Computer Science and Communications Research Unit

259
Computer Science and Communications Research Unit CSC Activity Report, 2012

Transcript of Computer Science and Communications Research Unit

Page 1: Computer Science and Communications Research Unit

Computer Science andCommunications Research Unit

CSC Activity Report 2012

Computer Science andCommunications Research Unit

CSC Activity Report 2012

KeywordsActivity Report University of Luxembourg Computer Science andCommunications Research Unit UL CSC LATEX

Computer Science and Communications Research UnitCSC Activity Report 2012

Editors Gregoire Danoy and Sebastien VarretteRelease date 2012Category 1 (public)Document Version Final v01 ndash SVN Rev

Compiled time 2013-10-08 1108Comments This report has been written using LATEX on the basis of the

template ccopy designed by Sebastien Varrette

AddressComputer Science amp Communication (CSC) Research UnitUniversity of LuxembourgFaculty of Science Technology and Communication6 rue Richard Coudenhove-KalergiL-1359 LuxembourgLuxembourg

Administrative ContactIsabelle Glemot-Schroeder and Fabienne Schmitz

Email cscunilu

httpcscunilu

Preface

You will find in this report the progress and activities made by the ComputerScience amp Communications (Computer Science amp Communications (CSC))research unit in 2012

Let me please summarize

In 2012 CSC features 116 positions including 24 Professors and Associate-Professors 32 Post-doc researchers 47 PhD students and 12 Administrativeand Technical staff

Nicolas Navet formerly at INRIA-Nancy has joined the lab as an associateprofessor specializing in real-time and embedded systems

Prof Denis Zampunieris has been appointed as vice-dean of the Faculty ofScience Technology and Communication and Nicolas Navet succeeds DenisZampunieris as course director of the bachelor in Informatics

Prof Lionel Briand is the recipient of a FNR PEARL grant that officiallystarted in January 2012 His group at the SnT is now composed of 12scientists and PhD students

The renowned logician Dov Gabbay started his second 3-year term (2012-2014) as an invited professor of UL attached to CSC

CSC hosted in Luxembourg several successful workshops

bull ldquoJudgment Aggregationrdquo (Feb 1) an important topic in the emergingarea of computational social choice

bull ldquoDynamics Of Argumentation Rules and Conditionals (DARC)rdquo(April2-3) another one on the Several other events were co-organized locallyand abroad

bull ldquoeVoting PhD Workshoprdquo (15-16 October)

ii

Dmitry Khovratovich obtained the Best PhD thesis award of the Universityof Luxembourg for his research on ldquoNew Approaches to the Cryptanalysisof Symmetric Primitivesrdquo

Dr Foued Melakessou received the first prize in the 2012 Scilab Contest atthe Workshop on Scilab amp OW2 (IWSO) in Nanjing China for his NARVAL(Network Analysis and Routing eVALuation) toolbox NARVAL is builton the Scilab environment and focuses on the analysis of network proto-cols (httpsecan-labuniluindexphpnews161-narval-toolbox-wins-first-prize-in-2012-scilab-contest)

Prof Lionel Briand received the IEEE Computer Society Harlan Mills awardfor his contributions to model-based verification and testing

Prof Bjorn Ottersten and Prof Lionel Briand were appointed members ofthe IEEE Fellow Review Committee

Prof Bjorn Ottersten was appointed ldquoDigital Champion of Luxembourgrdquoby Francois Biltgen Minister for Higher Education and Research

The hackbraten team headed by Piotr Kordy represented the SaToSS groupat the Capture the Flag Competition (http2012hackluindexphpCaptureTheFlag) co-located with the Hacklu conference (http2012hacklu) The team was ranked 24th amongst 575 teams registered forthe event

In 2012 ULCSC was involved in the launch of LAST-JD a new interdisci-plinary ERASMUS MUNDUS PhD program in Law Science and Technologyinvolving several partner universities in Europe and beyond

Dr Jun Pang and Prof Sjouke Mauw initiated a new strand of researchfocusing on formal models for biological systems An expert in the field DrAndrzej Mizera was hired to contribute and further extend this initiative

Prof Dr Pascal BouvryLuxembourg January 17 2013

Contents

1 The Computer Science amp Communications (CSC) ResearchUnit 1

2 Executive Summary 3

21 Academic Staff Overview 4

22 Main activities in 2012 5

23 CSC Budget in 2012 6

3 CSC Laboratories 7

31 Laboratory for Advanced Software Systems 7

32 Laboratory of Algorithmics Cryptology and Security 9

33 Communicative Systems Laboratory 10

34 Interdisciplinary Laboratory for Intelligent and Adaptive Sys-tems 12

4 Projects and Grants in 2012 15

41 Research projects 27

411 European funding projects 27

412 FNR COREINTER Projects 49

413 UL Projects 78

414 UL PhD PostDoc 91

iv CONTENTS

415 Other miscellaneous projects 115

42 Grants 123

421 AFR 123

422 Workshop amp Conferences (FNR Accompanying Mea-sures) 165

5 CSC Representation 167

51 Conferences 167

52 PC and other memberships 170

53 Doctoral board 176

54 Guests 177

55 Visits and other representation activities 181

56 Research meeting 186

6 CSC Software 189

7 CSC Publications in 2012 197

71 Books 197

72 Book Chapters 198

73 International journals 198

74 Conferences Articles 204

75 Internal Reports 223

76 Proceedings 224

Appendix 225

A Additional References 225

B CSC Statistics for 2012 239

B1 CSC publications 239

B2 CSC budget 239

B3 CSC staff per category 240

CONTENTS v

C Acronyms used 245

vi CONTENTS

Chapter 1

The Computer Science ampCommunications (CSC)

Research Unit

The Computer Science amp Communications (CSC) research unit is part ofthe University of Luxembourg with the primary mission to conduct funda-mental and applied research in the area of computer communication andinformation sciences

The goal is to push forward the scientific frontiers of these fields Addition-ally CSC provide support for the educational tasks at the academic andprofessional Bachelor and Master levels as well as for the PhD program

The CSC Research Unit is divided into four laboratories

1 Communicative Systems Laboratory (ComSys)

2 Interdisciplinary Laboratory for Intelligent and Adaptive Systems (ILIAS)

3 Laboratory of Algorithmics Cryptology and Security (LACS)

4 Laboratory for Advanced Software Systems (LASSY)

Three laboratories of the interdisciplinary centre in security reliability andtrust (SnT) are also headed by CSC professors

2 The Computer Science amp Communications (CSC) Research Unit

CSC works intensively towards the University priorities in Security Relia-bility and Trust as well as Systems Biomedicine By providing a strong dis-ciplinary knowledge in computer science telecommunications and appliedmathematics CSC will serve as one of the fundamental bricks to enableinterdisciplinary research through the University of Luxembourgrsquos interdis-ciplinary centres

CSC is currently the largest research unit of the University with a staff ofmore than 100 persons including 22 professors and associate-professors 11scientific support staff members 25 post-doc researchers and scientific col-laborators 40 PhD students 3 technician on project 1 research facilitator3 technical support staff members 3 technicians on project 475 full-time-equivalent administrative support positions

Their research fields range from the investigation of the theoretical founda-tions to the development of interdisciplinary applications

CSC decisions are taken by the chorum of professors As described in Figure11 the head of the research unit is helped by a quality manager a facilitymanager (handled by the scientific facilitator) and the heads of labs in orderto prepare the decision options and the reporting of the CSC Each lab hasits own budget line and a set of support resources

Prof BouvryHead of CSC

Prof ZampunierisDirector of Studies Representative

Prof MauwQuality Manager

Prof SchommerHead of ILIAS

Prof EngelHead of ComSys

Prof GuelfiHead of LASSY

Prof BiryukovHead of LACS

Profs Profs Profs Profs

CSC Steering Board

Bertrand DessartResearch Facilitator

Figure 11 CSC Organisation

Chapter 2

Executive Summary

The Computer Science and Communication research unit aka ComputerScience amp Communications (CSC) includes a staff of over 100 persons Twohundred students at Bachelor and Master levels are registered to CSC bach-elor and master degrees Close supervision and advice is ensured by opendoor policy and project based lecturing

CSC is also involved in life-long learning by organising a master degreein Information Systems Security Management in collaboration with CRPTudor

With regard to the professional branches the main aim consists of reducingthe gap between theory and practice whereas for the academic branchesthe focus is set on a problem-oriented understanding of the theoretical foun-dations of computer science CSC works intensively towards the Universitypriorities in Security Reliability and Trust as well as System BiomedicineBy providing a strong disciplinary knowledge in computer science telecom-munications and applied mathematics CSC will serve as one of the fun-damental bricks to enable interdisciplinary research through the Universityof Luxembourgrsquos interdisciplinary centres CSC is currently the largest re-search unit of the University and is cooperating in a large set of internationalas well as regional projects

In parallel CSC is more and more active in the field of distributed gridcomputing with the aim to propose andor join attractive academic projectsin this area In this context CSC manages the UL HPC (High PerformanceComputing) facility of the UL and inaugurated the new cluster hosted inthe LCSB premises in Belval The current solution includes 151 nodes 1556

4 Executive Summary

cores 14245 TFlops 265 TB NFS storage and 240 TB Lustre storage

21 Academic Staff Overview

bull Jean-Claude Asselborndagger emeritus professor

bull Alex Biryukov associate professor head of LACS

bull Raymond Bisdorff professor

bull Pascal Bouvry professor head of CSC and ILIAS

bull Lionel Briand professor

bull Jean-Sebastien Coron associate professor

bull Dov Gabbay guest professor

bull Theo Duhautpas senior lecturer

bull Thomas Engel professor head of ComSys

bull Nicolas Guelfi professor head of LASSY

bull Pierre Kelsen professor

bull Franck Leprevost professor vice rector

bull Yves Le Traon professor

bull Sjouke Mauw professor

bull Volker Muller associate professor

bull Nicolas Navet professor

bull Bjorn Ottersten professor

bull Steffen Rothkugel associate professor

bull Peter Ryan professor

bull Jurgen Sachau professor

bull Christoph Schommer associate professor

bull Ulrich Sorger professor

bull Bernard Steenis associate professor

bull Leon van der Torre professor

bull Denis Zampunieris professor

22 Main activities in 2012 5

22 Main activities in 2012

The following local events have been organized during 2012

bull IFIP AIMS 2012

bull Capture The Flag competition 2012

bull Workshop on Dynamics of Argumentation Rules and Conditionals

bull Interdisciplinary PhD Workshop on Security in eVoting (eVote PhDDays 2012)

CSC also participates at the organisation of many international conferencesand workshops

CSC is having strong partnerships with the other Luxembourgian researchcentres through the co-supervision of PhD students co-organised projectsand teaching activities

In 2012 13 PhD students successfully defended their PhD thesis at the CSC

CSC members are taking active part in various boards country-wide ex-ecutive direction of ERCIM direction of RESTENA chairman of Luxcloudboard vice-rectorate for international affairs and special projects of the Uni-versity of Luxembourg chairman of Luxconnect SA member of LUXTRUSTadministration board members of the SnT interim steering board and SnTfaculty boards representative of Luxembourg in the COST ICT DG expertsfor EU and national projects

CSC is active in various networks and projects International EU (FPEureka COST) regional (UGR) and local (FNR) networks and projects

CSC participates to various ERCIM workgroups - the European ResearchConsortium for Informatics and Mathematics through the FNR

CSC also participated to the open source community by several contribu-tions

bull ADTool

bull ARGULAB

bull Canephora

bull Democles

bull Face recognition

6 Executive Summary

bull JShadObf

bull MaM Multidimensional Aggregation Monitoring

bull MSC Macro Package for LATEX

bull Visual Contract Builder

CSC in 2012 produced 1 book 7 book chapters edited 3 proceedings andin terms of international peer-reviewed publications 69 journal articles and165 conference and workshop proceedings (see chapter 7 page 197 for moredetails) The full list of CSC publications is available here

23 CSC Budget in 2012

The following table describes the marginal expenses of CSC in terms of struc-tural funding and UL projects The main cost corresponds to the salaries ofthe structural positions (professors research assistants assistants admin-istrative and support staff) expenses related to the buildings and some ofthe operating expenses (eg phone bills electricity etc) are covered by thestructural UL budget

Lab structural funding 761070e

UL Research Projects 896775e

Total 1657845 e

Table 21 CSC Internal Budget

Chapter 3

CSC Laboratories

31 Laboratory for Advanced Software Systems

Laboratory of Advanced Software SystemsAcronym LASSYReference F1R-CSC-LAB-05LASSHead Prof Dr Pierre Kelsen

Scientific Board Nicolas Guelfi Pierre Kelsen Yves Le Traon NicolasNavet Denis Zampunieris

Domain(s)

bull dependability

bull e-learning

bull hardwaresoftware co-design

bull model driven engineering

bull proactive computing

bull real-time and embedded systems

bull security

8 CSC Laboratories

bull software engineering

bull software product lines

bull testing

bull verification

Objectives The LASSY laboratory considers advanced software systemsas objects which are complex (business- or safety-) critical and possiblycontaining both software and hardware From the LASSY perspective thefour main dimensions underpinning the science of engineering these advancedsoftware systems are modeling methodology dependability (including secu-rity) and realization infrastructures LASSY conducts research in modelingand more specifically on model driven engineering which aims at allowing theengineering of such systems by creating and transforming models method-ologies which aim at defining engineering processes (focusing on analysisdesign and verification) and rules allowing for an efficient engineering of suchsystems conceptual frameworks and development platforms for enhancingdependability (focusing on concurrent transactions and fault tolerance) Inour research we promote the early consideration of realization infrastruc-tures (ie the hardware execution platform which integrates acquisitioncomputation communications and presentation hardware devices) Finallywe target specific application domains such as e-business systems auto-motive systems crisis management systems or proactive e-learning systemswhich are used either for experimental validation or for research problemelicitation

The current research objectives are the following ones

bull To develop new engineering processes

bull To investigate modeling languages

bull To use mathematical theories in the definition and verification of newsoftware engineering artifacts

bull To address dependability attributes (availability reliability safety con-fidentiality integrity and maintainability) throughout all the develop-ment life cycle

bull To assist in the development and in the use of e-learning tools

bull To study verification and validation techniques

Skills

32 Laboratory of Algorithmics Cryptology and Security 9

bull Nicolas Guelfi dependability verification software engineering modeldriven engineering

bull Pierre Kelsen model driven engineering software engineering formalmethods

bull Yves Le Traon verification testing software security model drivenengineering

bull Nicolas Navet real-time and embedded systems

bull Denis Zampunieris E-learning Proactive Computing

32 Laboratory of Algorithmics Cryptology andSecurity

Laboratory of Algorithmics Cryptology and SecurityAcronym LACSReference F1R-CSC-LAB-F01L0204Head Prof Dr Alex Biryukov

Scientific Board Jean-Sebastien Coron Franck Leprevost Sjouke MauwVolker Muller Peter Ryan

Domain(s)

bull Cryptography Information and Network Security

bull Information Security Management

bull Embedded Systems Security

bull Side-Channel Analysis and Security of Implementations

bull Algorithmic Number Theory

bull Security protocols

bull Security and trust assessment and modelling

bull Socio-technical security

10 CSC Laboratories

Objectives In recent years information technology has expanded to en-compass most facets of our daily livesmdashat work at school at home forleisure or learning and on the movemdashand it is reaching ever-widening seg-ments of our society The Internet e-mail mobile phones etc are alreadystandard channels for the information society to communicate gain accessto new multimedia services do business or learn new skills The recentldquodigital revolutionrdquo and widespread access to telecommunication networkshave enabled the emergence of e-commerce and e-government This pro-liferation of digital communication and the transition of social interactionsinto the cyberspace have raised new concerns in terms of security and trustlike confidentiality privacy and anonymity data integrity protection ofintellectual property and digital rights management threats of corporateespionage and surveillance systems (such as Echelon) etc These issues areinterdisciplinary in their essence drawing from several fields algorithmicnumber theory cryptography network security signal processing securityof protocols side-channel analysis software engineering legal issues andmany more

Skills NA

33 Communicative Systems Laboratory

Communicative Systems LaboratoryAcronym ComSysReference F1R-CSC-LAB-05COMSHead Prof Dr Thomas Engel

Scientific Board Pascal Bouvry Thomas Engel Steffen Rothkugel SjoukeMauw Theo Duhautpas Yves Le Traon Lionel Briand Bjorn OtterstenPeter Ryan Jurgen Sachau

Domain(s)

bull Information Transmission

bull Wireless Communication Systems

bull Security Protocols

bull Trust Models

33 Communicative Systems Laboratory 11

bull Middleware

bull Parallel and Distributed Systems

bull Cloud Grid and Peer-to-Peer Computing

Objectives The Communicative Systems Laboratory (ComSys) is part ofthe Computer Science and Communication Research Unit and focuses onstate of the art research in digital communications Embracing the end-to-end arguments in system design ComSys focuses on integrated research inthe areas of Information Transfer and Communicating Systems Informa-tion Transfer is concerned with information transmission over potentiallycomplex channels and networks Communicating Systems in turn are thecomposition of multiple distributed entities employing communication net-works to collaboratively achieve a common goal ComSys has strong tech-nical and personal facilities to improve existing and develop new solutionsin the following research topics The ComSys research fields will have astrong impact on the 21st century The rapidly growing demand for infor-mation exchange in peoplersquos daily lives requires technologies like ubiquitousand pervasive computing to meet the expectations of the information so-ciety and novel adaptive concepts tackling the continuing data challengesThe resulting problems have already been a key enabler for some industrialand governmental founded projects at national and European level Currentresearch projects propagate technologies for

bull Hybrid Wireless Networks

bull Green Cloud Computing

bull Information Dissemination in Ad-Hoc Networks

bull Mobile Communication

bull Mobile Learning

bull Network Traffic Analysis and Protection

bull Network Traffic Management and Coordination

bull Secure Satellite Communication

bull Secure Wireless MANETs

Skills

bull Research in networks and service security

12 CSC Laboratories

bull Mobile and vehicular networks

bull Protocol Security and Secure System Design

bull Data Mining for Network Security Monitoring

bull Adaptive and self managed security systems and honeypots

bull VoIP Security

bull Privacy preserving infrastructures

bull Cloud security and cluster based data mining

bull Distributed and P2P based computing

34 Interdisciplinary Laboratory for Intelligent andAdaptive Systems

Interdisciplinary Lab on Intelligent and Adaptative SystemsAcronym ILIASReference F1R-CSC-LAB-05ILIAHead Prof Dr Christoph Schommer

Scientific Board Pascal Bouvry Raymond Bisdorff Christoph SchommerUlrich Sorger Leon van der TorreGuest professor Dov Gabbay

Domain(s)

bull Algorithmic decision theory

bull Bio-inspired computing

bull Cognitive agentsrobotics

bull Data mining and knowledge discovery

bull Information theory and uncertain inference

bull Knowledge representation and applied logic (eg for security)

34 Interdisciplinary Laboratory for Intelligent and Adaptive Systems 13

bull Normative multi-agent systems

bull Optimization

bull Parallel computing

Objectives ILIAS is a cross-disciplinary research group combining exper-tise from computer science operations research information theory ana-lytic philosophy probability theory discrete math and logic The overar-ching topic in research and teaching is information processing in complexand dynamic environments given limited resources and incomplete or un-certain knowledge The ILIAS research teams investigate the theoreticalfoundations and the algorithmic realization of systems performing complexproblem solving with a high degree of autonomy ie intelligent systems andexploiting learning to deal with opaque and dynamic contexts ie adaptivesystems

Skills

bull Raymond Bisdorff (Decision aid systems)

bull Pascal Bouvry (Optimization and parallel computing)

bull Christoph Schommer (Adaptive data mining and information manage-ment)

bull Ulrich Sorger (Information theory and stochastic inference)

bull Leon van der Torre (Knowledge representation and multi-agent sys-tems)

bull Dov Gabbay (Applied logic and knowledge representation)

14 CSC Laboratories

Chapter 4

Projects and Grants in 2012

This chapter lists the research projects running during 2012together withthe grants obtained (typically to organize scientific conferences via the FNRaccompanying measures AM3) This chapter is structured to summarize

1 European funding project (FP7 ERCIM etc) ndash see sect411

2 FNR CORE projects ndash see sect412

3 UL projects ndash see sect413

4 UL PhD and Postdocs ndash see sect414

5 Other miscellaneous projects (French ANR Grant agreement for re-search development and innovation etc) ndash see sect415

6 Grants obtained (AFR FNR AM3 etc) ndash see sect42

The following tables summarize the projects operated in CSC for the year2012

16 Projects and Grants in 2012

European projectsLab Acronym Title PI Funding Duration

CO

MSY

S

InSatNetRef p27

Investigation of Radio ResourceAllocation and Multiple AccessSchemes for Satellite Networks

NA FNR-ERCIM-Alain Bensous-san(46Ke)

2012-06-01 ndash2013-05-31

BUTLERRef p33

uBiquitous secUre inTernet-of-things with Location and contEx-awaReness

Prof DrThomas Engel

FP7 Euro-pean Commis-sion(456Ke)

2011-10-01 ndash2014-09-30

ceFIMSRef p34

SceFIMS-Coordination of theEuropean Future Internet forumof Member States

Prof DrThomas Engel

EC - FP7UL bud-get(35Ke)

2010-09-01 ndash2013-02-28

IoT6Ref p36

Universal Itegration of the Inter-net of Things through an IPv6-Based Service-oriented Architec-ture enabling heterogeneous com-ponents interoperability

Prof DrThomas Engel

EC-FP7(266Ke)

2012-01-01 ndash2014-12-31

OUTSMARTRef p37

Provisioning of urbanregionalsmart services and business mod-els enabled by the Future Internet

Prof DrThomas Engel

FP7 Euro-pean Commis-sion(257Ke)

2011-04-01 ndash2013-03-31

SECRICOMRef p40

Seamless Communication for Cri-sis Management

Prof DrThomas Engel

EC - FP7 Eu-ropean Commis-sionUL(12469Ke)

2008-09-01 ndash2012-04-30

LA

CS TREsPASS

Ref p46

Technology-supported Risk Esti-mation by Predictive Assessmentof Socio-technical Security

Prof DrSjouke Mauw

EUFP7(9999824e)

2012-11-01 ndash2016-10-31

ILIA

S

ALBRRef p42

Argumentation-Based and Logic-Based Reasoning in Multi-AgentSystems

Dr SrdjanVesic

ERCIM 2011-10-01 ndash2012-09-30

TrustGamesRef p43

Trust Games Achieving Cooper-ation in Multi-Agent Systems

Dr Paolo Tur-rini

FNR-FP7 Co-fund

2011-09-01 ndash2013-08-31

WiSafeCarRef p44

Wireless traffic Safety networkbetween Cars

Prof Dr Pas-cal Bouvry

EUREKA -CELTIC(300000e)

2009-07-01 ndash2012-03-31

17

FNR projectsLab Acronym Title PI Funding Duration

CO

MSY

S

MoveRef p52

Mobility Optimization Using VE-hicular Network Technologies

Prof DrThomas Engel

FNRProject(1127ke)

2011-04-01 ndash2013-03-31

LA

CS

STASTRef p63

Socio-Technical Analysis of Secu-rity and Trust

Prof Dr Pe-ter YA Ryan

FNRCORE(765864e)

2012-05-01 ndash2015-04-30

ATREESRef p64

Attack Trees Prof DrSjouke Mauw

FNR-CORE(299000e)

2009-04-01 ndash2012-03-31

CRYPTOSECRef p66

Cryptography and InformationSecurity in the Real World

Dr Jean-SebastienCoron

FNR-CORE(272000e)

2010-10-01 ndash2013-09-30

SeRTVSRef p67

Secure Reliable and TrustworthyVoting Systems

Prof Dr Pe-ter Ryan

FNR-Core333000e FNR-AFR 216216eIMT Luca130000e Uni-versity of Mel-bourne 60000eUL 268596e

2010-02-01 ndash2013-02-01

LA

SSY

E-TEACCHRef p70

e-Training Education Assess-ment and Communication Centerfor Headache Disorders

Prof DrDenis Zam-punieris

FNR-CORE 2011-05-01 ndash2014-04-30

MaRCoRef p71

Managing Regulatory Compli-ance a Business-Centred Ap-proach

Prof DrPierre Kelsen

FNR-CORE(749Ke)

2010-05-01 ndash2013-04-30

MITERRef p73

Modeling Composing and Test-ing of Security Concerns

Dr JacquesKlein

FNR NA

MOVERERef p75

Model-Driven Validation andVerification of Resilient SoftwareSystems

Prof DrNicolas Guelfi

FNR-CORE(265000e)

2010-05-01 ndash2013-04-30

SETERRef p77

Security TEsting for Resilientsystems

Prof DrNicolas Guelfi

FNR-CORE(43830000e)

2009-05-01 ndash2012-04-30

18 Projects and Grants in 2012

FNR projects (cont)Lab Acronym Title PI Funding Duration

ILIA

S

SndashGAMESRef p54

Security Games Prof DrLeon van derTorre

FNR-CORE(314000e)

2009-04-01 ndash2012-03-31

DYNARGRef p56

The Dynamics of Argumentation Prof DrLeon van derTorre

FNR-INTERCNRS

2009-10-01 ndash2012-09-31

MaRCoRef p58

Management Regulatory Compli-ance

Prof DrPierre Kelsen

FNR-CORE 2010-05-01 ndash2013-04-30

GreenCloudRef p59

Multi-Objective Metaheuristicsfor Energy-Aware Scheduling inCloud Computing Systems

Prof Dr Pas-cal Bouvry

FNR Univer-sity of Luxem-bourg(1088440)

2012-07-01 ndash2015-06-30

GreenITRef p60

EnerGy-efficient REsourcE Al-locatioN in AutonomIc CloudCompuTing

Prof Dr Pas-cal Bouvry

FNR-CORE(432000e)

2010-01-01 ndash2012-12-31

19

AFR projectsLab Acronym Title PI Funding Duration

CO

MSY

S RELGRID2009Ref p128

Investigation of boundary condi-tions for a reliable and efficientcontrol of energy systems formedby highly parallelized off-grid in-verters

Prof DrJuergenSachau

FNR-AFR-PhD 2010-04-01 ndash2013-03-31

SCoPeMeterRef p129

Methods for Measuring and Pre-dicting the Security PerformanceReputation of Public Networks

Prof DrThomas Engel

FNR-AFR RedDog

2011-03-22 ndash2015-03-21

WiNSEOMRef p130

Energy Optimization and Moni-toring in Wireless Mesh SensorNetworks

Prof DrThomas Engel

FNR - AFRPhD(37KeYear)

2010-04-08 ndash2013-04-07

LA

CS

ANTI-MALWARE

Ref p154

A Computational Framework forApprehending Evolving Malwareand Malware Engineers

Dr SimonKramer

FNRndashAFR PostDoc(103 236 e)

2011-01-01 ndash2012-12-31

EPRIV-MAARef p155

A Formal Approach to EnforcedPrivacy Modelling Analysis andApplications

Prof DrSjouke Mauw

FNRndashAFR(105222e)

2009-12-01 ndash2013-11-30

GMASecRef p156

Games for Modelling and Analy-sis of Security

Prof DrSjouke Mauw

FNRndashAFR(140000e)

2009-11-01 ndash2013-10-31

SADTRef p157

Security Analysis ThroughAttackndashDefense Trees

Prof DrSjouke Mauw

FNR-AFRPhD(141968e)

2010-01-01 ndash2013-12-31

SECLOCRef p158

Secure and Private LocationProofs Architecture and Designfor Location-Based Services

Prof DrSjouke Mauw

FNR-AFRPhD(109137e)

2010-08-01 ndash2013-07-31

SHARCRef p160

Analysis of the SHA-3 RemainingCandidates

Prof Dr AlexBiryukov

FNR-AFR Post-doc(102620e)

2010-10-15 ndash2012-10-14

20 Projects and Grants in 2012

AFR projects (cont)Lab Acronym Title PI Funding Duration

LA

SSY

DYNOSTRef p161

Dynamic and Composite Service-Oriented Architecture SecurityTesting

Prof DrYves Le Traon

NA 2010-10-01 ndash2013-09-30

PeerunitRef p162

A Testing Framework for Large-Scale Applications

Prof DrYves Le Traon

NA 2011-01-15 ndash2014-01-15

SPEMRef p163

Selected Problems in ExecutableModeling

Prof DrPierre Kelsen

FNR-AFR PhD 2009-11-15 ndash2012-11-15

21

AFR projects (cont)Lab Acronym Title PI Funding Duration

ILIA

S

IELTRef p132

Information Extraction fromLegislative Texts

Prof DrLeon van derTorre

FNR AFR PHD 2012-03-01

LOSECRef p133

Security Logics Prof DrLeon van derTorre

FNR-AFR 2009-09-01 ndash2012-09-01

ProCRobRef p134

Programming Cognitive Robots Prof DrLeon van derTorre

FNR-AFR 2011-05-20 ndash2014-05-20

TABNRef p135

Trust in argumentation-based ne-gotiation

Dr SrdjanVesic

FNR-AFR-Postdoc

2012-10-01 ndash2013-01-14

LAAMIRef p136

Logical Approaches for Analyz-ing Market Irrationality compu-tational aspects

Prof DrLeon van derTorre

FNR-AFR(117840e)

2011-04-01 ndash2013-03-31

Green EECRef p138

Green Energy-Efficient Comput-ing

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2010-04-01 ndash2012-03-31

CIDCRef p139

Confidentiality Integrity issuesin distributed computations

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2010-01-01 ndash2013-12-31

REMORef p141

Reliability of Multi-ObjectiveOptimization techniques

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2010-10-01 ndash2012-09-30

LUXCommTISRef p143

Community-based Vehicular Net-work for Traffic Information inLuxembourg

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2011-09-01 ndash2014-08-31

HERARef p144

Holistic autonomic Energy andthermal aware Resource Alloca-tion in cloud computing

Prof Dr Pas-cal Bouvry

FNR - AFRPhD(37288e)

2011-09-15 ndash2014-09-14

INTERCOMRef p146

Energy-Efficient Networking inAutonomic Cloud Computing

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2011-06-01 ndash2013-05-31

DeTeMOCGAsRef p147

Decision-theoretic fine tuning ofmulti-objective co-evolutionaryalgorithms

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2011-09-15 ndash2014-09-14

EPOCRef p149

Energy-Performance Optimiza-tion of the Cloud

Prof Dr Pas-cal Bouvry

FNR - AFRPhD(10812558e)

2010-09-01 ndash2013-08-31

TIGRISRef p150

Risk Prediction Framework forInterdependent Systems usingGraph Theory

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2009-10-15 ndash2012-10-14

DYMORef p151

Dynamic MixVoip Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2012-11-01 ndash2015-10-31

SaPRORef p152

Satellite Payload ReconfigurationOptimization

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2010-11-15 ndash2013-11-14

22 Projects and Grants in 2012

University of Luxembourg Internal projectLab Acronym Title PI Funding Duration

LA

CS

DEFAULT-PRIV

Ref p85

Privacy by Default Prof DrSjouke Mauw

UL(192853e) 2012-09-01 ndash2014-08-31

EPRIVRef p87

A Formal Approach to EnforcedPrivacy in e-Services

Prof DrSjouke Mauw

UL(254955e) 2009-05-01 ndash2012-04-30

LA

SSY

BLASTRef p88

Better e-Learning AssignmentsSystem Technology

Prof DrDenis Zam-punieris

UL(165000e) 2010-09-01 ndash2012-08-31

COMPEXRef p89

Model Composition for Exe-cutable Modeling

Prof DrPierre Kelsen

UL(173Ke) 2011-10-01 ndash2013-09-30

DYNOSOARRef p90

Dynamic and Composite Service-Oriented Architecture SecurityTesting

Prof DrYves Le Traon

UL NA

ILIA

S

AASTMRef p82

Advanced Argumentation Tech-niques for Trust Management

Prof DrLeon van derTorre

UL 2008-05-01 ndash2012-04-30

LINMASRef p80

Logics Integrated for NormativeMulti-Agent Systems

Prof DrLeon van derTorre

UL 2011-03-01 ndash2013-02-28

DPMHPCRef p83

A discrete approach to modelprocessing of hard metal includ-ing high performance computing

Prof DrBernhardPeters

UL NA

EvoPerfRef p84

Evolutionary Computing andPerformance Guarantees

Prof Dr Pas-cal Bouvry

UL(370ke) 2011-09-01 ndash2013-12-31

23

UL PhD PostDocLab Acronym Title PI Funding Duration

CO

MSY

S

MOVERef p99

Mobility Optimization usingVehicular network technologies(MOVE)

Prof DrThomas Engel

CORE-MOVE(37KYear)

2011-11-15 ndash2014-11-14

Honeypotand MalwareAnalysis

Ref p96

Honeypot and Malware Analysis Prof DrThomas Engel

AFR-PPP(37Kyear)

2011-10-15 ndash2014-10-14

NARef p97

Routing and mobility manage-ment in vehicular networks

Prof DrThomas Engel

FNR - COREMOVE(37Kyear)

2011-09-01 ndash2014-08-31

SMO-MLSRef p98

Securing Mission Operations us-ing Multi-Level Security

Prof DrThomas Engel

European SpaceAgency(48800eUL - 37077 e)

2010-11-01 ndash2014-10-30

NARef p100

Service Dependency andAnomaly Detection

Prof DrThomas Engel

Funded on FP7EFIPSANSproject until31122010 -NetLab

2008-11-01 ndash2012-10-31

LA

SSY

NARef p113

Smartphone Malware detectionand mitigation with Static codeAnalysis

Prof DrYves Le Traon

NA(NA) 2011-10-15 ndash2014-09-30

ACARef p114

Access Control ArchitecturesFrom Multi-objective Require-ments to Deployment

Prof DrYves Le Traon

UL 2011-02-01 ndash2014-01-31

24 Projects and Grants in 2012

UL PhD PostDoc (cont)Lab Acronym Title PI Funding Duration

ILIA

S

ICRRef p100

Individual and Collective Rea-soning

Prof DrLeon van derTorre

UL-PHD 2008-03-12 ndash2012-03-12

NARef p102

Understanding Financial Topicsand their Lifetime in TextualNews by the Content Aging The-ory

Prof DrChristophSchommer

FNRCORE(500000)

2012-06-01 ndash2015-05-31

SPACERef p103

Smart Predictive Algorithms forSpacecraft Anomalies

NA SnT 2011-07-09 ndash2017-07-08

INACSRef p104

An Incremental System to man-age Conversational Streams

Prof DrChristophSchommer

UL 2009-02-01 ndash2013-01-14

FERESRef p105

Feature Extraction and Repre-sentation for Economic Surveys

Prof DrChristophSchommer

Internal Doc-toral Posi-tion(InternalDoctoral Posi-tion)

2011-04-01 ndash2014-03-31

NARef p106

Sentiment Classification in Fi-nancial Texts

Prof DrChristophSchommer

FNRCORE(500000)

2012-06-01 ndash2015-05-31

SPARCRef p108

Artificial Conversational Com-panions

Prof DrChristophSchommer

NA 2011-04-01 ndash2014-03-31

ERACCRef p109

Energy-efficient resource alloca-tion in autonomic cloud comput-ing

Prof Dr Pas-cal Bouvry

UL 2010-10-01 ndash2013-09-30

IICRef p110

Integrity Issues on the Cloud Prof Dr Pas-cal Bouvry

UL 2011-01-16 ndash2013-01-15

NARef p112

Energy-Efficient InformationDissemination in MANETs

Prof Dr Pas-cal Bouvry

UL 2009-09-15 ndash2012-09-14

25

Other misc projectsLab Acronym Title PI Funding Duration

CO

MSY

S BCEERef p115

Enterprise security for the bank-ing and financial sector

Prof DrThomas Engel

BCEE(204Ke) 2011-04-01 ndash2012-03-31

EPTVRef p117

EPT Vehicular Networks Prof DrThomas Engel

EPT(2 298 Ke) 2010-01-01 ndash2014-12-31

Pil to SPELLRef p118

PIL to SPELL conversion Prof DrThomas Engel

SES-ASTRA(Notapplicable)

2011-01-28 ndash2015-01-27

LA

CS LASP

Ref p120

Developing a Prototype of Loca-tion Assurance Service Provider

Prof DrSjouke Mauw

ESA -SnT(160000e(ESA) )

2010-12-08 ndash2012-12-07

LA

SSY

SPLITRef p121

Combine Software Product Lineand Aspect-Oriented SoftwareDevelopment

Prof DrNicolas Guelfi

ULFNR(41000e)

2009-10-01 ndash2012-09-30

ILIA

S AlgoDecRef p119

INTERCNRSGDRI1102 Al-gorithmic Decision Theory

Prof Dr Ray-mond Bisdorff

FNR UL(11 000e)

2011-01-01 ndash2014-12-31

26 Projects and Grants in 2012

Accompanying measures (AM)Lab Acronym Title PI Funding Duration

ILIA

S SandpileRef p165

Building the Skeleton of a SOscheduler

Prof Dr Pas-cal Bouvry

FNR -AM2c(634900)

2012-03-01 ndash2012-05-01

41 Research projects 27

41 Research projects

411 European funding projects

Investigation of Radio Resource Allocation and Multiple AccessSchemes for Satellite NetworksAcronym InSatNetReference NAPI NAFunding FNR-ERCIM-Alain BensoussanBudget 46KeBudget UL NADuration 2012-06-01 ndash 2013-05-31

Members M Butt B Ottersten

Domain(s) NA

Partner(s) NA

Description The demands for data rate are increasing with the emergenceof new applications On the other hand radio resources are becoming scarcedue to dedicated frequency allocation of the spectrum to the operators Itis becoming increasingly challenging to meet the rate and coverage require-ments for the users Satellite systems have the potential to provide largescale coverage and meet throughput requirements for broadband access Inthis project we plan to study the radio resource allocation and multipleaccess schemes for satellite networks We investigate the radio resource al-location problems specifically for the cognitive architecture of satellite net-works and evaluate energy-performance trade-offs for different performanceparameters like delay and loss requirements for the primary and secondaryusers in a cognitive satellite network

Results NA

Publications NA

28 Projects and Grants in 2012

Cognitive Radio and Networking for Cooperative Coexistenceof Heterogeneous wireless NetworksAcronym Cognitive RadioReference NAPI Prof Dr Bjorn OtterstenFunding COST Action IC0902Budget NABudget UL NADuration 2009-07-30 ndash 2013-12-10

Members B Ottersten

Domain(s) Cognitive Radio

Partner(s) Belgium Bosnia and Herzegovinia Croatia Cyprus Czech Re-public Denmark Finland Former Yugoslav Republic of Macedonia FranceGermany Greece Ireland Israel Italy Latvia Luxembourg Norway PolandPortugal Romania Serbia Slovenia Spain Sweden Turkey United King-dom USA China Canada Australia ISPRA (It)

Description NA

Results NA

Publications NA

Cooperative Radio Communications for Green Smart Environ-mentsAcronym Cooperative RadioReference NAPI Prof Dr Bjorn OtterstenFunding Cost Action IC2004Budget NABudget UL NADuration 2011-05-24 ndash 2015-05-18

Members B Ottersten

Domain(s) NA

Partner(s) Austria Belgium Bulgaria Cyprus Czech Republic Den-mark Finland Former Yugoslav Republic of Macedonia France GermanyGreece Ireland Israel Italy Netherlands Norway Poland Portugal Ro-mania Serbia Slovakia Spain Sweden Switzerland UK

41 Research projects 29

Description NA

Results NA

Publications NA

MIMO Hardware DemonstratorAcronym MIMO-HardwareReference 12R-DIR-PAU-10MIMOPI NAFunding ESA -ESTEC-ITTA01-609909NLJKBudget 1199KeBudget UL NADuration 2011-01-01 ndash 2012-03-30

Members B Ottersten D Arapoglou B Shankar S Chatzinotas

Domain(s) Satellite Based Alarm System

Partner(s)

bull Elektrobit Wireless Communications Ltb (Finland)

bull SES Astra Techcom (Luxembourg)

bull Univ of Oulu (Finland)

bull VTT (Finland)

bull Univ of Turku (Finland)

Description development of practical methods utilizing MIMO techniquesfor DVB-SH AB scenarios to improve the air interface performance com-pared to current standard The practical aim of the proposal is to specifyand develop a MIMO HW demonstrator that will be used to carry out prac-tical performance evaluation and demonstrations The project is dividedinto 2 phases The 1st phase provides an overview of state-ofthe- art MIMOtechniques and defines a set of MIMO scenarios based on DVB-SH includingapplicable radio channel models In addition a computer simulation modelwill be developed to evaluate the defined scenarios and the system architec-ture design for implementation of the developed MIMO-DVB-SH waveformwill be carried out During the 2nd phase the specified system will be im-plemented utilizing an existing HW test-bed the RACE-SDR The test-bedwill be used to perform demonstrations and detailed performance evaluationin laboratory environment As a conclusion improvements to the existing

30 Projects and Grants in 2012

standard andor implementation guidelines will be proposed to DVB-forumand ETSI standardization (EB is a member in both organizations)

Results NA

Publications NA

Propagation tools and data for integrate TelecommunicationNavigation and earth Observation systemsAcronym Propagation toolsReference NAPI Prof Dr Bjorn OtterstenFunding COST Action IC0802Budget NABudget UL NADuration 2009-03-03 ndash 2012-11-18

Members B Ottersten

Domain(s) NA

Partner(s) Austria Belgium Bulgaria Cyprus Czech Republic Den-mark Finland France Germany Greece Hungary Israel Italy NorwayPoland Portugal Serbia Slovakia Spain Sweden Switzerland UK BrazilCanada Netherlands India Pakistan USA

Description NA

Results NA

Publications NA

SATellite Network of EXperts - Call off-Order COO2Acronym SatNEx IIIReference NAPI Prof Dr Bjorn OtterstenFunding ESA - gtTRP ARTES1 ARTES5Budget NABudget UL NADuration 2011-03-23

Members B Ottersten

41 Research projects 31

Domain(s) NA

Partner(s) DLR (Germany) Univ of Surrey (UK) Univ of Bologna (It)Aristotle Univ of Thessaloniki (Greece) Univ of Bradford (UK) ConsorzoNazionale Interuniv Per le Telecomunicazioni (It) Italian National Re-search Council (It) Centre Tecnologic de Telecomunicacions de Catalunya(Spain) National Observatory of Athens (Greece) Office National drsquoEtudeset de Recherches Aerospatiales (Fr) Univ of Salzburg (Austria) TeSA As-sociation (Fr) Graz Univ of Technology (Austria) Univ Autonoma deBarcelona (Spain) The Univ Court of the Univ of Aberdeen (UK) UnivDegli Studi di Roma rsquoTor Vergatarsquo (It) Univ de Vigo (Spain) Fraunhofer-Gesellschaft Munchen (Germany) Institute of Computer and Communica-tions Systems (Greece)

Description NA

Results NA

Publications NA

Potential business for an advanced spread spectrum measure-ment system for satellite testingAcronym Spread spectrum satellite commReference I2R-DIR-PAU-11LLV8PI Prof Dr Bjorn OtterstenFunding ESABudget 97KeBudget UL NADuration 2010-12-08 ndash 2011-12-07

Members B Ottersten S Chatzinotas

Domain(s) Satellite spectrum

Partner(s)

bull SES Astra TechCom SA

bull EmTroniX Sarl

Description The study aims at establishing the requirements and anal-yse the market situation to evaluate the business perspectives for a spreadspectrum measurement system or service together with potential customerssuch as satellite operators and satellite manufactures The detailed under-standing of the customers requirements and the kind of drivers for them for

