Page d'accueil // SnT // Publications

Publications

In press

Appelt, D., Panichella, A., & Briand, L. (in press). Automatically Repairing Web Application Firewalls Based on Successful SQL Injection Attacks. The 28th IEEE International Symposium on Software Reliability Engineering (ISSRE). IEEE.
Arora, C., Sabetzadeh, M., Briand, L., & Zimmer, F. (in press). Automated Extraction and Clustering of Requirements Glossary Terms. IEEE Transactions on Software Engineering.
Bezzaoucha, S., Voos, H., & Darouach, M. (in press). Chapter 4:A Survey on The Polytopic Takagi-Sugeno Approach: Application to the Inverted Pendulum. The Inverted Pendulum: From Theory to New Innovations in Control and Robotics. The Institution of Engineering and Technology IET-publishing.
Bianculli, D., & Krstic, S. (in press). On the Risk of Tool Over-tuning in Runtime Verification Competitions. Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools.
Briand, L., Bianculli, D., Nejati, S., Pastore, F., & Sabetzadeh, M. (in press). The Case for Context-Driven Software Engineering Research. IEEE Software.
Dou, W., Bianculli, D., & Briand, L. (in press). TemPsy-Check: a Tool for Model-driven Trace Checking of Pattern-based Temporal Properties. Proceedings of RV-CUBES 2017: an International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools.
Emara, K. A. A. E.-S. (in press). Safety-aware Location Privacy in VANET: Evaluation and Comparison. IEEE Transactions on Vehicular Technology.
Garousi, V., Afzal, W., Çağlar, A., Işık, İ. B., Baydan, B., Çaylak, S., Boyraz, A. Z., Yolaçan, B., & Herkiloğlu, K. (in press). Comparing automated visual GUI testing tools: an industrial case study. Proceedings of International Workshop on Automated Software Testing (A-TEST).
Garousi, V., Felderer, M., Karapıçak, Ç. M., & Yılmaz, U. (in press). What we know about testing embedded software. IEEE Software.
Garousi, V., & Yıldırım, E. (in press). Introducing automated GUI testing and observing its benefits: an industrial case study in the context of law-practice management software. Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM).
Hajri, I., Göknil, A., Briand, L., & Stephany, T. (in press). Configuring use case models in product families. Software & Systems Modeling.
Joroughi, V. (in press). Joint Precoding and On-Board Beamforming for Multiple gateway Multibeam Satellite Systems. Submitted to IEEE Journal on Selected topic in Communication (JSAC).
McKay, B., Schweitzer, P., & Schweitzer, P. (in press). Competition Numbers, Quasi-Line Graphs and Holes. SIAM Journal on Discrete Mathematics.
Mengali, A., Shankar, B., & Ottersten, B. (in press). Exploring Different Receiver Structures for Radio over FSO Systems with Signal Dependent Noise. Proceedings of Globecom 2017.
Özkan, R., Garousi, V., & Betin-Can, A. (in press). Multi-objective regression test selection in practice: an empirical study in the defense software industry. Proceedings of ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM).
Palomba, F., Panichella, A., Zaidman, A., Oliveto, R., & De Lucia, A. (in press). The Scent of a Smell: An Extensive Comparison between Textual and Structural Smells. IEEE Transactions on Software Engineering.
Panichella, A., Kifetew, F., & Tonella, P. (in press). Automated Test Case Generation as a Many-Objective Optimisation Problem with Dynamic Selection of the Targets. IEEE Transactions on Software Engineering.
Pierina Brustolin Spagnuelo, D., Bartolini, C., & Lenzini, G. (in press). Modelling Metrics for Transparency in Medical Systems. Proceedings of TrustBus 2017.
Platbrood, L., Capitanescu, F., Merckx, C., Crisciu, H., & Wehenkel, L. (in press). A Generic Approach for Solving Nonlinear-Discrete Security-Constrained Optimal Power Flow Problems in Large-Scale Systems. IEEE Transactions on Power Systems.
Rosich, A., Sarrate, R., & Nejjari, F. (in press). On-line model-based fault detection and isolation for PEM fuel cell stack systems. Applied Mathematical Modelling.
Smyth, M., Benyon, D., McCall, R., O'Neill, S., & Carroll, F. (in press). Patterns of Place: An Integrated Approach for the Design and Evaluation of Real and Virtual Environments. In M., Lombard, J., Freeman, W., Ijesslsteijn, & J., Schwaevitz (Eds.), Immersed in Media: Presence Theory, Measurement and Technology (1). London, UK: Springer.
Soltana, G., Sannier, N., Sabetzadeh, M., & Briand, L. (in press). Model-Based Simulation of Legal Policies: Framework, Tool Support, and Validation. Software & Systems Modeling.
Thome, J., Shar, L. K., Bianculli, D., & Briand, L. (in press). Security Slicing for Auditing Common Injection Vulnerabilities. The Journal of Systems & Software.
Tsinos, C., Maleki, S., Chatzinotas, S., & Ottersten, B. (in press). Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems. Hybrid Analog-Digital Transceiver Designs for Cognitive Radio Millimiter Wave Systems.
Wagle, S. S., Guzek, M., & Bouvry, P. (in press). Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers. Service Performance Pattern Analysis and Prediction of Commercially Available Cloud Providers (pp. 8).
Wagle, S. S., Guzek, M., Bouvry, P., & Bisdorff, R. (in press). Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers. Comparisons of Heat Map and IFL Technique to Evaluate the Performance of Commercially Available Cloud Providers.

2017

You, L., Lei, L., Yuan, D., Sun, S., Chatzinotas, S., & Ottersten, B. (2017). A Framework for Optimizing Multi-cell NOMA: Delivering Demand with Less Resource. 2017 IEEE Global Communications Conference (GLOBECOM).
Bronzi, W., Faye, S., Frank, R., & Engel, T. (2017, October). Characterizing Driving Environments Through Bluetooth Discovery. Paper presented at The 8th International Conference on ICT Convergence - ICTC 2017.
Derrmann, T., Frank, R., Viti, F., & Engel, T. (2017). Estimating Urban Road Traffic States Using Mobile Network Signaling Data. In T., Derrmann, R., Frank, F., Viti, & T., Engel, Estimating Urban Road Traffic States Using Mobile Network Signaling Data.
Gautam, S., Lagunas, E., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2017). Relay Selection Strategies for SWIPT-Enabled Cooperative Wireless Systems. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, Oct. 2017.
Mengali, A., Lyras, N. K., Shankar, B., Kourogiorgas, C. I., Panagopoulos, A. D., & Liolis, K. (2017). Optical Feeder Links Study towards Future Generation MEO VHTS Systems. Proceedings of the 35th AIAA International Communications Satellite Systems Conference (ICSSC).
Shin, S. Y. (2017). Specification and Analysis of Resource Utilization Policies for Human-Intensive Systems (Extended Abstract). Proceedings of the BPM Demo Track and BPM Dissertation Award co-located with 15th International Conference on Business Process Management (BPM 2017). CEUR-WS.org.
Panichella, A., Kifetew, F., & Tonella, P. (2017). LIPS vs MOSA: a Replicated Em- pirical Study on Automated Test Case Generation. International Symposium on Search Based Software Engineering (SSBSE) 2017. Springer.
Dou, W., Bianculli, D., & Briand, L. (2017). A Model-Driven Approach to Trace Checking of Pattern-based Temporal Properties. Proceedings of the ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017 ).
Glauner, P., Meira, J. A., State, R., & Mano, R. (2017, September). Introduction to Detection of Non-Technical Losses using Data Analytics. Paper presented at 7th IEEE Conference on Innovative Smart Grid Technologies, Europe (ISGT Europe 2017), Torino, Italy.
Glauner, P., Migliosi, A., Meira, J. A., Valtchev, P., State, R., & Bettinger, F. (2017). Is Big Data Sufficient for a Reliable Detection of Non-Technical Losses? Proceedings of the 19th International Conference on Intelligent System Applications to Power Systems (ISAP 2017).
Li, L. (2017). Mining AndroZoo: A Retrospect. The International Conference on Software Maintenance and Evolution (ICSME).
Sannier, N., Adedjouma, M., Sabetzadeh, M., & Briand, L. (2017). Legal Markup Generation in the Large: An Experience Report. the 25th International Requirements Engineering Conference (RE'17), Lisbon, 4-8 September 2017.
Thome, J., Shar, L. K., Bianculli, D., & Briand, L. (2017). JoanAudit: A Tool for Auditing Common Injection Vulnerabilities. 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. ACM.
Jan, S. (2017). Automated and Effective Security Testing for XML-based Vulnerabilities. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Nejati, S., Pastore, F., Armando, A., Gorla, A., & Panichella, A.
Lei, L., You, L., Dai, G., Vu, T. X., Yuan, D., & Chatzinotas, S. (2017). A Deep Learning Approach for Optimizing Content Delivering in Cache-Enabled HetNet. IEEE International Symposium on Wireless Communication Systems (ISWCS), Bologna, Aug. 2017.
Oyedotun, O., Demisse, G., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2017). Facial Expression Recognition via Joint Deep Learning of RGB-Depth Map Latent Representations. 2017 IEEE International Conference on Computer Vision Workshop (ICCVW).
Oyedotun, O., & Khashman, A. (2017, August 15). Prototype Incorporated Emotional Neural Network (PI-EmNN). IEEE Transactions on Neural Networks and Learning Systems.
Rosalie, M., Brust, M., Danoy, G., Chaumette, S., & Bouvry, P. (2017). Coverage optimization with connectivity preservation for UAV swarms applying chaotic dynamics. IEEE International Conference on Autonomic Computing (ICAC), Columbus 17-21 July 2017 (pp. 113-118).
Casini, G., & Meyer, T. (2017). Belief Change in a Preferential Non-Monotonic Framework. Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (pp. 929-935). International Joint Conferences on Artificial Intelligence.
Hammes, C., Shankar, B., Nijsure, Y., Spielmann, T., & Ottersten, B. (2017, August). Random Phase Center Motion Technique for Enhanced Angle-Doppler Discrimination Using MIMO Radars. Paper presented at 25th European Signal Processing Conference.
Thome, J., Shar, L. K., Bianculli, D., & Briand, L. (2017). An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving (TR-SNT-2017-4). Luxembourg, Luxembourg: SnT Centre - University of Luxembourg.
Oyedotun, O., Shabayek, A. E. R., Aouada, D., & Ottersten, B. (2017). Training Very Deep Networks via Residual Learning with Stochastic Input Shortcut Connections. 24th International Conference on Neural Information Processing, Guangzhou, China, November 14–18, 2017.
Rosalie, M., Dentler, J. E., Danoy, G., Bouvry, P., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2017). Area exploration with a swarm of UAVs combining deterministic Chaotic Ant Colony Mobility with position MPC. 2017 International Conference on Unmanned Aircraft Systems (ICUAS) (pp. 1392-1397).
Wang, C. (2017). Automated requirements-driven testing of embedded systems based on use case specifications and timed automata. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Pastore, F. (Promotor), Sabetzadeh, M., Nejati, S., Legeard, B., & Denaro, G.
Tsakmalis, A. (2017). Active Learning in Cognitive Radio Networks. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Chatzinotas, S. (Promotor), Ottersten, B. (Promotor), Perez-Neira, A. I. (Promotor), State, R., & Marques, A. G.
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2017). Risk-averse Stochastic Nonlinear Model Predictive Control for Real-time Safety-critical Systems. The 20th World Congress of the International Federation of Automatic Control, IFAC 2017 World Congress, Toulouse, France, 9-14 July 2017. Toulouse, France.
Kubler, S., Derigent, W., Voisin, A., Robert, J., & Le Traon, Y. (2017). Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices. Knowledge-based Consistency Index for Fuzzy Pairwise Comparison Matrices.
Mai, X. P., Göknil, A., Shar, L. K., & Briand, L. (2017). Modeling Security and Privacy Requirements for Mobile Applications: a Use Case-driven Approach (TR-SNT-2017-3). SnT, University of Luxembourg.
Chaib Draa, K., & Voos, H. (2017). An LMI-Based H_infty Discrete-Time Nonlinear State Observer Design for an Anaerobic Digestion Model. World Congress of the International Federation of Automatic Control, Toulouse 9-14 July 2017.
Chaib Draa, K., Voos, H., Alma, M., Zemouche, A., & Darouach, M. (2017). LMI-Based H_infty Nonlinear State Observer Design for Anaerobic Digestion Model. IEEE Mediterranean Conference on Control and Automation, Valletta 3-6 July 2017.
Di Nardo, D., Pastore, F., & Briand, L. (2017). Augmenting Field Data for Testing Systems Subject to Incremental Requirements Changes. ACM Transactions on Software Engineering & Methodology, 26(1), 1-40.
Hartmann, T., Fouquet, F., Jimenez, M., Rouvoy, R., & Le Traon, Y. (2017). Analyzing Complex Data in Motion at Scale with Temporal Graphs. Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering.
Kolbe, N., Kubler, S., Robert, J., Le Traon, Y., & Zaslavsky, A. (2017). Towards Semantic Interoperability in an Open IoT Ecosystem for Connected Vehicle Services. 2017 IEEE Global Internet of Things Summit (GIoTS) Proceedings.
Kolbe, N., Zaslavsky, A., Kubler, S., Robert, J., & Le Traon, Y. (2017). Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components. Modeling and Using Context.
Koyuncu, A., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (2017, July). Impact of Tool Support in Patch Construction. Paper presented at 2017 International Symposium on Software Testing & Analysis (ISSTA).
Kuhrmann, M., Diebold, P., Münch, J., Tell, P., Garousi, V., Felderer, M., Trektere, K., McCaffery, F., Linssen, O., Hanser, E., & Christian, P. (2017). Proceedings of International Conference on Software and Systems Process (ICSSP). Hybrid software and system development in practice: Waterfall, scrum, and beyond.
Lagunas, E., Lei, L., Maleki, S., Chatzinotas, S., & Ottersten, B. (2017). Power Allocation for In-Band Full-Duplex Self-Backhauling. International Conference on Telecommunications and Signal Processing (TSP), Barcelona, Spain, July 2017.
Liu, B. (2017). AUTOMATED DEBUGGING AND FAULT LOCALIZATION OF MATLAB/SIMULINK MODELS. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Nejati, S. (Promotor), Klein, J., Pastore, F., Trapp, M., & Di Penta, M.
Spano, D., Alodeh, M., Chatzinotas, S., Krause, J., & Ottersten, B. (2017). Spatial PAPR Reduction in Symbol-level Precoding for the Multi-beam Satellite Downlink. IEEE SPAWC 2017.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2017). Interference Constraint Active Learning with Uncertain Feedback for Cognitive Radio Networks. IEEE Transactions on Wireless Communications, 16(7), 4654-4668.
Vu, T. X., Chatzinotas, S., & Ottersten, B. (2017, July). Energy-Efficient Design for Edge-caching Wireless Networks: When is Coded-caching beneficial? Abstract book of IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
Biryukov, A., Feher, D., & Khovratovich, D. (2017). Guru: Universal Reputation Module for Distributed Consensus Protocols. Luxembourg, Luxembourg: University of Luxembourg.
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2017). Fast Stochastic Non-linear Model Predictive Control for Electric Vehicle Advanced Driver Assistance Systems. 13th IEEE International Conference on Vehicular Electronics and Safety, Vienna, Austria 27-28 June 2017 (pp. 91-96).
Derrmann, T., Frank, R., Engel, T., & Viti, F. (2017). How Mobile Phone Handovers reflect Urban Mobility: A Simulation Study. In T., Derrmann, R., Frank, T., Engel, & F., Viti, How Mobile Phone Handovers reflect Urban Mobility: A Simulation Study.
Bouvry, P., Chaumette, S., Danoy, G., Guerrini, G., Jurquet, G., Kuwertz, A., Müller, W., Rosalie, M., Sander, J., & Segor, F. (2017). ASIMUT project: Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques. DroNet'17 Proceedings of the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications (pp. 17-20). New York, NY, USA: ACM.
Garousi, V., Felderer, M., Fernandes, J., Pfahl, D., & Mäntylä, M. (2017). Industry-academia collaborations in software engineering: an empirical analysis of challenges, patterns and anti-patterns in research projects. Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (pp. 224-229). ACM.
Garousi, V., Felderer, M., Kuhrmann, M., & Herkiloğlu, K. (2017). What industry wants from academia in software testing? Hearing practitioners’ opinions. Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (pp. 65-69). ACM Digital Library.
Raulamo-Jurvanen, P., Mäntylä, M., & Garousi, V. (2017). Choosing the Right Test Automation Tool: a Grey Literature Review of Practitioner Sources. Choosing the Right Test Automation Tool: a Grey Literature Review of Practitioner Sources (pp. 21-30). ACM.
Atashpendar, A., Dorronsoro, B., Danoy, G., & Bouvry, P. (2017, June 10). A Scalable Parallel Cooperative Coevolutionary PSO Algorithm for Multi-objective Optimization. Journal of Parallel & Distributed Computing.
Gautam, S., & P, U. (2017, June 04). Relay Selection and Transceiver Design for Joint Wireless Information and Energy Transfer in Cooperative Networks. Paper presented at 2017 IEEE 85th Vehicular Technology Conference: VTC2017, Sydney, Australia.
Artiga, X., Vázquez, M. Á., Pérez-Neira, A., Tsinos, C., Lagunas, E., Chatzinotas, S., Ramireddy, V., Steinmetz, C., Zetik, R., Ntougias, K., Ntaikos, D., & Papadias, C. (2017). Spectrum Sharing in Hybrid Terrestrial-Satellite Backhaul Networks in the Ka Band. European Conference on Networks and Communications (EuCNC), June 2017.
Biryukov, A., Dinu, D.-D., & Le Corre, Y. (2017). Side-Channel Attacks meet Secure Network Protocols. In D., Gollmann, A., Miyaji, & H., Kikuchi (Eds.), Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017. Proceedings (pp. 435-454). Springer Verlag.
Biryukov, A., & Perrin, L. P. (2017). State of the Art in Lightweight Symmetric Cryptography. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/31319.
Garousi, V., & Felderer, M. (2017). Experience-based guidelines for effective and efficient data extraction in systematic reviews in software engineering. Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (pp. 170-179). ACM.
You, I., Lenzini, G., & De Santis, A. (2017). Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence. IEEE Systems Journal, 11(2).
Titcheu Chekam, T., Papadakis, M., Le Traon, Y., & Harman, M. (2017). An Empirical Study on Mutation, Statement and Branch Coverage Fault Revelation that Avoids the Unreliable Clean Program Assumption. International Conference on Software Engineering (ICSE 2017).
Di Nucci, D., Palomba, F., Prota, A., Panichella, A., Zaidman, A., & De Lucia, A. (2017). PETrA: a software-based tool for estimating the energy profile of Android applications. 39th International Conference on Software Engineering (ICSE) 2017 (pp. 3-6). ACM.
Panichella, A., & Urko, R. (2017). Java Unit Testing Tool Competition — Fifth Round. 10th International Workshop on Search- Based Software Testing (SBST) 2017. IEEE.
Hurier, M., Suarez-Tangil, G., Dash, S. K., Bissyande, T. F. D. A., Le Traon, Y., Klein, J., & Cavallaro, L. (2017). Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. MSR 2017.
Blaiech, K., Hamadi, S., Hommes, S., Valtchev, P., Cherkaoui, O., & State, R. (2017). Rule Compilation in Multi-Tenant Networks. Rule Compilation in Multi-Tenant Networks (pp. 97-98). Beijing, China: IEEE.
Dominico, S., Almeida, E. C. D., & Meira, J. A. (2017, May 15). A PetriNet Mechanism for OLAP in NUMA. Poster session presented at Thirteenth International Workshop on Data Management on New Hardware (DaMoN 2017).
Krivochiza, J., Kalantari, A., Chatzinotas, S., & Ottersten, B. (2017). Low Complexity Symbol-Level Design for Linear Precoding Systems. In R., Heusdens & J. H., Weber, PROCEEDINGS of the 2017 Symposium on Information Theory and Signal Processing in the Benelux (pp. 117). Delft, Netherlands: Delft University of Technology.
Cacciatore, G., Fiandrino, C., Kliazovich, D., Granelli, F., & Bouvry, P. (2017). Cost analysis of Smart Lighting Solutions for Smart Cities. IEEE International Conference on Communications (ICC), Paris, France, 2017.
Capponi, A., Fiandrino, C., Kliazovich, D., Bouvry, P., & Giordano, S. (2017). Energy Efficient Data Collection in Opportunistic Mobile Crowdsensing Architectures for Smart Cities. 3rd IEEE INFOCOM Workshop on Smart Cites and Urban Computing.
Chaib Draa, K., Voos, H., Alma, M., Zemouche, A., & Darouach, M. (2017). LMI-Based Discrete-Time Nonlinear State Observer for an Anaerobic Digestion Model. IEEE International Conference on Systems and Control, Batna 7-9 May 2017.
Hammes, C., Nijsure, Y., Shankar, B., Schröder, U., & Ottersten, B. (2017, May). Discrimination of Angle-Doppler Signatures using Arbitrary Phase Center Motion for MIMO Radars. Paper presented at IEEE Radar Conference 2017, Seattle, USA.
Hartmann, T., Moawad, A., Fouquet, F., & Le Traon, Y. (2017, May). The Next Evolution of MDE: A Seamless Integration of Machine Learning into Domain Modeling. Software & Systems Modeling.
Lagunas, E., Maleki, S., Lei, L., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2017). Carrier Allocation for Hybrid Satellite-Terrestrial Backhaul Networks. ICC Workshop on Satellite Communications: Challenges and Integration in the 5G ecosystem, Paris, France, May 2017.
Li, L., Bissyande, T. F. D. A., Bartel, A., Klein, J., & Le Traon, Y. (2017, May). The Multi-Generation Repackaging Hypothesis. Poster session presented at The 39th International Conference on Software Engineering.
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017, May). Automatically Locating Malicious Packages in Piggybacked Android Apps. Abstract book of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft 2017).
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (2017, May). Understanding Android App Piggybacking. Poster session presented at The 39th International Conference on Software Engineering.
Liu, Z., Lei, L., Zhang, N., Kang, G., & Chatzinotas, S. (2017, May). Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems. IEEE Access.
Soltani, M., Panichella, A., & van Deursen, A. (2017). A Guided Genetic Algorithm for Automated Crash Reproduction. Proceedings of the 39th International Conference on Software Engineering (ICSE 2017). ACM.
Thome, J., Shar, L. K., Bianculli, D., & Briand, L. (2017). Search-driven String Constraint Solving for Vulnerability Detection. Proceedings of the 39th International Conference on Software Engineering (ICSE 2017). ACM.
Vu, T. X., Chatzinotas, S., & Ottersten, B. (2017, May). On the Diversity of Partial Relaying Cooperation with Relay Selection in Finite-SNR Regime. IEEE International Conference on Communications.
Vu, T. X., Duhamel, P., Chatzinotas, S., & Ottersten, B. (2017, May). Finite-SNR analysis for partial relaying cooperation with channel coding and opportunistic relay selection. EURASIP Journal on Advances in Signal Processing.
Vu, T. X., Trinh, A. V., Chatzinotas, S., & Ottersten, B. (2017, May). Spectral-Efficient Model for Multiuser Massive MIMO: Exploiting User Velocity. IEEE international Conference on Communications.
Wang, J., & Tang, Q. (2017). Differentially Private Neighborhood-based Recommender Systems. IFIP Information Security & Privacy Conference (pp. 14). Springer.
Perrin, L. P. (2017). Cryptanalysis, Reverse-Engineering and Design of Symmetric Cryptographic Algorithms. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Biryukov, A. (Promotor), Coron, J.-S., Gilbert, H., Leander, G., & Müller, V.
Biryukov, A., Khovratovich, D., & Tikhomirov, S. (2017, April 07). Findel: Secure Derivative Contracts for Ethereum. Paper presented at 1st Workshop on Trusted Smart Contracts (In Association with Financial Cryptography and Data Security 2017), Sliema, Malta.
Iovino, V., Rial Duran, A., Roenne, P., & Ryan, P. (2017). Using Selene to Verify your Vote in JCJ. Workshop on Advances in Secure Electronic Voting (VOTING'17) (pp. 17).
Pejo, B., & Tang, Q. (2017). To Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification. Fifth ACM International Workshop on Security in Cloud Computing, Abu Dhabi 2 April 2017. New York, United States of America: ACM.
Arend, B., Sunnen, P., & Caire, P. (2017). Investigating Breakdowns in Human Robot Interaction: A Conversation Analysis Guided Single Case Study of a Human-NAO Communication in a Museum Environment. International Journal of Mechanical, Aerospace, Industrial, Mechatronic and Manufacturing Engineering, 11(5), 839-845.
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2017). Sensing by Proxy in Buildings with Agglomerative Clustering of Indoor Temperature Movements. The 32nd ACM Symposium on Applied Computing (SAC 2017).
Mouline, L., Hartmann, T., Fouquet, F., Le Traon, Y., Bourcier, J., & Barais, O. (2017). Weaving Rules into Models@run.time for Embedded Smart Systems. In L., Mouline, T., Hartmann, F., Fouquet, Y., Le Traon, J., Bourcier, & O., Barais, Weaving Rules into Models@run.time for Embedded Smart Systems. Brussels, Belgium: ACM.
Shamir, A., Biryukov, A., & Perrin, L. P. (2017). Summary of an Open Discussion on IoT and Lightweight Cryptography. Proceedings of Early Symmetric Crypto workshop, 2017. Luxembourg, Luxembourg: University of Luxembourg.
Shin, S. Y., Brun, Y., Balasubramanian, H., Henneman, P. L., & Osterweil, L. J. (2017, March 27). Discrete-Event Simulation and Integer Linear Programming for Constraint-Aware Resource Scheduling. IEEE Transactions on Systems, Man, and Cybernetics: Systems.
Kintis, M., Papadakis, M., Jia, Y., Malevris, N., Le Traon, Y., & Harman, M. (2017, March 20). Detecting Trivial Mutant Equivalences via Compiler Optimisations. IEEE Transactions on Software Engineering.
Liu, Z., Kang, G., Lei, L., Zhang, N., & Zhang, S. (2017). Power Allocation for Energy Efficiency Maximization in Downlink CoMP Systems With NOMA. IEEE Wireless Communications and Networking Conference (WCNC), 2017 (pp. 1-6).
Wang, C., Pastore, F., & Briand, L. (2017). System Testing of Timing Requirements based on Use Cases and Timed Automata. 10th IEEE International Conference on Software Testing, Verification and Validation (ICST 2017), Tokyo 13-18 March 2017.
Zhu, Q., Panichella, A., & Zaidman, A. (2017). Speeding-Up Mutation Testing via Data Compression and State Infection. IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) 2017 (pp. 103-109). IEEE.
Derigent, W., Voisin, A., Thomas, A., Kubler, S., & Robert, J. (2017). Application of Measurement-Based AHP to Product-Driven System Control. In T., Borangiu, Service Orientation in Holonic and Multi-Agent Manufacturing (Studies in Computational Intelligence, pp. 249-258). Springer.
Alodeh, M., Spano, D., Chatzinotas, S., & Ottersten, B. (2017). Faster-than-Nyquist Spatiotemporal Symbol-level Precoding in the Downlink of Multiuser MISO Channels. The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing.
Hajri, I., Göknil, A., & Briand, L. (2017, March). A Change Management Approach in Product Lines for Use Case-Driven Development and Testing. Poster session presented at 23th International Working Conference on Requirements Engineering: Foundation for software Quality (REFSQ 2017), Essen, Germany.
Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2017). Incremental Reconfiguration of Product Specific Use Case Models for Evolving Configuration Decisions. 23rd International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017) (pp. 3-21).
Raitza, M., Kumar, A., Volp, M., Walter, D., Trommer, J., Mikolajick, T., & Weber, W. M. (2017, March). Exploiting Transistor-Level Reconfiguration to Optimize Combinational Circu. Paper presented at DATE 2017, Lausanne, Switzerland.
Rosalie, M., Danoy, G., Chaumette, S., & Bouvry, P. (2017). Impact du mécanisme chaotique sur l’optimisation d’un modèle de mobilité pour un essaim de drones devant réaliser une couverture de zone. In E., Falcon, M., Lefranc, F., Pétrélis, & C.-T., Pham (Eds.), Comptes-rendus de la 20e Rencontre du Non Linéaire (pp. 79-84). Saint Etienne du Rouvray, France: Non-Linéaire Publications.
Dentler, J. E. (2017). denmpc.
Toader, B., Sprumont, F., Faye, S., Viti, F., & Popescu, M. (2017). Usage of Smartphone Data to Derive an Indicator for Collaborative Mobility between Individuals. ISPRS International Journal of Geo-Information, 6(3), 62.
Di Nucci, D., Palomba, F., Prota, A., Panichella, A., Zaidman, A., & De Lucia, A. (2017). Software-Based Energy Profiling of Android Apps: Simple, Efficient and Reliable? Proceedings of the 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017). IEEE.
Palomba, F., Di Nucci, D., Panichella, A., Zaidman, A., & De Lucia, A. (2017). Lightweight Detection of Android-specific Code Smells: the aDoctor Project. Proceedings of the 39th International Conference on Software Engineering (ICSE 2017). IEEE.
Kubler, S., Robert, J., Främling, K., Hefnawy, A., Cherifi, C., & Bouras, A. (2017). Open IoT Ecosystem for Sporting Event Management. IEEE Access, 5(1), 7064-7079.
Ben Nasr, S., Bécan, G., Acher, M., Ferreira Filho, J. B., Sannier, N., Baudry, B., & Davril, J.-M. (2017). Automated extraction of product comparison matrices from informal product descriptions. Journal of Systems and Software, 124, 82-103.
Fiandrino, C., Capponi, A., Cacciatore, G., Kliazovich, D., Sorger, U., Bouvry, P., Kantarci, B., Granelli, F., & Giordano, S. (2017, February). CrowdSenSim: a Simulation Platform for Mobile Crowdsensing in Realistic Urban Environments. IEEE Access.
Chenal, M. (2017). Key-Recovery Attacks Against Somewhat Homomorphic Encryption Schemes. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Tang, Q. (Promotor), Coron, J.-S., Ding, J., & Buchmann, J.
Delerue Arriaga, A. (2017). Private Functional Encryption – Hiding What Cannot Be Learned Through Function Evaluation. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Coron, J.-S., Tang, Q., Abdalla, M., & Naccache, D.
Skrobot, M. (2017). On Composability and Security of Game-based Password-Authenticated Key Exchange. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Mauw, S., Lancrenon, J., Cremers, C., & Ding, J.
Giurgiu, A., & Lallemang, T. (2017, January). The General Data Protection Regulation: A New Opportunity and Challenge for the Banking Sector. ACE Comptabilité, fiscalité, audit, droit des affaires au Luxembourg, (1), 3-15.
Kannan, S., Sajadi Alamdari, S. A., Dentler, J. E., Olivares Mendez, M. A., & Voos, H. (2017). Model predictive control for cooperative control of space robots. Model predictive control for cooperative control of space robots (pp. 020068). AIP Publishing.
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (2017, January). Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics & Security.
Perrin, L. P., & Udovenko, A. (2017). Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog. IACR Transactions on Symmetric Cryptology, 2016(2), 99-124.
Ajani, G., Boella, G., Di Caro, L., Robaldo, L., Humphreys, L., Praduroux, S., Rossi, P., & Violato, A. (2017). The European Legal Taxonomy Syllabus: A multi-lingual, multi-level ontology framework to untangle the web of European legal terminology. Applied Ontology.
Akdur, D., Garousi, V., & Demirörs, O. (2017). Cross-factor analysis of software modeling practices versus practitioner demographics in the embedded software industry. 6th Mediterranean Conference on Embedded Computing (MECO).
Almasi, M., Hemmati, H., Fraser, G., Arcuri, A., & Benefelds, J. (2017). An Industrial Evaluation of Unit Test Generation: Finding Real Faults in a Financial Application. ACM/IEEE International Conference on Software Engineering (ICSE).
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2017). Symbol-Level Multiuser MISO Precoding for Multi-level Adaptive Modulation. IEEE Transactions on Wireless Communications.
Antonelo, E. A., Camponogara, E., & Foss, B. (2017). Echo State Networks for Data-driven Downhole Pressure Estimation in Gas-lift Oil Wells. Neural Networks, 85, 106--117.
Antonelo, E. A., Flesch, C., & Filipe, S. (2017). Reservoir Computing for Detection of Steady State in Performance Tests of Compressors. Neurocomputing.
Antonelo, E. A., & State, R. (2017). Recurrent Dynamical Projection for Time series-based Fraud detection. ICANN 2017, Part II, LNCS 10614.
Arcuri, A. (2017). Many Independent Objective (MIO) Algorithm for Test Suite Generation. Symposium on Search-Based Software Engineering (SSBSE).
Arcuri, A. (2017). RESTful API Automated Test Case Generation. IEEE International Conference on Software Quality, Reliability & Security (QRS).
Arcuri, A., Fraser, G., & Just, R. (2017). Private API Access and Functional Mocking in Automated Unit Test Generation. IEEE International Conference on Software Testing, Verification and Validation (ICST).
Baptista, R., Goncalves Almeida Antunes, M., Aouada, D., & Ottersten, B. (2017). Video-Based Feedback for Assisting Physical Activity. 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP).
Biesmans, W., Balasch, J., Rial Duran, A., Preneel, B., & Verbauwhede, I. (2017). Private Mobile Pay-TV From Priced Oblivious Transfer. IEEE Transactions on Information Forensics & Security.
Bohrer, B., Rahli, V., Vukotic, I., Volp, M., & Platzer, A. (2017). Formally Verified Differential Dynamic Logic. CPP 2017.
Booth, R., Casini, G., Meyer, T., & Varzinczak, I. (2017). Extending Typicality for Description Logics. University of Luxembourg.
Campos, J., Ge, Y., Fraser, G., Eler, M., & Arcuri, A. (2017). An Empirical Evaluation of Evolutionary Algorithms for Test Suite Generation. Symposium on Search-Based Software Engineering (SSBSE).
Capponi, A., Fiandrino, C., Kliazovich, D., Bouvry, P., & Giordano, S. (2017). A Cost-Effective Distributed Framework for Data Collection in Cloud-based Mobile Crowd Sensing Architectures. IEEE Transactions on Sustainable Computing.
Castignani, G., Derrmann, T., Frank, R., & Engel, T. (2017). Smartphone-based Adaptive Driving Maneuver Detection: A large-scale Evaluation Study. IEEE Transactions on Intelligent Transportation Systems.
Changaival, B., & Rosalie, M. (2017). Exploring chaotic dynamics by partition of bifurcation diagram. Proceeding of Workshop on Advance in Nonlinear Complex Systems and Applications (WANCSA) (pp. 7-8).
Correa Bahnsen, A., Villegas, S., Aouada, D., & Ottersten, B. (2017). Fraud Detection by Stacking Cost-Sensitive Decision Trees. Data Science for Cyber-Security (DSCS), London 25-27 September.
De Caro, A.* , Iovino, V.* , & O'Neill, A.* . (2017). Receiver and Sender Deniable Functional Encryption. IET Information Security.
* These authors have contributed equally to this work.
Demisse, G., Aouada, D., & Ottersten, B. (2017). Deformation Based Curved Shape Representation. IEEE Transactions on Pattern Analysis & Machine Intelligence.
Derrmann, T., Frank, R., & Viti, F. (2017). Towards Estimating Urban Macroscopic Fundamental Diagrams From Mobile Phone Signaling Data: A Simulation Study. Poster session presented at TRB 96th Annual Meeting, Washington, D.C, USA.
Desmedt, Y., Iovino, V., Persiano, G., & Visconti, I. (2017). Controlled Homomorphic Encryption: Definition and Construction. FC 2017 International Workshops - WAHC'17 - 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography.
Dong, N., Jonker, H., & Pang, J. (2017). Formal modelling and analysis of receipt-free auction protocols in applied pi. Computers & Security, 65, 405-432.
Erata, F., Göknil, A., Tekinerdogan, B., & Kardas, G. (2017). A Tool for Automated Reasoning about Traces Based on Configurable Formal Semantics. 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2017)) (pp. 959-963).
Faye, S., Bronzi, W., Tahirou, I., & Engel, T. (2017). Characterizing User Mobility Using Mobile Sensing Systems. International Journal of Distributed Sensor Networks, 13(8).
Faye, S., Louveton, N., Jafarnejad, S., Kryvchenko, R., & Engel, T. (2017). An Open Dataset for Human Activity Analysis using Smart Devices.
Fraser, G., Rojas, J. M., Campos, J., & Arcuri, A. (2017). EVOSUITE at the SBST 2017 Tool Competition. IEEE/ACM International Workshop on Search-Based Software Testing (SBST).
Gajrani, J., Li, L., Laxmi, V., Tripathi, M., Singh Gaur, M., & Conti, M. (2017). POSTER: Detection of Information Leaks via Reflection in Android Apps. The 2017 ACM on Asia Conference on Computer and Communications Security (AsiaCCS 2017).
Galetzka, M., & Glauner, P. (2017). A Simple and Correct Even-Odd Algorithm for the Point-in-Polygon Problem for Complex Polygons. Proceedings of the 12th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2017), Volume 1: GRAPP.
Giustolisi, R., Iovino, V., & Lenzini, G. (2017). Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. In R., Giustolisi, V., Iovino, & G., Lenzini, Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol. SCITEPRESS.
Glauner, P., Dahringer, N., Puhachov, O., Meira, J. A., Valtchev, P., State, R., & Duarte, D. (2017). Identifying Irregular Power Usage by Turning Predictions into Holographic Spatial Visualizations. Proceedings of the 17th IEEE International Conference on Data Mining Workshops (ICDMW 2017).
Glauner, P., Du, M., Paraschiv, V., Boytsov, A., Lopez Andrade, I., Meira, J. A., Valtchev, P., & State, R. (2017). The Top 10 Topics in Machine Learning Revisited: A Quantitative Meta-Study. Proceedings of the 25th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN 2017).
Glauner, P., Meira, J. A., Valtchev, P., State, R., & Bettinger, F. (2017). The Challenge of Non-Technical Loss Detection using Artificial Intelligence: A Survey. International Journal of Computational Intelligence Systems, 10(1), 760-775.
Goncalves Almeida Antunes, M., Barreto, J. P., Aouada, D., & Ottersten, B. (2017). Unsupervised Vanishing Point Detection and Camera Calibration from a Single Manhattan Image with Radial Distortion. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2017.
Havrikov, N., Gambi, A., Zeller, A., Arcuri, A., & Galeotti, J. P. (2017). Generating Unit Tests with Structured System Interactions. IEEE/ACM International Workshop on Automation of Software Test (AST).
Huynen, J.-L., & Lenzini, G. (2017). From Situation Awareness to Action: An Information Security Management Toolkit for Socio-Technical Security Retrospective and Prospective Analysis. Proceedings of the 3rd International Conference on Information Systems Security and Privacy.
Jafarnejad, S., Castignani, G., & Engel, T. (2017). Towards a Real-Time Driver Identification Mechanism Based on Driving Sensing Data. 20th International Conference on Intelligent Transportation Systems (ITSC) (pp. 7).
Jan, S., Nguyen, D. C., Andrea, A., & Briand, L. (2017). A Search-based Testing Approach for XML Injection Vulnerabilities in Web Applications. 10th IEEE International Conference on Software Testing, Verification and validation (ICST 2017), Tokyo 13-18 March 2017.
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2017). Bayesian Optimization Approach of General Bi-level Problems. Proceedings of the Genetic and Evolutionary Computation Conference Companion (pp. 1614-1621). New York, USA: ACM.
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2017). A new modeling approach for the biobjective exact optimization of satellite payload configuration. International Transactions in Operational Research.
Lagunas, E., & Rugini, L. (2017). Performance of Compressive Sensing Based Energy Detection. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Montreal, Canada, 8-13 October 2017.
Laurent, T., Papadakis, M., Kintis, M., Henard, C., Le Traon, Y., & Ventresque, A. (2017). Assessing and Improving the Mutation Testing Practice of PIT. 10th IEEE International Conference on Software Testing, Verification and Validation.
Lei, L., Lagunas, E., Maleki, S., He, Q., Chatzinotas, S., & Ottersten, B. (2017). Energy Optimization for Full-Duplex Self-Backhauled HetNet with Non-Orthogonal Multiple Access. International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, July 2017.
Lemanska, M., Rodríguez-Velázquez, A., & Trujillo Rasua, R. (2017). Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph. Fundamenta Informaticae, 152(3), 273-287.
Li, L., Bissyande, T. F. D. A., & Klein, J. (2017). SimiDroid: Identifying and Explaining Similarities in Android Apps. Abstract book of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., Bartel, A., Octeau, D., Klein, J., & Le Traon, Y. (2017). Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology.
Liu, B., Lucia, L., Nejati, S., & Briand, L. (2017). Improving Fault Localization for Simulink Models using Search-Based Testing and Prediction Models. 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2017).
Lopez Becerra, J. M., Iovino, V., Ostrev, D., & Skrobot, M. (2017). On the Relation Between SIM and IND-RoR Security Models for PAKEs. Proceedings of the International Conference on Security and Cryptography (pp. 12). SCITEPRESS.
Magdalena, L., Juan Alberto, R.-V., & Trujillo Rasua, R. (2017). Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph. Fundamenta Informaticae, 152(3), 273-287.
Matinnejad, R., Nejati, S., & Briand, L. (2017). Automated Testing of Hybrid Simulink/Stateflow Controllers: Industrial Case Studies. Proceedings of 11TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2017).
Meira, J. A., Glauner, P., State, R., Valtchev, P., Dolberg, L., Bettinger, F., & Duarte, D. (2017). Distilling Provider-Independent Data for General Detection of Non-Technical Losses. Power and Energy Conference, Illinois 23-24 February 2017.
Nanda, R., Di Caro, L., Boella, G., Konstantinov, H., Tyankov, T., Traykov, D., Hristov, H., Costamagna, F., Humphreys, L., Robaldo, L., & Romano, M. (2017). A Unifying Similarity Measure for Automated Identification of National Implementations of European Union Directives. A Unifying Similarity Measure for Automated Identification of National Implementations of European Union Directives.
Pang, J., & Zhang, Y. (2017). DeepCity: A Feature Learning Framework for Mining Location Check-Ins. Proceedings of the 11th International Conference on Web and Social Media (ICWSM'17) (pp. 652-655). AAAI.
Pang, J., & Zhang, Y. (2017). Quantifying location sociality. Proc. 28th ACM Conference on Hypertext and Social Media - HT'17 (pp. 145-154). ACM Press.
Papadakis, M., Kintis, M., Zhang, J., Jia, Y., Le Traon, Y., & Harman, M. (2017). Mutation Testing Advances: An Analysis and Survey. Advances in Computers. Elsevier.
Papadopoulos, K., Goncalves Almeida Antunes, M., Aouada, D., & Ottersten, B. (2017). Enhanced Trajectory-based Action Recognition using Human Pose. IEEE International Conference on Image Processing, Beijing 17-20 Spetember 2017.
Politis, C., Maleki, S., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2017). Weak Interference Detection with Signal Cancellation in Satellite Communications. The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2017.
Politis, C., Maleki, S., Tsinos, C., Liolis`, K., Chatzinotas, S., & Ottersten, B. (2017). Simultaneous Sensing and Transmission for Cognitive Radios with Imperfect Signal Cancellation. IEEE Transactions on Wireless Communications.
Rahli, V., Bickford, M., & Constable, R. (2017). Bar Induction: The Good, the Bad, and the Ugly. Abstract book of LICS 2017: 32nd Annual ACM/IEEE Symposium on Logic in Computer Science.
Rial Duran, A. (2017). Issuer-Free Oblivious Transfer with Access Control Revisited. Information Processing Letters.
Robaldo, L., & Sun, X. (2017). Reified Input/Output logic: Combining Input/Output logic and Reification to represent norms coming from existing legislation. The Journal of Logic and Computation.
Rocchetto, M. (2017). Towards Formal Security Analysis of Industrial Control Systems. Towards Formal Security Analysis of Industrial Control Systems.
Sannier, N., Adedjouma, M., Sabetzadeh, M., & Briand, L. (2017). An Automated Framework for Detection and Resolution of Cross References in Legal Texts. Requirements Engineering, 22(2), 215-237.
Sedighi, S., Shankar, B., Maleki, S., & Ottersten, B. (2017). Multi-Target Localization in Asynchronous MIMO Radars Using Sparse Sensing. Paper presented at IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), Curaçao, Dutch Antilles, Netherland.
Shabayek, A. E. R., Aouada, D., Saint, A. F. A., & Ottersten, B. (2017). DEFORMATION TRANSFER OF 3D HUMAN SHAPES AND POSES ON MANIFOLDS. IEEE International Conference on Image Processing, Beijing 17-20 Spetember 2017.
Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (2017). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search.
Soltana, G., Sabetzadeh, M., & Briand, L. (2017). Synthetic Data Generation for Statistical Testing. 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017) (pp. 10).
Sun, X., & Robaldo, L. (2017). Norm-based deontic logic for access control, some computational results. Future Generation Computer Systems.
Tsinos, C., Maleki, S., Chatzinotas, S., & Ottersten, B. (2017). On the Energy-Efficiency of Hybrid Analog-Digital Transceivers for Single- and Multi-carrier Large Antenna Array Systems. IEEE Journal on Selected Areas In Communications.
Vu, T. X., Chatzinotas, S., & Ottersten, B. (2017). Coded Caching and Storage Planning in Heterogeneous Networks. 2017 IEEE Wireless Communications and Networking Conference (WCNC).
Vu, T. X., Nguyen, Hieu Duy, Quek, Tony Q.S., & Sun, Sumei. (2017). Adaptive Cloud Radio Access Networks: Compression and Optimization. IEEE Transactions on Signal Processing, 65(1), 228-241.
Wang, J., Sun, J., Yuan, Q., & Pang, J. (2017). Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study. Proceedings of 20th International Conference on Fundamental Approaches to Software Engineering (pp. 3-21). Springer.
Yang, X., Lo, D., Li, L., Xia, X., Bissyande, T. F. D. A., & Klein, J. (2017). Comprehending Malicious Android Apps By Mining Topic-Specific Data Flow Signatures. Information and Software Technology.
zhang, Y., Ni, M., Han, W., & Pang, J. (2017). Does #like4like indeed provoke more likes? Proceedings of the 16th IEEE/WIC/ACM International Conference on Web Intelligence (WI'17) (pp. 179-186). ACM.
Ziaragkas, G., Poziopoulou, G., Núñez-Martínez, J., Baranda Hortigüela, J., Moreno, I., Tsinos, C., Maleki, S., Sharma, S. K., Alodeh, M., & Chatzinotas, S. (2017). SANSA - Hybrid Terrestrial-Satellite Backhaul Network: Scenarios, Use cases, KPIs, Architecture, Network and Physical Layer Techniques. International Journal of Satellite Communications and Networking.

