondamentales dans leurs démarches de développement de la qualité scolaire, (2) décrire ce qui est mis en œuvre dans d’autres systèmes scolaires pour poursuivre cet objectif, (3) identifier des éléments intéressants et formuler des perspectives pour, le cas échéant, améliorer le dispositif actuel et (4) examiner l’intérêt et les conditions de réalisation d’études ultérieures en matière d’accompagnement des établissements scolaires au Luxembourg. [less ▲] Detailed reference viewed: 124 (5 UL)![]() Dierendonck, Christophe ![]() ![]() ![]() Report (2016) Le projet Accompagnement est une courte recherche de six mois (janvier à juin 2016), financée par le MENJE (Ministère de l’Education nationale, de l’Enfance et de la Jeunesse), et plus précisément par la ... [more ▼] Le projet Accompagnement est une courte recherche de six mois (janvier à juin 2016), financée par le MENJE (Ministère de l’Education nationale, de l’Enfance et de la Jeunesse), et plus précisément par la division du SCRIPT (Service de coordination de la recherche et de l’innovation pédagogiques et technologiques), et conduite par l’Université du Luxembourg. L’étude poursuit quatre objectifs spécifiques : (1) dresser un état des lieux du soutien et de l’accompagnement actuellement proposés au Luxembourg aux écoles fondamentales dans leurs démarches de développement de la qualité scolaire, (2) décrire ce qui est mis en œuvre dans d’autres systèmes scolaires pour poursuivre cet objectif, (3) identifier des éléments intéressants et formuler des perspectives pour, le cas échéant, améliorer le dispositif actuel et (4) examiner l’intérêt et les conditions de réalisation d’études ultérieures en matière d’accompagnement des établissements scolaires au Luxembourg. [less ▲] Detailed reference viewed: 109 (5 UL)![]() Dierendonck, Christophe ![]() ![]() ![]() Report (2016) Le projet Accompagnement est une courte recherche de six mois (janvier à juin 2016), financée par le MENJE (Ministère de l’Education nationale, de l’Enfance et de la Jeunesse), et plus précisément par la ... [more ▼] Le projet Accompagnement est une courte recherche de six mois (janvier à juin 2016), financée par le MENJE (Ministère de l’Education nationale, de l’Enfance et de la Jeunesse), et plus précisément par la division du SCRIPT (Service de coordination de la recherche et de l’innovation pédagogiques et technologiques), et conduite par l’Université du Luxembourg. L’étude poursuit quatre objectifs spécifiques : (1) dresser un état des lieux du soutien et de l’accompagnement actuellement proposés au Luxembourg aux écoles fondamentales dans leurs démarches de développement de la qualité scolaire, (2) décrire ce qui est mis en œuvre dans d’autres systèmes scolaires pour poursuivre cet objectif, (3) identifier des éléments intéressants et formuler des perspectives pour, le cas échéant, améliorer le dispositif actuel et (4) examiner l’intérêt et les conditions de réalisation d’études ultérieures en matière d’accompagnement des établissements scolaires au Luxembourg. [less ▲] Detailed reference viewed: 104 (2 UL)![]() Rappel, Hussein ![]() ![]() ![]() Report (2016) Detailed reference viewed: 182 (14 UL)![]() Li, Li ![]() ![]() ![]() Report (2016) Context: Static analysis approaches have been proposed to assess the security of Android apps, by searching for known vulnerabilities or actual malicious code. The literature thus has proposed a large ... [more ▼] Context: Static analysis approaches have been proposed to assess the security of Android apps, by searching for known vulnerabilities or actual malicious code. The literature thus has proposed a large body of works, each of which attempts to tackle one or more of the several challenges that program analyzers face when dealing with Android apps. Objective: We aim to provide a clear view of the state-of-the-art works that statically analyze Android apps, from which we highlight the trends of static analysis approaches, pinpoint where the focus has been put and enumerate the key aspects where future researches are still needed. Method: We have performed a systematic literature review which involves studying around 90 research papers published in software engineering, programming languages and security venues. This review is performed mainly in five dimensions: problems targeted by the approach, fundamental techniques used by authors, static analysis sensitivities considered, android characteristics taken into account and the scale of evaluation performed. Results: Our in-depth examination have led to several key findings: 1) Static analysis is largely performed to uncover security and privacy issues; 2) The Soot framework and the Jimple intermediate representation are the most adopted basic support tool and format, respectively; 3) Taint analysis remains the most applied technique in research approaches; 4) Most approaches support several analysis sensitivities, but very few approaches consider path-sensitivity; 5) There is no single work that has been proposed to tackle all challenges of static analysis that are related to Android programming; and 6) Only a small portion of state-of-the-art works have made their artifacts publicly available. Conclusion: The research community is still facing a number of challenges for