32 Projects and Grants in 2012

buying such a measurement product or service is a key indicator for subse-quent activities Based on these outcomes business scenarios and a businesscases are elaborated and a roadmap for a sustainable Luxembourg exploita-tion in for instance service provisioning and test equipment manufacturingis prepared In addition study activities will lead to an outline proposalready to be submitted to a funding agency In detail the following pointswill be investigated

bull Analyse and quantify the market for spread spectrum measurementsystems and services

bull Identify potential customers capture their requirements

bull Elaborate system concepts and develop and validate system and ser-vice design with potential customers

bull Identify and critically assess competing solutions

bull Establish a business model understand the value chain identify andquantify the opportunity for Luxembourg industry

bull Prepare an outline proposal and identify opportunities for funding

bull Identify state-of-the art in this and similar domains and evaluate tech-niques subject to patent filling

As this study is conducted preliminary to learn about market situation andcustomer needs there are also some Non-objectives

bull Provision of detailed technical solution

bull Development or technical validation activities

bull Definition of the solution prior to the understanding of the market

Results NA

Publications NA

41 Research projects 33

uBiquitous secUre inTernet-of-things with Location andcontEx-awaRenessAcronym BUTLERReference I2R-NET-PEU-11BTLRPI Prof Dr Thomas EngelFunding FP7 European CommissionBudget 456KeBudget UL NADuration 2011-10-01 ndash 2014-09-30

Members T Engel R State T Cholez F Melakessou

Domain(s) internet of things context aware services smart devices net-work security integrated architecture and platform

Partner(s)

bull Inno AG Germany

bull Ericsson Spain

bull Telecom Italia Italy

bull Gemalto SA France

bull CEA France

bull Oulun Yliopisto Finland

bull FBConsulting SARL Luxembourg

bull ISMB Italy

bull Hochschule Luzern Switzerland

bull Swisscom Switzerland

bull SMTMicroelectronics Italy

bull Utrema France

bull University of Luxembourg

bull Universiteit Leuven Belgium

bull Cascard OY Finland

bull TST Spain

bull Alcatel Lucent Bell Labs France

34 Projects and Grants in 2012

bull Jacobs University Germany

Description Recent ICT advances are bringing to reality a world wheresensors actuators and smart portable devices are interconnected into anInternet-of-Things (IoT) ecosystem reaching 50 Billion devices by 2015

The IoT major challenges are from a systemic viewpoint smart resourcemanagement and digital security and from a userservice perspective thepervasiveness (uniformity of performance anytime and anywhere) and aware-ness (inversely proportional to the degree of knowledge required from users)BUTLER will be the first European project to emphasise pervasivenesscontext-awareness and security for IoT Through a consortium of leadingIndustrial Corporate RD and Academic partners with extensive and com-plementary know-how BUTLER will integrate current and develop newtechnologies to form a bundle of applications platform features and servicesthat will bring IoT to life

Results UL already contributed to the definition of the use cases thatpresent our vision of smart-life in the topics of smart city and smart trans-portation We also contributed to the definition of the requirements for theBUTLER platform (WP1- D11)

Publications None yet

SceFIMS-Coordination of the European Future Internet forumof Member StatesAcronym ceFIMSReference IR-DIR-PEU-10CEFIPI Prof Dr Thomas EngelFunding EC - FP7

UL budgetBudget 35KeBudget UL NADuration 2010-09-01 ndash 2013-02-28

Members T Engel L Ladid

Domain(s) IPv6 networking support action

Partner(s)

bull Waterford Institute of Technology Ireland

bull Nederlandse Organisatie voor Wetenschappelijk Onderzoek Nether-lands

41 Research projects 35

bull Nemzeti Kutatasi Es Technologiai Hivatal Hungary

bull UMIC - Agencia Para A Sociedade Do Conhecimento Portugal

bull Asociacion De Empresas De Electronica Tecnologias De La Informa-cion Y Telecomunicaciones De Espana Spain

Description The ceFIMS project addresses the problem of the fragmenta-tion of ICT research between European Member States (MS) ceFIMS willleverage its knowledge of Member State-funded research to gain consensusabout problems and approaches at the Member State level ceFIMS willbuild on that consensus to promote alignment both across Member Statesand also between Member State and EC-funded ICT research This willconsequently unite better the European ICT research community and placeEuropean Future Internet (FI) research in a stronger position

ceFIMS will produce a research roadmap to maximise synergies between EUand MS investments in FI research establishing the basis for an ERA-NET+on the Future Internet An ERA-NET+ will provide the means to developthe EUrsquos strong research position Allied to this a Public-Private Partner-ship (PPP) will provide the means to transfer new knowledge into innovativeproducts with economic and social benefits for EU citizens ceFIMS willincrease awareness among Member States of the role that they can play ina Europe-wide FI PPP and how Member State initiatives and the PPP canbe aligned to the maximum extent possible

ceFIMS-Coordination of the European Future Internet forum of MemberStates-responds to Call 5 from the European Commission for European ex-cellence in Trustworthy ICT In particular the Science and Technology ob-jectives of ceFIMS are highly relevant to Objective ICT-200711 The Net-work of the Future

Results NA

Publications NA

36 Projects and Grants in 2012

Universal Itegration of the Internet of Things through an IPv6-Based Service-oriented Architecture enabling heterogeneouscomponents interoperabilityAcronym IoT6Reference I2R-NET-PEU-11IOT6PI Prof Dr Thomas EngelFunding EC- FP7Budget 266KeBudget UL NADuration 2012-01-01 ndash 2014-12-31

Members T Engel L Ladid

Domain(s) ICT

Partner(s)

bull Mandat international alias fondation pour la cooperation internationale(mi) rdquothe coordinator of the research project iot6

bull Ericsson doo for telecommunications

bull Runmyprocess sas

bull University College London

bull Universidad de murcia

bull Technische Universitaet Wien

bull Haute Ecole Specialisee de Suisse Occidentale

bull Korea Advanced Institute of Science and Technology

Description The UIoT6 project aims at exploiting the potential of IPv6and related standards (6LoWPAN CORE COAP etc) to leverage cur-rent shortcomings of the Internet of Things so that a universally integratedInternet of Things can evolve Its main challenges and objectives are to re-search design and develop an IPv6-based Service Oriented Architecture toachieve multi-protocol integration of heterogenous rdquocommunication thingsrdquoand to research and realize intelligence distribution and smart routing fea-tures within Furthermore transparent and borderless interactions withcloud computing services and applications EPC information service envi-ronments and mobile networks are of main interest The main outcomeof UIoT6 is a well-defined open and distributed IPv6-based Service Ori-ented Architecture that enables interoperability mobility cloud computing

41 Research projects 37

and intelligence distribution among heterogeneous smart things componentsapplications and services

Results NA

Publications NA

Provisioning of urbanregional smart services and businessmodels enabled by the Future InternetAcronym OUTSMARTReference I2R-NET-PEU-11OSMTPI Prof Dr Thomas EngelFunding FP7 European CommissionBudget 257KeBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members T Engel J Francois A Panchenko L Ladid

Domain(s) Internet of Things (IoT) utilities environment ecosystems

Partner(s) Name of the organisations participating in the project (not thepersons) Use small letters list using bullet points specify the country ifnot Luxembourg based

bull France Telecom FR

bull Telefonica Investigacion y Desarrollo SA Unipersonal SP

bull Alcatel-Lucent IT

bull Ericsson RS

bull Engineering Ingegneria Informatica SpA IT

bull ATOS Origin SP

bull Coronis SAS an ELSTER Group Company FR

bull Worldsensing ES

bull CEA-LETI FR

bull University of Luxembourg LU

bull Alexandra Institute DK

bull AMPLEX DK

38 Projects and Grants in 2012

bull Aarhus VAND DK

bull University of Surrey GB

bull AMEY PLC GB

bull FERROVIAL Centro de Innovacion de Infraestructuras InteligentesES

bull Create-NET (Trento RISE) IT

bull Azienda Consorziale Servizi Municipalizzati SpA IT

bull Dolomiti Energia IT

bull Universidad de Cantabria ES

bull Banco de Santander ES

bull Municipality of Santander ES

bull EMCANTA ES

bull EON ESPANA ES

bull TTI Norte ES

bull Fraunhofer-Gesellschaft zur Foerderung der Angewandten Forschungev DE

bull Berliner Stadtreinigungsbetriebe DE

Description The goal of OUTSMART is to contribute to the Future In-ternet (FI) by aiming at the development of five innovation eco-systemsThese eco-systems facilitate the creation of a large variety of pilot servicesand technologies that contribute to optimised supply and access to servicesand resources in urban areas This will contribute to more sustainable utilityprovision and through increased efficiency lower strain on resources and onthe environment Reaching this goal requires the whole value chain namelycity authorities utilities operators ICT companies as well as knowledge in-stitutions in order to have an industry driven approach when developingadvanced services and technologies OUTSMART services and technolo-gies will be based on an open and standardised infrastructure as envisionedby the FI Private Public Partnership (FI PPP) and provided by a serviceframework designed to facilitate provisioning development and access Tothis extend OUTSMART will (1) deliver a set of detailed functional andnon-functional requirements for an FI enabler platform and correspondingbusiness framework able to support the above described eco-systems based

41 Research projects 39

on a deep analysis of the different domain specific use cases in the utility andenvironment application domain (2) provide a specification of the domainspecific enabler functionality with corresponding service interfaces compat-ible and aligned with Core Platform components to be specified alongsidethis project effort (3) provide a realisation of prototypes of domain specificfunctionality for the envisioned eco-system according to the previous spec-ification and a validation thereof in early field trials in the envisioned usecases (4) deliver a business framework specification which serves as blueprint for the foreseen local eco-systems able to provide their sustainabilitybeyond the PPP funding lifetime by creating favourable conditions for localinvestment and innovation and (5) deliver a detailed plan for pilot servicesin the envisioned local eco-systems which act as initial light house showcases for Europe in the utility and environment applications domain

Results The key results of our activity in OUTSMART are

bull Definition and refinement of requirements in particular in terms ofsecurity and privacy

bull Large scale security in distributed environments by developing newmethods for autonomic authentication as well as cloud-computing basedsolutions for attack detection

bull Privacy protection in large scale networks by proposing a novel ap-proach to guarantee the privacy of a service provider and by evaluatingthe degree of protection over encrypted communication

bull Traffic analysis in encrypted network streams We showed that undercertain circumstances cryptography alone is not enough to hide thecontent of communication We also studied countermeasures how tomitigate this attack

bull New methods of path selection that allow performance-improved onionrouting We evaluate the proposed methods in the public networksand present a practical approach to empirically analyze the strengthof anonymity certain methods of path selection provide in comparisonto each other

The 2nd and 3rd items bring the first solutions to the requirements ap-pearing during the first stage These solutions are designed for the FutureInternet context where OUTSMART fits ie with large distributed andheterogeneous environments

This is a long list that enumerates the results obtained until now in LATEXformat

40 Projects and Grants in 2012

bull Fuzzing approaches for IPv6 protocols

bull Game theoretical modeling for fuzzing

bull Flow based monitoring and data mining approaches for large scale flowmonitoring

The key resukts from this project are related to the definition of a threatmodel for autonomic IPv6 networks and its instantiation in the specific caseof GANA architectural paradigm

The major outcomes from this project included a new paradigm for adaptivehoneypots that leverage game theory and reinforcement learning as underly-ing conceptual building blocks for smarter honeypots We have implementedand operated such honeypot and the major publications from this projectare one journal publications accepted for 2011 and another one for [356]

Publications [268 265 270 269] Deliverables D22

[357 359 358 360]

Seamless Communication for Crisis ManagementAcronym SECRICOMReference F1R-CSC-PEU-08SECRPI Prof Dr Thomas EngelFunding EC - FP7 European Commission

ULBudget 12469KeBudget UL NADuration 2008-09-01 ndash 2012-04-30

Members Thomas Engel Aurel Machalek

Domain(s) Emergency services critical infrastructure

Partner(s)

bull QinetiQ Ltd United Kingdom

bull Ardaco as Slovakia

bull Bumar Ltd Poland

bull NEXTEL SA Spain

bull Infineon Technologies AG Germany

41 Research projects 41

bull Institute of Informatics Slovak Academy of Sciences Slovakia

bull Graz University of Technology Austria

bull Smartrends sro Slovakia

bull ITTI Sp z oo Poland

bull British Association of Public Safety Communication Officers UnitedKingdom

bull CEA LETI France

bull Hitachi Europe SAS France

Description SECRICOM is proposed as a collaborative research projectaiming at development of a reference security platform for EU crisis manage-ment operations with two essential ambitions (A) Solve or mitigate prob-lems of contemporary crisis communication infrastructures (Tetra GSMCitizen Band IP) such as poor interoperability of specialized communica-tion means vulnerability against tapping and misuse lack of possibilitiesto recover from failures inability to use alternative data carrier and highdeployment and operational costs (B) Add new smart functions to existingservices which will make the communication more effective and helpful forusers Smart functions will be provided by distributed IT systems based onan agentsrsquo infrastructure Achieving these two project ambitions will allowcreating a pervasive and trusted communication infrastructure fulfilling re-quirements of crisis management users and ready for immediate application

More information httpwwwsecricomeu

Results University of Luxembourg successfully organised and presenteddeveloped crises communication technology of SECRICOM project duringthe NATO CPC seminar and demonstration in Slovakia We did the demon-stration together with Ciwil Protection of Luxembourg The project SE-CRICOM is after first review period marked as rdquoExcellent progress (theproject has fully achieved its objectives and technical goals for the periodor has even exceeded expectations)rdquo

Publications NA

42 Projects and Grants in 2012

Argumentation-Based and Logic-Based Reasoning in Multi-Agent SystemsAcronym ALBRReference F1R-CSC-LAB-05ILIAPI Dr Srdjan VesicFunding ERCIMBudget NABudget UL NADuration 2011-10-01 ndash 2012-09-30

Members Srdjan Vesic

Domain(s) Argumentation Reasoning Logic Multi-Agent Systems

Partner(s) NA

Description The goal of the fellowship is to obtain a better understand-ing of defeasible reasoning about information items in multi-agent contextsand to propose and evaluate specific logic-based approaches for this pur-pose First the link between existing logic-based and argumentation-basedreasoning formalisms is to be studied Then we will develop logics able tosupport deep reasoning about information quality and information handlingbased on incomplete and uncertain background knowledge This is relevantfor modelling information gathering and aggregation eg in e-science or inlegal procedures

Results My main research results during the ERCIM fellowship (Oct 2011to Sept 2012) can be resumed as follows

I studied the link between argumentation-based and non argumentation-based reasoning By argumentation-based approach we refer to a reasoningframework based on construction and evaluation of arguments This line ofresearch is important since it helps to better understand the result obtainedby an argumentation-based approach and to explore its expressive power[109 108]

I participated in the development of an on-line tool for argumentation-baseddecision making The software is still in the beta-testing phase but it canbe accessed online at thesynergyorg [107]

I also worked on a logical language to describe and reason about the beliefsof agents in a multi-agent system where agents have different knowledgemore particularly where every agent is aware of a different set of arguments[114]

Publications [107] [114] [108] [109]

41 Research projects 43

Trust Games Achieving Cooperation in Multi-Agent SystemsAcronym TrustGamesReference 1196394PI Dr Paolo TurriniFunding FNR-FP7 CofundBudget NABudget UL NADuration 2011-09-01 ndash 2013-08-31

Members Paolo Turrini

Domain(s) Game Theory Trust Theory Cooperative Behaviour

Partner(s) NA

Description TrustGames starts from the hypothesis that trust is a socialphenomenon that takes place among decision makers endowed with beliefsand goals and it is seen as a prerequisite for collaborative work (Hardin2004) (Gambetta 2008) (Castelfranchi-Falcone 2010) Up to now the treat-ment of trust in MAS is limited to specific accounts stemming from cog-nitive science (Castelfranchi-Falcone 2010) or from the normative systemsapproach (van der Torre 2010) with no unified formal theory TrustGamesis devoted to an integration of the cognitive and normative accounts of trustwithin the theory of games the discipline that formally models interactivedecision making In particular the fundamental connection between trustand related notions such as dependence and agreements between the stake-holders is intuitively clear but formally not well understood Recent contri-butions (Grossi-Turrini 2010) have shown that dependence and agreementscan be fully incorporated within the theory of games but it abstracts awayfrom cognitive and normative ingredients of trust Concretely TrustGameswill extend the model in (Grossi-Turrini 2010) with the cognitive features of(Castelfranchi-Falcone 2010) and the normative features in (van der Torre2010) in order to model trust in games Thanks to this integration formaltools such as logics to reason about games can be adopted to check whetherdesirable properties are achievable (or undesirable properties are avoidable)in classes of games with trust

Results

The study of cooperation in games The TrustGames project is centeredof the idea of using trust to achieving cooperation in multi-agentsytems Thereby understanding how cooperation is obtained from non-cooperative interaction is of fundamental importance The study has

44 Projects and Grants in 2012

extended and generalized work already carried out during my PhDstudies characterizing the cooperative structures that can arise fromnon-cooperative games

Evaluation in games The TrustGames project is based on a notion oftrust as evaluation of selection of fellow players in interaction TherebyI have directed part of our research effort to the study what it meansfor players to have an evaluation of what it can happen Normallyin games players are assumed to have knowledge of the game thatthey are playing and of the preferences and the possibilities of theiropponents Instead I have shown that when players have a boundedrationality the role of evaluation is crucial

Agreements and norms in games The TrustGames project is also meantto lay a connection between the theory of reciprocity and normativemulti-agent systems in other words to study the normative aspectsof reciprocating someone else trust The last part of this year re-search effort has been devoted to this Building up on the notionof dependence relations studied by Grossi and Turrini on which theTrustGames is based I have constructed a deontic language that couldexpress standard deontic notions (such as obligations prohibitions andpermissions) interpreted in terms of reciprocity

The project results have fully met the original proposal expectations How-ever several novelties have already crop up such as the importance of playersbounded rationality (what I have called ldquoshort sightrdquo) as a precondition fortrust in games

Publications [133] [47] [46] [112]

Wireless traffic Safety network between CarsAcronym WiSafeCarReference NAPI Prof Dr Pascal BouvryFunding EUREKA - CELTICBudget 300000eBudget UL NADuration 2009-07-01 ndash 2012-03-31

Members Pascal Bouvry Gregoire Danoy Yoann Pigne Guillaume-JeanHerbiet Patricia Ruiz

41 Research projects 45

Domain(s) Vehicular Ad Hoc Networks Secure Communications TrafficManagement Accident Warning

Partner(s)

bull Mobisoft Finland

bull Finnish Meteorological Institute Finland

bull VTT Finland

bull Taipale Telematics Finland

bull Sunit Finland

bull Ubridge South Korea

bull CRP Henri Tudor

bull Ubistream Luxembourg

Description WiSafeCar aims to develop an effective service platform andadvanced intelligent wireless traffic safety network between cars and infras-tructure with possibility to exploit vehicle based sensor and observationdata in order to generate secure and reliable intelligent real-time servicesand service platform for vehicles

Results Several works have been pursued in the frame of the developmentof a realistic mobility model of vehicles in Luxembourg VehILux Theparameters of VehILux have been optimized using different metaheuristicsin order to further improve its accuracy and results have been published in[174] In [316] a complementary optimization of VehILux has been proposedin which an iterative algorithm is used ie Gawronrsquos algortihm to betterspread the traffic flow in the road network

The WiSafeCar has ended in March 2012 The final project review has beenheld in Tampere Finland Demonstration of all projects achievements in-cluding the Luxembourgian simulator has been conducted by the consor-tium during a large event covered by Finnish press (newspaper TV)

Publications NA

46 Projects and Grants in 2012

Technology-supported Risk Estimation by Predictive Assess-ment of Socio-technical SecurityAcronym TREsPASSReference FP7 Grant Agreement No 318003PI Prof Dr Sjouke MauwFunding EU FP7Budget 9999824eBudget UL 561320eDuration 2012-11-01 ndash 2016-10-31

Members Sjouke Mauw Barbara Kordy Peter YA Ryan Gabriele Lenzini

Domain(s) Trustworthy ICT

Partner(s) UT the Netherlands DTU Denmark CYB Estonia GMVPPortugal GMVS Spain RHUL UK itrust Luxembourg GUF GermanyIBM Switzerland TUD the Netherlands TUHH Germany AAU DenmarkCHYP UK BD the Netherlands Deloite the Netherlands LUST the Nether-lands

Description Information security threats to organizations have changedcompletely over the last decade due to the complexity and dynamic natureof infrastructures and attacks Successful attacks cost society billions ayear impacting vital services and the economy Examples include StuxNetusing infected USB sticks to sabotage nuclear plants and the DigiNotarattack using fake certificates to spy on website traffic New attacks cleverlyexploit multiple organizational vulnerabilities involving physical securityand human behavior Defenders need to make rapid decisions regardingwhich attacks to block as both infrastructure and attacker knowledge areconstantly evolving Current risk management methods provide descriptivetools for assessing threats by systematic brainstorming In todayrsquos dynamicattack landscape however this process is too slow and exceeds the limits ofhuman imaginative capability Emerging security risks demand an extensionof established methods with an analytical approach to predict prioritizeand prevent complex attacks The TREsPASS project develops quantitativeand organization- specific means to achieve this in complex socio-technicalenvironments The iterative tool-supported framework

bull Represents the structure of complex organizations as socio-technicalsecurity models integrating social and technical viewpoints

bull Predicts socio-technical attacks prioritizes them based on their riskand assesses the aggregated effect of preventive measures

bull Presents results to enable quick understanding and updating of the

41 Research projects 47

current security posture

By integrating European expertise on socio-technical security into a widelyapplicable and standardized framework TREsPASS will reduce security in-cidents in Europe and allow organizations and their customers to makeinformed decisions about security investments This increased resilience ofEuropean businesses both large and small is vital to safeguarding the socialand economic prospects of Europe

All public information about the project can be found at httpwww

trespass-projecteu

TREsPASS is executed jointly by members of SnT and CSC

Results The SaToSS group is contributing to five work packages of theTREsPASS project Socio-technical security model specification (WP1)Quantitative analysis tools (WP3) Visualization process and tools (WP4)Process integration (WP5) and Standardization Dissemination and Ex-ploitation (WP9) Work on all those WPs has been initiated in November2012 at the kick off meeting of TREsPASS which took place at the Univer-sity of Twente in the Netherlands which coordinates the project

A number of initiatives and meetings has been led by BK to contributeto the first phase of the project which concerns identification of necessaryrequirements for model tools ad processes within TREsPASS

bull An initial BYOD case study has been initiated by Barbara Kordy andPatrick Schweitzer (WP1)

bull A survey paper on the state of the art of graphical modeling of at-tack and defenses have been written by Dr Barbara Kordy PatrickSchweitzer and Dr Pietre-Cambacedes from EDF France (WP1) Thepaper will be submitted in early 2013

bull A list of tools for quantitative analysis of security models has beengenerated (WP3)

bull Three meetings have been performed to discuss visualization issues insecurity modeling (WP4)

bull Two interviews concerning auditing methodologies have been carriedout by Barbara Kordy (WP5)

bull A dissemination plan proposed by the leader of WP9 has been ap-proved by UL

Publications NA

48 Projects and Grants in 2012

NESSoS FP7 ProjectNetwork of Excellence on Engineering Se-cure Future Internet Software Services and SystemsAcronym NESSoSReference no budget - participation to the Network of Excel-

lencePI Prof Dr Yves Le TraonFunding noBudget noBudget UL NADuration NA

Members NA

Domain(s) Security Future internet services and system software engi-neering

Partner(s) Core partners Atos SAE Consiglio Nazionale delle RicercheEidgenossische Technische Hochschule Zurich Fundacion IMDEA SoftwareInstitut National de Recherche en Informatique et en Automatique KatholiekeUniversiteit Leuven Ludwig-Maximilians-Universitat Munchen SiemensAG Stiftelsen Sintef University Duisburg-Essen Universidad de MalagaUniversita degli studi di Trento

University of Luxemboug is an associated partner

Description The Network of Excellence on Engineering Secure Future In-ternet Software Services and Systems (NESSoS) aims at constituting and in-tegrating a long lasting research community on engineering secure software-based services and systems

The NESSoS engineering of secure software services is based on the principleof addressing security concerns from the very beginning in system analy-sis and design thus contributing to reduce the amount of system and ser-vice vulnerabilities and enabling the systematic treatment of security needsthrough the engineering process In light of the unique security requirementsthe Future Internet will expose new results will be achieved by means ofan integrated research as to improve the necessary assurance level and toaddress risk and cost during the software development cycle in order to pri-oritize and manage investments NESSoS will integrate the research labs in-volved NESSoS will re-address integrate harmonize and foster the researchactivities in the necessary areas and will increase and spread the researchexcellence NESSoS will also impact training and education activities inEurope to grow a new generation of skilled researchers and practitioners inthe area NESSoS will collaborate with industrial stakeholders to improve

41 Research projects 49

the industry best practices and support a rapid growth of software-basedservice systems in the Future Internet

The research excellence of NESSoS will contribute to increase the trustwor-thiness of the Future Internet by improving the overall security of softwareservices and systems This will support European competitiveness in thisvital area

Results Meetings organisation of the ESSoS 2013 Doctoral Symposium

Publications NA

412 FNR COREINTER Projects

COoperative and COgnitive Architectures for SATellite Net-worksAcronym CO2SATReference 12R-DIR-PFN-10CO2SPI Prof Dr Bjorn OtterstenFunding FNR COREBudget 877KeyearBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members B Ottersten G Zheng S Chatzinotas D Aarapoglou C Xing

Domain(s) Cognitive communication

Partner(s) SES-ASTRA

Description During the last decades the demand for broadband accesshas been ever increasing with various applications in business education andentertainment In this direction satellite systems have the ability to accom-modate this demand providing large-scale coverage even in remote areasHowever in order to compete against other emerging technologies (such asfiber optic and wireless broadband networks) new high-performance satellitearchitectures have to be investigated To this end cooperative and cogni-tive satellite systems can improve both spectral and energy efficiency byexploiting advanced wireless communication techniques Regarding cooper-ative systems the joint processing of beam signals can mitigate inter-beaminterference and lead to better spectrum and power utilization Regardingcognitive systems satellite and terrestrial networks can be employed in par-

50 Projects and Grants in 2012

allel over the same frequency bands in order to provide ubiquitous indoorsand outdoors coverage and at the same time minimize the power consump-tion of the satellite payload The outcome of this investigation will be aninvaluable input to the strateQic planninQ of satellite operators and manu-facturers Based on the derived performance results the key players in thesatellite industry will be able to make informed decisions about the deploy-ment of cooperative and cognitive satellite systems Furthermore satelliteengineers will be able to use the derived insights as guidelines while desiQn-inQ future satellite systems

Results NA

Publications NA

Multi-Sensor Fusion in Mono-View Vision systems Aquisitionand Modeling (FAVE)Acronym CORE FAVEReference 12R-DIR-PFN-11FAVEPI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2011-10-01 ndash 2014-09-31

Members B Ottersten D Aouada K Al Ismaeil

Domain(s) P1 Security Reliability and Trust

Partner(s)

bull IEE

bull Univ de Bourgogne France

Description Video surveillance has become necessary to ensure publicsafety and to secure and protect critical physical infrastructures such asbanks airports and retail stores Current surveillance systems are usuallyrestricted to the deployment of 20 camerasThe effectiveness of these systemsis limited due to 20 cameras sensitivity to illumination and to occlusionswhich inescapably leads to segmentation and tracking failures With the lat-est developments in 30 sensing technologies It is now possible to considercomplementing 20 videos with 3D information in near real time This addi-tion of a third dimension ie depth information ensures a more accuratesensing of the scene We therefore propose to explore fusion approaches to

41 Research projects 51

address the shortfalls of current 20 video surveillance systems Our first ob-jective is to exploit fused data from different sources of visual informationThese include different modalities eg 20 cameras Time-of-Flight rangecameras 30 laser scanners and infrared cameras andor different levels ofabstraction Second after the data acquisition phase we propose to modelthe fused data for an intelligent sensing tailored for real-world security sce-narios In the context of high-level security systems that require a full con-trol over the surveyed area we investigate multi-view 2030 fusion methodsFurthermore for an accurate feature extraction for automatic scene un-derstanding we aim at achieving high resolution space-time depth mapsPrivacy enforcement in digital imaging systems is another important designcomponent that is today impossible to ignore in view of the boiling debateabout privacy violation An interdisciplinary effort will hence be undertakenfor the definition and design of privacy-aware imaging systems

Results NA

Publications NA

Logical Approaches for Analyising Market IrrationalityAcronym LAAMIReference 12R-DIR-PFN-10LAAMPI Prof Dr Bjorn OtterstenFunding FNRBudget 284KeBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members B Ottersten T Neugebauer M Caminada

Domain(s) P1 Security Reliability and Trust

Partner(s) NA

Description The aim of the LAAMI project is to apply techniques de-veloped in the field of Artificial Intelligence to help explaining apparentirrational forms of market behavior as is evidenced by for instance bubblesand crashes The aim is to explain these using formal theories of individualand collective reasoning as they for instance have been developed in the fieldof computational argumentation The aim is not so much to solve irrationalmarket behavior but first and foremost to understand it Our research isaimed at constructing a formal model that is sufficiently rich in order to beaccepted as a realistic model yet sufficiently formal in order to be examinedfor its formal properties and implemented in a software simulator Using

52 Projects and Grants in 2012

the results of the theory development we aim to be able to shed light on theconditions under which irrational forms of market behavior are most likelyto occur

Results NA

Publications NA

Mobility Optimization Using VEhicular Network TechnologiesAcronym MoveReference I2R-DIR-PFN-10MOVEPI Prof Dr Thomas EngelFunding FNR ProjectBudget 1127keBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members Thomas Engel Raphael Frank Andriy Panchenko JeromeFrancois Markus Forster Maximilien Mouton Lautaro Dolberg

Domain(s) vehicluar networks network security vehicular flow optimiza-tion

Partner(s)

bull University of California Los Angeles (UCLA) USA

Description The world is urbanizing rapidly As a consequence trafficcongestion in metropolitan areas has significantly increased over the lasttwo decades Although there has been significant innovation in cars safetysystems and fuel efficiency traffic congestion remains one of the modern illsof our society In most cases existing road infrastructure cannot easily be ex-tended to meet increasing traffic demand As a consequence commuters areoften stuck for hours in traffic chaos causing significant economic damageNew intelligent transportation systems (ITS) are currently being developedto increase traffic efficiency The main idea is to maximize the use of theexisting road infrastructure using smart navigation systems that are awareof the current traffic conditions Communication technologies will play animportant role in the design of such systems In the near future vehicleswill be equipped with communications devices that allow data exchange be-tween cars and Road Side Units (RSUs) Such a vehicular ad hoc network(VANET) can be used to collect and distribute traffic metrics among nearbycars and RSUs and provide advanced navigation services The aim of thisproject is to study and understand vehicular flow characteristics and propose

41 Research projects 53

new schemes using wireless communications technologies to reduce vehicu-lar traffic congestion enhance safety and at the same time reduce emissionsIn this relatively new research area there are multiple challenges As afirst step we will investigate how and where traffic information (eg speeddestination and local traffic density) can efficiently be retrieved from vehi-cles Network planning and management need to be carefully studied inorder to provide the required quality of service Adapted routing and dis-semination protocols that are able to cope with the changing dynamics ofvehicular traffic need to be specified Traffic Coordination Points (TCPs)will be responsible for collecting and evaluating traffic metrics for a givenarea This information will help to predict how the traffic will evolve in thenear future In this way the TCPs can suggest via the vehicular networkindividual routes avoiding traffic jams and thus shorten the travel time Inaddition to advanced route planning services this information can be usedto dynamically adapt the timings of local traffic lights to maximize vehicu-lar throughput A realistic simulation environment will be implemented in afirst phase to evaluate the performance of the proposed system under a va-riety of traffic scenarios A practical prototype will be validated under realtraffic conditions in Luxembourg City using the existing rsquoHot Cityrsquo meshas its infrastructure network Additional tests are foreseen at the UCLAcampus which provides a flexible testbed (up to 200 cars) to validate andtest new communication protocols

Results

bull Development of an analysis tool to evalute communications routes inVANET

bull Implementation of a traffic sensing application for mobile devices

bull Publication of new simulation and emulation tools for high fidelityVANET evaluation

bull Specification of a vehicle coordination scheme to increase vehiculartroughput on highways

bull Lightweight methods for confidentiality in data communication

bull Path selection metrics for performance improved onion routing

bull Lightweight hidden services

bull Traffic analysis in encrypted connections

bull Countermeasures against traffic analysis in encrypted connections

54 Projects and Grants in 2012

We proposed and evaluated a novel approach how to provide network serviceswhile protecting privacy and identity of the service provider [344] Thetechnology can be directly applied in the scope of the MOVE project asprivacy protection is an important fact for the acceptance of the results of theproject by the public We also studied the possibilities of traffic analysis inencrypted network streams It was shown that under certain circumstancescryptography alone is not enough to hide the content of communication Wealso studied countermeasures how to mitigate this attack Our findings areof vital importance as communication in MOVE should protect the data intransit and respect privacy of the involved individuals

Practical usage of methods for confidential communication often leads todelays that are not tolerated by the average end-user which in return dis-courages many of them from using the system In [342 343] we propose newmethods of path selection that allow performance-improved onion routingThese are based on actively measured latencies and estimations of availablelink-wise capacities using passive observations of throughput [331] We eval-uate the proposed methods in the public networks and present a practicalapproach to empirically analyze the strength of anonymity certain methodsof path selection provide in comparison to each other

Regarding the distributed and large scale context of vehicular networks theinvestigation of huge volume of captured network traffic data has been pro-posed by leveraging cloud computing and in particular in the context ofsecurity monitoring [345] As a node in a vehicular network may act as au-tonomous entity and so be easily in contact with malicious ones automaticfingerprinting methods have been proposed in [346] to enhance authentica-tion and to monitor bad behaviors

Publications Publications in 2011 6 peer-reviewed conferences [304 272265 268 270 269]

Security GamesAcronym SndashGAMESReference C08IS03PI Prof Dr Leon van der TorreFunding FNR-COREBudget 314000eBudget UL 314000eDuration 2009-04-01 ndash 2012-03-31

Members L van der Torre S Mauw W Jamroga M Melissen

41 Research projects 55

Domain(s) Game theory Security protocols Non-zero sum games Imper-fect information games Attackndashdefense analysis

Partner(s)

bull GAMES Network

Description Information security is not a static black-and-white systemfeature Rather it is a dynamic balance between a service provider tryingto keep his system secure and an adversary trying to penetrate or abusethe service Such interplay can be considered as a game between the adver-sary and the service provider and the field of game theory provides methodsand tools to analyse such interactions Games for verification and designhave been studied in computer science for the last ten years This funda-mental research into extending and complementing traditional verificationapproaches from formal methods with game theoretic reasoning is pavingthe way for more effective verification tools These developments are ofparticular interest to the field of security in which formal verification hasalways played an important role The purpose of the project is to study howthese new developments can be used to strengthen current analysis and ver-ification techniques in information security The project has two main linesof research 1) A study of the use of game-theoretic methods in the field ofsecurity resulting in requirements on game-theoretic methods for security2) The development of novel verification methods based on the combineduse of formal verification techniques and a game theoretic approach and itsapplication to the field of security For the first line two areas in securityare selected for which the application of these techniques seems particularlypromising fair exchange protocols and attackndashdefense analysis The secondline focuses on the interplay of finite and infinite games mathematical logicand automata theory in particular on analysis techniques for infinite-statesystems linear-time model checking and game models for protocols TheSndashGAMES project is a joint project of the SaToSS group and the ICR groupof Prof Dr Leon van der Torre

Results The S-GAMES project ended in 2012 Most project goals havebeen achieved The project produced a number of important results thatcan be used to analyze information security in game-like scenarios Someof the results have already been significantly cited by other researchers InLuxembourg the effectivity functions methodology is being currently usedin the AFR TrustGames project Moreover effectivity models as well aslogic-based techniques for incomplete information games developed withinthe project are also prominently featured in the FNRDGFndashINTER GaLoTproject (accepted to begin 1022013) Last but not least our results havegenerated interest among more practically-oriented research groups in par-ticular the team behind the VERICS model checker at the Polish Academy

56 Projects and Grants in 2012

of Sciences in Warsaw

The main results obtained in 2012 are as follows

bull We showed how the semantics of strategic logic ATL can be defined interms of abstract models so called coalitional effectivity functions [134]

bull Continuing studies on logic-based specification we developed a com-bination of alternating-time temporal logic ATL and description logicALCO and showed how the resulting language can be used to writelong-term security specifications [130] We showed that while thesatisfiability problem appears to be undecidable model checking istractable We also defined a variant of realizability that combinesmodel checking of the temporal frame with satisfiability of the termi-nological interpretation and showed that the new problem is decidable

bull We used strategic logics like ATL to study fairness in non-repudiationprotocols [315] We showed that existing specifications of fairness forma natural taxonomy of weaker and stronger variants We also arguedthat none of the specifications works correctly in the context of imper-fect information and we proposed our own notion as a remedy

bull We continued our studies on the relationship between models of coali-tional power coming from cooperative game theory and standard gamemodels from non-cooperative game theory In a follow-up to our pre-vious work [291] we showed how the concept and characterization canbe extended to games over infinite time horizon typical in modelingof computational systems [134]

Publications The project resulted in the following publications in 2012[134] [130] [315] [291]

The Dynamics of ArgumentationAcronym DYNARGReference F1R-CSC-PFN-09DYNARPI Prof Dr Leon van der TorreFunding FNR-INTERCNRSBudget NABudget UL NADuration 2009-10-01 ndash 2012-09-31

Members Richard Booth Tjitze Rienstra Martin Caminada Emil Wey-dert

41 Research projects 57

Domain(s) Argumentation theory Belief dynamics Multi-agent systems

Partner(s) Universite drsquoArtois Lens France (Dr Souhila Kaci)

Description Artificial Intelligence is a science that aims to implementhuman intelligence For this purpose it studies the behaviour of rationalagents Pertinent information may however be insufficient or there may betoo much relevant but partially incoherent information Different theorieshave been proposed for decision-making in these contexts In particular thegrowing development of multi-agent systems requires the handling of collec-tive decisions and of information coming from different sources Moreoverin multi-agent systems agents need to interact in order to inform convinceand negotiate with other agents Argumentation theory is a suitable theoryto support such interactions In this project we will create an abstract the-ory of dynamic argumentation in which argumentsconflict relations can beaddedremoved We will also investigate the aggregation of argumentationframeworks to model the interaction among arguing agents To this end wewill eg develop new notions of distance between argument graph labelingsin order to define when an agent position can be said to beldquoclose tordquoorldquofarrdquofrom that of another Finally we plan to apply the dynamic argumentationtheory to dialogue between agents We want to study these problems bothfrom within abstract argumentation frameworks in which the focus is onhow arguments interact with each other without specifying the actual formof the arguments as well as using more concrete representations of what anargument consists of (eg a number of explicit possibly defeasible ldquorulesrdquosupporting a ldquoconclusionrdquo)

Results

bull In [156] we proposed a number of intuitive measures of distance be-tween two sets of evaluations over a set of arguments and showed thatthey fail to satisfy basic desirable postulates Then we proposed ameasure that satisfies them all Our results inform the design of pro-cedures for revising onersquos position in order to reach agreement withothers or to conduct minimal revision to incorporate new evidence

bull Dung-style abstract argumentation assumes full awareness of the ar-guments relevant to the evaluation However this is generally not arealistic assumption Moreover argumentation frameworks have ex-planatory power which allows us to reason abductively or counter-factually but this is lost under the usual semantics To recover thisaspect in [159] we generalised conventional acceptance and presentedthe concept of a conditional acceptance function We also provided amodal-logical framework for reasoning about argument awareness in[114]

58 Projects and Grants in 2012

bull In [31] we introduced a new model for belief dynamics where beliefstates are ranking measures and informational inputs are finite setsof parametrized conditionals interpreted by ranking constraints Theapproach generalises ranking construction strategies developed for de-fault reasoning

bull In [115] we generalised the ASPIC argumentation system so that eachinference rule can be associated with a probability that expresses un-certainty about whether the rule is active The uncertainty about rulescarries over to uncertainty about whether or not a particular argumentis active The usual Dung-style abstract argumentation semantics wasgeneralised in order to deal with this uncertainty

Publications [156] [159] [114] [31] Weydert9861

Management Regulatory ComplianceAcronym MaRCoReference I2R-DIR-BPI-11KELSPI Prof Dr Pierre KelsenFunding FNR-COREBudget NABudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Pierre Kelsen Leon van der Torre Qin Ma Marwane ElKhar-bili Silvano Colombo Tosatto

Domain(s) Business process compliance

Partner(s) Guido Governatori NICTA Queensland Research Laboratory

Description The processes that underpin the businesses of our everydaylives are governed by regulations of ever growing complexity In this contextit is important

ndash to be able to describe these complex regulations rigorously precisely andunambiguouslyndash that business practitioners are actually able to specify both regulationsand business processesndash to be able to check in an automated way that business processes complywith their underlying regulations

MaRCo proposes to tackle these three issues On one hand MaRCo improves

41 Research projects 59

existing approaches to formally describe (or model) norms On the otherhand MaRCo makes this practical and usable by practitioners in such away that the mathematical based formalisms involved in norm specificationdo not constitute a barrier to practitioners that know the business domainbut not the underlying mathematical formalism being used and so MaRCoproposes a visual-based approach to norm specification Finally MaRCochecks the compliance of business processes against the norms that governthem in order to be able to detect in an automated way business processesthat violate their underlying regulations

MaRCo aims at creating added value for service-related industries (eg inthe banking sector) by making the specification of business processes andnorms rigorous and precise yet accessible to domain experts and enablingan automated approach to compliance checking This should provide meansto ensure that services are aligned with their underlying local and interna-tional regulations With the growing need for regulatory compliance thiswill strengthen the expertise in service science in Luxembourg

See also httpmarcogforgeunilu

Results CoReL Policy-Based and Model-Driven Regulatory ComplianceManagement Marwane El Kharbili Qin Ma Pierre Kelsen and Elke Pul-vermueller In Proc of the 15th IEEE International Enterprise DistributedObject Computing Conference (EDOC 2011) IEEE Computer Society 2011

Publications 1 conference publication [314]

Multi-Objective Metaheuristics for Energy-Aware Scheduling inCloud Computing SystemsAcronym GreenCloudReference NAPI Prof Dr Pascal BouvryFunding FNR University of LuxembourgBudget 1088440Budget UL NADuration 2012-07-01 ndash 2015-06-30

Members Alexandru-Adrian Tantar Sebastien Varrette Gregoire Danoy

Domain(s) NA

Partner(s) University of Lille

Description The project GreenCloud aims at developing an energy-aware scheduling framework able to reduce the energy needed for high-

60 Projects and Grants in 2012

performance computing and networking operations in large-scale distributedsystems (data centers clouds grids) With the advent of new petaflopsdata centers and the next-generation Internet (rdquoInternet of Thingsrdquo rdquoHigh-Performance Internetrdquo) energy consumption is becoming a major challengefor the IT world To build up this new energy-aware scheduling frameworkthe project GreenCloud will first develop multi-criteria mathematical op-timization models (eg makespan energy robustness) and then designmulti-objective optimization methods to solve the problem These tech-niques along with statistical and machine learning components will be usedto provide autonomous fault-tolerant and robust scheduling paradigms forvirtual machines running inside a dynamic environment A series of time-varying deterministic and stochastic factors will be considered as part of theenvironment eg renewable energy supply computational demand or activ-ity of users Experimentation and validation will be carried on a real test bedusing large-scale equipments (eg Gridrsquo5000) while relying on distributedscenarios

Results Accepted project with a start date in November 2012 A firstmeeting of the involved members was held in December

Publications NA

EnerGy-efficient REsourcE AllocatioN in AutonomIc CloudCompuTingAcronym GreenITReference F1R-CSC-PFN-08IS21PI Prof Dr Pascal BouvryFunding FNR-COREBudget 432000eBudget UL NADuration 2010-01-01 ndash 2012-12-31