2016

Ibrahim, A. A. Z. A., Kliazovich, D., Bouvry, P., & OLEKSIAK, A. (2016). Using Virtual Desktop Infrastructure to Improve Power Efficiency in Grinfy System. IEEE 8th International Conference on Cloud Computing Technology and Science(CloudCom), Luxembourg 2016 (pp. 85-89).
Volp, M., Lackorzynski, A., Decouchant, J., Rahli, V., Rocha, F., & Verissimo, P. (2016, December 12). Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control. Paper presented at SysTEX '16, Trento, Italy.
Wang, J., & Tang, Q. (2016). A Probabilistic View of Neighborhood-based Recommendation Methods. ICDM 2016 - IEEE International Conference on Data Mining series (ICDM) workshop CLOUDMINE.
Glauner, P., & State, R. (2016, December 09). Deep Learning on Big Data Sets in the Cloud with Apache Spark and Google TensorFlow. Paper presented at 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2016), Shanghai, China.
Derrmann, T., Faye, S., Frank, R., & Engel, T. (2016, December 08). Poster: LuST-LTE: A Simulation Package for Pervasive Vehicular Connectivity. Poster session presented at IEEE Vehicular Networking Conference (VNC) 2016, Columbus, Ohio, USA.
Dentler, J. E., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2016, December 06). A tracking error control approach for model predictive position control of a quadrotor with time varying reference. Paper presented at IEEE International Conference on Robotics and Biomimetics, Qingdao, China.
Di Maio, A., Palattella, M. R., Soua, R., Lamorte, L., Vilajosana, X., Alonso-Zarate, J., & Engel, T. (2016). Enabling SDN in VANETs: What is the Impact on Security? Sensors, 16(12), 2077.
Kubler, S., Robert, J., Hefnawy, A., Cherifi, C., Bouras, A., & Främling, K. (2016). IoT-based Smart Parking System for Sporting Event Management. Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp. 104-114). New York, USA: ACM New York.
Bronzi, W., Derrmann, T., Castignani, G., & Engel, T. (2016). Towards Characterizing Bluetooth Discovery in a Vehicular Context. Vehicular Networking Conference (VNC), 2016 IEEE.
Capponi, A., Fiandrino, C., Franck, C., Sorger, U., Kliazovich, D., & Bouvry, P. (2016). Assessing Performance of Internet of Things-based Mobile Crowdsensing Systems for Sensing as a Service Applications in Smart Cities. 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom).
Du, M., State, R., Brorsson, M., & Avanesov, T. (2016). Behavior Profiling for Mobile Advertising. Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (pp. 302-307). ACM.
Fiandrino, C., Kantarci, B., Anjomshoa, F., Kliazovich, D., Bouvry, P., & Matthews, J. (2016). Sociability-Driven User Recruitment in Mobile Crowdsensing Internet of Things Platforms. IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 2016.
Hammerschmidt, C., Verwer, S., Lin, Q., & State, R. (2016, December). Interpreting Finite Automata for Sequential Data. Interpretable Machine Learning for Complex Systems: NIPS 2016 workshop proceedings.
Jimenez, M., Papadakis, M., & Le Traon, Y. (2016). An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel. 2016 Asia-Pacific Software Engineering Conference (APSEC).
Mauw, S., Toro Pozo, J. L., & Trujillo Rasua, R. (2016). Optimality Results on the Security of Lookup-Based Protocols. In G. P., Hancke & K., Markantonakis (Eds.), Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers (pp. 137-150). Springer.
Popleteev, A. (2016). Indoor positioning and floor plan based ground truth: Can you really click where you are? 15th International Conference on Mobile and Ubiquitious Multimedia (MUM-2016).
Pouryazdan, M., Fiandrino, C., Kantarci, B., Kliazovich, D., Soyata, T., & Bouvry, P. (2016). Game-Theoretic Recruitment of Sensing Service Providers for Trustworthy Cloud-Centric Internet-of-Things (IoT) Applications. IEEE Global Communications Conference (GLOBECOM) Workshops: Fifth International Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA).
Rial, A. (2016, December). On the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data. Abstract book of 2016 IEEE 8th International Conference on Cloud Computing Technology and Science (CloudCom).
Soltanalian, M., Mysore, R. B. S., & Ottersten, B. (2016). Reliability problems and Pareto-optimality in cognitive radar (Invited paper). Signal Processing Conference (EUSIPCO), 2016 24th European. IEEE.
Spano, D., Alodeh, M., Chatzinotas, S., & Ottersten, B. (2016). Per-antenna Power Minimization in Symbol-Level Precoding. IEEE GLOBECOM 2016.
Li, L. (2016). Boosting Static Security Analysis of Android Apps through Code Instrumentation. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Klein, J. (Promotor), Briand, L., Bissyande, T. F. D. A., Zhang, X., & Backes, M.
Codeca, L. (2016). Dynamic Vehicular Routing in Urban Environments. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Engel, T. (Promotor).
Adebayo, K. J., Di Caro, L., Boella, G., & Bartolini, C. (2016, November 15). An approach to information retrieval and question answering in the legal domain. Paper presented at Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN), Kanagawa, Japan.
Faye, S., Tahirou, I., & Engel, T. (2016). Demo Abstract: Human Mobility Profiling Using Privacy-Friendly Wi-Fi and Activity Traces. Proceedings of the 14th ACM Conference on Embedded Networked Sensor Systems (SenSys 2016).
Volp, M., Klüppelholz, S., Castrillon, J., Härtig, H., Asmussen, N., Assmann, U., Baader, F., Baier, C., Fettweis, G., Fröhlich, J., Goens, A., Haas, S., Habich, D., Hasler, M., Huismann, I., Karnagel, T., Karol, S., Lehner, W., Leuschner, L., Lieber, M., Ling, S., Märcker, S., Mey, J., Nagel, W., Nöthen, B., Penaloza, R., Raitza, M., Stiller, J., Ungethüm, A., & Voigt, A. (2016, November 14). The Orchestration Stack: The Impossible Task of Designing Software for Unknown Future Post-CMOS Hardware. Paper presented at 1ST INTERNATIONAL WORKSHOP ON POST-MOORE’S ERA SUPERCOMPUTING (PMES), Salt Lake City, USA.
Ibrahim, A. A. Z. A., Bouvry, P., Kliazovich, D., & OLEKSIAK, A. (2016). Virtual Desktop Infrastructures: architecture, survey and green aspects proof of concept. 7th INTERNATIONAL GREEN and SUSTAINABLE COMPUTING CONFERENCE (1st RE-HPC workshop), Hangzhou, China (November 2016).
Pejo, B., & Tang, Q. (2016, November 03). Game-Theoretic Framework for Integrity Verification in Computation Outsourcing. Poster session presented at Decision and Game Theory for Security (GameSec), New York, United States of America.
Bartolini, C., Giurgiu, A., Lenzini, G., & Robaldo, L. (2016). A Framework to Reason about the Legal Compliance of Security Standards. Proceedings of the Tenth International Workshop on Juris-informatics (JURISIN).
Bartolini, C., Lenzini, G., & Robaldo, L. (2016). Towards legal compliance by correlating Standards and Laws with a semi-automated methodology. Proceedings of the 28 Benelux Conference on Artificial Intelligence (BNAIC).
Gharanjik, A., Shankar, B., Soltanalian, M., & Ottersten, B. (2016). Max-min transmit beamforming via iterative regularization. 50th Asilomar Conference on Signals, Systems and Computers, November 2016.
Göknil, A., Kurtev, I., & van den Berg, K. (2016). A Rule-based Approach for Evolution of AADL Models based on Changes in Functional Requirements. The workshop on Sustainable Architecture: Global Collaboration, Requirements, Analysis (SAGRA) at the 10th European Conference on Software Architecture (ECSA).
Hajri, I. (2016). Supporting Change in Product Lines within the Context of Use Case-Driven Development and Testing. 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (DS@FSE 2016).
Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2016). PUMConf: A Tool to Configure Product Specific Use Case and Domain Models in a Product Line. 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering.
Hammerschmidt, C., Marchal, S., Pellegrino, G., State, R., & Verwer, S. (2016, November). Efficient Learning of Communication Profiles from IP Flow Records. Poster session presented at The 41st IEEE Conference on Local Computer Networks (LCN).
Khan, N. A., Baig, F., Nawaz, S. J., Rehman, N. U., & Sharma, S. K. (2016, November). Analysis of Power Quality Signals Using An Adaptive Time-Frequency Distribution. Energies.
Pierina Brustolin Spagnuelo, D., & Lenzini, G. (2016, November). Transparent Medical Data Systems. Journal of Medical Systems.
Rial, A., Danezis, G., & Kohlweiss, M. (2016, November). Privacy-preserving smart metering revisited. International Journal of Information Security.
Rosalie, M., Danoy, G., Chaumette, S., & Bouvry, P. (2016). From Random Process to Chaotic Behavior in Swarms of UAVs. DIVANet '16 Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications (pp. 9-15). New York, USA: ACM.
Tang, Q., & Wang, J. (2016, November). Privacy-preserving Friendship-based Recommender Systems. IEEE Transactions on Dependable and Secure Computing.
Fiandrino, C. (2016). Energy-efficient Communications in Cloud, Mobile Cloud and Fog Computing. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Bouvry, P. (Promotor), Kliazovich, D. (Promotor), Zampunieris, D., Seredynski, F., & Giaccone, P.
Popleteev, A., Arshadaghghaleh, H., & Lutkovski, V. (2016). Small-scale positioning using digital compasses. International Congress on Computer Science: Information Systems and Technologies (CSIST-2016). Minsk, Belarus: BSU.
Christopoulos, D., Pennanen, H., Chatzinotas, S., & Ottersten, B. (2016). Multicast multigroup precoding for frame-based multi-gateway satellite communications. Advanced Satellite Multimedia Systems Conference and the 14th Signal Processing for Space Communications Workshop (ASMS/SPSC), 2016 8th. IEEE.
Dou, W. (2016). A Model-Driven Approach to Offline Trace Checking of Temporal Properties. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Bianculli, D. (Promotor), State, R., Sabetzadeh, M., Pautasso, C., & Furia, C. A.
Tabatabaei, M. (2016). GAMES AND STRATEGIES IN ANALYSIS OF SECURITY PROPERTIES. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Jamroga, W. (Promotor), van der Torre, L., Teague, V., & Schneider, S.
Alodeh, M., Spano, D., Chatzinotas, S., & Ottersten, B. (2016). Peak Power Minimization in Symbol-level Precoding for Cognitive MISO Downlink Channels. IEEE Digital Signal Processing Conference.
Arora, C. (2016). AUTOMATED ANALYSIS OF NATURAL-LANGUAGE REQUIREMENTS USING NATURAL LANGUAGE PROCESSING. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Sabetzadeh, M. (Promotor), Le Traon, Y., Gorschek, T., Sawyer, P., & Nejati, S.
Glauner, P., & State, R. (2016, October 09). Load Forecasting with Artificial Intelligence on Big Data. Paper presented at Sixth IEEE Conference on Innovative Smart Grid Technologies, Europe (ISGT Europe 2016), Ljubljana, Slovenia.
Amin, B., Mansoor, B., Junaid Nawaz, S., Sharma, S. K., & Patwary, M. N. (2016, October). Compressed Sensing of Sparse Multipath MIMO Channels with Superimposed Training Sequence. Wireless Personal Communications.
Arora, C., Sabetzadeh, M., Briand, L., & Zimmer, F. (2016). Extracting Domain Models from Natural-Language Requirements: Approach and Industrial Evaluation. 19th International Conference on Model Driven Engineering Languages and Systems, Saint-Malo 2-7 October 2016.
Caldeira Lima, A., Rocha, F., Volp, M., & Verissimo, P. (2016). Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems. Proceedings of the Second ACM Workshop on Cyber-Physical Systems Security and PrivaCy.
Faye, S., & Engel, T. (2016). Understanding User Daily Mobility Using Mobile and Wearable Sensing Systems. Proceedings of the 2016 International Conference on Information and Communications Technology Convergence - ICTC 2016.
Hammerschmidt, C., Loos, B. L., Verwer, S., & State, R. (2016, October). Flexible State-Merging for learning (P)DFAs in Python. Paper presented at The 13th International Conference on Grammatical Inference.
Hammerschmidt, C., Marchal, S., State, R., & Verwer, S. (2016, October). Behavioral Clustering of Non-Stationary IP Flow Record Data. Poster session presented at 12th International Conference on Network and Service Management.
Jimenez, M., Papadakis, M., & Le Traon, Y. (2016). Vulnerability Prediction Models: A case study on the Linux Kernel. 16th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2016, Raleigh, US, October 2-3, 2016.
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2016). Co-evolutionary approach based on constraint decomposition. Co-evolutionary approach based on constraint decomposition.
Kubler, S., Robert, J., William, D., Alexandre, V., & Le Traon, Y. (2016). A state-of the-art survey & testbed of Fuzzy AHP (FAHP) applications. Expert Systems with Applications, 65, 398--422.
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo-NG: A Practical Language Modeling Approach for Time Series Classification. The 15th International Symposium on Intelligent Data Analysis.
Li, L., Bissyande, T. F. D. A., Le Traon, Y., & Klein, J. (2016). Accessing Inaccessible Android APIs: An Empirical Study. The 32nd International Conference on Software Maintenance and Evolution (ICSME) (pp. 12).
Max, C. (2016). Elementary science and education within the Luxembourg educational system. In M. J., De Vries, S., Fletcher, S., Kruse, P., Labudde, M., Lang, I., Mammes, C., Max, D., Münk, B., Nicholl, J., Strobel, & M., Winterbottom (Eds.), Technology Education Today – International Perspectives (pp. 75-106). Münster, Germany: Waxmann.
Mengali, A., Kayhan, F., Shankar, B., & Ottersten, B. (2016, October). Exploiting diversity in future generation satellite systems with optical feeder links. Proceedings of the 34TH AIAA INTERNATIONAL COMMUNICATIONS SATELLITE SYSTEMS CONFERENCE.
Mitseva, A., Panchenko, A., Lanze, F., Henze, M., Wehrle, K., & Engel, T. (2016, October). POSTER: Fingerprinting Tor Hidden Services. Poster session presented at 23rd ACM Conference on Computer and Communications Security, Vienna, Austria.
Patwary, M., Sharma, S. K., Chatzinotas, S., Chen, Y., Abdel-Maguid, M., Abd-Alhameed, R., Noras, J., & Ottersten, B. (2016). Universal Intelligent Small Cell for Next Generation Cellular Networks. Digital Communications and Networks, 2(4), 167–174.
Pellegrino, G., Hammerschmidt, C., Lin, Q., & Verwer, S. (2016, October). Learning Deterministic Finite Automata from Infinite Alphabets. Paper presented at The 13th International Conference on Grammatical Inference.
Popleteev, A. (2016). HIPS: Human-based indoor positioning system. Proceedings of the 7th International Conference on Indoor Positioning and Indoor Navigation (IPIN-2016).
Popleteev, A. (2016). Indoor positioning using ambient radio signals: Data acquisition platform for a long-term study. Proceedings of the IEEE 13th Workshop on Positioning, Navigation and Communications (WPNC-2016). IEEE.
Pranjic, V., Mazzali, N., Emiliani, L., & Shankar, B. (2016). Return Link Optimized Resource Allocation for Satellite Communications in the Ku/Ka-Band. Proceedings on the 22nd Ka and Broadband Communications Conference and the 34th AIAA International Communications Satellite Systems Conference (ICSSC).
Sciarrone, A., Fiandrino, C., Bisio, I., Lavagetto, F., Kliazovich, D., & Bouvry, P. (2016). Smart Probabilistic Fingerprinting for Indoor Localization over Fog Computing Platforms. IEEE 5th International Conference on Cloud Networking (CloudNet), Pisa, Italy.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2016). Terminal-side interference mitigation for spectral coexistence of satellite and terrestrial systems in non-exclusive Ka-band. 34th AIAA International Communications Satellite Systems Conference.
Kolbe, N., Zaslavsky, A., Kubler, S., & Robert, J. (2016). Reasoning over Knowledge-based Generation of Situations in Context Spaces to Reduce Food Waste. Reasoning over Knowledge-based Generation of Situations in Context Spaces to Reduce Food Waste (NEW2AN/ruSMART 2016, LNCS 9870 proceedings). Nungambakkam, India: Springer.
Soua, R., Kalogeiton, E., Manzo, G., Duarte, J. M., Palattella, M. R., Di Maio, A., Braun, T., Engel, T., Villas, L. A., & Rizzo, G. A. (2016). SDN coordination for CCN and FC content dissemination in VANETs. Proceedings of the 8th International Conference on Ad Hoc Networks (ADHOCNETS), Ottawa, ON, Canada (pp. 26-27). Springer.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2016). Centralized Power Control in Cognitive Radio Networks Using Modulation and Coding Classification Feedback. IEEE Transactions on Cognitive Communications and Networking, 2(3).
Dentler, J. E., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2016, September 20). A real-time model predictive position control with collision avoidance for commercial low-cost quadrotors. Paper presented at 2016 IEEE Multi-Conference on Systems and Control (MSC 2016), Buenos Aires, Argentina.
Bouvry, P., Chaumette, S., Danoy, G., Guerrini, G., Jurquet, G., Kuwertz, A., Müller, W., Rosalie, M., & Sander, J. (2016). Using Heterogeneous Multilevel Swarms of UAVs and High-Level Data Fusion to Support Situation Management in Surveillance Scenarios. 2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, MFI 2016.
Pourmoghaddaslangroudi, A., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2016). Cognitive Interference Management Techniques for the Spectral Co-existence of GSO and NGSO Satellites. International Conference on Wireless and Satellite Systems (WiSATS, formerly PSATS), Cardiff, UK, Sep 2016.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. K. (2016). On the Performance Analysis of Underlay Cognitive Radio Systems: A Deployment Perspective. IEEE Transactions on Cognitive Communications and Networking, 2(3), 273 - 287.
Afzal, H. (2016). FULL 3D RECONSTRUCTION OF DYNAMIC NON-RIGID SCENES: ACQUISITION AND ENHANCEMENT. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ottersten, B. (Promotor), Aouada, D. (Promotor), Mirbach, B. (Promotor), van der Torre, L., & Fofi, D.
Chaib Draa, K., Voos, H., Alma, M., & Darouach, M. (2016). Invariant Observer Applied to Anaerobic Digestion Model. IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Berlin 6-9 September 2016.
Derrmann, T., Frank, R., Faye, S., Castignani, G., & Engel, T. (2016). Towards Privacy-Neutral Travel Time Estimation from Mobile Phone Signalling Data. Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2).
Faye, S., Louveton, N., Gheorghe, G., & Engel, T. (2016). A Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 7(3).
Henarejos, P., Pérez Neira, A., Mazzali, N., & Mosquera, C. (2016). Advanced Signal Processing Techniques for Fixed and Mobile Satellite Communications. Proceedings on 8th Advanced Satellite Multimedia Systems Conference and 14th Signal Processing for Space Communications Workshop.
Kalantari, A., Maleki, S., Chatzinotas, S., & Ottersten, B. (2016). Frequency of Arrival-based Interference Localization Using a Single Satellite. 8th Advanced Satellite Multimedia Systems Conference 14th Signal Processing for Space Communications Workshop.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. (2016). Performance Analysis of Interweave Cognitive Radio Systems with Imperfect Channel Knowledge over Nakagami Fading Channels. 2016 IEEE 84th Vehicular Technology Conference: VTC2016-Fall. IEEE.
Kayhan, F. (2016). QAM to Circular Isomorphic Constellations. 8th Advanced Satellite Multimedia Systems Conference (ASMS/SPSC), Palma de Mallorca, Spain, 2016.
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data. International Journal of Software Engineering & Knowledge Engineering, 26(9&10), 1361–1377.
Li, L., Bissyande, T. F. D. A., Octeau, D., & Klein, J. (2016). Reflection-Aware Static Analysis of Android Apps. The 31st IEEE/ACM International Conference on Automated Software (ASE) (pp. 6).
Mengali, A., Kayhan, F., Shankar, B., & Ottersten, B. (2016). Low Complexity Transmit Processing for Multibeam Satellite Systems with Non-Linear Channels. Proceedings of ASMS Conference.
Pierina Brustolin Spagnuelo, D., Bartolini, C., & Lenzini, G. (2016). Metrics for Transparency. Proceedings of DPM 2016 and QASA 2016.
Quintanar Guzman, S., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2016, September). OPERATIONAL SPACE CONTROL OF A LIGHTWEIGHT ROBOTIC ARM ACTUATED BY SHAPE MEMORY ALLOY (SMA) WIRES. Paper presented at Smart Materials, Adaptive Structures and Intelligent Systems (SMASIS 2016), Stowe, VT.
Rodes, L., Kaushik, A., Sharma, S. K., Chatzinotas, S., & Jondral, F. (2016). Square-Law Selector and Square-Law Combiner for Cognitive Radio Systems: An Experimental Study. IEEE 84th Vehicular Technology Conference: VTC2016-Fall.
Schwickart, T. K., Voos, H., Hadji-Minaglou, J.-R., & Darouach, M. (2016). A Fast Model-Predictive Speed Controller for Minimised Charge Consumption of Electric Vehicles. Asian Journal of Control, 18(5).
Sharma, S. K., Bogale, T. E., Chatzinotas, S., Wang, X., & Le, L. B. (2016). Physical Layer Aspects of Wireless IoT. 13th International Symposium on Wireless Communication Systems.
Spano, D., Chatzinotas, S., Krause, J., & Ottersten, B. (2016). Symbol-Level Precoding with Per-antenna Power Constraints for the Multi-beam Satellite Downlink. 8th Advanced Satellite Multimedia Systems Conference (ASMS).
Zhauniarovich, Y., & Gadyatskaya, O. (2016). Small changes, big changes: an updated view on the Android permission system. Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings (pp. 346-367). Springer.
Matinnejad, R. (2016). AUTOMATED TESTING OF SIMULINK/STATEFLOW MODELS IN THE AUTOMOTIVE DOMAIN. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), & Nejati, S.
Nachtigall, N. (2016). Domain Completeness of Model Transformations and Synchronisations. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Engel, T. (Promotor), Hermann, F. (Promotor), König, B. (Promotor), Braatz, B. (Promotor), Sasnauskas, R. (Promotor), & Sorger, U.
Bartolini, C., El Kateb, D., Le Traon, Y., & Hagen, D. (2016). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? In J., Altmann, G. C., Silaghi, & O. F., Rana (Eds.), Economics of Grids, Clouds, Systems, and Services (pp. 281-295). Cham, Switzerland: Springer International Publishing.
Camenisch, J., Dubovitskaya, M., & Rial, A. (2016). UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens. Advances in Cryptology – CRYPTO 2016 (pp. 208-239). Springer Berlin Heidelberg.
Liu, B., Lucia, L., Nejati, S., Briand, L., & Bruckmann, T. (2016). Simulink Fault Localisation: an Iterative Statistical Debugging Approach. Software Testing, Verification & Reliability, 26(6), 431-459.
Goncalves Almeida Antunes, M., Barreto, J. P., & Nunes, U. (2016, August). Piecewise-Planar Reconstruction using Two Views. Image and Vision Computing.
Jimenez, M., Papadakis, M., Bissyande, T. F. D. A., & Klein, J. (2016). Profiling Android Vulnerabilities. 2016 IEEE International Conference on Software Quality, Reliability and Security (QRS 2016) (pp. 222-229). IEEE Computer Society.
Kalantari, A., Soltanalian, M., Maleki, S., Chatzinotas, S., & Ottersten, B. (2016, August). Directional Modulation via Symbol-Level Precoding: A Way to Enhance Security. IEEE Journal of Selected Topics in Signal Processing.
Lagunas, E., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2016, August). Compressive Sensing Based Energy Detector. European Signal Processing Conference (EUSIPCO).
Signorello, S., Palattella, M. R., & Grieco, L. A. (2016). Security Challenges in future NDN-Enabled VANETs. In the Proceedings of the 3rd International Workshop on the Emerging Future Internet and Network Security (EFINS 2016) - IEEE TrustCom-16.
Pan, L. (2016, July 28). Composite Learning: An Efficient Way of Parameter Estimation in Adaptive Control. Paper presented at The 35th Chinese Control Conference, 2016 Chengdu. China, China.
Pan, L., Voos, H., & Darouach, M. (2016, July 28). A Generalized Interaction Wake Model with Its Variation for Control in Wind Farms. Paper presented at The 35th Chinese Control Conference, 2016 Chengdu. China, China.
Hamadi, S., Blaiech, K., Valtchev, P., Cherkaoui, O., & State, R. (2016). Compiling packet forwarding rules for switch pipelined architecture. IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
Perrin, L. P., Udovenko, A., & Biryukov, A. (2016). Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem. In M., Robshaw & J., Katz (Eds.), Advances in Cryptology – CRYPTO 2016 (pp. 93-122). Berlin, Germany: Springer Berlin Heidelberg.
Jan, S., Nguyen, D. C., & Briand, L. (2016). Automated and Effective Testing of Web Services for XML Injection Attacks. ISSTA'16-The International Symposium on Software Testing and Analysis, Saarbrücken 18-20 July 2016 (pp. 12-23).
Faye, S., & Chaudet, C. (2016). Characterizing the Topology of an Urban Wireless Sensor Network for Road Traffic Management. IEEE Transactions on Vehicular Technology, 65(7), 5720-5725.
Hefnawy, A., Elhariri, T., Bouras, A., Cherifi, C., Robert, J., Kubler, S., & Främling, K. (2016). Lifecycle Management in the Smart City Context: Smart Parking Use-Case. 13th IFIP International Conference on Product Lifecycle Management, Columbia SC 10-13 July 2016 (Springer book Advanced ICT series). Springer.
Gharanjik, A., Shankar, B., Soltanalian, M., & Ottersten, B. (2016). An Iterative Approach to Nonconvex QCQP with Applications in Signal Processing. 2016 IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM) (pp. 1-5). IEEE.
Bayar, B., Sajadi Alamdari, S. A., Viti, F., & Voos, H. (2016, July 02). An Extended Cooperative Adaptive Cruise Control (CACC) Algorithm for Efficient Energy Consumption & Traffic Density Formulation. Paper presented at Traffic Flow Theory and Characteristics Committee (AHB45) 2016 Summer Meeting, ​Sydney, Australia.
Kannan, S., Quintanar Guzman, S., Olivares Mendez, M. A., & Voos, H. (2016, July 01). Control of Aerial Manipulation Vehicle in Operational Space. Paper presented at 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI 2016), Ploiesti, Romania.
Quintanar Guzman, S., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2016, July 01). Lightweight robotic arm actuated by Shape Memory Alloy (SMA) Wires. Paper presented at International Conference on Electronics, Computers and Artificial Intelligence, Ploiesti, Romania.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2016). Joint Compression and Feedback of CSI in Correlated multiuser MISO Channels. The 17th IEEE International workshop on Signal Processing advances in Wireless Communications.
Atashpendar, A., Dorronsoro, B., Danoy, G., & Bouvry, P. (2016). A Parallel Cooperative Coevolutionary SMPSO Algorithm for Multi-objective Optimization. IEEE International Conference on High Performance Computing Simulation (HPCS) (pp. 713–720).
Emara, K. A. A. E.-S., Woerndl, W., & Schlichter, J. (2016). Context-based Pseudonym Changing Scheme for Vehicular Adhoc Networks. Eprint/Working paper retrieved from https://arxiv.org/abs/1607.07656.
Gheorghe, G., Louveton, N., Martin, B., Viraize, B., Mougin, L., Faye, S., & Engel, T. (2016). Heat is in the Eye of the Beholder: Towards Better Authenticating on Smartglasses. Proceedings of the 9th International Conference on Human System Interaction (HSI'16).
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. (2016). Performance analysis of hybrid cognitive radio systems with imperfect channel knowledge. Communications (ICC), 2016 IEEE International Conference on. IEEE.
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study. The 28th International Conference on Software Engineering and Knowledge Engineering (SEKE 2016).
Li, D., Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). DSCo: A Language Modeling Approach for Time Series Classification. 12th International Conference on Machine Learning and Data Mining (MLDM 2016).
Li, L., Bissyande, T. F. D. A., Octeau, D., & Klein, J. (2016). DroidRA: Taming Reflection to Support Whole-Program Analysis of Android Apps. The 2016 International Symposium on Software Testing and Analysis.
Papazafeiropoulos, A., Sharma, S. K., Chatzinotas, S., Ratnarajah, T., & Ottersten, B. (2016). Impact of Transceiver Hardware Impairments on the Ergodic Channel Capacity for Rayleigh-Product MIMO Channels. Proceedings of IEEE SPAWC 2016.
Pecci, I., Martin, B., Kacem, I., Maamria, I., Faye, S., Louveton, N., Gheorghe, G., & Engel, T. (2016). Not a Tile Out of Place: Toward Creating Context-Dependent User Interfaces on Smartglasses. Proceedings of the 9th International Conference on Human System Interaction (HSI'16).
Pennanen, H., Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2016). Distributed coordinated beamforming for multi-cell multigroup multicast systems. Communications (ICC), 2016 IEEE International Conference on. IEEE.
Derrmann, T., Faye, S., Frank, R., & Engel, T. (2016, June 30). LuST-LTE: A Simulation Package for Pervasive Vehicular Connectivity. Paper presented at Mobile Tartu 2016, Tartu, Estonia.
Huynen, J.-L. (2016). Socio-Technical Aspects of Security Analysis. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ryan, P. (Promotor), Lenzini, G. (Promotor), & Koenig, V. (Promotor).
Kubler, S., Buda, A., Robert, J., & Främling, K. (2016). Building Lifecycle Management System for Enhanced Closed Loop Collaboration. 13th IFIP International Conference on Product Lifecycle Management (PLM16) (Springer book Advanced ICT series). Springer.
Decouchant, J., Ben Mokhtar, S., Petit, A., & Quéma, V. (2016, June 28). PAG: Private and Accountable Gossip. Paper presented at IEEE International Conference on Distributed Computing Systems, Nara, Japan.
Madhikermi, M., Kubler, S., Robert, J., Buda, A., & Främling, K. (2016, June 28). Data Quality Assessment of Maintenance Reporting Procedures. Expert Systems with Applications.
Ibrahim, A. A. Z. A., Kliazovich, D., & Bouvry, P. (2016). On Service Level Agreement Assurance in Cloud Computing Data Centers. IEEE 9th International Conference on Cloud Computing (CLOUD), San Francisco, USA (June 2016) (pp. 921-926).
Pejo, B., Tang, Q., & Wang, H. (2016, June 27). Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations. Paper presented at 9th IEEE International Conference on Cloud Computing (IEEE CLOUD), San Francisco, United States of America.
Rosalie, M. (2016). Templates and subtemplates of Rössler attractors from a bifurcation diagram. Journal of Physics A: Mathematical and Theoretical, 49(31), 315101.
Demisse, G., Aouada, D., & Ottersten, B. (2016). Similarity Metric For Curved Shapes In Euclidean Space. IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2016.
Appelt, D. (2016). Automated Security Testing of Web-Based Systems Against SQL Injection Attacks. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Nguyen, D. C. (Promotor), Klein, J., Pretschner, A., & Vieira, M.
Bayar, B., Sajadi Alamdari, S. A., Viti, F., & Voos, H. (2016, June 23). Impact of Different Spacing Policies for Adaptive Cruise Control on Traffic and Energy Consumption of Electric Vehicles. Paper presented at The 24th Mediterranean Conference on Control and Automation, Athens, Greece.
Dentler, J. E., Kannan, S., Olivares Mendez, M. A., & Voos, H. (2016, June 22). A Modularization Approach for Nonlinear Model Predictive Control of Distributed Fast Systems. Paper presented at 24th Mediterranean Conference on Control and Automation June 21-24, 2016. Athens, Greece, Athens, Greece.
Naghsh, M. M., Soltanalian, M., Stoica, P., Masjedi, M., & Ottersten, B. (2016). Efficient sum-rate maximization for medium-scale MIMO AF-relay networks. IEEE Transactions on Wireless Communications, 15(9), 6400 - 6411.
Sajadi Alamdari, S. A., Voos, H., & Darouach, M. (2016, June 22). Nonlinear Model Predictive Extended Eco-Cruise Control for Battery Electric Vehicles. Paper presented at The 24th Mediterranean Conference on Control and Automation, Athens, Greece.
Zhang, J., Huang, Y., Wang, J., Ottersten, B., & Yang, L. (2016). Per-antenna constant envelope precoding and antenna subset selection: A geometric approach. IEEE Transactions on Signal Processing, 64(23), 6089 - 6104.
Le, H. T., Nguyen, D. C., & Briand, L. (2016). ReACP: A Semi-Automated Framework for Reverse-engineering and Testing of Access Control Policies of Web Applications (978-2-87971-034-1).
Neshvad, S. (2016). Topology and Parameter Estimation in Power Systems Though Inverter Based Broadband Stimulations. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Sachau, J. (Promotor), Engel, T., Chatzinotas, S., Jostock, M., & Stevens, S.
Kubler, S., Robert, J., Le Traon, Y., Umbrich, J., & Neumaier, S. (2016). Open Data Portal Quality Comparison using AHP. Proceedings of the 17th International Digital Government Research Conference on Digital Government Research (pp. 397-407). New York, USA: ACM.
Signorello, S., State, R., François, J., & Festor, O. (2016, June 06). NDN.p4: Programming Information-Centric data-planes. Proceedings of the IEEE International Workshop on Open-Source Software Networking at NetSoft2016.
Ben Fadhel, A., Bianculli, D., & Briand, L. (2016). GemRBAC-DSL: a High-level Specification Language for Role-based Access Control Policies. 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016). ACM.
Bezzaoucha, S., Voos, H., & Darouach, M. (2016, June). On the Unknown Input Functional Observers Design: a Polytopic Takagi-Sugeno Approach. The 24th Mediterranean Conference on Control and Automation, MED 2016.
Biryukov, A., Dinu, D.-D., & Groszschädl, J. (2016). Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice. In M., Manulis, A.-R., Sadeghi, & S., Schneider (Eds.), Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (pp. 537-557). Springer Verlag.
Emeras, J., Varrette, S., & Bouvry, P. (2016). Amazon Elastic Compute Cloud (EC2) vs. in-House HPC Platform: a Cost Analysis. Proc. of the 9th IEEE Intl. Conf. on Cloud Computing (CLOUD 2016). San Francisco, USA: IEEE Computer Society.
Freis, S., Olivares Mendez, M. A., & Viti, F. (2016). Estimating speed profiles from aerial vision - A comparison of regression based sampling techniques. Proceedings of the IEEE 24th Mediterranean Conference on Control and Automation. IEEE.
Kubler, S., Främling, K., & Zaslavsky, A. (2016). IoT Platforms Initiative. In O., Vermesan & P., Friess (Eds.), Digitising the Industry Internet of Things Connecting the Physical, Digital and Virtual Worlds (River Publishers Series in Communications, pp. 265-292). Gistrup, Denmark: River Publishers.
Li, D., Li, L., Kim, D., Bissyande, T. F. D. A., Lo, D., & Le Traon, Y. (2016). Watch out for This Commit! A Study of Influential Software Changes (TR-SnT-2016-6). SnT.
Marosin, D., Van Zee, M., & Ghanavati, S. (2016, June). Formalizing and Modeling Enterprise Architecture (EA) Principles with Goal-oriented Requirements Language (GRL). Proceedings of the 28th International Conference on Advanced Information System Engineering (CAiSE16).
Skrobot, M., Lancrenon, J., & Tang, Q. (2016). Two More Efficient Variants of the J-PAKE Protocol. ACNS 2016.
Teubner, D., Wesslein, A.-K., Roenne, P., Veith, M., Frings, C., & Paulus, M. (2016, June). Is a visuo-haptic differentiation of zebra mussel and quagga mussel based on a single external morphometric shell character possible? Aquatic Invasions.
Pan, L. (2016, May 28). Robustness Analysis of Composite Adaptive Robot Control. Paper presented at Control and Decision Conference (CCDC), 2016 28th China.
Pan, L., Voos, H., & Darouach, M. (2016, May 28). Generalized Wake Interaction Models and Optimal Control in Wind Farms. Paper presented at Control and Decision Conference (CCDC), 2016 28th China.
Arend, B., & Caire, P. (2016). Humans and Robots in Dialogue?! Paper presented at Humans and Robots in Dialogue?!, Luxembourg, Luxembourg.
Ibrahim, A. A. Z. A., Kliazovich, D., & Bouvry, P. (2016). Service Level Agreemnet Assurance between Cloud Services Providers and CLoud Customers. In E., Butterfield (Ed.), P., Kellenberger (Ed.), & L., Harris (Other coll.), Proceedings of 16th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing CCGrid 2016 (pp. 588-591). Cartagena, Colombia: IEEE Computer Society.
Bessani, A., Neves, N. F., Verissimo, P., Wagner, D., Fonseca, A., Rui, S., Luz, P., & Correia, M. (2016, May 13). JITeR: Just-in-time application-layer routing. Computer Networks, (104), 122-136.
Gharanjik, A. (2016). TRANSMISSION OPTIMIZATION FOR HIGH THROUGHPUT SATELLITE SYSTEMS. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Ottersten, B. (Promotor), Bengtssson, M. (Promotor), Grotz, J., Ma, W.-K., & Sellathurai, M.
Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. Proceedings of the 13th International Workshop on Mining Software Repositories (pp. 468--471). New York, NY, USA: ACM.
Becker, H., Kaushik, A., Sharma, S. K., Chatzinotas, S., & Jondral, F. (2016). Experimental Study of an Underlay Cognitive Radio System: Model Validation and Demonstration. Proceedings of CROWNCOM 2016.
Bersani, M. M., Bianculli, D., Ghezzi, C., Krstic, S., & San Pietro, P. (2016). Efficient Large-scale Trace Checking Using MapReduce. Proceedings of the 38th International Conference on Software Engineering (ICSE 2016) (pp. 888-898).
Briand, L., Nejati, S., Sabetzadeh, M., & Bianculli, D. (2016). Testing the Untestable: Model Testing of Complex Software-Intensive Systems. Proceedings of the 38th International Conference on Software Engineering (ICSE 2016) Companion (pp. 789-792). ACM.
Dhakal, P., Garello, R., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2016). On the Error Performance Bound of Ordered Statistics Decoding of Linear Block Codes. Proceedings of International Conference on Communications (ICC). IEEE.
Dhakal, P., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Riviello, D. (2016). Effect of Primary User Traffic on Largest Eigenvalue Based Spectrum Sensing Technique. Proceedings of International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM).
Fiandrino, C., Kliazovich, D., Bouvry, P., & Zomaya, A. Y. (2016). Network Coding-based Content Distribution in Cellular Access Networks. IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. (2016). Performance Analysis of Hybrid Cognitive Radio Systems with Imperfect Channel Knowledge. Proceedings of International Conference on Communications (ICC).
Li, L. (2016). Boosting Static Analysis of Android Apps through Code Instrumentation. The Doctoral Symposium of 38th International Conference on Software Engineering (ICSE-DS 2016).
Mansoor, B., Nawaz, S. J., Amin, B., Sharma, S. K., & Patwary, M. (2016). Superimposed Training based Estimation of Sparse MIMO Channels for Emerging Wireless Networks. Proceedings of ICT 2016.
Mazzali, N., Kayhan, F., & Shankar, B. (2016). Four-Dimensional Constellations for Dual-Polarized Satellite Communications. Proceedings on IEEE International Conference on Communications.
Mengali, A., Shankar, B., & Ottersten, B. (2016). Joint Predistortion and PAPR Reduction in Multibeam Satellite Systems. Proceedings of IEEE ICC 2016.
Naghsh, M. M., Soltanalian, M., Stoica, P., Masjedi, M., & Ottersten, B. (2016). Rate optimization for massive MIMO relay networks: A minorization-maximization approach. Acoustics, Speech and Signal Processing (ICASSP), 2016 IEEE International Conference on. IEEE.
Papazafeiropoulos, A., Sharma, S. K., & Chatzinotas, S. (2016, May). MMSE Filtering Performance of DH-AF Massive MIMO Relay Systems with Residual Transceiver Impairments. Proceedings of IEEE ICC 2016.
Ruiu, P., Bianco, A., Fiandrino, C., Giaccone, P., & Kliazovich, D. (2016). Power Comparison of Cloud Data Center Architectures. IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016.
Shankar, B., Maleki, S., Zheng, G., Awoseyila, A., Evans, B., & Ottersten, B. (2016). GEO Satellite Feeder links and Terrestrial Full-Duplex Small Cells: A case for Coexistence. Proceedings of 83rd IEEE VTC (Spring 2016).