building approaches that are aware altogether of implicit-Flows, dynamic code loading features, reflective calls, native code and multi-threading, in order to implement sound and highly precise static analyzers. [less ▲] Detailed reference viewed: 1166 (30 UL)![]() Li, Li ![]() ![]() ![]() Report (2016) Detailed reference viewed: 308 (20 UL)![]() Ben Fadhel, Ameni ![]() ![]() ![]() Report (2016) A role-based access control (RBAC) policy restricts a user to perform operations based on her role within an organization. Several RBAC models have been proposed to represent different types of RBAC ... [more ▼] A role-based access control (RBAC) policy restricts a user to perform operations based on her role within an organization. Several RBAC models have been proposed to represent different types of RBAC policies. However, the expressiveness of these models has not been matched by specification languages for RBAC policies. Indeed, existing policy specification languages do not support all the types of RBAC policies defined in the literature. In this paper we aim to bridge the gap between highly-expressive RBAC models and policy specification languages, by presenting GemRBAC-DSL, a new specification language designed on top of an existing, generalized conceptual model for RBAC. The language sports a syntax close to natural language, to encourage its adoption among practitioners. We also define semantic checks to detect conflicts and inconsistencies among the policies written in a GemRBAC-DSL specification. We show how the semantics of GemRBAC-DSL can be expressed in terms of an existing formalization of RBAC policies as OCL (Object Constraint Language) constraints on the corresponding RBAC conceptual model. This formalization paves the way to define a model-driven approach for the enforcement of policies written in GemRBAC-DSL. [less ▲] Detailed reference viewed: 283 (24 UL)![]() ; ; et al Report (2016) Detailed reference viewed: 449 (20 UL)![]() Altmeyer, Sebastian ![]() ![]() ![]() Report (2016) Selecting the right scheduling policy is a crucial issue in the development of an embedded real-time application. Whereas scheduling policies are typically judged according to their ability to schedule ... [more ▼] Selecting the right scheduling policy is a crucial issue in the development of an embedded real-time application. Whereas scheduling policies are typically judged according to their ability to schedule task sets at a high processor utilizations, other concerns, such as predictability and simplicity are often overlooked.In this paper, we argue that FIFO scheduling with offsets is a suitable choice when these concerns play a key role. To this end, we examine the predictability of FIFO, present a schedulability analysis for it and evaluate both, performance and predictability of FIFO scheduling with and without offsets. Our results show that FIFO with offsets exhibits competitive performance for task with regular periods, at an unmatched predictability. [less ▲] Detailed reference viewed: 617 (72 UL)![]() Bordas, Stéphane ![]() Report (2016) Detailed reference viewed: 515 (12 UL)![]() Ambrossio, Diego Agustin ![]() ![]() ![]() Report (2016) From any two conditional obligations “X if A” and “Y if B”, cumulative aggregation derives the combined obligation “X ∪ Y if A ∪ (B \ X)”, whereas simple aggregation derives the obligation “X ∪ Y if A ∪ ... [more ▼] From any two conditional obligations “X if A” and “Y if B”, cumulative aggregation derives the combined obligation “X ∪ Y if A ∪ (B \ X)”, whereas simple aggregation derives the obligation “X ∪ Y if A ∪ B”. We propose FC systems consisting of cumulative aggregation together with factual detachment, and we give a representation result for FC systems, as well as for FA systems consisting of simple aggregation together with factual detachment. We relate FC and FA systems to each other and to input/output logics recently introduced by Parent and van der Torre. [less ▲] Detailed reference viewed: 217 (43 UL)![]() Bourantas, Georgios ![]() ![]() Report (2016) Detailed reference viewed: 208 (4 UL)![]() Dierendonck, Christophe ![]() ![]() ![]() Report (2015) Detailed reference viewed: 84 (12 UL)![]() Dierendonck, Christophe ![]() ![]() ![]() Report (2015) Detailed reference viewed: 96 (17 UL)![]() Navet, Nicolas ![]() Report (2015) We introduce a novel Model-Driven Development (MDD) flow which aims at more simplicity, more intuitive programming, quicker turnaround time and real-time predictability by leveraging the use of model ... [more ▼] We introduce a novel Model-Driven Development (MDD) flow which aims at more simplicity, more intuitive programming, quicker turnaround time and real-time predictability by leveraging the use of model-interpretation and providing the language abstractions needed to argue about the timing correctness on a high-level. The MDD flow is built around a language called Cyber-Physical Action Language (CPAL). CPAL serves to describe both the functional behaviour of activities (i.e., the code of the function itself) as well as the functional architecture of the system (i.e., the set of functions, how they are activated, and the data flows among the functions). CPAL is meant to support two use-cases. Firstly, CPAL is a