Members Pascal Bouvry Samee U Khan Thomas Engel Zdislaw Zucha-necki Johnatan Pecero Beranbe Dorronsoro Marcin Seredynski GregoireDanoy Sebastien Varrette Alexandru-Adrian Tantar Dzmitry KliazovichRadha Thanga Raj Frederic Pinel Cesar Diaz

Domain(s) Energy-efficiency resource management heterogeneous com-puting multi-objective optimization multi-agent systems parallel and dis-tributed computing telecommunication networks cloud computing

Partner(s)

41 Research projects 61

bull North Dakota University USA

bull LuxConnect

Description The project GreenIT aims to provide a holistic autonomicenergy-efficient solution to manage provision and administer the variousresources of Cloud-Computing (CC) dataHPC centers

The main research challenges that will be tackled to achieve the holisticapproach are

bull Development of a multi-objective mathematical meta-model CC is acomplex system of numerous pervasive devices that request servicesover heterogeneous network infrastructures from a data center that isenergy gobbler Because each computing entityrsquos performance is de-fined uniquely we must develop a multi-objective meta-model that canadequately define a unified and performance metric of the whole sys-tem The multiple constraints and objectives dealing with the qualityof service (QoS) cost and environment impact must be formulated andtheir relationship analyzed

bull Develop resource management and optimization methodologies Withseveral possible objectives and constraints the meta-models must re-sult in multi-objective multi-constraint optimization problems (MOP)Green-ICT will develop refine and evolve solutions for MOP that willprimarily be based on metaheuristics (eg multi-objective evolution-ary algorithms multi-objective local search hybrid metaheuristics)

bull Develop autonomic resource management The anytime anywhere slo-gan only will be effective when an autonomic management of resourcescan be achieved The resource allocation methodologies developedmust go further refinement such that the system at hand is self- heal-ing repairing and optimizing In particular it is our intention toutilize multi-agent systems (MAS) that can learn to adapt (machinelearning methodologies) and gracefully evolve to adapt (evolutionarygame theoretical methodologies)

Results For the computational aspects (WP1) contributions in the fol-lowing domains have been proposed in 2011

bull Energy-aware scheduling algorithms Different problems related to theschedule of tasks on Grids targeting energy efficient solutions in differ-ent aspects are defined In [285] we solve the problem of energy-awarescheduling for dependent tasks on Grids Then we consider a simi-lar problem but minimizing the energy required for communicationsin [305]

62 Projects and Grants in 2012

bull Robust-aware scheduling algorithms The problem analyzed here is tofind highly efficient schedules for allocating tasks on Grids but withthe additional characteristic that they are as robust as possible againstchanges in the predicted time to accomplish the scheduled tasks Themore robust the schedule is the less important will be the influenceof these changes on the final makespan (ie time when the latest jobis finished) Different highly efficient and accurate parallel coevolu-tionary multi-objective algorithms (with highly super-linear speed-up)have been proposed for this project [287 300]

bull Development of new efficient general-purpose optimization algorithmsIn addition to the previously described problems some work target-ing the design of new efficient algorithms was done In particular weare interested on enhancing well-known algorithms and reducing theirparameters [283] proposes the use of new adaptive neighborhoodsfor cellular genetic algorithms (cGAs) improving their performanceand reducing the neighborhood to use a very important parameter ofcGAs In [286] the use of a new class of algorithms with small worldtopologies for the population is proposed showing highly accurate re-sults and high efficiency compared to a canonical cGA with the sameparameters Later we compare many different topologies for differ-ential evolution algorithms in [299] and we propose a new efficientoperator for this kind of algorithms too In [311] we propose the useof cellular populations for differential evolution algorithms showingthat it enhances the behavior of the several state of the art algorithmstested

bull Validation of the algorithms on other complex real-world problems asthe optimization of energy-aware broadcasting algorithms for mobilead-hoc networks [307 284] or the configuration of the Cassini space-craft trajectory [298] outperforming in this latter case the state of theart

Volunteer-based systems have also been studied in the second semester of2011 We have been developing an optimization tool based on such sys-tems and evolutionary algorithms metaheuristics The following enumera-tion points out the main results obtained until now

bull Validation of a Peer-to-Peer Evolutionary Algorithm [336] Acceptedfor publication in Evostar 2012

bull Characterizing Fault-tolerance in Evolutionary Algorithms [337] Ac-cepted for publication during 2012

41 Research projects 63

For the communication aspects (WP3) the GreenCloud network simulatordevelopment has been continued

Several works of editorship and organization of new events have been also un-dertaken that will ensure additional impact in the following years includingeditorship of the book entitled rdquoIntelligent Decision Systems in Large-ScaleDistributed Environments [282] published by Springer)

Two websites contain the project informationhttpgreenitgforgeunilu and httpsgforgeuniluprojectsgreencloudto provide access to the energy efficiency simulator for distributed data cen-ters developed in the framework of the GreenIT project

Publications NA

Socio-Technical Analysis of Security and TrustAcronym STASTReference C11IS1183245PI Prof Dr Peter YA RyanFunding FNR COREBudget 765864eBudget UL 765864eDuration 2012-05-01 ndash 2015-04-30

Members Peter YA Ryan Sjouke Mauw Gabriele Lenzini VincentKoenig Ana Ferreira Jean-Louis Huynen

Domain(s) security analysis human factor security protocols

Partner(s) University of Catania Royal Holloway University LondonNewcastle University University College London Norwegian University ofScience and Technology

Description Over the last 20-30 years the security community has mademajor strides in the design and (semi-automated) analysis of security pro-tocols Nevertheless security critical systems continue to be successfullyattacked There appear to be two main explanations of this situation (1)the implementation of the protocol designs introduce flaws that are notpresent at the design level and (2) attackers target and exploit the usuallymore vulnerable non- technical aspects of the system

Information security systems are typically complex socio-technical systemsand the role of humans in either maintaining or undermining security is cru-

64 Projects and Grants in 2012

cial Often system designers fail to take proper account of human charac-teristics resulting in vulnerabilities at the interface between the humans andthe purely technical components Attackers often target such vulnerabilitiesrather than attempt to break the technical security mechanisms Despitethis the socio-technical aspects of security have been largely neglected bythe information security community

Addressing these socio-technical aspects is very challenging and highly inter-disciplinary This project focuses on this most urgent and critical aspect ofsecurity It will build on the existing knowledge expertise and tools for theanalysis of security protocols but extend and enrich it to capture the humanand social dimension

Key elements of our approach are

bull To enrich existing models to encompass the role of the users and en-hanced attacker models

bull To develop tools and methodologies to analyze system designs againstthese enriched models

STAST is executed jointly by members of SnT and CSC

Results Selection of the PhD candidate who will be working on theSTAST project within the SaToSS group has started in 2012 We haveinterviewed a number of candidates and we hope to fill the position in early2013

Publications NA

Attack TreesAcronym ATREESReference C08IS26PI Prof Dr Sjouke MauwFunding FNR-COREBudget 299000eBudget UL 299000eDuration 2009-04-01 ndash 2012-03-31

Members Sjouke Mauw Barbara Kordy Patrick Schweitzer Sasa Radomirovic

Domain(s) security attackndashdefense trees security assessment formal meth-ods

Partner(s)

41 Research projects 65

bull Telindus Luxembourg

bull Sintef Norway

bull TXT e-solutions Italy

bull Cybernetica Estonia

bull EDF France

bull Lucerne University of Applied Sciences and Arts Switzerland

bull THALES Research amp Technology France

Description Security assessment of systems is a standard but subopti-mal procedure due to its informal nature While a formal approach wouldbe desirable but out of reach a systematic approach would be beneficialand feasible Attack trees are a wellndashknown methodology to describe thepossible security weaknesses of a system An attack tree basically consistsof a description of an attackerrsquos goals and their refinement into sub-goalsWe believe that attack trees provide an ideal systematic approach for se-curity assessment The objective of this project is to extend attack treeswith defensive measures Consequently the attackndashdefense tree method-ology will be developed and formalized in order to provide a systematicfullyndashfledged and practical security assessment tool The project benefitsfrom our contacts with several industrial and academic partners with whomwe conduct case studies More information can be found on the project webpage httpsatossuniluprojectsatrees

Results In 2012 the ATREES project resulted in following output

bull An article published in the Journal of Logic and Computation de-scribing the attackndashdefense tree methodology developed within theATREES project [258]

bull A presentation and publication of an article describing how to quan-titatively analyze attackndashdefense trees in practice

bull A publication of a journal article describing the case study performedin 2011 [254]

bull A publication of the conference article [355] about computational as-pects of attackndashdefense trees

bull Development of the ADTool a software tool supporting creation andquantitative analysis of attackndashdefense trees The ADTool is availableat httpsatossuniluprojectsatreesadtool

66 Projects and Grants in 2012

The results of the project were presented in six research talks and invitedlectures given at NTNU in Norway Sintef in Norway RHUL in UK LORIAin France THALES in France and ICISCrsquo12 conference in Korea as well asin one internal SRM presentation

The collaboration with related projects have also been initiated Currentlywe perform two case studies using the attackndashdefense tree methodology oneabout an analysis of an e-voting system (in collaboration with the CORESeRTVS project lead by Prof Ryan) and one on BYOD issues (in collabo-ration with the CORE CoPAINS project led by Prof Le Traon) We haveinitiated a collaboration on attack trees between the University of Luxem-bourg and THALES Research amp Technology in France

The methodologies developed and results obtained within the ATREESproject will serve as input for the FP7 EU project TREsPASS and theCORE project STAST

Publications The project resulted in following publications in 2012 [258][254] [355]

Cryptography and Information Security in the Real WorldAcronym CRYPTOSECReference F1R-CSC-PFN-09IS04PI Dr Jean-Sebastien CoronFunding FNR-COREBudget 272000eBudget UL NADuration 2010-10-01 ndash 2013-09-30

Members NA

Domain(s) Cryptography Information Security Side-Channel Attacks

Partner(s) NA

Description Cryptography is only one component of information securitybut it is a crucial component Without cryptography it would be impossi-ble to establish secure communications between users over insecure networkslike the internet In particular public-key cryptography (invented by Diffieand Hellmann in 1974) enables to establish secure communications betweenusers who have never met physically before One can argue that compa-nies like E-Bay or Amazon could not exist without public-key cryptographySince 30 years the theory of cryptography has developed considerably How-ever cryptography is not only a theoretical science namely at some point

41 Research projects 67

the cryptographic algorithms must be implemented on physical devices likePCs smart-cards or RFIDs Then problems arise in general smart-cardsand RFIDs have limited computing power and leak information throughpower consumption and electro-magnetic radiations A cryptographic al-gorithm which is perfectly secure in theory can be completely insecure inpractice if improperly implemented Therefore the aim of this proposal isto take into account every aspect of the implementation of secure systemsin the real world from the mathematical algorithms to the cryptographicprotocols and from the cryptographic protocols to their implementation inthe real world This allows creating a bridge between theoretical research incryptography on the one side and its applications and the end users of thenew technology on the other side When dealing with cryptographic pro-tocols we will work in the framework of provable security every securitygoal will be clearly defined and every new cryptographic scheme or protocolshould have a proof that the corresponding security goal is achieved basedon some well defined computational hardness assumption When dealingwith cryptographic implementations we will try to cover all known side-channel attacks timing attacks power attacks cache attack etc

Results Due to administrative reasons the actual start of the project ispostponed to the first half of 2011

Publications NA

Secure Reliable and Trustworthy Voting SystemsAcronym SeRTVSReference I2R-DIR-PFN-09IS06PI Prof Dr Peter RyanFunding FNR-Core 333000e FNR-AFR 216216e IMT

Luca 130000e University of Melbourne 60000eUL 268596e

Budget NABudget UL NADuration 2010-02-01 ndash 2013-02-01

Members NA

Domain(s) Electronic voting

Partner(s) University of Surrey (UK) University of Birmingham (UK)IMT - Institute for Advanced Studies Lucca (Italy) University of Melbourne(Australia)

Description Ensuring that the outcome of an election is demonstrably

68 Projects and Grants in 2012

correct while maintaining ballot privacy and minimising the dependence onelection officials has been a challenge since the dawn of democracy For overa century the US has experimented with various technologies to try to makevoting easier and more secure All of these have proved problematic mostnotably the more recent use of touch screen machines The danger here isthat the outcome is critically dependent on the correct execution of the coderunning on the voting devices

Recent research has explored the use of modern cryptography to address thischallenge Significant advances have been made in particular advancing thenotion of ldquovoter-verifiabilityrdquo allowing voters to confirm that their voteis accurately counted while avoiding threats of vote buying or coercionNotable amongst such schemes is the Pret a Voter system proposed bythe PI in 2004 and subsequently developed to make it more usable secureand flexible The Pret a Voter approach is widely regarded as one of themost secure and useable of such schemes and is arguably the most promisingin terms of providing a practical scheme for real-world use

Despite the successes achieved in this field the issues of robustness andtrustworthiness remain open Verification procedures are a part of mostproposed systems intended to offer trust However systems universallylack procedures in case the verification finds errors and the complexity ofthe verification procedures often undermines trust instead of bolstering it

The aim of the SeRTVS project is to develop and evaluate designs for prac-tical secure and trustworthy voting systems Such schemes should yielda demonstrably correct outcome of the election while guaranteeing ballotprivacy Furthermore such systems must be sufficiently simple to use andunderstandable as to gain widespread acceptance by voters and other stake-holders The starting point will be the existing Pret a Voter and PrettyGood Democracy schemes Vulnerability or deficiencies identified duringthe evaluation will be addressed by enhancements to the scheme

To date very little has been done to investigate robust recovery mechanismsfor voting systems The project will develop effective recovery mechanismsand strategies The project will also investigate the issues of public percep-tion and trust of verifiable systems It is not enough for the system to betrustworthy it must also be universally perceived as trustworthy A goaltherefore is to measure and advance public understanding and trust in suchschemes

Results In the course of the project Dr Gabriele Lenzini was recruited asa post-doctoral researcher to start in February 2011 The project staged theInternational Summer School on Secure Voting (SECVOTE 2010) in Berti-noro (Italy) jointly with the TVS project Research results were publishedin the proceedings of ESORICS 2010 [353] and INDOCRYPT 2010 [354]

41 Research projects 69

Publications NA

Conviviality and Privacy in Ambient Intelligence SystemsAcronym CoPainsReference NAPI Prof Dr Yves Le TraonFunding FNRBudget 4Budget UL 486000Duration 2012-01-01 ndash 2013-12-31

Members Patrice Caire Yehia El Rakaiby Assaad Moawad

Domain(s) Security and Privacy defeasible logic AAL conviviality soft-ware engineering

Partner(s) Hot City

Description Ambient Intelligence constitutes a new paradigm for the in-teractions among intelligent devices and smart objects acting on behalf ofhumans The ultimate goal of Ambient Intelligence systems is to transformour living and working environments into intelligent spaces able to adapt tochanges in context and to users social needs Such systems must have thecapability of interpreting their contexts Moreover the open nature of Ambi-ent Intelligence systems and the unnoticeable ways in which various sensorsmay access users personal data make two seemingly antagonistic require-ments preserve users privacy and facilitate convivial interactions amonghumans and devices The concept of conviviality has recently been intro-duced as a social science concept for Ambient Intelligence to highlight softqualitative requirements like user friendliness of systems To make AmbientIntelligent systems desirable for humans they must be convivial and privateie fulfil both their need for social interactions making communication andcooperation among participants easier while also preserving the privacy ofeach individual Hence the need for trade-offs between being private andconvivial intuitively the former keeping information to a small circle of in-siders while the later shares it with all The aims are to enable knowledgesharing for the collective achievement of common objectives among enti-ties through coalition formation while at the same time respecting eachentityrsquos privacy needs Hence the CoPAInS project is about designing anddeveloping models of interaction among intelligent devices it is also abouttheir corresponding methods The main goal of CoPAInS is to facilitateprivacy and conviviality in Ambient Intelligence and to provide tools forit To achieve our objective first we develop a formal framework for con-

70 Projects and Grants in 2012

text representation privacy and conviviality using methods of KnowledgeRepresentation and Reasoning Second we validate and verif y privacy andconviviality properties of Ambient Intelligence systems using model-checkingtechniques We then simulate and test use cases from the field of AmbientAssisted Living Third to demonstrate the feasibility of our approach andits usefulness to support Luxembourg citizens everyday activities we applythe gained expertise to use cases provided by Hotcity Finally we produceguidelines to assist system designers in the development of privacyaware andconvivial assistive systems

Results Development of the IoT lab in SnT

Publications [210 209 140 245 152 139]

e-Training Education Assessment and Communication Centerfor Headache DisordersAcronym E-TEACCHReference F1R-CSC-PFN-10ETEAPI Prof Dr Denis ZampunierisFunding FNR-COREBudget NABudget UL NADuration 2011-05-01 ndash 2014-04-30

Members Sergio Dias Andrea Teuchert Denis Zampunieris

Domain(s) public health disease-management headache e-learning mu-timedia

Partner(s) CRP Sante

Description Headache including migraine is a common and disablingneurobiological disorder which is under-recognized under-treated commonlymismanaged and it imposes a substantial health burden with a major im-pact on both quality of life and the economy Migraine alone the mostprevalent neurological brain disorder is more prevalent than asthma di-abetes and epilepsy combined According to WHO the burden weight ofmigraine is higher than that of epilepsy multiple sclerosis and ParkinsonasdiseaseEffective treatments exist but general practitionersrsquo misdiagnosisand mismanagement of headache disorders easy access to various over thecounter drugs have led to a high rate of self-medication Long-term sideeffects increase of secondary headaches and dependency are the major prob-lems Health care failure has its roots in education failure at every level inEurope and in the resulting and widespread lack of understanding With

41 Research projects 71

E-TEACCH the CRP-Sante and the University of Luxembourg will buildan innovative demonstrational electronic multilingual Training EducationAssessment and Communication Center on Headache with easy-to-use in-teractive modular and extensible content for different target groups (pa-tients doctors pharmacists) The two Luxembourg centers represent anideal combination technical professionals experienced pedagogic e-learningand Headache teams with established support of international and Euro-pean scientific and lay organizations international interdisciplinary expertsas well as the WHO campaign aLifting the burdena E-TEACCH will im-prove headache disorder screening diagnosis disease-management preven-tion treatment adherence and in doing so allow headache sufferers a betterquality of life reduce socio-economic costs chronification and comorbidityE-TEACCH will offer latest headache disorder scientific news webinarsscreening tools diagnostic aids treatment control and communication sup-port disability measurements disease-management guidelines video basedcase studies and accredited knowledge assessment tests

Results NA

Publications NA

Managing Regulatory Compliance a Business-Centred Ap-proachAcronym MaRCoReference I2R-DIR-PFN-09IS01PI Prof Dr Pierre KelsenFunding FNR-COREBudget 749K eBudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Pierre Kelsen Qin Ma Marwane El Kharbili Christian GlodtLeon van der Torre Silvano Colombo Tosatto

Domain(s) Compliance Management Business Process Management Pol-icy Management Normative Systems Enterprise Models Model-Driven En-gineering (MDE) Visual Languages Formal Methods

Partner(s)

bull NICTA Queensland Research Laboratory Australia

bull University of Osnabrueck Germany

72 Projects and Grants in 2012

Description The processes that underpin the businesses of our everydaylives are governed by regulations of ever growing complexity In this con-text it is important (a) to be able to describe these complex regulationsrigorously precisely and unambiguously (b) that business practitioners areactually able to specify both regulations and business processes and (c) tobe able to check in an automated way that business processes comply withtheir underlying regulations This project proposes to tackle these threeissues On one hand we want to improve existing approaches to formallydescribe (or model) norms On the other hand we would like to make thispractical and usable by practitioners in such a way that the mathematicalbased formalisms involved in norm specification do not constitute a bar-rier to practitioners that know the business domain but not the underlyingmathematical formalism being used and so we propose a visual-based ap-proach to norm specification Finally we intend to check the compliance ofbusiness processes against the norms that govern them in order to be able todetect in an automated way business processes that violate their underlyingregulations The proposed research project aims at creating added value forservice-related industries (eg in the banking sector) by making the specifi-cation of business processes and norms rigorous and precise yet accessible todomain experts and enabling an automated approach to compliance check-ing This should provide means to ensure that services are aligned with theirunderlying local and international regulations With the growing need forregulatory compliance this will strengthen the expertise in service science inLuxembourg

Results - We have carried out a systematic literature survey of regulatorycompliance management in business process management elicited a set ofsuccess requirements and performed a comparative analysis of literature so-lutions against the requirements The result has been reported in a LASSYtechnical report (TR-LASSY-11-07) and an excerpt of the technical reportis accepted by the 8th Asia-Pacific Conferences on Conceptual Modelling(APCCM) for publication in 2012 - We have designed E3PC (EnterpriseExtended Event-driven Process Chains) E3PC is a formal model-driven en-terprise modeling language that extend EPC (Event-driven Process Chains)The formal semantics of E3PC is defined in terms of a translation fromE3PC models to Algebraic Petri-Nets (APN) We have reported the resultin a LASSY technical report (TR-LASSY-11-12) - We have designed CoReL(Compliance Requirement Language) CoReL is domain-specific modelinglanguage for representing compliance requirements that has a user-friendlygraphical concrete syntax Two papers have been published reporting re-sults on CoReL one[314]describes the language itself and the other[313]reports an illustrative example of using this language - We have developedan editor for E3PC and an editor for CoReL both implemented as Eclipseplug-ins We have also implemented the formal semantics of E3PC by de-

41 Research projects 73

veloping model transformations from E3PC to APN in both DSLTrans andATL - We have identified a sub-set of business processes called structuredbusiness processes in which only XOR and AND connectors are allowed andsplits and joins are always paired up properly Based on these structuredbusiness processes we have already derived efficient algorithms for certainsimple compliance requirements providing thus some evidence that theserestrictions on business process help to reduce complexity of compliancecheckingWe report the results in [90] and and a paper to be published atESSS 2013 - We have started the work on norm dynamics by investigatingthe use of an argumentation framework to determine the priorities betweenthe norms This approach can also be used within business processes todynamically determine to which policies the business process should complydepending from the context of the execution -We have started to work onan abstract framework to define compliance We propose an abstract frame-work to define business process compliance and its elements First we definethe elements that constitute a business process and its functioning Secondwe define the policies governing the processes and their obligations takingalso into account the temporal constraints that can exist between differentobligations

Publications [314 313 90 2 88 89 242 366]

Modeling Composing and Testing of Security ConcernsAcronym MITERReference NAPI Dr Jacques KleinFunding FNRBudget NABudget UL NADuration NA

Members Jacques Klein Yves Le Traon Phu Nguyen Qin Zhang MaxKramer

Domain(s) software engineering Model Composition Model-Driven Se-curity Model-Based Testing

Partner(s) KIT Karlruhe Germany

Description Security is not only a keyword it is currently a critical issuethat has to be embraced by modern software engineering (SE) techniquesFrom this SE point of view ensuring confidence in the implemented securitymechanisms is the key objective when deploying a security concern This

74 Projects and Grants in 2012

objective can be reached by improving the design and implementation pro-cess via modeling and automation such as security code generation frommodels and by systematic testing and verification

As stated in the FNR programme description ldquoInformation Security andTrust Managementrdquo is one of the cornerstones of the Information Societya ldquotransversalrdquo research domain of central and ever-growing importance notonly for the banking industry but for nearly all other ICT applicationsand e-services Thus security concerns impact many ICT domains in manydifferent ways

Secure programming techniques are now better understood and guidelinesteach programmers how to avoid buffer overflows when to validate inputsand how to apply cryptography The key problem is that security should notbe under the sole responsibility of the programmer (hopefully competent)Dealing with security at a programming level is risky often not sufficient andis not the most productive Indeed to face large classes of attacks securityexperts must express the security policy which is the result of a risks andthreats analysis This security policy cannot be deployed without taking intoaccount the software development lifecycle in a whole In other words itis necessary to consider the requirements analysis and design developmentsphases and the links between these phases to be able to represent (with mod-els) and analyze (with model analysis security methods) security concernsin order to detect or prevent from attacks Second the fact that securityconcerns impact ma ny ICT domains in many different ways amplified bythe fact that economic pressure reduces development time and increases thefrequency modifications are made constantly imposes more productive andflexible development methods To sum up for agile modeling there is anurgent need for modeling tools which allows composing functional architec-tural and - in MITER project - security expert viewpoints into an integratedproductive model

In this context the MITER project aims at developing new modeling tech-niques to 1) represent security concerns (eg access control and usage con-trol policies) 2) compose them with the business logic model (called tar-get model) and 3) test the security model composition against security re-quirements These three objectives converge to an integrated model-drivensecurity process which allows a business model to embed various securityconcerns and makes these security properties testable by construction

Results We have worked on an extension of one of our papers on dynamicaccess control Our goal being to perform performance analysis on the meth-ods that we propose We have also worked on Delegation management Morespecifically among the variety of models that have been studied in a MDEperspective one can mention Access Control policy that specifies the accessrights These work mainly focus on a static definition of a policy without

41 Research projects 75

taking into account the more complex but essential delegation of rightsmechanism User delegation is a meta-level mechanism for administratingaccess rights by specifying who can delegate access rights from one user toanother including his own rights We analyse the main hardpoints for intro-ducing various delegation semantics in model-driven security and proposesa model-driven framework for enforcing access control policies taking intoaccount all delegation requirements

We worked on the second main goal of the MITER project the compositionof security concerns As a result first we have proposed a new version of theGeKo weaver (available at httpcodegooglecomaeclipselabsorgpgeko-model-weaver) a generic and practical aspect-oriented modelling weaverA paper describing GeKo is currently under submission at the Model con-ference Second we applied GeKo to weave building specifications in thecontext of construction industry A workshop paper has been accepted in2012 This paper and this work have been done in collaboration with theUniversity of Queensland

Publications none in 2011

Model-Driven Validation and Verification of Resilient SoftwareSystemsAcronym MOVEREReference F1R-CSC-PFN-09IS02PI Prof Dr Nicolas GuelfiFunding FNR-COREBudget 265 000eBudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Levi Lucio Yasir Khan Qin Zhang

Domain(s) Software Engineering Security Dependability Resilience ModelChecking Model Driven Engineering

Partner(s) University of Geneva Switzerland

Description Verification and Validation of software have nowadays clearmeanings in the context of Model- Driven Development With test basedverification we worry about producing a set of test cases that will on theone hand find faults in an implementation - also called in the test literatureSystem Under Test (SUT) - and on the other hand increase trust in thefinal product With validation we worry about understanding if the modelwe are using as reference for implementation and for extracting test cases

76 Projects and Grants in 2012

from is sound Formal validation is often achieved by mechanically provingproperties the model should satisfy For example dynamic properties couldbe expressed in a temporal logic and static properties on the system statecould be expressed using logical invariants and then verified on the systemrsquosmodel In this project we will focus our attention on the application of val-idation and verification techniques to the Model Driven Engineering of sys-tems where resilience mechanisms are explicitly modelled and implementedaccording to that model Resilience corresponds to the fact that a systemhas the capability to adapt to harmful events and recover to a stable state orat least continue operation in a degraded mode without failing completelyThese harmful events might cause the fundamental security properties (con-fidentiality integrity and availability) to be violated With this project weaim at improving the state of the art of the construction of reliable resilientsystems by using verification and validation techniques within the context ofModel Driven Development (MDD) The current trend of Software Engineer-ing is to increasingly reason about the system being built at the model levelby using appropriate Domain Specific Languages (DSL) for each conceptualdomain In this project we will concentrate on resilience and materializeit as a DSL Model composition techniques can then be used in order tocompose resilience features expressed in the resilience DSL with other do-mains equally defined as DSLs When the composed model is validatedverification techniques can then be used to insure the resilience propertiesare well implemented We will tackle this problem both at a theoretical anda practical level

Results Since the beginning of the project in May 2010 we have hadtwo main results The first one is an abstract definition of resilience froma software engineering perspective This work is accessible as a technicalreport in [327] It has also been submitted to the journal rdquoTransactions onSoftware Engineering and Methodologyrdquo and for which approval is pendingThe second result is an operational definition of resilience using a modeldriven approach and model checking tools The work is based on [327]and is accessible also as a technical report in [326] A paper based on thistechnical report has been submitted to TOOLS 2011 Both these papersconcern work packages 1 and 2 of project MOVERE

Two PhD students Yasir Khan and Qin Zhang have been hired for workingfor MOVERE funded by the FNR AFR program Qin Zhang has startedat the University of Geneva in November 2010 and is currently familiarizinghimself with the project and the tools he will be using Yasir Khan has fileda visa demand at the Belgium embassy in his home country and is expectedat the Luxembourg in a few months

Publications NA

41 Research projects 77

Security TEsting for Resilient systemsAcronym SETERReference F1R-CSC-PFN-08IS01PI Prof Dr Nicolas GuelfiFunding FNR-COREBudget 43830000 eBudget UL NADuration 2009-05-01 ndash 2012-04-30

Members Nicolas Guelfi Yves Le Traon Ayda Saidane Iram Rubab

Domain(s) Security Resilience Model based Testing Requirement engi-neering Software architecture AADL

Partner(s) Telecom Bretagne France

Description Resilient systems can be viewed as open distributed systemsthat have capabilities to dynamically adapt in a predictable way to unex-pected and harmful events including faults and errors Engineering suchsystems is a challenging issue which implies reasoning explicitly and in aconsistent way about functional and non-functional characteristics of sys-tems The difficulty to build resilient systems and the economic pressureto produce high quality software with constraints on costs quality securityreliability etc enforce the use of practical solutions founded on scientificknowledge One of these solutions is to propose an innovative testing pro-cess Testing is an activity that aims at both demonstrating discrepanciesbetween a systems actual and intended behaviours and increasing the con-fidence that there is no such discrepancy One of the main features of asystem to test is the security of the system especially for those which aresafety or business critical The security of a system classically relates tothe confidentiality and integrity of data as well as the availability of sys-tems and the non-repudiation of transactions Testing security propertiesis a real challenge especially for resilient systems which have the capabilityto dynamically evolve to improve the security attributes The aim of theSETER project is to define a new testing approach that will ease the ver-ification of resilient programs that implement this security property Thisapproach must be aware that confidentiality and integrity can be compro-mised in many different ways (and consequently the resilient system canevolve in many different ways too) that availability and non-repudiationguarantees are difficult to ensure and that it must be compliant with theother tests addressing the core functionalities of the system Current trendsadvocate the idea that resilience should become an integral part of all stepsof software development Moreover testing is important for detecting errors

78 Projects and Grants in 2012

early in the development life cycle The earlier an error is detected theeasier and cheaper it is to resolve Therefore the objective of the SETERproject fits with these ideas by proposing new security testing approachesfor resilient systems the earlier possible during the software developmentlifecycle to propose more secure and more reliable system

Results

bull result 1 A Formal Framework for Dependability and Resilience (WP3 - Resilient System Specification and Security Requirements)

bull result 2 model based security testing approach (WP 4 - Test CaseSpecification and Selection)

bull result 3 AADL adaptation for expressing resilience requirements (WP3 - Resilient System Specification and Security Requirements)

Publications NA

413 UL Projects

Techniques and Technologies for multi-spot beam Ku-bandSatellite NetworksAcronym Multibeam KuReference 12R-DIR-PAU-11MSBKPI NAFunding ESA ITTBudget NABudget UL NADuration 2010-12-01 ndash 2012-02-28

Members B Ottersten B Shankar

Domain(s) NA

Partner(s)

bull SES-ASTRA (Luxembourg)

bull EADS Astrium (Fr)

41 Research projects 79

Description The objective of the study is to assess the advantages broughtby the introduction of multi-bearms and associated flexibility on Ku bandpayloads in particular for the present consortium the objective of the studyis to define assess and consolidate the benefits that a multi-beam architec-ture and flexibility could bring to follow-on satellites to NSS-6 satellite

Results NA

Publications NA

Guest professor Dov GabbayAcronym NAReference F1R-CSC-LAB-05ILIAPI Prof Dr Dov GabbayFunding ULBudget NABudget UL NADuration 2011-09-01 ndash 2014-08-31

Members NA

Domain(s) Logic Networks Argumentation

Partner(s) NA

Description

bull Further development of a unifying equational approach to logic andnetworks in particular argumentation

bull Interdisiplinary perspective on Security and trust bridging the gapbetween the areas of logic philosophy and security

bull Development of the foundation and applicability of input output logicespecially concerning its geometrical point of view which seems promis-ingly applicable to many non-classical logics

Results Progress was made in 3 related areas

bull Reactive Kripke modelsThese are Kripke models with additional accessibility relations whichcan change the model in the course of evaluations Several importantresults about the logical properties of such models were provided andpublished

80 Projects and Grants in 2012

bull Deontic logic and contrary to duty obligationsThe reactive semantics was used to build coherent models for intriguingpuzzles of permission and obligation

bull Meta-logical investigations in argumentation theoryA new point of view on argumentation was developed and connectedto other areas

Publications 21 publications in 2012 among them 14 journal publications

The Springer journal ANNALS OF MATHEMATICS IN ARTIFICIAL IN-TELLIGENCE (AMAI) devoted a special volume (4 issues) in 2012 to pub-lish these results

AMAI Volume 66 Numbers 1-4 December 2012

The journal ARGUMENT AND COMPUTATION also published a specialdouble issue

Argument and Computation Volume 3 issues 2-3 2012

Logics Integrated for Normative Multi-Agent SystemsAcronym LINMASReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding ULBudget NABudget UL NADuration 2011-03-01 ndash 2013-02-28

Members Xavier Parent Dov Gabbay Xin Sun Paolo Turrini

Domain(s) Normative multi-agent systems Deontic logic Knowledge rep-resentation Intelligent Systems

Partner(s) NA

Description The project aims at providing an advanced model for reason-ing about norms with both a formal semantics and a proof theory Two keycomponents that will be brought together are conflict resolution and normenforcement which are for instance relevant for the design of e-institutions

41 Research projects 81

The goal is to establish rigorous theoretical foundations for the design ofNormative Multi-Agent systems that is both amenable to computer scien-tists and understandable by stakeholders

A PhD student Xin Sun has been hired in July 2012 The topic is deonticlogic from a game-theoretic perspective The idea is to look in a new way atfamiliar problems in normative reasoning which promises a novel approachfor handling norms in intelligent systems The fields of deontic logic andgame theory have developed independently from each other with few in-teractions between the two The PhD thesis will aim at lling this gap byinvestigating how techniques developed in game theory may shed light onlong-standing issues in the study of normative reasoning like norm emer-gence and (vice-versa) how the use of norms may shed light on problemsthat have beset game theory

Results ur results are related to the notion of rsquonorm enforcementrsquo

[4] we look at the theoretical foundations of one of the existing standards fornormative reasoning so-called dyadic deontic logic We discuss the prob-lem of the import or non-import of the identity principle for conditionalobligation

Based on this insight in [292] we develop a new model for reasoning aboutnorm violation In a multi-agent setting norm enforcement is facilitatedthrough the use of sanctions Thus so-called contrary-to-duty (CTD) obliga-tions (they say what should be done if some other obligation is violated) area key component of the system The problem of how to model such a com-ponent is one of the main problems of deontic logic There is a widespreadagreement in the literature that such a problem calls for the need to distin-guish between different senses of rsquooughtrsquo ideal vs actual rsquooughtrsquo Our keyidea is to capture the distinction using tools from two-dimentional modallogic

[2] goes one step further and brings the notion of contrary-to-duty to therealm of game theory so far not investigated in relation to optimality ofstrategic decisions We show that under a game-theoretical semanticsCTDs are well-suited to treat sub-ideal decisionsWe also argue that ina wide class of interactions CTDs can used as a compact representation ofcoalitional choices leading to the achievement of optimal outcomes Finallywe investigate the properties of the proposed operators

Publications NA

82 Projects and Grants in 2012

Advanced Argumentation Techniques for Trust ManagementAcronym AASTMReference F1R-CSC-PUL-08AASTMPI Prof Dr Leon van der TorreFunding ULBudget NABudget UL NADuration 2008-05-01 ndash 2012-04-30

Members Leon van der Torre Martin Caminada Yining Wu

Domain(s) Computational argumentation Trust

Partner(s) NA

Description The overall aim of AASTM is to enhance todayrsquos genera-tion of argumentation formalisms and implementations in order to becomesuitable for a wider variety of real-life applications such as reasoning abouttrust This requires a unified theory that integrates the various forms of ar-gumentation related functionality as well as efficient proof procedures andsound and scalable software components

Results

bull A dialectical discussion game for stable semantics

bull A more refined notion of the overall status of arguments based on thenotion of a complete labelling and give the procedure to determine anddefend the justification status This refinement has put the notion ofargument labelings into good use and raises interesting new questionsabout the psychological plausibility of such labelings

bull The equivalence between complete semantics in argumentation and3-valued stable model semantics in logic programming opens up thepossibility of reusing algorithms and results from logic programmingin argumentation theory

bull We define the postulates of closure direct consistency indirect con-sistency non-interference and crash resistance in the specific case ofthe ASPIC Lite formalism Then we identity a set of conditions underwhich the ASPIC Lite system satisfies all the mentioned rationalitypostulates under complete semantics

Publications Yning Wu Between Argument and Conclusion PhD thesisUniversity of Luxembourg 2012

41 Research projects 83

A discrete approach to model processing of hard metal includinghigh performance computingAcronym DPMHPCReference NAPI Prof Dr Bernhard PetersFunding ULBudget NABudget UL NADuration NA

Members Pascal Bouvry (2nd PI) Xavier Besseron

Domain(s) Process Engineering Parallelisation

Partner(s) NA

Description Conversion of pulverised tungsten oxide to metallic tungstenin a packed bed for production of hard metal is investigated by numericalmodelling The manufacturing process is a very important tool for ma-chining various materials The chemical process is described by a reactionscheme that reduces tungsten oxide stepwise to tungsten in a hydrogen at-mosphere Hydrogen is introduced as a reducing agent that streams overa packed bed of tungsten oxide particles in an oven The flow over andpenetration of hydrogen into the bed of tungsten particles is represented byadvanced two-phase CFD-tools for a porous media Evolution of particletemperature and its reaction progress is described by the Discrete ParticleMethod (DPM) Thus very detailed results are obtained by this approachand will be compared to experimental data Therefore this effort will com-plement experimental investigations and provide a deeper insight into theprocess in particular since particle temperatures and interaction of par-ticles with the fluid are inaccessible in a packed bed during experimentsAs these predictions of the particulate phase of tungsten oxide require sig-nificant amounts of CPU-time parallelisation of the conversion module ofthe Discrete Particle Method is approached by an interdisciplinary conceptas collaboration between engineering and computer science disciplines Theworkload for each processor is determined by the Orthogonal Recursive Bi-section (ORB) algorithm that distributes the particles uniformly onto theprocessors available The well-established Message Passing Interface (MPI)is employed to describe thermal conversion of an arbitrary number of tung-sten oxide particles It has additionally the advantage that MPI is supportedby Windows and Linux operating systems which apply equally to the soft-ware package of the Discrete Particle Method Additionally the scalability

84 Projects and Grants in 2012

of the approach on massively parallel machines will be investigated and theapplication of GPUs will be promoted

Results On the CSC side the work on this project focuses on providing anew design of the DPM software in order to execute coupled simulation inparallel The new enhanced design relies on the following aspects

bull A simulation module interface is designed to reflect the two majorsteps of the simulation workflow interactions and the integration

bull A simulation driver that builds an unified timebase to schedule andexecute all the modules involved according to their own timesteps

bull A parallel simulation driver that implements domain decompositionapproach using the Message Passing Interface (MPI) in order to lever-age distributed execution platforms like High Performance Computing(HPC) clusters It relies on the concepts of domain cells and partitionand can use different partitioners (eg ORB or METIS)

The enhanced design has been validated and it has been verified that itsatisfies the constraints of the numerical methods used by the process engi-neering The implementation of the new design is in progress in the DPMsoftware

Publications NA

Evolutionary Computing and Performance GuaranteesAcronym EvoPerfReference F1R-CSC-PUL-11EVOPPI Prof Dr Pascal BouvryFunding ULBudget 370keBudget UL NADuration 2011-09-01 ndash 2013-12-31

Members Xavier Besseron Sebastien Varrette Gregoire Danoy Sune SNielsen Emilia Tantar Yves Le Traon Antonio del Sol Nikos Vlassis

Domain(s) Meta Heuristics Evolutionary Computation OptimisationPerformance evaluation Bioinformatics

Partner(s) NA

Description Evoperf aims at providing the bases for robust and perfor-mance guaranteed evolutionary computations Such methods have a large

41 Research projects 85

spectrum of applications By choosing a system biomedicine applicationEvoperf aims at performing interdisciplinary research Many of the realworld problems are intractable (NP-Hard) whereas different approaches ex-ist including problem relaxation or local approaches However most tech-niques rely on stochastics to explore different starting points (iterated gradi-ent) or diversify the search (meta-heuristics) More than 15 years ago proofof convergences of stochastic based approaches were provided eg in [332]for simulated annealing and [333] for genetic algorithms But most of the re-search on genetic type particle algorithms evolutionary computation andorMonte Carlo literature seems to be developed with no visible connectionsto the physical or the mathematical sides of this field We mention thatthe design and the mathematical analysis of genetic type and branchingparticle interpretations of Feynman-Kac semigroups and vice versa (cf forinstance [347]) has been started by Prof Del Moral and his collaboratorsand acknowledged important advances [334 335] These nice theoreticalresults are however under-exploited In the current project we intend to ex-tend the approach to cutting edge parallel and robust multi-objective parti-cle algorithms (differential evolution cellular genetic algorithms) both at atheoretical and implementation level Validation will be carried on cuttingedge system biomedicine issues providing new modelstools for genepro-tein interaction networks Where appropriate a set of solvers will be usedas part of a multi player game Based on non-cooperative game theory itwas proved that these games converge to Nash equilibrium We will alsoinclude a decision-theory based approach that will regulate when and howthe different players exchange information and share the global cost functionby decomposition as to make Nash equilibrium correspond to global optima

Results The EvoPerf Project kickoff has taken place in 2011

The following human resources have been hired in 2011 Dr Xavier Besseronas Postdoc and Sune S Nielsen as PhD student

Publications NA

Privacy by DefaultAcronym DEFAULT-PRIVReference F1R-CSC-PUL-12DEPRPI Prof Dr Sjouke MauwFunding ULBudget 192853eBudget UL 192853eDuration 2012-09-01 ndash 2014-08-31

86 Projects and Grants in 2012

Members Sjouke Mauw Hugo Jonker

Domain(s) privacy verification formal analysis social networks mobilenetworks

Partner(s) Goethe University Frankfurt Germany

Description With the online proliferation of user-generated content (egblogs Youtube) and social media (eg Twitter Facebook) a new phe-nomenon has occurred people nowadays have a digital online rdquoliferdquo Rela-tions to others photos attended events opinions on current events all ofthis and more may be found online

As in real life privacy of the individual concerned must be safeguardedHowever the experience of privacy in the real world does not translate di-rectly to privacy in the digital life Privacy-sensitive aspects of the digitallife can leak out as in the real world but unlike the real world they are notbound to their context An angry letter in a newspaper will be used the nextday to wrap the fish but an angry letter online can still be found for yearsto come Whereas printed photos are by default stored in one album thedefault for digital photos is copying - website to browser camera to harddisk hard disk to email etc

The goal of this project is to connect user experience of privacy in real lifewith privacy offered in digital life and so overcome the divorce betweenthem As such the project investigates the effects of this divorce in andexplores possible resolutions for several aspects of digital life

bull Protecting user-generated contents

bull Keeping digital life fragmented

bull Mobile privacy

The project does not aim to enforce privacy ndash as in real life an individualrsquosprivacy may be breached by others (eg gossip) Instead the goal is toensure rdquoprivacy by defaultrdquo it may be possible to violate privacy to do soan individual needs to take conscious steps