Biryukov, A., Perrin, L. P., & Udovenko, A. (2016). Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. In C. J.-S., Fischlin, Marc (Ed.), Advances in Cryptology – EUROCRYPT 2016 (pp. 372-402). Springer Berlin Heidelberg.
Brühl, M., Sauer, D. U., & Hadji-Minaglou, J.-R. (2016, April 26). Experimental Lifetime Investigation of Series Connected Li-ion Cells at Different Operation Strategies. Poster session presented at Battery Conference 2016, Münster, Germany.
Di Nardo, D. (2016). Model-Based Test Automation Strategies for Data Processing Systems. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor).
Kalantari, A. (2016). SIGNAL PROCESSING FOR PHYSICAL LAYER SECURITY WITH APPLICATION IN SATELLITE COMMUNICATIONS. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ottersten, B. (Promotor), Chatzinotas, S. (Promotor), Viti, F., Vandendorpe, L., & Krause, J.
Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., Bartel, A., Octeau, D., Klein, J., & Le Traon, Y. (2016). Static Analysis of Android Apps: A Systematic Literature Review. SnT.
Li, L., Li, D., Bissyande, T. F. D. A., Lo, D., Klein, J., & Le Traon, Y. (2016). Ungrafting Malicious Code from Piggybacked Android Apps. SnT.
Asmussen, N., Volp, M., Nöthen, B., Härtig, H., & Fettweis, G. (2016). M3: A Hardware/Operating-System Co-Design to Tame Heterogeneous Manycores. Architectural Support for Programming Languages and Operating Systems (ASPLOS). Atlanta, GA, USA.
Ben Fadhel, A., Bianculli, D., & Briand, L. (2016). GemRBAC-DSL: a High-level Specification Language for Role-based Access Control Policies (TR-SNT-2016-4). SnT Centre - University of Luxembourg.
Faye, S., Louveton, N., Gheorghe, G., & Engel, T. (2016). Toward a Characterization of Human Activities using Smart Devices: A Micro/Macro Approach. Proceedings of the 7th IEEE INFOCOM International Workshop on Mobility Management in the Networks of the Future World.
Hartmann, T., Moawad, A., Fouquet, F., Reckinger, Y., Klein, J., & Le Traon, Y. (2016). Near Real-Time Electric Load Approximation in Low Voltage Cables of Smart Grids with Models@run.time. 31st Annual ACM Symposium on Applied Computing (SAC'16) (pp. 2119--2126).
Kieffer, E., Danoy, G., & Bouvry, P. (2016, April). On Bi-level approach for Scheduling problems. Paper presented at New Challenges in Scheduling Theory.
Kracheel, M. (2016). Changing Commuter Behaviour through Gamification. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Martin, R. (Promotor), Koenig, V., McCall, R., Walz, S., & Viti, F.
Li, L., Li, D., Bartel, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Towards a Generic Framework for Automating Extensive Analysis of Android Applications. The 31st ACM/SIGAPP Symposium on Applied Computing (SAC 2016).
Mizera, A., Pang, J., & Yuan, Q. (2016). Parallel Approximate Steady-state Analysis of Large Probabilistic Boolean Networks. Proceedings of the 31st ACM Symposium on Applied Computing. ACM.
Titcheu Chekam, T., Ennan, Z., Zhenhua, L., Yong, C., & Kui, R. (2016). On the Synchronization Bottleneck of OpenStack Swift-like Cloud Storage Systems. IEEE International Conference on Computer Communications, San Francisco, CA 10-15 April 2016 (pp. 9). IEEE Xplore®.
Van Zee, M., & Doder, D. (2016). AGM-Style Revision of Beliefs and Intentions from a Database Perspective (Preliminary Version). Proceedings of the 16th International Workshop on Non-Monotonic Reasoning.
Geng, Y., Noh, J., Drevensek-Olenik, I., Rupp, R., Lenzini, G., & Lagerwall, J. (2016). High-fidelity spherical cholesteric liquid crystal Bragg reflectors generating unclonable patterns for secure authentication. Scientific Reports, 6(26840), 1-8.
Soltanalian, M., Gharanjik, A., Shankar, B., & Ottersten, B. (2016). Grab-n-Pull: An Optimization Framework for Fairness-Achieving Networks. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2016.
Mauw, S., Toro Pozo, J. L., & Trujillo Rasua, R. (2016, March 16). A class of precomputation-based distance-bounding protocols. Paper presented at Grande Region Security and Reliability Day 2016, Nancy, France.
Verissimo, P., & Decouchant, J. (2016, March 16). The big data deluge in biomedicine: addressing the privacy vs. sharing dilemma. Paper presented at Grande Region Security and Reliability Day, Nancy, France.
Gonzalez-Herrera, I., Bourcier, J., Daubert, E., Rudametkin, W., Barais, O., Fouquet, F., Jézéquel, J.-M., & Baudry, B. (2016, March 15). ScapeGoat: Spotting abnormal resource usage in component-based reconfigurable software systems. Journal of Systems and Software.
Olivares Mendez, M. A., Sanchez-Lopez, J. L., Jimenez, F., Campoy, P., Sajadi Alamdari, S. A., & Voos, H. (2016). Vision-Based Steering Control, Speed Assistance and Localization for Inner-CityVehicles. Sensors, 16(3), 362.
Appelt, D., Nguyen, D. C., & Briand, L. (2016). Automated Testing of Web Application Firewalls (TR-SnT-2016-1).
Ben Fadhel, A., Bianculli, D., Briand, L., & Hourte, B. (2016). A model-driven approach to representing and checking RBAC contextual policies. Proceedings of the 6th ACM Conference on Data and Application Security and Privacy (CODASPY 2016) (pp. 243-253).
Biryukov, A., Leurent, G., & Perrin, L. P. (2016). Cryptanalysis of Feistel Networks with Secret Round Functions. In O., Dunkelman & L., Keliher (Eds.), Selected Areas in Cryptography -- SAC 2015, 21st International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers (pp. 102-121). Springer International Publishing.
Gao, N., Darouach, M., Voos, H., & Alma, M. (2016). New unified H-infinity dynamic observer design for linear systems with unknown inputs. Automatica, 65, 43-52.
Kalantari, A., Soltanalian, M., Maleki, S., Chatzinotas, S., & Ottersten, B. (2016). Secure M-PSK Communication via Directional Modulation. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
Kim, S.* , & Kim, D.* . (2016). Automatic Identifier Inconsistency Detection Using Code Dictionary. Empirical Software Engineering, 21(2), 565-604.
* These authors have contributed equally to this work.
Lagunas, E., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2016). Compressive Sensing based Target Counting and Localization Exploiting Joint Sparsity. Proc. IEEE ICASSP 2016.
Lancrenon, J. (2016). On Password-Authenticated Key Exchange Security Modeling. In F., Stajano, S., Mjolsnes, G., Jenkinson, & P., Thorsheim (Eds.), Technology and practice of passwords: 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9, 2015, Proceedings. Springer.
Li, D., Bissyande, T. F. D. A., Kubler, S., Klein, J., & Le Traon, Y. (2016). Profiling household appliance electricity usage with n-gram language modeling. The 2016 IEEE International Conference on Industrial Technology (ICIT 2016).
Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). An Investigation into the Use of Common Libraries in Android Apps. The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 12).
Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Parameter Values of Android APIs: A Preliminary Study on 100,000 Apps. The 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016) (pp. 5).
Perez Urquidi, J. M., Lancrenon, J., Khader, D., & Chen, L. (2016). Attribute-Based Signatures with Controllable Linkability. In M., Yung, J., Zhang, & Z., Yang (Eds.), Trusted Systems: 7th International Conference, INTRUST 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers (pp. 114-129). Springer.
Pérez-Neira, A. I., Veciana, J. M., Vazquez, M. A., & Lagunas, E. (2016, March). Distributed Power Control with Received Power Constraints for Time-Area-Spectrum Licenses. ELSEVIER Signal Processing.
Pierina Brustolin Spagnuelo, D., & Lenzini, G. (2016, March). Patient-Centred Transparency Requirements for Medical Data Sharing Systems. Proceedings of the 4th World Conference on Information Systems and Technologies.
Rizzo, G., Palattella, M. R., Braun, T., & Engel, T. (2016). Content and Context Aware Strategies for QoS Support in VANETs. Proc. of Int. Conf. on Advanced Information Networking and Applications (AINA-2016).
Rogstad, E., & Briand, L. (2016). Clustering Deviations for Black Box Regression Testing of Database Applications. IEEE Transactions on Reliability, 65(1), 4-18.
Sannier, N., Adedjouma, M., Sabetzadeh, M., & Briand, L. (2016). Automated Classification of Legal Cross References Based on Semantic Intent. 22nd International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ'16).
Tricoire, M., Barais, O., Leduc, M., Bourcier, J., Fouquet, F., Nain, G., Mouline, L., Sunyé, G., & Morin, B. (2016). KevoreeJS: Enabling dynamic software reconfigurations in the Browser. WICSA/CompArch 2016 Proceedings.
Vu, T. X., Nguyen, T. V., & Quek, T. Q. S. (2016). Power Optimization With BLER Constraint for Wireless Fronthauls in C-RAN. IEEE Communications Letters, 20(3), 602 - 605.
Bartolini, C. (2016, February 19). Mutating OWLs: semantic mutation testing for ontologies. Paper presented at International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn (AMARETTO), in conjunction with the 4th International Conference on Model-Driven Engineering and Software Development (MODELSWARD), Rome, Italy.
Bartolini, C. (2016, February 03). Ontology mutation testing. Paper presented at ILIAS seminar, Luxembourg, Luxembourg.
Bartolini, C., & Siry, L. (2016). The right to be forgotten in the light of the consent of the data subject. Computer Law & Security Review, 32(2).
Biryukov, A., & Khovratovich, D. (2016). Equihash: asymmetric proof-of-work based on the Generalized Birthday problem. Proceedings of NDSS 2016 (pp. 13).
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. K. (2016, February). Sensing-Throughput Tradeoff for Interweave Cognitive Radio System: A Deployment-Centric Viewpoint. IEEE Transactions on Wireless Communications.
Panchenko, A., Lanze, F., Zinnen, A., Henze, M., Pennekamp, J., Wehrle, K., & Engel, T. (2016). Website Fingerprinting at Internet Scale. Proceedings of the 23rd Internet Society (ISOC) Network and Distributed System Security Symposium (NDSS 2016).
Glauner, P., & State, R. (2016, January 19). Deep Learning Concepts from Theory to Practice. Paper presented at FinTech R&D Innovation Conference, Luxembourg, Luxembourg.
Neshvad, S., Margossian, H., & Sachau, J. (2016, January 13). Topology and Parameter Estimation in Power Systems through Inverter Based Broadband Stimulations. IET Generation, Transmission & Distribution.
Moawad, A. (2016). Towards Ambient Intelligent Applications Using Models@run.time And Machine Learning For Context-Awareness. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Navet, N., Fouquet, F., Rouvoy, R., & Sahraoui, H.
Dave, B., Kubler, S., Främling, K., & Koskela, L. (2016). Opportunities for enhanced lean construction management using Internet of Things standards. Automation in Construction, 61, 86-97.
Octeau, D., Jha, S., Dering, M., McDaniel, P., Bartel, A., Li, L., Klein, J., & Le Traon, Y. (2016). Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-component Analysis. The 43rd Symposium on Principles of Programming Languages (POPL 2016).
Sharma, S. K., Lagunas, E., Chatzinotas, S., & Ottersten, B. (2016, January). Application of Compressive Sensing in Cognitive Radio Communications: A Survey. IEEE COMMUNICATION SURVEYS & TUTORIALS.
Sharma, S. K., Patwary, M., & Chatzinotas, S. (2016). Multiple Access Techniques for Next Generation Wireless: Recent Advances and Future Perspectives. EAI Endorsed Transactions on Wireless Spectrum, 2(7).
Adebayo, K., Di Caro, L., Robaldo, L., & Boella, G. (2016). Textual Inference with Deep Learning Technique. Proc. of the 28th Annual Benelux Conference on Artificial Intelligence (BNAIC2016).
Al Ismaeil, K., Aouada, D., Mirbach, B., & Ottersten, B. (2016). Enhancement of Dynamic Depth Scenes by Upsampling for Precise Super-Resolution (UP-SR). Computer Vision and Image Understanding.
Al Ismaeil, K., Aouada, D., Solignac, T., Mirbach, B., & Ottersten, B. (2016). Real-Time Enhancement of Dynamic Depth Videos with Non-Rigid Deformations. IEEE Transactions on Pattern Analysis & Machine Intelligence.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2016). Energy-Efficient Symbol-Level Precoding in Multiuser MISO Based on Relaxed Detection Region. IEEE Transactions on Wireless Communications.
Ambrossio, D. A., Parent, X., & van der Torre, L. (2016). Cumulative Aggregation. Deontic Logic and Normative Systems.
Ambrossio, D. A., Parent, X., & van der Torre, L. (2016). A Representation Theorem for Abstract Cumulative Aggregation. 978-2-87971-152-2/TR-SNT-2016-5.
Andrenacci, S., Chatzinotas, S., Vanelli-Coralli, A., Cioni, S., Ginesi, A., & Ottersten, B. (2016). Exploiting orthogonality in DVB-S2X through time pre-compensation. Proceedings of 2016 8th Advanced Satellite Multimedia Systems Conference and the 14th Signal Processing for Space Communications Workshop.
Andrenacci, S., Spano, D., Christopoulos, D., Chatzinotas, S., Krause, J., & Ottersten, B. (2016). Optimized Link Adaptation for DVB-S2X Precoded Waveforms based on SNIR Estimation. Asilomar Conference on Signals, Systems, and Computers 2016.
Arcuri, A., & Fraser, G. (2016). Java Enterprise Edition Support in Search-Based JUnit Test Generation. Java Enterprise Edition Support in Search-Based JUnit Test Generation.
Arcuri, A., Jose, C., & Gordon, F. (2016). Unit Test Generation During Software Development: EvoSuite Plugins for Maven, IntelliJ and Jenkins. IEEE International Conference on Software Testing, Verification and Validation (ICST).
Ben Abdessalem (helali), R., Nejati, S., Briand, L., & Stifter, T. (2016). Testing Advanced Driver Assistance Systems using Multi-objective Search and Neural Networks. International Conference on Automated Software Engineering (ASE 2016) (pp. 63-74). ACM.
Bezzaoucha, S., Voos, H., & Darouach, M. (2016). A Polytopic Approach for the Nonlinear Unknown Input Functional Observers Design: Application to a Quadrotor Aerial Robots Landing. Paper presented at 2016 European Control Conference.
bikakis, A., Caire, P., clark, K., Cornelius, G. P., ma, J., miller, R., russo, A., & Voos, H. (2016). Collaborative Explanation and Response in Assisted Living Environments Enhanced with Humanoid Robots. Collaborative Explanation and Response in Assisted Living Environments Enhanced with Humanoid Robots.
Biryukov, A., Dinu, D.-D., & Khovratovich, D. (2016). Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other Applications. IEEE European Symposium on Security and Privacy (pp. 292-302).
Biryukov, A., Khovratovich, D., & Perrin, L. P. (2016). Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs. IACR Transactions on Symmetric Cryptology, 2016(2), 226-247.
Biryukov, A., Velichkov, V., & Le Corre, Y. (2016). Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. Fast Software Encryption - FSE 2016.
Boella, G., Di Caro, L., Humphreys, L., Robaldo, L., Rossi, P., & van der Torre, L. (2016). Eunomos, a legal document and knowledge management system for the Web to provide relevant, reliable and up-to-date information on the Law. Artificial Intelligence & Law.
Caire, P., Moawad, A., Efthymiou, V., bikakis, A., & Le Traon, Y. (2016). Privacy Challenges in Ambient Intelligence Systems. Journal of Ambient Intelligence and Smart Environments.
Ceccato, M., Nguyen, D. C., Appelt, D., & Briand, L. (2016). SOFIA: An Automated Security Oracle for Black-Box Testing of SQL-Injection Vulnerabilities. Proceedings of the 31th IEEE/ACM International Conference on Automated Software Engineering.
Chatzinotas, S., Evans, B., Guidotti, A., Icolari, V., Lagunas, E., Maleki, S., Sharma, S. K., Tarchi, D., Thompson, P., & Vanelli-Coralli, A. (2016). Cognitive approaches to enhance spectrum availability for satellite systems. International Journal of Satellite Communications and Networking.
Christopoulos, D., Andrenacci, S., Spano, D., Chatzinotas, S., Krause, J., & Ottersten, B. (2016). Multibeam joint processing satellites: cooperative relays, high above. Advanced Relay Technologies in Next Generation Wireless Communication, Telecommunications. Institution of Engineering and Technology.
Codeca, L., Frank, R., Faye, S., & Engel, T. (2016). Luxembourg SUMO Traffic (LuST) Scenario: Traffic Demand Evaluation. IEEE Intelligent Transportation Systems Magazine.
Correa Bahnsen, A., Aouada, D., Stojanovic, A., & Ottersten, B. (2016). Feature Engineering Strategies for Credit Card Fraud Detection. Expert Systems with Applications, 51, 134–142.
Creutzig, T., Hikida, Y., & Roenne, P. (2016). Correspondences between WZNW models and CFTs with W-algebra symmetry. JHEP, 02, 048.
De Caro, A.* , & Iovino, V.* . (2016). On the Power of Rewinding Simulators in Functional Encryption. Designs, Codes and Cryptography.
* These authors have contributed equally to this work.
De caro, A., Iovino, V., & O'Neill, A. (2016). Deniable Functional Encryption. Public-key Cryptography - PKC 2016, 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I (1, pp. 27). Springer.
Delerue Arriaga, A., Barbosa, M., & Farshim, P. (2016). Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation. In O., Dunkelman & S. K., Sanadhya (Eds.), Progress in Cryptology -- INDOCRYPT 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings. Springer.
Delerue Arriaga, A., Iovino, V., & Tang, Q. (2016). Updatable Functional Encryption. Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers. Springer.
Dinu, D.-D., Perrin, L. P., Udovenko, A., Velichkov, V., Groszschädl, J., & Biryukov, A. (2016). Design Strategies for ARX with Provable Bounds: SPARX and LAX. In J. H., Cheon & T., Takagi (Eds.), Advances in Cryptology - ASIACRYPT 2016 (pp. 484-513). Springer Berlin Heidelberg.
Dolberg, L., François, J., Chowdhury, S. R., Ahmed, R., Boutaba, R., & Engel, T. (2016). A Generic Framework to Support Application-Level Flow Management in Software-Defined Networks. Conference on Network Softwarization (Netsoft).
Emara, K. A. A. E.-S. (2016). Poster: PREXT: Privacy Extension for Veins VANET Simulator. Poster session presented at IEEE Vehicular Networking Conference (VNC), Columbus, Ohio, Ohio, USA.
Emeras, J., Besseron, X., Varrette, S., Bouvry, P., & Peters, B. (2016). HPC or the Cloud: a cost study over an XDEM Simulation. Proc. of the 7th International Supercomputing Conference in Mexico (ISUM 2016). Puebla, México.
Fan, Y., Nowaczyk, S. L., Rögnvaldsson, T., & Antonelo, E. A. (2016). Predicting Air Compressor Failures with Echo State Networks. Third European Conference of the Prognostics and Health Management Society 2016, Bilbao, Spain, 5-8 July, 2016.
Ferreira, A., & Lenzini, G. (2016). Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare. Proc. of the nd Int. Conference on International Conference in Information Systems Security and Privacy (ICISSP). Springer.
Fraile, M., Ford, M., Gadyatskaya, O., Kumar, R., Stoelinga, M., & Trujillo Rasua, R. (2016). Using attack-defense trees to analyze threats and countermeasures in an ATM: a case study. IFIP Working Conference on The Practice of Enterprise Modeling (pp. 326-334).
Gadyatskaya, O. (2016). How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems. Proc. of GraMSec 2015. Springer.
Gadyatskaya, O., Hansen, R. R., Larsen, K. G., Legay, A., Olesen, M. C., & Poulsen, D. B. (2016). Modelling Attack-defense Trees Using Timed Automata. Proc. of FORMATS. Springer.
Gadyatskaya, O., Harpes, C., Mauw, S., Muller, C., & Muller, S. (2016). Bridging two worlds: Reconciling practical risk assessment methodologies with theory of attack trees. Proc. of GraMSec. Springer.
Gadyatskaya, O., Jhawar, R., Kordy, P., Lounis, K., Mauw, S., & Trujillo Rasua, R. (2016). Attack trees for practical security assessment: ranking of attack scenarios with ADTool 2.0. Quantitative Evaluation of Systems - 13th International Conference (Lecture Notes in Computer Science, pp. 159--162). Quebec, Canada: Springer.
Gadyatskaya, O., Labunets, K., & Paci, F. (2016). Towards Empirical Evaluation of Automated Risk Assessment Methods. Risks and Security of Internet and Systems. Springer.
Gadyatskaya, O., Lezza, A.-L., & Zhauniarovich, Y. (2016). Evaluation of Resource-based App Repackaging Detection in Android. Proc. of NordSec. Springer.
Gallegos-Garcia, G., Iovino, V., Roenne, P., & Ryan, P. (2016). (Universal) Unconditional Verifiability in E-Voting without Trusted Parties. Eprint/Working paper retrieved from http://eprint.iacr.org/2016/975.
Giorgione, G., Viti, F., & Seredynski, M. (2016). Robust control strategy for minimising energy consumption of electric buses using cooperative ITS technology. Paper presented at 28th European Conference on Operational Research, Poznan.
Giurgiu, A., & Larsen, T. (2016). Roles and Powers of National Data Protection Authorities Moving from Directive 95/46/EC to the GDPR: Stronger and More ‘European’ DPAs as Guardians of Consistency? European Data Protection Law Review, 2(3), 342 - 352.
Giustolisi, R., Iovino, V., & Rønne, P. (2016). On the Possibility of Non-Interactive E-Voting in the Public-key Setting. Financial Cryptography and Data Security, FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Springer.
Glauner, P. (2016). Deep Learning For Smile Recognition. Proceedings of the 12th International FLINS Conference (FLINS 2016).
Glauner, P. (2016). Detecting Electricity Theft. Poster session presented at Machine Learning Summer School, Cadiz, Spain.
Glauner, P., Boechat, A., Dolberg, L., State, R., Bettinger, F., Rangoni, Y., & Duarte, D. (2016). Large-Scale Detection of Non-Technical Losses in Imbalanced Data Sets. Proceedings of the Seventh IEEE Conference on Innovative Smart Grid Technologies (ISGT 2016).
Glauner, P., Meira, J. A., Dolberg, L., State, R., Bettinger, F., Rangoni, Y., & Duarte, D. (2016). Neighborhood Features Help Detecting Non-Technical Losses in Big Data Sets. Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing Applications and Technologies (BDCAT 2016).
Goncalves Almeida Antunes, M., Aouada, D., & Ottersten, B. (2016). A Revisit to Human Action Recognition from Depth Sequences: Guided SVM-Sampling for Joint Selection. IEEE Winter Conference on Applications of Computer Vision (WACV), 2016.
Goncalves Almeida Antunes, M., Baptista, R., Demisse, G., Aouada, D., & Ottersten, B. (2016). Visual and human-interpretable feedback for assisting physical activity. European Conference on Computer Vision (ECCV) Workshop on Assistive Computer Vision and Robotics Amsterdam.
Gonzalez-Herrera, I., Bourcier, J., Rudametkin, W., Barais, O., & Fouquet, F. (2016). Squirrel: Architecture Driven Resource Management. 31st Annual ACM Symposium on Applied Computing (SAC'16).
Gordon, F., & Arcuri, A. (2016). EvoSuite at the SBST 2016 Tool Competition. The 9th International Workshop on SEARCH-BASED SOFTWARE TESTING (SBST).
Gottmann, S., Nachtigall, N., Ermel, C., Hermann, F., & Engel, T. (2016). Towards the Propagation of Model Updates along different Views in Multi-View Models. Proceedings of the 5th International Workshop on Bidirectional Transformations, 1571, 45-60.
Haus, M., Emara, K. A. A. E.-S., & Ott, J. (2016). Privacy-Preserving Proximity Services. Munich, Germany: Technische Universität München.
Henard, C., Papadakis, M., Harman, M., Jia, Y., & Le Traon, Y. (2016). Comparing White-box and Black-box Test Prioritization. 38th International Conference on Software Engineering (ICSE'16).
Hurier, M., Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware. Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference (pp. 142--162). Springer.
Iovino, V., Tang, Q., & Zebrowski, K. (2016). On the power of Public-key Function-Private Functional Encryption. 15th International Conference on Cryptology and Network Security. Springer Seciurity and Cryptology.
Jamroga, W., & Tabatabaei, M. (2016). Information Security as Strategic (In)effectivity. 12th International Workshop on Security and Trust Management (STM), 2016.
Jamroga, W., & Tabatabaei, M. (2016). Preventing Coercion in E-Voting: Be Open and Commit. Proceedings of the 12th International Joint Conference on Electronic Voting (E-Vote-ID).
Jhawar, R., Lounis, K., & Mauw, S. (2016). A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. 12th International Workshop on Security and Trust Management.
Jhawar, R., Mauw, S., & Zakiuddin, I. (2016). Automating Cyber Defense Response Using Attack-Defence Trees and Game Theory. The 15th European Conference on Cyber Warfare and Security (pp. 163-172).
Kannan, S., Bezzaoucha, S., Quintanar Guzman, S., Olivares Mendez, M. A., & Voos, H. (2016). Adaptive Control of Robotic arm with Hysteretic Joint. International Conference on Control, Mechatronics and Automation (ICCMA'16) (pp. 46-50). ACM.
Kannan, S., Sajadi Alamdari, S. A., Dentler, J. E., Olivares Mendez, M. A., & Voos, H. (2016). Model Predictive Control for Spacecraft Rendezvous. 2016 (pp. 121-125). Barcelona, Spain: ACM.
Kayhan, F. (2016). High Order APSK Constellation Design for Next Generation Satellite Communication. Paper presented at 34th AIAA International Communications Satellite Systems Conferences (ICSSC).
Kieffer, E., Danoy, G., Bouvry, P., & Nagih, A. (2016). Hybrid mobility model with pheromones for UAV detection task. Hybrid mobility model with pheromones for UAV detection task.
Kieffer, E., Guzek, M., Danoy, G., Bouvry, P., & Nagih, A. (2016). A Novel Co-evolutionary Approach for Constrained Genetic Algorithms. Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion (pp. 47--48). New York, NY, USA: ACM.
Kintis, M., Papadakis, M., Papadopoulos, A., Valvis, E., & Malevris, N. (2016). Analysing and Comparing the Effectiveness of Mutation Testing Tools: A Manual Study. International Working Conference on Source Code Analysis and Manipulation (SCAM'16).
Kliazovich, D., Pecero, J. E., Tchernykh, A., Bouvry, P., khan, S. U., & Zomaya, A. Y. (2016). CA-DAG: Modeling Communication-Aware Applications for Scheduling in Cloud Computing. Journal of Grid Computing, 14(1), 23-39.
Lagunas, E., Maleki, S., Chatzinotas, S., Soltanalian, M., Perez-Neira, A. I., & Ottersten, B. (2016). Power and Rate Allocation in Cognitive Satellite Uplink Networks. IEEE International Conference on Communications, ICC 2016.
Lenzini, G., Mauw, S., & Ouchani, S. (2016). Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. In G., Barthe & E., Markatos (Eds.), Security and Trust Management - STM 2016. Springer-Verlag.
Li, L., Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Mining Families of Android Applications for Extractive SPL Adoption. The 20th International Systems and Software Product Line Conference (SPLC 2016).
Li, Y., Duan, K., Lv, L., Pang, J., & Cai, S. (2016). A novel approach to parameterized verification of cache coherence protocols. Proceedings of the 34th IEEE International Conference on Computer Design (pp. 560-567). IEEE Computer Society.
Lin, Q., Hammerschmidt, C., Pellegrino, G., & Verwer, S. (2016). Short-term Time Series Forecasting with Regression Automata. Poster session presented at ACM SIGKDD 2016 Workshop on Mining and Learning from Time Series (MiLeTS).
Liu, B., Lucia, L., Nejati, S., Briand, L., & Bruckmann, T. (2016). Localizing Multiple Faults in Simulink Models. 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016).
Louveton, N., Mccall, R., Koenig, V., Avanesov, T., & Engel, T. (2016). Driving while using a smartphone-based mobility application: Evaluating the impact of three multi-choice user interfaces on visual-manual distraction. Applied Ergonomics, 54, 196-204.
Machalek, A., & Dunlop, D. (2016). Collaboration Web - Social Computing Technology for Emergency Data Interoperability. Paper presented at ACCSE2016, The First International Conference on Advances in Computation, Communications and Services, Valencia, Spain.
Machalek, A., Dunlop, D., Balogh, Z., Gatial, E., & Hluchy, L. (2016). REDIRNET – Emergency Responder Data Interoperability Network. Paper presented at IEEE-INDIN 2016 - 14th International Conference on Industrial Informatics, Poitiers, France.
Machalek, A., Dunlop, D., Simon, C., & Hoben, R. (2016). Visual Public Protection Disaster Relief and Critical Infrastructure. Paper presented at VISUAL 2016 - The First International Conference on Applications and Systems of Visual Paradigms, Barcelona, Spain.
Maleki, S., Ciblat, P., Chatzinotas, S., Shankar, B., & Ottersten, B. (2016). Cooperative Estimation of Power and Direction of Transmission for a Directive Source. IEEE Transactions on Cognitive Communications and Networking.
Maleki, S., Ciblat, P., Shankar, B., Chatzinotas, S., & Ottersten, B. (2016). Power and Direction of Transmission Estimation for a Directive Source: Identifiability Analysis and Estimation Algorithm. 2016 IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM).
Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Name Suggestions during Feature Identification: The VariClouds Approach. 20th International Systems and Software Product Line Conference (SPLC 2016) proceedings.
Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Feature Location Benchmark for Software Families using Eclipse Community Releases. Software Reuse: Bridging with Social-Awareness, ICSR 2016 Proceedings.
Matinnejad, R., Nejati, S., Briand, L., & Bruckamnn, T. (2016). SimCoTest: A Test Suite Generation Tool for Simulink/Stateflow Controllers. Proceedings of the 38th International Conference on Software Engineering.
Matinnejad, R., Nejati, S., Briand, L., & Bruckmann, T. (2016). Automated Test Suite Generation for Time-Continuous Simulink Models. proceedings of the 38th International Conference on Software Engineering.
Mauw, S., Toro Pozo, J. L., & Trujillo Rasua, R. (2016). A Class of Precomputation-based Distance-bounding Protocols. 1st IEEE European Symposium on SECURITY and PRIVACY.
Mauw, S., Trujillo Rasua, R., & Xuan, B. (2016). Counteracting active attacks in social network graphs. Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (Lecture Notes in Computer Science, pp. 233--248). Springer.
Meira, J. A., Almeira, E. C. D., Kim, D., Filho, E. R. L., & Le Traon, Y. (2016). “Overloaded!” — A Model-based Approach to Database Stress Testing. International Conference on Database and Expert Systems Applications, Porto 5-8 September 2016.
Merz, S., Pang, J., & Dong, J. S. (2016). Editorial (ICFEM 14 special issue, part I). Formal Aspects of Computing, 28(3), 343-344.
Mizera, A., Pang, J., & Yuan, Q. (2016). ASSA-PBN 2.0: A software tool for probabilistic Boolean networks. Proceedings of 14th International Conference on Computational Methods in Systems Biology (pp. 309-315). Berlin, Germany: Springer.
Mizera, A., Pang, J., & Yuan, Q. (2016). Fast simulation of probabilistic Boolean networks. Proceedings of 14th International Conference on Computational Methods in Systems Biology (pp. 216-231). Berlin, Germany: Springer.
Mizera, A., Pang, J., & Yuan, Q. (2016). GPU-accelerated steady-state analysis of probabilistic Boolean networks. Poster session presented at 14th International Conference on Computational Methods in Systems Biology.
Muthuri, R., Boella, G., Hulstijn, J., & Humphreys, L. (2016). Argumentation-Based Legal Requirements Engineering: The Role of Legal Interpretation in Requirements Acquisition. Requirements Engineering Conference Workshops (REW), IEEE International.
Nejati, S., Sabetzadeh, M., Arora, C., Briand, L., & Mandoux, F. (2016). Automated Change Impact Analysis between SysML Models of Requirements and Design. 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering, Seattle 13-18 November 2016.
Ni, M., Zhang, Y., Han, W., & Pang, J. (2016). An Empirical Study on User Access Control in Online Social Networks. Proceedings of the 21st ACM Symposium on Access Control Models and Technologies (SACMAT'16) (pp. 13-23). ACM.
Palattella, M. R., Dohler, M., Grieco, L. A., Rizzo, G., Torsen, J., Engel, T., & Ladid, L. (2016). Internet of Things in the 5G Era: Enablers, Architecture and Business Models. IEEE Journal on Selected Areas In Communications.
Pang, J., & Stoelinga, M. (2016). Selected and extended papers from ACM SVT 2014. Science of Computer Programming.
Pang, J., Zablotskaia, P., & Zhang, Y. (2016). On impact of weather on human mobility in cities. Proceedings of the 17th International Conference on Web Information System Engineering (pp. 247-256). Springer Science & Business Media B.V.
Perrin, L. P., & Udovenko, A. (2016). Algebraic Insights into the Secret Feistel Network. In T., Peyrin (Ed.), Fast Software Encryption - 23rd International Workshop, FSE 2016, Bochum, March 20-23, 2016 (pp. 378-398). Springer-Verlag Berlin Heidelberg.
Piro, G., Signorello, S., Palattella, M. R., Grieco, L. A., Boggia, G., & Engel, T. (2016). Understanding the Social impact of ICN: between myth and reality. Springer AI & Society: Journal of Knowledge, Culture and Communication.
Politis, C., Maleki, S., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2016). Harmful Interference Threshold and Energy Detector for On-Board Interference Detection. 22nd Ka and Broadband Communications Conference 2016.
Politis, C., Maleki, S., Tsinos, C., Chatzinotas, S., & Ottersten, B. (2016). On-board the Satellite Interference Detection with Imperfect Signal Cancellation. 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
Pourmoghaddaslangroudi, A., Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2016). On the apectral coexistence of GSO and NGSO FSS systems: power control mechanisms and a methodology for inter-site distance determination. International Journal of Satellite Communications and Networking.
Rahli, V. (2016). Exercising Nuprl's Open-Endedness. The 5th International Congress on Mathematical Software.
Rahli, V., & Bickford, M. (2016). A Nominal Exploration of Intuitionism. The 5th ACM SIGPLAN Conference on Certified Programs and Proofs (CPP 2016).
Rahli, V., Wells, J., Pirie, J., & Kamareddine, F. (2016). Skalpel: A Constraint-Based Type Error Slicer for Standard ML. Journal of Symbolic Computation.
Ralha, R., Falcão, G., Amaro, J., Mota, V., Goncalves Almeida Antunes, M., Barreto, J. P., & Nunes, U. (2016). Parallel refinement of slanted 3D reconstruction using dense stereo induced from symmetry. Journal of Real-Time Image Processing.
Robaldo, L., & Sun, X. (2016). Reified Input/Output logic - a position paper. proceedings of Workshop on Artificial Intelligence for Justice (AI4J), collocated at the 22nd European Conference on Artificial Intelligence (ECAI 2016).
Robert, J., Kubler, S., & Le Traon, Y. (2016). Micro-billing framework for IoT: Research & Technological foundations. International Conference on Future Internet of Things and Cloud, 22-24 August 2016, Vienna, Austria.
Robert, J., Kubler, S., Le Traon, Y., & Främling, K. (2016). O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis. O-MI/O-DF Standards as Interoperability Enablers for Industrial Internet: a Performance Analysis.
Rocchetto, M., & Tippenhauer, N. (2016). CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions. CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions.
Rocchetto, M., & Tippenhauer, N. (2016). On Attacker Models and Profiles for Cyber-Physical Systems. On Attacker Models and Profiles for Cyber-Physical Systems.
Rocco, I., Goncalves Almeida Antunes, M., Aouada, D., & Ottersten, B. (2016). RGB-D and Thermal Sensor Fusion. 11th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP).
Roenne, P. (2016). JCJ with Improved Verifiability Guarantees. Paper presented at E-Vote-ID.
Rogstad, E., & Briand, L. (2016). Cost-effective Strategies for the Regression Testing of Database Applications: Case study and Lessons Learned. Journal of Systems and Software, 113, 257–274.
Rojas, J. M., Fraser, G., & Arcuri, A. (2016). Seeding Strategies in Search-Based Unit Test Generation. SOFTWARE TESTING, VERIFICATION AND RELIABILITY (STVR).
Rojas, J. M., Vivanti, M., Arcuri, A., & Fraser, G. (2016). A Detailed Investigation of the Effectiveness of Whole Test Suite Generation. Empirical Software Engineering.
Rosalie, M., Danoy, G., Bouvry, P., & Chaumette, S. (2016). UAV Multilevel Swarms for Situation Management. Proceedings of the 2Nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use (pp. 49--52). New York, NY, USA: ACM.
Santaca, K., Cristani, M., Rocchetto, M., & Viganò, L. (2016). A Topological Categorization of Agents for the Definition of Attack States in Multi-Agent Systems. A Topological Categorization of Agents for the Definition of Attack States in Multi-Agent Systems.
Sharma, S. K., Bogale, T. E., Le, L. B., Chatzinotas, S., Wang, X., & Ottersten, B. (2016). Two-phase concurrent sensing and transmission scheme for full duplex cognitive radio. IEEE 84th Vehicular Technology Conference. IEEE.
Soltana, G., Sabetzadeh, M., & Briand, L. (2016). Model-Based Simulation of Legal Requirements: Experience from Tax Policy Simulation. 24th IEEE International Requirements Engineering Conference, Beijing 12-16 September 2016.
Soussi, M. E., Vu, T. X., Nguyen, H. N., Duhamel, P., Alberge, F., & Vandendorpe, L. (2016). Semi-orthogonal MARC with half duplex relaying: A backward compatible cooperative network with interference channels. 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
sun, X., & Robaldo, L. (2016). Ali Baba and Thief, Norm Emergence in Games. Paper presented at International Conference on Principles and Practice of Multi-Agent Systems (PRIMA 2016).
Sun, X., & Robaldo, L. (2016). Norm Creation in Proposition Control Games. Proceedings of the 1st Chinese Conference on Logic and Argumentation (CLAR 2016), Hangzhou, China, April 2-3, 2016.
Tabatabaei, M., Jamroga, W., & Ryan, P. (2016). Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt. The International Workshop on AI for Privacy and Security (PrAISe), 2016.
Torres, C. F., & Trujillo Rasua, R. (2016). The Fréchet/Manhattan distance and the trajectory anonymisation problem. Proceedings of Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference (DBSec 2016) (Lecture Notes in Computer Science). Springer.
Trujillo Rasua, R., & Yero, I. G. (2016). Characterizing 1-metric antidimensional trees and unicyclic graphs. Computer Journal, 59(8), 1264--1273.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2016). Active Interference Constraint Learning with Uncertain Feedback for Cognitive Radio Networks. Proceedings of IEEE International Conference on Communications (ICC) 2016.
Van Zee, M., Bex, F., & Ghanavati, S. (2016). RationalGRL: A Framework for Rationalizing Goal Models Using Argument Diagrams. 35th International Conference on Conceptual Modeling (ER'2016).
Van Zee, M., & Doder, D. (2016). AGM-Style Revision of Beliefs and Intentions. Proceedings of the 22nd European Conference on Artificial Intelligence (ECAI'16).
Van Zee, M., Marosin, D., Bex, F., & Ghanavati, S. (2016). The RationalGRL toolset for Goal Models and Argument Diagrams. Proceedings of the 6th International Conference on Computational Models of Argument (COMMA'16).
Vu, T. X., Nguyen, H. D., Quek, T. Q. S., & Sun, S. (2016). Fronthaul compression and optimization for cloud radio access networks. 2016 IEEE International Conference on Communications (ICC).
Yuan, Q., Qu, H., Pang, J., & Mizera, A. (2016). Improving BDD-based attractor detection for synchronous Boolean networks. SCIENCE CHINA Information Sciences, 59(8), 080101:1-080101:16.
Zhou, L., Zhang, Y., Pang, J., & Li, C.-T. (2016). Modeling city locations as complex networks: An initial study. Proceedings of the 5th International Workshop on Complex Networks and their Applications (pp. 735-747). Springer Science & Business Media B.V.
Zotkiewicz, M., Guzek, M., Kliazovich, D., & Bouvry, P. (2016). Minimum Dependencies Energy-Efficient Scheduling in Data Centers. IEEE Transactions on Parallel & Distributed Systems.