development and design space exploration environment for CPS with main features being the formal description, the editing, graphical representation and simulation of CPS models. Secondly, CPAL is a real-time execution platform. The vision behind CPAL is that a model is executed and verified in simulation mode on a workstation and the same model can be later run on an embedded board with a timing-equivalent run-time time behaviour. [less ▲] Detailed reference viewed: 173 (7 UL)![]() ; ; et al Report (2015) The isogeometric boundary element method (IGABEM) based on NURBS is adopted to model fracture problem in 3D. The NURBS basis functions are used in both crack representation and physical quantity ... [more ▼] The isogeometric boundary element method (IGABEM) based on NURBS is adopted to model fracture problem in 3D. The NURBS basis functions are used in both crack representation and physical quantity approximation. A stable quadrature scheme for singular integration is proposed to enhance the robustness of the method in dealing with highly distorted element. The convergence study in crack opening displacement is performed for penny-shaped crack and elliptical crack. Two ways to extract stress intensity factors (SIFs), the contour $M$ integral and virtual crack closure integral, are implemented based on the framework of dual integral equations. An algorithm is outlined and validated to be stable for fatigue crack growth, thanks to the smoothness not only in crack geometry but also in stress/SIFs solution brought by IGABEM. [less ▲] Detailed reference viewed: 560 (14 UL)![]() Pausch, Marie-Pierre ![]() ![]() ![]() Report (2015) Detailed reference viewed: 215 (73 UL)![]() Bissyande, Tegawendé François D Assise ![]() Report (2015) In software development, fixing bugs is an im- portant task that is time consuming and cost-sensitive. While many approaches have been proposed to automatically detect and patch software code, the ... [more ▼] In software development, fixing bugs is an im- portant task that is time consuming and cost-sensitive. While many approaches have been proposed to automatically detect and patch software code, the strategies are limited to a set of identified bugs that were thoroughly studied to define their properties. They thus manage to cover a niche of faults such as infinite loops. We build on the assumption that bugs, and the associated user bug reports, are repetitive and propose a new approach of fix recommendations based on the history of bugs and their associated fixes. In our approach, once a bug is reported, it is automatically compared to all previously fixed bugs using information retrieval techniques and machine learning classification. Based on this comparison, we recommend top-k fix actions, identified from past fix examples, that may be suitable as hints for software developers to address the new bug [less ▲] Detailed reference viewed: 85 (6 UL)![]() Pigeron-Piroth, Isabelle ![]() ![]() Report (2015) Cette étude propose une analyse des demandes linguistiques dans les offres d’emploi au Luxembourg dans deux médias différents : 1) À partir d’un échantillon d’offres du Luxemburger Wort portant sur la ... [more ▼] Cette étude propose une analyse des demandes linguistiques dans les offres d’emploi au Luxembourg dans deux médias différents : 1) À partir d’un échantillon d’offres du Luxemburger Wort portant sur la période 1984-2014, elle décrit l’évolution des compétences linguistiques exigées ou souhaitées sur le marché du travail du Luxembourg. 2) Pour tenir compte de l’importance croissante des recrutements en ligne, une deuxième étude porte sur un corpus d’offres publiées sur le site Internet Jobs.lu. La prise en compte de ces deux sources permet de montrer une segmentation linguistique entre les différentes branches d’activité et une augmentation des demandes langagières explicites au fil des 30 dernières années. [less ▲] Detailed reference viewed: 951 (141 UL)![]() Li, Li ![]() ![]() ![]() Report (2015) We discuss the capability of a new feature set for malware detection based on potential component leaks (PCLs). PCLs are defined as sensitive data-flows that involve Android inter-component communications ... [more ▼] We discuss the capability of a new feature set for malware detection based on potential component leaks (PCLs). PCLs are defined as sensitive data-flows that involve Android inter-component communications. We show that PCLs are common in Android apps and that malicious applications indeed manipulate significantly more PCLs than benign apps. Then, we evaluate a machine learning-based approach relying on PCLs. Experimental validation show high performance with 95% precision for identifying malware, demonstrating that PCLs can be used for discriminating malicious apps from benign apps. By further investigating the generalization ability of this feature set, we highlight an issue often overlooked in the Android malware detection community: Qualitative aspects of training datasets have a strong impact on a malware detector’s performance. Furthermore, this impact cannot be overcome by simply increasing the Quantity of training material. [less ▲] Detailed reference viewed: 251 (2 UL)![]() Nguyen, Phu Hong ![]() Report (2015) Model-Driven Security (MDS) for secure systems development still has limitations to be more applicable in practice. A recent systematic review of MDS shows that current MDS approaches have not dealt with ... [more ▼] Model-Driven Security (MDS) for secure systems development still has limitations to be more applicable in practice. A recent systematic review of MDS shows that current MDS approaches have not dealt with multiple security concerns system- atically. Besides, catalogs of security patterns which can address multiple security concerns have not been applied efficiently. This paper presents an MDS approach based on a unified System of Security design Patterns (SoSPa). In SoSPa, security design patterns are collected, specified as reusable aspect models to form a coherent system of them that guides developers in systematically addressing multiple security concerns. SoSPa consists of not only interrelated security design patterns but also a refinement process towards their application. We applied SoSPa to design the security of crisis management systems. The result shows that multiple security concerns in the case study have been addressed by systematically integrating different security solutions. [less ▲] Detailed reference viewed: 217 (15 UL)![]() Nguyen, Phu Hong ![]() Report (2015) Context: Model-Driven Security (MDS) is as a specialised Model-Driven Engineering research area for supporting the development of secure systems. Over a decade of research on MDS has resulted in a large ... [more ▼] Context: Model-Driven Security (MDS) is as a specialised Model-Driven Engineering research area for supporting the development of secure systems. Over a decade of research on MDS has resulted in a large number of publications. Objective: To provide a detailed analysis of the state of the art in MDS, a systematic literature review (SLR) is essential. Method: We conducted an extensive SLR on MDS. Derived from our research questions, we designed a rigorous, extensive search and selection process to identify a set of primary MDS studies that is as complete as possible. Our three-pronged search process consists of automatic searching, manual searching, and snowballing. After discovering and considering more than thousand relevant papers, we identified, strictly selected, and reviewed 108 MDS publications. Results: The results of our SLR show the overall status of the key artefacts of MDS, and the identified primary MDS studies. E.g. regarding security modelling artefact, we found that developing domain-specific languages plays a key role in many MDS approaches. The current limitations in each MDS artefact are pointed out and corresponding potential research directions are suggested. Moreover, we categorise the identified primary MDS studies into 5 principal MDS studies, and other emerging or less common MDS studies. Finally, some trend analyses of MDS research are given. Conclusion: Our results suggest the need for addressing multiple security concerns more systematically and simultaneously, for tool chains supporting the MDS development cycle, and for more empirical studies on the application of MDS methodologies. To the best of our knowledge, this SLR is the first in the field of Software Engineering that combines a snowballing strategy with database searching. This combination has delivered an extensive literature study on MDS. [less ▲] Detailed reference viewed: 147 (7 UL)![]() Bordas, Stéphane ![]() Report (2015) This is the report of the Computational Mechanics Lab led by Prof. Stéphane Bordas Detailed reference viewed: 2558 (215 UL)![]() ; ; et al Report (2015) This project created and analyzed a new, large global dataset on scientific journal articles, published between 1900 and 2011, and a series of case studies to examine how systems of higher education ... [more ▼] This project created and analyzed a new, large global dataset on scientific journal articles, published between 1900 and 2011, and a series of case studies to examine how systems of higher education developed and grew nations’ capacity for scientific research. The analysis resulted in a series of new insights about global scientific production that were only possible with a consideration of long-term trends. First, despite predictions as early as the 1960s that the growth rate of “big science” would slow, the dataset shows in fact that “big science” started a phase of exponential growth in the early 1960s that has continued unabated for decades. “Big science” has transformed into “mega-global science” and the trends of global diffusion and regional differentiation began much earlier in the 20th century than is commonly understood. Second, the analysis of rates of regional journal article production also depicts clear shifts in the competition for ascendancy in scientific production. For the first half of the 20th century, global competition for scientific impact was primarily an Atlantic battle between the top producers of Europe (Germany, France, and the U.K.) and the United States. The locus of competition shifted by the, end of the 20th century to a contest between the current research “superpower, ” the United States, and the fast-growing producer, China, along with the many less populous countries of Western Europe with their highly