Results The project started in September 2012 and so far has led to acollaboration with Verimag laboratory (Grenoble France) on verifiability ofonline auctions which has been submitted to ASIA-CCSrsquo13

Publications NA

41 Research projects 87

A Formal Approach to Enforced Privacy in e-ServicesAcronym EPRIVReference PUL-09EPRIPI Prof Dr Sjouke MauwFunding ULBudget 254955eBudget UL 254955eDuration 2009-05-01 ndash 2012-04-30

Members Sjouke Mauw Jun Pang Hugo Jonker Naipeng Dong

Domain(s) enforced privacy verification formal modelling e-services

Partner(s) ENS Cachan Paris France

Description Privacy has been a fundamental property for distributed sys-tems which provide e-services to users In these systems users become moreand more concerned about their anonymity and how their personal infor-mation has been used For example in voting systems a voter wants tokeep her vote secret Recently strong privacy properties in voting suchas receipt-freeness and coercion-resistance were proposed and have receivedconsiderable attention These notions seek to prevent vote buying (where avoter chooses to renounce her vote) These strong notions of privacy whichwe will call enforced privacy actually capture the essential idea that pri-vacy must be enforced by a system upon its users instead of users desiringprivacy The first aim of this project is to extend enforced privacy fromvoting to other domains such as online auctions anonymous communica-tions healthcare and digital rights management where enforced privacy isa paramount requirement For example in healthcare a patientrsquos healthrecord is private information However a patient contracting a serious dis-ease is at risk of discrimination by parties aware of her illness The inabilityto unveil (specific parts of) the health record of a patient is a minimal re-quirement for her privacy The second aim of the project is to develop adomain-independent formal framework in which enforced privacy proper-ties in different domains can be captured in a natural uniform and preciseway Typically enforced privacy properties will be formalized as equivalencerelations on traces which take into account both the knowledge of the in-truder and the users Within the framework algorithms can be designed tosupport analysis of e-service systems which claim to have enforced privacyproperties In the end the formalization and techniques will be applied toverify existing real-life systems and to help the design of new systems withenforced privacy properties

Results The project finished in 2012 In that year the project resultedin 3 conference papers [141] at ESORICSrsquo12 [144] at EVOTErsquo12 [141] at

88 Projects and Grants in 2012

FHIESrsquo11 and one book chapter [5] in Digital Enlightenment Yearbook 2012The projectrsquos EVOTErsquo12 paper Random Block Verification Improving theNorwegian Electoral Mix Net [144] won the best paper award of the confer-ence In the context of the project the Second International Summer Schoolon Secure Voting was organized in Schloszlig Dagstuhl Germany

Publications The following publications resulted from the project in2012 [141] [144] [141] [5]

Better e-Learning Assignments System TechnologyAcronym BLASTReference F1R-CSC-PUL-10BLASPI Prof Dr Denis ZampunierisFunding ULBudget 165000eBudget UL NADuration 2010-09-01 ndash 2012-08-31

Members Sandro Reis Denis Shirnin Denis Zampunieris

Domain(s) Proactive computing E-learning Online assignments manage-ment system

Partner(s) NA

Description The project aims at the design and implementation of aproactive online assignments system for blended teachings at the Univer-sity of Luxembourg which will actively support students as well as teachersin a collaborative way The main output product of this research and devel-opment project will be an online assignments system with advanced featureswhile remaining easily usable by every user beginner or expert that is usefulfor our teachings and which will be based on software currently in use at theUL The design will rely on the innovative concept of proactive computingapplied to the e-learning technologies field Indeed instead of waiting foruser interaction like in existing reactive learning management systems ourproactive assignments system (embedded into a standard e-learning plat-form) will allow us to define analysis and management rules that will beapplied autonomously by the system to support and drive the workflowwhen a teacher online assigned tasks to students The possible rules willrange from simple reminders and notifications to both parties to the mostelaborated automatic detection of potential problems based on successivedetection of (non-) events over a period of time

Results NA

41 Research projects 89

Publications NA

Model Composition for Executable ModelingAcronym COMPEXReference F1R-CSC-PUL-10MCEMPI Prof Dr Pierre KelsenFunding ULBudget 173KeBudget UL NADuration 2011-10-01 ndash 2013-09-30

Members Pierre Kelsen Nuno Amalio

Domain(s) Model-Driven Software Development Model Composition Ex-ecutable Modeling Software Engineering

Partner(s) NA

Description In model-driven software development models are the pri-mary artifacts for constructing software Model composition helps in master-ing the complexity of model-driven development Most of the current modelcomposition techniques can be viewed naturally as model transformationstaking two input models and producing one output model In our workwe have introduced a new composition technique for building executablemodels It has several properties that traditional composition techniques donot have it is additive rather than transformational it can be applied toany meta-model and it has a formal semantics The present project willinvestigate the power of our composition technique In particular we willcompare our technique with approaches from aspect-oriented modeling thatare typically used to express crosscutting concerns The project will inves-tigate whether our approach can be extended to match the power of thesetechniques andor how it can complement the existing approaches in mod-eling systems in a more straightforward elegant and light-weight mannerThe main goal is to enhance our current modeling framework and tool forexecutable modeling with new model composition techniques so that theycan handle not only the academic examples studied so far but can be usedeffectively on larger systems

Results The following results have been achieved on this project

bull A paper comparing different aspect-oriented modelling approaches in-cluding VCL [368]

bull A paper [369] a master thesis (of Eric Tobias 2012) and a techni-

90 Projects and Grants in 2012

cal report [370] with a comparative study that compares VCL againstother Visual Modelling Languages (VMLs) Part of the criteria forthis comparison is precisely VCL mechanisms of composition and de-composition

bull VCL has been applied to a case study from the modelling and aspect-oriented communities A technical reporting presenting a VCL modelof this case study [371] was presented at a workshop on comparingModelling Approaches of conference Models 2012

bull VCL has been applied to an industrial case study coming from theresearch community of formal methods This resulted in a paper [367]a technical report [372] and a masters thesis (Jerome Leemans 2011)

bull VCL and its composition mechanisms have been applied to a largecase study coming from the research efforts of CRP Henri Tudor onuser interfaces This work is part of Eric Tobias Master Thesis (2012)We intend to work towards a publication regarding this piece of workin close collaboration with the CRP in 2013

Publications NA

Dynamic and Composite Service-Oriented Architecture Secu-rity TestingAcronym DYNOSOARReference NAPI Prof Dr Yves Le TraonFunding ULBudget NABudget UL NADuration NA

Members Tejeddine Mouelhi Jacques Klein

Domain(s) Model-driven engineering Security testing SOA

Partner(s) NA

Description In Dynosoar project we aim at proposing reconfigurationcapabilities to Service-Oriented Architecture (SOA) targeting user-definedsecurity policies which can be trusted through innovative security testingmethods and tools SOA aims at decreasing the level of coupling betweenservices and at increasing the reuse evolution and adaptation of the sys-tem A SOA consists of an orchestration that models the services and the

41 Research projects 91

control flow of events between services A service integrator composes thesedifferent services (maybe dynamically discovered on the web) to propose anew composite service From this perspective SOA offers a very excitingsolution for building composite distributed systems Services are dynamicand highly reconfigurable a service integrator can compose different ser-vices in many different ways each service proposing different variants Itrapidly leads to the combinatorial explosion of possible composite servicesAmong reconfiguration criteria one aspect is becoming crucial for trustinga configured orchestration its capacity to embed a reconfigurable securitypolicy In Dynosoar we consider security policies dedicated to SOA whichallow each user expressing how her data can be manipulated into an or-chestration The problem is thus (1) to select valid orchestrations amongthe huge number of possible reconfigurations and (2) to test the robustnessof security mechanisms of the selected orchestrations Dynosoar addressestwo crucial dimensions the generation of valid orchestrations embedding asecurity policy from the set of possible reconfigurations and the final secu-rity testing of orchestrations The hard points we focus on are 1) choosingamong a possibly infinite number of services (re)configurations the smallestand more relevant subset which have to be tested This subset of serviceconfigurations must satisfy the security policy as well as sequential executionconstraints 2) testing one specific configuration in isolation ie withoutreal external service providers We specifically target the security policieswith testing

Results NA

Publications NA

414 UL PhD PostDoc

Seamless Communication for Crisis ManagementAcronym SECRICOMReference NAPI Prof Dr Thomas EngelFunding FullbrightBudget NABudget UL NADuration 2008-09-01 ndash 2012-04-30

Members Thomas Engel Sheila Becker

92 Projects and Grants in 2012

Domain(s) Security

Partner(s)

bull QinetiQ Ltd

bull Ardaco as

bull Bumar Ltd

bull NEXTEL SA

bull Infineon Technologies AG

bull Institute of Informatics Slovak Academy of Sciences

bull Graz University of Technology

bull Smartrends sro

bull ITTI Sp z oo

bull British Association of Public Safety Communication Officers

bull CEA LETI

bull Hitachi Europe SAS

Description Peer-to-peer real-time communication and media streamingapplications optimize their performance by using application-level topologyestimation services such as virtual coordinate systems Virtual coordinatesystems allow nodes in a peer-to-peer network to accurately predict latencybetween arbitrary nodes without the need of performing extensive measure-ments However systems that leverage virtual coordinates as supportingbuilding blocks are prone to attacks conducted by compromised nodes thataim at disrupting eavesdropping or mangling with the underlying commu-nications

Recent research proposed techniques to mitigate basic attacks ( inflationdeflation oscillation) considering a single attack strategy model where at-tackers perform only one type of attack In this work we define and usea game theory framework in order to identify the best attack and defensestrategies assuming that the attacker is aware of the defense mechanismsOur approach leverages concepts derived from the Nash equilibrium to modelmore powerful adversaries We apply the game theory framework to demon-strate the impact and efficiency of these attack and defense strategies usinga well-known virtual coordinate system and real-life Internet data sets

41 Research projects 93

Thereafter we explore supervised machine learning techniques to mitigatemore subtle yet highly effective attacks ( frog-boiling network-partition)that are able to bypass existing defenses We evaluate our techniques onthe Vivaldi system against a more complex attack strategy model whereattackers perform sequences of all known attacks against virtual coordinatesystems using both simulations and Internet deployments

Results The exploitation of existing publicly available communication net-work infrastructure with interface towards emerging SDR systems Interop-erability between heterogeneous secure communication systems A paralleldistributed mobile agent-based transaction system for effective procurementInfrastructure based on custom chip-level security

Publications NA

The Snippet System - A Fine-Granular Semantic-Aware DataStoreAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding ULBudget NABudget UL NADuration 2010-11-01 ndash 2013-10-31

Members Laurent Kirsch (PhD candidate) Steffen Rothkugel (supervi-sor)

Domain(s) compound documents file systems semantic desktop

Partner(s) NA

Description The Snippet System represents a novel data storage approachtackling several problems and shortcomings inherent to traditional file sys-tem based document management One of the main targets of the SnippetSystem is to improve human computer interaction by introducing new datamanagement facilities which enable a more intuitive way of working withdata and information By developing these file system level data manage-ment concepts with the usability of the system in mind it is possible toconsider usability aspects already in the design of the data storage architec-ture This in turn allows the realization of concepts like so-called Relationsand vFolders which contribute to a better user interface and interactionscheme

94 Projects and Grants in 2012

Results NA

Publications 1 conference publication [350]

Analysis of low-latency anonymisation networksAcronym NAReference I2R-NET-COM-110000PI Prof Dr Thomas EngelFunding funded on Fp7 EFIPSANS until 31122010 - Net-

LabBudget 37KyearBudget UL NADuration 2008-11-15 ndash 2012-11-14

Members Thomas Engel Thorsten Ries

Domain(s) Anonymity privacy low-latency anonymisation networks anonymi-sation network performance

Partner(s) NA

Description For various reasons low-latency anonymisation systems likeTor I2P JonDonym or proxy based solutions are widely used nowadaysoffering a certain performance and protection against adversaries Howeverit is very difficult for users to evaluate these systems especially when itcomes to the degree of anonymity Therefore the goal of this work is toprovide measures for users in order to evaluate the systems in regard toanonymity and performance

Basis of the work are performance evaluations of typical anonymisation sys-tems in regard to throughput round trip time and packet variation In orderto describe the degree of anonymity an attack using virtual network coordi-nate systems will be defined that allows an instant degradation of anonymityby positioning users geographically which aim to stay anonymous Classifi-cation algorithms like Support Vector Machines and Instance Based learningalgorithms will be used to allow the calculation of the degree of anonymityFinally a comparison to existing approaches will be provided

A second emphasis is on anonymisation performance particularly on Torthe most prevalent anonymisaton system nowadays Existing performancemetrics will be reviewed and evaluated aiming to improve the overall per-formance in terms of throughput and round trip time by an optimised relaynode selection for instance

Results The major outcome of this project is expected to be a quantifi-

41 Research projects 95

cation of anonymity in anonymisation networks by making use of virtualnetwork coordinate systems in order to identify node locations and by thisto provide an anonymity measure for users Another result will be perfor-mance improvements of the Tor anonymisation network

Publications [273 274 280]

Sociality and Self-Organization in Next-Generation DistributedEnvironmentsAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding AFRBudget NABudget UL NADuration 2009-02-01 ndash 2012-01-31

Members Jean Botev (Post Doc) Steffen Rothkugel (supervisor)

Domain(s) large-scale distributed environments sociality self-organization

Partner(s)

bull National University of Singapore

bull George Mason University USA

bull Universitat Trier

Description The proliferation of computationally powerful interconnecteddevices entails a new generation of networked applications and social utilitiescharacterized by a strong growth in scale and dynamics Distributed virtualenvironments constitute a privileged example involving a high degree of in-teractivity as well as tightened constraints and requirements As a responseto these issues this dissertation explores and substantiates sociality as a fun-damental principle both in and for the design of such systems A specializeddual peer-to-peer architecture is introduced combining a highly-structuredbackbone overlay with a loosely-structured geometric client overlay synergis-tically complementing each other To enable a global-scale single-instancedenvironment it is imperative to include as many client-side resources as pos-sible and unburden the backbone The focus of this dissertation thereforelies upon the latter geometric overlay By taking an interdisciplinary per-spective and leveraging different aspects of sociality a series of self-organizedapproaches addressing major problem areas are proposed a collaborative

96 Projects and Grants in 2012

filtering mechanism for the handling of information overload created fromthe soaring amounts of users and objects a confidentiality framework for theprotection of sensitive data more likely exposed due to an increased inter-activity and two resource allocation schemes for fairly distributing surpluscapacities in the face of critical regional surges Detailed evaluations showthat these decentralized algorithms operate robustly and effectively whileyielding well-converging results in comparison to optimal global-knowledgescenarios

Results NA

Publications 3 peer-reviewed conferences [297] [308][296]and one PhDthesis [352]

Honeypot and Malware AnalysisAcronym Honeypot and Malware AnalysisReference I2R-DIR-PIC-09SECPI Prof Dr Thomas EngelFunding AFR-PPPBudget 37KyearBudget UL NADuration 2011-10-15 ndash 2014-10-14

Members T Engel S Marchal

Domain(s) Is- Information and Communication Technologies Honeypotmalware analysis malware detection passive DNS network traffic analysis

Partner(s) CETREL

Description This research proposal presents the development of a newkind of honeypot Honeypots are widely used for more than ten years nowfor several purposes such as threat detection mitigation of the impact of net-work attacks malware analysis automatic generation of wormsrsquo signatureetc However honeypots are often designed to particular network applica-tions or services to offer a tailor-made threat detection and deflection Inthis proposal I exhibit potential new wider applications of honeypots lever-aging passive DNS analysis DNS probing and fast network traffic analysisin order to protect a specific network from its specific threats I highlightseveral areas for active research and provide an overview on existing ap-proaches This project is part of a public private partnership between SnTand CETREL SA and will be realized in the framework of a PhD coveringa 3 year period

41 Research projects 97

Results NA

Publications 2 peer-reviewed conferences [363 362]

Routing and mobility management in vehicular networksAcronym NAReference I2R-NET-PFN-10MOVEPI Prof Dr Thomas EngelFunding FNR - CORE MOVEBudget 37KyearBudget UL NADuration 2011-09-01 ndash 2014-08-31

Members T Engel M Mouton

Domain(s) NA

Partner(s) NA

Description research in the area of Vehicular Ad Hoc Networks (VANETs)A VANET is an emerging network technology which enables data com-munication between vehicles and the Internet The network protocols andhardware have been specifically designed for efficient data exchange in vehic-ular environments The high mobility and intermittent network connectivityraise major challenges for both security and network management tasks

The main contribution of the thesis of Maximilien Mouton consists in -The setup and maintenance up a simulationemulation platform that canbe used for large scale protocol validation and analysis (joint research withUCLA) - Integration of realistic mobility and signal propagation models -Identifying and proposing new application specific routing mechanisms formobile vehicular networks - Investigation of application specific dissemina-tion techniques (eg traffic

Results NA

Publications NA

98 Projects and Grants in 2012

Securing Mission Operations using Multi-Level SecurityAcronym SMO-MLSReference I2R-NET-PAU-11ELSKPI Prof Dr Thomas EngelFunding European Space AgencyBudget 48800e

UL - 37077 eBudget UL NADuration 2010-11-01 ndash 2014-10-30

Members Thomas Engel ESkoutaris

Domain(s) Spacecraft mission control systems MLS security

Partner(s) ESAESOC Germany

Description SMO-MLS is an ongoing research project that aims to pro-viding an enhanced security support at the spacecraft control infrastructureof ESAESOC by establishing multi-level security (MLS) solutions on itsMission Control System (MCS) Within this research activity MLS solu-tions will ensure an enforced separation of command and control data flowsof different sensitivity and classification levels between missions and also be-tween individual payload data flows of the same mission SCOS-2000 (S2K)is the ESA generic software infrastructure implementing the common fea-tures required by a spacecraft MCS Therefore a SCOS-2000 MLS prototypeis to be developed and built upon an operating system that supports multi-level security (ie Security-Enhanced Linux) The primary three objectivesof this project and that represent the direct security needs of future spacemissions are

(A) Enforcement of integrity policies between telecommand chain data flows(B) Enforcement of integrity policies between telemetry chain data flows (C)Confidentiality of third party telecommand chain data flows

This research project will advance the research on the area of MLS systemsand will provide an MLS model tailored for spacecraft command and controlsystems

Results As a result of this project a prototype MLS system based oncurrent ESA mission control system infrastructure will be developed andimplemented This may include the development of specific protocols andprocedures Such protocols may be subject to standardization

Publications NA

41 Research projects 99

Mobility Optimization using Vehicular network technologies(MOVE)Acronym MOVEReference I2R-NET-PFN-10MOVEPI Prof Dr Thomas EngelFunding CORE- MOVEBudget 37KYearBudget UL NADuration 2011-11-15 ndash 2014-11-14

Members T Engel M Forster R Frank J Francois A Panchenko MMouton L Dolberg

Domain(s) ICT

Partner(s) UCLA (non contracting)

Description The student will be working on the FNR MOVE projectThe goal of this project is to optimize vehicular traffic flows using ubiqui-tous network technologies (eg VANET 3G) The student will focus ondeveloping new traffic flow deviation paradigms that can be employed toreduce vehicular traffic congestion for urban and highway scenarios

Vehicular Ad Hoc Networks (VANETs) are mobile networks specificallysuited for vehicular environments Moreover the student will focus on spe-cific optimisation problems related to vehicular traffic flows Using VANETswill allow specifying decentralised and distributed coordinated algorithms toprovide the drivers with smart navigation services

The main contributions of the thesis of Markus Forster consist in - Iden-tifying the specificity of the vehicular traffic for the area of Luxembourg -Understanding the limitations and bottlenecks of the current Luxembour-gish road network - Modelling of the traffic in order to realistically reproducethe flow behaviour in a simulations environment - Testing existing and novelflow optimisation techniques that will allow to improve

Results NA

Publications NA

100 Projects and Grants in 2012

Service Dependency and Anomaly DetectionAcronym NAReference I2R-NET-COM-110000PI Prof Dr Thomas EngelFunding Funded on FP7 EFIPSANS project until 31122010

- NetLabBudget NABudget UL NADuration 2008-11-01 ndash 2012-10-31

Members T Engel C Wagner

Domain(s) NA

Partner(s) NA

Description NA

Results NA

Publications The following articles have been published in 2011 1 jour-nal [271] and 3 peer-reviewed conferences [306] [278] [279]

Individual and Collective ReasoningAcronym ICRReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding UL-PHDBudget NABudget UL NADuration 2008-03-12 ndash 2012-03-12

Members Gabriella Pigozzi Marija Slavkovik Leon van der Torre

Domain(s) Judgment aggregation Group-decision making Social choicetheory Normative systems

Partner(s) NA

Description Traditional decision-making is driven by the concept of a ra-tional agent who acts in his own best interest by maximizing the expectedutility Opposite to the rational agent modeled as Homo Economicus peopledo not make decisions by generating alternative options and by comparingthem on the same set of evaluation dimensions nor do they generate prob-ability and utility estimates for different courses of action They search for

41 Research projects 101

what Herbert A Simon called satisficing or ldquogood enoughrdquo decisions Wedefine a satisficing decision as one that is determined by making a yesnoestimate for each element of a given set of decision-relevant criteria Theaim of this project is to investigate how groups of artificial agents can reachsatisficing decisions The contribution of the thesis is threefold For the areaof multi-agent systems we propose a new way in which group decisions canbe reached As a show-case we apply our decision-reaching method to theroblem of determining group intentions For the field of judgment aggrega-tion our contribution is a new set of judgment aggregation operators Forthe field of belief merging our contribution is the identification of a newproblem of iterated belief merging

Results

bull In order to avoid an untenable collective outcome individuals mayprefer to declare a less preferred judgment set Thus the prospect ofan individual trying to manipulate the social outcome by submittingan insincere judgment set is turned from being an undesirable to aldquovirtuous (or white) manipulation In [349] we defined and studiedwhite manipulation as a coordinated action of the whole group

bull In [348] we presented an aggregation procedure providing completejudgment sets ie judgment sets with premises and conclusion Weshowed that our procedure satisfies the desirable properties of non-manipulability and it can be modified to preserve unanimity on thepremises

bull In order to show the practical applicability of group decision-reachingthrough judgment aggregation we studied the problem of determin-ing group intentions based on declared beliefs or acceptances of thememebers In [328] we present a formal model for deciding on collec-tive intentions and study the related group commitment and intentionrevision problems

Publications Marija Slavkovik

102 Projects and Grants in 2012

Understanding Financial Topics and their Lifetime in TextualNews by the Content Aging TheoryAcronym NAReference F2R-LSF-PFN-11ESCAPI Prof Dr Christoph SchommerFunding FNR COREBudget 500000Budget UL NADuration 2012-06-01 ndash 2015-05-31

Members Christoph Schommer Roxana Bersan Dimitrios Kampas An-dreas Chouliaras Theoharry Grammatikos Yannis Ioannidis

Domain(s) Computational Finance Topic Extraction Content AgingTheory Machine Learning Text Mining

Partner(s)

bull Dept of Finance (Luxembourg School of Finance)

bull Dept of Computer Science

bull University of Athens Dept of Computer Science

Description The project is part of the FNR CORE project ESCAPEESCAPE applies Data Mining and Machine Learning methods on publiclyavailable news sources to document in a measurable way the structure andevolution of Europersquos financial policy to address the on-going threat to theEuro-zone stability How do the important euro policy players present them-selves in the pallet of the policies map Are there subgroups with similarpositions How coherent are these groups among themselves Are theredominant players in each group How different are the different group posi-tions One expects that the euro players eventually will reach a consensuspolicy to stem the risk threatening the EURO Documenting in a measur-able way how the different policy positions converge over time should provideadditional insights into the complex process of (financial) policy evolutionFinancial policy ultimately affects capital markets but as the recent cri-sis has highlighted capital markets may force or extract policy concessionsUnderstanding the interplay of financial policy formulation and capital mar-ket ex-pectations therefore is extremely important for the effectiveness ofpolicy responses and eventually for the stability of the financial system ES-CAPE provides statistical evidence on whether capital markets lead or reactconcurrently to the financial policy evolution It is expected to shed lighton the powerful role of the ldquoinvisible handrdquo of capital markets in extractingdesired policies from politicians

41 Research projects 103

The research project concerns the identification of financial topics in Thom-son Reuters News data The extraction of this kind of information will beperformed based on machine learning and content aging theory methodsWe are currently working on the mathematical formalization of this systemThe extraction of this kind of information will be used by financial expertsto better understand the Sovereign Debt Crisis in Europe

Results

bull We were concerned with masses of financial news data from Thom-son Reuters (gt 2TB) the understanding of the data structure themanagement of the data and its preprocessing

bull We have elaborated on and worked out Topic ExtractionFinding indetail

bull Extensive Literature Review Topic Extraction and Content AgingTheory

bull Paper writing which has led to a conference paper to be presented atICAART 2013 in Barcelona

Publications to appear in 2013 at ICAART 2013

Smart Predictive Algorithms for Spacecraft AnomaliesAcronym SPACEReference I2R-DIR-BPI-11SCHOPI NAFunding SnTBudget NABudget UL NADuration 2011-07-09 ndash 2017-07-08

Members F Bouleau Prof Schommer Prof Bouvry Dr Krier

Domain(s) Keywords Fourier fit least square Kalmanrsquos filter data min-ing artificial intelligence pattern matching data stream decision helpingclassification correlation

Partner(s)

bull University of Luxembourg Dept of Computer Science and Commu-nication

bull SES Astra

104 Projects and Grants in 2012

Description Geostationary satellites are monitored from Earth to captureand react on anomalies A stream of sampled sensor information (telemetry)is downloaded by a ground control system which is processing and storing theinformation in dedicated databases which grow very large over the satellitelifetime (up to 20 years) The satellite engineers crew who is analyzing thisdata nevertheless take less than 10

Results My interest is on one hand to use the mathematical modellingcreated by the satellite engineers to optimize browsing into the telemetrydatabase and help in the pattern matching and classification that will belinked to the existing reports database On the other hand an artificialintelligence algorithm will use the classified patterns in order to correlate thereports with other events and provide analysis and decision helping elements

Publications in progress

An Incremental System to manage Conversational StreamsAcronym INACSReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding ULBudget NABudget UL F1R-CSC-LAB-05ILIADuration 2009-02-01 ndash 2013-01-14

Members Jayanta Poray Christoph Schommer Raymond Bisdorff ThomasEngel

Domain(s) Adaptive Systems Graph Theory and Modelling Chat Con-versation Computational Reputation

Partner(s)

bull Dept of Computer Science ILIAS Lab

Description The research project is inspired by the information process-ing mechanism of the human brain where every input signal is realisedprocessed and stored in a highly sophisticated manner The goal has beento develop a robust information processing system for text streams in theform of explorative and adaptive mind-graphs to use this structured infor-mation to fulfil textual conversational challenges between artificial agents

Results The thesis has been successfully submitted and defended(December 13 2012)

41 Research projects 105

Publications

1 J Poray and C Schommer Operations on Conversational Mind-Graphs In Proceedings of the 4th International Conference on Agentsand Artificial Intelligence pp 511-514 Vilamoura Algarve Portugal

Feature Extraction and Representation for Economic SurveysAcronym FERESReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding Internal Doctoral PositionBudget Internal Doctoral PositionBudget UL NADuration 2011-04-01 ndash 2014-03-31

Members Mihail Minev Christoph Schommer Theoharry GrammatikosUlrich Schaefer Philippe Karas

Domain(s) News Analytics Feature Extraction Course Volatilities EventClassification Trend Prediction

Partner(s)

bull Dept of Computer Science ILIAS Lab

bull Luxembourg School of Finance University Luxembourg

bull German Research Center for Artificial Intelligence (DFKI) GmbH

bull Thomson Reuters Finance SA

Description The study concerns the manifold news articles which re-flect the adjustments in the monetary policy during the financial crisis Inparticular we consider official decisions conducted by the Federal ReserveSystem but also information leaks in the press One goal of this work isto retrieve and quantify such information using modern pre-processing andtext mining techniques Further the implications of news on the stock mar-kets are examined by discovering and modelling composite index volatilitiesas functions of key announcements A model for the prediction of pricetrends is targeted which should reveal the economic value of informationHere an important aspect is the definition extraction and management oftopic-related features Keywords data projection feature selection newsclassification monetary policy stock markets

106 Projects and Grants in 2012

Results

bull Discovery of a strong evidence for a measurable link between eventsrelated to monetary policy and stock market volatilities

bull Proposal for a comparison framework of computer science projectswhich aim news classification and trend forecasting

bull Identification of information sources and sophisticated data character-istics

bull Design of a procedure model containing the data workflow and themilestones for the learning and the operational phase

bull Project presentation at the ldquoTrusted ICT for Financerdquo organized bythe Digital Enlightenment Forum Luxembourg

Publications

bull M Minev C Schommer T Grammatikos News and stock marketsA survey on abnormal returns and prediction models Technical Re-port August 2012

bull C Schommer and M Minev Data Mining in Finance PresentationTrusted ICT for Finance Luxembourg April 2012

Sentiment Classification in Financial TextsAcronym NAReference F2R-LSF-PFN-11ESCAPI Prof Dr Christoph SchommerFunding FNR COREBudget 500000Budget UL NADuration 2012-06-01 ndash 2015-05-31

Members Christoph Schommer Roxana Bersan Dimitrios Kampas An-dreas Chouliaras Theoharry Grammatikos Yannis Ioannidis

Domain(s) Computational Finance Sentiment Analysis Machine Learn-ing Text Mining Natural Language Processing

Partner(s)

bull Dept of Finance (Luxembourg School of Finance)

41 Research projects 107

bull Dept of Computer Science

bull University of Athens Dept of Computer Science

Description The work is part of the FNR CORE project ESCAPE ES-CAPE applies Data Mining and Machine Learning methods on publiclyavailable news sources to document in a measurable way the structure andevolution of Europersquos financial policy to address the on-going threat to theEuro-zone stability How do the important euro policy players present them-selves in the pallet of the policies map Are there subgroups with similarpositions How coherent are these groups among themselves Are theredominant players in each group How different are the different group posi-tions One expects that the euro players eventually will reach a consensuspolicy to stem the risk threatening the EURO Documenting in a measur-able way how the different policy positions converge over time should provideadditional insights into the complex process of (financial) policy evolutionFinancial policy ultimately affects capital markets but as the recent cri-sis has highlighted capital markets may force or extract policy concessionsUnderstanding the interplay of financial policy formulation and capital mar-ket ex-pectations therefore is extremely important for the effectiveness ofpolicy responses and eventually for the stability of the financial system ES-CAPE provides statistical evidence on whether capital markets lead or reactconcurrently to the financial policy evolution It is expected to shed lighton the powerful role of the ldquoinvisible handrdquo of capital markets in extractingdesired policies from politicians

The research topic that Mrs Bersan is addressing is sentiment analysisnamely identifying subjective information in the financial news We analyzea specific topic and assign this subjective information to a mathematicalindex in order to reflex its polarity orientation The techniques used are fromthe research fields of machine learning text analytics and natural languageprocessing

Results

bull We were concerned with masses of financial news data from Thom-son Reuters (gt 2TB) the understanding of the data structure themanagement of the data and its preprocessing

bull We have elaborated on and worked out Sentiment Classification indetail

bull Extensive Literature Review Sentiment Analysis (vs Opinion Min-ing Polarity Classification)

bull Paper writing which has led to a conference paper to be presented atICAART 2013 in Barcelona

108 Projects and Grants in 2012

Publications A first scientific paper will be published at ICAART 2013in Barcelona

Artificial Conversational CompanionsAcronym SPARCReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding NABudget NABudget UL NADuration 2011-04-01 ndash 2014-03-31

Members Sviatlana Danilava Christoph Schommer Gudrun Ziegler StephanBusemann

Domain(s) Artificial Companions Conversational Agents Models of In-teraction Interaction Profiles Long-Term interaction between human users

Partner(s)

bull University Luxembourg Dept of Computer Science and Communica-tion

bull University Luxembourg Dica Lab

bull German Research Centre for Artificial Intelligence Saarbruecken

Description The goal of the project is design and implementation of anArtificial Conversational Companion (ACC) which helps foreign languagelearners to improve their conversation skills In order to model a long-terminteraction with an ACC via instant messaging dialogue for conversationtraining it is necessary to understand how natural long-term IM interactionbetween human language experts (usually native speakers) and languagelearners works Data from chat dialogues between advanced learners of alanguage L as a second language(L2) and native speakers of L who rdquojust chatrdquofor a longer period of time were collected A data-driven model of long-term interaction is in focus in particular modelling of usersrsquo interactionprofiles including usersrsquo responsiveness behaviour and learnersrsquo languageWe use methods of conversation analysis (qualitative research) to developcomputational models of long-term human-machine interaction

Results

1 Data collection We initiated long IM dialogues (ca 30-90 minutes)

41 Research projects 109

between advanced learners of German as L2 and German native speak-ers for a prolonged period of time (4-8 weeks) The participants pro-duced in total 72 dialogues which correspond to ca 2500 minutes ofIM interaction ca 4800 messages with ca 52000 tokens in total andca 6100 unique tokens The average message length is 10 tokens

2 Data analysis We obtained the initial model of responsiveness profilesfor the learners We developed an initial annotation scheme for thelearners language We annotate the corpus according to the scheme

Other Activities

1 International Conference on Agents and Artificial Intelligence (Vilam-oura Portugal) presentation on ldquoArtificial Conversational Compan-ions - A Requirements Analysisrdquo

2 DICA-Lab PhD Day 2012 presentation on rdquoComputational Models ofInteraction Based on Empirical Data from Chat Dialoguesrdquo

3 Seminar with the participants of the data collection Vitebsk Belarus

4 Participation in intervention ldquoChercheurs a lrsquoecole 2012rsquorsquo

5 Participation in Foire de lrsquoEtudiant 2012 (Invited by Ministere delrsquoEgalite des Chances)

Publications

1 S Danilava Ch Schommer and G Ziegler (2012) Long-term Human-machine Interaction Organisation and Adaptability of Talk-in-interactionPoster presentation CHIST-ERA Conference Edinburgh Scotland

2 S Danilava S Busemann and Ch Schommer (2012) Artificial Con-versational Companions - A Requirements Analysis In Proceedings ofthe 4th International Conference on Agents and Artificial Intelligence282-289 Vilamoura Algarve Portugal

Energy-efficient resource allocation in autonomic cloud comput-ingAcronym ERACCReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2010-10-01 ndash 2013-09-30

110 Projects and Grants in 2012

Members Cesar Diaz

Domain(s) Computer Science Information Science Cloud ComputingGreen Computing Resource Allocation Optimization

Partner(s) NA

Description In the new era of Information Technologies (IT) and glob-alization massive computing power is desired to generate business insightsand competitive advantage for enterprises Traditionally enterprises processtheir data using the computing power provided by their own in-house datacentres However maintaining and operating a private data centre to keepup with the rapid growing data processing request can be costly and com-plicated Cloud Computing (CC) offers an alternative It is a concept thathas emerged out of the conception of heterogenous distributed computinggrid computing utility computing and autonomic computing It promisesto provided on-demand computing power with little maintenance quick im-plementation and low cost Nevertheless electrical power consumption hasbecome a major concern in CC systems

Results Models and algorithms are developed for the energy-efficient man-agement of processing elements that comprises a CC Based on the state ofthe art we have designed low complexity green scheduling heuristics thatexploit the heterogeneity of computing resources published in [295] Theseheuristics were designed to take into account scalability issues of the system[294]

In parallel research on opportunistic Desktop Grid Computing is conductedin conjunction with researchers from University of los Andes ColombiaSome techniques like DVFS ACPI DPM and virtualization are also consid-ered Moreover we are also investigating resource allocation and schedulingmodels [293]

Publications NA

Integrity Issues on the CloudAcronym IICReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2011-01-16 ndash 2013-01-15

41 Research projects 111

Members Jakub Muszynski

Domain(s) cloud computing distributed computing security integrityfault-tolerance

Partner(s) NA

Description A simple concept that has emerged out of the conceptionsof heterogeneous distributed computing is that of Cloud Computing (CC)where customers do not own or rent any part of the infrastructure Theysimply use the available services and pay for what they use This approachis often viewed as the next IT revolution similar to the birth of the Webor the e-commerce CC naturally extends grid computing Even if thislast domain attracted academic interest for several years it hardly caughtindustrial attention On the contrary CC arouse enthusiasm and interestfrom the same actors probably because it formalizes a concept that reducescomputing cost at a time where computing power is primordial to reachcompetitiveness Additionally the technology to interface such platforms isnow mature enough to make this concept a reality as initiated by some ofthe biggest vendors worldwide (Google Amazon etc)

To transform the current euphoria on CC into concrete investments andwide acceptance several security issues still need to be fixed In this con-text this PhD proposal focus on integrity and fault-tolerance aspects inthe CC paradigm in order to provide guarantees on programs and data ei-ther before during or after a run on the CC platform More generally theidea is to provide qualified and quantified measures of the confidence overthe resources used the execution conducted and the results returned to theuser This involves the design of novel protocols based on TPM (TrustedPlatform Modules) so as to provide trusted executions and migration pathfor the virtual environment deployed on the CC platform It also requirenew contributions in result-checking techniques middleware hardening andgame-theory based trust management

Results The general robustness analysis of distributed Evolutionary Al-gorithms (dEAs) against cheating faults and crash-faults (subject startedduring previous year) was finished with publication in Computers amp Math-ematics with Applications journal As a result conditions of convergenceor non-convergence of dEAs executed in malicious environment were givenHaving promising results from previous work currently it is being extendedby the experimental and theoretical analysis of running times of dEAs Theaim of the work is to quantify the overhead introduced by malicious acts onthe execution time Influence of underlying connection network between theworking nodes is also explored with the main focus on the P2P networks

112 Projects and Grants in 2012

Additionally a subject of generating hash functions by means of Gene Ex-pression Programming (GEP) was studied Journal paper as an extensionof conference paper (presented at the rdquoCryptography and Security Systems2013rdquo) is currently in preparation

Publications [40]

Energy-Efficient Information Dissemination in MANETsAcronym NAReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2009-09-15 ndash 2012-09-14

Members Patricia Ruiz

Domain(s) Communication Protocols Mobile Ad Hoc Networks Energy-Efficiency Optimisation

Partner(s) NA

Description Patricia Ruiz is working on broadcasting algorithms over adhoc networks indeed over both mobile ad hoc networks (MANETs) and ve-hicular ad hoc networks (VANETs) During the first year she developed anenergy aware dissemination protocol based on the state of the art distancebased broadcasting algorithm for MANETs For that she did a cross-layerdesign that informs the upper layers about the reception energy at the phys-ical layer Thus upper layers can use this information to take decisions inorder to outperform the performance of the protocol

During the second year she improved the previous version of her work butalso made several extensions including new features and optimizations tothe protocol originally proposed The candidate has been using multiobjec-tive metaheuristics approaches to optimize the parameters of the differentvariants of the protocol

Results We are developing communication algorithms for ad hoc networksMore precisely dissemination algorithms for both MANETs and VANETsIn [330] an study of the performance of a tree topology over a VANETwas presented and also a comparison of different broadcasting algorithmsover different topologies for both MANETs and VANETs Considering theintrinsic energy constrain of MANETs an energy aware broadcasting algo-

41 Research projects 113

rithm (EDB hereinafter) was proposed in [329] This protocol is configuredby a set of different parameters that must be tuned for obtaining a goodperformance In order to optimize EDB we are using some multiobjectivealgorithm cellDE for finding the best possible configuration in [307] Thisalgorithm gives a set of feasible solutions that optimize the performance ofthe protocol in terms of some predefined objectives In [284] a new ver-sion of EDB the Adaptive Enhaced Distance Based broadcasting protocol(AEDB hereinafter) was optimized in terms of the energy used the coverageachieved and the broadcasting time The solutions were analyzed and somehints were given to the designer for choosing the parameters for promotingone objective or another Moreover in [290] the Enhanced Distanced BasedBroadcasting algorithm (EDB) was improved by using some social knowl-edge of the network A community detection technique was used in orderto improve the coverage achieved by EDB in sparse networks Additionallythe parameters of the new protocol were also optimized in terms of the samethree objectives we mentioned before

Publications NA

Smartphone Malware detection and mitigation with Static codeAnalysisAcronym NAReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2011-10-15 ndash 2014-09-30

Members Kevin Allix (PhD)

Domain(s) Security code static analysis android malware detection soft-ware engineering techniques

Partner(s) NA

Description By leveraging Static code analysis methods our researcheffort aims at improving our ability to detect known and unknown malwareusing heuristics-based detection technichs and similarity computation withnew fingerprinting schemes

Results This a starting PhD No results yet but a state of the art

Publications NA

114 Projects and Grants in 2012

Access Control Architectures From Multi-objective Require-ments to DeploymentAcronym ACAReference NAPI Prof Dr Yves Le TraonFunding ULBudget NABudget UL NADuration 2011-02-01 ndash 2014-01-31

Members Donia El Kateb (PhD)

Domain(s) NA

Partner(s) NA

Description The subject of the PhD thesis is ldquoAccess Control Architec-tures From Multi-objective Requirements to Deploymentrdquo Todayrsquos infor-mation systems are becoming more and more heterogeneous and distributedthis has impacted software systems which become more and more complexAdditionally software systems are a target to many changes that occur atthe environment level requirement level or at the system level This raisesthe necessity to consider multi-level requirements at their design of softwarearchitecture like functional requirements performance requirements secu-rity requirements etc Among the security requirements access control isthe most deployed one An access control architecture implements the re-quirements and enforces a policy that satisfies the requirements This thesisconsiders policy-based access control architectures and aims to build a gen-eral framework that defines an access control architecture that is supposedto comply to multi-level requirements and to respect multiple competingquality attributes security performance and so forth These attributes in-teract and improving one often comes at the price of worsening one or moreof the others In this thesis we reason about architectural decisions thataffect those quality attribute interactions

bull RQ1 How to ensure the tradeoff between security and performancewhen designing an access control architecture

bull RQ2 How to automate policy specification to assist policy writers toavoid policies errors so that the policy is compliant with the require-ments

bull RQ3 How to test the secure deployment of the access control ar-

41 Research projects 115

chitecture its compliance with the policies and how to do that in anoptimized fashion

Results More specifically during this first year the student did a stateof the art on access control and on security requirement engineering Shestudied one of the issues related the standard access control architecturenamely the performance issue caused by bottlenecks She successfully pro-posed a new solution for solving this issue and developed an automated toolthat implements this approach and enables improving current access con-trol architecture In addition during her first years she did an interestingwork on policy enforcement points (PEP) localization In fact it is impor-tant to locate the PEP in order to understand how security mechanism areimplemented and provide a way to improve the performance This workwas actually complementary to the work that she did on performance im-provement She implemented this approach and applied it successfully tothree case studies This work is under submission and will be submittedsoon She conducted this work in collaboration with Prof Tao Xie team(from North Carolina State University USA) who helped by providing casestudies used in the experiments The results were very promising since theperformance was improved up to 10 times This work has been submittedto ICPE conference and will appear in 2012

Publications NA

415 Other miscellaneous projects

Enterprise security for the banking and financial sectorAcronym BCEEReference I2R-Net-Pau-11PS2CPI Prof Dr Thomas EngelFunding BCEEBudget 204KeBudget UL NADuration 2011-04-01 ndash 2012-03-31

Members T Engel A Zinnen

Domain(s) security for the banking and financial sector

Partner(s) BCEE

116 Projects and Grants in 2012

Description Although many companies seem to approach the cloud com-puting paradigm at a faster pace the financial sector still remains an excep-tion Selling cloud computing to financial services companies seems prob-lematic The sector is known for its reluctance to give up control overoperations Additionally this area is characterized by a high number oflaws and regulations In Luxembourg banks are for example constrainedby law to store data within the country This fact contradicts the conceptof cloud computing in its current development The biggest challenge andkey success point in the implementation of cloud computing in the financialsector will be the assurance of safety policies