2015

Dreier, J., Giustosi, R., Kassem, A., Lafourcade, P., Lenzini, G., & Ryan, P. (2015). Formal Security Analysis of Traditional and Electronic Exams. Communications in Computer and Information Science, 554, 294-318.
Schwickart, T. K. (2015). Energy-Efficient Driver Assistance System for Electric Vehicles Using Model-Predictive Control. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Voos, H. (Promotor), Hadji-Minaglou, J.-R., Darouach, M., Engel, T., & Boutat, D.
Olivares Mendez, M. A., Fu, C., Ludivig, P., Bissyande, T. F. D. A., Kannan, S., Zurad, M., Annaiyan, A., Voos, H., & Campoy, P. (2015). Towards an Autonomous Vision-Based Unmanned Aerial System against Wildlife Poachers. Sensors, 15(12), 29861.
Margossian, H. (2015). Distribution Network Line Protection in the Presence of Distributed Generation. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Sachau, J. (Promotor), Deconinck, G. (Promotor), Engel, T., Cappelle, J., Stevens, S., & Jostock, M.
Masouros, C., & Zheng, G. (2015). IEEE Global Telecommunications Conference. Power Efficient Downlink Beamforming Optimization by Exploiting Interference.
Pan, L. (2015). Composite Learning Control With Application to Inverted Pendulums. In IEEE Conference Publications (Ed.), IEEE International Conference - Chinese Automation Congress (CAC), 2015 (IEEE Conference Publications, pp. 232-236).
Pan, L., Voos, H., & Darouach, M. (2015). A Class of Improved Wake Interaction Model for the Coordinated Control of Wind Farms. In IEEE Conference Publications (Ed.), IEEE International Chinese Automation Congress (CAC), 2015 (IEEE Conference Publications, pp. 1322-1327). IEEE Conference Publications.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2015). Constructive Interference through Symbol Level Precoding for Multi-level Modulation. IEEE Global communications conference.
Biryukov, A., & Khovratovich, D. (2015). Tradeoff Cryptanalysis of Memory-Hard Functions. 21st International Conference on the Theory and Application of Cryptology and Information Security. Springer.
Bissyande, T. F. D. A., Ouoba, J., Ahmat, D., Ouédraogo, F., Béré, C., Bikienga, M., Sere, A., Dandjinou, M., & Sié, O. (2015). Vulnerabilities of Government Websites in a Developing Country – The Case of Burkina Faso. 7th International Conference on e‐Infrastructure and e‐Services for Developing Countries.
Codeca, L., Frank, R., & Engel, T. (2015). Luxembourg SUMO Traffic (LuST) Scenario: 24 Hours of Mobility for Vehicular Networking Research. Proceedings of the 7th IEEE Vehicular Networking Conference (pp. 1-8).
Correa Bahnsen, A., Aouada, D., Stojanovic, A., & Ottersten, B. (2015). Detecting Credit Card Fraud using Periodic Features. IEEE International Conference on Machine Learning and Applications.
DI ALESIO, S., Briand, L., Nejati, S., & GOTLIEB, A. (2015). Combining Genetic Algorithms and Constraint Programming to Support Stress Testing of Task Deadlines. ACM Transactions on Software Engineering & Methodology, 25(1).
Jafarnejad, S., Codeca, L., Bronzi, W., Frank, R., & Engel, T. (2015, December). A Car Hacking Experiment: When Connectivity meets Vulnerability. Paper presented at IEEE Globecom 2015 Workshop on Wireless Networking, Control & Positioning for Unmanned Autonomous Vehicles, San Diego, CA.
Papazafeiropoulos, A., Sharma, S. K., & Chatzinotas, S. (2015). Impact of Transceiver Impairments on the Capacity of Dual-Hop Relay Massive MIMO Systems. Proceedings of IEEE Globecom 2015.
Ragona, C., Fiandrino, C., Kliazovich, D., Granelli, F., & Bouvry, P. (2015). Energy-Efficient Computation Offloading for Wearable Devices and Smartphones in Mobile Cloud Computing. IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 2015.
Viti, F., & Cantelmo, G. (2015, December). A Markov chain dynamic model for trip generation and distribution based on CDR. Periodica Polytechnica.
Wagle, S. S., Guzek, M., Bouvry, P., & Bisdorff, R. (2015). An Evaluation Model for Selecting Cloud Services from Commercially Available Cloud Providers. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 1-8).
Atashpendar, A., Roscoe, B., & Ryan, P. (2015). Information Leakage due to Revealing Randomly Selected Bits. Security Protocols XXIII: Lecture Notes in Computer Science, Volume 9379, 2015 (pp. 325-341). Springer.
Castignani, G., Derrmann, T., Frank, R., & Engel, T. (2015, November 24). Validation study of risky event classification using driving pattern factors. Paper presented at Communications and Vehicular Technology in the Benelux (SCVT), 2015 IEEE Symposium on, Luxembourg, Luxembourg.
Faye, S., & Chaudet, C. (2015). Connectivity Analysis of Wireless Sensor Networks Deployments in Smart Cities. Proceedings of the 22nd IEEE Symposium on Communications and Vehicular Technology in the Benelux (SCVT 2015).
Bartolini, C. (2015, November 12). Data Protection. Paper presented at ITxLaw project closing event, Turin, Italy.
Decouchant, J. (2015). Collusions and Privacy in Rational-Resilient Gossip. Unpublished doctoral thesis, Grenoble University, ​Grenoble, ​​France.
Jury: Quéma, V. (Promotor), Ben Mokhtar, S. (Promotor), de Palma, N., Réveillère, L., Tixeuil, S., & Rivière, É.
Kubler, S., Holmström, J., Främling, K., & Turkama, P. (2015). Technological Theory of Cloud Manufacturing. In T., Borangiu (Ed.), Service Orientation in Holonic and Multi Agent Manufacturing and Robotics (Studies in Computational Intelligence). Springer.
Biryukov, A., Khovratovich, D., Dinu, D.-D., & Josefsson, S. (2015). The memory-hard Argon2 password hash function (Network Working Group / Internet-Draft). IETF.
Alodeh, M. (2015). Interference in Multiple-antenna Communications: From Channel Estimation to Exploitation. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Ottersten, B. (Promotor), Verissimo, P., Chatzinotas, S., Jorswieck, E., & Bolcskei, H.
Correa Bahnsen, A., Aouada, D., & Ottersten, B. (2015). Example-Dependent Cost-Sensitive Decision Trees. Expert Systems with Applications, 42(19), 6609-6619.
Bartolini, C., Muthuri, R., & Cristiana, S. (2015, November). Using Ontologies to Model Data Protection Requirements in Workflows. Paper presented at Ninth International Workshop on Juris-informatics (JURISIN 2015).
Di Nardo, D., Pastore, F., Arcuri, A., & Briand, L. (2015). Evolutionary Robustness Testing of Data Processing Systems using Models and Data Mutation. Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering (pp. 126-137).
Faye, S., Frank, R., & Engel, T. (2015, November). Adaptive Activity and Context Recognition using Multimodal Sensors in Smart Devices. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Mobile Computing, Applications, and Services.
Faye, S., Frank, R., & Engel, T. (2015). SWIPE: Monitoring Human Dynamics using Smart Devices. Proceedings of the 7th International Conference on Mobile Computing, Applications and Services (MobiCASE '15).
Hartmann, T., Moawad, A., Fouquet, F., Reckinger, Y., Mouelhi, T., Klein, J., & Le Traon, Y. (2015). Suspicious Electric Consumption Detection Based on Multi-Profiling Using Live Machine Learning. 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
Panchenko, A. (2015). On the Impact of Cross-Layer Information Leakage on Anonymity in Crowds. Proceedings of the 11th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (ACM Q2SWinet 2015). ACM.
Cogo, V. V., Bessani, A., Couto, F. M., & Verissimo, P. (2015, October 12). A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data. Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 101-110.
Allix, K. (2015). Challenges and Outlook in Machine Learning-based Malware Detection for Android. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Klein, J., Bissyande, T. F. D. A., Cavallaro, L., & Rossow, C.
Gniewek, A. (2015). LEGAL CHALLENGES FACING CLOUD COMPUTING – A STUDY OF RELEVANT CONCEPTS IN CURRENT AND FUTURE EU DATA PROTECTION LAW. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Cole, M. (Promotor), Poillot, E., Walden, I., Schiltz, J.-L., & Zeno-Zencovich, V.
Hajri, I., Göknil, A., Briand, L., & Stephany, T. (2015). Applying Product Line Use Case Modeling in an Industrial Automotive Embedded System: Lessons Learned and a Refined Approach. 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS), September 30 - October 2, 2015, Ottawa, ON, Canada.
Giurgiu, A., Boulet, G., & De Hert, P. (2015, October). EU’s One-Stop-Shop Mechanism: Thinking Transnational. Privacy Laws & Business. International Report, 16-18.
Grzybek, A., Danoy, G., Bouvry, P., & Seredynski, M. (2015). Mitigating flash crowd effect using connected vehicle technology. Vehicular Communications, 2(4).
Lagunas, E., Sharma, S. K., Maleki, S., Chatzinotas, S., & Ottersten, B. (2015). Impact of Terrain Aware Interference Modeling on the Throughput of Cognitive Ka-Band Satellite Systems. Ka and Broadband Communications Conference (KaConf), Bologna, Italy, Oct 2015.
Laurent, T., Ventresque, A., Papadakis, M., Henard, C., & Le Traon, Y. (2015). Assessing and Improving the Mutation Testing Practice of PIT. Eprint/Working paper retrieved from https://hal.archives-ouvertes.fr/hal-01252099v2.
Nesmachnow, S., Dorronsoro, B., Talbi, E.-G., & Bouvry, P. (2015). Metaheuristics for the Virtual Machine Mapping Problem in Clouds. Informatica, Lith. Acad. Sci, 26(1), 111-134.
Nguyen, P., Yskout, K., Heyman, T., Klein, J., Scandariato, R., & Le Traon, Y. (2015). SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems. Proceedings ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems.
Piazza, R., Shankar, B., & Ottersten, B. (2015). Multi-gateway Data Predistortion for Non-linear Satellite Channels. IEEE Transactions on Communications, 63(10), 3789 - 3802.
Spano, D., Christopoulos, D., Andrenacci, S., Chatzinotas, S., Ottersten, B., & Krause, J. (2015). Total degradation analysis of precoded signals onto non-linear satellite channels. 21st Ka Conference.
Wagle, S. S., Guzek, M., & Bouvry, P. (2015). Cloud Service Providers Ranking Based on Service Delivery and Consumer Experience. 2015 IEEE 4th International Conference on Cloud Networking (CloudNet) (pp. 209-212).
Wang, J., & Tang, Q. (2015, October). Recommender Systems and their Security Concerns. Paper presented at iacr.
Ziafati, P., dastani, M., meyer, J.-J., van der Torre, L., & Voos, H. (2015). Retalis Language for Information Engineering in Autonomous Robot Software. IfCoLog Journal of Logics and their Applications, 2(2), 85.
Bartolini, C., El Kateb, D., Le Traon, Y., & Hagen, D. (2015). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? Economics of Grids, Clouds, Systems, and Services. Springer.
Iovino, V., & Żebrowski, K. (2015, September 11). Mergeable Functional Encryption. Paper presented at 16th Italian Conference on Theoretical Computer Science (ICTCS), Firenze, Italy.
Bartolini, C., & Muthuri, R. (2015, September 10). Reconciling Data Protection Rights and Obligations: An Ontology of the Forthcoming EU Regulation. Paper presented at Workshop on Language and Semantic Technology for Legal Domain (LST4LD), Hissar, Bulgaria.
Jasim, I., Plapper, P., & Voos, H. (2015). Gaussian Filtering for Enhanced Impedance Parameters Identification in Robotic Assembly Processes. 20th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2015), Luxembourg 8-11 September 2015.
Jasim, I., Plapper, P., & Voos, H. (2015). Model-Free Robust Adaptive Control for Flexible Rubber Objects Manipulation. 20th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2015), Luxembourg 8-11 September 2015. IEEE.
Pan, L., Voos, H., Li, Y., & Darouach, M. (2015). A Wake Interaction Model for the Coordinated Control of Wind Farms. Emerging Technologies & Factory Automation (ETFA), 2015 IEEE 20th Conference on (pp. 1-7). IEEE.
Al Ismaeil, K. (2015). Super-Resolution Approaches for Depth Video Enhancement. Unpublished doctoral thesis, University of Luxembourg, ​Bertrange, ​​Luxembourg.
Jury: Ottersten, B. (Promotor).
Arora, C., Sabetzadeh, M., Göknil, A., Briand, L., & Zimmer, F. (2015). NARCIA: An Automated Tool for Change Impact Analysis in Natural Language Requirements. 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, Bergamo 30 August - 4 September 2015.
Ben Nasr, S., Becan, G., Acher, M., Ferreira Filho, J. B., Baudry, B., Sannier, N., & Davril, J.-M. (2015). MatrixMiner: A Red Pill to Architect Informal Product Descriptions in the Matrix. 10th Joint Meeting on Foundations of Software Engineering (ESEC/FSE 2015), Bergamo, Italy, August 30 - September 4, 2015 (pp. 982-985).
Chaib Draa, K., Voos, H., Alma, M., & Darouach, M. (2015). Linearizing Control of Biogas Flow Rate and Quality. 20th IEEE Int. Conference on Emerging Tecnologies and Factory Automation ETFA 2015, Luxembourg, 8-11 Sept. 2015.
Chenal, M., & Tang, Q. (2015). Key Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes. Information Security - 18th International Conference, ISC 2015.
Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2015). Multicast Multigroup Precoding and User Scheduling for Frame-Based Satellite Communications. IEEE Transactions on Wireless Communications, 14(9), 4695 - 4707.
Cortés-Mendoza, J. M., Tchernykh, A., Drozdov, A., Bouvry, P., Simionovici, A.-M., Kliazovich, D., & Avetisyan, A. (2015, September). Distributed Adaptive VoIP Load Balancing in Hybrid Clouds. Paper presented at Russian Supercomputing Days 2015, Moscow, Russia.
Garcia Becerro, F., Aouada, D., Mirbach, B., Solignac, T., & Ottersten, B. (2015). Unified Multi-Lateral Filter for Real-Time Depth Map Enhancement. Image & Vision Computing, 41, 26-42.
Hartmann, T., Moawad, A., Fouquet, F., Nain, G., Klein, J., & Le Traon, Y. (2015). Stream my Models: Reactive Peer-to-Peer Distributed Models@run.time. In T., Lethbridge, J., Cabot, & A., Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 80-89). Passau, Germany: Conference Publishing Consulting.
Hochgeschwender, N., Olivares Mendez, M. A., Voos, H., & Kraetzschmar, G. K. (2015). Context-based Selection and Execution of Robot Perception Graphs. 20th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA'15).
Lagunas, E., Sharma, S. K., Maleki, S., Chatzinotas, S., & Ottersten, B. (2015). Power Control for Satellite Uplink and Terrestrial Fixed-Service Co-existence in Ka-band. IEEE Vehicular Technology Conference, Boston 6-9 Sept 2015.
Lagunas, E., Sharma, S. K., Maleki, S., Chatzinotas, S., & Ottersten, B. (2015, September). Resource Allocation for Cognitive Satellite Communications with Incumbent Terrestrial Networks. IEEE Transactions on Cognitive Communications and Networking.
Moawad, A., Hartmann, T., Fouquet, F., Nain, G., Klein, J., & Le Traon, Y. (2015). Beyond Discrete Modeling: A Continuous and Efficient Model for IoT. In T., Lethbridge, J., Cabot, & A., Egyed (Eds.), 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 90-99). Passau, Germany: Conference Publishing Consulting.
Nguyen, P., Kramer, M., Klein, J., & Le Traon, Y. (2015). An Extensive Systematic Review on the Model-Driven Development of Secure Systems. Information & Software Technology, 68(December 2015), 62-81.
Östlund, S., Panchenko, A., & Engel, T. (2015). A study on ethical aspects and legal issues in e-learning. Proceedings of the 8th International Conference on E-Learning (e-Learning'15) (pp. 286-292).
Popleteev, A. (2015, September). Activity tracking and indoor positioning with a wearable magnet. Poster session presented at 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2015).
Sharma, S. K., Bogale, T. E., Chatzinotas, S., Le, L. B., Wang, X., & Ottersten, B. (2015). Improving Robustness of Cyclostationary Detectors to Cyclic Frequency Mismatch Using Slepian Basis. Proceedings of IEEE PIMRC 2015.
Sharma, S. K., Chatzinotas, S., Grotz, J., & Ottersten, B. (2015). 3D Beamforming for Spectral Coexistence of Satellite and Terrestrial Networks. IEEE Vehicular Technology Conference 2015.
Skrobot, M., & Lancrenon, J. (2015). On the Provable Security of the Dragonfly Protocol. In J., Lopez & C. J., Mitchell (Eds.), Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015 (pp. 244--261). Springer.
Tang, Q., & Wang, J. (2015). Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions. Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security.
Wang, C., Pastore, F., Göknil, A., Briand, L., & Iqbal, Z. (2015). UMTG: A Toolset to Automatically Generate System Test Cases from Use Case Specifications. 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, Bergamo 30 August - 4 September 2015.
Ghatpande, S., & Gheorghe, G. (2015). Towards more secure and usable cloud storage for E-Health. Luxembourg, Luxembourg: University of Luxembourg.
Kubler, S., Yoo, M.-J., Cassagnes, C., Främling, K., Kiritsis, D., & Skilton, M. (2015). Opportunity to Leverage Information-as-an-Asset in the IoT -- The road ahead. 3rd International Conference on Future Internet of Things and Cloud (pp. 64-71). IEEE Computer Society.
Bronzi, W., Frank, R., Castignani, G., & Engel, T. (2015, August 20). Bluetooth Low Energy performance and robustness analysis for Inter-Vehicular Communications. Elsevier - Ad Hoc Networks.
Norta, D. P. B., Winkler, C., Allelein, H.-J., & Sachau, J. (2015). 11,8-100% Rural Renewable Energy and Power Supply and its Influence on the Luxembourgish Power System. Energy Procedia, 73, 163-172.
Jan, S., Nguyen, D. C., & Briand, L. (2015). Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source Systems. The 2015 IEEE International Conference on Software Quality, Reliability & Security, Vancouver 3-5 August 2015.
Arora, C., Sabetzadeh, M., Göknil, A., Briand, L., & Zimmer, F. (2015). Change Impact Analysis for Natural Language Requirements: An NLP Approach. 23rd IEEE International Requirements Engineering Conference, Ottawa 24-28 August 2015.
Biryukov, A., & Perrin, L. P. (2015). On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. In R., Gennaro & M., Robshaw (Eds.), Advances in Cryptology -- CRYPTO 2015 (pp. 116-140). Berlin, Germany: Springer-Verlag.
Lanze, F., Panchenko, A., & Engel, T. (2015). A Formalization of Fingerprinting Techniques. Proceedings of the IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP 2015), held in conjunction with IEEE TrustCom 2015 (pp. 818-825).
Li, L., Allix, K., Li, D., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2015). Potential Component Leaks in Android Apps: An Investigation into a new Feature Set for Malware Detection. The 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS 2015).
N'Doye, I., Voos, H., Darouach, M., & Schneider, J. (2015). Static Output Feedback H-infinity Control for a Fractional-Order Glucose-Insulin System. International Journal of Control, Automation, and Systems, 13(4), 798-807.
Zhauniarovich, Y., Philippov, A., Gadyatskaya, O., Crispo, B., & Massacci, F. (2015). Towards Black Box Testing of Android Apps. Proc. of Software Assurance Workshop at the 10th International Conference on Availability, Reliability and Security (ARES). IEEE.
Bartolini, C. (2015, July 29). Liability of Intermediary Service Providers. Paper presented at LAST-JD seminar, Luxembourg, Luxembourg.
Bissyande, T. F. D. A. (2015). Harvesting Fix Hints in the History of Bugs (TR-SNT-2015-6). SnT, University of Luxembourg.
Li, Y., Voos, H., Darouach, M., & Hua, C. (2015). An algebraic detection approach for control systems under multiple stochastic cyber-attacks. IEEE/CAA Journal of Automatica Sinica, 2(3), 258-266.
Bella, G., & Lenzini, G. (2015, July 13). 2015 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy, July 13, 2015. Paper presented at Workshop on Socio-Technical Aspects in Security and Trust, STAST 2015, Verona, Italy.
Dinu, D.-D., Biryukov, A., Groszschädl, J., Khovratovich, D., Le Corre, Y., & Perrin, L. P. (2015, July). FELICS - Fair Evaluation of Lightweight Cryptographic Systems. Paper presented at NIST Workshop on Lightweight Cryptography 2015, Gaithersburg, MD.
Dinu, D.-D., Le Corre, Y., Khovratovich, D., Perrin, L. P., Groszschädl, J., & Biryukov, A. (2015, July). Triathlon of Lightweight Block Ciphers for the Internet of Things. Paper presented at NIST Workshop on Lightweight Cryptography 2015, Gaithersburg, MD.
Kracheel, M., Mccall, R., & Koenig, V. (2015). Playing with Traffic: An Emerging Methodology for Developing Gamified Mobility Applications. In J., Lumsden (Ed.), Emerging Perspectives on the Design, Use, and Evaluation of Mobile and Handheld Devices (pp. 105-122). Hershey, Pennsylvania: IGI.
Liang, K., Zhao, L., Yang, K., Zheng, G., & Ding, W. (2015). A Fair Power Splitting Algorithm for Simultaneous Wireless Information and Energy Transfer in CoMP Downlink Transmission. Wireless Personal Communications, 85(4), 2687-2710.
Madhikermi, M., Kubler, S., Buda, A., & Främling, K. (2015). Data Quality Assessment of Company's Maintenance Reporting: A Case Study. Proceedings of 4th International Conference on Data Management Technologies and Applications (pp. 162-172). Colmar, France: SciTePress.
Olivares Mendez, M. A., & Campoy, P. (2015). Vision Based Fuzzy Control Approaches for Unmanned Aerial Vehicles. 16th World Congress of the International Fuzzy Systems Association (IFSA) 9th Conference of the European Society for Fuzzy Logic and Technology (EUSFLAT).
Sharma, S. K., Bogale, T. E., Chatzinotas, S., Ottersten, B., Le, L. B., & Wang, X. (2015, July). Cognitive Radio Techniques under Practical Imperfections: A Survey. IEEE Communications Surveys and Tutorials.
Wang, C., Pastore, F., Göknil, A., Briand, L., & Iqbal, Z. (2015). Automatic Generation of System Test Cases from Use Case Specifications. Proceedings of the International Symposium on Software Testing and Analysis (ISSTA' 15), July 2015, USA.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2015). Energy Efficient Symbol-Level Precoding in Multiuser MISO Channels. 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications.
Gharanjik, A., Shankar, B., Arapoglou, P.-D., Bengtsson, M., & Ottersten, B. (2015). Precoding Design and User Selection for Multibeam Satellite Channels. 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2015.
Kalantari, A., Maleki, S., Chatzinotas, S., & Ottersten, B. (2015). Secrecy Energy Efficiency Optimization for MISO and SISO Communication Networks. The 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
Marchal, S. (2015). DNS and Semantic Analysis for Phishing Detection. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Engel, T. (Promotor), Festor, O. (Promotor), Sorger, U., Godart, C., Filiol, E., Totel, E., Gurbani, V., & State, R.
Gerard, B., Voos, H., Li, Y., & Darouach, M. (2015). Effects of Permanent Bounded Cyber-Attacks on Networked Control Systems. 23rd Mediterranean Conference on Control and Automation (MED) (pp. 917-922).
Mouelhi, T., El Kateb, D., & Le Traon, Y. (2015). Inroads in Testing Access Control. Advances in Computers. ELSEVIER.
Montavont, N., Blanc, A., Navas, R., & Castignani, G. (2015). Handover triggering in IEEE 802.11 Networks. 16th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (pp. 9).
Correa Bahnsen, A., Aouada, D., & Ottersten, B. (2015). A novel cost-sensitive framework for customer churn predictive modeling. Decision Analytics, 2(5).
Al Ismaeil, K., Aouada, D., Solignac, T., Mirbach, B., & Ottersten, B. (2015). Real-Time Non-Rigid Multi-Frame Depth Video Super-Resolution. IEEE Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'15), (Best paper award).
Li, Y., Voos, H., Darouach, M., & Hua, C. (2015, June 10). An application of linear algebra theory in networked control systems: stochastic cyber-attacks detection approach. IMA Journal of Mathematical Control and Information, 1-22.
Bartolini, C. (2015, June 03). An overview of the limitations to the dissemination of data. Paper presented at 4th International Conference on Models and Technologies for Intelligent Transportation Systems, Budapest, Hungary.
Di Donna, S. A., Cantelmo, G., & Viti, F. (2015). A Markov Chain dynamic model for trip generation and distribution based on CDR. Proceedings of the MT-ITS Conference.
Di Nardo, D., Alshahwan, N., Briand, L., & Labiche, Y. (2015). Coverage-based regression test case selection, minimization and prioritization: a case study on an industrial system. Software Testing, Verification & Reliability, 25(4), 371-396.
Fiandrino, C., Kliazovich, D., Bouvry, P., & Zomaya, A. Y. (2015). Performance Metrics for Data Center Communication Systems. 8th IEEE International Conference on Cloud Computing, New York, USA, 2015.
Gharanjik, A., & Shankar, B. (2015). Robust Precoding for Multibeam Satellite Channels with Phase Uncertainty. Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/21264.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. (2015). Estimation-Throughput Tradeoff for Underlay Cognitive Radio Systems. Proceedings of International Conference on Communications (ICC).
Lagunas, E., Amin, M., & Ahmad, F. (2015). Through-the-Wall Radar Imaging for Heterogeneous Walls using Compressive Sensing. International Workshop on Compressed Sensing Theory and its Applications to Radar, Sonar and Remote Sensing (CoSeRa), Pisa, Italy, 16-19 June 2015.
LE, H.-T., Nguyen, D. C., Briand, L., & Hourte, B. (2015). Automated Inference of Access Control Policies for Web Applications. 20th ACM Symposium on Access Control Models and Technologies (SACMAT), 1-3 June 2015.
Li, L., Allix, K., Li, D., Bartel, A., Bissyande, T. F. D. A., & Klein, J. (2015). A Study of Potential Component Leaks in Android Apps. SnT Centre - University of Luxembourg.
Mazzali, N., Shankar, B., & Ottersten, B. (2015). On-board Signal Predistortion for Digital Transparent Satellites. Proceedings on IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
Mccall, R., Popleteev, A., Martin, B., Louveton, N., & Engel, T. (2015). Text entry on smart glasses A comparison of two input techniques. 8th International Conference on Human System Interaction (HSI'2015).
Olivares Mendez, M. A., Kannan, S., & Voos, H. (2015). Vision Based Fuzzy Control Autonomous Landing with UAVs: From V-REP to Real Experiments. 23nd IEEE Mediterranean Conference of Control and Automation (MED), 2015, Torremolinos 2015, Spain.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2015). Cognitive Beamforming for Spectral Coexistence of Hybrid Satellite Systems. Cooperative and Cognitive Satellite Systems. Elsevier.
Sharma, S. K., Lagunas, E., Maleki, S., Chatzinotas, S., Grotz, J., Krause, J., & Ottersten, B. (2015). Resource Allocation for Cognitive Satellite Communications in Ka-band (17.7-19.7 GHz). Proceedings of International Conference on Communications (ICC).
Sharma, S. K., Maleki, S., Chatzinotas, S., Grotz, J., Krause, J., & Ottersten, B. (2015). Joint Carrier Allocation and Beamforming for Cognitive SatComs in Ka-band (17.3-18.1 GHz). Proceedings of International Conference on Communications.
Sharma, S. K., Patwary, M., Chatzinotas, S., Ottersten, B., & Abdel-Maguid, M. (2015). Repeater for 5G Wireless: A Complementary Contender for Spectrum Sensing Intelligence. Proceedings of International Conference on Communications 2015.
Signorello, S., State, R., & Festor, O. (2015). Exploring IoT Protocols Through the Information-Centric Networking's Lens. Intelligent Mechanisms for Network Configuration and Security (Lecture Notes in Computer Science). Springer.
Tang, Q., Ma, H., & Chen, X. (2015). Extend the Concept of Public Key Encryption with Delegated Search. The Computer Journal, 58(4), 11.
Ben Fadhel, A., Bianculli, D., & Briand, L. (2015). A Comprehensive Modeling Framework for Role-based Access Control Policies. The Journal of Systems & Software, 107(September,2015), 110–126.
Ziafati, P. (2015). Information Engineering in Autonomous Robot Software. Luxembourg, Luxembourg: University of Luxembourg.
Pan, L., Voos, H., Li, Y., & Darouach, M. (2015). Uncertainty Quantification of Exponential Synchronization for a Novel Class of Complex Dynamical Networks with Hybrid TVD Using PIPC. Control and Decision Conference (CCDC), 2015 27th Chinese (pp. 125-130). USA: IEEE.
Yumei, L., Voos, H., Pan, L., & Darouach, M. (2015). Stochastic cyber-attacks estimation for nonlinear control systems based on robust H∞ filtering technique. Control and Decision Conference (CCDC), 2015 27th Chinese (pp. 5590-5595). USA: IEEE.
Melakessou, F. (2015, May 22). Analysis of Call Detail Records Based on Scilab. Paper presented at SCILABTEC2015, 7th International Scilab Users Conference, Paris, France.
Pan, L. (2015, May 14). Adaptive synchronization of stochastic time-varying delay dynamical networks with complex-variable systems. Nonlinear Dyn.
Yue, T., Briand, L., & Labiche, Y. (2015). aToucan: An Automated Framework to Derive UML Analysis Models from Use Case Models. ACM Transactions on Software Engineering & Methodology, 24(3).
Forster, M. (2015). An Event-Driven Cooperative Advanced Driver Assistance System to Mitigate Vehicular Traffic Shock Waves in Temporarily High Traffic Demand. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Engel, T. (Promotor), Sorger, U., Casetti, C., Gerla, M., & Frank, R.
Nguyen, P. H. (2015). Model-Driven Security based on A Unified System of Security Design Patterns. Luxembourg, Luxembourg: University of Luxembourg.
Codeca, L., Frank, R., & Engel, T. (2015, May 07). LuST: a 24-hour Scenario of Luxembourg City for SUMO Traffic simulations. Paper presented at SUMO User Conference 2015 - Intermodal Simulation for Intermodal Transport, Berlin, Germany.
Dolberg, L. (2015, May 04). Network Management with Data Analytics. Paper presented at Network Management with Data Analytics.
Arora, C., Sabetzadeh, M., Briand, L., & Zimmer, F. (2015). Automated Checking of Conformance to Requirements Templates using Natural Language Processing. IEEE Transactions on Software Engineering, 41(10), 944 - 968.
Avanesov, T., Gheorghe, G., Palattella, M. R., Kantor, M., Popoviciu, C., & Engel, T. (2015). Network troubleshooting with SDN-RADAR (demo paper). Proc. of IFIP/IEEE International Symposium on Integrated Network Management (IM).
Bianculli, D., Filieri, A., Ghezzi, C., Mandrioli, D., & Rizzi, A. M. (2015). Syntax-driven program verification of matching logic properties. Proceedings of the 3rd FME Workshop on Formal Methods in Software Engineering (FormaliSE 2015). IEEE.
Buda, A., Kubler, S., Främling, K., Borgman, J., Madhikermi, M., & Mirzaeifar, S. (2015). Data supply chain in Industrial Internet. 11th IEEE World Conference on Factory Communication Systems (pp. 1--7). Palma de Mallorca, Spain: IEEE.
Chaib Draa, K., Voos, H., Alma, M., & Darouach, M. (2015). Adaptive Control for the Methane Flow rate in Biogas Plants. 3rd IEEE Int. Conference on Control, Engineering and Information Technology, Tlemcen, Algeria, 2015.
DING, S., TAN, H. B. K., & Shar, L. K. (2015, May). Mining Patterns of Unsatisfiable Constraints to Detect Infeasible Paths. Automation of Software Test (AST 2015).
Emeras, J., Varrette, S., Guzek, M., & Bouvry, P. (2015). Evalix: Classification and Prediction of Job Resource Consumption on HPC Platforms. Proc. of the 19th Intl. Workshop on Job Scheduling Strategies for Parallel Processing (JSSPP'15), part of the 29th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2015). IEEE Computer Society.
Faye, S., & Frank, R. (2015). Demo: Using Wearables to Learn from Human Dynamics. Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '15).
Guzek, M., Bouvry, P., & Talbi, E.-G. (2015). A Survey of Evolutionary Computation for Resource Management of Processing in Cloud Computing. IEEE Computational Intelligence Magazine, 10(2), 53-67.
Li, L., Bartel, A., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. International Conference on ICT Systems Security and Privacy Protection (SEC 2015).
N'Doye, I., Darouach, M., Voos, H., & Zasadzinski, M. (2015, May). On the robustness of linear and non-linear fractional-order systems with non-linear uncertain parameters. IMA Journal of Mathematical Control and Information.
Pastore, F., & Mariani, L. (2015). ZoomIn: Discovering Failures by Detecting Wrong Assertions. Proceedings of the 37th International Conference on Software Engineering (ICSE).
Popleteev, A., Louveton, N., & Mccall, R. (2015). Colorizer: Smart Glasses Aid for the Colorblind. WearSys'15. ACM.
Gharanjik, A., Shankar, B., Arapoglou, P.-D., & Bengtsson, M. (2015). Robust Precoding Design for Multibeam Downlink Satellite Channel with Phase Uncertainty. 40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2015.
Nguyen, P. H. (2015). An Extensive Systematic Review on Model-Driven Development of Secure Systems. Luxembourg, Luxembourg: University of Luxembourg.
Norta, D. P. B., Ramanathan, S., Sachau, J., & Allelein, H.-J. (2015, April 13). Hydrokinetic Micro-Power Generation in Small Rivers - a New Approach. Renewable Energy and Power Quality Journal.
Norta, D. P. B., Winkler, C., Ingenieure ohne Grenzen, D., & Engineers Without Borders, L. (2015). A Concept to Increase the Bulk Warm Water Production of Ordinary Direct and Indirect Solar-Thermal Systems in Rural India. Renewable Energy and Power Quality Journal, 13.
Margossian, H., Deconinck, G., & Sachau, J. (2015). Distribution Network Protection Considering Grid Code Requirements for Distributed Generation. IET Generation, Transmission & Distribution, 9(12), 1377 - 1381.
Derrmann, T., Frank, R., Melakessou, F., Castignani, G., & Engel, T. (2015, April 08). A Cell Dwell Time Model for Synthetic Population Generation from Call Detail Records. Paper presented at Netmob'15, the main conference on the scientific analysis of mobile phone datasets, Boston, USA.
Melakessou, F., Derrmann, T., Frank, R., Castignani, G., & Engel, T. (2015, April 08). Detection of Population Mobility Anomalies in Senegal from Base Station Profiles. Paper presented at Netmob'15, the main conference on the scientific analysis of mobile phone datasets, Boston, USA.
Lenzini, G., Mauw, S., & Ouchani, S. (2015, April 06). Security analysis of socio-technical physical systems. Computers electrical engineering.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2015). Symbol Based Precoding in the Downlink of Cognitive MISO Channel. Proceedings of CROWNCOM 2015.
Di Nardo, D., Pastore, F., & Briand, L. (2015). Generating Complex and Faulty Test Data Through Model-Based Mutation Analysis. Software Testing, Verification and Validation (ICST), 2015 IEEE Eighth International Conference on.
Gheorghe, G., Avanesov, T., Palattella, M. R., Engel, T., & Popoviciu, C. (2015). SDN-RADAR: Network troubleshooting combining user experience and SDN capabilities. Proc. of IEEE Conf. on Network Softwarization (NetSoft).
Henard, C., Papadakis, M., & Le Traon, Y. (2015). Flattening or not of the combinatorial interaction testing models. Eighth IEEE International Conference on Software Testing, Verification and Validation, ICST 2015 Workshops (pp. 1-4). IEEE.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. (2015). Sensing-Throughput Tradeoff for Cognitive Radio Systems with Unknown Received Power. Proceedings of CROWNCOM 2015.
Lagunas, E., Sharma, S. K., Maleki, S., Chatzinotas, S., Grotz, J., Jens, K., & Ottersten, B. (2015). Resource Allocation for Cognitive Satellite Uplink and Fixed-Service Terrestrial Coexistence in Ka-band. Proceedings of CROWNCOM 2015.
Moawad, A., Hartmann, T., Fouquet, F., Klein, J., & Le Traon, Y. (2015). Adaptive Blurring of Sensor Data to balance Privacy and Utility for Ubiquitous Services. The 30th Annual ACM Symposium on Applied Computing (pp. 2271-2278). ACM.
Nair, S., de la Vara, J. L., Sabetzadeh, M., & Falessi. (2015). Evidence management for compliance of critical systems with safety standards: A survey on the state of practice. Information & Software Technology, 60, 1-15.
Ruiz, P., Dorronsoro, B., Talbi, E.-G., & Bouvry, P. (2015). Finding a robust configuration for the AEDB information dissemination protocol for mobile ad hoc networks. Applied Soft Computing, 32, 494-508.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2015). Cooperative Spectrum Sensing for Heterogeneous Sensor Networks Using Multiple Decision Statistics. Proceedings of CROWNCOM 2015.
Norta, D. P. B., Ramanathan, S., Sachau, J., & Allelein, H.-J. (2015, March 25). Hydrokinetic Micro-Power Generation in Small Rivers - a New Approach. Poster session presented at International Conference on Renewable Energies and Power Quality, La Coruna, Spain.
Tewari, U., Neshvad, S., & Sachau, J. (2015, March 25). Verification and Implementation of Pseudo-Random-Binary-Sequences for Online Determination of Grid Impedance Spectrum. The Renewable Energy & Power Quality Journal.
Di Alesio, S. (2015). Supporting Stress Testing in Real-Time Systems with Constraint Programming. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Briand, L. (Promotor), Nejati, S. (Promotor), Gotlieb, A. (Promotor), Navet, N., Régin, J.-C., & Gérard, S.
Podlaszewski, M. J. (2015). Poles Apart : Navigating the Space of Opinions in Argumentation. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: van der Torre, L. (Promotor), Caminada, M. (Promotor), Booth, R. (Promotor), Kelsen, P., Hunter, A., & Modgil, S.
Bartolini, C., Gheorghe, G., Giurgiu, A., Sabetzadeh, M., & Sannier, N. (2015, March 11). Assessing IT Security Standards Against the Upcoming GDPR for Cloud Systems. Poster session presented at Grande Region Security and Reliability Day 2015, Trier, Germany.
Norta, D. P. B., Winkler, C., Sachau, J., & Allelein, H.-J. (2015, March 10). 11,8-100% Rural Renewable Energy and Power Supply and its Influence on the Luxembourgish Power System. Poster session presented at International Renewable Energy Storage Conference, IRES 2015, Düsseldorf, Germany.
Aguilera Gonzalez, A., Voos, H., & Darouach, M. (2015). Glucose-Insulin System based on Minimal Model: a realisitic approach. IEEE UKSim-AMSS Int. Conference on Modelling and Simulation, Cambridge, UK, 2015.
Aouada, D., Al Ismaeil, K., & Ottersten, B. (2015). Patch-based Statistical Performance Analysis of Upsampling for Precise Super–Resolution. 11th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISAPP'15).
Biryukov, A., Derbez, P., & Perrin, L. P. (2015). Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE. In G., Leander (Ed.), Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, March 8-11, 2015 (pp. 3-27). Berlin, Germany: Springer-Verlag.
Bronzi, W. (2015, March). Bluetooth Low Energy Robustness Analysis for V2V Communications. Ulmer Informatik-Berichte.
Chaib Draa, K., Voos, H., & Darouach, M. (2015). A Formal Modeling Framework for Anaerobic Digestion Systems. IEEE UKSim-AMSS Int. Conference on Modelling and Simulation, Cambridge, UK, 2015.
Derbez, P., & Perrin, L. P. (2015). Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. In G., Leander (Ed.), Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, March 8-11, 2015 (pp. 190-216). Berlin, Germany: Springer-Verlag.
Guzek, M., Gniewek, A., Bouvry, P., Musial, J., & Blazewicz, J. (2015). Cloud Brokering: Current Practices and Upcoming Challenges. IEEE Cloud Computing, 2(2).
Li, L., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015, March). Using An Instrumentation based Approach to Detect Inter-Component Leaks in Android Apps. Paper presented at Grande Region Security and Reliability Day 2015.
Maleki, S., Chatzinotas, S., Evans, B., Liolis, K., Grotz, J., Vanelli-Coralli, A., & Chuberre, N. (2015). Cognitive Spectrum Utilization in Ka Band Multibeam Satellite Communications. IEEE Communications Magazine, 53(3), 24-29.
Max, C., Song, J.-Y., & Hack, N. (2015). ICT use at home and at school: A study on 8- to 12-year old students in Luxembourg. INTED2015 Proceedings (2015). International Academy of Technology, Education and Development (IATED).
Pierina Brustolin Spagnuelo, D., & Lenzini, G. (2015). Security on medical data sharing (a literature review). Luxembourg, Luxembourg: SNT.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2015). Exploiting Polarization for Spectrum Awareness in Cognitive Satellite Communications. Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Access and Management. Hershey, USA: IGI Global.
Usman, M., Kliazovich, D., Granelli, F., Bouvry, P., & Castoldi, P. (2015, March). Energy efficiency of TCP: An analytical model and its application to reduce energy consumption of the most diffused transport protocol. International Journal of Communication Systems.
Zhauniarovich, Y., Ahmad, M., Gadyatskaya, O., Crispo, B., & Massacci, F. (2015). StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. Proceedings of CODASPY '15. ACM.
Lanze, F. (2015). Fingerprinting Techniques for Network Security. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Engel, T. (Promotor), Sorger, U., Scheuermann, B., Panchenko, A., & Spaniol, O.
Annaiyan, A., Yadav, M., Olivares Mendez, M. A., & Voos, H. (2015). Visual odometry based absolute target geo-location from micro aerial vehicle. International Conference on Robotics, Automation, Control and Embedded Systems (RACE), 2015 (pp. 1-7). IEEE.
Neshvad, S., Chatzinotas, S., & Sachau, J. (2015, February 16). Wideband Identification of Power Network Parameters Using Pseudo-Random Binary Sequences on Power Inverters. IEEE Transactions on Smart Grid.
Stathakis, A., Danoy, G., Bouvry, P., Talbi, E.-G., & Morelli, G. (2015). Optimizing communication satellites payload configuration with exact approaches. Engineering Optimization, 0(0), 1-26.
Tewari, U., Norta, D. P. B., & Kolmsee, K. (2015). Hydrokinetic Energy for Enlightening the Future of Rural Communities in Uttarakhand. Proceedings International Conference on Hydropower for Sustainable Development (pp. 146-157). Roorkee, India: IIT Roorkee, AHEC.
Norta, D. P. B., Lanser, C., Sachau, J., & Allelein, H.-J. (2015). Using Polyurethane to Reduce the Production Cost of Hydrokinetic Turbine Foils. Proceedings International Conference on Hydropower for Sustainable Development (pp. 135-145). Roorkee, India: IIT Roorkee, AHEC.
Max, C. (2015). Lernen in Bewegung: iPads im naturwissenschaftlichen Unterricht. Computer + Unterricht: Lernen und Lehren mit digitalen Medien, 97, 17-19.
Moawad, A., Hartmann, T., Fouquet, F., Nain, G., Klein, J., & Bourcier, J. (2015). Polymer: A Model-Driven Approach for Simpler, Safer, and Evolutive Multi-Objective Optimization Development. In S., Hammoudi, L. F., Pires, P., Desfray, & J., Filipe (Eds.), MODELSWARD 2015 - Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development (pp. 286-293). Portugal: SCITEPRESS.
Schwickart, T. K., Voos, H., Minaglou, J.-R., Darouach, M., & Rosich, A. (2015). Design and Simulation of a Real-Time Implementable Energy-Efficient Model-Predictive Cruise Controller for Electric Vehicles. Journal of the Franklin Institute, 352(2), 603-625.
El Kateb, D. (2015). BALANCING NON-FUNCTIONAL REQUIREMENTS IN CLOUD-BASED SOFTWARE: AN APPROACH BASED ON SECURITY-AWARE DESIGN AND MULTI-OBJECTIVE SOFTWARE DYNAMIC MANAGEMENT. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Le Traon, Y. (Promotor), Bouvry, P., Baudry, B., Bertolino, A., Mouelhi, T., & Fouquet, F.
Laczny, C., Sternal, T., Plugaru, V., Gawron, P., Atashpendar, A., Margossian, H. H., Coronado, S., van der Maaten, L., Vlassis, N., & Wilmes, P. (2015, January 20). VizBin - an application for reference-independent visualization and human-augmented binning of metagenomic data. Microbiome.
Castignani, G., Derrmann, T., Frank, R., & Engel, T. (2015). Driver Behavior Profiling Using Smartphones: A Low-Cost Platform for Driver Monitoring. Intelligent Transportation Systems Magazine, IEEE, 7(1), 91-102.
Colombo Tosatto, S. (2015). Proving Regulatory Compliance: Business Processes, Logic, Complexity. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: van der Torre, L. (Promotor), Boella, G. (Promotor), Governatori, G. (Promotor), Rinderle-Ma, S., & Montali, M.
Bianculli, D., Filieri, A., Ghezzi, C., & Mandrioli, D. (2015). Syntactic-Semantic Incrementality for Agile Verification. Science of Computer Programming, 97(0), 47-54.
Biryukov, A., Dinu, D.-D., & Khovratovich, D. (2015). Argon and Argon2. Password Hashing Competition (PHC).
Biryukov, A., & Pustogarov, I. (2015). Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay. Financial Cryptography and Data Security - 19th International Conference (pp. 10). Springer International Publishing.
Matinnejad, R., Nejati, S., Briand, L., Bruckmann, T., & Poull, C. (2015). Search-Based Automated Testing of Continuous Controllers: Framework, Tool Support, and Case Studies. Information and Software Technology, 57, 705-722.
Accettura, N., Vogli, E., Palattella, M. R., Grieco, L. A., Boggia, G., & Dohler, M. (2015). Decentralized Traffic Aware Scheduling in 6TiSCH Networks: Design and Experimental Evaluation. IEEE Internet of Things Journal.
Afzal, H., Aouada, D., Destelle, F., Mirbach, B., & Ottersten, B. (2015). View-Independent Enhanced 3D Reconstruction of Non-Rigidly Deforming Objects. 16th International Conference on Computer Analysis of Images and Patterns.
Aguilera Gonzalez, A., Voos, H., & Darouach, M. (2015). Glucose-Insulin Minimal Model Augmented: Identification and Validation. AMCA Congreso Nacional de Control Automatico 2015, Guernavaca, Mexico, 2015.
Ali, S., Iqbal, Z., Khalid, M., & Arcuri, A. (2015). Improving the Performance of OCL Constraint Solving with Novel Heuristics for Logical Operations: A SearchBased Approach. Empirical Software Engineering.
Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. Engineering Secure Software and Systems - 7th International Symposium ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings (pp. 51-67). Springer International Publishing.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2015). Constructive Multiuser Interference in Symbol Level Precoding for the MISO Downlink Channel. IEEE Transactions on Signal Processing.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2015). Spatial DCT-Based Channel Estimation in Multi-Antenna Multi-Cell Interference Channels. IEEE Transactions on Signal Processing.
Antonelo, E. A., & Schrauwen, B. (2015). On Learning Navigation Behaviors for Small Mobile Robots With Reservoir Computing Architectures. IEEE Transactions on Neural Networks and Learning Systems, 26(4), 763-780.
Appelt, D., Nguyen, D. C., & Briand, L. (2015). Behind an Application Firewall, Are We Safe from SQL Injection Attacks? 2015 IEEE 8th International Conference on Software Testing, Verification, and Validation (ICST).
Aravanis, A., Shankar, B., Arapoglou, P.-D., Danoy, G., Cottis, P. G., & Ottersten, B. (2015). Power Allocation in Multibeam Satellite Systems: A Two-Stage Multi-Objective Optimization. IEEE Transactions on Wireless Communications.
Arcuri, A., Fraser, G., & Galeotti, J. P. (2015). Generating TCP/UDP Network Data for Automated Unit Test Generation. 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE). ACM.
Avoine, G., Mauw, S., & Trujillo Rasua, R. (2015). Comparing distance bounding protocols: A critical mission supported by decision theory. Computer Communications, 67, 92–102.
Bahnsen, A. C., Aouada, D., & Ottersten, B. (2015). Ensemble of Example-Dependent Cost-Sensitive Decision Trees. arXiv preprint arXiv:1505.04637.
Baouya, A., Bennouar, D., Mohamed, O. A., & Ouchani, S. (2015). On the Probabilistic Verification of Time Constrained SysML State Machines. Intelligent Software Methodologies, Tools and Techniques (pp. 425--441). Springer International Publishing.
Baouya, A., Bennouar, D., Mohamed, O. A., & Ouchani, S. (2015). A probabilistic and timed verification approach of SysML state machine diagram. A probabilistic and timed verification approach of SysML state machine diagram.
Baouya, A., Bennouar, D., Mohamed, O. A., & Ouchani, S. (2015). A Quantitative Verification Framework of SysML Activity Diagrams under Time Constraints. Expert Systems with Applications.
Bardin, S., Delahaye, M., Kosmatov, N., David, R., Papadakis, M., Le Traon, Y., & Marion, J.-Y. (2015). Sound and Quasi-Complete Detection of Infeasible Test Requirements. 8th IEEE International Conference on Software Testing, Verification and Validation (ICST'15).
Bella, G., Curzon, P., & Lenzini, G. (2015). Service security and privacy as a socio-technical problem. JOURNAL OF COMPUTER SECURITY, 23(5), 563-585.
Bella, G., Giustolisi, R., Lenzini, G., & Ryan, P. (2015). A Secure Exam Protocol Without Trusted Parties. ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015.
Benenson, Z., Bleikertz, S., Foley, S. N., Harpes, C., Kowalski, S., Lenzini, G., Oliveira, D., Parkin, S., Pfleeger, S. L., Smith, P., & others. (2015). 4.2 Social Dynamics Metrics-Working Group Report. Socio-Technical Security Metrics, 17-19.
Benenson, Z., Lenzini, G., Oliveira, D., Parkin, S., & Uebelacker. (2015). Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. Proc. of the New Security Paradigm Workshop.
Beneson, Z., Lenzini, G., Oliveira, D., Parkin, S., & Uebelacker, S. (2015). Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security. Maybe Poor Johnny Really Cannot Encrypt - The Case for a Complexity Theory for Usable Security (pp. 85-99). ACM.
Bertolino, A., Daoudagh, S., El Kateb, D., Henard, C., Le Traon, Y., Lonetti, F., Marchetti, E., Mouelhi, T., & Papadakis, M. (2015). Similarity testing for access control. Information and Software Technology, 58, 355-372.
Bezzaoucha, S., & Henry, D. (2015). An LMI approach for the Integral Sliding Mode and Hinfinity State Feedback Control Problem. Journal of Physics, 12th European Workshop on Advanced Control and Diagnosis (ACD 2015).
Bezzaoucha, S., Marx, B., Maquin, D., & Ragot, J. (2015). State and output feedback control for Takagi-Sugeno systems with saturated actuators. International Journal of Adaptive Control and Signal Processing.
Bezzaoucha, S., Marx, B., Maquin, D., & Ragot, J. (2015). State constrained tracking control for nonlinear systems. Journal of the Franklin Institute, 352(7), 2866-2886.
Bhavani Shankar, M. R., Zheng, G., Maleki, S., & Ottersten, B. (2015). Feasibility study of full-duplex relaying in satellite networks. IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2015-August, 560-564.
Bianculli, D., Calinescu, R., & Rumpe, B. (Eds.). (2015). Software Engineering and Formal Methods - SEFM 2015 Collocated Workshops: ATSE, HOFM, MoKMaSD, and VERY*SCART, York, UK, September 7-8, 2015, Revised Selected Papers. Springer.
bikakis, A., & Caire, P. (2015). Computing coalitions in Multiagent Systems: A contextual reasoning approach. Lecture Notes in Computer Science, 8953.
Biryukov, A., & Vipul, G. (Eds.). (2015). Progress in Cryptology - INDOCRYPT 2015 - 16th International Conference on Cryptology in India. Springer.
Blumenthal, S., Hochgeschwender, N., Prassler, E., Voos, H., & Bruyninckx, H. (2015). An Approach for a Distributed World Model with QoS-Based Perception Algorithm Adaptation. 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems IROS, Hamburg, Germany, 2015 (pp. 1806 - 1811).
Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., & Zomaya, A. Y. (2015). Energy-efficient Data Replication in Cloud Computing Datacenters. Cluster Computing, 18(1), 385-402.
Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., & Zomaya, A. Y. (2015). Models for Efficient Data Replication in Cloud Computing Datacenters. IEEE International Conference on Communications (ICC), London, UK, 2015.
Butt, M. M., Jorswieck, E. A., & Ottersten, B. (2015). Maximizing energy efficiency in multiple access channels by exploiting packet dropping and transmitter buffering. IEEE Transactions on Wireless Communications, 14(8), 4129-4141.
Campos, J., Fraser, G., Arcuri, A., & Rui, A. (2015). Continuous Test Generation on Guava. Symposium on Search-Based Software Engineering (SSBSE). Springer.
Ceccato, M., Marchetto, A., Mariani, L., Nguyen, D. C., & Tonella, P. (2015). Do Automatically Generated Test Cases Make Debugging Easier? An Experimental Assessment of Debugging Effectiveness and Efficiency. The ACM Transactions on Software Engineering and Methodology (TOSEM), 25(1), 5:1--5:38.
Chatzinotas, S., Christopoulos, D., & Ottersten, B. (2015). Cellular-broadcast service convergence through caching for CoMP cloud RANs. arXiv preprint arXiv:1504.08274.
Chatzinotas, S., Ottersten, B., & DeGaudenzi, R. (Eds.). (2015). Cooperative and Cognitive Satellite Systems. Elsevier.
Chen, X., Mizera, A., & Pang, J. (2015). Activity tracking: A new attack on location privacy. Proceedings of the 3rd IEEE Conference on Communications and Network Security (CNS'15) (pp. 22-30). IEEE CS.
Cheng, R., Pang, J., & Zhang, Y. (2015). Inferring friendship from check-in data of location-based social networks. Proceedings of the 7th International Conference on Advances in Social Networks Analysis and Mining (ASONAM'15) (pp. 1284-1291). IEEE CS.
Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2015). Cellular-Broadcast Service Convergence through Caching for CoMP Cloud RANs. 22nd IEEE Symposium on Communications and Vehicular Technology in the Benelux.
Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2015). Multicast multigroup beamforming for per-antenna power constrained large-scale arrays. IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2015-August, 271-275.
Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2015). User Scheduling in Cooperative Satellite Systems. Cooperative and Cognitive Satellite Systems. Elsevier.
Christopoulos, D., Chatzinotas, S., Taricco, G., Vasquez, M. A., Perez-Neira, A., Arapoglou, P.-D., & Ginesi, A. (2015). Multibeam Joint Precoding: frame based design. Cooperative and Cognitive Satellite Systems. Elsevier.
Cole, M., & Giurgiu, A. (2015). The "Minimal" Approach: the CJEU on the Concept of "Establishment" Triggering Jurisdiction for DPAs and Limitations of Their Sanctioning Powers. European Data Protection Law Review.
Colombo Tosatto, S., Kelsen, P., & Governatori, G. (2015). Business Process Regulatory Compliance is Hard. IEEE Transactions on Services Computing, 8(6), 958-970.
Colombo Tosatto, S., Kelsen, P., Ma, Q., el Kharbili, M., Governatori, G., & van der Torre, L. (2015). Algorithms for tractable compliance problems. Frontiers of Computer Science, 9(1), 55-74.
Cramer, M., Ambrossio, D. A., & van Hertum, P. (2015). A Logic of Trust for Reasoning about Delegation and Revocation. Proceedings of the 20th ACM Symposium on Access Control Models and Technologies.
Cramer, M., Pang, J., & Zhang, Y. (2015). A logical approach to restricting access in online social networks. Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. ACM.
Demisse, G., Aouada, D., & Ottersten, B. (2015). Template-Based Statistical Shape Modelling on Deformation Space. 22nd IEEE International Conference on Image Processing.
Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., & Lenzini, G. (2015). A Framework for Analyzing Verifiability in Traditional and Electronic Exams. Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015.
El Kateb, D., Elrakaiby, Y., Mouelhi, T., Rubab, I., & Le Traon, Y. (2015). Towards a full support of obligations in XACML. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8924, 213-221.
El Kateb, D., Zannone, N., Moawad, A., Caire, P., Nain, G., Mouelhi, T., & Le Traon, Y. (2015). Conviviality-driven access control policy. Requirements Engineering, 20(4), 363-382.
Emara, K. A. A. E.-S., Woerndl, W., & Schlichter, J. (2015). CAPS: Context-Aware Privacy Scheme for VANET Safety Applications. ACM Wisec 15.
Emara, K. A. A. E.-S., Woerndl, W., & Schlichter, J. (2015). On Evaluation of Location Privacy Preserving Schemes for VANET Safety Applications. Computer Communications, 63(1), 11--23.
Emara, K. A. A. E.-S., Woerndl, W., & Schlichter, J. (2015). POSTER: Context-adaptive user-centric privacy scheme for VANET. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. Springer.
Evans, B., Thompson, P., Lagunas, E., Sharma, S. K., Tarchi, D., & Icolari, V. (2015). Extending the Usable Ka Band Spectrum for Satellite Communications: The CoRaSat Project. Advanced Next Generation Broadband Satellite Systems Workshop, International Conference on Wireless and Satellite Systems (WiSATS, formerly PSATS), Bradford, UK, July 2015.
Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2015). In Cyber-Space No One Can Hear You S·CREAM, A Root Cause Analysis for Socio-Technical Security. In S., Foresti (Ed.), Security and Trust Management (pp. 255-264). Springer.
Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., & Rivas, S. (2015). Do graphical cues effectively inform users? A socio-technical security study in accessing wifi networks. Lecture Notes in Computer Science, 9190, 323-334.
Ferreira, A., & Lenzini, G. (2015). An Analysis of Social Engineering Principles in Effective Phishing. Proc. of the 5th International Workshop on Socio-Technical Security and Trust. CSP.
Ferreira, A., Lenzini, G., & Conventry, L. (2015). Principles of Persuasion in Social Engineering and Their Use in Phishing. In I. A., T. Tryfonas (Ed.), Human Aspects of Information Security, Privacy, and Trust Third International Conference, HAS 2015 (pp. 36-47). Switzerland: Springer.
Fiandrino, C., Kliazovich, D., Bouvry, P., & Zomaya, A. Y. (2015). Network-Assisted Offloading for Mobile Cloud Applications. IEEE International Conference on Communications (ICC), London, UK, 2015.
Fiandrino, C., Kliazovich, D., Bouvry, P., & Zomaya, A. Y. (2015). Performance and Energy Efficiency Metrics for Communication Systems of Cloud Computing Data Centers. IEEE Transactions on Cloud Computing.
Fraser, G., & Arcuri, A. (2015). EvoSuite at the SBST 2015 Tool Competition. 8th International Workshop on Search-Based Software Testing (SBST) 2015. ACM.
Gao, N., Darouach, M., Alma, M., & Voos, H. (2015). Decentralized Dynamic Observer-Based Control for Large Scale Nonlinear Uncertain Systems. American Control Conference ACC 2015, Chicago, USA (pp. 4131-4136).
Garcia, F., & Ottersten, B. (2015). Real-time Curve-skeleton Extraction of Human-scanned Point Clouds. International Conference on Computer Vision Theory and Applications (VISAPP 2015) (pp. 54-60).
Gharanjik, A., Shankar, B., Arapoglou, P.-D., & Ottersten, B. (2015). Multiple Gateway Transmit Diversity in Q/V Band Feeder Links. IEEE Transactions on Communications.
Gheorghe, G., & Engel, T. (2015). Towards Reinventing Online Privacy. In B., Berendt, T., Engel, D., Ikonomou, D., Le Métayer, & S., Schiffner (Eds.), LNCS - Annual Privacy Forum 2015 - Bridging the gap between research and policy. Springer.
Giurgiu, A. (2015). No Place to Hide – Edward Snowden, the NSA and the Surveillance State. European Data Protection Law Review, 1(3), 249 - 254.
Giustolisi, R., Iovino, V., & Roenne, P. (2015). On the Possibility of Non-Interactive E-Voting in the Public-key Setting. IACR Cryptology ePrint Archive, 2015, 1119.
Gniewek, A. (2015). Ochrona danych osobowych w środowisku Chmury Obliczeniowej (ang. Cloud Computing ). Analiza wybranych elementów reformy przepisów o ochronie danych osobowych w Unii Europejskiej. In J., Kępiński, K., Klafkowska-Waśniowska, & R., Sikorski (Eds.), Własność intelektualna w obrocie elektronicznym. Tom V. Poland: Beck.
Guidotti, A., Icolari, V., Tarchi, D., Vanelli-Coralli, A., Sharma, S. K., Lagunas, E., Maleki, S., Chatzinotas, S., Grotz, J., Krause, J., Corbel, E., Evans, B., & Thompson, P. (2015). Spectrum Awareness and Exploitation for Cognitive Satellite Communications. European Conference on Networks and Communications (EuCNC), Paris, France, Jun 2015.
Guzek, M., Kliazovich, D., & Bouvry, P. (2015). HEROS: Energy-Efficient Load Balancing for Heterogeneous Data Centers. 8th IEEE International Conference on Cloud Computing IEEE CLOUD 2015.
He, S., Huang, Y., Yang, L., Ottersten, B., & Hong, W. (2015). Energy Efficient Coordinated Beamforming for Multicell System: Duality-Based Algorithm Design and Massive MIMO Transition. IEEE TRANSACTIONS ON COMMUNICATIONS, 63(12), 4920-4935.
Henard, C., Papadakis, M., Harman, M., & Le Traon, Y. (2015). Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines. 37th International Conference on Software Engineering (ICSE 2015).
Humphreys, L., Boella, G., Robaldo, L., Di Caro, L., Cupi, L., Ghanavati, S., Kiriinya, R. K. M., & van der Torre, L. (2015). Classifying and Extracting Elements of Norms for Ontology Population using Semantic Role Labelling. The 15th International Conference on Artificial Intelligence & Law — San Diego, June 8-12, 2015.
Humphreys, L., Santos, C., Di Caro, L., Boella, G., Robaldo, L., & van der Torre, L. (2015). Mapping Recitals to Normative Provisions in EU Legislation to Assist Legal Interpretation. Proceedings of the 28th International Conference on Legal Knowledge and Information Systems.
Iovino, V., & Żebrowski, K. (2015). Simulation-Based Secure Functional Encryption in the Random Oracle Model. Progress in Cryptology -- LATINCRYPT 2015 (pp. 19). Springer.
Jamroga, W., & Tabatabaei, M. (2015). Accumulative knowledge under bounded resources. Journal of Logic & Computation, 003.
Jamroga, W., & Tabatabaei, M. (2015). Strategic Noninterference. ICT Systems Security and Privacy Protection (pp. 67--81). Springer.
Jasim, I., Plapper, P., & Voos, H. (2015). Adaptive sliding mode fuzzy control for unknown robots with arbitrarily-switched constraints. Mechatronics, 30C, 174-186.
Jasim, I., Plapper, P., & Voos, H. (2015). Contact-State Modelling in Force-Controlled Robotic Peg-in-Hole Assembly Processes of Flexible Objects Using Optimised Gaussian Mixtures. Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture.
Jhawar, R., Kordy, B., Mauw, S., Radomirovic, S., & Trujillo Rasua, R. (2015). Attack Trees with Sequential Conjunction. In H., Federrath & D., Gollmann (Eds.), ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015 (pp. 339--353). Springer.
Jonker, H., Mauw, S., & Radomirovic, S. (2015). Location-private interstellar communication. 23rd Security Protocols Workshop. Springer-Verlag.
Kalantari, A., Maleki, S., Zheng, G., Chatzinotas, S., & Ottersten, B. (2015). Joint Power Control in Wiretap Interference Channels. IEEE Transactions on Wireless Communications.
Kalantari, A., & Ottersten, B. (2015). Secrecy Analysis on Network Coding in Bidirectional Multibeam Satellite Communications. IEEE Transactions on Information Forensics and Security.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. K. (2015). Performance Analysis of Underlay Cognitive Radio Systems: Estimation-Throughput Tradeoff. arXiv preprint arXiv:1510.03353.
Kaushik, A., Sharma, S. K., Chatzinotas, S., Ottersten, B., & Jondral, F. K. (2015). Sensing-Throughput Tradeoff for Interweave Cognitive Radio System: A Deployment-Centric Viewpoint. Wireless Communications, IEEE Transactions on, PP(99), 14.
Kayhan, F., Mazzali, N., & Shankar, B. (2015). Constellation Design in Four Dimensions under Average Power Constraint. Proceedings on IEEE Symposium on Communications and Vehicular Technology in the Benelux.
Kayhan, F., Montorsi, G., Taricco, G., & Alagha, N. (2015). Comparative Assessment of Orthogonal and Nonorthogonal Multiplexing Techniques for Differentiated Satellite Broadcasting Services. Paper presented at 22nd IEEE Symposium on Communications and Vehicular Technology in the Benelux.
Kintis, M., Papadakis, M., & Malevris, N. (2015). Employing second-order mutation for isolating first-order equivalent mutants. Software Testing, Verification & Reliability, 25(5-7), 508-535.
Kliazovich, D., Bouvry, P., Granelli, F., & Fonseca, N. L. S. (2015). Energy Consumption Optimization in Cloud Data Centers. Cloud Services, Networking and Management. Wiley.
Kreutz, D., Ramos, F. M. V., Verissimo, P., Rothenberg, C. E., Azodolmolky, S., & Uhlig, S. (2015). Software-Defined Networking: A Comprehensive Survey. Proceedings of the IEEE, 103(1), 14-76.
Lagunas, E., Sharma, S. K., Maleki, S., Chatzinotas, S., Grotz, J., Krause, J., & Ottersten, B. (2015). Resource allocation for cognitive satellite uplink and fixed-service terrestrial coexistence in ka-band. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 156, 487-498.
Lagunas, E., & Nájar, M. (2015). Spectral Feature Detection with sub-Nyquist Sampling for Wideband Spectrum Sensing. IEEE Transactions on Wireless Communications.
Lanze, F., Panchenko, A., Ponce-Alcaide, I., & Engel, T. (2015). Hacker’s Toolbox: Detecting Software-Based 802.11 Evil Twin Access Points. Proceedings of the 12th Annual IEEE Consumer Communications & Networking Conference (CCNC 2015).
Lenzini, G., & Ferreira, A. (2015). Can Transparency Enhancing Tools support patient's accessing Electronic Health Records? Advances in Intelligent Systems and Computing. Springer.
Li, J., Sattar, S. A., Baig, M. M., Liu, J., Tang, Q., & Malin, B. (2015). Methods to Mitigate Risk of Composition Attack in Independent Data Publications. Medical Data Privacy Handbook 2015. Springer.
Li, L., Bartel, A., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2015). IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering (ICSE 2015).
Li, L., Bissyandé, T. F., Klein, J., & Le Traon, Y. (2015). An Investigation into the Use of Common Libraries in Android Apps. arXiv preprint arXiv:1511.06554.
Li, Y., & Pang, J. (2015). Formalizing provable anonymity in Isabelle/HOL. Formal Aspects of Computing, 27(2), 255-282.
Li, Y., Pang, J., Lv, Y., Fan, D., Cao, S., & Duan, K. (2015). paraVerifier: An automatic framework for proving parameterized cache coherence protocols. Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15) (pp. 207-213).
Li, Y., Voos, H., & Darouach, M. (2015). Nonlinear protocols for distributed consensus in directed networks of dynamic agents. Journal of the Franklin Institute, 352(9), 3645-3669.
Liu, B., Lucia, L., Nejati, S., & Briand, L. (2015). Simulink Fault Localization: an Iterative Statistical Debugging Approach (TR-SnT-2015-8).
Maleki, S., Chatzinotas, S., Krause, J., Liolis, K., & Ottersten, B. (2015). Cognitive Zone for Broadband Satellite Communication in 17.3-17.7 GHz Band. IEEE Wireless Communications Letters.
Maleki, S., Ciblat, P., Chatzinotas, S., Kapetanovic, D., & Ottersten, B. (2015). Cooperative Power and DoT Estimation for a Directive Source. Asilomar Conference on Signals, Systems, and Computers 2015.
Maleki, S., Leus, G., Chatzinotas, S., & Ottersten, B. (2015). To AND or To OR: On Energy-Efficient Distributed Spectrum Sensing with Combined Censoring and Sleeping. IEEE Transactions on Wireless Communications.
Martinez, J., Rossi, G., Ziadi, T., Bissyandé, T. F. D. A., Klein, J., & Traon, Y. L. (2015). Estimating and Predicting Average Likability on Computer-Generated Artwork Variants. Genetic and Evolutionary Computation Conference, GECCO 2015, Madrid Spain, July 11-15, 2015, Companion Material Proceedings (pp. 1431--1432). ACM.
Martinez, J., Ziadi, T., Bissyandé, T. F., Klein, J., & Traon, Y. L. (2015). Bottom-up adoption of software product lines: a generic and extensible approach. Proceedings of the 19th International Conference on Software Product Line, SPLC 2015, Nashville, TN, USA, July 20-24, 2015 (pp. 101--110).
Martinez, J., Ziadi, T., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2015). Automating the Extraction of Model-based Software Product Lines from Model Variants. 30th IEEE/ACM International Conference on Automated Software Engineering (ASE 2015).
Matinnejad, R., Nejati, S., & Briand, L. (2015). Automated Test Suite Generation for Time-Continuous Simulink Models (TR-SnT-2015-7).
Matinnejad, R., Nejati, S., Briand, L., & Bruckmann, T. (2015). Effective Test Suites for Mixed Discrete-Continuous Stateflow Controllers. Proceedings of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
Mauw, S., & Piramuthu, S. (2015). PUF-based authentication protocol to address ticket-switching of RFID-tagged items. Proc. 8th Workshop on Security and Trust Management, Pisa, Italy, September 13-14 2012. Springer-Verlag.
Mauw, S., & Radomirovic, S. (2015). Generalizing multi-party contract signing. Proc. 4th Conference on Principles of Security and Trust (POST'15). London, UK: Springer Verlag.
Mazzali, N., Stante, G., Shankar, B., & Ottersten, B. (2015). Performance Analysis of Noncoherent Frame Synchronization in Satellite Communications with Frequency Uncertainty. Proceedings on IEEE Symposium on Communications and Vehicular Technology in the Benelux.
Mileva, A., Dimitrova, V., & Velichkov, V. (2015). Analysis of the Authenticated Cipher MORUS (v1). Cryptography and Information Security in the Balkans: First International Conference, BalkanCryptSec 2015 (Lecture Notes in Computer Science). Springer.
Mizera, A., Pang, J., & Yuan, Q. (2015). ASSA-PBN: An approximate steady-state analyser for probabilistic Boolean networks. Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15) (pp. 214-220). Springer.
Nguyen-Thanh, N., Ciblat, P., Maleki, S., & Nguyen, V.-T. (2015). How many bits should be reported in quantized cooperative spectrum sensing? IEEE Wireless Communications Letters.
Ouchani, S., & Debbabi, M. (2015). Specification, verification, and quantification of security in model-based systems. Computing, 97, 691-711.
Ouchani, S., & Lenzini, G. (2015). Generating attacks in SysML activity diagrams by detecting attack surfaces. Journal of Ambient Intelligence and Humanized Computing, 6(3), 361-373.
Palacios, R., Mekonnen, G., Alonso-Zarate, J., Kliazovich, D., & Granelli, F. (2015). Analysis of an Energy-Efficient MAC Protocol Based on Polling for IEEE 802.11 WLAN. IEEE International Conference on Communications (ICC), London, UK, June 2015.
Palattella, M. R., Vilajosana, X., Chang, T., Reina Ortega, M. A., & Watteyne, T. (2015). Lessons Learned from the 6TiSCH Plugtests. Proc. of EAI Int. Conf. on Interoperability in IoT (InterIoT).
Palattella, M. R., Watteyne, T., Wang, Q., Muraoka, K., Accettura, N., Dujovne, D., Grieco, L. A., & Engel, T. (2015). On-the-Fly Bandwidth Reservation for 6TiSCH Wireless Industrial Networks. IEEE Sensors Journal.
Pang, J., & Zhang, Y. (2015). Cryptographic protocols for enforcing relationship-based access control policies. Proceedings of the 39th Annual IEEE Computers, Software & Applications Conference (COMPSAC'15) (IEEE CS, pp. 484-493).
Pang, J., & Zhang, Y. (2015). Event prediction with community leaders. Proceedings of the 10th International Conference on Availability, Reliability and Security (ARES'15) (pp. 238-243). IEEE CS.
Pang, J., & Zhang, Y. (2015). Exploring communities for effective location prediction. Proceedings of the 24th World Wide Web Conference. ACM.
Pang, J., & Zhang, Y. (2015). Location prediction: Communities speak louder than friends. Proceedings of the 3rd ACM Conference on Online Social Networks (COSN'15) (pp. 161-171). ACM.
Pang, J., & Zhang, Y. (2015). A new access control scheme for Facebook-style social networks. Computers & Security, 54, 44-59.
Papadakis, M., & Le Traon, Y. (2015). Metallaxis-FL: mutation-based fault localization. Software Testing : Verification & Reliability, 25, 605-628.
Papadakis, M., Yue, J., Harman, M., & Le Traon, Y. (2015). Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique. 37th International Conference on Software Engineering (ICSE 2015).
Pennanen, H., Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2015). Distributed Coordinated Beamforming for Multi-cell Multigroup Multicast Systems. arXiv preprint arXiv:1511.03561.
Pérez-Neira, A., Veciana, J., Vázquez, M. A., & Lagunas, E. (2015). Distributed Power Control with Received Power Constraints for Time-Area-Spectrum Licenses. Signal Processing.
Piazza, R., Bhavani Shankar, M. R., & Ottersten, B. (2015). Generalized direct predistortion with adaptive crest factor reduction control. ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 2015-August, 3242-3246.
Qu, H., Yuan, Q., Pang, J., & Mizera, A. (2015). Improving BDD-based attractor detection for synchronous Boolean networks. Proceedings of the 7th Asia-Pacific Symposium on Internetware. ACM.
Rahli, V., & Bickford, M. (2015). Coq as a Metatheory for Nuprl with Bar Induction. Paper presented at Continuity, Computability, Constructivity – From Logic to Algorithms (CCC 2015).
Rahli, V., Guaspari, D., Bickford, M., & Constable, R. L. (2015). Formal Specification, Verification, and Implementation of Fault-Tolerant Systems using EventML. EASST.
Ralha, R., Falcao, G., Andrade, J., Goncalves Almeida Antunes, M., Barreto, J. P., & Nunes, U. (2015). Distributed Dense Stereo Matching for 3D Reconstruction using Parallel-based Processing Advantages. Proc. of the 40th International Conference on Acoustics, Speech and Signal Processing (ICASSP).
Ramalingam, S., Goncalves Almeida Antunes, M., Snow, D., Lee, G. H., & Pillai, S. (2015). Line-Sweep: Cross-Ratio for Wide-Baseline Matching and 3D Reconstruction. IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Ramos, F. M. V., Kreutz, D., & Verissimo, P. (2015). On the Road to the Softwarization of Networking. Cutter IT Journal, 28, 6-13.
Robaldo, L., Humphreys, L., Sun, X., Cupi, L., Muthuri, R., & Santos, C. (2015). Combining Input/Output logic and Rei cation for representing real-world obligations. Proceedings of the 9th International Workshop on Juris-informatic (JURISIN 2015).
Robaldo, L., Humphreys, L., Sun, X., Cupi, L., Santos, C., & Muthuri, R. (2015). The ProLeMAS project: representing natural language norms in Input/Output logic. Paper presented at 9th International Workshop on Juris-informatic.
Rojas, J. M., Fraser, G., & Arcuri, A. (2015). Automated Unit Test Generation during Software Development: A Controlled Experiment and Think-Aloud Observations. ACM International Symposium on Software Testing and Analysis (ISSTA), 2015. ACM.
Rojas, M., Campos, J., Vivanti, M., Fraser, G., & Arcuri, A. (2015). Combining Multiple Coverage Criteria in Search-Based Unit Test Generation. Symposium on Search-Based Software Engineering (SSBSE). Springer.