productive science systems. With the contributions of other East Asian, high volume producers such as Japan and South Korea in the later decades of the 20th century, and simultaneous slowing of research production in U.S. science, the center of gravity for research production has been pulled eastward for the past two decades. Third, while science may indeed be an inherently global and collaborative enterprise, the trend toward global collaboration of authors is a relatively recent one. Historically, one-third of all research articles worldwide result from international collaboration, and less than 26 percent are the product of one researcher alone. In 1980 however only about 2 percent of all SCIE publications involved a collaboration across international lines. Three decades later this proportion is eleven times what it was in 1980. Finally, the study also concluded that overall volume of production is not a sufficient measure of scientific capacity by itself. When adjusting for the size of population and the economy the proportion of GDP spent on R&D or the number of researchers some smaller countries (especially in Europe) are more productive on a per capita basis than mid-sized or even larger ones. Similarly the ratio of investment in science to scientific production is much higher in the high volume producers than it is in some small states. While output is smaller in these states, they have maximized R&D investments more efficiently than their larger competitors. [less ▲] Detailed reference viewed: 449 (24 UL)![]() ; Bordas, Stéphane ![]() Report (2015) Detailed reference viewed: 159 (11 UL)![]() Boll, Thomas ![]() ![]() Report (2015) Detailed reference viewed: 83 (7 UL)![]() Greiff, Samuel ![]() ![]() ![]() Report (2015) Detailed reference viewed: 103 (3 UL)![]() Ben Fadhel, Ameni ![]() ![]() ![]() Report (2014) Prohibiting unauthorized access to critical resources and data has become a major requirement for enterprises. Access control (AC) mechanisms manage requests from users to access system resources; the ... [more ▼] Prohibiting unauthorized access to critical resources and data has become a major requirement for enterprises. Access control (AC) mechanisms manage requests from users to access system resources; the access is granted or denied based on authorization policies defined within the enterprise. One of the most used AC paradigms is role-based access control (RBAC). In RBAC, access rights are determined based on the user's role, e.g., her job or function in the enterprise. Many different types of RBAC authorization policies have been proposed in the literature, each one accompanied by the corresponding extension of the original RBAC model. However, there is no unified framework that can be used to define all these types of RBAC policies in a coherent way, using a common model. Moreover, these types of policies and their corresponding models are scattered across multiple sources and sometimes the concepts are expressed ambiguously. This situation makes it difficult for researchers to understand the state of the art in a coherent manner; furthermore, practitioners may experience severe difficulties when selecting the relevant types of policies to be implemented in their systems based on the available information. There is clearly a need for organizing the various types of RBAC policies systematically, based on a unified framework, and to formalize them to enable their operationalization. In this paper we propose a model-driven engineering (MDE) approach, based on UML and the Object Constraint Language (OCL), to enable the precise specification and verification of such policies. More specifically, we first present a taxonomy of the various types of RBAC authorization policies proposed in the literature. We also propose the GemRBAC model, a generalized model for RBAC that includes all the entities required to define the classified policies. This model is a conceptual model that can also serve as data model to operationalize data collection and verification. Lastly, we formalize the classified RBAC policies as OCL constraints on the GemRBAC model. To facilitate such operationalization, we make publicly available online the ECore version of the GemRBAC model and the OCL constraints corresponding to the classified RBAC policies. [less ▲] Detailed reference viewed: 871 (178 UL)![]() Kirsch, Claudine ![]() ![]() Report (2014) Detailed reference viewed: 105 (2 UL)![]() ; Bordas, Stéphane ![]() Report (2014) Detailed reference viewed: 130 (4 UL)![]() ; ; Bordas, Stéphane ![]() Report (2014) A lack of separation of scales is the major hurdle hampering predictive and computationally tractable simulations of fracture over multiple scales. In this thesis an adaptive multiscale method is ... [more ▼] A lack of separation of scales is the major hurdle hampering predictive and computationally tractable simulations of fracture over multiple scales. In this thesis an adaptive multiscale method is presented in an attempt to address this challenge. This method is set in the context of FE2 Feyel and Chaboche [2000] for which computational homogenisation breaks down upon loss of material stability (softening). The lack of scale separation due to the coalescence of microscopic cracks in a