In Luxembourg this topic is a subject of special interest Resource poolingamong companies with similar interests would save administrative costs Onthe basis of a cloud environment banks could completely put their focus ontheir core competence However an open question is what steps will benecessary in order to achieve this goal In any case it will be important tofurther invest in research to fulfill the seven introduced security challengesA pilot project in cooperation with the Interdisciplinary Centre for SecurityReliability and Trust (SnT) provides preliminary work and an analysis of aframework to migrate financial services to cloud computing This work isdiverse and addresses both the identification of necessary research topics andthe exploration of services that might run in the cloud This evaluation isbased on a comparison of benefits versus riskschallenges for specific servicesA dialogue with legal and audit institutions as well as a discussion withsoftware providers will be a first step towards a framework for the financialcloud in Luxembourg

Results So far we have evaluated the protection of state-of-the art anonymiza-tion networks Anonymization networks such as Tor and JAP claim tohide the recipient and the content of communications from a local observerie an entity that can eavesdrop the traffic between the user and the firstanonymization node Especially users in totalitarian regimes strongly de-pend on such networks to freely communicate For these people anonymityis particularly important and an analysis of the anonymization methodsagainst various attacks is necessary to ensure adequate protection Weshowed that anonymity in Tor and JAP is not as strong as expected so farand cannot resist website fingerprinting attacks under certain circumstancesWe defined features for website fingerprinting solely based on volume timeand direction of the traffic As a result the subsequent classification be-came much easier We applied support vector machines with the introducedfeatures We were able to improve recognition results of existing works on agiven state-of-the-art dataset in Tor from 3 to 55 and in JAP from 20to 80

The datasets assume a closed-world with 775 websites only In a next step

41 Research projects 117

we transferred our findings to a more complex and realistic open-world sce-nario ie recognition of several websites in a set of thousands of randomunknown websites To the best of our knowledge this work is the first suc-cessful attack in the open-world scenario We achieve a surprisingly hightrue positive rate of up to 73 for a false positive rate of 005 Finally weshowed preliminary results of a proof-of-concept implementation that ap-plies camouflage as a countermeasure to hamper the fingerprinting attackFor JAP the detection rate decreases from 80 to 4 and for Tor it dropsfrom 55 to about 3

Publications Two conference publications [267] [266]

EPT Vehicular NetworksAcronym EPTVReference I2R-DIR-PAU-09EPTVPI Prof Dr Thomas EngelFunding EPTBudget 2 298 KeBudget UL NADuration 2010-01-01 ndash 2014-12-31

Members Thomas Engel Raphael Frank Marcin Seredynski

Domain(s) Vehicular Ad Hoc Networks

Partner(s) Entreprise des Postes et Telecommunications Luxembourg -EPT

Description A standard for vehicular ad hoc networks is expected during2011 In 2025 0 of the vehicle fleet within Europe is predicted to ap-ply to the standards enabling new services and application A main goalwill be to increase traffic safety and reduce the environmental impact ofthe vehicular transportation system The vision of the proposed researchproject is to develop efficient secure and reliable communication networksto enable the transformation of the vehicular transport system of today toa greener smarter and safer system Recent advances in sensor technologylow power electronics radio-frequency devices wireless communications se-curity and networking have enabled the engineering of intelligent vehiclesandintelligent transport infrastructure which have the potential to drasticallyincrease road safety decrease cost of transportation and contribute to a sus-tainable environment This research will address 3 main areas of vehicularnetworks 1) Sensor and Mobile Ad Hoc Networks 2) Embedded Systemsand 3) Applications and Services

118 Projects and Grants in 2012

Results NA

Publications NA

PIL to SPELL conversionAcronym Pil to SPELLReference I2R-NET-PAU-11PS2CPI Prof Dr Thomas EngelFunding SES-ASTRABudget Not applicableBudget UL NADuration 2011-01-28 ndash 2015-01-27

Members Thomas Engel Frank Hermann b Braatz

Domain(s) Satellite control language

Partner(s) SES-ASTRA

Description Until now satellite vendors operate their satellites in theirown satellite control languages which are restrictive proprietary dependenton 3rd party software and very heterogeneous As a consequence SES de-veloped SPELL (Satellite Procedure Execution Language and Library) as aunified and open-source satellite control language usable for each satellitevendor In order to migrate the existing procedures delivered by the man-ufacturer Astrium SES requested for an automated translation that takesAstrium PIL procedures as input and generates equivalent SPELL proce-dures This translation has to guarantee a very high standard regardingcorrectness and reliability in order to minimize the need for revalidation ofthe generated SPELL procedures

Results Fully automated translator from PIL to SPELL (project P1)

a SES and Astrium engineers successfully tested the generated SPELLprocedures - more than 15 man month of testing from 2011-12 till 2012-05

b First planned operational use for a satellite to be launched in 2nd halfof 2012

Publications 8 Related Publications 5 Journal papers 2 conferencepapers 3 technical reports

41 Research projects 119

INTERCNRSGDRI1102 Algorithmic Decision TheoryAcronym AlgoDecReference F1R-CSC-PFN-11ADECPI Prof Dr Raymond BisdorffFunding FNR ULBudget 11 000 eBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members P Bouvry Ch Schommer U Sorger L van der Torre

Domain(s) Algorithmic Decision Theory is a research area developed atthe edge of several disciplines including Operational Research Decision the-ory Computer Science Mathematics Cognitive and the Social Sciences

Partner(s)

bull CNRS France

bull Universite Paris-Dauphine France

bull Universite Pierre Marie-Curie France

bull Universite drsquoArtois France

bull Universite de Mons Belgique

bull FNRS Belgique

bull ULB Belgique

bull FNR Luxembourg

bull Uniersidad Rey Juan Carlos Spain

bull DIMACS USA

Description Its aim is at developing formal and analytical methods andtools in order to improve decision making in and for complex organiza-tions in presence of hard algorithmic challenges It also aims at establishinga comprehensive methodology aiding real decision makers within the realworld to better understand the problem situations where they are involvedshape analyze an explore the possible actions that can be undertaken andultimately help to make better decisions The founding partners of the AL-GODEC Network established by the present Agreement have more than 20years of joint research activities resulting in joint PhDs papers books andresearch projects (both client and knowledge driven) Today they represent

120 Projects and Grants in 2012

a leading force worldwide in the area of Decision Sciences and TechnologiesThe ALGODEC Network is expected to create synergy in order to organizejoint doctoral courses promote the co-tutoring of PhD students promotemobility of early stage and experienced researchers promote the joint impli-cation of cross-members teams to client-driven research contracts organizejoint seminars act as a unique reference in fund raising

Results NA

Publications NA

Developing a Prototype of Location Assurance Service ProviderAcronym LASPReference ESA Bidder Code 52056PI Prof Dr Sjouke MauwFunding ESA - SnTBudget 160000e (ESA)Budget UL 80000e (SnT)Duration 2010-12-08 ndash 2012-12-07

Members Sjouke Mauw Jun Pang Xihui Chen Gabriele Lenzini

Domain(s) location assurance privacy of location assurance locationbased services GNSS network security

Partner(s) itrust Luxembourg

Description The objective of this project is to develop a prototype toprovide a high quality level of assurance in the location information thatoriginates from the GNSS network while protecting location owners fromintrusions into their privacy We approach these objectives from five per-spectives Analysis The objective is to precisely describe the requirementsthe execution and threat models the trust relations and the assumptionson the environment Design The objective is to design an architecture forlocation information assurance and to develop data protection algorithmsand decision logic to find out the appropriate assurance level of the loca-tion information The protocols devoted to security and privacy are alsodeveloped and integrated in a service architecture Verification The objec-tive is to analyse the result of decision logic in presence of an attacker andevaluate the quality of the output of the designed algorithms Moreoverbased on existing formal verification approaches a verification methodologywhich considers trustworthiness of the service together with user privacy willalso be studied Validation The objective is to set up the LAP prototypeand perform a set of laboratorial tests in order to assess the overall perfor-

41 Research projects 121

mance The robustness and performance is optimized through parametertuning Exploitation The objective is to define risk management principlesand prepare a strategy that should apply to assure the requirements in alargest deployment of the solution

Results The project was accomplished in this December 2012 and theevaluation meeting will be carried out in February 2013 So far the projectteam has submitted all the reports required by ESA and these documentshave been approved and accepted by the agency A Luxembourgish PatentApplication which describes the design of the localization assurance providerhas been successfully filed

Publications NA

Combine Software Product Line and Aspect-Oriented SoftwareDevelopmentAcronym SPLITReference F1R-CSC-PFN-09SPLIPI Prof Dr Nicolas GuelfiFunding ULFNRBudget 41 000eBudget UL NADuration 2009-10-01 ndash 2012-09-30

Members Nicolas Guelfi Alfredo Capozucca Jean-Marc Jezequel OlivierBarais Benoit Baudry Benoit Ries Vasco Sousa

Domain(s) Software Engineering Model Driven Engineering SoftwareProduct Line Aspect Oriented Modeling Model Composition UML

Partner(s)

bull CNRSINRIA University of Rennes France

bull Public Research Center Gabriel Lippmann

Description Software engineering proposes practical solutions founded onscientific knowledge to produce and maintain software with constraints oncosts quality and deadlines The complexity of software increases dramati-cally with its size A challenging trade-off for software engineering exists ina reality where the amount of software in existence is on average multipliedby ten every ten years as against the economic pressure to reduce devel-opment time and increase the rate at which modifications are made Toface these problems many of todayrsquos mainstream approaches are built on

122 Projects and Grants in 2012

the concepts of Model-Driven Engineering (MDE) Software Product Line(SPL) or Aspect-Oriented Software Development (AOSD) to foster softwarereuse In an emerging MDE context SPL and AOSD share the common ob-jectives to reduce the cost and the risk of adapting software systems to wideranges of new contexts On the one hand SPL techniques allow the model-ing of product variability and commonalities A SPL development approachstrongly depend on a composition mechanism supporting product deriva-tion from the SPL definition at any level of abstraction (analysis designimplementation ) On the other hand AOSD proposes new techniquesto compose and weave separate concerns which can represent features butAOSD does not propose mechanism to manage the variability of softwareThus both approaches complement each other and the combination of SPLand AOSD paradigms provides an exciting challenge allowing the use of ef-ficient product lines through the whole software development lifecycle Thiscollaboration aims at investigating further the complementarities betweenSPL and AOSD approaches in a MDE context This should make it possi-ble to discover entirely new ways of formally decomposing and recomposingsoftware systems at a much higher level of abstraction than anything thatis available today (notion of modularity based on classes and components)In order to do so several main technical areas must be addressed

bull Identify the common concepts and the difference between SPL andAOSD to combine the both approaches

bull Study the special activity of horizontal model transformation in thecontext of SPL and AOSD methodologies and to propose a transfor-mation language to support them

bull Provide rigorous and generic means to guaranties the consistency be-tween models through aspect weaving and product derivation

bull Build a generic AOM weaver with built-in variability mechanism todrive runtime adaptation

The problems inherent to this research project are in the heart of the soft-ware engineering problems such as model composition model transforma-tion model evolution model reusability model consistency etc

Results

bull Analysis of tools and procedings for the development of the genericAOM approach toolnamely analysing and testing the requirements forintegration as eclipse plug-in for tool deployment compatability of thiscompatibility requirements with the test projects already developed inKermeta and Drools

42 Grants 123

bull Development and specification of the Aspect metamodel composedof Pointcut information and Advice including specification alterna-tives to be tested during tool development for acersion of the best andclearest specification approach

bull Development and specification of a meta-model for internal informa-tion exchange within the several steps of the AOM tools execution

Publications NA

42 Grants

421 AFR

Multimedia Sensor NetworksAcronym AFR Grant PhD-09-188Reference I2R-DIR-AFR-090000PI Prof Dr Thomas EngelFunding FNR-AFRBudget 37KeBudget UL NADuration 2010-04-01 ndash 2013-03-31

Members Thomas Engel Radu State Alexander Clemm Stefan Hommes

Domain(s) anomaly detection network security rare event detection

Partner(s)

bull PampT Luxembourg

bull CISCO USA

Description Security officers monitoring security cameras face problemswith boredom and subsequent inattentiveness Critical events such as in-trusions can be missed While traditional surveillance systems store thedata recorded by cameras on hard disks examining the videos after a crimehas been committed is too late Together with PampT Luxembourg SnT de-velops in this project techniques for automated video surveillance with IP

124 Projects and Grants in 2012

network cameras The advantage Security officers can be alerted immedi-ately at critical moments and defensive actions can be initiated Automatedvideo surveillance techniques will be designed to detect and track objects in ascene to recognise normal activities in a scene and to differentiate anomalousfrom normal activity patterns Supervised and unsupervised learning usingthe video data will be applied to classify scenes as normal and suspiciousSpecial algorithms will be adopted or developed to detect the patterns ofobjects in the image control charts will raise an alarm when certain param-eters are out of the normal range Finally the spatial-temporal behaviourof an object in a scene will be analysed to gain more information aboutan activity Combining such analytical techniques will result in improvedintrusion detection and better support for security personnel The projectwill also address privacy issues at a high level to assure personal rights inpublic space Background of this project is that PampT Luxembourg wantsto replace its currently installed security network with IP network camerasin its main buildings and at other sites in Luxembourg The collaborationwith SnT guarantees the combination of an economically relevant highlyinteresting scientific question with cutting edge basic research

Results

bull Online-detection of a scene with self-tuning of all system parameters

bull Control charts for classifying a sequence of correlated images

bull Development of an open-source prototyp for an automated video surveil-lance solution

Publications 1 peer-reviewed conference [275]

Mashups in Clouds combined with Sematically enriched Infor-mation SetsAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding AFR-PHD-09-029Budget NABudget UL NADuration 2009-07-01 ndash 2013-06-30

Members Bernd Klasen (PhD candidate) Steffen Rothkugel (supervisor)

Domain(s) mashups cloud computing satellite communication

42 Grants 125

Partner(s)

bull SES Astra

bull Universitat Trier

Description This project implements and analyzes mashups - new ser-vices based on seamless composition of existing ones - running and beingcreated inside computing clouds The latter provides soft- and hardware asan abstract service which offers a high computational power that can beaccessed via specified interfaces while the internal - possibly heterogeneous -infrastructure is hidden This approach is supposed to overcome limitationsof existing (clientserver-based) solutions which suffer from performancedegradation Furthermore it will be investigated how users can be assistedduring the mashup creation process by automatic suggestions based on col-laborative filtering approaches and ontologies The result will be a platformprototype that enhances possibilities for end users as well as for enterprisessince it eases the service-creation process thus reduces time-to-market andwill liberate a multitude of new services Running this system on a scalableinfrastructure - a cloud - ensures availability and short response-times evenon unexpected peak loads

Results NA

Publications 2 publications in 2011 one journal [351] and one peer-reviewed conference [361]

Trusted Location Services for Managed Community NetworksAcronym UL TelindusReference I2R-DIR-PAU-10TSCNPI Prof Dr Thomas EngelFunding AFR-PPPBudget 574KyearBudget UL NADuration 2010-04-01 ndash 2014-03-31

Members T Engel Y Nesius

Domain(s) Computer Science and Informatics

Partner(s) Telindus

Description The Objective of this work will be the integration of pri-vately owned access points into a managed wireless outdoor mesh network

126 Projects and Grants in 2012

Community features like incentive schemes shall be added to the network toallow an extension of the network in terms of coverage by reusing existinginfrastructure The managed outdoor network supports passive localisationThat is the wireless mesh access points are able to locate the position ofa signal emitting device This location is assumed as trustworthy as thewireless infrastructure is controlled and managed by a single trustworthyentity This can not be assumed anymore if privately owned access pointsare added to the network as then private peoplersquos access points are involvedinto the location determination process They may manipulate the signallingor just try to replace their node The contribution of this work will be tore-establish the trustworthiness of this localization service while supportingthe integration of 3rd party access points The project will build upon anexisting mesh network Real world estimates are done to measure a privateuserrsquos potential impact on the localization process and how this can be de-tected and to what extend it can be detected and potentially masqueradedeg by using information from nearby nodes or by involving other sourcesfor location information

Results NA

Publications NA

Spectrum sensing- Resource re-allocation and Spectrum man-agement strategies for satellite cognitive RadioAcronym SaCoRadReference 12R-DIR-AFR-090000PI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2011-10-15 ndash 2014-10-14

Members Shree Krishna Sharma Bjorn Ottersten

Domain(s) Security Reliability and Trust in Information Technology

Partner(s) SES

Description In this project the problem of enhancing the efficiency ofspectrum usage rather than exploring new spectrum bands for new serviceshas been considered Satellite cognitive radio has been proposed as mainresearch domain The problem of finding out innovative spectrum sens-ing resource re-allocation and resource management strategies for satellitecognitive radio is the main research topic of this proposal This research

42 Grants 127

work will mainly focus on investigating advanced techniques to improve theperformance of satellite users in different wireless environments as well asincreasing the resource usage efficiency in hybridintegrated Platform

Results NA

Publications NA

Sensor Fusion-Combining 3D and 2D sensor data for safety andsecurity applicationAcronym Sensor FusionReference 12R-DIR-AFR-090000PI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2008-07-08 ndash 2012-07-07

Members Frederic Garcia Bjorn Ottersten

Domain(s) Sensor fusion

Partner(s) IEE

Description Recently 3D-cameras based on the lime-of-flight principlehave been developed to allow capturing range images of a scene The ben-efit of such a 3D-camera is that it enables the robust segmentation andlocalization of objects in 3D-space Objects can be classified based on theircontour thus independently on the light condition and the texture of theobject which IS crucial for safety critical applications

A general drawback of time-of-flight 3D-cameras IS however their low res-olution being approximately a factor 100 below the resolution of standard2D-imager and limited in frame rate compared to video rate These draw-backs limit the field of applications for 3D-cameras An approach to over-come the limitations of the low resolution is to combine a 3D-camera with ahigh resolution imager and to perform a fusion of the data on software level

The core of the project will be the development and elaboration of methodsfor image fusion targeting on increasing the spatial resolution of the 3Dimage and at the same improve the depth precision of the range informationThe elaboration of these methods will be done based on real data acquiredby a first prototype camera to be building up using an existing 3D cameraThe project both comprises the elaboration and development of entirelynew mathematical concepts as well as the implementation of the methods

128 Projects and Grants in 2012

for real-time applications Mathematical modelling of the camera behaviouris addressed and the development of tools for calibration

Results Best student paper award at the IEEE7th international Sympo-sium on Image and Signal Processing and Analysis (ISPA 2011) in Dubrovnik(Croatia) PhD Thesis March 2012

Publications NA

Investigation of boundary conditions for a reliable and efficientcontrol of energy systems formed by highly parallelized off-gridinvertersAcronym RELGRID2009Reference NAPI Prof Dr Juergen SachauFunding FNR-AFR-PhDBudget NABudget UL NADuration 2010-04-01 ndash 2013-03-31

Members Markus Jostock

Domain(s) NA

Partner(s)

bull CREOS

bull U Kaiserslautern

Description The work aims at providing a model which will allow pre-diction of stability for highly dynamic grids From the control perspectiveconnecting several stable components will no necessarily result in a stableoverall structure particularly when each of the components has a highlydynamic behaviour To avid hazardous interdependencies of coupled dy-namics control specifications for the single inverter controls are sought thatguarantee reliable cooperation

Results NA

Publications NA

42 Grants 129

Methods for Measuring and Predicting the Security Perfor-mance Reputation of Public NetworksAcronym SCoPeMeterReference 12R-NET-PAU-11MSRPPI Prof Dr Thomas EngelFunding FNR-AFR RedDogBudget NABudget UL NADuration 2011-03-22 ndash 2015-03-21

Members Thomas Engel Fabian Lanze Andriy Panchenko Jerome Fran-cois

Domain(s) Security Performance Wireless Networks Fingerprinting Hotspots

Partner(s)

bull Interdisciplinary Centre for Security Reliability and Trust UL

bull Red Dog Communications sa

Description In recent years the usage of Internet based services shiftedfrom fixed workplaces to mobile environments Wireless access points areavailable almost everywhere and users tend more and more to carry outonline activities on mobile devices such as smart phones or tablets This at-tracts potential attackers since most users neglect the risk of eavesdroppingdata manipulation or the possibility of an access point being controlledby a malicious entity Besides the performance of hotspots can differ sig-nificantly making it difficult for users to chose an intermediary fulfillinghisher particular requirements The goal of this project is to build a secu-rity and performance barometer system that provides long-term judgmentof hotspots regarding their performance and security reputation Informa-tion will be contributed to this system by data automatically collected andderived from a userrsquos mobile device application and userrsquos experiences Sev-eral research challenges arise from this A technique for uniquely identifyingwireless devices without trusting any third party is essential to make surethat connection is established to an authentic device Metrics for measur-ing performance and trustworthiness have to be defined in order to analyzequality of service and reputation of public networks This will be done in away that protects privacy of the clients reporting the values and at the sametime guards from malicious clients trying to subvert the system Finally wewill study the possibility to offer privacy-preserving location based servicesusing the available data In the proposal we describe the methodology howwe plan to reach our research objectives and to develop a practically usablesecurity and performance barometer for public wireless networks

130 Projects and Grants in 2012

Results The major result of this project so far is a large-scale evaluation ofunique device fingerprinting based on the unavoidable physical phenomenoncalled clock skew The method is fully implemented and can be performed onarbitrary out-of-the-box UNIX based systems It was evaluated using morethan 350 different wireless access points The resulting paper ldquoClock SkewBased Remote Device Fingerprinting - Demystifiedrdquo(FLanze APanchenkoBBraatz AZinnen) is currently under review for ACM Conference on Se-curity and Privacy in Wireless and Mobile Networks (ACM WiSec rsquo12)

Publications Three conference publications in 2011 [277] [276] [281]

Energy Optimization and Monitoring in Wireless Mesh SensorNetworksAcronym WiNSEOMReference I2R-DIR-AFR-090000PI Prof Dr Thomas EngelFunding FNR - AFR PhDBudget 37KeYearBudget UL NADuration 2010-04-08 ndash 2013-04-07

Members David Fotue Thomas Engel Houda Labiod Foued MelakessouSunil Kumar and Prasant Mohapatra

Domain(s) Wireless Sensor Networks

Partner(s) - Telecom ParisTech France- University of San Diego USA- University of California Davis USA- Ville du Luxembourg- Service de Coordination Hotcity

Description Air pollution is now considered as an important issue thatneeds to be treated as a critical phenomenon It belongs to a set of crucialphysical factors that drastically decrease peoplersquos health of human beingsIn this proposal we aim to deploy an efficient monitoring architecture ded-icated to Air Pollution in Luxembourg based on Wireless Sensor Networks(WSNs) WSNs have been the subject of much recent study and are a po-tential solution for the deploymentof measurement architectures at low costThey allow the measurement of data and their transmission towards a cen-tral workstation often called the sink in an efficient manner Currentlyair pollution monitoring is done locally over a small area The deployment

42 Grants 131

of a large set of sensors enables better mapping of pollution occurrencesat a higher measurement frequency Optimal communication in WSNs iscurrently a hot research topic For instance during the last ten years re-searchers have suggested many routing protocols in order to optimize datatransfer between network nodes We propose new routing protocols and for-warding mechanisms that increase network lifetime through the set of routediversity and efficient energy management schemes A set of maximally dis-joint paths between each sensor and the sink can partially or completelyavoid the appearance of congestion in the network The residual energy ofsensors is also taking into account our model Consequently data packetswill be forwarded towards candidates that present the widestcapabilities andhave the greatest residual energy Consequently global traffic will be spreadalong non-overlapping paths in order to increase the global WSN lifetimeThe PhD work consists of the analysis of this energy routing protocol in thecase of a real scenario that will be deployed in Luxembourg for air pollutionanalysis

Results After a study of the state of the art in the area of WSNs forenergy optimization we proposed A new Energy Conserving Routing Pro-tocol that aims to optimize the transmission cost over a path from a sourceto a defined destination in a Wireless Sensor Network The results appearsin proceedings of the 9th IEEEIFIP Annual Mediterranean Ad Hoc Net-working Worshop France 2010 New Aggregation Techniques for WirelessSensor Networks have been proposed the results appears in proceddindsof the 18th Annual Meeting of the IEEEACM International Symposiumon Modeling Analysis and Simulation of Computer and TelecommunicationSystems(MASCOTS) USA 2010 3 We study the effect of Sink Locationon Aggregation based on Degree of connectivity for Wireless Sensor Net-works The results are under reviews at the First International Workshopon Advanced Communication Technologies and Applications to Intelligenttransportation systems Cognitive radios and Sensor networks(ACTIS) Ko-rea 2011 4 We proposed a new Hybrid method to assign the channelfor Wireless Sensor Networks The results are under reviews at the 9th In-ternational Symposiumon Modeling and Optimization in Mobile Ad Hocand Wireless Networks(WiOpt) USA 2011 5 Finally we concluded allinvestigations done this year by submitting a journal paper at EURASIPJournal on Wireless Communications and Networking in the special issuerdquoLocalization in Mobile Wirelessand Sensor Networksrdquo

Publications Four related publications [276 277 364 365]

132 Projects and Grants in 2012

Information Extraction from Legislative TextsAcronym IELTReference NAPI Prof Dr Leon van der TorreFunding FNR AFR PHDBudget NABudget UL NADuration 2012-03-01

Members Llio Humphreys

Domain(s) Legal informatics Ontologies Information extraction Norms

Partner(s) Guido Boella University of Turin

Description With the growth of the internet laws can now be easilyaccessed by most citizens but with normative production increasing at Eu-ropean national and regional levels citizens and organisations need moreadvanced tools to understand the law within their domain of interest Legalinformatics is a growing field of research Legislative XML legal ontolo-gies and reasoning for normative systems have reached a point of maturityHowever building such resources beyond narrow applications involves a pro-hibitively expensive level of manual effort Advances in natural languageprocessing tools such as part-of-speech taggers and parsers the growingusage of statistical algorithms for handling uncertainty and the availabil-ity of semantic resources such as WordNet and FrameNet has resulted inrobust information extraction tools Information extraction for law is anunder-researched area Legal text particularly legislative text has partic-ular features that pose significant challenges - long sentences with severalclause dependencies lists where each item are usually not standalone sen-tences and references to other articles the content of which is not quotedwithin the referring article This research investigates the transformation oflegislative text into normalized sentences representation in formal logic andinformation extraction for ontologies

Results My first year in the doctoral programme has mainly involved for-mal and informal study of relevant topics at the Universities of LuxembourgTurin and Delft as well as publications on legal informatics and complianceCourses in transferable skills have been omitted in this account

bull study of propositional logic belief revision and dynamic epistemiclogic information extraction and data mining in Luxembourg andof the Pi-calculus in Turin

bull essay on Theory Change and Law

42 Grants 133

bull research visit to Joris Hulstijn University of Delft for the study ofcompliance monitoring systems

Publications

bull Conference papers

ndash [81][82][253]

bull Book chapter

ndash [83]

Security LogicsAcronym LOSECReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding FNR-AFRBudget NABudget UL NADuration 2009-09-01 ndash 2012-09-01

Members Valerio Genovese

Domain(s) Authorization Access Control Modal Logic

Partner(s) NA

Description Access Control Authorization and Authentication are main-stream topics in computer science security that can be grouped under thenotion of rdquotrust managementrdquo In an increasingly interconnected world secu-rity policies are evolving from a static disconnected environment to a highlydynamic and distributed one (eg Internet Social Networks)

The main aim of this project is to create a formal and expressive logicthrough which computers can reason to grant access to external entitiesand users can model and specify in a clear and explicit way what are thepolicies which govern their systems The new logic we plan to develop deeplyextends and enrich existing approaches appeared in the literature We alsoplan to create a calculus for this logic in order to define an efficient algorithmto automatize the reasoning process for large scale applications From themodelling point of view we aim to define a model checking methodology toassist ICT security officers in crafting secure and stable systems

Results

134 Projects and Grants in 2012

bull Seq-ACL+ (software)

bull ACL-Lean (software)

bull delegation2spass (software)

bull macl2spass (software)

bull secommunity (software) available at httpwwwdiunitoit~genovesetoolssecommunitysecommunityhtml

Publications [10][242]

Valerio Genovese Modalities for Access Control Logics Proof-Theory andApplications University of Luxembourg 2012

Programming Cognitive RobotsAcronym ProCRobReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding FNR-AFRBudget NABudget UL NADuration 2011-05-20 ndash 2014-05-20

Members Pouyan Ziafati

Domain(s) Agent Programming Languages Robotics

Partner(s) Mehdi Dastani Utrecht University

Description The ProcRob project aims at extending existing agent pro-gramming languages with sensory and action components to support theirapplication in autonomous robot programming

Results

bull The requirements of agent programming languages for autonomousrobot programming have been identified and presented in the ProMASworkshop of the AAMAS 2012 conference and published in the BNIAC2012 conference [84]

bull An environment software library for 2APL agent programming lan-guage has been developed which facilitates its integration with ROSthe current de facto standard robotic framework

42 Grants 135

bull A face recognition software package for ROS has been developed andreleased publicly

bull A demo application of NAO robot using 2APL and ROS has beendeveloped In this demo NAO can recognize faces and be controlledby voice A more complex demo application for NAO is under thedevelopment including path planning while avoiding obstacles

bull A more detailed analysis of the agent programming languages require-ments for event processing in autonomous robot programming has beenperformed and a software library for addressing such requirements iscurrently under the development The result has been submitted toAAMAS 2013 In this work an extension of ETALIS event process-ing language has been proposed to develop sensory components for anautonomous robot

Publications [84]

Trust in argumentation-based negotiationAcronym TABNReference F1R-CSC-LAB-05ILIAPI Dr Srdjan VesicFunding FNR-AFR-PostdocBudget NABudget UL NADuration 2012-10-01 ndash 2013-01-14

Members Srdjan Vesic

Domain(s) Argumentation Negotiation Trust

Partner(s) NA

Description he goal of the project was to study the notion of trust inargumentation-based negotiation in particular to study the notion of n-aryattack relations

Results Due to the early termination of the contract only its first partwas finalised It was to study the notion of n-ary attack relations Thischallenge was selected as the first research objective since existing argu-mentation systems rely on binary attack relations and I believe that a moregeneral framework allowing for ternary (or more) attack relation is necessaryin argument-based negotiation I worked on this problem with Dr MartinCaminada We plan to finish the work and submit it to an international

136 Projects and Grants in 2012

journal

I also worked with Dr Madalina Croitoru (University of Montpellier II) oncreating an argumentation framework for reasoning in the scenario whereseveral agents have individually consistent ontologies but the union of allthe ontologies is inconsistent This argumentation formalism can be used byagents to negotiate ie to send only some data from their ontology in form ofarguments (compared to the existing approach where the union of ontologiesis created in a centralised place) This is a step forward considering theprivacy and the notion of trust in this type of negotiation is to be carefullystudied

Publications Some papers were submitted

Logical Approaches for Analyzing Market Irrationality compu-tational aspectsAcronym LAAMIReference I2R-DIR-AFR-090000PI Prof Dr Leon van der TorreFunding FNR-AFRBudget 117 840eBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members Mikoaj Podlaszewski Martin Caminada Tibor Neugebauer

Domain(s) market efficiency finance epistemic reasoning

Partner(s) Luxembourg School of Finance

Description The proposed PhD project is to be carried out in closecooperation with the recently approved LAAMI (CORE) project (LogicalApproaches for Analyzing Market Irrationality) which aims to apply theparadigm of agent-based computational economics (Tesfatsion and Judd2006) to model complex reasoning processes in a market setting Basicallywe assume a market in which the main product is information and com-plex analysis on an issue that does not provide immediate feedback fromthe objective world We are interested in examining under which conditionsthe information providers (consultants) have sufficient incentives to providegood quality analysis to their clients The preliminary results of a prototypesoftware simulator (Staab and Caminada 2010) as well as other research(Mathis et al 2009) indicate that these incentives are not always strongenough to rule out providing low quality information If such becomes thepervasive strategy of the consultants there are consequences regarding the

42 Grants 137

informedness not only of individual information consumers (clients) but alsofor the system as a whole since unfounded collective beliefs can easily leadto various forms of market imperfections In essence we would like to ex-plain these market imperfections by examining how markets can becomeill-informed For this we use the technique of agent-based simulation Thespecific role of the PhD student will be to focus on implementation aspectsas well as on aspects of computability and bounded rationality of individualagents

Results

bull In [55] we examined an argument-based semantics called semi-stablesemantics which is quite close to traditional stable semantics in thesense that every stable extension is also a semi-stable extension Oneadvantages of semi-stable semantics is that for finite argumentationframeworks there always exists at least one semi-stable extension Fur-thermore if there exists at least one stable extension then the semi-stable and the stable extensions coincide Semi-stable semantics canbe seen as a general approach that can be applied to abstract ar-gumentation default logic and answer set programming yielding aninterpretation with properties similar to those of paraconsistent logic

bull In [165] we introduced a unified logical approach based on QuantifiedBoolean Formulas (QBFs) that can be used for representing and rea-soning with various argumentation-based decision problems By thiswe were able to represent a wide range of extension-based semantics forargumentation theory including complete grounded preferred semi-stable stage ideal and eager semantics Furthermore our approachinvolved only propositional languages and quantifications over propo-sitional variables making decision problems like skeptical and cred-ulous acceptance of arguments simply a matter of logical entailmentand satisfiability which can be verified by existing QBF-solvers

bull One of the differences between the fields of dialogue theory and thefield of (Dung-style) argumentation is that the former is mainly con-cerned with procedural aspects of discussion whereas the latter ismainly concerned with the results of a nonmonotonic reasoning pro-cess Nevertheless one can use dialogue theory as a conceptual basisfor Dung-style argumentation semantics The idea is that an argu-ment is accepted if and only if it can be defended in formal dialogueMoreover different argumentation semantics can be shown to coincidewith different types of dialogue In [151] we showed that groundedsemantics can be described in terms of persuasion dialogue providingan implementation of this dialogue in [150]

138 Projects and Grants in 2012

Publications [55] [165] [151] [150]

Green Energy-Efficient ComputingAcronym Green EECReference PDR-09-067PI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2010-04-01 ndash 2012-03-31

Members Alexandru-Adrian Tantar

Domain(s) decentralized algorithms global optimization dynamic envi-ronments with uncertainties

Partner(s) NA

Description Large scale computing environments like data centers can befunctionally defined by several dynamic factors At the same time depend-ing on for example availability constraints nature of the energy sourcesor computational load distribution different stochastic factors need to beconsidered as well Energy-efficient computing therefore requires not only tocomply with contradictory objectives eg provide full computational powerwhile minimizing energy consumption but also demands anticipating theimpact of current decisions dealing with uncertainties like low power andemergency operation or provide fault tolerance all in an autonomic mannerFrom a multi-objective optimization perspective there is a need to under-stand and deal with the concepts that define a dynamic environment in thepresence of stochastic factors and provide corresponding models

Results As part of the existing framework a system is defined as a col-lection of interacting autonomous nodes [310] described by overall and localsystem load performance and energy consumption balance operating price(off) load rate task acceptance etc Energy vs performance trade-off re-quirements can be expressed as a resultant of operating costs emergencylevel or thermal readings At node level transitions are conducted by ex-pert systems (decentralized approach) that dynamically control frequencyand voltage task (off) load rate and type (communication or computationintensive) or power states A strategyscenario driven anticipation model isused to determine the outcomes and consequences of current decisions

As a continuation of the practical study and in order to provide the requiredformal support an analysis of the nature of dynamic and stochastic factors

42 Grants 139

that are considered in optimization problems was conducted This led to theidentification and modeling of four classes along with different performancemeasures [302 303] as follows (a) first order dynamic transform of the in-put parameters (b) second order evolution of the objective function(s) (c)third order parameter or function state time-dependency (d) fourth ordertime-dependent environment Also in addition to the previous design thecurrent model is defined to provide support (as part of the dynamic opti-mization process) for priority and expected due date based local schedulingpolicies transitions between active and shutdown states or the managementof volatile environments In parallel a dynamic preemptive load balancingmodel with stochastic execution times in heterogeneous environments wasdeveloped [301] This model considers different node constraints eg stor-age and computational load while being able to deal with a series of powerstates for minimizing energy consumption Defined objectives include mem-ory and computational load balancing energy number of active physicalmachines and passive tasks or virtual machines Last a study on land-scape approximation using generalized quadratic forms is currently beingcarried for characterizing and tracking local optima describing robustnessconfidence radius and sensitivity analysis

Publications NA

Confidentiality Integrity issues in distributed computationsAcronym CIDCReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2010-01-01 ndash 2013-12-31

Members Benoit Bertholon

Domain(s) Confidentiality of execution Integrity of execution CloudComputing IaaS Trusted Platform Modules Parallel and Distributed Com-puting

Partner(s) NA

Description Computing grids as defined in [Fos97] are distributed infras-tructures that gather thousands of computers geographically scattered andinterconnected through the Internet A simple concept that has emerged outof such an architecture is that of cloud computing (CC) where customers do

140 Projects and Grants in 2012

not own or rent any part of the infrastructure They simply use the availableservices and pay for what they use

The CC paradigm currently arouse enthusiasm and interest from the privatesector because it allows to reduce computing cost at a time where computingpower is primordial to reach competitiveness Despite the initiative of severalvendors to propose CC services (Amazon Google etc) several researchquestions remain open especially as regards security aspect from the userpoint of view CC highlights strong needs in integrity certifications andexecution confidentiality the latter focusing few academic interest until nowThe current policy at this level is to blindly trust the vendor providing theCC service This doesnrsquot hold for critical applications that eventually use orgenerate sensitive data especially when physical machines are distributedin different administrative domains and shared with other users that maybe business competitors

In the framework of the CC paradigm the purpose of this PhD is thereforeto investigate and design novel mechanisms to cover the following domains

- confidentiality of both application code and user data- integrity and fault-tolerance to provide guarantees on programs anddata either before during or after a run on the CC platform

To make this study more concrete the developed solutions must be validatedon a CC platform build on top of the University of Luxembourgrsquos computingclusters and the Grid5000 platform

By addressing those issues this PhD opens the perspective of intellectualpatents in a key area able to address industrial needs in an emerging tech-nology

Results In the preliminary work I studied the TPM I read the documentsissued by the Trusted Computing Group (TCG) regarding the specificationof the TPM as well as other papers using the TPM for different purposesThis has been done in order to develop what has been the main contributionof the first year CertiCloud

CertiCloud is a framework developed to verify the integrity of a runningVirtual Machine in a Cloud environment The creation of this first versionis based on a network communication protocol which has been developedand studied specifically for CertiCloud The resulted implementation is inpython for simplicity and fast prototyping The CertiCloud frameworkconsist as well in patches to adapt the Cloud scheduler to take into accountthe protocols developed This framework has been integrated in Nimbus bycreating some small patches specifically for this platform and can be easily

42 Grants 141

modified to use other Cloud platforms This lead to publications [323] [288]and [289]

The second part of the PhD is on obfuscation techniques and how to applythem to decrease the readability of a source code The software JShadObf[324] has been developed to validate the approach and to develop new tech-niques and metrics allowing better code obfuscation The literature [317][318] [319] [320] [321] has been studied to implement the state of the artin JShadObf

After the study compiler techniques and parsing softwares such as BisonANTLR [322] or bnfc ANTLR has been selected to parse JavaScript codeand a grammar has been developed ANTLR has many advantages such asbeing an active project generating parser in different languages (includingpython) and allowing the generation of the Abstract Syntax Tree Many codetransformations has been implemented such as the insertion of dead code theinsertion of predicates the generation of dummy expressions the outliningof code and the modification of the control and data flow Combined withevolutionary algorithms the transformations and the metrics are used tomutate and rate the generations creating multiple obfuscated versions ofthe same source code

This lead to publications under review to NSS2013 and NIDISC2013 (ac-cepted)

Publications [323]

Reliability of Multi-Objective Optimization techniquesAcronym REMOReference TR-PHD BFR07-105PI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2010-10-01 ndash 2012-09-30

Members Emilia Tantar

Domain(s) evolutionary techniques dynamic multi-objective optimiza-tion performance guarantee factors particle methods robustness

Partner(s) NA

Description The real-world optimization problems arising from disci-plines as various as Green IT or systems biology all have in common the

142 Projects and Grants in 2012

growing complexity of the problems to be optimized due to the need of scala-bility to larger environments or the number and type of factors needed in de-scribing the system and these are by far the only aspects to consider Otherdifficulties coming from the sensitivity of problems to dynamical changesoccurring in the environment or the need of handling several objectives si-multaneously should also be considered Evolutionary algorithms which area class of stochastic optimization methods constitue one of the commonlyused alternative in finding a good approximate solution for these problemsNevertheless their efficiency is mainly proved through experimentally at-tained performances Given the consequences of applying non-reliable solu-tions in the safety and security of complex systems (ex with applicationsin medicine) performance guarantee factors that overpass the experimentalboundary should be considered Therefore a framework allowing to quantifythe expected performances of the used techniques represents the main goalof this research

Results The aim of this project is the study of evolutionary algorithmsthat scale performances from theory to practice The focus is set on provid-ing performance guarantee factors for the study of multi-objective complexsystems including factors such as dynamism distributed behavior or the oc-currence of stochastic factors The first step consists in constructing a solidframework through the identification and design of the different classes ofproblems that can occur This has been done for the dynamic multi-objectivecontext towards a classification which allowed us to identify classes that lacka common ground for study [302 303]

As the faced real problems have different characteristics in order to compareand analyze the performances of various approximation techniques com-mon testbeds are required Synthetic or randomly generated problems areneeded in providing different fitness landscape structures or correlations be-tween objective functions or variables over time By understanding how dif-ferent techniques react to modifications occurring in the problem structurethe extent of their generality can be quantified To this end we proposedseveral variants of MNK-landscapes in order to fill the lack of syntheticproblems for online dynamic multi-objective problems Furthermore webuilt a new metric that tracks the set of best approximate solutions in time[303]These results were scaled to real-life problems arising from sustainableICT as the load balancing of resources [301]

In the context of dynamic environments we studied the stability of evo-lutionary algorithms for which the value of the objective functions changesdynamically subject to stochastic factors One of the application that I usedin order to illustrate the advantages and simplicity of this generic frameworkis by the convergence results that I provided in the case of distributed evo-lutionary algorithms subject to cheating [309]

42 Grants 143

Publications NA

Community-based Vehicular Network for Traffic Information inLuxembourgAcronym LUXCommTISReference PHD 2011-1ISPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2011-09-01 ndash 2014-08-31

Members Agata Grzybek

Domain(s) vehicular ad hoc networks coperative traffic information sys-tems trust management optimisation

Partner(s) NA

Description The near future will see a rapid proliferation of wireless com-munication technologies to vehicles allowing creation of wireless VehicularAd Hoc Networks (VANETs) The main motivation for this research is ve-hicular traffic efficiency in Luxembourg The objective of this PhD projectis to propose a cooperative traffic information system based on VANETs Itsmain goal is to capture evaluate and disseminate information about trafficsituation in Luxembourg received from vehicles connected by VANETs Thesystem is envisioned as an extension of the current solutions coordinated bycentralised traffic information agency These solutions are based on fixed in-frastructure like cameras and infrared sensors The information they provideis primarily limited to highways The VANET-based extension will allow areal-time trip planning based on up-to-date traffic information for all typesof roads The role of VANET-based part will be to collect traffic data ex-change it within the network and share it with the agency The role of theagency will be to collect the date from VANETs evaluate its quality inte-grate and disseminate to vehicles The use of the of vehicular-community andtrust management techniques will be used to ensure high quality of informa-tion The research will focus on the analysis modeling and implementationof novel mechanisms for (i) distributed VANET-based traffic data collec-tion (ii) efficient traffic data dissemination (within VANETs and betweenVANETs and traffic information agency) (iii) trust and user managementtechniques enabling to evaluate traffic data quality and trustworthiness ofsystem users To evaluate the system the project will also develop a gener-ator of realistic vehicular traffic for Luxembourg