2016

Ryan, P., Roenne, P., & Iovino, V. (2016). Selene: Voting with Transparent Verifiability and Coercion-Mitigation. Abstract book of 1st Workshop on Advances in Secure Electronic Voting, 2015, 1105.

2015

Shamshiri, S., Just, R., Rojas, J. M., Fraser, G., McMinn, P., & Arcuri, A. (2015). Do Automatically Generated Unit Tests Find Real Faults? An Empirical Study of Effectiveness and Challenges. Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering (ASE). ACM.
Shankar, B., Zheng, G., Maleki, S., & Ottersten, B. (2015). Feasibility Study of Full-duplex Relaying in Satellite Networks. The 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2015.
Shar, L. K., Briand, L., & Tan, H. B. K. (2015). Web Application Vulnerability Prediction using Hybrid Program Analysis and Machine Learning. IEEE Transactions on Dependable and Secure Computing, 12(6), 688-707.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2015). Cognitive interference alignment for spectral coexistence. Cognitive Radio and Networking for Heterogeneous Wireless Networks (pp. 37--65). Springer International Publishing.
Soltana, G. (2015). A Model-Based Framework for Legal Policy Simulation and Legal Compliance Checking. Doctoral Symposium co-located with 18th ACM/IEEE International Conference on Model-Driven Engineering Languages and Systems (DS@MODELS 2015). CEUR Workshop Proceedings.
Soltana, G., Sannier, N., Sabetzadeh, M., & Briand, L. (2015). A Model-Based Framework for Probabilistic Simulation of Legal Policies. 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS'15) (pp. 70-79). IEEE.
Sun, X., & Ambrossio, D. A. (2015). Computational Complexity of Input/Output Logic. Lecture Notes in Computer Science, 9426.
Sun, X., & Ambrossio, D. A. (2015). On the complexity of input/output logic. Proceedings of the Fifth International Conference on Logic, Rationality and Interaction.
sun, X., & Robaldo, L. (2015). Logic and Games for Ethical Agents in Normative Multi-agent Systems. proc. of 13th European Conference on Multi-Agent Systems/3rd International Conference on Agreement Technologies.
Tang, Q. (2015). Towards Forward Security Properties for PEKS and IBE. Information Security and Privacy - 20th Australasian Conference, ACISP 2015.
Thome, J. (2015). A Scalable and Accurate Hybrid Vulnerability Analysis Framework. Doctoral Symposium co-located with 26th IEEE International Symposium on Software Reliability Engineering (2015).
Thome, J., Shar, L. K., & Briand, L. (2015). Security Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities. 26th IEEE International Symposium on Software Reliability Engineering.
Thubert, P., Palattella, M. R., & Engel, T. (2015). 6TiSCH Centralized Scheduling: when SDN Meet IoT. Proc. of IEEE Conf. on Standards for Communications & Networking (CSCN’15).
Trujillo Rasua, R., & Domingo-Ferrer, J. (2015). Privacy in Spatio-Temporal Databases: A Microaggregation-Based Approach. In G., Navarro-Arribas & T., Vicenç (Eds.), Advanced Research in Data Privacy (pp. 197-214). Springer.
Trujillo Rasua, R., & Yero, I. G. (2015). k-Metric Antidimension: a Privacy Measure for Social Graphs. Information Sciences, 328, 403 – 417.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2015). Power Control in Cognitive Radio Networks Using Cooperative Modulation and Coding Classification. Proceedings of 10th International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM) 2015.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2015). Power control in cognitive radio networks using cooperative modulation and coding classification. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 156, 358-369.
van der Linden, D., & Van Zee, M. (2015). nsights from a Study on Decision Making in Enterprise Architecture. In Short Paper Proceedings of the 8th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM).
Van Zee, M. (2015). Rational Architecture = Architecture from a Recommender Perspective. Proceedings of the International Joint Conference on Artificial Intelligence.
Van Zee, M., Bex, F., & Ghanavati, S. (2015). Rationalization of Goal Models in GRL using Formal Argumentation. In Proceedings of RE: Next! track at the Requirements Engineering Conference 2015 (RE'15).
Van Zee, M., Doder, D., Dastani, M., & van der Torre, L. (2015). AGM Revision of Beliefs about Action and Time. Proceedings of the International Joint Conference on Artificial Intelligence.
Van Zee, M., Doder, D., Dastani, M., & van der Torre, L. (2015). Consistency Conditions for Beliefs and Intentions. Paper presented at the Twelfth International Symposium on Logical Formalizations of Commonsense Reasoning.
Van Zee, M., & Icard, T. (2015). Intention Reconsideration as Metareasoning. Paper presented at Bounded Optimality and Rational Metareasoning NIPS 2015 Workshop.
Van Zee, M., & van der Linden, D. (2015). ARMED: ARgumentation Mining and reasoning about Enterprise architecture Decisions. Proceedings of the 27th Benelux Conference on Artificial Intelligence (BNAIC2015).
Vázquez, M. Á., Pérez-Neira, A., Christopoulos, D., Chatzinotas, S., Ottersten, B., Arapoglou, P.-D., Ginesi, A., & Taricco, G. (2015). Precoding in multibeam satellite communications: present and future challenges. jourlib Journal.
Vazquez, M.-A., Neira, A.-P., Mosquera, C., Shankar, B., Panagopoulos, A., Giambene, G., Siris, V., Polyzos, G., & Alagha, N. (2015). Pushing for higher rates and efficiency in Satcom: the different perspectives within SatNExIV. Proceedings of the 11th International Symposium on Wireless Communication Systems (ISWCS 2015).
Vogl, A., Louveton, N., Mccall, R., Billinghurst, M., & Haller, M. (2015). Understanding the Everyday Use of Head-Worn Computers. Understanding the Everyday Use of Head-Worn Computers.
Volp, M., Asmussen, N., Härtig, H., Nöthen, B., & Fettweis, G. (2015). Towards Dependable CPS Infrastructures: Architectural and Operating-System Challenges. Paper presented at Emerging Technologies and Factory Automation (ETFA) --- Special Session on Secure and Resilient Industrial Automation and Control Systems (invited paper).
Vu, T. X., Duhamel, P., & Di Renzo, M. (2015). On the Diversity of Network-Coded Cooperation With Decode-and-Forward Relay Selection. IEEE Transactions on Wireless Communications, 14(8), 4369-4378.
Vu, T. X., Duhamel, P., & Di Renzo, M. (2015). Performance Analysis of Network Coded Cooperation with Channel Coding and Adaptive DF-Based Relaying in Rayleigh Fading Channels. IEEE Signal Processing Letters, 22(9), 1354-1358.
Vu, T. X., Nguyen, H. D., & Quek, T. Q. S. (2015). Adaptive Compression and Joint Detection for Fronthaul Uplinks in Cloud Radio Access Networks. IEEE Transactions on Communications, 63(11), 4565-4575.
Vu, T. X., Quek, T. Q. S., & Nguyen, H. D. (2015). Joint Decoding and Adaptive Compression with QoS Constraint for Uplinks in Cloud Radio Access Networks. 2015 IEEE Global Communications Conference (GLOBECOM).
Zenteno, E., Piazza, R., Bhavani Shankar, M. R., Rönnow, D., & Ottersten, B. (2015). Multiple-input multiple-output symbol rate signal digital predistorter for non-linear multi-carrier satellite channels. Communications, IET, 9(16), 2053--2059.
Zenteno, E., Piazza, R., Shankar, B., Ronnow, D., & Ottersten, B. (2015). Low Complexity Predistortion and Equalization in Nonlinear Multicarrier Satellite Communications. EURASIP Journal on Advances in Signal Processing.
Zenteno, E., Piazza, R., Shankar, B., Ronnow, D., & Ottersten, B. (2015). A MIMO Symbol Rate Signal Digital Predistorter for Nonlinear Multicarrier Satellite Channels. IET Communications, 9(15), 2053–2059.
Zhang, Y., & Pang, J. (2015). Community-Driven Social Influence Analysis and Applications. Proceedings of the 15th International Conference on Web Engineering. Springer.