certain zone is tackled by a full discretisation of the microstructure in this zone. Polycrystalline materials are considered with cohesive cracks along the grain boundaries as a model problem. Adaptive mesh re nement of the coarse region and adaptive initiation and growth of fully resolved regions are performed based on discretisation error and homogenisation error criteria, respectively. In order to follow sharp snap-backs in load-displacement paths, a local arc-length technique is developed for the adaptive multiscale method. The results are validated against direct numerical simulation [less ▲] Detailed reference viewed: 124 (1 UL)![]() Hermann, Frank ![]() ![]() ![]() Report (2014) Software translation is a challenging task. Several requirements are important - including automation of the execution, maintainability of the translation patterns, and, most importantly, reliability ... [more ▼] Software translation is a challenging task. Several requirements are important - including automation of the execution, maintainability of the translation patterns, and, most importantly, reliability concerning the correctness of the translation. Triple graph grammars (TGGs) have shown to be an intuitive, wellde ned technique for model translation. In this paper, we leverage TGGs for industry scale software translations. The approach is implemented using the Eclipse-based graph transformation tool Henshin and has been successfully applied in a large industrial project with the satellite operator SES on the translation of satellite control procedures. We evaluate the approach regarding requirements from the project and performance on a complete set of procedures of one satellite. [less ▲] Detailed reference viewed: 317 (49 UL)![]() Li, Li ![]() ![]() ![]() Report (2014) We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform data-flow analysis on Android applications to find potential component leaks (e.g., another component ... [more ▼] We present PCLeaks, a tool based on inter- component communication (ICC) vulnerabilities to perform data-flow analysis on Android applications to find potential component leaks (e.g., another component can potentially exploit the leak). To evaluate our approach, we run PCLeaks on 2000 apps, randomly selected from Google Play store. PCLeaks reports 986 potential component leaks in 185 apps. For each leak reported by PCLeaks, PCLeaksValidator automatically generates an Android app which tries to exploit the leak. By manually running a subset of the generated apps, we find that 75% of the reported leaks are exploitable leaks. [less ▲] Detailed reference viewed: 451 (31 UL)![]() ; ; et al Report (2014) Detailed reference viewed: 156 (5 UL)![]() Li, Li ![]() ![]() ![]() Report (2014) Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-component data-flow analysis to detect privacy leaks between components of Android applications. Unlike ... [more ▼] Android applications may leak privacy data carelessly or maliciously. In this work we perform inter-component data-flow analysis to detect privacy leaks between components of Android applications. Unlike all current approaches, our tool, called IccTA, propagates the context between the components, which improves the precision of the analysis. IccTA outperforms all other available tools by reaching a precision of 95.0% and a recall of 82.6% on DroidBench. Our approach detects 147 inter-component based privacy leaks in 14 applications in a set of 3000 real-world applications with a precision of 88.4%. With the help of ApkCombiner, our approach is able to detect inter-app based privacy leaks. [less ▲] Detailed reference viewed: 269 (23 UL)![]() Briand, Lionel ![]() Report (2014) Detailed reference viewed: 3277 (43 UL)![]() Dou, Wei ![]() ![]() ![]() Report (2014) Offline trace checking is a procedure for evaluating requirements over a log of events produced by a system. The goal of this paper is to present a practical and scalable solution for the offline checking ... [more ▼] Offline trace checking is a procedure for evaluating requirements over a log of events produced by a system. The goal of this paper is to present a practical and scalable solution for the offline checking of the temporal requirements of a system, which can be used in contexts where model-driven engineering is already a practice, where temporal specifications should be written in a domain-specific language not requiring a strong mathematical background, and where relying on standards and industry-strength tools for property checking is a fundamental prerequisite. The main contributions are: the TemPsy language, a domain-specific specification language based on common property specification patterns, and extended with new constructs; a model-driven offline trace checking procedure based on the mapping of requirements written in TemPsy into OCL (Object Constraint Language) constraints on a conceptual model on execution traces, which can be evaluated using an OCL checker; the implementation of this trace checking procedure in the TemPsy-Check tool; the evaluation of the scalability of TemPsy-Check and its comparison to a state-of-the-art alternative technology. The proposed approach has been applied to a case study developed in collaboration with a