144 Projects and Grants in 2012

Results The aim of this project is to propose Traffic Information System(TIS) using architecture based on Vehicular Ad Hoc Networks

bull Initial research requires a comprehensive literature survey in areas con-nected with VANETs (a) Network standards DSCR IEEE 80111pWAVE WiMax LTE (b) Routing protocols broadcast multicast(topology location based) unicast (c ) Traffic engineering (d) Trafficassignment (e) Game theory (f) Social networks

bull The first objective is to provide a framework for VANETs simulationwhich joins the latest versions of the most advanced Network Simu-lator (NS-3) with Traffic Simulator (SUMO) in a bidirectionaly wayThe aim of the developed simulation platform is to reproduce realistictraffic behavior in Luxembourg and then analyse and asses benefitsthat can be obtained by implementation of VANETs application Thepart of the project is to extend and optimise the realistic mobilitytraces generator (VehlLux)

bull After developing simulation platform TIS will be proposed Algorithmfor the evaluation of the quality of traffic information and new dissem-ination protocol will be tested and evaluated

Publications NA

Holistic autonomic Energy and thermal aware Resource Alloca-tion in cloud computingAcronym HERAReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget 37288eBudget UL NADuration 2011-09-15 ndash 2014-09-14

Members Mateusz Guzek

Domain(s) Cloud Computing Holistic Model Resource Allocation Multi-Objective Optimization Multi-Agent System Energy-Aware

Partner(s) Tri-ICT

Description Cloud Computing (CC) is a concept that has emerged outof the conception of heterogeneous distributed computing grid computingutility computing and autonomic computing Based on a pay-as-you-go

42 Grants 145

model it enables hosting pervasive applications from consumer scientificand business domains However data centers hosting Cloud applicationsconsume huge amounts of energy contributing to high operational costs andcarbon footprints to the environment Therefore Green Cloud computingsolutions are needed they should not only save energy for the environmentbut also reduce operational costs

Although Green computing in Cloud data centers has brought a tremen-dous interest many of the current green activities represent isolated op-timizations focusing on processing units memory networking or coolingIn order to efficiently manage Cloud data centersrsquo energy consumption wemust tackle the problem in a holistic manner which considers the variousresources and thermal aspects within the cloud computing as a whole Inthis context the aim of this PhD project is to design and develop a newholistic and autonomic energy-efficient approach to efficiently manage theresources of a CC The main milestones of this project are

bull creation of a novel holistic model In order to efficiently manage data-centersrsquo energy consumption we must tackle the problem in a holisticmanner

bull centralized optimization of the CC processing by multi-objective light-weight meta-heuristics using created holistic model to the least ensurethat a proper working of the CC system is established

bull proposition of a decentralized autonomic system which will dynami-cally optimize the CC system

The results of the centralized and decentralized system will be benchmarkedand then compared Final system will be tested using realistic assumptionsusing the field expertise supported by Tri ICT company

Results During the preparatory part of the project in the period 01012011-14092011 a number of publications were produced They investigate theprocessing (CPU) and its energy aspects of resource allocation

bull rdquoEnergy-Aware Scheduling of Parallel Applications with Multi-ObjectiveEvolutionary Algorithmrdquo EVOLVE 2011 [285]

bull rdquoScalable and Energy-Efficient Scheduling Techniques for Large-ScaleSystemsrdquo SCALSOL 2011 [294]

bull rdquoEnergy-Aware Fast Scheduling Heuristics in Heterogeneous Comput-ing Systemsrdquo OPTIM 2011 [295]

The first year of the project was devoted to holistic model creation andcentralized approaches exlporation and refinement which resulted in one

146 Projects and Grants in 2012

published conference paper [170] and one journal submission still under re-vision Additionally the multi-agent track of the project was tackled result-ing in one accepted conference submission to appear in 2013 The currentwork includes holistic model verification and development of Green Cloudsimulator

Publications NA

Energy-Efficient Networking in Autonomic Cloud ComputingAcronym INTERCOMReference PDR 2010-2ISPI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2011-06-01 ndash 2013-05-31

Members Dzmitry Kliazovich

Domain(s) Energy efficiency Cloud Computing Data center communica-tions

Partner(s) NA

Description The proposed INTERCOM project aims to provide a holisticenergy-efficient solution to autonomous management of interconnection net-works in a cloud computing environment It is a part of the currently ongoingFNR-COREGreen-IT project funded by Fonds National de la Recherche(FNR) Luxembourg The INTERCOM project aims to develop novel tech-niques and deliver efficient solutions in the form of prototype software mod-ules for energy-efficient performance optimization of (a) networking com-ponents (links transceivers switches etc) (b) data center communicationsystem as a whole and (c) communication protocols Most of current energyefficient solutions for data centers focus solely on either computing fabricoptimization or thermal management and only a few solutions account fornetworking aspects Therefore providing a holistic energy-efficient solutionfor a communication network at both hardware components and systemlevels of hierarchy constitutes the main innovative point of the project

Results One of the main results achieved in the project is related tothe release of GreenCloud simulation platform capable of fine-grained sim-ulation of cloud computing environments focusing on communication andenergy efficiency The GreenCloud platform is available for download athttpgreencloudgforgeunilu The detailed description of GreenCloud

42 Grants 147

and its components was published in Journal of Supercomputing specialissue on Green Networks citeKliazovich7483 Furthermore the Green-Cloud platform formed the basis for developing energy-efficient network-aware scheduling approaches published in Cluster Computing special issueon Green Networks in 2011 and in the IEEE International Conference onCloud Networking (CLOUDNET) citeKliazovich9732

Publications NA

Decision-theoretic fine tuning of multi-objective co-evolutionaryalgorithmsAcronym DeTeMOCGAsReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2011-09-15 ndash 2014-09-14

Members Sune Steinbjoern Nielsen

Domain(s) Coevolutionary Genetic Algorithms Multi-Objective Opti-mization Decision theory Algorithm Fine-Tuning Systems Biology

Partner(s) LCSB

Description Most real world problems are extremely hard and approxi-mated approaches are used to solve them As a solution meta-heuristicsare nowadays used in many places from cutting steel bars to logistics toportfolio management on stock exchange But these parameter-based algo-rithms are either using some default value or hand tuning which might leadto very suboptimal results This PhD project aims at providing an analysisdesign and experimentation of Adaptive Multi-objective Competitive Co-evolutionary Genetic Algorithms a term that combines several state-of-the-art concepts from various fields We aim at reaching the following researchobjectives

bull Design and implement a novel competitive multi-objective coevolu-tionary genetic algorithm based on a game-theoretical model

bull Develop a decision-theoretic approach based on Markov decision pro-cesses game theory and fuzzy logic which will allow the adaptation(offline or online) of the local operators and parameters of the devel-oped algorithm so as to optimize its performance in practical prob-

148 Projects and Grants in 2012

lems

bull Carry out a detailed analysis of the special case of adaptive multi-objective competitive evolutionary algorithms which - to the best ofour knowledge - has not been addressed so far in the literature

bull Validate experimentally the new algorithms on cutting-edge problemsfrom Systems Biology in collaboration with the Luxembourg Centrefor Systems Biomedicine (LCSB) providing new tools for the analysisof biochemical (geneprotein) interaction networks

In addition to the novelty of using decision theory and machine learningto help steeringcontrolling game-theoretic models for global optimizationand the uniqueness of its meta-model representation this PhD project willalso provide a scientific bridge between the Luxembourg Centre of SystemBiomedicine (LCSB) and the Computer Science and Communications re-search unit (CSC)

Results Below is a list that enumerates the results obtained until now

bull Implemented cooperative co-evolutionary in jCell and adapted andoptimised the VehILux model The model was extended to supportmore fine-grained tuning as well as decomposed to specifically suit thecooperative coevolutionary algorithm The intelligent model decom-position was shown to help the coevolutionary algorithm find betterresults than both random decomposition and single population ap-proaches (article submitted to Genetic and Evolutionary ComputationConference - GECCO 2013)

bull Started collaboration with LCSB on a cutting edge protein-structureoptimisation problem

Publications

bull Improved a state-of-the-art cooperative co-evolutionary multi-objectiveevolutionary algorithm [300] by an alternative asynchronous imple-mentation in the jMetal(java) framework The modification imple-mented produced an additional speedup of 14 times on average andup to 19 times in best test cases (article submitted to Congress onEvolutionary Computation - CEC 2012)

bull Novel Efficient Asynchronous Cooperative Co-evolutionary Multi-ObjectiveAlgorithms [300]

42 Grants 149

Energy-Performance Optimization of the CloudAcronym EPOCReference AFR MARP C09IS05PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget 10812558 eBudget UL NADuration 2010-09-01 ndash 2013-08-31

Members Frederic Pinel

Domain(s) energy-efficiency cloud computing optimisation

Partner(s) North Dakota State University USA

Description This MARP PhD project as part of the overall FNR COREproject Green-IT will contribute to the solution of the energy efficiency inthe following ways

bull Model the computing clouds so that new methods can be designedto tackle the challenge This involves mathematical analysis of thevarious parts of the cloud

bull Based on the models defined previously design new algorithms (forexample from the fields of meta-heuristics and game theory) to energy-efficiently allocate resources of the cloud to client requests

bull Design methods for autonomic management of the cloud Distributedagents will cooperate to allow the cloud to self-recover from any inci-dent

bull Validate the implemented algorithms on large scale real-world infras-tructures Both Grid 5000 and North Dakota State Data Centers areavailable for this step

In addition to the theoretical contributions this project will develop realsoftware solutions

Results In order to find new algorithms to solve a scheduling problemwe used a statistical method to assist in the design of algorithms [38] Thisalgorithm was then applied to the energy-efficient mapping of tasks on a dis-tributed platform including recent low-power clusters operating the ARMprocessors

A new metaheuristic was designed specifically for the GPU [39] This al-gorithm was applied to the problem of scheduling tasks to a distributed

150 Projects and Grants in 2012

system such as a cloud or cluster This algorithm introduces a new sourceof concurrency that enables larger problem sizes to be solved on the GPUparallel computing platform

Publications See results

Risk Prediction Framework for Interdependent Systems usingGraph TheoryAcronym TIGRISReference PHD-09-103PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2009-10-15 ndash 2012-10-14

Members Thomas Schaberreiter

Domain(s) critical infrastructures security modelling graph modelling

Partner(s) NA

Description Critical infrastructure protection is an up-to-date topic Crit-ical infrastructure is usually composed of interdependent systems that relyon each other in order to function correctly or provide adequate securityThe interdependencies of the systems are usually quite complex to under-stand and therefore modelling of the infrastructure and its interdependenciescan be helpful in determining the security requirements During this worka model of interdependent systems based on graph theory will be proposedthat aims to model the security attributes of interdependent systems Ade-quate ways to model the security properties of infrastructure as well as of theinterdependencies will have to be found in order to achieve a close-to-realitymodel Furthermore machine learning tools will have to be developed inorder to process the graph and allow real-time simulations

Results

bull A method for critical infrastructure dependency analysis for criticalinfrastructure security modelling was investigated and published atCRITIS2011 conference (rdquoRisk assessment in critical infrastructure se-curity modelling based on dependency analysis (short paper)rdquo [341])

bull For the IST-Africa conference a publication about the critical infras-tructure security modelling approach and RESCI-MONITOR a crit-

42 Grants 151

ical infrastructure service risk monitoring tool were described andpresented (rdquoCritical Infrastructure Security Modelling and RESCI-MONITOR A Risk Based Critical Infrastructure Modelrdquo [339])

bull A trust-based method to evaluate the impact of a dependent critical in-frastructure service to a critical infrastructure service was investigatedand published CRISIS2011 conference (rdquoTrust based interdependencyweighting for on-line risk monitoring in interdependent critical infras-tructuresrdquo [338])

bull A set of assurance indicators that can evaluate correctness of calculatedcritical infrastructure service risk was investigated and published atCRITIS2011 conference (rdquoAssurance and trust indicators to evaluateaccuracy of on-line risk in critical infrastructuresrdquo [340])

Publications NA

Dynamic MixVoipAcronym DYMOReference 4105139PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2012-11-01 ndash 2015-10-31

Members Ana-Maria Simionovici

Domain(s) Optimization Learning and Anticipation Load BalancingVirtualization Evolutionary Computing Particle Algorithms

Partner(s) MixVoIP

Description The aims and context of this research project are built ona collaboration between the Computer Science and Communications (CSC)Research Unit University of Luxembourg and MixVoIP a Luxembourgbased company specialized in VoIP services The solutions currently de-ployed by MixVoIP while executed inside clouds are monolithic and notnatively designed for such environments As such the nature of the opera-tions carried by MixVoIP is deeply static and does not allow coping with thehighly dynamic evolution of requests load or other stochastic events There-fore in an effort of addressing those problems several axes of research will beinvestigated including dynamic optimization based on incoming load analy-sis and prediction resource allocation load balancing or energy-efficient op-

152 Projects and Grants in 2012

timization and management The study will hence investigate and proposenovel solutions that effectively combine evolutionary computing algorithmsexact methods learning and anticipation techniques (expert systems neuralnetworks and auto-regressive models) as well as resource allocation and loadbalancing methods All proposed approaches will be first tested on syn-thetic data benchmarks designed out of MixVoIP logs for the cloud-basedenvironment currently in use and last inside the real-life actual platformExpected outcomes and implications consider a significant extension of hestate of the art (with respect to dynamic predictive driven optimization)and our knowledge on how dynamic systems can be modeled and dealt within the presence of high magnitude stochastic factors At a practical levelas a direct application of those paradigms it is expected to attain an im-provement in voice quality and energy efficiency with a direct connection toinfrastructure management costs and performance

Results NA

Publications NA

Satellite Payload Reconfiguration OptimizationAcronym SaPROReference 1094873PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2010-11-15 ndash 2013-11-14

Members Apostolos Stathakis

Domain(s) Satellite Payload Reconfiguration Exact algorithms Combi-natorial Optimization

Partner(s) SES Betzdorf Luxembourg

Description In order to answer the modern requirements for flexibilityand efficiency in communication satellites services the complexity and thesize of satellite payloads increases significantly As a consequence the man-ual management of the payload reconfiguration process is getting difficultand error prone for the engineers The problem of optimally configure andreconfigure the satellite payload is a multi-objective problem that comprisesobjectives like different path losses outage time to customers or threat tothe onboard equipment during the sequence of changes that would need tobe made to the switch matrix difficulty on restoring service for any single

42 Grants 153

amplifier failure etc This PhD work aims at addressing those issues withcontributions in the following domains

bull Payload architecture modeling propose a modular and scalable satel-lite payload architecture mathematical model describing all technicalconstraints and operational objectives

bull Multi-objective optimization provide payload configurations with op-timal or near optimal solutions for the whole set of objectives andrespecting all the satellite technical constraints

In addition to the theoretical contributions this project will develop a soft-ware framework that will help payload engineers to optimally reconfigurethe payloads efficiently

Results An Integer Linear Programming (ILP) model has been proposedfor the satellite payload reconfiguration problem that has been validatedwith success on realistic payloads The model describes the main opera-tional objectives It is extendable to new ones that may be of interest forthe satellite operator Additionally apart from its flexibility that allows theengineers to use the model for any payload system it interacts efficientlywith the internal software tools used by the engineers [173] [79] Theprocess of payload reconfiguration is a time critical operation It could bedemonstrated by the experimental results that many single and bi-objectiveproblem instances could be solved exactly within an acceptable time limitdefined by the engineers [78] However this is not the case for larger andmore complex instances where the required computational time for optimalsolutions may exceed the acceptable time constraints [79] We thus investi-gate metaheuristic methods to generate optimal or near optimal solutionsA first method that applies a local search algorithm was proposed and im-plemented providing promising results [325] A software framework thatintegrates the current theoritical results has been developped and is used bythe satelltie operator

Publications NA

154 Projects and Grants in 2012

A Computational Framework for Apprehending Evolving Mal-ware and Malware EngineersAcronym ANTI-MALWAREReference NAPI Dr Simon KramerFunding FNRndashAFR Post DocBudget 103 236 eBudget UL NADuration 2011-01-01 ndash 2012-12-31

Members Simon Kramer Sjouke Mauw

Domain(s) applied modal logic malware

Partner(s) NA

Description Simon Kramer carries out an AFR-FNR project that willdeliver a computational framework for apprehending evolving malware andmalware engineers In recent years the problem of malware (so-called ma-licious soft- and hardware and even entire computer networks) has becomea security-critical issue of national and even international importance withthe typical accompanying phenomenon which is the one of an arms raceThe proposed framework will address the multiple dimensions of the mal-ware problem in a unified way These dimensions are of spatial temporaleconomic legal and psychological nature The proposed framework willempower the multiple stake holders of computer systems which are theirdesigners and users the detectives and judges of malware engineers and thenational policy makers with computer assistance in their respective tasksThese tasks are the design of correct computer systems the safe use of com-puter systems the catching and conviction of malware engineers and thetaking of informed decisions and effective counter-measures against theserecent perpetrators of societal security

Results NA

Publications In 2012 the project resulted in the following publications [260261 262 263 264]

42 Grants 155

A Formal Approach to Enforced Privacy Modelling Analysisand ApplicationsAcronym EPRIV-MAAReference PHD-09-027PI Prof Dr Sjouke MauwFunding FNRndashAFRBudget 105222eBudget UL 105222eDuration 2009-12-01 ndash 2013-11-30

Members Sjouke Mauw Jun Pang Hugo Jonker Naipeng Dong

Domain(s) formal methods verification model checking security privacye-services

Partner(s) ENS Cachan Paris France

Description The project is part of a peerndashreviewed UL research projectEPRIV mdash lsquoA Formal Approach to Enforced Privacy in e-Servicesrsquo Theoverall goal of this project is to develop a domainndashindependent formal frame-work to express the proposed concept of enforced privacy We extend thenotion of enforced privacy outside the domain of voting Our formalizationwill take into account coalitionndashforming and defensive options Moreoverwithin this framework algorithms to verify these requirements will be de-veloped to facilitate verification with tool support This generic goal iscomposed of the following sub-goals

bull Lifting the notion of enforced privacy to other e-service domains suchas online auctions anonymous communications and healthcare andformalizing the resulting notions

bull Establishing per-domain formal notions to verify enforced privacy

bull Capturing these notions in a domain-independent formal framework

bull Investigating enhancements to the formal framework to verify privacy

Results The paper lsquoFormal Analysis of Privacy in an eHealth Protocolrsquo wasaccepted and presented at at the 17th European Symposium on Research inComputer Security ndash ESORICSrsquo12 [141]

Given the nature of health data privacy of eHealth systems is of prime im-portance An eHealth system must enforce that users remain private evenif they are bribed or coerced to reveal themselves or others Consider ega pharmaceutical company that bribes a pharmacist to reveal information

156 Projects and Grants in 2012

which breaks a doctorrsquos privacy In this paper we identify and formal-ize several new but important privacy notions on enforcing doctor privacyThen we analyze privacy of a complicated and practical eHealth protocolOur analysis shows to what extent these properties as well as propertiessuch as anonymity and untraceability are satisfied by the protocol Finallywe address the found ambiguities resulting in privacy flaws and proposesuggestions for fixing them

Publications The project resulted in the following publication in 2012[141]

Games for Modelling and Analysis of SecurityAcronym GMASecReference FNRndashAFR PHD-09-082PI Prof Dr Sjouke MauwFunding FNRndashAFRBudget 140000eBudget UL 140000eDuration 2009-11-01 ndash 2013-10-31

Members Sjouke Mauw Matthijs Melissen Wojciech Jamroga Leon vander Torre

Domain(s) formal methods game theory security imperfect informationgames verification model checking

Partner(s)

bull Universite Libre de Bruxelles Belgium

bull Colorado State University USA

bull GAMES Network

Description Game theory models the strategic interaction among vari-ous agents assuming each of the agents strives to increase his own pay-offSuch an interaction frequently occurs in security problems Examples arethe interaction between the attacker of a system and its defender or the in-teraction between two possibly dishonest participants in a security protocolTherefore game theory is a particularly relevant tool in the field of security

The GMASec project is executed in the context of the SndashGAMES projectand is a joint project of the SaToSS group headed by Prof Sjouke Mauwand the ICR group headed by Prof Leon van der Torre

42 Grants 157

Results A paper lsquoFairness in Non-Repudiation Protocolsrsquo [315] was pub-lished in the Proceedings of the 7th International Workshop on Security andTrust Management (STM) In this paper we indicate two problems withthe specifications of fairness that are currently used for the verification ofnon-repudiation and other fair-exchange protocols The first of these prob-lems is the implicit assumption of perfect information The second problemis the possible lack of effectiveness We solve both problems in isolation bygiving new definitions of fairness but leave the combined solution for furtherwork Moreover we establish a hierarchy of various definitions of fairnessand indicate the consequences for existing work

Publications The project resulted in the following publication in 2012[315]

Security Analysis Through AttackndashDefense TreesAcronym SADTReference PHD-09-167PI Prof Dr Sjouke MauwFunding FNR-AFR PhDBudget 141968eBudget UL 141968eDuration 2010-01-01 ndash 2013-12-31

Members Sjouke Mauw Patrick Schweitzer Barbara Kordy Sasa Radomirovic

Domain(s) security formal methods attack trees defense trees attack-defense trees security assessment

Partner(s)

bull Telindus Luxembourg

bull Sintef Norway

bull TXT e-solutions Italy

bull Cybernetica Estonia

bull EDF France

bull Lucerne University of Applied Sciences and Arts

Description The project Security Analysis Through AttackndashDefense Trees(SADT) is part of the ATREES project It aims to extend and unify at-tack trees introduced by Bruce Schneier in 1999 The extension of attack

158 Projects and Grants in 2012

trees will be achieved by adding defensive measures to attack trees to createAttackndashDefense Trees (ADTrees) This will allow security analysts to in-clude countermeasures into their analysis The unification will be achievedby developing one coherent formal framework for ADTrees This unificationwill facilitate the development of a software tool This tool will encompassmost existing attack tree approaches using only a single formalism

More concretely we will define a unified language for ADTrees introduceseveral semantics arising from different mathematical disciplines and alreadyexisting attack tree approaches and create a software tool that supportsthe work of security analysts With the help of case studies provided bythe several industry partners different use cases will be examined This willallow us to tailor and refine the language and semantics It will also help usto improve the usability of the software tool

The SADT project is a joint research project of the Interdisciplinary Centrefor Security Reliability and Trust (SnT) and SaToSS

Results In 2012 we published two journal articles and presented our workat one international conference The first journal article [258] lays the foun-dation of the ADTrees presents the results of the previous years The secondone [254] is an extended case study on how to apply the methodology AtICISCrsquo12 we presented our research on an informal and a correspondingformal way of how to use ADTrees for quantitative analysis

Publications The project resulted in following publications in 2012 [258][254]

Secure and Private Location Proofs Architecture and Designfor Location-Based ServicesAcronym SECLOCReference 794361PI Prof Dr Sjouke MauwFunding FNR-AFR PhDBudget 109137eBudget UL 109137eDuration 2010-08-01 ndash 2013-07-31

Members Sjouke Mauw Xihui Chen Jun Pang Gabriele Lenzini

Domain(s) security and privacy location based services location proofsformal verification trustworthy services security protocols

Partner(s) itrust Consulting Luxembourg

42 Grants 159

Description Location-based services are rapidly growing as mobile net-works become increasingly pervasive and the use of mobile devices is gettingmore popular Location-based applications make use of the physical loca-tion of the mobile device to provide services that are customized to thatlocation To be effective location-based services need trustworthy (secureand private) positioning data this depends upon the technology the com-ponents and the communication protocols employed for service compositionand provision For this reason researcher effort has been devoted to ad-dressing the problem of how to certify a physical location and of how toensure that location information is secure eg in term of data integritynon-transferability unforgeability and non-repudiation Meanwhile usershave their privacy concerns about how their location proofs are used egthey want to control when and to whom they need to present such proofs(anonymity) or they do not want a service provider to trace them

Both security and privacy are essential in the development of location proofsfor location-based services While in the literature most researchers onlyconsider security or privacy in isolation we will address the problem ofhow to securely provide a userrsquos location while adhering to the need-to-know principle for all other involved parties thereby satisfying also privacyrequirements of the users

We approach this challenge by analyzing the concepts and requirements forsecurity and privacy in a location proof management system We aim at anarchitecture addressing both security and privacy requirements We will de-sign securitycryptographic protocols which can be used as building blocksin implementing such architecture for a concrete application domain Thecorrectness of the developed protocols is guaranteed through formal verifi-cation At last an experimental system based on the proposed architectureand protocols will be built to validate our solutions wrt the security andprivacy requirements identified

Results In 2012 we have four international conference papers accepted andone journal paper submitted

bull we design a new electronic toll pricing system based on group signa-tures This paper has been published and presented in ARESrsquo12 [216]

bull we propose a post-hoc analysis on location privacy in electronic pricingsystems [255] This paper is co-authored with David Fonkwe and hasbeen presented in DPMrsquo12

bull we propose a new method to construct and compare usersrsquo mobilityprofiles [256] This paper is co-authored by Ran Xue and has beenaccepted by SACrsquo13

160 Projects and Grants in 2012

bull we measure usersrsquo query privacy when query dependency is taken intoaccount and propose a new anonymization algorithm to protect usersrsquoquery privacy [257] This paper has been accepted by CODASPYrsquo13

bull we perform a formal analysis on our electronic toll pricing systemndash GroupETP using ProVerif This paper has been submitted to thejournal JOWUA

Publications The project resulted in the following publications in 2012[216] [255] [256] [257]

Analysis of the SHA-3 Remaining CandidatesAcronym SHARCReference F1R-CSC-AFR-080000PI Prof Dr Alex BiryukovFunding FNR-AFR PostdocBudget 102620eBudget UL NADuration 2010-10-15 ndash 2012-10-14

Members Gaetan Leurent

Domain(s) Cryptography Secret Key Hash Functions CryptanalysisSHA-3

Partner(s) NA

Description This project is about the analysis of hash functions andwill be closely related to the SHA-3 competition currently run by NISTIn cryptography a hash function is a public function with no structuralproperties It is an essential primitive in modern cryptography used inmany protocols and standards including signatures schemes authenticationcodes and key derivation

Following devastating attacks against many widely used hash functions (in-cluding MD4 MD5 and SHA-1) NIST organized the SHA-3 competition toselect and standardize a new hash function This competition is similar tothe AES competition held in 1998-2000 and attracts worldwide attentionwith a large effort underway to assess the security of the candidates Duringthis project we will study the application of known cryptanalysis techniquesto the new designs submitted for the SHA-3 competition and try to developnew dedicated techniques tailored to some of the SHA-3 candidates

Results The paper ldquoPractical Partial-Collisions on the Compression Func-

42 Grants 161

tion of BMWrdquo is accepted for presentation at the 18th IACR Workshop onFast Software Encryption (FSE 2011)

Publications NA

Dynamic and Composite Service-Oriented Architecture Secu-rity TestingAcronym DYNOSTReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2010-10-01 ndash 2013-09-30

Members Alexandre Bartel PhD

Domain(s) Dynamic adaptive systems andoid security access-control pol-cies permission-based architecture Model-driven engineering

Partner(s) NA

Description Initially DYNOST dealt with rdquoDynamic and Composite Service-Oriented Architecture Security Testingrdquo

Dynamically Adaptive Systems modify their behavior and structure in re-sponse to changes in their surrounding environment and according to anadaptation logic Critical systems increasingly incorporate dynamic adap-tation capabilities examples include disaster relief and space explorationsystems One of the main questions to adress is rdquoHow can we test the secu-rity of such a system which is often seen as a black boxrdquo

As a first step we propose a fault model for adaptation logics which classifiesfaults into environmental completeness and adaptation correctness [1] Sincethere are several adaptation logic languages relying on the same underlyingconcepts the fault model is expressed independently from specific adapta-tion languages Taking benefit from model-driven engineering technologywe express these common concepts in a metamodel and define the opera-tional semantics of mutation operators at this level Mutation is appliedon model elements and model transformations are used to propagate thesechanges to a given adaptation policy in the chosen formalism Preliminaryresults on an adaptive web server highlight the difficulty of killing mutantsfor adaptive systems and thus the difficulty of generating efficient tests

Shift to Android

162 Projects and Grants in 2012

With FNR agreement the project evolved and now focuses much more on thesecurity of the Android software stack still keeping the dynamic adaptationaspect in mind Android is a permission based system on top of which runapplication developed by programmers and downloaded from markets byend-users Every application comes with a Manifest file containing a list ofthe permissions the application requires to run

Results We developed a static analysis tools which computes the appro-priate permission set for an application by analyzing its bytecode By com-paring the permission list generated by our tool to the original permissionlist we noticed that a non-negligible part of Android applications are over-privileged they do not respect the principle of least privilege

Publications One publication in 2011 [312]

A Testing Framework for Large-Scale ApplicationsAcronym PeerunitReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2011-01-15 ndash 2014-01-15

Members Jorge Meira (PhD)

Domain(s) NA

Partner(s) Federal University of Parana Brazil

Description The aim of this project is to develop a highly scalable testingarchitecture for large-scale systems This project has three main objectives

bull To design a scalable testing synchronization algorithm to execute large-scale tests This algorithm will be incorporated to the PeerUnit archi-tecture to test any kind of large-scale application besides P2P

bull To design a highly scalable and automatic oracle approach to vali-date large-scale tests This approach will be also incorporated to thePeerUnit architecture

bull To test popular large-scale systems (eg Hadoop Hive FreePastry)and to validate our algorithm and oracle approach Tests can be exe-cuted in an incremental schedule from a less complex scenario to a morecomplex one First we start testing simple applications in small-scale

42 Grants 163

(eg distributed word count) Then we test the same application inlarge-scale Finally we test a complex large-scale application (egHive data warehouse architecture)

Results The student has started his PhD this year (January 2011) and isfinishing his basic formation that is part of the Brazilian regulations to getthe degree This is predicted in the co-joint agreement In this formationthe student must fulfil thirty six (36) credits in taught courses which ingeneral takes 12-18 months The student will finish by December 2011 Inresearch the student is finishing his first paper and is already mastering thelarge-scale environment (ie Grid5000) that is going to be used throughoutthe project His findings are interesting and it is expected at least twoconference paper in the following couple of months

Publications NA

Selected Problems in Executable ModelingAcronym SPEMReference PHD-09-084PI Prof Dr Pierre KelsenFunding FNR-AFR PhDBudget NABudget UL NADuration 2009-11-15 ndash 2012-11-15

Members Moussa Amrani and Nuno Amalio

Domain(s) Model-Driven Engineering Domain-Specific Modeling Lan-guages Structural and Behavioural Specification Structural and BehavioralSemantics Executability

Partner(s) NA

Description Model-Driven Engineering considers models as first-class en-tity in the development process In this way developers deal only withmodels which are used at the required level of abstraction for each taskthey need to perform to finally generate actual code on a given platform

Transformations can also be modeled Transformations are the Model-Driven Engineering tool that allow one to make models change evolve to fi-nally compute something Transformation Languages can be classified in twotrends object-oriented languages and rule-based languages Each of thempresent some strengths but comes with some complications when dealingwith huge models and or huge transformations

164 Projects and Grants in 2012

The Model-Driven Engineering approach gained maturity over the yearsand started to be used for safety-critical and embedded softwares whereformal verification plays a key role in the validation of applications Formalverification could be performed either by model-checking exhaustively theexecution state space or by theorem-proving assertions and properties aboutthe execution states But to be able to use such techniques formal semanticsof transformation languages must be precisely specified

This PhD has three goals

1 Define the semantics of a transformation language

2 Equip a transformation language with the ability to define contractswhich are an abstract and adequate way of defining behavior withoutgoing into implementation details

3 Apply theorem-proving techniques to formally verify models and trans-formations against dynamic properties

Results Since the PhD started the last year the results are just comingThe results basically follows the first workpackages defined in the Afr pro-posal It is also important to mention participation in conferences and paperreview for a PhD

State of the Art in Model-Driven Engineering This year was largelydedicated to study the existing techniques and tools for structural andbehavioral modeling A Technical Report will be soon published onbehalf of the LassyCsc adressing these points and completed withthe graph- based tools

Semantics Specification of an Object-Oriented Transformation LanguageAn important result regarding the development of formal verificationtechniques over Domain-Specific Modeling Languages is the formalspecification of the semantics of such languages It is known to bea hard task but it is a necessary step towards formal and trustableverification In the next few months an article paper will be publishedsoon

Conference Summer School Participation The candidate participatedto one important conference in the domain namely the European Con-ference on Modeling Foundations and Applications (Ecmfa 2010) andthe First Summer School on Domain-Specific Modeling Theory andPractice (Dsm- Tp 2010)

Publications NA

42 Grants 165

422 Workshop amp Conferences (FNR Accompanying Mea-sures)

Building the Skeleton of a SO schedulerAcronym SandpileReference FNR11AM2c32PI Prof Dr Pascal BouvryFunding FNR - AM2cBudget 634900Budget UL NADuration 2012-03-01 ndash 2012-05-01

Members Juan Luis Jimenez Laredo

Domain(s) Optimization GridCloud Computing Load balancing schedul-ing

Partner(s) NA

Description This project aims at designing and implementing the skele-ton of an organic scheduler for GridCloud Computing so that it acquiresautonomic properties such as self-organization of tasks or self-healing underresource failures To cope with these goals the working hypothesis relieson the Self-Organizing Criticality theory (SOC) that describes a property ofcomplex systems and consists in a critical state formed by self-organizationat the border of order and chaos More specifically we will extend a SOCsystem so-called sandpile The sandpile is a nature-inspired cellular automa-ton where piles of sand are accumulated and balanced in a self-organized wayalong the lattice The metaphore here is that tasks can be seen as grainsof sand and resources as cells in the lattice Given the decentralized natureof resources in GridCloud Computing systems we propose a Peer-to-Peeragent-based system as the underlying infrastructure to construct the cel-lular automaton (ie agents represent cells with a neighbourhood definedby the Peer-to-Peer overlay network) In order to study the viability ofthe approach the initial objective of the project is to reduce the schedulelength (or makespan) of scientific directed acyclic graph (DAG) in whichthe destination group in Innsbruck has an extensive expertise and after-wards compare results against state-of-the-art approaches Here it has tobe noted that there are two divergent trends in the literature when ap-proaching DAG scheduling On the one hand the fittest approaches assume

166 Projects and Grants in 2012

an unrealistic accurate knowledge on the problem structure On the otherhand real middleware frameworks use much simpler heuristics such as justin-time planning or round robin Our approach aims to bridge this gap andproposes the skeleton of a scheduler for a do-as-you-like scheduling ie bymodifing simple rules the approach can be tuned from a non-clairvoyant to aperfectly-informed scheduler Not only this we aim to take advantage of thepotentials of the approach and redefine the optimization objective to meetthe energy-aware criteria described in the FNR Core GreenIT project forwhich the candidate Dr Jimenez Laredo is working As can be graspedfrom this summary the ambitious nature of the project will require of amulti-disciplinary set of experts We find that both organizations Inns-bruck and Luxembourg account with complementary people to bring theproject to success with Luxembourg having a stronger focus on energy op-timization and green computing and Innsbruck on middleware developmentand scientific workflows analysis The candidate Juan Luis Jimenez Laredofits especially well in this project given his expertise on the aforementionedareas that can be assessed by referring to some of his publications either inSOC or agent-based decentralized optimization

Results In this project we have designed and developed an on-line anddecentralized scheduler based on a Self-Organized Criticallity Model calledsandpile in which every computing resource executes a sandpile agent Thesource-code with the simulator has been released as open-source and is avail-able at httpssandpile-schedulergooglecodecom published under GPL v3public license Additionally a first publication has been already publishedin the Workshop of Soft-Computing Techniques in Cluster and Grid Com-puting Systems (httpalturlcom33vo3) from which an extended version isexpected to be published in Cluster Computing (2010 Impact Factor 0679)(httpalturlcomxkzuh) The whole text of the publication is available forchecking at httpalturlcomcypi6 This report presents the problem def-inition the main points of the followed methodology and a summary of theachieved results

Publications NA

Chapter 5

CSC Representation

51 Conferences

The following local events have been organized during 2012

bull IFIP AIMS 2012 Luxembourg Luxembourg Radu State

ndash Description 6th International Conference on Autonomous In-frastructure Management and Security (AIMS 2012) June 04-08 2012 University of Luxembourg Luxembourg

bull 13th International Workshop on Computational Logic in Multi-AgentSystems (2012-08-27 ndash 2012-08-28) Montpellier France Leon van derTorre

bull Capture The Flag competition 2012 (2012-10-23 ndash 2012-10-25) Lux-embourg Luxembourg Piotr Kordy Matthijs Melissen Sasa RadomirovicPatrick Schweitzer Hugo Jonker Andrzej Mizera Yann Le Corre aswell as a former member of the SaToSS group Dr Ton van Deursen

ndash Description In 2012 the hackbraten team headed by Piotr Ko-rdy represented the SaToSS group at the Capture the Flag Com-petition co-located with the Hacklu conference Capture TheFlag is a competition where registered teams solve computer chal-lenges within limited time It is part of the Hacklu conferenceTopics of the challenges include (among others) web security

168 CSC Representation

cryptography reverse engineering and forensic Example chal-lenges include finding vulnerabilities in the servers exploitingbuffer overflows in binary files or reverse engineering javascriptcode embedded in a pdf file The hackbraten team was ranked24th amongst 575 teams registered for the event

bull Workshop on Dynamics of Argumentation Rules and Conditionals(2012-04-02 ndash 2012-04-03) Luxembourg Luxembourg Richard BoothEmil Weydert Tjitze Rienstra (organisers)

bull European Conference on Artificial Intelligence (2012-08-27 ndash 2012-08-31) Montpellier France Tjitze Rienstra

bull EVOLVE 2012 International Conference Mexico City Mexico Alexandru-Adrian Tantar Emilia Tantar Pascal BOUVRY (General Chairs)

ndash Description A Bridge between Probability Set Oriented Numer-ics and Evolutionary Computing

bull Interdisciplinary PhD Workshop on Security in eVoting (eVote PhDDays 2012) (2012-10-14 ndash 2012-10-15) Luxembourg Luxembourg HugoJonker (main organizer)

ndash Description In 2012 the University of Luxembourg hosted the5th installment of the Interdisciplinary PhD Workshop on Se-curity in eVoting The goal of this workshop series is to fosterunderstanding and collaboration between the various disciplinesworking on e-voting as well as to provide an informal platformfor young researchers to present results discuss research ideasand research directions with their peers and expand their net-works There were 14 participants from 10 institutes across Eu-rope What makes this workshop series special is that it is trulyinterdisciplinary where PhD students from legal backgroundsare joined by PhD students with computer science and cryptog-raphy backgrounds and by social scientists

bull GreenGEC Workshop Genetic and Evolutionary Computation Con-ference Philadelphia USA Pascal Bouvry Alexandru-Adrian TantarEmilia Tantar Bernabe Dorronsoro Gregoire Danoy

ndash Description Green and Efficient Energy Applications of Geneticand Evolutionary Computation

bull The 5th Workshop on Logical Aspects of Multi-Agent Systems (LAMASrsquo2012)(2012-06-05 ndash 2012-06-05) Valencia Spain Wojciech Jamroga (co-organizer) Matthijs Melissen (co-organizer)

51 Conferences 169

ndash Description LAMAS is a scientific network spanning an inter-disciplinary community of researchers working on logical aspectsof MAS from the perspectives of logic artificial intelligence com-puter science game theory etc The LAMAS workshop is thepivotal event of the network and it provides a platform for pre-sentation exchange and publication of ideas in all these areasincluding

lowast Logical systems for specification analysis and reasoning aboutMAS

lowast Modeling MAS with logic-based models

lowast Deductive systems and decision procedures for logics for MAS

lowast Development complexity analysis and implementation of al-gorithmic methods for formal verification of MAS

lowast Logic-based tools for MAS

lowast Applications of logics in MAS

bull Normative Multi-Agent Systems (2012-03-12 ndash 2012-03-16) DagstuhlGermany Leon van der Torre

bull OPTIM 2012 (2012-07-02 ndash 2012-07-06) Madrid Spain Pascal Bou-vry Gregoire Danoy Bernabe Dorronsoro Sebastien Varrette (Work-shop Organisers)

ndash Description Workshop on Optimization Issues in Energy Effi-cient Distributed Systems

bull 20th International Conference on Real-Time and Network Systems(2012-11-08 ndash 2012-11-09) Pont-a-mousson France Nicolas Navet(General Chair)

ndash Description The purpose of the conference is to share ideas ex-periences and informations among academic researchers devel-opers and service providers in the field of real-time systems andnetworks

bull SCCG 2012 Victoria Canada Bernabe Dorronsoro (Workshop Or-ganisers)

ndash Description First International Workshop on Soft ComputingTechniques in Cluster and Grid Computing Systems

bull Summer School on Secure Voting (SecVotersquo2012) (2012-07-16 ndash 2012-07-20) Dagstuhl Germany Hugo Jonker (general chair)

170 CSC Representation

ndash Description The SecVote 2012 summer school covered the foun-dations of secure voting as well as examine recent developmentsin the field of e-voting The school provided a good overview ofwork in voting including design of voting systems social choicecryptography practical experiences practical deployment andauditing There were 27 participants coming from AustraliaBrazil the USA Israel Estonia Poland the UK the Nether-lands Luxembourg Italy and Germany

bull VTP 2012 San Francisco USA Pascal Bouvry Gregoire Danoy Patri-cia Ruiz Julien Schleich Marcin Seredynski (Workshop Organisers)

ndash Description Workshop on VANETs From Theory to Practice

bull Summer School on Verification Technology Systems amp Applications(VTSArsquo2012) (2012-09-03 ndash 2012-09-07) Saarbrucken Germany JunPang (coordinator)

ndash Description The fourth summer school on verification technol-ogy systems amp applications takes place at Max Planck Institutefor Informatics at Saarbrucken Germany from September 03rdto 7th 2012 All three aspects verification technology systems ampapplications strongly depend on each other and that progress inthe area of formal analysis and verification can only be madeif all three aspects are considered as a whole Five speakersArmin Biere Ahmed Bouajjani Jurgen Giesl David Monniauxand Carsten Schurmann stand for this view in that they repre-sent and will present a particular verification technology and itsimplementation in a system in order to successfully apply theapproach to real world verification problems There were about30 participants for the summer school More information can befound at httpwwwmpi-infmpgdeVTSA12

52 PC and other memberships

bull 26th AAAI Conference on Artificial Intelligence (2012-07-22 ndash 2012-07-26) Toronto Canada Richard Booth (PC member)

bull 25th Australasian Joint Conference on Artificial Intelligence Dec 4-72012 Sydney Australia Richard Booth (PC member)

bull 24th Benelux Conference on Artificial Intelligence Oct 25-26 2012Maastricht Netherlands Richard Booth (PC member)