2014

Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014, December 24). Empirical assessment of machine learning-based malware detectors for Android: Measuring the Gap between In-the-Lab and In-the-Wild Validation Scenarios. Empirical Software Engineering, 1-29.
Bikakis, Antonis, & Caire, P. (2014). Computing coalitions in Multiagent Systems, A contextual reasoning approach. European Conference on Multi-Agent Systems, Prague 18-19 December 2014.
Guzek, M. (2014). Holistic, Autonomic, and Energy-aware Resource Allocation in Cloud Computing. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Correa Bahnsen, A., Aouada, D., & Ottersten, B. (2014). Example-Dependent Cost-Sensitive Logistic Regression for Credit Scoring. 2014 13th International Conference on Machine Learning and Applications (pp. 263-269). Detroit, Uni: IEEE.
Kalantari, A., Maleki, S., Zheng, G., Chatzinotas, S., & Ottersten, B. (2014). Feasibility of Positive Secrecy Rate in Wiretap Interference Channels. IEEE Global Conference on Signal and Information Processing (GlobalSIP).
Gharanjik, A., Liolis, K., Shankar, B., & Ottersten, B. (2014). Spatial Multiplexing in Optical Feeder Links for High Throughput Satellites. Spatial Multiplexing in Optical Feeder Links for High Throughput Satellites.
Ko, D., Ma, K., Park, S., Kim, S., Kim, D., & Le Traon, Y. (2014, December 01). API Document Quality for Resolving Deprecated APIs. Paper presented at The 21st Asia-Pacific Software Engineering Conference.
Biryukov, A., Bouillaguet, C., & Khovratovich, D. (2014). Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key. 20th International Conference on the Theory and Application of Cryptology and Information Security. Springer International Publishing.
Bronzi, W., Frank, R., Castignani, G., & Engel, T. (2014). Bluetooth Low Energy for Inter-Vehicular Communications. 2014 IEEE Vehicular Networking Conference (VNC).
Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2014). Sum Rate Maximizing Multigroup Multicast Beamforming under Per-antenna Power Constraints. In Proc. of IEEE, Global Communications Conference, GLOBECOM.
Frank, R., & Forster, M. (2014). Demo: A Recommendation Based Driver Assistance System to Mitigate Vehicular Traffic Shock Waves. 2014 IEEE Vehicular Networking Conference (VNC) (pp. 129-130).
Gao, N., Darouach, M., Voos, H., & Alma, M. (2014). H-infinity dynamic observer design for linear time invariant systems. 2014 IEEE 53rd Annual Conference on Decision and Control (CDC), Los Angeles, USA (pp. 1631 - 1636).
Guzek, M., Besseron, X., Varrette, S., Danoy, G., & Bouvry, P. (2014). ParaMASK: a Multi-Agent System for the Efficient and Dynamic Adaptation of HPC Workloads. 14th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2014).
Kieffer, E., Stathakis, A., Danoy, G., Bouvry, P., & Morelli, G. (2014). Bi-objective Exact Optimization of Satellite Payload Power Configuration. VIII ALIO/EURO Workshop on Applied Combinatorial Optimization.
Kieffer, E., Stathakis, A., Danoy, G., Bouvry, P., Talbi, E.-G., & Morelli, G. (2014). Multi-Objective Evolutionary Approach for the Satellite Payload Power Optimization Problem. IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2014).
Kracheel, M., Bronzi, W., & Kazemi, H. (2014). A Wearable Revolution: Is the smartwatch the next small big thing? IT ONE Magazine 2014, 7(December), p. 18-19.
Marchal, S., François, J., State, R., & Engel, T. (2014). PhishStorm: Detecting Phishing With Streaming Analytics. IEEE Transactions on Network and Service Management, 11(December), 458-471.
N'Doye, I., Voos, H., Laleg-Kirati, T.-M., & Darouach, M. (2014). H-infinity Adaptive Observer Design and Parameter Identification for a Class of Nonlinear Fractional-Order Systems. 53rd IEEE Conference Decision and Control, CDC’14, Los Angeles, USA, 15-17 Dec. 2014.
Papadakis, M., Delamaro, E. M., & Le Traon, Y. (2014). Mitigating the Effects of Equivalent Mutants with Mutant Classification Strategies. Science of Computer Programming, 95, 298-319.
McCall, R. (2014, November 14). Gamifying the Commute. Paper presented at Sustainable Transportation Seminar Series, Stanford, United States.
Ben Fadhel, A., Bianculli, D., & Briand, L. (2014). A Comprehensive Modeling Framework for Role-based Access Control Policies (TR-SnT-2014-15). SnT Centre - University of Luxembourg.
Bianculli, D., Ghezzi, C., Krstić, S., & San Pietro, P. (2014). Offline Trace Checking of Quantitative Properties of Service-Based Applications. Proceedings of the 7h International Conference on Service Oriented Computing and Application (SOCA 2014).
Biryukov, A., & Khovratovich, D. (2014). PAEQ: Parallelizable Permutation-Based Authenticated Encryption. 17th Information Security Conference. Springer International Publishing.
Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014). Deanonymisation of clients in Bitcoin P2P network. ACM Conference on Computer and Communications Security (CCS). ACM.
Biryukov, A., & Pustogarov, I. (2014). Bitcoin over Tor isn't a good idea. 2015 IEEE Symposium on Security and Privacy (pp. 122-134). IEEE Computer Society.
Blondeau, C., & Perrin, L. P. (2014). More differentially 6-uniform power functions. Designs, Codes and Cryptography, 73(2), 487-505.
Colombo Tosatto, S., & Van Zee, M. (2014, November). Bridging Social Network Analysis and Judgment Aggregation. Social Informatics - 6th International Conference, SocInfo 2014, Barcelona, Spain, November 11-13, 2014. Proceedings.
Forster, M., Frank, R., & Engel, T. (2014). An Event-Driven Inter-Vehicle Communication Protocol to Attenuate Vehicular Shock Waves. International Conference on Connected Vehicles and Expo (pp. 6).
Gao, N., Darouach, M., Alma, M., & Voos, H. (2014). H∞ decentralized dynamic-observer-based control for large-scale uncertain nonlinear systems. IEEE Int. Conf. on Control, Decision and Information Technologies (CoDIT), Metz, France, 3-5 Nov. 2014 (pp. 364 - 369).
Guzek, M., Pecero, J., Dorronsoro, B., & Bouvry, P. (2014). Multi-objective evolutionary algorithms for energy-aware scheduling on distributed computing systems. Applied Soft Computing, 24, 432-446.
Hartmann, T., Fouquet, F., Klein, J., Le Traon, Y., Pelov, A., Toutain, L., & Ropitault, T. (2014). Generating Realistic Smart Grid Communication Topologies Based on Real-Data. 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
Jasim, I., Plapper, P., & Voos, H. (2014). Position Identification in Force-Guided Robotic Peg-in-Hole Assembly Tasks. Procedia CIRP, 22, 217–222.
Kannan, S., Alma, M., Olivares Mendez, M. A., & Voos, H. (2014). Adaptive Control of Aerial Manipulation Vehicle. Porceedings of the 4th IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM, COMPUTING AND ENGINEERING.
Marchal, S., François, J., State, R., & Engel, T. (2014, November). PhishScore: Hacking Phishers' Minds. Proceedings of the 10th International Conference on Network and Service Management, 46-54.
Piazza, R., Shankar, B., & Ottersten, B. (2014). Data Predistortion for Multicarrier Satellite Channels Based on Direct Learning. IEEE Transactions on Signal Processing, 62(22).
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2014). Exploiting polarization for spectrum awareness in cognitive satellite communications. Exploiting polarization for spectrum awareness in cognitive satellite communications (pp. 856-883). IGI Global.
Sharma, S. K. (2014). Interweave/Underlay Cognitive Radio Techniques and Applications in Satellite Communication Systems. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Melakessou, F., & Engel, T. (2014, October 27). Scilab Modelling and Simulation of Communication Networks: Car Traffic Analysis in Luxembourg. Abstract book of 30th International CAE Conference, CAE'14.
Afshari, S., Popleteev, A., McCall, R., & Engel, T. (2014). Magnetic Interaction with Devices: A Pilot Study on Mobile Gaming. Proceedings of NordiCHI '14, October 26 - 30 2014, Helsinki, Finland (pp. 891-894).
Beattie, D., Baillie, L., Halvey, M., & McCall, R. (2014). What's Around the Corner? Enhancing Driver Awareness in Autonomous Vehicles via In-Vehicle Spatial Auditory Displays. Proceedings of NordiCHI '14, October 26 - 30 2014, Helsinki, Finland (pp. 10). Helsinki, Finland: ACM.
Li, Y., Voos, H., & Darouach, M. (2014). A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique. In M. H., Au (Ed.), International Conference on Network and System Security, NSS 2014, Xi'An, China, 15-17 October 2014 (pp. 209-222). Switzerland: Springer.
Schwickart, T. K., & Voos, H. (2014). Fahrerassistenzsystem zur vorausschauenden energieeffizienten Geschwindigkeitsregelung speziell für Elektrofahrzeuge. Tagungsband VDI Tagung Fahrerassistenzsysteme (pp. 8).
Decouchant, J., Ben Mokhtar, S., & Quéma, V. (2014, October 09). AcTinG: Accurate Freerider Tracking in Gossip. Paper presented at IEEE Symposium on Reliable Distributed Systems, Nara, Japan.
Pan, L., Voos, H., & Darouach, M. (2014). Exponential Synchronization for a New Class of Complex Dynamical Network with PIPC and Hybrid TVD. IEEE Multi-Conference on Systems and Control, MSC 2014. IEEE.
Rosich, A., Voos, H., & Pan, L. (2014). Network Design for Distributed Model-Based Fault Detection and Isolation. IEEE Multi-Conference on Systems and Control, MSC 2014. IEEE.
Araujo, W., Briand, L., & Labiche, Y. (2014). On the Effectiveness of Contracts as Test Oracles in the Detection and Diagnosis of Functional Faults in Concurrent Object- Oriented Software. IEEE Transactions on Software Engineering, 40(10), 971-992.
Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2014). Weighted Fair Multicast Multigroup Beamforming under Per-antenna Power Constraints. Signal Processing, IEEE Transactions on, 62(19), 5132-5142.
Bianculli, D., Filieri, A., Ghezzi, C., & Mandrioli, D. (2014). Incremental Syntactic-Semantic Reliability Analysis of Evolving Structured Workflows. Proceedings of the 6th International Symposium On Leveraging Applications of Formal Methods Verification and Validation (ISoLA 2014). Springer.
Codeca, L., Frank, R., & Engel, T. (2014). Traffic Routing in Urban Environments: the Impact of Partial Information. Proceedings of 17th Internatonal IEEE Conference on Intelligent Transportation Systems.
El Kateb, D., Fouquet, F., bourcier, J., & Le Traon, Y. (2014, October). Optimizing Multi-Objective Evolutionary Algorithms to Enable Quality-Aware Software Provisioning. Paper presented at The 14th International Conference on Quality Software.
Hochgeschwender, N., Schneider, S., Voos, H., & Kraetzschmar, G. (2014). Declarative Specification of Robot Perception Architectures. Int. Conf. on Simulation, Modeling and Programming for Autonomous Robots (SIMPAR), Bergamo, Italy, Oct. 2014.
Kieffer, E., Stathakis, A., Danoy, G., Talbi, E.-G., & Bouvry, P. (2014). Bi-objective Optimization of Satellite Payload Power Configuration. International Conference on Metaheuristics and Nature Inspired Computing (META 2014).
Schwickart, T. K., Voos, H., & Darouach, M. (2014). A Real-Time Implementable Model-Predictive Cruise Controller for Electric Vehicles and Energy-Efficient Driving. IEEE Multi-Conference on Systems and Control (MSC), Antibes, France, Oct. 2014 (pp. 6).
Kracheel, M., McCall, R., & Koenig, V. (2014, September 30). STUDYING COMMUTER BEHAVIOUR FOR GAMIFYING MOBILITY. Paper presented at European Transport Conference, Frankfurt, Germany.
Kracheel, M., McCall, R., Koenig, V., Engel, T., & Martin, R. (2014, September 30). Incentives and gaming environments for changing commuter behaviour. Paper presented at European Transport Conference, Frankfurt, Germany.
Melakessou, F., Palattella, M. R., & Engel, T. (2014). Towards a New Way of Reliable Routing: Multiple Paths over ARCs. Towards a New Way of Reliable Routing: Multiple Paths over ARCs.
Ziegler, G., Max, C., Durus, N., & Moreau, R. (2014, September 18). Peer Language Learning: Perspectives from Blended, Face-to-Face and Social Media Interactions. Open Education Europa, 41.
Norta, D. P. B., Sachau, J., & Allelein, H.-J. (2014, September 08). Integration of Distributed Renewable Generators in the Luxembourgish Power System. Poster session presented at International School on Energy Systems - ISES 2014, Seeon-Seebruck, Germany.
Tewari, U., Sachau, J., Norta, D. P. B., Kolmsee, K. R., & Weckel, M. (2014, September 08). Analysis of local grid stability by Hydrokinetic Turbines around a Hydropower Plant in India. Poster session presented at International School on Energy Systems - ISES 2014, Seeon-Seebruck, Germany.
Ouoba, J., & Bissyande, T. F. D. A. (2014). Sensing in the Urban Technological Deserts-A Position Paper for Smart Cities in Least Developed Countries. International Workshop on Web Intelligence and Smart Sensing. Talence.
Arora, C., Sabetzadeh, M., Briand, L., & Zimmer, F. (2014). Improving Requirements Glossary Construction via Clustering: Approach and Industrial Case Studies. 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2014).
Bianculli, D., Ghezzi, C., & Krstić, S. (2014). Trace checking of Metric Temporal Logic with Aggregating Modalities using MapReduce. Proceedings of the 12th International Conference on Software Engineering and Formal Methods (SEFM 2014) (pp. 144-158). Springer.
Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2014). Frame Based Precoding in Satellite Communications: A Multicast Approach. In Proc. of IEEE, Advanced Satellite Multimedia Systems Conference.
Di Alesio, S., Nejati, S., Briand, L., & Gotlieb, A. (2014). Worst-case Scheduling of Software Tasks: A Constraint Optimization Model to Support Performance Testing. International Conference on Principles and Practice of Constraint Programming.
Dou, W., Bianculli, D., & Briand, L. (2014). Revisiting Model-driven Engineering for Run-time Verification of Business Processes. Proceedings of the 8th System Analysis and Modeling Conference (SAM 2014). Springer.
Gribov, V., & Voos, H. (2014). A Multilayer Software Architecture for Safe Autonomous Robots. Proceedings of 19th IEEE International Conference on Emerging Technologies and Factory Automation, Barcelona, Spain, 16-19 Sept. 2014.
Lagunas, E., & Najar, M. (2014). Compressive Spectrum Sensing in the Presence of Multiple Primary Users and Interference: Comparison of Sparse Reconstruction Strategies. European Signal Processing Conference (EUSIPCO).
Lancrenon, J. (2014). What Public Keys Can Do for Three-Party, Password-Authenticated Key Exchange. In Sokratis & I., Agudo (Eds.), Public Key Infrastructures, Services and Applications: 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers (pp. 83-101). Springer-Verlag.
Lanze, F., Panchenko, A., Ponce-Alcaide, I., & Engel, T. (2014). Undesired Relatives: Protection Mechanisms Against The Evil Twin Attack in IEEE 802.11. Proceedings of the 10th ACM International Symposium on QoS and Security for Wireless and Mobile Networks.
Li, L., Bartel, A., Klein, J., & Le Traon, Y. (2014). Automatically Exploiting Potential Component Leaks in Android Applications. The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), IEEE, Sept. 2014, Beijing, China.
Matinnejad, R., Nejati, S., Briand, L., & Bruckmann, T. (2014). CoCoTest: A Tool for Model-in-the-Loop Testing of Continuous Controller. International Conference on Automated Software Engineering (ASE 2014).
Matinnejad, R., Nejati, S., Briand, L., & Bruckmann, T. (2014). MiL Testing of Highly Configurable Continuous Controllers: Scalable Search Using Surrogate Models. International Conference on Automated Software Engineering (ASE 2014).
Sharma, S. K., Maleki, S., Chatzinotas, S., Grotz, J., & Ottersten, B. (2014). Implementation Issues of Cognitive Radio Techniques for Ka-band (17.7-19.7 GHZ) SatComs. Proceedings of 7th ASMS/13th SPSC.
Van Zee, M., & Ghanavati, S. (2014, September). Capturing Evidence and Rationales with Requirements Engineering and Argumentation-Based Techniques. Paper presented at THE 26TH BENELUX CONFERENCE ON ARTIFICIAL INTELLIGENCE.
Varrette, S., Plugaru, V., Guzek, M., Besseron, X., & Bouvry, P. (2014). HPC Performance and Energy-Efficiency of the OpenStack Cloud Middleware. Proc. of the 43rd Intl. Conf. on Parallel Processing (ICPP-2014), Heterogeneous and Unconventional Cluster Architectures and Applications Workshop (HUCAA'14). Minneapolis, MN, US: IEEE.
Max, C. (2014, August 28). Developing spaces for technology-mediated inquiry in education. Paper presented at Open Spaces for Interaction and Learning Diversities - EARLI SIG 21 conference, Padova, Italy.
Garcia Becerro, F., & Ottersten, B. (2014). CPU-Based Real-Time Surface and Solid Voxelization for Incomplete Point Cloud. 22nd International Conference on Pattern Recognition.
Demisse, G., Borrman, D., & Nuchter, A. (2014, August 26). Interpreting Thermal 3D Models of Indoor Environments for Energy Efficiency. In Journal of Intelligent and Robotic Systems, Springer.
Adedjouma, M., Sabetzadeh, M., & Briand, L. (2014). Automated Detection and Resolution of Legal Cross References: Approach and a Study of Luxembourg's Legislation. 22nd IEEE International Requirements Engineering Conference.
Max, C., & Song, J.-Y. (2014, August 18). Analysing tablet-enhanced inquiries in elementary science education. Paper presented at Using Inquiry to Engage in Learning, Malmö, Sweden.
Piazza, R., Shankar, B., Berheide, T., Graesslin, M., & Cioni, S. (2014). Performance Analysis of Fractionally Spaced Equalization in Non-linear Multicarrier Satellite Channels. Proceedings of 32nd AIAA International Communications Satellite Systems Conference (ICSSC).
Hermann, F., Ehrig, H., & Corradini, A. (2014). Analysis of Permutation Equivalence in M-adhesive Transformation Systems with Negative Application Conditions. Mathematical Structures in Computer Science, 24(4-09), 1-47.
Hermann, F., Ehrig, H., Golas, U., & Orejas, F. (2014). Formal Analysis of Model Transformations Based on Triple Graph Grammars. Mathematical Structures in Computer Science, 24(4-08), 1-57.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2014). Joint Channel Estimation and Pilot Allocation in Underlay Cognitive MISO Networks. IEEE International Wireless Communications and Mobile Computing Conference.
Arora, C., Sabetzadeh, M., Briand, L., & Zimmer, F. (2014). Requirement Boilerplates: Transition From Manually-Enforced to Automatically-Verifiable Natural Language Patterns. Requirements Patterns (RePa), 2014 IEEE 4th International Workshop on. IEEE.
Göknil, A., Kurtev, I., van den Berg, K., & Sipijkerman, W. (2014). Change Impact Analysis for Requirements: a Metamodeling Approach. Information & Software Technology, 56(8), 950-972.
Holt, N., Briand, L., & Torkar, R. (2014). Empirical Evaluations on the Cost-Effectiveness of State-Based Testing: An Industrial Case Study. Information & Software Technology, 56(8), 890–910.
Maleki, S., Chatzinotas, S., Sharma, S. K., Guidotti, A., Tarchi, D., Vanelli-Coralli, A., Tang, W., Evans, B. G., Grotz, J., Liolis, K., Krause, J., & Chuberre, N. (2014). Cognitive Radio for Ka Band Satellite Communications. 32nd AIAA International Communications Satellite Systems Conference, August 2014.
Olivares Mendez, M. A., Kannan, S., & Voos, H. (2014). V-REP & ROS Testbed for Design, Test, and Tuning of a Quadrotor Vision Based Fuzzy Control System for Autonomous Landing. Porceedings of The International Micro Air Vehicle Conference and Competition 2014.
Schleich, J., Danoy, G., Dorronsoro, B., & Bouvry, P. (2014). Optimising small-world properties in VANETs: Centralised and distributed overlay approaches. Applied Soft Computing, 21(0), 637–646.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2014, August). Inline Interference Mitigation Techniques for Spectral Coexistence of GEO and NGEO Satellites. International Journal of Satellite Communications and Networking.
Sharma, S. K., Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2014). New Generation Cooperative and Cognitive Dual Satellite Systems: Performance Evaluation. Proceedings of 32nd AIAA ICSSC.
Lúcio, L., Amrani, M., Dingel, J., Lambers, L., Salay, R., Selim, G., Syriani, E., & Wimmer, M. (2014, July 30). Model Transformation Intents and Their Properties. Software & Systems Modeling.
Li, Y., Voos, H., & Darouach, M. (2014). Robust H ∞ cyber-attacks estimation for control systems. Proceedings of the 33rd CCC, Nanjing 28-30 July 2014 (pp. 3124-3129). Elsevier.
Pan, L., Voos, H., & Darouach, M. (2014). Uncertainty Quantification of Group Synchronization and Control of a New Class of Adaptive Complex Dynamical Network with Brownian Motion and Time-varying Delay. Control Conference (CCC), 2014 33rd Chinese. IEEE.
Nguyen, P. H., Klein, J., & Le Traon, Y. (2014). Model-Driven Security with A System of Aspect-Oriented Security Design Patterns. 2nd Workshop on View-Based, Aspect-Oriented and Orthographic Software Modelling.
Appelt, D., Nguyen, D. C., Briand, L., & Alshahwan, N. (2014). Automated Testing for SQL Injection Vulnerabilities: An Input Mutation Approach. Proc. of the International Symposium on Software Testing and Analysis 2014.
Bertolino, A., daoudagh, S., El Kateb, D., Henard, C., Le Traon, Y., lonetti, F., marchetti, E., Mouelhi, T., & Papadakis, M. (2014, July 21). Similarity testing for access control. Information and Software Technology.
Christopoulos, D. (2014). Multibeam Joint Processing in Satellite Communications. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Ottersten, B. (Promotor), Chatzinotas, S. (Promotor), Krause, J. (Promotor), Ryan, P., & De Gaudenzi, R.
Max, C., & Song, J.-Y. (2014). Learning with tablet-cloud systems in elementary science education. In IATED (Ed.), EDULEARN14 Proceedings (pp. 11). IATED.
Arnatovich, Y. L., Tan, H. B. K., & Shar, L. K. (2014). Empirical Comparison of Intermediate Representations for Android Applications. 26th International Conference on Software Engineering and Knowledge Engineering.
Hartmann, T., Fouquet, F., Nain, G., Brice, M., Klein, J., & Le Traon, Y. (2014, July 02). Model-based time-distorted Contexts for efficient temporal Reasoning. Poster session presented at 26th International Conference on Software Engineering and Knowledge Engineering, Vancouver, Canada.
Hermann, F., Gottmann, S., Nachtigall, N., Ehrig, H., Braatz, B., Morelli, G., Pierre, A., Engel, T., & Ermel, C. (2014). Triple Graph Grammars in the Large for Translating Satellite Procedures - Extended Version (TR-SnT-2014-7). Luxembourg, Luxembourg: SnT.
Martinez, C., Campoy, P., Fernando Mondragon, I., Sanchez-Lopez, J. L., & Olivares Mendez, M. A. (2014). HMPMR strategy for real-time tracking in aerial images, using direct methods. Machine Vision and Applications, 25(5), 1283-1308.
Trairatphisan, P., Mizera, A., Pang, J., Tantar, A.-A., & Sauter, T. (2014). optPBN: An Optimisation Toolbox for Probabilistic Boolean Networks. PLoS ONE, 9(7), 98001 (1-15.
Allix, K., Jerome, Q., Bissyande, T. F. D. A., Klein, J., State, R., & Le Traon, Y. (2014). A Forensic Analysis of Android Malware -- How is Malware Written and How It Could Be Detected? Proceedings of the 2014 IEEE 38th Annual Computer Software and Applications Conference (pp. 384--393). Washington, DC, USA: IEEE Computer Society.
Chen, X., Li, J., Ma, J., Tang, Q., & Lou, W. (2014). New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Trans. Parallel Distrib. Syst, 25(9), 2386-2396.
Dou, W., Bianculli, D., & Briand, L. (2014). OCLR: a More Expressive, Pattern-based Temporal Extension of OCL. Proceedings of the 2014 European Conference on Modelling Foundations and Applications (ECMFA 2014). Springer.
Gao, N., Darouach, M., Voos, H., & Alma, M. (2014). Robust unified H_infinity dynamic observer design for uncertain systems. 33rd Chinese Control Conference (CCC), Nanjing, China, 28-30 July 2014 (pp. 6509 - 6514).
Goncalves Almeida Antunes, M. (2014). Stereo Reconstruction using Induced Symmetry and 3D scene priors. Unpublished doctoral thesis, University of Coimbra, ​Coimbra, ​​Portugal.
Jury: Barreto, J. P. (Promotor).
Hartmann, T., Fouquet, F., Nain, G., Morin, B., Klein, J., & Le Traon, Y. (2014). Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach. Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering (1st, pp. 586-591). Vancouver, Canada: Knowledge Systems Institute Graduate School, USA.
Hermann, F., Gottmann, S., Nachtigall, N., Ehrig, H., Braatz, B., Morelli, G., Pierre, A., Engel, T., & Ermel, C. (2014). Triple Graph Grammars in the Large for Translating Satellite Procedures. Theory and Practice of Model Transformations (pp. 122-137). Springer.
Marchal, S., Jiang, X., State, R., & Engel, T. (2014). A Big Data Architecture for Large Scale Security Monitoring. Proceedings of the 3rd IEEE Congress on Big Data (pp. 56-63). IEEE.
Nair, S., de la Vara, J. L., Sabetzadeh, M., & Briand, L. (2014). An Extended Systematic Literature Review on Provision of Evidence for Safety Certification. Information & Software Technology, 56(7), 689–717.
Nejati, S., & Briand, L. (2014). Identifying Optimal Trade-Offs between CPU Time Usage and Temporal Constraints Using Search. International Symposium on Software Testing and Analysis (ISSTA 2014) (pp. 11).
Schwickart, T. K., Voos, H., Minaglou, J.-R., & Darouach, M. (2014). A Novel Model-Predictive Cruise Controller for Electric Vehicles and Energy-Efficient Driving. A Novel Model-Predictive Cruise Controller for Electric Vehicles and Energy-Efficient Driving.
Shankar, B., Kyrolainen, J., Arapoglou, P.-D., Byman, A., Tapio, V., & Grotz, J. (2014, July). MIMO Extension to DVB-SH. International Journal of Satellite Communications and Networking, 1-6.
Zhauniarovich, Y., Gadyatskaya, O., Crispo, B., La Spina, F., & Moser, E. (2014). FSquaDRA: Fast Detection of Repackaged Applications. Data and Applications Security and Privacy XXVIII (pp. 130-145). Springer.
Ziafati, P. (2014). Plexil-Like Plan Execution Control in Agent Programming. Plexil-Like Plan Execution Control in Agent Programming.
Margossian, H., Deconinck, G., & Sachau, J. (2014, June 24). Short Circuit Calculation in Networks with a High Share of Inverter Based Distributed Generation. Paper presented at IEEE International Symposium on Power Electronics for Distributed Generation Systems, Galway, Ireland.
Pan, L., Voos, H., & Darouach, M. (2014). Group Synchronization and Control of a New Class of Adaptive Complex Network with Brownian Motion and Time-varying Delay. Control Conference (ECC), 2014 European (pp. 1771-1776). IEEE.
Hong, S., Staats, M., Ahn, J., Kim, M., & Rothermel, G. (2014, June 23). Are Concurrency Coverage Metrics Effective for Testing: A Comprehensive Empirical Investigation. Software Testing, Verification & Reliability.
Joaquim, R. (2014, June 10). How to prove the validity of a complex ballot encryption to the voter and the public. Journal of Information Security and Applications.
Li, L., Bartel, A., Klein, J., & Le Traon, Y. (2014). Automatically Exploiting Potential Component Leaks in Android Applications (TR-SnT-2014-13). Luxembourg, Luxembourg: SnT.
Abu Shaban, Z., Shankar, B., Mehrpoyan, H., & Ottersten, B. (2014). Enhanced List-Based Group-Wise Overloaded Receiver with Application to Satellite Reception. Proceedings of IEEE ICC 2014.
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2014). Spatial DCT-Based Least Square Estimation in Multi-antenna Multi-cell Interference Channels. IEEE International Conference on Communications(ICC).
Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., & McDaniel, P. (2014, June). FlowDroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. Paper presented at ACM SIGPLAN conference on Programming Language Design and Implementation (PLDI 2014).
Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2014). Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android. IEEE Transactions on Software Engineering (TSE), 40(6), 617-632.
Bilibin, I., & Capitanescu, F. (2014). Contributions to thermal constraints management in radial active distribution systems. Electric Power Systems Research, 111, 169-176.
Biryukov, A., Pustogarov, I., Thill, F., & Weinmann, R.-P. (2014). Content and popularity analysis of Tor hidden services. proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops. IEEE Computer Society.
Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2014). Weighted Fair Multicast Multigroup Beamforming Under Per-antenna Power Constraints. Multicast multigroup beamforming under per-antenna power constraints (pp. 4704-4710). IEEE.
Chumberre, N., Evans, B., Vanelli-Coralli, A., Krause, J., Grotz, J., & Sharma, S. K. (2014). FP7 PROJECT CoRaSat intermediate results and standardization strategy: Cognitive radio techniques in Ka band SatCom context. Proc. European Conference on Networks and Communications (EuCNC).
Gaud, F., Lepers, B., Decouchant, J., Fuston, J., Fedorova, A., & Quéma, V. (2014, June). Large Pages May Be Harmful on NUMA Systems. Paper presented at USENIX Annual Technical Conference.
Jerome, Q., Allix, K., State, R., & Engel, T. (2014). Using opcode-sequences to detect malicious Android applications. IEEE International Conference on Communications, ICC 2014, Sydney Australia, June 10-14, 2014. Sydney, Australia: IEEE.
Maleki, S., Leus, G., Chatzinotas, S., & Ottersten, B. (2014). To AND or To OR: How Shall the Fusion Center Rule in Energy-Constrained Cognitive Radio Networks? IEEE International Conference on Communications (ICC), 10-14 June 2014, Sydney, Australia.
N'Doye, I., Voos, H., & Darouach, M. (2014). Chaos in a Fractional-Order Cancer System. European Control Conference (ECC), Strasbourg, France, 24 - 27 June 2014.
Olivares Mendez, M. A., Fu, C., Kannan, S., Voos, H., & Campoy, P. (2014). Using the Cross-Entropy method for control optimization: A case study of see-and-avoid on unmanned aerial vehicles. Control and Automation (MED), 2014 22nd Mediterranean Conference of.
Piazza, R., Shankar, B., & Ottersten, B. (2014). Multicarrier LUT-based data predistortion for non-linear satellite channels. Communications (ICC), 2014 IEEE International Conference on. IEEE.
Rosich, A., Voos, H., & Darouach, M. (2014). Cyber-attack detection based on controlled invariant sets. European Control Conference (ECC), Strasbourg, France, 24-27 June 2014 (pp. 2176 - 2181).
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2014). Compressive Sparsity Order Estimation for Wideband Cognitive Radio Receiver. Proceedings of IEEE International Conference on Communications (ICC).
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2014). A Hybrid Cognitive Transceiver Architecture: Sensing-Throughput Tradeoff. Proceedings of 9th International Conference on Cognitive Radio Oriented Wireless Networks.
Tarchi, D., Guidotti, A., Icolari, V., Vanelli-Coralli, A., Sharma, S. K., Chatzinotas, S., Maleki, S., Evans, B. G., Thompson, P., Tang, W., & Grotz, J. (2014). Technical Challenges for Cognitive Radio Application in Satellite Communications. 9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM), 2014. IEEE.
Tonella, P., Tiella, R., & Nguyen, D. C. (2014). Interpolated N-Grams for Model Based Testing. Interpolated N-Grams for Model Based Testing.
Allix, K., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2014). Machine Learning-Based Malware Detection for Android Applications: History Matters! Luxembourg, Luxembourg: University of Luxembourg, SnT.
Bissyande, T. F. D. A., Réveillère, L., Lawall, J., & Muller, G. (2014, May 22). Ahead of time static analysis for automatic generation of debugging interfaces to the Linux kernel. Automated Software Engineering, 1-39.
Norta, D. P. B., Sachau, J., & Hans-Josef, A. (2014, May 22). Horizontally Oscillating Hydrofoil-River-Turbine with Variable Immersion Depth. Paper presented at Hidroenergia 2014, Istanbul, Turkey.
Capitanescu, F., Ochoa, L., Margossian, H., & Hatziargyriou, N. (2014). Assessing the Potential of Network Reconfiguration to Improve Distributed Generation Hosting Capacity in Active Distribution Systems. IEEE Transactions on Power Systems, 30(1), 346 - 356.
Melakessou, F., & Engel, T. (2014, May 15). Network Analysis and Routing eVALuation V3.0. Paper presented at Scilabtec 2014, Paris, France.
Arroyo-Valles, R., Maleki, S., & Leus, G. (2014). Distributed Wideband Spectrum Sensing for Cognitive Radio Networks. 2014 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP).
Behjati, R., Nejati, S., & Briand, L. (2014). Architecture-Level Configuration of Large-Scale Embedded Software Systems. ACM Transactions on Software Engineering & Methodology, 23(3).
Bertholon, B., Varrette, S., & Bouvry, P. (2014). Comparison of Multi-objective Optimization Algorithms for the JShadObf JavaScript Obfuscator. Proc. of the 17th Intl. Workshop on Nature Inspired Distributed Computing (NIDISC 2014), part of the 28th IEEE/ACM Intl. Parallel and Distributed Processing Symposium (IPDPS 2014). Phoenix, Arizona, USA: IEEE Computer Society.
Ferreira, A., Lenzini, G., Santos-Pereira, C., Augusto, A., & Correia, M. (2014). Envisioning secure and usable access control for patients. IEEE 3rd International Conference on Serious Games and Applications in Healthcare.
Fouquet, F., Nain, G., Morin, B., Daubert, E., Barais, O., Plouzeau, N., & Jézéquel, J.-M. (2014). Kevoree Modeling Framework (KMF): Efficient modeling techniques for runtime use (TR-SnT-2014-11). Luxembourg, Luxembourg: SnT - University of Luxembourg.
Fu, C., Carrio, A., Olivares Mendez, M. A., & Campoy, P. (2014). Online learning-based robust visual tracking for autonomous landing of Unmanned Aerial Vehicles. Unmanned Aircraft Systems (ICUAS), 2014 International Conference on.
Fu, C., Carrio, A., Olivares Mendez, M. A., Suarez-Fernandez, R., & Campoy, P. (2014). Robust real-time vision-based aircraft tracking from Unmanned Aerial Vehicles. Robotics and Automation (ICRA), 2014 IEEE International Conference on.
Kordy, P., Langerak, R., Mauw, S., & Polderman, J. (2014). A symbolic algorithm for the analysis of robust timed automata. 19th International Symposium on Formal Methods (FM'14), 12-16 May 2014 (pp. 351-366).
Lagunas, E., & Najar, M. (2014, May). Robust Primary User Identification using Compressive Sensing for Cognitive Radios. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP).
Maleki, S., Kalantari, A., Chatzinotas, S., & Ottersten, B. (2014). Power Allocation for Energy-Constrained Cognitive Radios in the Presence of an Eavesdropper. 2014 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP).
Piazza, R., Shankar, B., & Ottersten, B. (2014). Carrier Rate Optimization on the Return Link of Interactive Mobile Satellite Networks. European Wireless 2014; 20th European Wireless Conference; Proceedings of (pp. 1-8). VDE.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2014). Maximum Eigenvalue Detection for Spectrum Sensing Under Correlated Noise. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing 2014.
Timotheou, S., Krikidis, I., Zheng, G., & Ottersten, B. (2014). Beamforming for MISO Interference Channels with QoS and RF Energy Transfer. Wireless Communications, IEEE Transactions on, 13(5), 2646-2658.
Zheng, G., Ho, Z., Jorswieck, E. A., & Ottersten, B. (2014). Information and Energy Cooperation in Cognitive Radio Networks. Signal Processing, IEEE Transactions on, 62(9), 2290-2303.
Caminada, M., & Booth, R. (2014). Towards Dialogue Games for the Down-Admissible and Up-Complete Procedures (1.0). Eprint/Working paper retrieved from http://orbi.ulg.ac.be/handle/10993/16504.
Li, L., Bartel, A., Klein, J., Le Traon, Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., & McDaniel, P. (2014). I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis (TR-SNT-2014-9, Technical Report). Luxembourg, Luxembourg: SnT Centre - University of Luxembourg.
Jostock, M. (2014). Electrical Inverter and Method of Operation. Europe: European Patent Office.
Briand, L., & van der Hoek, A. (2014). Insights and Lessons Learned from Analyzing ICSE 2014 Survey and Review Data (TR-SnT-2014-6). University of Luxembourg.
Cole, M. (2014). Aktuelle Entwicklungen im europäischen Datenschutzrecht. Critical Quarterly, 2014(1), 5-8.
Cole, M., & Boehm, F. (2014). EU Data Retention – Finally Abolished?, Eight Years in Light of Article 8. Critical Quarterly, 2014(1), 58-78.
Frank, R., Bronzi, W., Castignani, G., & Engel, T. (2014). Bluetooth Low Energy: An Alternative Technology for VANET Applications. Proceedings of the 11th IEEE/IFIP Annual Conference on Wireless On-demand Network Systems and Services.
Hartmann, T., Fouquet, F., Klein, J., Nain, G., & Le Traon, Y. (2014). Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning. Proceedings of the Second Open EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec14).
McCall, R., Louveton, N., & Rumiński, J. (2014). D2.1 The Specification and Overall Requirements of the eGlasses Platform. Luxembourg, Luxembourg: University of Luxembourg.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2014). Compressive SNR Estimation for Wideband Cognitive Radio under Correlated Scenarios. Proceedings of IEEE Wireless Communications and Networking Conference.
Anjorin, A., Cunha, A., Giese, H., Hermann, F., Rensink, A., & Schürr, A. (2014). BenchmarX. CEUR Workshop Proceedings, 1133, 82-86.
Hommes, S. (2014). Fault Detection and Network Security in Software-Defined Networks with OpenFlow. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Engel, T. (Promotor), State, R. (Promotor), Clemm, A. (Promotor), Sorger, U., & Herfet, T.
Dou, W., Bianculli, D., & Briand, L. (2014). A Model-Driven Approach to Offline Trace Checking of Temporal Properties with OCL (SnT-TR-2014-5). SnT Centre - University of Luxembourg.