public service organization, active in the domain of business process modeling for eGovernment. [less ▲] Detailed reference viewed: 582 (129 UL)![]() ; Bordas, Stéphane ![]() Report (2014) Detailed reference viewed: 278 (18 UL)![]() Schommer, Christoph ![]() Report (2014) This booklet is a collection of project reports written by graduate students, who have participated the course "Machine Learning" in Winter Term 2013/14. Here, we have concerned Financial News Documents ... [more ▼] This booklet is a collection of project reports written by graduate students, who have participated the course "Machine Learning" in Winter Term 2013/14. Here, we have concerned Financial News Documents regarding the Irish Financial Crisis in the years of 2009 - 2013. We have studied different forms of sentiments, for example with StoryTakes, Alerts, Headlines, authors, and others. [less ▲] Detailed reference viewed: 163 (13 UL)![]() Plugaru, Valentin ![]() ![]() ![]() Report (2014) The increasing demand for High Performance Computing (HPC) paired with the higher power requirements of the ever-faster systems has led to the search for both performant and more energy-efficient ... [more ▼] The increasing demand for High Performance Computing (HPC) paired with the higher power requirements of the ever-faster systems has led to the search for both performant and more energy-efficient architectures. This article compares and contrasts the performance and energy efficiency of two modern, traditional Intel Xeon and low power ARM-based clusters, which are tested with the recently developed High Performance Conjugate Gradient (HPCG) benchmark and the ABySS, FASTA and MrBayes bioinformatics applications. We show a higher Performance per Watt valuation of the ARM cluster, and lower energy usage during the tests, which does not offset the much faster job completion rate obtained by the Intel cluster, making the latter more suitable for the considered workloads given the disparity in the performance results. [less ▲] Detailed reference viewed: 212 (23 UL)![]() Frank, Raphaël ![]() ![]() Report (2014) Detailed reference viewed: 181 (10 UL)![]() Dou, Wei ![]() ![]() ![]() Report (2014) Modern enterprise information systems often require to specify their functional and non-functional (e.g., Quality of Service) requirements using expressions that contain temporal constraints ... [more ▼] Modern enterprise information systems often require to specify their functional and non-functional (e.g., Quality of Service) requirements using expressions that contain temporal constraints. Specification approaches based on temporal logics demand a certain knowledge of mathematical logic, which is difficult to find among practitioners; moreover, tool support for temporal logics is limited. On the other hand, a standard language such as the Object Constraint Language (OCL), which benefits from the availability of several industrial-strength tools, does not support temporal expressions. In this paper we propose OCLR, an extension of OCL with support for temporal constraints based on well-known property specification patterns. With respect to previous extensions, we add support for referring to a specific occurrence of an event as well as for indicating a time distance between events and/or scope boundaries. The proposed extension defines a new syntax, very close to natural language, paving the way for a rapid adoption by practitioners. We show the application of the language in a case study in the domain of eGovernment, developed in collaboration with a public service partner. [less ▲] Detailed reference viewed: 416 (88 UL)![]() ; ; et al Report (2014) Detailed reference viewed: 248 (12 UL)![]() Limbach-Reich, Arthur ![]() Report (2014) Detailed reference viewed: 61 (5 UL)![]() Schmitz, Anett ![]() Report (2014) Detailed reference viewed: 43 (1 UL)![]() Gammaitoni, Loïc ![]() ![]() Report (2014) The Alloy language was developed as a lightweight modelling language that allows fully automatic analysis of software design models via SAT solving. The practical application of this type of analysis is ... [more ▼] The Alloy language was developed as a lightweight modelling language that allows fully automatic analysis of software design models via SAT solving. The practical application of this type of analysis is hampered by two limitations: first, the analysis itself can become quite time consuming when the scopes become even moderately large; second, determining minimal scopes for the entity types (limiting the number of entities of each type) to achieve better running times is itself a non-trivial problem. In this paper we show that for the special case of Alloy modules specifying transformations we may be able to circumvent these limitations. We define the corresponding notion of functional module and define precise conditions under which such functional modules can be efficiently interpreted rather than analysed via SAT solving and we also explain how interpretation of functional Alloy modules can be seamlessly integrated with the SAT-based analysis of other modules. We provide evidence that for complex transformations interpreting functional modules may result in significant time savings. [less ▲] Detailed reference viewed: 184 (48 UL) |
||