52 PC and other memberships 171

bull Workshop on Belief Change Nonmonotonic Reasoning and ConflictResolution (2012-08-27 Montpellier France Richard Booth (PC mem-ber)

bull 3rd IIAI International Conference on e-Services and Knowledge Man-agement (2012-09-20 ndash 2012-09-22) Fukuoka Japan Richard Booth(PC member)

bull 13th European Conference on Logics in Artificial Intelligence (2012-09-26 ndash 2012-09-28) Toulouse Franch Richard Booth (PC member)

bull 6th Multi-Disciplinary International Workshop on Artificial Intelli-gence (2012-12-26 ndash 2012-12-28) Ho Chi Minh City Vietnam RichardBooth (PC member)

bull NMR 2012 - 14th International Workshop on Non-Monotonic Rea-soning (2012-06-08 ndash 2012-06-10) Rome Italy Richard Booth (PCmember)

bull NIDISC 2012 (2012-05-21 ndash 2012-05-25) Shanghai China PascalBouvry (Program Chair)

ndash Description 15th International Workshop on Nature InspiredDistributed Computing held in conjunction with the 26th IEEEACMInternational Parallel and Distributed Processing (IPDPS 2012)

bull VTP 2012 (2012-06-25 ndash 2012-06-25) San Francisco USA PAscalBouvry (General Chair)

ndash Description VANETs from Theory to Practice

bull BNAIC 2012 (2012-10-25 ndash 2012-10-26) Maastricht Netherlands Gre-goire Danoy (PC Member)

ndash Description 24th Benelux Conference on Artificial Intelligence

bull ICUMT 2012 (2012-10-03 ndash 2012-10-05) St Petersburg Russia Gre-goire Danoy (PC Member)

bull IEEE MENS 2012 (2012-12-03 ndash 2012-12-07) Anaheim USA GregoireDanoy (PC Member)

ndash Description 4th IEEE International Workshop on Managementof Emerging Networks and Services

bull NIDISC 12 (2012-05-21 ndash 2012-05-25) Shanghai China GregoireDanoy (Publicity Chair)

172 CSC Representation

ndash Description 15th International Workshop on Nature InspiredDistributed Computing held in conjunction with the 26th IEEEACMInternational Parallel and Distributed Processing (IPDPS 2012)

bull SCALSOL 2012 (2012-12-18 ndash 2012-12-18) Changzhou China Gre-goire Danoy (PC Member)

ndash Description The International Workshop on Scalable Solutionsfor GreenIT (SCALSOL) as part of The 12th IEEE InternationalConference on Scalable Computing and Communications (SCAL-COM 2012)

bull SCCG-2012 (2012-11-12 ndash 2012-11-14) Victoria Canada GregoireDanoy (PC Member)

ndash Description Workshop 1st International Workshop on Soft Com-puting Techniques in Cluster and Grid Computing Systems

bull VTP 2012 (2012-06-25 ndash 2012-06-25) San Francisco USA GregoireDanoy (PC Chair)

ndash Description VANETs from Theory to Practice

bull EVOLVE 2012 (2012-08-07 ndash 2012-08-09) Mexico City Mexico Bern-abe Dorronsoto (Program Committee)

ndash Description VOLVE 2012 A bridge between Probability SetOriented Numerics and Evolutionary Computation

bull GECCO 2012 (2012-07-07 ndash 2012-07-11) Philadelphia USA BernabeDorronsoto (Program Committee)

ndash Description ACM International Genetic and Evolutionary Op-timization Conference

bull GreenCom 2012 (2012-11-20 ndash 2012-11-23) Besancon France Bern-abe Dorronsoto (Program Committee)

ndash Description IEEE GreenCom 2012

bull HPMS-ECMS 2012 (2012-05-29 ndash 2012-06-01) Koblenz GermanyBernabe Dorronsoto (Program Committee)

ndash Description 26th European Conference on Modelling and Simu-lation (ECMS 2012) Track on High Perfomance Modelling andSimulation

52 PC and other memberships 173

bull IC3 2012 (2012-08-06 ndash 2012-08-08) Noida India Bernabe Dorronsoto(Program Committee)

ndash Description The Fifth International Conference on Contempo-rary Computing

bull MAEB 2012 (2012-02-08 ndash 2012-02-10) Albacete Spain BernabeDorronsoro (Program Committee)

ndash Description VIII Congreso Espanol sobre Metaheurısticas Al-goritmos Evolutivos y Bioinspirados

bull MENS-GLOBECOM 2012 Anaheim California USA Bernabe Dor-ronsoto (Program Committee)

ndash Description The 4th IEEE International Workshop on Manage-ment of Emerging Networks and Services (IEEE MENS 2012) inconjunction with IEEE GLOBECOM 2012

bull MICAI 2012 (2012-10-27 San Luis Potosı Mexico Bernabe Dor-ronsoto (Program Committee)

ndash Description The 11th Mexican International Conference on Ar-tificial Intelligence

bull NostraDamus 2012 Ostrava Czech Republic Bernabe Dorronsoto(Program Committee)

ndash Description The NostraDamus conference

bull P2PAMN track at 3PGCIC 2012 (2012-11-12 ndash 2012-11-14) VictoriaCanada Bernabe Dorronsoto (Program Committee)

ndash Description The 7th International Conference on P2P ParallelGrid Cloud and Internet Computing (3PGCIC-2012) track onP2P Ad-hoc and Mobile Networking

bull SCALSOL-SCALCOM 2012 (2012-12-18 ndash 2012-12-18) ChangzhouChina Bernabe Dorronsoro (Program Committee)

ndash Description The International Workshop on Scalable Solutionsfor GreenIT (SCALSOL) as part of The 12th IEEE InternationalConference on Scalable Computing and Communications (SCAL-COM 2012)

174 CSC Representation

bull WASI-CACIC 2012 ndash 2012-10-12) Bahıa Blanca Argentina BernabeDorronsoto (Program Committee)

ndash Description Workshop de Agentes y Sistemas Inteligentes (WASI)- XVIII Congreso Argentino de Ciencias de la Computacion (CACIC)

bull LAMAS 2012 (2012-06-05 ndash 2012-06-05) Valencia Spain WojciechJamroga (PC Co-chair)

ndash Description 5th Workshop on Logical Aspects of Multi-AgentSystems

bull The Twenty-Sixth Conference on Artificial Intelligence (AAAI-12) (2012-07-22 ndash 2012-07-26) Toronto Canada Wojciech Jamroga (PC Mem-ber)

ndash Description The purpose of the AAAI-12 conference is to pro-mote research in AI and scientific exchange among AI researcherspractitioners scientists and engineers in related disciplines

bull AAMAS 2012 (2012-06-04 ndash 2012-06-08) Valencia Spain WojciechJamroga (PC Member)

ndash Description The AAMAS conference series was initiated in 2002in Bologna Italy as a joint event comprising the 6th Interna-tional Conference on Autonomous Agents (AA) the 5th Interna-tional Conference on Multiagent Systems (ICMAS) and the 9thInternational Workshop on Agent Theories Architectures andLanguages (ATAL)

Subsequent AAMAS conferences have been held in MelbourneAustralia (July 2003) New York City NY USA (July 2004)Utrecht The Netherlands (July 2005) Hakodate Japan (May2006) Honolulu Hawaii USA (May 2007) Estoril Portugal(May 2008) Budapest Hungary (May 2009) Toronto Canada(May 2010) Taipei Taiwan (May 2011) AAMAS 2012 will beheld in June in Valencia Spain AAMAS is the largest and mostinfluential conference in the area of agents and multiagent sys-tems the aim of the conference is to bring together researchersand practitioners in all areas of agent technology and to providea single high-profile internationally renowned forum for researchin the theory and practice of autonomous agents and multiagentsystems

AAMAS is the flagship conference of the non-profit InternationalFoundation for Autonomous Agents and Multiagent Systems (IFAA-MAS)

52 PC and other memberships 175

bull BNAIC 2012 (2012-11-25 ndash 2012-11-26) Maastricht the NetherlandsWojciech Jamroga (PC Member)

ndash Description The 24th Benelux Conference on Artificial Intelli-gence (BNAIC 2012) is organised by the Department of Knowl-edge Engineering (DKE) of Maastricht University (UM) BNAIC2012 is organised under the auspices of the Benelux Associa-tion for Artificial Intelligence (BNVKI) and the Dutch ResearchSchool for Information and Knowledge Systems (SIKS)

bull CLIMA XIII (2012-08-27 ndash 2012-08-28) Montpellier France WojciechJamroga (PC Member)

ndash Description 13th International Workshop on Computational Logicin Multi-Agent Systems The purpose of the CLIMA workshops isto provide a forum for discussing techniques based on computa-tional logic for representing programming and reasoning aboutagents and multi-agent systems in a formal way More informa-tion about the series os CLIMA workshops including its previouseditions and publications can be found here

The 13th edition of CLIMA will be affiliated with ECAIrsquo12 andwill take place in Montpellier France between the 27th and 28thof August 2012

bull ECAI 2012 (2012-08-27 ndash 2012-08-31) Montpellier France WojciechJamroga PC Member()

ndash Description ECAI the biennial European Conference on Artifi-cial Intelligence is the leading conference on Artificial Intelligencein Europe

ECAI 2012 the 20th conference in this series will be jointly or-ganized by the European Coordination Committee for ArtificialIntelligence (ECCAI) the French Association for Artificial In-telligence (AFIA) and Montpellier Laboratory for InformaticsRobotics and Microelectronics (LIRMM)

LIRMM is a research laboratory supervised by both MontpellierUniversity (Universite Montpellier 2) and the French NationalCenter for Scientific Research (CNRS)

ECAI 2012 will give researchers from all over the world the possi-bility to identify important new trends and challenges in all sub-fields of Artificial Intelligence and it will provide a major forumfor potential users of innovative AI techniques

bull EUMASrsquo12 (2012-12-18 ndash 2012-12-19) Dublin Ireland Wojciech Jam-roga (PC Member)

176 CSC Representation

ndash Description Research on multi-agent systems has shed light ontoand provided solutions to many real life problems As the fieldmatures academics and industrialists benefit from European-based forums where state-of-the-art and state-of-the-practice arepresented and discussed The EUMAS series of events have servedthis purpose and in this 10th edition (following Maastricht TheNetherlands 2011 Paris France 2010 Aiya Napa Cyprus 2009Bath England 2008 Hammamet Tunisia 2007 Lisbon Portu-gal 2006 Brussels Belgium 2005 Barcelona Spain 2004 Ox-ford England 2003) we shall carry on in this tradition The EU-MAS series of workshops is primarily intended as a European fo-rum at which researchers and those interested in activities relat-ing to research in the area of autonomous agents and multi-agentsystems can meet present (potentially preliminary) research re-sults problems and issues in an open and informal but academicenvironment

bull ICAART 2012 (2012-02-06 ndash 2012-02-08) Vilamoura Portugal Woj-ciech Jamroga (PC Member)

ndash Description The purpose of the 5th International Conference onAgents and Artificial Intelligence (ICAART) is to bring togetherresearchers engineers and practitioners interested in the theoryand applications in these areas Two simultaneous but stronglyrelated tracks will be held covering both applications and currentresearch work within the area of Agents Multi-Agent Systemsand Software Platforms Distributed Problem Solving and Dis-tributed AI in general including web applications on one handand within the area of non-distributed AI including the moretraditional areas such as Knowledge Representation PlanningLearning Scheduling Perception and also not so traditional ar-eas such as Reactive AI Systems Evolutionary Computing andother aspects of Computational Intelligence and many other areasrelated to intelligent systems on the other hand

53 Doctoral board

bull Cynthia Wagner University of Luxembourg Luxembourg Luxem-bourg March 2012 2012 Thomas Engel

bull Shaonan Wang University of Luxembourg Luxembourg LuxembourgApril 2012 Thomas Engel

54 Guests 177

bull Sheila Becker University of Luxembourg Luxembourg LuxembourgOctober 2012 2012 Thomas Engel

bull Sheila Becker UL Luxembourg Luxembourg October 2012 2012Yves Le Traon

bull Frederic Garcia Becerro University of Luxembourg Luxembourg Lux-embourg March 2012 2012 Bjorn Ottersten Thomas Engel

bull Thorsten Ries University of Luxembourg Luxembourg LuxembourgOctober 2012 2012 Thomas Engel

54 Guests

Invited Researchers

bull Prof Dr Andreas Albers (Goethe University of Frankfurt) October2012 Hugo Jonker Reason Research collaboration and presentation

bull Dr Dragos Horvath (Louis Pasteur University Strasbourg) October2012 Alexandru-Adrian Tantar Reason collaboration on samplingalgorithms

bull Dr Marek Bednarczyk (Polish Academy of Sciences Gdansk) May2012 Wojciech Jamroga Reason Research collaboration and pre-sentation

bull Dr Fei Gao (Norwegian University of Science and Technology (NTNU))October 1-12 2012 Pascal Bouvry Reason Collaboration on parallelevolutionary computing

bull Prof Dr Joanna Kolodziej (Cracow University of Technology) June2012 Pascal Bouvry Reason Collaboration on green computing re-search activities

bull Prof Dr Pierre Manneback (University of Mons) April 2012 PascalBouvry Reason Parallel computing research collaboration

bull Prof Dr Malgorzata Sterna (Poznan University of Technology) Jan-uary 2012 Pascal Bouvry Reason Collaboration on scheduling re-search activities

bull Dr Alexey Vinel (Tampere University of Technology Finland) august2012 Pascal Bouvry Reason Collaboration on wireless networksactivities

178 CSC Representation

bull Dr Nils Bulling (Clausthal University of Technology ) April 2012Wojciech Jamroga Reason Research collaboration and presentation

bull Dr Kostas Chatzikokolakis (LIX Ecole Polytechnique amp INRIASaclay) April 2012 Jun Pang Xihui Chen Reason Research col-laboration and presentation

bull Prof Dr Jason Crampton (Royal Holloway University of London)JUly 2012 Barbara Kordy Reason Research collaboration and pre-sentation

bull Dr Cas Cremers (ETH Zurich) August 2012 Sjouke Mauw ReasonResearch collaboration and presentation

bull Mrs Denise Demirel (TU Darmstadt) May 2012 Hugo Jonker Rea-son Research collaboration

bull Mr Andre Deuker (Goethe University of Frankfurt) October 2012Hugo Jonker Reason Research collaboration and presentation

bull Prof Dr Josep Domingo-Ferrer (Universitat Rovira i Virgili Catalunya) October 2012 Sjouke Mauw Barbara Kordy Reason Research col-laboration and presentation

bull Mr Santiago Iturriaga (Universidad de la Republica Uruguay) April1 to June 30 2012 Pascal Bouvry Reason Co-advising his workon parallel multi-objective local search heuristics for multi-objectivescheduling problems

bull Prof Dr Sergio Nesmachnow (Universidad de la Republica Uruguay)14-18 May 2012 Pascal Bouvry Reason Co-advising his work on par-allel multi-objective local search heuristics for multi-objective schedul-ing problems

bull Dr Alexandre Dulaunoy (CIRCLSMILE Luxembourg) December2012 Gabriele Lenzini Barbara Kordy Reason Research discussionand presentation

bull Prof Dr Eduardo Ferme (University of Madeira Portugal) Nov 1-22012 Reason ICR-ILIAS talk research collaboration

bull Ms Weili Fu (Free University of Bolzano and Technical University ofDresden ) July 2012 Sjouke Mauw Barbara Kordy Reason Researchpresentation

bull Dr Flavio Garcia (Radboud University Nijmegen) April 2012 SjoukeMauw Reason Research discussion

54 Guests 179

bull Prof Dr Valentin Goranko (Technical University of Denmark) June2012 Wojciech Jamroga Reason Research collaboration and presen-tation

bull Mr Mohammad Hassan Habibi (ISSL Lab EE Department SharifUniversity of Technology) April 2012 Sjouke Mauw Barbara Kordy Reason Research presentation

bull Prof Dr Lynda Hardman (CWI Amsterdam) December 2012 SjoukeMauw Reason discussion

bull Prof Dr Iyad Rahwan ( Masdar Institute of Science and Technology)May 17-19 2012 ICR-ILIAS Reason attending the defence ceremonyof Yining Wu

bull Mr Oljira Dejene Boru (University of Trento Italy) March - June2012 Dzmitry Kliazovich Reason Master internship

bull Mr Sisay Tadesse (University of Trento Italy) March - June 2012Dzmitry Kliazovich Reason Master internship

bull Prof Dr Tomasz Lipniacki (Institute of Fundamental Technologi-cal Research Polish Academy of Sciences) December 2012 AndrzejMizera Jun Pang Reason CSC-Bio research presentation

bull Dr Yang Liu (National University of Singapore) June 2012 Jun Pang Reason Research collaboration and presentation

bull Dr Madalina Croitoru (University of Montpellier 2) November 26-302012 Reason ICR-ILIASresearch collaboration

bull Mr Artur Meski (Polish Academy of Sciences Warsaw) April 2012Wojciech Jamroga Reason Research presentation

bull Prof Dr Marko Bertogna (University of Modena Italy) June 2012Nicolas Navet Reason Real-time Dependable Systems seminar atLASSY

bull Dr Liliana Cucu-Grosjean (INRIA France) June 2012 Nicolas NavetReason Real-time Dependable Systems seminar at LASSY

bull Dr Rob Davis (University of York UK) June 2012 Nicolas NavetReason Real-time Dependable Systems seminar at LASSY

bull Mr Stephan Neumann (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration and presentation

bull Dr Evangelos Evangelos (University of the Aegean) January 2012Sasa Radomirovic Reason Research collaboration and presentation

180 CSC Representation

bull Mrs Maina Olembo (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration

bull Prof Dr Andrei Tchernykh (CICESE research center EnsenadaMexico) October 2012 Pascal Bouvry Reason Collaboration andcontribution to FNR CORE GreenIT project

bull Prof Dr Pierre-Etienne Moreau (INRIA-Nancy France) Yves LeTraon Reason Collaboration

bull Prof Dr Selwyn Piramuthu (University of Florida) June-July 2012SaToSS group Reason visiting professor at SnT and SaToSS group

bull Prof Dr Henry Prakken (Utrecht University) May 2012 Leon vander Torre Reason Attending the defence ceremony of Yining Wu

bull Dr Hongyang Qu (Oxford University) November 2012 Jun Pang Reason Research collaboration and presentation

bull Dr Sasa Radomirovic (ETH Zurich) November 2012 Sjouke MauwBarbara Kordy Reason Research collaboration and presentation

bull Dr Rolando Trujillo Rasua (Universitat Rovira i Virgili Catalunya) October 2012 Sjouke Mauw Barbara Kordy Reason Researchcollaboration and presentation

bull Dr MohammadReza Mousavi (Eindhoven University) January 2012Jun Pang Reason Research collaboration and presentation

bull Prof Dr Olivier Roux (Ecole Centrale de Nantes) April 2012 SjoukeMauw Jun Pang Reason Research collaboration and presentation

bull Prof Dr Samir Chopra (Brooklyn College of the City University ofNew York USA) Nov 12-16 2012 Reason talk research collabora-tion

bull Dr Samy Passos (Universidade Federal do Ceara) Jul 10 - Aug 122012 Reason ICR-SnT talk research collaboration

bull Mr Maciej Szreter (Polish Academy of Sciences Warsaw) April 2012Wojciech Jamroga Reason Research collaboration

bull Ms Iuliia Tkachenko (University Bordeaux 1) July 2012 Sjouke MauwBarbara Kordy Reason Research presentation

bull Dr Devrim Unal (TUBITAK-BILGEM UEKAE Turkey ) November2012 Sjouke Mauw Barbara Kordy Reason Research presentationand discussion

55 Visits and other representation activities 181

bull Dr Matthias Thimm (Universitat Koblenz) June 18-19 2012 ICR-ILIAS Reason talk research collaboration

bull Dr Harm van Beek (Netherlands Forensic Institute) June 2012 SjoukeMauw Reason Research collaboration and presentation

bull Mr Andre van Cleeff (University of Twente) March 2012 SjoukeMauw Reason Research collaboration and presentation

bull Dr Melanie Volkamer (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration

bull Dr Melanie Volkamer (TU Darmstad CASED) October 2012 HugoJonker Reason invited lecture

bull Mr Pim Vullers (Radboud University Nijmegen) February 2012 SjoukeMauw Sasa Radomirovic Reason Research collaboration and pre-sentation

bull Dr Roland Wen (University of New South Wales Australia ) Septem-ber 2012 Hugo Jonker Reason Research collaboration

bull Dr Jan Willemson (Cybernetica Estonia) May 2012 Barbara KordyPatrick Schweitzer Sjouke Mauw Reason Research collaborationand presentation

bull Dr Zhenchang Xing (National University of Singapore) June 2012Jun Pang Reason Research collaboration and presentation

55 Visits and other representation activities

bull Richard Booth Visited organization Katholieke Universiteit Leuven(Oct 18-23 2012) Reason Research collaboration

bull Martin Caminada Visited organization (June 1-2 2012) Reasonparticipation in COST AT coordination network on behalf of ICR

bull Wojciech Jamroga Visited organization (6-8062012) Reasonconference participation contributed talk poster presentation

bull Wojciech Jamroga Visited organization Polish Academy of Sciences(2minus 4042012) Reason work on a joint paper

bull Wojciech Jamroga Visited organization Technical University of Den-mark (19minus 21042012) Reason Research collaboration and presen-tation

182 CSC Representation

bull Wojciech Jamroga Visited organization Clausthal University ofTechnology (20minus 25022012) Reason Research collaboration

bull Wojciech Jamroga Visited organization Polish-Japanese IT Institute(31012012) Reason Research collaboration

bull Wojciech Jamroga Visited organization International PhD Programme(29 minus 30012012) Reason Meeting of the International PhD Pro-gramme project overview talk

bull Wojciech Jamroga Visited organization Polish Academy of Sciences(25minus 26062012 ) Reason supervision of a PhD student

bull Wojciech Jamroga Visited organization LAMAS 2012 (4minus5062012)Reason workshop organization

bull Wojciech Jamroga Visited organization Dagstuhl seminar on Nor-mative Multi-Agent Systems (14032012) Reason seminar visit

bull Wojciech Jamroga Visited organization Trento University (28 minus29052012) Reason Research collaboration and presentation

bull Hugo Jonker Visited organization Cyberwarfare thinktank (09112012)Reason Founding meeting Cyberwarfare thinktank

bull Hugo Jonker Visited organization Privacy Lab (03042012) Rea-son Privacy Lab opening

bull Hugo Jonker Visited organization Digital Enlightenment Forum(18minus 19062012) Reason networking event

bull Hugo Jonker Visited organization TDL Consortium (05102012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization TDL Consortium (23012012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization TDL Consortium (12062012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization Thales Research amp Technology(29112012) Reason Attack Trees workshop research collaboration

bull Hugo Jonker Visited organization VeriMag (11minus 13112012) Rea-son Research collaboration

bull Dzmitry Kliazovich Visited organization GREENET project meet-ing (19-09-2012 - 21-09-2012) Reason Initial Training Network onGreen Wireless Networks - Seminar presentation

55 Visits and other representation activities 183

bull Dzmitry Kliazovich Visited organization Koc Universtiy - COSTIC0804 Meeting (05-10-2012 - 07-10-2012) Reason Presentation -GreenCloud A Packet-level Simulator of Energy-aware Cloud Com-puting Data Centers

bull Dzmitry Kliazovich Visited organization University of Trento (17-11-2012) Reason Seminar presentaiton - Energy-Efficient Design inCloud Computing Communication Systems

bull Barbara Kordy Visited organization University of Twente (05 minus06112012) Reason FP7 TREsPASS project kick off meeting

bull Barbara Kordy Visited organization LORIA (15052012) ReasonResearch collaboration and presentation

bull Barbara Kordy Visited organization Royal Holloway University ofLondon (01032012) Reason Research collaboration and presenta-tion

bull Barbara Kordy Visited organization SINTEF (16 minus 19042012)Reason Research collaboration

bull Barbara Kordy Visited organization NTNU (16minus19042012) Rea-son Invited talk

bull Barbara Kordy Visited organization Thales Research amp Technol-ogy (29112012) Reason Keynote presentation at the Attack Treesworkshop and collaboration

bull Simon Kramer Visited organization Institute of Mathematical Sci-ences (0101minus 28022012) Reason invited research visit

bull Juan Luis Jimenez Laredo Visited organization University of Inns-bruck (01-03-2012 to 05-05-2012) Reason Research visit in the con-text of the AM2c FNR11AM2c32Building the Skeleton of a SOscheduler

bull Yves Le Traon Visited organization 7th International Workshopon Automation of Software Test (AST 2012) (June 2012) ReasonKeynote on Security testing and software engineering challenges

bull Yves Le Traon Visited organization 8th International Summer Schoolon Training And Research On Testing (TAROT 2012) (July 2012)Reason Invited Keynote on Security Testing

bull Yves Le Traon Visited organization LCIS-ESISAR INPG (23-25August 2012) Reason Attract PhD students build collaboration onsensor networks and testing

184 CSC Representation

bull Yves Le Traon Visited organization INRIA-IRISA (August Novem-ber ) Reason Continuous collaboration Project writing seminarsrecruitment of research associates

bull Yves Le Traon Visited organization Microsoft Luxembourg (March2012) Reason Presentation of my group research activities to MS

bull Yves Le Traon Visited organization KIT Karlsruhe (several meetingsper year) Reason Collaboration (EU project PhD co-supervision)

bull Yves Le Traon Visited organization Lip6 - Univ Paris VI (July2012) Reason Collaboration on SPL reverse engineering and testing

bull Yves Le Traon Visited organization Telecom Bretagne (April andJuly 2012) Reason PhD supervision Project proposals writing

bull Llio Humphreys Visited organization Delft University of Technology(18-21 November2012) Reason research visit

bull Llio Humphreys Visited organization Kings College London (28 June2012) Reason research visit

bull Sjouke Mauw Visited organization COST DC ICT (13minus16062012)Reason project meeting

bull Sjouke Mauw Visited organization COST IC1205 (30112012)Reason project meeting

bull Sjouke Mauw Visited organization COST DC ICT (10minus11092012)Reason project meeting

bull Sjouke Mauw Visited organization Digital Enlightenment Forum(18minus 19062012) Reason networking event

bull Sjouke Mauw Visited organization University of Twente (05minus06112012)Reason FP7 TREsPASS project kick off meeting

bull Sjouke Mauw Visited organization Nationaal Instituut voor Crim-inalistiek en Criminologie (NICC) (23012012) Reason Researchcollaboration and presentation

bull Sjouke Mauw Visited organization IFIP WG 112 seminar (04072012)Reason presentation

bull Sjouke Mauw Visited organization STM 2012 (12 minus 14092012)Reason conference visit and presentation

bull Sjouke Mauw Visited organization Thales Research amp Technology(29112012) Reason Attack Trees workshop research collaboration

55 Visits and other representation activities 185

bull Nicolas Navet Visited organization University of Nantes (June 82012) Reason Lecture rdquoIndustrial practices of real-time schedulingrdquoat the colloquium rdquo1972-2012 40 years of research in real-time schedul-ingrdquo scientific days of the University of Nantes June 8 2012

bull Jun Pang Visited organization Nanjing University (08minus12102012)Reason Research collaboration

bull Xavier Parent Visited organization Imperial College and Kingrsquos Col-lege London (29 April - 4 march 2012) Reason Presentation at sym-posium and research collaboration

bull Johnatan E Pecero Visited organization National Electronics andComputer Technology Center (NECTEC) (6-12-2012) Reason En-ergy efficient solutions for cloud and HPC green scheduling and nextgeneration hardware

bull Sasa Radomirovic Visited organization Nationaal Instituut voorCriminalistiek en Criminologie (NICC) (23012012) Reason Re-search collaboration and presentation

bull Tjitze Rienstra Visited organization Twente University (February27 - March 2 2012) Reason talk research collaboration

bull Patrick Schweitzer Visited organization KTH (24042012) ReasonResearch presentation

bull Patrick Schweitzer Visited organization NTNU (16 minus 19042012)Reason Research collaboration

bull Patrick Schweitzer Visited organization SINTEF (16minus 19042012)Reason Research collaboration and presentation

bull Alexandru-Adrian Tantar Visited organization 2012 IEEE WorldCongress on Computational Intelligence (WCCI) (June 10-15 2012)Reason Green Evolutionary Computing for Sustainable Environments(tutorial)

bull Silvano Tosatto Visited organization Sophia Antipolis (February 8-11 2012) Reason Research collaboration

bull Silvano Tosatto Visited organization University of Queensland (May15- June 1 2012) Reason Research collaboration

bull Paolo Turrini Visited organization Technical University of Denmark(May 1-8 2012) Reason Research collaboration

186 CSC Representation

56 Research meeting

bull 13th International Workshop on Computational Logic in Multi-AgentSystems (2012-08-27 ndash 2012-08-28)

ndash Description Montpellier France

bull Joint UR-Math and UR-CSC Discrete Mathematics Colloquium (2010-05-10 ndash 2012-04-03) Number of presentations 15

ndash Description The Decision Aid Systems group within the Com-puter Science and Communication Research Unit (CSC) and theDiscrete Mathematics group within the Mathematics ResearchUnit (MATH) of the University of Luxembourg organize period-ically a common research seminar Regular Members

lowast R Bisdorff (responsible co-organiser CSC)

lowast M Couceiro (ass researcher postdoc MATH)

lowast E Lehtonen (ass researcher postdoc CSC)

lowast J-L Marichal(responsible co-organiser MATH)

lowast P Mathoney (ass researcher postdoc MATH)

lowast A Olteanu (assistantPhd studentCSC)

lowast Th Veneziano (assistantPhd studentCSC)

lowast T Walhauser (ass researcher postdoc MATH)

bull ICR Seminars

ndash Description Typically weekly (Monday 4pm) Seminar with guestresearchersInternal seminar

bull MINE Research Meeting (2012-01-09 ndash 2012-12-04) Number of presen-tations 24

ndash Description Research meetings

lowast Prof Dr Stephan Busemann German Research Centre forArtificial Intelligence 5 CET meetings (official and unofficialmeetings)

lowast Dr Urich Schaefer German Research Centre for ArtificialIntelligence 2 CET meetings (official and unofficial meet-ings)

lowast Prof Dr Theoharry Grammatikos Dept of Finance (LSF)15 meetings FNR CORE Project ESCAPE

lowast Dr Georges Krier SES 2 CET meetings (official and unoffi-cial meetings)

56 Research meeting 187

lowast Prof Dr Susanne Jekat University of Winterthur Dept ofLinguistics 1 inofficial CET meeting

bull ILIAS - TeamBouvry Seminars

ndash Description Research team meetings and one yearly team meet-ing with 25 presentations organized in November

bull Lassy Seminar

ndash Description This seminar is given several times a year by invitedspeakers on topics related to software construction

bull MAO - Multi-Agent Organisation (2011-12-19 ndash 2011-12-23)

ndash Description Leiden The Netherlands

bull Norm group research meeting

ndash Description weekly (Friday 2pm) presentations by guest re-searchers and internal members

bull Normative Multi-Agent Systems (2012-03-11 ndash 2012-03-16)

ndash Description Dagstuhl Germany

bull SaToSS Research Meeting

ndash Description On Tuesdays from 1030 to 1130 the SaToSS groupand the APSIA group led by Prof Peter YA Ryan hold theirweekly Security Research Meeting (SRM) The purpose of theSRM is to present and discuss research problems that are interest-ing for the members of both groups In 2012 Sasa RadomirovicBarbara Kordy and Jean Lancrenon were responsible for the or-ganization of the SRM The meeting featured 50 presentations in2012 Notable speakers in 2012 include Prof Luca Vigano ProfJason Crampton and Prof Josep Domingo-Ferrer The completelist of speakers as well as our seminar rules can be found at theseminar webpage httpsatossuniluseminarssrm

188 CSC Representation

Chapter 6

CSC Software

bull ACL-Lean Licence Free

ndash Description Developers Daniele Rispoli and Valerio Genovese

ACL-Lean is a decidable theorem prover (written in PROLOG)for propositional access control logics with says operator ACL-Lean implements an analytic labelled sequent calculus for condi-tional access control logics presented in V Genovese L GiordanoV Gliozzi and G L Pozzato ldquoA Conditional Constructive Logicfor Access Control and its Sequent Calculusrdquo 20th InternationalConference on Automated Reasoning with Analytic Tableaux andRelated Methods

bull ADTool Licence free use

ndash Description The attackndashdefense tree language formalizes andextends the attack tree formalism It is a methodology to graph-ically analyze security aspects of scenarios With the help ofattributes on attackndashdefense trees also quantitative analysis canbe performed As attackndashdefense tree models grow they soonbecome intractable to be analyzed by hand Hence computersupport is desirable Software toll called the ADTool has beenimplemented as a part of the ATREES project to support theattackndashdefense tree methodology for security modeling The mainfeatures of the ADTool are easy creation efficient editing andquantitative analysis of attackndashdefense trees The tool is avail-able at httpsatossunilusoftwareadtool The tool was

190 CSC Software

realized by Piotr Kordy and its manual was written by PatrickSchweitzer

bull ARGULAB Licence GPL v3

ndash Description Developers Mikolaj Podlaszewski

We present an implementation of the recently developed per-suasion dialogue game for formal argumentation theory undergrounded semantics The idea is to apply Mackenzie-style dia-logue to convince the user that an argument is or is not in thegrounded extension Hence to provide a (semi-)natural user in-terface to formal argumentation theory

bull bagit Licence non-redistributable for internal use only

ndash Description An internal web-based tool that provides assistanceto research groups by storing pooling tagging and indexing pa-pers and other publications Developed by Christian Glodt In2012 minor bugfixes have been applied to Bagit

bull Canephora Licence free use

ndash Description Trust opinions can be represented as probability dis-tributions over an (unknown) integrity parameter Simple trustopinions (that are based only on personal observations) can berepresented as a class of distributions known as Beta distribu-tions Trust opinions that are based on recommendations do not(necessarily) have such a simple representation Canephora nu-merically approximates the trust opinion that can be inferredfrom a recommendation Precision and coarseness of the resultcan be selected The result may depend on the strategy of therecommender Canephora allows implementations of such pos-sible strategies to be added on the fly The tool was createdby Tim Muller and can be accessed at httpsatossunilu

softwarecanephora

bull mCarve and cCarve Licence free use

ndash Description mCarve and cCarve are software tools for carvingattributed dump sets These dump sets can for instance beobtained by dumping the memory of a number of smart cards orby regularly dumping the memory of a single smart card duringits lifetime The tools help in determining at which location inthe dumps certain attributes are stored mCarve is written inPython and is available from httpsatossunilusoftware

191

mcarve More information about mCarve can be obtained fromour paper [259] cCarve is written in C++ It implements alinear algorithm for carving attributed dump sets which improvesits run time with respect to mCarve cCarve is available fromhttpsatossunilusoftwareccarve

bull delegation2spass Licence Free

ndash Description Developers Daniele Rispoli and Valerio Genovese

delegstion2spass is a parser (written in SCHEME) which imple-ments a set of complete reduction axioms and translates dynamicformulas for a delegationrevocation logic into propositional logicexpressed in DFG syntax

bull Democles Licence Freely redistributable see details athttpdemocleslassyunilulicensehtml

ndash Description Democles is a modeling tool that supports the EPlanguage developed by LASSYs MDE group It is mainly devel-oped by Christian Glodt In 2012 the following improvementswere made to Democles Nuno Amalio started work on imple-menting an EP-to-Alloy transformation for EP systems in Demo-cles Christian Glodt created a branch of Democles implement-ing model bridging interfaces as described in Sam Schmitrsquos MasterThesis rdquoA Bridging Mechanism for Adapting Abstract Models toPlatformsrdquo

bull Discrete Particle Method (DPM) Licence Internal use only

ndash Description The Discrete Particle Method (DPM) itself is anadvanced numerical simulation tool which deals with both mo-tion and chemical conversion of particulate material such as coalor biomass in furnaces However predictions of solely motion orconversion in a de-coupled mode are also applicable The DiscreteParticle Method uses object oriented techniques that support ob-jects representing three-dimensional particles of various shapessuch as cylinders discs or tetrahedrons for example size and ma-terial properties This makes it a highly versatile tool dealingwith a large variety of different industrial applications of granu-lar matter A user interface allows easily extending the softwarefurther by adding user-defined models or material properties toan already available selection of materials properties and reac-tion systems describing conversion Thus the user is relievedof underlying mathematics or software design and therefore is

192 CSC Software

able to direct his focus entirely on the application The DiscreteParticle Method is organised in a hierarchical structure of C++classes and works both in Linux and XP environments also onmulti-processor machines

This software is developed by the XDEM research team from theResearch Unit in Engineering Science (RUES) in collaborationwith the Computer Science and Communications (CSC) researchunit

bull GreenCloud Licence Open source

ndash Description Greencloud is a sophisticated packet-level simulatorfor energy-aware cloud computing data centers with a focus oncloud communications It offers a detailed fine-grained modelingof the energy consumed by the data center IT equipment such ascomputing servers network switches and communication links

bull JShadObf

ndash Description A JavaScript Obfuscation Framework based on evo-lutionary algorithms

bull LuxTraffic

ndash Description LuxTraffic is a project aiming to provide real timetraffic information by using smartphones as mobile traffic sensorsLuxembourg is an ideal location to validate the suggested systembecause of several factors The country has a well developed roadinfrastructure with 282 km of highways in total on its territorywhich permits to have a country- scoped instead of city-scopedapproach Also the recent high penetration rate of smartphonesin combination with the data flat rates create a favorable envi-ronment for community based traffic sensing using mobile phonesTaking these factors into account we designed LuxTraffic a trafficinformation system which is in essence an online repository aim-ing at centralizing all information related to individual mobilityin Luxembourg

The system has two main goals The first is to create and main-tain a community of users that will actively participate in col-lecting relevant traffic information using smartphone devices inan anonymous and autonomous manner To accomplish this ap-plications (APPs) for the two dominant mobile platforms iOSand Android have been developed In return the users benefitfrom a variety of traffic information services available online In

193

the first phase the system provides detailed information abouttraffic fluidity on Luxembourg highways In the second phasethe system will be extended to cover the entire road network

The second purpose of the LuxTraffic platform is to gather archiveand analyze the collected traffic data centrally in order to identifytraffic bottlenecks and propose solutions To provide additionalinformation we interface with the local highway traffic controlsystem called CITA which among others provides a 24 hoursaccess to highway cameras

bull MaM Multidimensional Aggregation Monitoring Licence Open Source

ndash Description MaM Multidimensional Aggregation MonitoringMaM performs multidimensional aggregation over various typesof data The targegeted use is the storage visualisation and anal-ysis of big data For example network operators may capturelarge quantities of flow based data which includes source and des-tination IP addresses and ports number of packets etc Aggre-gation allows to leverage global view and so is particularly helpfulfor anomaly tracking as the most powerful like spam campaignsbotnets distributed denial of service are distributed phenomenaand can only be observed assuming a global point of view How-ever defining the aggregation granularity is quite difficult andshould not fixed over all the space For example some IP net-works may require a small granularity while others need only ahigh level overview Hence MaM automatically selects the gran-ularity by creating irregular dimension splits which are so betterfitted to the underlying distribution In addition if a user doesnot know exactly what is looking for when he is monitoring hisnetwork it does not know which dimension is the most importantFor example there is no reason to aggregate first on source IPaddresses and then destination ports or vice-versa Thus MaMwill automatically optimizes that by selecting the proper order ofdimensions and even on multiple levels involving twice or morethe same dimension with different granularity levels

To achieve a good scalability MaM uses an underneath tree struc-ture A MaM tree is updated online with a limited complexityusing a Least Recently Used strategy to keep the tree size com-pact and so to save resources

MaM is a generic tool and can be extended to any hierarchicaltypes of data by implementing very few functions which describethe hierarchy

To summarize the advantages of MaM are - support of het-erogeneous types of data simultaneously - high scalability - easy

194 CSC Software

to extend - user friendly outputs and graphical user interface -open-source (available at httpsgithubcomjfrancoismam)

The practicability of MaM have been highlighted in [252] and apresentation is available at (demonstration at 1415)

httpswwwusenixorgconferencelisa12efficient-multidimensional-aggregation-large-scale-monitoring

bull MiCS Management System Licence non-redistributable for internaluse only

ndash Description An internal web-based tool developed for the man-agement of modules courses and profiles of the Master in Infor-mation and Computer Sciences Developed by Christian GlodtNumerous improvements have been made to the MiCS Manage-ment System in 2012

bull Model Decomposer Licence free to use binary redistribution per-mitted

ndash Description An Eclipse plugin that implements a generic modeldecomposition technique which is applicable to Ecore instancesand EP models and is described in a paper published in the pro-ceedings of the FASE 2011 conference Developed by ChristianGlodt

bull MSC Macro Package for LATEX Licence free use

ndash Description The message sequence chart (MSC) language is avisual language for the description of the interaction between dif-ferent components of a system This language is standardizedby the ITU (International Telecommunication Union) in Recom-mendation Z120 MSCs have a wide application domain rang-ing from requirements specification to testing and documenta-tion In order to support easy drawing of MSCs in LATEX doc-uments Sjouke Mauw and coworkers have developed the MSCmacro package Currently Piotr Kordy is responsible for main-tenance of the package Version 117 is currently available fromhttpsatossunilumscpackage In 2012 work started onrecoding the package as to make it compatible with pdflatex

bull OVNIS

ndash Description For online vehicular wireless and traffic simulationAn integration of traffic simulator SUMO with network simulatorns-3

195

bull ROS face recognition package Licence Attribution-NonCommercial30

ndash Description Developers Pouyan Ziafati Provides a ROS simpleactionlib server interface for performing different face recognitionfunctionalities in video stream

bull Seq-ACL+ Licence Free

ndash Description Developers Daniele Rispoli Valerio Genovese andDeepak Garg

Seq-ACL+ is a decidable theorem prover (written in PROLOG)for the modal access control logic ACL+ presented in V Genoveseand D Garg rdquoNew Modalities for Access Control Logics Permis-sion Control and Ratificationrdquo 7th International Workshop onSecurity and Trust Management - STM 2011

bull SHARC Licence GPL v3

ndash Description Source code and benchmarking framework for theSHARC (Sharper Heuristic for Assignment of Robust Communi-ties) protocol

bull VehILux

ndash Description Large set of realistic vehicular traces over the areaof Luxembourg country (110000 trips) than can be used by trafficsimulators like SUMO and in other simulations of traffic informa-tion systems

bull Visual Contract Builder Licence free to use binary redistributionpermitted

ndash Description A suite of Eclipse plugins that provide supportfor graphically editing and typechecking VCL (Visual ContractLanguage) diagrams Developed by Christian Glodt and NunoAmalio

196 CSC Software

Chapter 7

CSC Publications in 2012

The publications listed in this chapter have been generated from the officialpublication record repository of the university

httppublicationsunilu

An overview of the publication quantity (per category) is provided in thetable below

Publication category Quantity Section

Books 1 sect71 page 197Book Chapters 7 sect72 page 198

International journals 69 sect73 page 198Conferences Articles 165 sect74 page 204

Internal Reports 6 sect75 page 223Proceedings 3 sect76 page 224

Total 251

Table 71 Overview of CSC publications in 2012

71 Books

[1] Cas Cremers and Sjouke Mauw Operational semantics and verificationof security protocols Springer-Verlag 2012

198 BIBLIOGRAPHY

72 Book Chapters

[2] Paolo Turrini Xavier Parent Leendert van der Torre and SilvanoColombo Tosatto Contrary-To-Duties in Games pages 329ndash348Springer 2012

[3] Johnatan E Pecero Bernabe Dorronsoro Mateusz Guzek and Pas-cal Bouvry Memetic Algorithms for Energy-Aware Computation andCommunications Optimization in Computing Clusters pages 443 ndash473 Chapman and HallCRC Press 2012

[4] Xavier Parent Why Be Afraid of Identity volume 7360 of LectureNotes in Computer Science pages 295ndash307 Springer 2012

[5] Hugo Jonker Sjouke Mauw and Jun Pang Location-Based ServicesPrivacy Security and Assurance pages 235ndash244 IOS Press 2012

[6] Moussa Amrani A Formal Semantics of Kermeta pages 274 ndash 315IGI Global Hershey PA USA 2012

[7] Marcin Seredynski and Pascal Bouvry The Application of Evolution-ary Heuristics for Solving Soft Security Issues in MANETs pages 97ndash114 Springer 2012

[8] Jianguo Ding Ilangko Balasingham and Pascal Bouvry ManagementChallenges for Emerging Wireless Networks pages 3ndash34 CRC Press2012