Max, C., & Hack, N. (2014). Implementing a culture of creative Inquiry with ipads in elementary science education. In Pixel (Ed.), Conference proceedings. New perspectives in science education (pp. 4). Italy: libreriauniversitaria.it.
Biryukov, A., Nakahara, J., & Murat Yildirim, H. (2014). Differential entropy analysis of the IDEA block cipher. Journal of Computational & Applied Mathematics, 259(Part B), 561–570.
Iqbal, Z., Ali, S., Yue, T., & Briand, L. (2014, March 13). Applying UML/MARTE on industrial projects: challenges, experiences, and guidelines. Software & Systems Modeling.
Li, L., Bartel, A., Klein, J., & Le Traon, Y. (2014, March 12). Using A Path Matching Algorithm to Detect Inter-Component Leaks in Android Apps. Paper presented at Grande Region Security and Reliability Day 2014.
Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014). Large-scale Machine Learning-based Malware Detection: Confronting the "10-fold Cross Validation" Scheme with Reality. Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (pp. 163--166). New York, NY, USA: ACM.
Boutat, D., Darouach, M., & Voos, H. (2014). Observer Design for a Nonlinear Minimal Model of Glucose Disappearance and Insulin Kinetics. The 7th International Conference on Bio-inspired Systems and Signal Processing BIOSIGNALS, Angers, France, 3-6 March 2014 (pp. 21 - 26).
Capitanescu, F., Bilibin, I., & Romero Ramos, E. (2014). A Comprehensive Centralized Approach for Voltage Constraints Management in Active Distribution Grid. IEEE Transactions on Power Systems, 29(2), 933-942.
El Kateb, D., Fouquet, F., Nain, G., Meira, J. A., Ackerman, M., & Le Traon, Y. (2014, March). Generic Cloud Platform Multi-objective Optimization Leveraging Models@run.time. Paper presented at 29th Symposium On Applied Computing.
Lagunas, E. (2014). Compressive Sensing Based Candidate Detector and its Applications to Spectrum Sensing and Through-the-Wall Radar Imaging. Unpublished doctoral thesis, Universitat Politecnica de Catalunya (UPC), ​Barcelona, ​​Spain.
Jury: Najar, M. (Promotor), & Amin, M. (Promotor).
Perrin, L. P., & Khovratovich, D. (2014). Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64. Fast Software Encryption - 21th International Workshop, FSE 2014, London, March 3-5, 2014 (pp. 82-103). Springer.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2014, March). Cognitive Beamhopping for Spectral Coexistence of Multibeam Satellites. International Journal of Satellite Communications and Networking, 1-23.
Wangmanaopituk, S., Voos, H., & Kongprawchnon, W. (2014). A Nonlinear Model-Predictive Motion Planning and Control System for Multi-Robots in a Microproduction System with Safety Constraints and a Global Long-Term Solution. Kasetsart Journal. Natural Sciences, 48(2), 283 - 293.
Ziafati, P., Elrakaiby, Y., van der Torre, L., Voos, H., Dastani, M., Meyer, J.-J., & Van Zee, M. (2014). Reasoning on Robot Knowledge from Discrete and Asynchronous Observations. AAAI Spring Symposium 2014: Knowledge Representation and Reasoning in Robotics, Stanford, USA, 2015.
Li, L., Bartel, A., Klein, J., & Le Traon, Y. (2014, February 26). Detecting privacy leaks in Android Apps. Paper presented at International Symposium on Engineering Secure Software and Systems - Doctoral Symposium.
Nguyen, P. H., Klein, J., & Le Traon, Y. (2014). Modeling, composing, and testing of security concerns in a Model-Driven Security approach. In W., Joosen, F., Martinelli, & T., Heyman (Eds.), Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014).
Hermann, F., Hommes, S., State, R., & Engel, T. (2014). Correctness of source code extension for fault detection in openflow based networks (TR-SnT-2014-2). Luxembourg, Luxembourg: SnT.
Bianculli, D., Ghezzi, C., Pautasso, C., & Senti, P. (2014). Specification Patterns from Research to Industry: A Case Study in Service-Based Applications (extended abstract). Software Engineering 2014: Fachtagung des GI-Fachbereichs Softwaretechnik. GI LNI.
Briand, L., Falessi, D., Nejati, S., Sabetzadeh, M., & Yue, T. (2014). Traceability and SysML Design Slices to Support Safety Inspections: A Controlled Experiment. ACM Transactions on Software Engineering & Methodology, 23(1).
Codeca, L., Frank, R., & Engel, T. (2014). Improving Traffic in Urban Environments. Luxembourg, Luxembourg: University of Luxembourg.
Dou, W., Bianculli, D., & Briand, L. (2014). OCLR: a More Expressive, Pattern-based Temporal Extension of OCL (TR-SnT-2014-2). SnT Centre - University of Luxembourg.
Frank, R., Forster, M., Sommer, C., Kargl, F., & Engel, T. (2014). Proceedings of the 2nd GI/ITG KuVS Fachgespräch Inter-Vehicle Communication (FG-IVC 2014) (R-SnT-2014-4). Luxembourg, Luxembourg: University of Luxembourg.
Appelt, D., Alshahwan, N., Nguyen, D. C., & Briand, L. (2014). Black-box SQL Injection Testing (TR-SnT-2014-1).
Frank, R., Weitz, H., Castignani, G., & Engel, T. (2014). Collaborative Traffic Sensing: A Case Study of a Mobile Phone Based Traffic Management System. Proceedings of the 11th IEEE Consumer Communications and Networking Conference (CCNC'14).
Fu, C., Olivares Mendez, M. A., Suarez-Fernandez, R., & Campoy, P. (2014). Monocular Visual-Inertial SLAM-Based Collision Avoidance Strategy for Fail-Safe UAV Using Fuzzy Logic Controllers. Journal of Intelligent & Robotic Systems, 73(1-4), 513-533.
Shankar, B., & Ottersten, B. (2014). Effect of imperfect channel estimate on the performance of MMSE receivers in multibeam satellite systems: First order analysis. Electronics, Computing and Communication Technologies (IEEE CONECCT), 2014 IEEE International Conference on (pp. 1-5). IEEE.
Abu-Shaban, Z., Mehrpouyan, H., Ottersten, B., & others. (2014). Interference Mitigating Satellite Broadcast Receiver using Reduced Complexity List-Based Detection in Correlated Noise. arXiv preprint arXiv:1404.6544.
Afzal, H., Al Ismaeil, K., Aouada, D., Destelle, F. O., Mirbach, B., & Ottersten, B. (2014). KinectDeform: Enhanced 3D Reconstruction of Non-Rigidly Deforming Objects. Second International Conference on 3D Vision. Tokyo, Japan: IEEE Computer Society's Conference Publishing Services (CPS).
Afzal, H., Aouada, D., Fofi, D., Mirbach, B., & Ottersten, B. (2014). RGB-D Multi-View System Calibration for Full 3D Scene Reconstruction. 22nd International Conference on Pattern Recognition (ICPR'14).
Alodeh, M., Chatzinotas, S., & Ottersten, B. (2014). A Multicast Approach for Constructive Interference Precoding in MISO Downlink Channel. IEEE International Symposium on Information Theory (ISIT).
Amrani, M., Lúcio, L., Selim, G., Combemale, B., Dingel, J., Vangheluwe, H., Le Traon, Y., & Cordy, J. (2014). A Survey of Formal Verification Techniques for Model Transformations: A Tridimensional Classification. Journal of Technology.
Antonini, A., Boella, G., Humphreys, L., & Hulstijn. (2014). The gap between legal and technical domains in norm representation. New Frontiers in Artificial Intelligence.
Aouada, D., Al Ismaeil, K., Kedir Idris, K., & Ottersten, B. (2014). Surface UP-SR for an Improved Face Recognition Using Low Resolution Depth Cameras. 11th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS'14).
Aouada, D., & Khader, D. (2014). SPN2: Single-Sided Privacy Preserving Nearest Neighbor and its Application to Face Recognition. 11th IEEE International Conference on Advanced Video and Signal-Based Surveillance (AVSS'14).
Arlt, S., Podelski, A., & Wehrle, M. (2014). Reducing GUI Test Suites via Program Slicing. International Symposium on Software Testing and Analysis, San Jose 21-25 July 2014.
Arlt, S., Rubio-González, C., Rümmer, P., Schäf, M., & Shankar, N. (2014). The Gradual Verifier. NASA Formal Methods, Houston 29 April - 1 May 2014.
Arnau, J., Christopoulos, D., Chatzinotas, S., Mosquera, C., & Ottersten, B. (2014). Performance of the Multibeam Satellite Return Link With Correlated Rain Attenuation. Wireless Communications, IEEE Transactions on, 13(11), 6286 - 6299.
Bella, G., Curzon, P., Giustolisi, R., & Lenzini, G. (2014). A Socio-Technical Methodology for the Security and Privacy Analysis of Services. IEEE 38th Annual International Computers, Software and Applications Conference Workshops, 27–29 July 2014, Västerås, Sweden.
Bella, G., Giustolisi, R., & Lenzini, G. (2014). Secure exams despite malicious management. Twelfth Annual International Conference on Privacy, Security and Trust (PST), Ryerson University, Toronto, July 23-24, 2014.
Bella, G., & Lenzini, G. (2014). Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014. Paper presented at 2014 Workshop on Socio-Technical Aspects in Security and Trust, STAST 2014, Vienna, Austria, July 18, 2014, Vienna, Austria.
Bersani, M. M., Bianculli, D., Dustdar, S., Gambi, A., Ghezzi, C., & Krstić, S. (2014). Towards the formalization of properties of cloud-based elastic systems. Proceedings of the 6th International Workshop on Principles of Engineering Service-oriented Systems (PESOS 2014). ACM.
Bersani, M. M., Bianculli, D., Ghezzi, C., Krstić, S., & San Pietro, P. (2014). SMT-based Checking of SOLOIST over Sparse Traces. Proceedings of the 17th International Conference on Fundamental Approaches to Software Engineering (FASE 2014). Springer.
Bertolino, A., Le Traon, Y., Lonetti, F., Marchetti, E., & Mouelhi, T. (2014). Coverage-based Test Cases Selection for XACML Policies. IEEE International Conference on Software Testing Verification and Validation Workshops, 12-21.
bikakis, A., Caire, P., & Le Traon, Y. (2014). Tools for Conviviality in Multi-Context Systems. IFCOLOG: journal of Logic and Applications, 1(1).
Biryukov, A., & Nikolic, I. (2014). Colliding Keys for SC2000-256. Selected Areas in Cryptography, Lecture Notes in Computer Science. Springer International Publishing.
Biryukov, A., Roy, A., & Velichkov, V. (2014). Differential Analysis of Block Ciphers SIMON and SPECK. Fast Software Encryption - 21st International Workshop (Lecture Notes in Computer Science). Springer International Publishing.
Biryukov, A., & Velichkov, V. (2014). Automatic Search for Differential Trails in ARX Ciphers. Topics in Cryptology – CT-RSA 2014 Lecture Notes in Computer Science (pp. 227-250). Springer International Publishing.
Bissyande, T. F. D. A., & van Stam, G. (Eds.). (2014). e-Infrastructure and e-Services for Developing Countries. Springer.
Björnson, E., Bengtsson, & Ottersten, B. (2014). Optimal Multiuser Transmit Beamforming: A Difficult Problem with a Simple Solution Structure [Lecture Notes]. IEEE Signal Processing Magazine, 31(4), 142-148.
Bjornson, E., Jorswieck, Debbah, & Ottersten, B. (2014). Multiobjective Signal Processing Optimization : The way to balance conflicting metrics in 5G systems. IEEE Signal Processing Magazine, 31(6), 14-23.
Blazewicz, J., Bouvry, P., Kovalyov, M., & Musial, J. (2014). Internet shopping with price sensitive discounts. 4OR : Quarterly Journal of the Belgian, French and Italian Operations Research Societies, 12(1), 35-48.
Boella, G., Colombo Tosatto, S., Ghavanati, S., Joris, H., Humphreys, L., Muthuri, R., & Rifaut, A. (2014). Integrating Legal-URN and Eunomos: towards a comprehensive compliance management solution. Proceedings of AI Approaches to the Complexity of Legal Systems (AICOL 2013).
Boella, G., Humphreys, L., Muthuri, R., van der Torre, L., & Rossi, P. (2014). A Critical Analysis of Legal Requirements Engineering from the Perspective of Legal Practice. Seventh IEEE Workshop on Requirements Engineering and Law.
Boella, G., Muthuri, R., & Humphreys, L. (2014). Managing Legal Resources in Open Government and E-Democracy: Eunomos - an AI and Law Response. In P., Parycek & N., Edelmann (Eds.), CeDEM 14 Conference for E-Democracy and Open Government. Munster, Austria: Verlagshaus Monsenstein und Vannerdat OHG.
Bosch, Peter, A., Leenders, B., Lim, H. W., Tang, Q., Wang, H., Hartel, P., & Jonker, W. (2014). Distributed Searchable Symmetric Encryption. PST2014 International Conference on Privacy, Security and Trust.
Bourdelles, M., Li, S., Quadri, I., Brosse, E., Sadovykh, A., Gaudin, E., Mallet, F., Göknil, A., George, D., & Kreku, J. (2014). Fostering Analysis from Industrial Embedded Systems Modeling. Handbook of Research on Embedded Systems Design. IGI Global.
Bulling, N., & Jamroga, W. (2014). Comparing variants of strategic ability: how uncertainty and memory influence general properties of games. proceedings of Autonomous Agents and Multi-agent Systems (pp. 474-518).
Bulling, N., & Jamroga, W. (2014). Comparing variants of strategic ability: how uncertainty and memory influence general properties of games. Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems.
Caire, P., & Bikakis, A. (2014). A MCS-based methodology for computing coalitions in Multirobot Systems. Cognitive Robotics.
Carlos, F., Papadakis, M., Durelli, V., & Delamaro, E. M. (2014). Test Data Generation Techniques for Mutation Testing: A Systematic Mapping. Workshop on Experimental Software Engineering (ESELAW'14).
Chen, X., Susilo, W., Li, J., Wong, D., Ma, J., Tang, S., & Tang, Q. (2014). Efficient Algorithms for Secure Outsourcing of Bilinear Pairings. Theoretical Computer Science.
Chen, X., Kordy, P., Lu, R., & Pang, J. (2014). MinUS: Mining User Similarity with Trajectory Patterns. Proceedings of 17th European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD) (pp. 436-439). Springer.
Chen, X., Lu, R., Ma, X., & Pang, J. (2014). Measuring User Similarity with Trajectory Patterns: Principles and New Metrics. Proceedings of the 16th Asia-Pacific Web Conference (pp. 437-448). Springer.
Chen, X., & Pang, J. (2014). Protecting query privacy in location-based services. GeoInformatica, 18(1), 95-133.
Chen, X., Pang, J., & Xue, R. (2014). Constructing and comparing user mobility profiles. ACM Transactions on the Web, 8(4), 21.
Chenal, M., & Tang, Q. (2014). On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes. Progress in Cryptology - LATINCRYPT 2014, Florianópolis 17-19 September 2014.
Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2014). Full frequency reuse multibeam satcoms: frame based precoding and user scheduling. Submitted to IEEE Transactions on Wireless Communications, available.
Christopoulos, D., Chatzinotas, S., & Ottersten, B. (2014). Multicast Multigroup Precoding and User Scheduling for Frame-Based Satellite Communications. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 14(9), 4695--4707.
Colombo Tosatto, S., Kelsen, P., & Governatori, G. (2014). Detecting Deontic Conflicts in Dynamic Settings. In F., Cariani, D., Grossi, J., Meheus, & X., Parent (Eds.), Deontic Logic and Normative Systems 12th International Conference, DEON 2014, Ghent, Belgium, July 12-15, 2014. Proceedings.
Colombo Tosatto, S., & Van Zee, M. (2014). Social Network Analysis for Judgment Aggregation. Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems.
Correa Bahnsen, A., Stojanovic, A., Aouada, D., & Ottersten, B. (2014). Improving Credit Card Fraud Detection with Calibrated Probabilities. Proceedings of the fourteenth SIAM International Conference on Data Mining, Philadelphia, Pennsylvania, USA, April 24-26, 2014 (pp. 677-685). Philadelphia, USA: Society for Industrial and Applied Mathematics.
Cramer, M. (2014). Modelling implicit dynamic introduction of function symbols in mathematical texts. In V., de Paiva & et al. (Eds.), Joint Proceedings of the Second Workshop on Natural Language and Computer Science (NLCS’14) & 1st International Workshop on Natural Language Services for Reasoners (NLSR 2014) Affliated to RTA-TLCA, VSL 2014 July 17-18, 2014 Vienna, Austria (pp. 125-135). Center for Informatics and Systems of the University of Coimbra.
Cramer, M. (2014). Modelling the usage of partial functions and undefined terms using presupposition theory. In S., Geschke, B., Loewe, & P., Schlicht (Eds.), Infinity, Computability and Metamathematics – Festschrift celebrating the 60th birthdays of Peter Koepke and Philip Welch (pp. 71-88). London, United Kingdom: College Publications.
Daoudagh, S., El Kateb, D., Lonetti, F., Marchetti, E., & Mouelhi, T. (2014). A Toolchain for Model-Based Design and Testing of Access Control Systems. MODELSWARD 2015.
Delerue Arriaga, A., Tang, Q., & Ryan, P. (2014). Trapdoor Privacy in Asymmetric Searchable Encryption Schemes. Progress in Cryptology -- AFRICACRYPT 2014, Marrakesh 28-30 May 2014.
Devroey, X., Perrouin, G., Cordy, M., Papadakis, M., Legay, A., & Schobbens, P.-Y. (2014). A Variability Perspective of Mutation Analysis. Proceedings of the 22nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2014).
Dorronsoro, B., Ruiz, P., Danoy, G., Pigné, Y., & Bouvry, P. (2014). Evolutionary Algorithms for Mobile Ad Hoc Networks. John Wiley & Sons.
Dorronsoro, B., Ruiz, P., Talbi, E.-G., & Piyatumrong, A. (2014). Optimizing AEDB Broadcasting Protocol with Parallel Multi-objective Cooperative Coevolutionary NSGAII. Optimizing AEDB Broadcasting Protocol with Parallel Multi-objective Cooperative Coevolutionary NSGAII.
Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., & Lenzini, G. (2014). On the verifiability of (electronic) exams. Technical Report TR-2014-2, Verimag.
Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., Lenzini, G., & Ryan, P. (2014). Formal Analysis of Electronic Exams. SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014.
El Kateb, D., Elrakaiby, Y., Mouelhi, T., Rubab, I., & Le Traon, Y. (2014). Towards a Full Support of Obligations In XACML. Paper presented at 9th International Conference on Risks and Security of Internet and Systems.
El Kateb, D., Zannone, N., Moawad, A., Caire, P., Nain, G., Mouelhi, T., & Le Traon, Y. (2014). Conviviality-Driven Access Control Policy. Requirements Engineering.
Elrahaiby, Y., & Pang, J. (2014). Dynamic analysis of usage control policies. Proceedings of the 11th Conference on Security and Cryptography (SECRPT). SciTePress.
Elrakaiby, Y., Amrani, M., & Le Traon, Y. (2014). A Flexible MDE approach to Enforce Fine- grained Security Policies. Proceedings of the International Symposium on Engineering Secure Software and Systems.
Elrakaiby, Y., Amrani, M., & Le Traon, Y. (2014). Security@Runtime: A flexible MDE approach to enforce fine-grained security policies. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8364 LNCS, 19-34.
Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2014). A Conceptual Framework to Study Socio-Technical Security. Lecture Notes in Computer Science.
Ferreira, A., Huynen, J.-L., Koenig, V., & Lenzini, G. (2014). Socio-technical Security Analysis of Wireless Hotspots. Lecture Notes in Computer Science.
Fiandrino, C., Kliazovich, D., Bouvry, P., & Zomaya, A. Y. (2014). NC-CELL: Network Coding-based Content Distribution in Cellular Networks for Cloud Applications. IEEE Global Communications Conference, Austin, TX, USA, 2014.
Forster, M., Frank, R., Gerla, M., & Engel, T. (2014). A Cooperative Advanced Driver Assistance System to Mitigate Vehicular Traffic Shock Waves. IEEE INFOCOM 2014 - IEEE Conference on Computer Communications (pp. 1968-1976).
Gao, N., Darouach, M., Alma, M., & Voos, H. (2014). H_∞ decentralized dynamic-observer-based control design for large-scale nonlinear intercon-nected systems. Transaction on IoT and Cloud Computing, 2(3), 46 - 66.
Garcia, F. D., & Ottersten, B. (2014). CPU-based real-time surface and solid voxelization for incomplete point cloud. Proceedings of the 22nd International Conference on Pattern Recognition (pp. 2757-2762). Institute of Electrical and Electronics Engineers Inc.
Ghanavati, S., Humphreys, L., Boella, G., di Caro, L., & Robaldo, L. (2014). Compliance with Multiple Regulations. Conceptual Modeling, Lecture Notes in Computer Science 8824.
Giurgiu, A., & Lommel, G. (2014). A New Approach to EU Data Protection. Critical Quarterly for Legislation and Law, 97(1), 10-27.
Giurgiu, A., & Metzdorf, J. (2014). Smart TV - Smarte Regulierung. In J., Taeger (Ed.), Big Data & Co., Neue Herausforderungen für das Informationsrecht (pp. 709-726). Oldenburg, Germany: OlWIR.
Giustolisi, R., Lenzini, G., & Ryan, P. (2014). Remark!: A Secure Protocol for Remote Exams. Security Protocols XXII - Lecture Notes in Computer Science.
Göknil, A., van Domburg, R., Kurtev, I., van den Berg, K., & Wijnhoven, F. (2014). Experimental Evaluation of a Tool for Change Impact Prediction in Requirements Models: Design, Results, and Lessons Learned. The Fourth International Model-Driven Requirements Engineering (MoDRE) workshop (pp. 57-66).
Granelli, F., Kliazovich, D., & Malheiros, N. (2014). Towards Cognitive Internet: an Evolutionary Vision. Cognitive Radio and Networking for Heterogeneous Wireless Networks. Springer.
Guzek, M., Varrette, S., Plugaru, V., Pecero, J., & Bouvry, P. (2014). A Holistic Model of the Performance and the Energy-Efficiency of Hypervisors in an HPC Environment. Concurrency & Computation : Practice & Experience.
Hartmann, T., Fouquet, F., Nain, G., Morin, B., Klein, J., Barais, O., & Le Traon, Y. (2014). A Native Versioning Concept to Support Historized Models at Runtime. In J., Dingel, W., Schulte, I., Ramos, S., Abrahao, & E., Insfran (Eds.), Model-Driven Engineering Languages and Systems - 17th International Conference, MODELS 2014, Valencia, Spain, September 28 - October 3, 2014. Proceedings (1st, pp. 252-268). Springer.
He, S., Huang, Y., Yang, L., & Ottersten, B. (2014). Coordinated Multicell Multiuser Precoding for Maximizing Weighted Sum Energy Efficiency. IEEE Transactions on Signal Processing, 62(3), 741-751.
Henard, C., Papadakis, M., & Le Traon, Y. (2014). MutaLog: a Tool for Mutating Logic Formulas. Testing Tools Track, 7th International Conference on Software Testing, Verification and Validation (ICST 2014).
Henard, C., Papadakis, M., & Le Traon, Y. (2014). Mutation-based Generation of Software Product Line Test Configurations. Symposium on Search-Based Software Engineering (SSBSE 2014). Springer.
Henard, C., Papadakis, M., Perrouin, G., Klein, J., Heymans, P., & Le Traon, Y. (2014). Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Configurations for Software Product Lines. IEEE Transactions on Software Engineering, 40(7), 650-670.
Hermann, F., Nachtigall, N., Braatz, B., Engel, T., & Gottmann, S. (2014). Solving the FIXML2Code-case Study with HenshinTGG. In L. M., Rose, C., Krause, & T., Horn (Eds.), Proceedings of the 7th Transformation Tool Contest - part of the Software Technologies: Applications and Foundations (STAF 2014) federation of conferences (pp. 32-46). CEUR-WS.org.
Hommes, S., State, R., & Engel, T. (2014). Implications and Detection of DoS Attacks in OpenFlow-based Networks. 2014 IEEE Global Communications Conference (pp. 537-543).
Järmyr, S., Ottersten, B., & Jorswieck, E. A. (2014). Statistical Framework for Optimization in the Multi-User MIMO Uplink With ZF-DFE. IEEE Transactions on Signal Processing, 62(10), 2730-2745.
Kandalintsev, A., Lo Cigno, R., Kliazovich, D., & Bouvry, P. (2014). Profiling Cloud Applications with Hardware Performance Counters. International Conference on Information Networking (ICOIN), Phuket, Thailand, 2014.
Kapetanovic, D., Chatzinotas, S., & Ottersten, B. (2014). Index assignment for multiple description repair in distributed storage systems. ICC 2014.
Khader, D., El Kaafarani, A., & Ghadafi, E. (2014). Decentralized Traceable Attribute-Based Signatures. LNCS.
Kordy, B., Mauw, S., & Pieters, P. (2014). Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014. First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014. Springer.
Kordy, B., Schweitzer, P., & Pouly, M. (2014). A Probabilistic Framework for Security Scenarios with Dependent Actions. The 11th International Conference on Integrated Formal Methods (iFM'14), Bertinoro, Italy.
Kukliński, S., Wytrębowicz, J., Dinh, K., & Tantar, E. (2014). Application of Cognitive Techniques to Network Management and Control. In A.-A., Tantar, E., Tantar, J.-Q., Sun, W., Zhang, Q., Ding, O., Schütze, M., Emmerich, P., Legrand, P., Del Moral, & C. A., Coello Coello (Eds.), EVOLVE - A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation V (pp. 79-93). Springer International Publishing.
Lagunas, E., Najar, M., Navarro, M., & Closas, P. (2014). Spatial Sparsity Based Direct Positioning for IR-UWB in IEEE 802.15.4a Channels. IEEE Int. Conf. UltraWide-Band (ICUWB).
Lajmi, A., Martinez, J., & Ziadi, T. (2014). DSLForge: Textual Modeling on the Web. MODELS Demonstrations 2014.
Lanze, F., Panchenko, A., Braatz, B., & Engel, T. (2014). Letting the Puss in Boots Sweat: Detecting Fake Access Points using Dependency of Clock Skews on Temperature. Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014).
Li, L., Pang, J., Liu, Y., Sun, J., & Dong, J. S. (2014). Symbolic analysis of an electric vehicle charging protocol. Proceedings of 19th IEEE Conference on Engineering of Complex Computer Systems (ICECCS). IEEE CS.
Li, Y., & Pang, J. (2014). A strand space approach to provable anonymity. Proc. 2nd Workshop on Formal Techniques for Safety-Critical Systems (FTSCS'13) (pp. 71-87).
Loyola, P., Staats, M., Ko, I.-Y., & Rothermel, G. (2014). Dodona: Automated Oracle Data Set Selection. International Symposium on Software Testing and Analysis 2014.
Lucas Filho, E. R., Cunha De Almeida, E., & Le Traon, Y. (2014). Intra-query Adaptivity for MapReduce Query Processing Systems. IDEAS 2014 : 18th International Database Engineering Applications Symposium. Porto, Portugal.
Lucio, L., Zhang, Q., Nguyen, P. H., Amrani, M., Klein, J., Vangheluwe, H., & Le Traon, Y. (2014). Advances in Model-Driven Security. In A., Memon (Ed.), Advances in Computers. Elsevier.
Malik, A. W., Bilal, K., Aziz, K., Kliazovich, D., Ghani, N., Khan, S. U., & Buyya, R. (2014). CloudNetSim++: A Toolkit for Data Center Simulations in OMNET++. 11th IEEE International Symposium on High Capacity Optical Networks and Enabling Technologies (HONET), Charlotte, NC, USA, December 2014.
Martinez, J., Ziadi, T., Klein, J., & Le Traon, Y. (2014). BUT4Reuse Feature identifier: Identifying reusable features on software variants. Poster session presented at 3ème Conférence en IngénieriE du Logiciel.
Martinez, J., Ziadi, T., Klein, J., & Le Traon, Y. (2014). Identifying and Visualising Commonality and Variability in Model Variants. ECMFA 2014 European Conference on Modelling Foundations and Applications.
Martinez, J., Ziadi, T., Mazo, R., Klein, J., & Le Traon, Y. (2014). Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines. 2nd IEEE Working Conference on Software Visualization.
Meira, J. A., Almeida, E., & Le Traon, Y. (2014). A state machine for database non-functional testing. Poster session presented at 18th International Database Engineering & Applications Symposium.
Merz, S., & Pang, J. (Eds.). (2014). Proceedings of the 16th International Conference on Formal Engineering Methods. Springer.
Mizera, A., Pang, J., & Yuan, Q. (2014). Model-checking based approaches to parameter estimation of gene regulatory networks. Proceedings of 19th IEEE Conference on Engineering of Complex Computer Systems (pp. 206-209). IEEE CS.
Mousavi, M., & Pang, J. (2014). Special issue on software verification and testing (editorial message). Science of Computer Programming, 95(3), 273-274.
Nachtigall, N., Hermann, F., Braatz, B., & Engel, T. (2014). Towards Domain Completeness for Model Transformations Based on Triple Graph Grammars. In M., Amrani, E., Syriani, & M., Wimmer (Eds.), Proceedings of the Third International Workshop on Verification of Model Transformations - co-located with Software Technologies: Applications and Foundations (STAF 2014) (pp. 46-55). CEUR-WS.org.
Neshvad, S., Chatzinotas, S., & Sachau, J. (2014). Distribution Grid Monitoring through Pilot Injection and Successive Interference Cancellation. IAEE Conference Proceedings.
Neshvad, S., Chatzinotas, S., & Sachau, J. (2014). Online Determination of Grid Impedance Spectrum through Pseudo-Random Excitation of a Pulse Width Modulator. Renewable Energy & Power Quality Journal.
Nguyen, P. H. (2014). Model-Driven Security with Modularity and Reusability for Secure Systems Development. STAF-DS 2014.
Nguyen, P. H., Nain, G., Klein, J., Mouelhi, T., & Le Traon, Y. (2014). Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management. Transactions on Aspect-Oriented Software Development, 11, 109-144.
Olivares Mendez, M. A., Bissyandé, T., Somasundar, K., Klein, J., Voos, H., & Le Traon, Y. (2014). The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs. In T. F., Bissyandé & G., van Stam (Eds.), e-Infrastructure and e-Services for Developing Countries (pp. 198-208). Springer International Publishing.
Olivares Mendez, M. A., Kannan, S., & Voos, H. (2014). Setting up a testbed for UAV vision based control using V-REP amp; ROS: A case study on aerial visual inspection. Unmanned Aircraft Systems (ICUAS), 2014 International Conference on.
Ouchani, S., & Lenzini, G. (2014). Attacks Generation by Detecting Attack Surfaces. Paper presented at The 5th International Conference on Ambient Systems, Networks and Technologies (ANT-2014).
Palacios, R., Kliazovich, D., & Granelli, F. (2014). Reverse Direction Transmissions and Network Coding for Energy-Efficient Wi-Fi Networks. IEEE International Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (CAMAD), Athens, Greece, 2014.
Palattella, M. R., Thubert, P., Vilajosana, X., Watteybe, T., Wang, Q., & Engel, T. (2014). 6TiSCH Wireless Industrial Networks: Determinism meet IPv6. Internet of Things: Challenges and Opportunities. Lecture series of Smart Sensors, Measurements, and Instrumentation. vol 9. Subhas Chandra Mukhopadhyay (Ed.) Springer-Verlag.
Pang, J., & Liu, Y. (Eds.). (2014). Proceedings Third International Workshop on Engineering Safety and Security Systems. EPTCS.
Pang, J., & Zhang, Y. (2014). A new access control scheme for Facebook-style social networks. Proceedings of the 9th Conference on Availability, Reliability and Security (ARES 2014, Best Paper Award) (pp. 1-10). IEEE CS.
Papadakis, M., Henard, C., & Le Traon, Y. (2014). Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing. 7th International Conference on Software Testing, Verification and Validation (ICST 2014).
Papadakis, M., & Le Traon, Y. (2014). Effective Fault Localization via Mutation Analysis: A Selective Mutation Approach. ACM Symposium On Applied Computing (SAC'14).
Pinel, F., Dorronsoro, B., Bouvry, P., & khan, S. (2014). It's Not a Bug, It'sa Feature: Wait-free Asynchronous Cellular Genetic Algorithm. In R., Wyrzykowski & J., Dongarra (Eds.), Parallel Processing and Applied Mathematics 10th International Conference, PPAM 2013 Warsaw, Poland, September 8–11, 2013. LNCS.
Popleteev, A., & Engel, T. (2014). Device-Free Indoor Localization Based on Ambient FM Radio Signals. International Journal of Ambient Computing and Intelligence, 6(January-March), 35-44.
Portaluri, G., Giordano, S., Kliazovich, D., & Dorronsoro, B. (2014). A Power Efficient Genetic Algorithm for Resource Allocation in Cloud Computing Data Centers. IEEE International Conference on Cloud Networking (CLOUDNET), Luxembourg City, 2014.
Rienstra, T. (2014). Argumentation in Flux: Modelling Change in the Theory of Argumentation. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: van der Torre, L. (Promotor), Kaci, S. (Promotor), Booth, R. (Promotor), Liao, B. (Promotor), Godo, L. (Promotor), & Baroni, P. (Promotor).
Rubab, I., Ali, S., Briand, L., & Le Traon, Y. (2014). Model-Based Testing of Obligations. 14th Annual International Conference on Quality Software (QSIC) (pp. 1-10). Los Alamitos: Ieee Computer Soc.
Schuetze, O., Coello, C. A. C., Tantar, A.-A., Tantar, E., Bouvry, P., Moral, P. D., & Legrand, P. (Eds.). (2014). EVOLVE - A Bridge between Probability, Set Oriented Numerics and Evolutionary Computation III [EVOLVE 2012, Mexico City Mexico, August 7-9, 2012, selection of extended papers]. Springer.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2014). Cognitive Interference Alignment for Spectral Coexistence. Cognitive Radio and Networking for Heterogeneous Wireless Networks. Springer.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2014). Compressive Sparsity Order Estimation for Wideband Cognitive Radio Receiver. IEEE Transactions on Signal Processing.
Si, Y., Sun, J., Liu, Y., Dong, J. S., Pang, J., Zhang, S., & Yang, X. (2014). Model Checking with Fairness Assumptions using PAT. Frontiers of Computer Science, 8(1), 1-16.
Soltana, G., Fourneret, E., Adedjouma, M., Sabetzadeh, M., & Briand, L. (2014). Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law. 17th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS'14) (pp. 450-466). Springer International Publishing.
Stathakis, A. (2014). Satellite Payload Reconfiguration Optimisation. Unpublished doctoral thesis, University of Luxembourg, ​​Luxembourg.
Jury: Bouvry, P. (Promotor).
Stathakis, A., Danoy, G., Bouvry, P., Talbi, E.-G., & Morelli, G. (2014). Optimising Communication Satellites Payload Configuration with Exact Approaches. Engineering Optimization.
Sun, X., Gabbay, D., Robaldo, L., van der Torre, L., & Baniasadi, Z. (2014). Toward a Linguistic Interpretation of Deontic Paradoxes. 12th International Conference Deontic Logic and Normative Systems.
Tang, Q. (2014). From Ephemerizer to Timed-Ephemerizer - Achieve Assured Lifecycle Enforcement for Sensitive Data. The Computer Journal.
Tang, Q. (2014). Nothing is for Free: Security in Searching Shared & Encrypted Data. IEEE Transactions on Information Forensics & Security.
Tantar, A.-A., & Tantar, E. (2014). A survey on sustainability in ICT a computing perspective. GECCO 2014 - Companion Publication of the 2014 Genetic and Evolutionary Computation Conference, 1213-1220.
Tantar, A.-A., Tantar, E., & Schütze, O. (2014). Asymmetric quadratic landscape approximation model. GECCO 2014 - Proceedings of the 2014 Genetic and Evolutionary Computation Conference, 493-500.
Tantar, E., Palattella, M. R., Avanesov, T., Kantor, M., & Engel, T. (2014). Cognition: a tool for reinforcing security in Software Defined Netwks. In A.-A., Tantar, E., Tantar, S., Jian-Qiao, W., Zhang, Q., Ding, O., Schütze, M., Emmerich, P., Legrand, P., Del Moral, & C., Coello Coello (Eds.), EVOLVE - A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation V (pp. 61-78). Springer.
Tchernykh, A., Cortés-Mendoza, J. M., Pecero, J. E., Bouvry, P., & Kliazovich, D. (2014). Adaptive Energy Efficient Distributed VoIP Load Balancing in Federated Cloud Infrastructure. IEEE International Conference on Cloud Networking (CLOUDNET), Luxembourg City, 2014.
Thome, J., Gorla, A., & Zeller, A. (2014). Search-based Security Testing of Web Applications. SBST 2014 Proceedings of the 7th International Workshop on Search-Based Software Testing (pp. 5--14). New York, NY, USA: ACM.
Tosatto, S. C., & Van Zee, M. (2014). Bridging Social Network Analysis and Judgment Aggregation. Proceedings of the 6th International Conference on Social Informatics.
Trujillo Rasua, R., Martin, B., & Avoine, G. (2014). Distance Bounding Facing Both Mafia and Distance Frauds. IEEE Transactions on Wireless Communications, 13(10), 5690–5698.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2014). Automatic Modulation Classification for Adaptive Power Control in Cognitive Satellite Communications. Proceedings of 7th Advanced Satellite Multimedia Systems Conference (ASMS) and 13th Signal Processing for Space Communications Workshop (SPSC) 2014.
Tsakmalis, A., Chatzinotas, S., & Ottersten, B. (2014). Modulation and Coding Classification for Adaptive Power Control in 5G Cognitive Communications. Proceedings of IEEE International Workshop on Signal Processing Advances in Wireless Communications 2014.
Tsakonas, E., Jaldén, J., Sidiropoulos, N. D., & Ottersten, B. (2014). Convergence of the Huber Regression M-Estimate in the Presence of Dense Outliers. IEEE Signal Processing Letters, 21(11), 1211-1214.
van der Linden, D., & Van Zee, M. (2014). On the Semantic Feature Structure of Modeling Concepts: an Empirical Study. 16h IEEE Conference on Business Informatics (CBI) proceedings.
Van Zee, M., Dastani, M., & van der Torre, L. (2014). Collective Intention Revision from a Database Perspective. Paper presented at The Collective Intentionality IX Conference.
Van Zee, M., Doherty, P., & Meyer, J.-J. (2014). Encoding Definitional Fragments of Temporal Action Logic into Logic Programming. Paper presented at The International Workshop on Defeasible and Ampliative Reasoning (DARe).
Van Zee, M., Plataniotis, G., Marosin, D., & van der Linden, D. (2014). Formalizing Enterprise Architecture Decision Models using Integrity Constraints. In U., Unknown (Ed.), Formalizing Enterprise Architecture Decision Models using Integrity Constraints.
Vu, T. X., Vu, T. A., & Quek, T. Q. S. (2014). Successive Pilot Contamination Elimination in Multiantenna Multicell Networks. IEEE Wireless Communications Letters, 3(6), 617-620.
Zhang, J., Yang, L., Mauw, S., & Muller, T. (2014). On Robustness of Trust Systems. 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM'14), Singapore 7-10 July 2014.
Ziadi, T., Henard, C., Papadakis, M., Ziane, M., & Le Traon, Y. (2014). Towards a Language-Independent Approach for Reverse-Engineering of Software Product Lines. 29th Symposium on Applied Computing (SAC 2014).
Zourou, K., & Song, J.-Y. (2014). Internet and social media communication skills: addressing the needs of LLP project teams. International Journal for Innovation and Quality and in Learning, 2(3).

2013

Bertholon, B. (2013). CertiCloud and JShadObf. Towards Integrity and Software Protection in Cloud Computing Platforms. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Bouvry, P. (Promotor), & Varrette, S. (Promotor).
Nguyen, A. Q., Tantar, A.-A., Bouvry, P., & Talbi, E.-G. (2013, December 18). Design of an Energy Efficiency Model and Architecture for Cloud Management using Prediction Models. Paper presented at SocPar 2013, Hanoi, Vietnam.
Rosich, A., Voos, H., Li, Y., & Darouach, M. (2013). A model predictive approach for cyber-attack detection and mitigation in control systems. 52nd IEEE Conference on Decision and Control CDC 2013, Florence, Italy, Dec. 2013 (pp. 6621-6626).
Voos, H., Li, Y., & Darouach, M. (2013). A model predictive approach for cyber-attack detection and mitigation in control systems. The 52nd IEEE Conference on Decision and Control (pp. 6621-6626).
Caire, P., Bikakis, A., & Le Traon, Y. (2013). Information Dependencies in MCS: Conviviality-Based Model and Metrics. 16th INTERNATIONAL CONFERENCE ON PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS (PRIMA 2013).
Ambrossio, D. A., Antonini, A., Elrakaiby, Y., Gabbay, D., & Van Zee, M. (2013, December). Argument Revival in Annotated Argumentation Networks. Paper presented at Second workshop on Argumentation in Artificial Intelligence and Philosophy: computational and philosophical perspectives.
Culnane, C., Heather, J., Joaquim, R., Ryan, P., Schneider, S., & Teague, V. (2013). Faster Print on Demand for Prêt à Voter. Journal of Election Technology and Systems, 2(1).
Frank, R., Castignani, G., Schmitz, R., & Thomas, E. (2013). A novel Eco-Driving Application to Reduce Energy Consumption of Electric Vehicles. Proceedings of the 2nd International Conference on Connected Vehicles & Expo (ICCVE 2013).
Hassouneh, N., & Alodeh, M. (2013). Enhanced Service Delivery for Cognitive Systems within Multiple Antenna Scenarios. IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies.
Lagunas, E., Amin, M., Ahmad, F., & Najar, M. (2013, December). Pattern Matching for Building Feature Extraction. IEEE Geoscience and Remote Sensing Letters.
Maleki, S., Prabhakar Chepuri, S., & Leus, G. (2013). Optimization of hard fusion based spectrum sensing for energy-constrained cognitive radio networks. Physical Communication, 9, 193-198.
Nguyen, P. H., Klein, J., Kramer, M., & Le Traon, Y. (2013). A Systematic Review of Model-Driven Security. The 20th Asia-Pacific Software Engineering Conference Proceedings.
Ottersten, B., Krikidis, I., & Zheng, G. (2013). Protocols and Stability Analysis for Energy Harvesting TDMA Systems with/without Relaying. IEEE Global Telecommunications Conference (GLOBECOM).
Schmitz, S. (2013). Facebook’s Real Name Policy: Bye-Bye, Max Mustermann? Journal of Intellectual Property, Information Technology and E-Commerce Law, 4(3), 190-204.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2013). SNR Estimation for Multi-dimensional Cognitive Receiver under Correlated Channel/Noise. IEEE Transactions on Wireless Communications, 12(12), 6392-6405.
Stojanovic, A., & Ohm, J.-R. (2013, December). Exploiting Long-Term Redundancies in Reconstructed Video. IEEE Journal on Selected Topics in Signal Processing.
Norta, D. P. B., Sachau, J., & Allelein, H.-J. (2013, November 18). Hydrokinetic and Solar Energy Contribution to a Reliable Energy Supply. Poster session presented at IRES 2013 8th International Renewable Energy Storage Conference and Exhibition, Berlin, Germany.
Arcia-Moret, A., Montavont, N., & Castignani, G. (2013, November 14). Accelerating short transfers in 802.11 networks. Poster session presented at IEEE/IFIP Wireless Days.
Nguyen, D. C., & Tonella, P. (2013, November 14). Automated Inference of Classifications and Dependencies for Combinatorial Testing. Paper presented at 28th IEEE/ACM International Conference on Automated Software Engineering.
Castignani, G., Monetti, J., Montavont, N., Arcia-Moret, A., Frank, R., & Engel, T. (2013). A Study of Urban IEEE 802.11 Hotspot Networks: Towards a Community Access Network. A Study of Urban IEEE 802.11 Hotspot Networks: Towards a Community Access Network (pp. 8).
Tonella, P., Tiella, R., & Nguyen, D. C. (2013, November 10). N-Gram Based Test Sequence Generation from Finite State Models. Paper presented at 1st Future Internet Testing - FITTEST workshop.
Schweitzer, P. (2013). Attack-defense trees. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Mauw, S. (Promotor).
Alodeh, M., Zorba, N., & Verikoukis, C. (2013, November). Power consumption in spatial cognition. Transactions on Emerging Telecommunications Technologies.
Amrani, M. (2013). Towards the Formal Verification of Model Transformations: An Application to Kermeta. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Kelsen, P. (Promotor).
Bissyande, T. F. D. A., Lo, D., Jiang, L., Reveillere, L., Klein, J., & Le Traon, Y. (2013). Got Issues? Who Cares About It? A Large Scale Investigation of Issue Trackers from GitHub. Proceedings of the 24th International Symposium on Software Reliability Engineering (ISSRE 2013).
Caire, P., van der Torre, L., & Villata, S. (2013). Combining Norms, Roles, Dependence and Argumentation in Agreement Technologies. 25th Benelux Conference on Artificial Intelligence BNAIC'13. Delft, Nov. 7-8.
Chen, X., Harpes, C., Lenzini, G., Martins, M., Mauw, S., & Pang, J. (2013). DEMO: Demonstrating a Trust Framework for Evaluating GNSS Signal Integrity. Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (pp. 1329-1332). ACM.
Colombo Tosatto, S., Elrakaiby, Y., & Ziafati, P. (2013). Compliance in Resource-based Process Models. In K., Hindriks, M., de Weerdt, B., van Riemsdijk, & M., Warnier (Eds.), Proceedings of the 25th Belgium-Netherlands Artificial Intelligence Conference.
Di Nardo, D., Alshahwan, N., Briand, L., Fourneret, E., Nakic-Alfirevic, T., & Masquelier, V. (2013). Model Based Test Validation and Oracles for Data Acquisition Systems. IEEE/ACM International Conference on Automated Software Engineering.
Fliscounakis, S., Panciatici, P., Capitanescu, F., & Wehenkel, L. (2013). Contingency ranking with respect to overloads in very large power systems taking into account uncertainty, preventive and corrective actions. IEEE Transactions on Power Systems, 28(4), 4909-4017.
Hochgeschwender, N., Schneider, S., Voos, H., & Kraetzschmar, G. (2013). Towards a Robot Perception Specification Language. 4th International Workshop on Domain-Specific Languages and models for ROBotic systems (DSLRob-13), Tokyo, Japan, Nov. 2013.
Kannan, S., Olivares Mendez, M. A., & Voos, H. (2013). Modeling and Control of Aerial Manipulation Vehicle with Visual sensor. Second Workshop on Research, Development and Education on Unmanned Aerial Systems (RED-UAS 2013).
Max, C., & Hack, N. (2013, November). The sciPADS project. Paper presented at Annual EAPRIL conference, BIEL, Switzerland.
Mouton, M., Castignani, G., Frank, R., & Engel, T. (2013, November). MROAD: Scanning-free Model-Based Roaming for 802.11 Networks Under Vehicular Mobility. Paper presented at IFIP Wireless Days conference.
Wilfinger, D., Meschtscherjakov, A., Moser, C., Tscheligi, M., Sunström, P., & McCall, R. (2013). Workshop Introduction: Computer Entertainment in Cars and Transportation. Conference on Advances in Computer Entertainment.
Caire, P., van der Torre, L., & Villata, S. (2013). Combining Norms, Roles, Dependence and Argumentation in Agreement Technologies. AAA' 13. International Workshop on Argument for Agreement and Assurance, Kanagawa, Japan, Oct. 27-28.
Garcia Becerro, F., & Mirbach, B. (2013). Range Image Pixel Matching Method. United States: United States Patent Application Publication.
Goergen, D., Gurbani, V., & State, R. (2013, October 15). Of maps and costs: Aggregating large-scale broadband measurements for the Application Layer Traffic Optimization (ALTO) protocol. Paper presented at IIT RTC Conference, Chicago, USA.
Schmitz, S. (2013). Zur Durchsetzung von Urheberrechten im Internet: Ein Warnhinweismodell als Ausweg? Der Jurist, 3, 109 - 141.
Jostock, M., Sachau, J., Hadji-Minaglou, J.-R., & Tuttas, C. (2013, October 08). Structured Analysis of Arbitrary Island Grids. Paper presented at 4th European Innovative Smart Grid Technologies (ISGT), Copenhagen, Denmark.
Codeca, L., Frank, R., & Engel, T. (2013). Improving Traffic in Urban Environments applying the Wardrop Equilibrium. Improving Traffic in Urban Environments applying the Wardrop Equilibrium.
Norta, D. P. B., Sachau, J., & Allelein, H.-J. (2013, October 07). Modular Hydrokinetic Micro Generation. Poster session presented at HYDRO 2013 International Conference and Exhibition, Innsbruck, Austria.
Jostock, M. (2013). Stabilität wechselrichtergeführter Inselnetze. Norderstedt, Germany: Books on Demand.
Abu Shaban, Z., Shankar, B., Christopoulos, D., & Arapoglou, P.-D. (2013). Timing and Frequency Synchronisation for Multiuser Detection on the Return Link of Interactive Mobile Satellite Networks. Proceedings of the ICSSC conferrence.
Arora, C., Sabetzadeh, M., Briand, L., Zimmer, F., & Gnaga, R. (2013). Automatic Checking of Conformance to Requirement Boilerplates via Text Chunking: An Industrial Case Study. 7th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2013).
Castignani, G., Frank, R., & Engel, T. (2013). Driver Behavior Profiling using Smartphones. Driver Behavior Profiling using Smartphones.
Castignani, G., Frank, R., & Engel, T. (2013). An Evaluation Study of Driver Profiling Fuzzy Algorithms using Smartphones. An Evaluation Study of Driver Profiling Fuzzy Algorithms using Smartphones (pp. 6).
Darouach, M., Gao, N., Voos, H., & Marquez, H. (2013). Generalized H_infinity observers design for systems with unknown inputs. 2nd International Conference on Control and Fault-Tolerant Systems SysTol'13, Nice, France, Oct. 2013.
Goergen, D., Mendiratta, V., State, R., & Engel, T. (2013). Identifying abnormal pattern in cellular communication flows. Proceedings of IPTComm 2013. ACM.
Hommes, S., Hermann, F., State, R., & Engel, T. (2013). Automated Source Code Extension for Debugging of OpenFlow based Networks. Proc. 9th International Conference on Network and Service Management (CNSM) (pp. 105-108).
Hommes, S., State, R., & Engel, T. (2013). Classification of Log Files with Limited Labeled Data. Proceedings of IPTComm 2013.
Kracheel, M., McCall, R., Koenig, V., & Engel, T. (2013). Driver diaries: a multimodal mobility behaviour logging methodology. Proceedings of the 5th International Conference on Automotive User Interfaces and Interactive Vehicular Applications.
Maleki, S. (2013). Energy-Efficient Spectrum Sensing for Cognitive Radio Networks. ipskampdrukkers.
Nguyen, D. C., Mendelson, B., Citron, D., Shehory, O., Vos, T. E. J., & Condori, N. (2013, October). Evaluating the FITTEST Automated Testing Tools: an Industrial Case Study. Paper presented at 7th International Symposium on Empirical Software Engineering and Measurement.
Palattella, M. R., Thubert, P., Watteyne, T., & Wang, Q. (2013). Terminology in IPv6 over the TSCH mode of IEEE 802.15.4e. IETF draft, draft-palattella-6tisch-terminology-00.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2013). Eigenvalue Based Sensing and SNR Estimation for Cognitive Radio in Presence of Noise Correlation. IEEE Transactions on Vehicular Technology, 62(8), 3671 - 3684.
Sharma, S. K., Chatzinotas, S., & Ottersten, B. (2013). Inline Interference Mitigation Techniques for Spectral Coexistence of GEO and NGEO Satellites. Proceedings of 19th ka band and 31st AIAA ICSSC conference.
Varrette, S., Guzek, M., Plugaru, V., Besseron, X., & Bouvry, P. (2013). HPC Performance and Energy-Efficiency of Xen, KVM and VMware Hypervisors. Proc. of the 25th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2013).
Watteyne, T., Palattella, M. R., & Grieco, L. A. (2013). Using IEEE802.15.4e TSCH in an LLN context: Overview, Problem Statement and Goals. IETF draft, draft-watteyne-6tisch-tsch-00. IETF Internet Draft.
Siry, L. (2013). "Knowing it When It Is Seen" The Polemic of the Regulation of Sexualized Speech in the United States and Europe. Unpublished doctoral thesis, University of Luxembourg, ​Luxembourg, ​​Luxembourg.
Jury: Cole, M. (Promotor).
Jamroga, W., & Tabatabaei, M. (2013). Accumulative Knowledge Under Bounded Resources. Computational Logic in Multi-Agent Systems (pp. 17). Berlin Heidelberg: Springer.
Jerome, Q., Marchal, S., State, R., & Engel, T. (2013). Advanced Detection Tool for PDF Threats. Proceedings of the sixth International Workshop on Autonomous and Spontaneous Security, RHUL, Egham, U.K., 12th-13th September 2013. Springer.
Colombo Tosatto, S., Governatori, G., & Kelsen, P. (2013). Towards an Abstract Framework for Compliance. In E., Bagheri, D., Gasevic, S., Halle, M., Hatala, H. R., Motahari Nezhad, & M., Reichert (Eds.), Proceedings of the 17th IEEE International EDOC 2013 Conference Workshops, Vancouver, Canada, 9 September 2013.
Kapetanovic, D., Zheng, G., Wong, K.-K., & Ottersten, B. (2013). Detection of Pilot Contamination Attack Using Random Training and Massive MIMO. IEEE Personal Indoor, Mobile and Radio Conference (PIMRC) 2013.
Gharanjik, A., Shankar, B., & Arapoglou, P.-D. (2013). Large Scale Transmit Diversity in Q/V Band Feeder Link with Multiple Gateways. Proceeding of IEEE 24th International Symposium on Personal, Indoor, and Mobile Radio Communication(PIMRC) (pp. 766-770).
Bissyande, T. F. D. A., Réveillère, L., Lawall, J., Bromberg, D., & Muller, G. (2013, September 06). Implementing an Embedded Compiler using Program Transformation Rules. Software : Practice & Experience, 1..20.
Kapetanovic, D., Butt, M., Chatzinotas, S., & Ottersten, B. (2013). Secondary User Scheduling Under Throughput Guarantees for the Primary Network. IEEE Vehicular Technology Conference (VTC), Fall 2013.
Al Ismaeil, K., Aouada, D., Mirbach, B., & Ottersten, B. (2013). Dynamic Super Resolution of Depth Sequences with Non-Rigid Motions. 20th International Conference on Image Processing.
Beattie, D., Lynne, B., Halvey, M., & McCall, R. (2013, September). Maintaining a Sense of Control in Autonomous Vehicles via Auditory Feedback. Paper presented at The Fourth Workshop on the Perceptual Quality of Systems, Vienna, Austria.
Butt, M., Jorswieck, E. A., & Ottersten, B. (2013). Maximizing Energy Efficiency for Loss Tolerant Applications: The Packet Buffering Case. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC).
Chatzinotas, S., Sharma, S. K., & Ottersten, B. (2013). Frequency Packing for Interference Alignment-based Cognitive Dual Satellite Systems. Proceedings of IEEE 78th Vehicular Technology Conference: VTC2013-Fall.