73 International journals

[9] Raymond Bisdorff On polarizing outranking relations with large per-formance differences Journal of Multi-Criteria Decision AnalysisDOI 101002mcda14721ndash20 2012

[10] Christoph Benzmuller Dov Gabbay Valerio Genovese and DanieleRispoli Embedding and automating conditional logics in classicalhigher-order logic Ann Math Artif Intell 66(1-4)257ndash271 2012

[11] Benoıt Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee Technique et science informa-tiques 31(8-9-10)1121ndash1152 2012

[12] Alex Biryukov and Johann Grosschadl Cryptanalysis of the full aesusing gpu-like special-purpose hardware Fundamenta Informaticae114(3-4)221ndash237 2012

BIBLIOGRAPHY 199

[13] Alexander Bochman and Dov Gabbay Causal dynamic inference AnnMath Artif Intell 66(1-4)231ndash256 2012

[14] Davide Falessi Mehrdad Sabetzadeh Lionel Briand EmanueleTurella Thierry Coq and Rajwinder Kaur Panesar-Walawege Plan-ning for safety standards compliance A model-based tool-supportedapproach IEEE Software 29(3)64ndash70 2012

[15] Dov Gabbay Overview on the connection between reactive kripkemodels and argumentation networks Ann Math Artif Intell 66(1-4)1ndash5 2012

[16] Dov Gabbay Introducing reactive kripke semantics and arc accessi-bility Ann Math Artif Intell 66(1-4)7ndash53 2012

[17] Dov Gabbay Introducing reactive modal tableaux Ann Math ArtifIntell 66(1-4)55ndash79 2012

[18] Dov Gabbay Completeness theorems for reactive modal logics AnnMath Artif Intell 66(1-4)81ndash129 2012

[19] Dov Gabbay and Sergio Marcelino Global view on reactivity switchgraphs and their logics Ann Math Artif Intell 66(1-4)131ndash1622012

[20] Philipp Grabher Johann Grosschadl Simon Hoerder Kimmo Jarvi-nen Dan Page Stefan Tillich and Marcin Wojcik An explorationof mechanisms for dynamic cryptographic instruction set extensionJournal of Cryptographic Engineering 2(1)1ndash18 2012

[21] Laurent Kirsch Jean Botev and Steffen Rothkugel Snippets andcomponent-based authoring tools for reusing and connecting docu-ments Journal of Digital Information Management 10(6)399ndash4092012

[22] Tom Mens and Jacques Klein Evolving software - introduction to thespecial theme Ercim News 888ndash9 2012

[23] Gilles Perrouin Sebastian Oster Sagar Sen Jacques Klein BenoitBaudry and Yves Le Traon Pairwise testing for software prod-uct lines Comparison of two approaches Software Quality Journal20(3)605ndash643 2012

[24] Selwyn Piramuthu Gaurav Kapoor Wei Zhou and Sjouke MauwInput online review data and related bias in recommender systemsDecision Support Systems 53(3)418ndash424 2012

200 BIBLIOGRAPHY

[25] Qiang Tang Public key encryption schemes supporting equality testwith authorization of different granularity International Journal ofApplied Cryptography pages 304ndash321 2012

[26] Qiang Tang Public key encryption supporting plaintext equality testand user specified authorization Security and Communication Net-works pages 1351ndash1362 2012

[27] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre Modelling defeasible and prioritized support in bipolar argu-mentation Ann Math Artif Intell 66(1-4)163ndash197 2012

[28] Serena Villata Guido Boella Dov Gabbay Leendert van der Torreand Joris Hulstijn A logic of argumentation for specification andverification of abstract argumentation frameworks Ann Math ArtifIntell 66(1-4)199ndash230 2012

[29] Ying Zhang Chenyi Zhang Jun Pang and Sjouke Mauw Game-based verification of contract signing protocols with minimal messagesInnovations in Systems and Software Engineering 8111ndash124 2012

[30] Qixia Yuan Panuwat Trairatphisan Jun Pang Sjouke MauwMonique Wiesinger and Thomas Sauter Probabilistic model check-ing of the pdgf signaling pathway Transactions on ComputationalSystems Biology XIV151ndash180 2012

[31] Emil Weydert Conditional ranking revision - iterated revision withsets of conditionals Journal of Philosophical Logic 41(1)237ndash2712012

[32] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre Modelling defeasible and prioritized support in bipolar argu-mentation Ann Math Artif Intell 66(1-4)163ndash197 2012

[33] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre A logic of argumentation for specification and verification ofabstract argumentation frameworks Ann Math Artif Intell 66(1-4)199ndash230 2012

[34] Paolo Turrini Jan Broersen Rosja Mastrop and John-Jules ChMeyer Regulating competing coalitions a logic for socially optimalgroup choices Journal of Applied Non-Classical Logics 22(1-2)181ndash202 2012

[35] Yanjie Sun Chenyi Zhang Jun Pang Baptiste Alcalde and SjoukeMauw A trust-augmented voting scheme for collaborative privacymanagement Journal of Computer Security 20(4)437ndash459 2012

BIBLIOGRAPHY 201

[36] Hanna Scholzel Hartmut Ehrig Maria Maximova Karsten Gabrieland Frank Hermann Satisfaction restriction and amalgamation ofconstraints in the framework of m-adhesive categories Electronic Pro-ceedings in Theoretical Computer Science (EPTCS) 9383ndash104 2012

[37] Ayda Saidane and Nicolas Guelfi Seter Towards architecture-modelbased security engineering International Journal of secure softwareengineering to appear 0920120ndash0 2012

[38] Frederic Pinel Bernabe Dorronsoro Johnatan E Pecero Pascal Bou-vry and Samee U Khan A two-phase heuristic for the energy-efficientscheduling of independent tasks on computational grids Cluster Com-puting 2012

[39] Frederic Pinel Bernabe Dorronsoro and Pascal Bouvry Solving verylarge instances of the scheduling of independent tasks problem on thegpu Journal of Parallel and Distributed Computing 2012

[40] Jakub Muszynski Sebastien Varrettte Pascal Bouvry FranciszekSeredynski and Samee U Khan Convergence analysis of evolutionaryalgorithms in the presence of crash-faults and cheaters InternationalJournal of Computers amp Mathematics with Applications 64(12)3809ndash 3819 2012

[41] Roman Ledyayev Benoıt Ries and Anatoliy Gorbenko React anarchitectural framework for the development of a software productline for dependable crisis management systems Radioelectronic andComputer Systems 59(7)284ndash288 2012

[42] Simon Kramer Rajeev Gore and Eiji Okamoto Computer-aideddecision-making with trust relations and trust domains (cryptographicapplications) Journal of Logic and Computation pages 0 ndash 0 2012page numbers not yet known

[43] Dzmitry Kliazovich Simone Redana and Fabrizio Granelli Arqproxy Cross-layer error recovery in wireless access networks Inter-national Journal of Communication Systems 25(4)461 ndash 477 2012

[44] You Ilsun Lenzini Gabriele Ogiela Marek R and Bertino Elisa De-fending against insider threats and internal data leakage (guest edito-rial) Security and Communication Networks 5(8)831 ndash 833 2012

[45] Frank Hermann and Janis Voigtlander First international work-shop on bidirectional transformations (bx 2012) Preface ElectronicCommunications of the European Association of Software Science andTechnology (ECEASST) 491ndash4 2012

202 BIBLIOGRAPHY

[46] Davide Grossi and Paolo Turrini Dependence in games and de-pendence games Autonomous Agents and Multi-Agent Systems25(2)284ndash312 2012

[47] Valentin Goranko Wojciech Jamroga and Paolo Turrini Strategicgames and truly playable effectivity functions Autonomous Agentsand Multi-Agent Systems 2012

[48] David Galindo Rodrigo Roman and Javier Lopez On the energy costof authenticated key agreement in wireless sensor networks WirelessCommunications and Mobile Computing 12(1)133 ndash 143 2012

[49] Claudia Ermel Frank Hermann Jurgen Gall and Daniel BinanzerVisual modeling and analysis of emf model transformations based ontriple graph grammars Electronic Communications European Associ-ation of Software Science and Technology (EC-EASST) pages 1ndash122012

[50] Vasileios Efthymiou Maria Koutraki and Grigoris Antoniou Real-time activity recognition and assistance in smart classrooms Advancesin Distributed Computing and Artificial Intelligence Journal 15367ndash74 2012

[51] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry New state-of-the-art results for cassini2 global trajectory optimization problemThe Journal of the Advanced Concepts Team 556 ndash 72 2012

[52] Miguel Couceiro and Erkko Lehtonen Galois theory for sets of op-erations closed under permutation cylindrification and compositionAlgebra Universalis 67(3)273ndash297 2012

[53] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser The aritygap of order-preserving functions and extensions of pseudo-booleanfunctions Discrete Applied Mathematics 160(4-5)383ndash390 2012

[54] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser Decom-positions of functions based on arity gap Discrete Mathematics312(2)238ndash247 2012

[55] Martin Caminada Walter Carnielli and Paul Dunne Semi-stablesemantics J Log Comput 22(5)1207ndash1254 2012

[56] Richard Booth Thomas Meyer and Chattrakul Sombattheera A gen-eral family of preferential belief removal operators Journal of Philo-sophical Logic 41(4)711ndash733 2012

[57] Mike Behrisch Miguel Couceiro Keith A Kearnes Erkko Lehtonenand Agnes Szendrei Commuting polynomial operations of distributivelattices Order 29(2)245ndash269 2012

BIBLIOGRAPHY 203

[58] Alessandra Bagnato Barbara Kordy Per H Meland and PatrickSchweitzer Attribute decoration of attack-defense trees InternationalJournal of Secure Software Engineering 3(2)1ndash35 2012

[59] Peter Ryan and Thea Peacock Verifiable voting Recent advances andfuture challenges Voting What Has Changed What Hasnrsquot amp WhatNeeds Improvement 1(1)1ndash84 2012

[60] Le-Nam Tran Mats Bengtsson and Bjorn Ottersten Iterative pre-coder design and user scheduling for block-diagonalized systems IEEETransactions on Signal Processing 60(7)3726ndash3739 2012

[61] Yongming Huang Gan Zheng Mats Bengtsson Kai-Kit Wong LuxiYang and Bjorn Ottersten Distributed multicell beamforming designapproaching pareto boundary with max-min fairness IEEE Transac-tions on Wireless Communications 11(8)2921ndash2933 2012

[62] Bhavani Shankar Daniel Arapoglou Pantelis and Bjorn OtterstenSpace-frequency coding for dual polarized hybrid mobile satellite sys-tems IEEE Transactions on Wireless Communications 11(8)2806ndash2814 2012

[63] Emil Bjornson Mats Bengtsson and Bjorn Ottersten Pareto char-acterization of the multicell mimo performance region with simple re-ceivers IEEE Transactions on Signal Processing 60(8)4464ndash44692012

[64] Symeon Chatzinotas Gan Zheng and Bjorn Ottersten Generic op-timization of linear precoding in multibeam satellite systems IEEETransactions on Wireless Communications 11(6)2308ndash2320 2012

[65] Bhavani Shankar M R Pantelis-Daniel Arapoglou and Bjorn Otter-sten Space-frequency coding for dual polarized hybrid mobile satellitesystems IEEE Transactions on Wireless Communications 11(8)2806ndash 2814 2012

[66] Frederic Garcia Djamila Aouada Bruno Mirbach and Bjorn Otter-sten Real-time distance-dependent mapping for a hybrid tof multi-camera rig IEEE Journal of Selected Topics in Signal Procesing(JSTSP) 6(5)1ndash12 2012

[67] Dimitrios Christopoulos Symeon Chatzinotas Gan Zheng Joel Grotzand Bjorn Ottersten Multibeam joint processing in satellite communi-cations Eurasip Journal on Wireless Communications and Network-ing 2012(1) 2012

204 BIBLIOGRAPHY

[68] Emil Bjornson Gan Zheng Mats Bengtsson and Bjorn OtterstenRobust monotonic optimization framework for multicell miso systemsIEEE Transactions on Signal Processing 60(5)2508ndash2523 2012

[69] David Fotue Houda Labiod and Thomas Engel Performance eval-uation of mini-sinks mobility using multiple paths in wireless sensornetworks International Journal of Computer Science and Security(IJCSS) 6(3)150ndash167 2012

[70] Marcin Seredynski and Pascal Bouvry Analysing the development ofcooperation in manets The Journal of Supercomputing pages 1ndash172012

[71] Marcin Seredynski and Pascal Bouvry Direct reciprocity-based coop-eration in mobile ad hoc networks International Journal of Founda-tions of Computer Science 23(2)501ndash521 2012

[72] Dzmitry Kliazovich Pascal Bouvry and Samee U Khan Greenclouda packet-level simulator of energy-aware cloud computing data centersThe Journal of Supercomputing 62(3)pp 1263ndash1283 2012

[73] Patricia Ruiz Bernabe Dorronsoro Pascal Bouvry and Lorenzo JTardon Information dissemination in vanets based upon a tree topol-ogy Journal of Ad hoc Networks 10(1)111ndash127 2012

[74] Patricia Ruiz Bernabe Dorronsoro Giorgio Valentini Frederic Pineland Pascal Bouvry Optimisation of the enhanced distance basedbroadcasting protocol for manets J of Supercomputing Special Is-sue on Green networks 62(3)1213ndash1240 2012

[75] Shaukat Ali Tao Yue and Lionel Briand Does aspect-oriented mod-eling help improve the readability of uml state machines Softwareand Systems Modeling 2012

[76] Andrea Arcuri and Lionel Briand A hitchhikerrsquos guide to statisti-cal tests for assessing randomized algorithms in software engineeringSoftware Testing Verification and Reliability 2012

[77] Andrea Arcuri and Lionel Briand Formal analysis of the probability ofinteraction fault detection using random testing IEEE Transactionson Software Engineering 38(5)1088ndash1099 2012

74 Conferences Articles

[78] Apostolos Stathakis Gregoire Danoy Thomas Veneziano Pascal Bou-vry and Gianluigi Morelli Bi-objective optimisation of satellite pay-load configuration In Proceedings of the 13e congres annuel de la

BIBLIOGRAPHY 205

Societe francaise de Recherche Operationnelle et drsquoAide a la Decision(ROADEF) pages 1ndash2 2012

[79] Apostolos Stathakis Gregoire Danoy Thomas Veneziano JulienSchleich and Pascal Bouvry Optimising satellite payload reconfig-uration An ilp approach for minimising channel interruptions In 2ndESA Workshop on Advanced Flexible Telecom Payloads pages 1ndash8ESA 2012

[80] Guido Boella Joris Hulstijn Llio Humphreys Livio Robaldo andLeendert Van der Torre Legal knowledge management systems forregulatory compliance In IX Conference of the Italian Chapter ofAIS pages 1ndash8 2012

[81] Guido Boella Joris Hulstijn Llio Humphreys Marijn Janssen andLeendert van der Torre Towards legal knowledge management systemsfor regulatory compliance In IX Conference of the Italian Chapter ofAIS pages 1ndash8 2012

[82] Guido Boella Luigi di Caro Llio Humphreys Livio Robaldo andLeendert van der Torre Nlp challenges for eunomos a tool to build andmanage legal knowledge In Proceedings of the Eighth InternationalConference on Language Resources and Evaluation (LREC rsquo12) pages3672ndash3678 European Language Resources Association (ELRA) 2012

[83] Guido Boella Llio Humphreys Marco Martin Piercarlo Rossi andLeendert van der Torre Eunomos a legal document and knowledgemanagement system to build legal services In Monica (Editor) Palmi-rani Ugo (Editor) Pagallo Pompeu (Editor) Casanovas and Gio-vanni (Editor) Sartor editors AI Approaches to the Complexity ofLegal Systems Models and Ethical Challenges for Legal Systems LegalLanguage and Legal Ontologies Argumentation and Software Agentsvolume 7639 of Lecture Notes in Computer Science pages 131ndash146Berlin Heidelberg 2012 Springer

[84] Pouyan Ziafati Mehdi Dastani John-Jules Meyer and Leon VanDer Torre Agent programming languages requirements for program-ming cognitive robots (extended abstract) In Proceedings of the 24thBenelux Conference on Artificial Intelligence pages 337ndash338 2012

[85] Eric Tobias Eric Ras and Nuno Amalio Suitability of visual mod-elling languages for modelling tangible user interface applicationsIn Symposium on Visual Languages and Human-Centric Computing(VLHCC) pages 269 ndash270 IEEE 2012

206 BIBLIOGRAPHY

[86] Jerome Leemans and Nuno Amalio Modelling a cardiac pacemakervisually and formally In Symposium on Visual Languages and Human-Centric Computing (VLHCC) pages 257 ndash258 IEEE 2012

[87] Mike Papadakis and Yves Le Traon Using mutants to locate ldquoun-knownrdquo faults In Fifth International Conference on Software TestingVerification and Validation (ICST) pages 691ndash700 2012

[88] Silvano Colombo Tosatto Guido Boella Leendert van der Torre andSerena Villata Abstract normative systems Semantics and prooftheory In Proceedings of the Thirteenth International Conference onPrinciples of Knowledge Representation and Reasoning pages 358ndash368 2012

[89] Silvano Colombo Tosatto Guido Boella Leon van der Torre and Ser-ena Villata Visualizing normative systems an abstract approach InDeontic Logic in Computer Science - 11th International ConferenceDEON 2012 pages 16ndash30 2012

[90] Silvano Colombo Tosatto Marwane El Kharbili Guido GovernatoriPierre Kelsen Qin Ma and Leender van der Torre Algorithms forbasic compliance problems In Benelux conference on Artificial Intel-ligence (BNAIC) 2012

[91] Jayanta Poray and Christoph Schommer Operations on conver-sational mind-graphs In The 4th International Conference onAgents and Artificial Intelligence (ICAART - 2012) pages 511ndash514SciTePress 2012

[92] Christoph Bosch Qiang Tang Peter Hartel and Willem Jonker Selec-tive document retrieval from encrypted database In Information Se-curity - 15th International Conference ISC 2012 volume 7483 pages224ndash241 Springer 2012

[93] Xiaofeng Chen Jin Li Jianfeng Ma Qiang Tang and Wenjing LouNew algorithms for secure outsourcing of modular exponentiations InComputer Security - ESORICS 2012 - 17th European Symposium onResearch in Computer Security volume 7459 pages 541ndash556 Springer2012

[94] Johann Grosschadl Dan Page and Stefan Tillich Efficient java im-plementation of elliptic curve cryptography for j2me-enabled mobiledevices In Information Security Theory and Practice mdash WISTP 2012volume LNCS 7322 pages 189ndash207 Springer Verlag 2012

[95] Arjan Jeckmans Qiang Tang and Pieter Hartel Privacy-preservingcollaborative filtering based on horizontally partitioned dataset In

BIBLIOGRAPHY 207

International Symposium on Security in Collaboration Technologiesand Systems pages 439ndash446 2012

[96] Max E Kramer Jacques Klein and Jim R H Stell Building specifica-tions as a domain-specific aspect language In Proceedings of the Sev-enth Workshop on Domain-Specific Aspect Languages at the Aspect-Oriented Software Development Conference pages 29ndash32 ACM 2012

[97] Daniel Marnach Sjouke Mauw Miguel Martins and Carlo HarpesDetecting meaconing attacks by analysing the clock bias of gnss re-ceivers In European Navigation Conference (ENC 2012) pages 1ndash192012

[98] Jorge Augusto Meira Eduardo Cunha Almeida Yves Le Traon andGerson Sunye Peer-to-peer load testing In ICST - 2012 IEEE FifthInternational Conference on Software Testing Verification and Vali-dation pages 642ndash647 IEEE 2012

[99] Gilles Perrouin Brice Morin Franck Chauvel Franck Fleurey JacquesKlein Yves Le Traon Olivier Barais and Jean-Marc Jezequel To-wards flexible evolution of dynamically adaptive systems in the newideas amp emerging results track of the international conference ofsoftware engineering (niericse) In New Ideas amp Emerging Re-sults Track of the International Conference of Software Engineering(NIERICSE) Zurich Switzerland 2012 pages 1353ndash1356 IEEEPress 2012

[100] Qiang Tang Cryptographic framework for analyzing the privacy ofrecommender algorithms In International Conference on Collabora-tion Technologies and Systems pages 455ndash462 IEEE 2012

[101] Ton van Deursen and Sasa Radomirovic Insider attacks and privacy ofrfid protocols In Public Key Infrastructures Services and Applications-8th European Workshop EuroPKI 2011 volume 7163 pages 91ndash105Springer 2012

[102] Erich Wenger and Johann Grosschadl An 8-bit avr-based elliptic curvecryptographic risc processor for the internet of things In Proceedingsof the 1st Workshop on Hardware and Architectural Support for Secu-rity and Privacy (HASP 2012) pages 37ndash45 IEEE Computer Society2012

[103] Reiko Heckel Hartmut Ehrig Ulrike Golas and Frank Hermann Par-allelism and concurrency of stochastic graph transformations In GraphTransformations volume 7562 of Lecture Notes in Computer Sciencepages 96ndash110 Springer Berlin Heidelberg 2012

208 BIBLIOGRAPHY

[104] Jan Broersen Dov Gabbay and Leendert van der Torre Discussionpaper Changing norms is changing obligation change In DeonticLogic in Computer Science volume 7393 of Lecture notes in ComputerScience pages 199ndash214 Springer 2012

[105] Chenyi Zhang and Jun Pang An algorithm for probabilistic alternat-ing simulation In Proc the 38th International Conference on CurrentTrends in Theory and Practice of Computer Science pages 431ndash4422012

[106] Emil Weydert On arguments and conditionals In ECAI WS WeightedLogics for AI (WL4AI) pages 69ndash78 IRIT 2012

[107] Srdjan Vesic Mykhailo Ianchuk and Andrii Rubtsov The synergy Aplatform for argumentation-based group decision making In Proceed-ings of the 4th International Conference on Computational Models ofArgument COMMA 2012 pages 501ndash502 2012

[108] Srdjan Vesic and Leendert van der Torre Beyond maxi-consistent ar-gumentation operators In Proceedings of the 13th European Confer-ence on Logics in Artificial Intelligence JELIA 2012 pages 424ndash4362012

[109] Srdjan Vesic Maxi-consistent operators in argumentation In Proceed-ings of the 20th European Conference on Artificial Intelligence ECAI2012 pages 810ndash815 2012

[110] Leendert van der Torre and Guido Boella Reasoning for agreementtechnologies In Proceedings of the 20th European Conference on Ar-tificial Intelligence (ECAI) pages 895ndash896 2012

[111] Leendert van der Torre Logics for security and privacy In Data andApplications Security and Privacy XXVI pages 1ndash7 Springer 2012

[112] Paolo Turrini Agreements as norms In Deontic Logic in ComputerScience pages 31ndash45 2012

[113] Marija Slavkovik and Wojciech Jamroga Distance-based rules forweighted judgment aggregation (extended abstract) In Proceedings ofthe 11th International Conference on Autonomous Agents and Multi-agent Systems AAMAS2012 pages 1405ndash1406 2012

[114] Francois Schwarzentruber Srdjan Vesic and Tjitze Rienstra Build-ing an epistemic logic for argumentation In Proceedings of the 13thEuropean Conference on Logics in Artificial Intelligence JELIA 2012pages 359ndash371 2012

BIBLIOGRAPHY 209

[115] Tjitze Rienstra Towards a probabilistic dung-style argumentationsystem In AT 2012 Agreement Technologies Proceedings of the FirstInternational Conference on Agreement Technologies pages 138ndash152CEUR 2012

[116] Sandro Reis Denis Shirnin and Denis Zampunieris Design ofproactive scenarios and rules for enhanced e-learning In Proceed-ings CSEDU 2012 4th International Conference on Computer Sup-ported Education Porto (Portugal) 2012 volume 1 pages 253 ndash 258SciTePress ndash Science and Technology Publications 2012

[117] Raghunath Rajachandrasekar Xavier Besseron and Dhabaleswar KPanda Monitoring and predicting hardware failures in hpc clusterswith ftb-ipmi In 2012 IEEE 26th International Parallel and Dis-tributed Processing Symposium Workshops amp PhD Forum pages 1136ndash1443 IEEE Computer Society 2012

[118] Johnatan E Pecero Hector Joaquin Fraire Huacuja Pascal BouvryAurelio Alejandro Santiago Pineda Mario Cesar Lopez Loces andJuan Javier Gonzalez Barbosa On the energy optimization for prece-dence constrained applications using local search algorithms In Pro-ceedings of the 2012 International Conference on High PerformanceComputing amp Simulation (HPCS 2012) pages 133 ndash 139 2012

[119] Patrick Meyer and Alexandru-Liviu Olteanu Preferentially orderedclustering In Modelling Decisions for Artificial Intelligence pages87ndash98 2012

[120] Juan Julian Merelo Antonio M Mora Carlos Fernandes Anna IEsparcia-Alcazar and Juan Luis Jimenez Laredo Pool vs island basedevolutionary algorithms an initial exploration In 2012 Seventh In-ternational Conference on P2P Parallel Grid Cloud and InternetComputing pages 19ndash24 IEEE Computer Society 2012

[121] Sergio Marques Dias Sandro Reis and Denis Zampunieris Proac-tive computing based implementation of personalized and adaptivetechnology enhanced learning over moodle(tm) In Proceedings ofICALT 2012 IEEE 12th International Conference on Advanced Learn-ing Technologies pages 674 ndash 675 IEEE Computer Society Publica-tions 2012

[122] Diana Marosin Alex Handrik Proper and Leendert van der TorreChanging agreements Intention reconsideration based on assumptionsand reasons In Proceedings of the First International Conference onAgreement Technologies AT 2012 pages 296ndash297 2012

210 BIBLIOGRAPHY

[123] Qian Li Peter Schaffer Jun Pang and Sjouke Mauw Comparativeanalysis of clustering protocols with probabilistic model checking InProceedings of the 6th IEEE Symposium on Theoretical Aspects of Soft-ware Engineering pages 249ndash252 IEEE Computer Society 2012

[124] Erkko Lehtonen and Agnes Szendrei Partial orders induced by quasi-linear clones In Contributions to General Algebra volume 20 pages51ndash84 Verlag Johannes Heyn 2012

[125] Barbara Kordy Marc Pouly and Patrick Schweitzer Computationalaspects of attack-defense trees In Security amp Intelligent InformationSystems volume LNCS 7053 pages 103ndash116 Springer 2012

[126] Laurent Kirsch Jean Botev and Steffen Rothkugel The snippet sys-tem - reusing and connecting documents In Proceedings of the 7thInternational Conference on Digital Information Management pages138ndash144 2012

[127] Laurent Kirsch Jean Botev and Steffen Rothkugel An extensible toolset for creating and connecting reusable documents In Proceedings ofWorld Conference in Educational Media Hypermedia and Telecommu-nications pages 1434ndash1442 2012

[128] Coron Jean-Sebastien Giraud Christophe Prouff Emmanuel Ren-ner Soline Rivain Matthieu and Vadnala Praveen Kumar Conver-sion of security proofs from one leakage model to another A newissue In Constructive Side-Channel Analysis and Secure Design vol-ume 72752012 pages 69ndash81 Springer Lecture Notes in ComputerScience 2012 2012

[129] Gallais Jean-Francois Roy Arnab and Vadnala Praveen Kumar Fullkey recovery attacks on modular addition An application to threefishIn Workshop on Embedded Systems Security 2012 pages 1ndash9 ACM2012

[130] Wojciech Jamroga Concepts agents and coalitions in alternatingtime In Proceedings of the 20th European Conference on ArtificialIntelligence ECAI 2012 pages 438ndash443 2012

[131] Santiago Iturriaga Sergio Nesmachnow and Bernabe Dorronsoro Amultithreading local search for multiobjective energy-aware schedulingin heterogeneous computing systems In 26th European Conference onModelling and Simulation (ECMS) pages 1 ndash 7 2012

[132] Frank Hermann Hartmut Ehrig and Claudia Ermel Concurrentmodel synchronization with conflict resolution based on triple graphgrammars In Fundamental Approaches to Software Engineering vol-ume 7212 pages 178ndash193 Springer 2012

BIBLIOGRAPHY 211

[133] Davide Grossi and Paolo Turrini Short sight in extensive gamesIn Proceedings of the 11th International Conference on AutonomousAgents and Multiagent Systems (AAMAS 2012) pages 805ndash812 2012

[134] Valentin Goranko and Wojciech Jamroga State and path effectivitymodels for logics of multi-player games In Proceedings of the 11thInternational Conference on Autonomous Agents and Multiagent Sys-tems AAMAS 2012 pages 1123ndash1130 Springer 2012

[135] Eugenio Giordano Lara Codeca Brian Geffon Giulio Grassi Gio-vanni Pau and Mario Gerla Movit The mobile network virtual-ized testbed In Proceedings of the ninth ACM international workshopon Vehicular inter-networking systems and applications pages 3ndash12ACM New York NY USA ccopy2012 2012

[136] Nicolas Genon Patrice Caire Hubert Toussaint Patrick Heymansand Daniel Moody Towards a more semantically transparent i visualsyntax In Requirements Engineering Foundation for Software Qual-ity - 18th International Working Conference REFSQ 2012 EssenGermany March 19-22 2012 Proceedings Lecture Notes in Com-puter Science 7195 Springer 2012 volume 7195 of Lecture Notes inComputer Science pages 140ndash146 Springer Berlin Heidelberg 2012

[137] Vijayalakshmi Ganesan Sergio Sousa Marija Slavkovik and Leendertvan der Torre Selecting judgment aggregation rules for nao robotsan experimental approach In Proceedings of the 11th InternationalConference on Autonomous Agents and Multiagent Systems (AAMAS2012) pages 1403ndash1404 International Foundation for AutonomousAgents and Multiagent Systems 2012

[138] Francois Fouquet Gregory Nain Brice Morin Erwan Daubert OlivierBarais Noel Plouzeau and Jean-Marc Jezequel An eclipse modellingframework alternative to meet the modelsruntime requirements InMODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMSvolume 7590 pages 87ndash101 Springer Berlin Heidelberg 2012

[139] Vasileios Efthymiou and Patrice Caire Privacy challenges in ambientintelligent systems A critical discussion In Proceedings of the 3rdPrivacy Protection Symposium - Atelier protection de la vie privee(APVP) 2012

[140] Vasileios Efthymiou Patrice Caire and Antonis Bikakis Modeling andevaluating cooperation in multi-context systems using conviviality InProceedings of BNAIC 2012 The 24th Benelux Conference on ArtificialIntelligence pages 83ndash90 2012

212 BIBLIOGRAPHY

[141] Naipeng Dong Hugo Jonker and Jun Pang Formal analysis of privacyin an ehealth protocol In Proceedings of the 17th European Symposiumon Research in Computer Security volume 7459 of Lecture Notes inComputer Science pages 325ndash342 Springer-Verlag 2012

[142] Naipeng Dong Hugo Jonker and Jun Pang Challenges in ehealthfrom enabling to enforcing privacy In Proceedings of the First inter-national conference on Foundations of Health Informatics Engineeringand Systems (FHIESrsquo11) volume 7151 of Lecture Notes in ComputerScience pages 195ndash206 Springer-Verlag 2012

[143] Sergio Dias Marques Sandro Reis and Denis Zampunieris Personal-ized adaptive and intelligent support for online assignments based onproactive computing In Proceedings of ICALT 2012 IEEE 12th In-ternational Conference on Advanced Learning Technologies pages 668ndash 669 IEEE Computer Society Conference Publishing Services 2012

[144] Denise Demirel Hugo Jonker and Melanie Volkamer Random blockverification Improving the norwegian electoral mix net In Proceed-ings of the 5th International Conference on Electronic Voting (EVOTE2012) volume 205 pages 65ndash78 Gesellschaft fur Informatik eV 2012

[145] Mehdi Dastani Leendert van der Torre and Neil Yorke-Smith A pro-gramming approach to monitoring communication in an organisationalenvironment In AAMAS rsquo12 Proceedings of the 11th InternationalConference on Autonomous Agents and Multiagent Systems - Volume3 pages 1373ndash1374 2012

[146] Sviatlana Danilava Stephan Busemann and Christoph SchommerArtificial conversational companions In Proceedings of the 4th Inter-national Conference on Agents and Artificial Intelligence volume 2pages 282ndash289 SciTePress 2012 2012

[147] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser Gap vspag In 42nd IEEE International Symposium on Multiple-Valued Logic(ISMVL 2012) pages 268ndash273 IEEE Computer Society 2012

[148] Xihui Chen and Jun Pang Measuring query privacy in location-basedservices In Proceeding of 2nd ACM Conference on Data and Applica-tion Security and Privacy pages 49 ndash 61 ACM 2012

[149] Martin Caminada and Podlaszewski Mikolaj Grounded semantics aspersuasion dialogue In Computational Models of Argument - Proceed-ings of COMMA 2012 volume 245 pages 478ndash485 IOS Press 2012

[150] Martin Caminada and Mikolaj Podlaszewski User-computer persua-sion dialogue for grounded semantics In Proceedings of the 24th

BIBLIOGRAPHY 213

Benelux Conference on Artificial Intelligence (BNAIC 2012) pages343ndash344 2012

[151] Martin Caminada and Mikolaj Podlaszewski Grounded semantics aspersuasion dialogue In Proceedings of the 4th International Confer-ence on Computational Models of Argument (COMMA 2012) volume245 pages 478ndash485 IOS Press 2012

[152] Patrice Caire Antonis Bikakis and Vasileios Efthymiou Convivialityby design In Social computing Social cognition social networks Ac-quisition representation and reasoning with contextualized knowledge(ARCOE 2012) 2012

[153] M Majid Butt and Eduard A Jorsweick Energy efficient multiuserscheduling Exploiting the loss tolerance of the application In IEEEGlobecom - Symposium on Selected Areas in Communications pages3555ndash3560 IEEE 2012

[154] M Majid Butt Benjamin Schubert Martin Kurras Kai BornerThomas Haustein and Lars Thiele On the energy-bandwidth trade-off in green wireless networks System level results In Workshop onSmart and Green Communications amp Networks (SGCNet) at Interna-tional conference on communication in China (ICCC) pages 91ndash95IEEE 2012

[155] M Majid Butt Deadline delay constrained multiuser multicell sys-tems Energy efficient scheduling In 13th IEEE International Work-shop on Signal Processing Advances in Wireless Communications(SPAWC) pages 309ndash313 IEEE 2012

[156] Richard Booth Martin Caminada Mikolaj Podlaszewski and IyadRahwan Quantifying disagreement in argument-based reasoningIn Proceedings of the 11th International Conference on AutonomousAgents and Multiagent Systems (AAMAS 2012) pages 493ndash500 Inter-national Foundation for Autonomous Agents and Multiagent Systems2012

[157] Richard Booth Eduardo Ferme Sebastien Konieczny and RamonPino Perez Credibility-limited revision operators in propositionallogicrsquo In Proceedings of the 24th Benelux Conference on ArtificialIntelligence (BNAIC 2012) pages 277ndash278 2012

[158] Richard Booth Eduardo Ferme Sebastien Konieczny and RamonPino Perez Credibility-limited revision operators in propositionallogic In Proceedings of the 13th International Conference on Prin-ciples of Knowledge Representation and Reasoning (KR 2012) pages116ndash125 AAAI 2012

214 BIBLIOGRAPHY

[159] Richard Booth Souhila Kaci Tjitze Rienstra and Leon van der TorreConditional acceptance functions In Proceedings of the 4th Interna-tional Conference on Computational Models of Argument (COMMA2012) volume 245 pages 470ndash477 IOS Press 2012

[160] Richard Booth Thomas Meyer and Ivan Vazinczak Ptl A proposi-tional typicality logic In 13th Conference on Logics in Artificial In-telligence (JELIA 2012) volume 7519 pages 107ndash119 Springer BerlinHeidelberg 2012

[161] Nicolas Bernard and Franck Leprevost Beyond tor The truenymsprotocol In Security and Intelligent Information Systems volume7053 of Lecture Notes in Computer Science pages 68ndash84 Springer2012

[162] Aritz Barrondo Andrei Tchernykh Elisa Shaeffer and JohnatanPecero Energy efficiency of knowledge-free scheduling in peer-to-peerdesktop grids In Proceedings of the 2012 International Conferenceon High Performance Computing amp Simulation (HPCS 2012) pages105ndash111 IEEE 2012

[163] Pietro Baroni Guido Boella Federico Cerutti Massimiliano Gia-comin Leendert van der Torre and Serena Villata On inputoutputargumentation frameworks In Computational Models of Argument(Proceedings of COMMA 2012) pages 358ndash365 IOS Press 2012

[164] Arash Atashpendar Laurent Kirsch Jean Botev and SteffenRothkugel A native approach to semantics and inference in fine-grained documents In Proceedings of the 2nd Joint International Se-mantic Technology Conference 2012

[165] Ofer Arieli and Martin Caminada A general qbf-based formalization ofabstract argumentation theory In Computational Models of Argument- Proceedings of COMMA 2012 volume 245 pages 105ndash116 IOS Press2012

[166] Giulia Andrighetto Guido Governatori Pablo Noriega and Leendertvan der Torre Normative multi-agent systems In Dagstuhl Reportsvolume 2 pages 23ndash49 2012

[167] Maha Alodeh Qoe for spatial cognitive systems In IEEE Interna-tional Conference on Communications 2012

[168] Dzmitry Kliazovich Pascal Bouvry and Samee Ullah Khan Sim-ulating communication processes in energy-efficient cloud computingsystems In IEEE 1st International Conference on Cloud Networkingpages 2015ndash2017 2012

BIBLIOGRAPHY 215

[169] Juan Luis Jimenez Laredo Bernabe Dorronsoro Johnatan PeceroPascal Bouvry Juan Jose Durillo and Carlos Fernandes Designing aself-organized approach for scheduling bag-of-tasks In Proceedings ofthe 7th International Conference on P2P Parallel Grid Cloud andInternet Computing (3PGCIC) pages 315ndash320 IEEE 2012

[170] Mateusz Guzek Cesar O Diaz Johnatan E Pecero Pascal Bouvryand Albert Y Zomaya Impact of voltage levels number for energy-aware bi-objective dag scheduling for multi-processors systems InCommunications in Computer and Information Science volume 344pages 70ndash80 Springer 2012

[171] Bernabe Dorronsoro and Pascal Bouvry Study of different small-worldtopology generation mechanisms for genetic algorithms In Proceedingsof the IEEE Congress on Evolutionary Computation (CEC) part ofWorld Conference in Computational Intelligence (WCCI) pages 1580ndash 1587 IEEE 2012

[172] Sune S Nielsen Bernabe Dorronsoro Gregoire Danoy and PascalBouvry Novel efficient asynchronous cooperative co-evolutionarymulti-objective algorithms In Congress on Evolutionary Computa-tion pages 1ndash7 IEEE 2012

[173] Apostolos Stathakis Gregoire Danoy Pascal Bouvry and GianluigiMorelli Satellite payload reconfiguration optimisation An ilp modelIn INTELLIGENT INFORMATION AND DATABASE SYSTEMSvolume 7197 pages 311ndash320 Springer 2012

[174] Marcin Seredynski Gregoire Danoy Masoud Tabatabaei Pascal Bou-vry and Yoann Pignie Generation of realistic mobility for vanetsusing genetic algorithms In Proceedings of the IEEE Congress onEvolutionary Computation pages 1ndash8 IEEE 2012

[175] Marcin Seredynski and Pascal Bouvry The necessity for strong re-ciprocators in mobile ad hoc networks In Proceedings of the 2012IEEE International Symposium on Parallel and Distributed Process-ing Workshops and PhD Forum pages 609ndash616 IEEE 2012

[176] Juan Luis Jimenez Laredo Pascal Bouvry Sanaz Mostaghim andJuan Julian Merelo Guervos Validating a peer-to-peer evolutionaryalgorithm In European Conference on the Applications of Evolution-ary Computation volume 7248 pages 436ndash445 Springer Berlin Hei-delberg 2012

[177] Marcin Seredynski and Pascal Bouvry Solving soft security prob-lem in manets using an evolutionary approach In Security and In-telligent Information Systems International Joint Confererence SIIS

216 BIBLIOGRAPHY

2011 Warsaw Poland June 13-14 2011 Revised Selected Papersvolume 7053 pages 33ndash44 Springer LNCS 2012

[178] Muhammad Zohaib Iqbal Andrea Arcuri and Lionel Briand Empir-ical investigation of search algorithms for environment model-basedtesting of real-time embedded software In Proceedings of the Inter-national Symposium on Software Testing and Analysis (ISSTArsquo12)pages 199ndash209 ACM 2012

[179] Muhammad Zohaib Iqbal Andrea Arcuri and Lionel Briand Com-bining search-based and adaptive random testing strategies for envi-ronment model-based testing of real-time embedded systems In Pro-ceedings of the 4th Symposium on Search Based Software Engineering(SSBSErsquo12) pages 136ndash151 Springer-Verlag 2012

[180] Muhammad Zohaib Iqbal Shaukat Ali Tao Yue and Lionel BriandExperiences of applying umlmarte on three industrial projects InProceedings of ACMIEEE 15th International Conference on ModelDriven Engineering Languages amp Systems (MODELSrsquo12) pages 642ndash658 Springer-Verlag 2012

[181] Razieh Behjati Tao Yue and Lionel Briand A modeling approach tosupport the similarity-based reuse of configuration data In Proceed-ings of ACMIEEE 15th International Conference on Model DrivenEngineering Languages amp Systems (MODELSrsquo12) pages 497ndash513Springer-Verlag 2012

[182] Shaukat Ali Tao Yue Lionel Briand and Suneth Walawege A prod-uct line modeling and configuration methodology to support model-based testing An industrial case study In Proceedings of ACMIEEE15th International Conference on Model Driven Engineering Lan-guages amp Systems (MODELSrsquo12) pages 726ndash742 Springer-Verlag2012

[183] Nina Elisabeth Holt Richard Torkar Lionel Briand and Kai HansenState-based testing Industrial evaluation of the cost-effectiveness ofround-trip path and sneak-path strategies In Proceedings of the 23rdIEEE International Symposium on Software Reliability Engineering(ISSRE 2012) IEEE Computer Society 2012

[184] Stefano Di Alesio Arnaud Gotlieb Shiva Nejati and Lionel BriandTesting deadline misses for real-time systems using constraint opti-mization techniques In Workshop on Constraints in Software Test-ing Verification and Analysis (CSTVA 2012) pages 764ndash769 IEEE2012

BIBLIOGRAPHY 217

[185] Lionel Briand Davide Falessi Shiva Nejati Mehrdad Sabetzadeh andTao Yue Research-based innovation A tale of three projects in model-driven engineering In 15th International Conference Model DrivenEngineering Languages and Systems - volume 7590 pages 759ndash775Springer Berlin Heidelberg 2012

[186] Razieh Behjati Shiva Nejati Tao Yue Arnaud Gotlieb and LionelBriand Model-based automated and guided configuration of embed-ded software systems In Modelling Foundations and Applications -8th European Conference volume 7349 of Lecture Notes in ComputerScience pages 226ndash243 Springer Berlin Heidelberg 2012

[187] Shiva Nejati Stefano Di Alesio Mehrdad Sabetzadeh and LionelBriand Modeling and analysis of cpu usage in safety-critical embeddedsystems to support stress testing In Proceedings of ACMIEEE 15thInternational Conference on Model Driven Engineering Languages ampSystems (MODELSrsquo12) pages 759ndash775 2012

[188] Markus Forster Raphael Frank Mario Gerla and Thomas Engel Im-proving highway traffic through partial velocity synchronization In2012 IEEE Global Communications Conference (GLOBECOM) 3-7December 2012 Anaheim CA USA pages 5795ndash5800 2012

[189] Foued Melakessou and Thomas Engel Narval scilab toolbox Networkanalysis and routing evaluation In 2012 International Workshop onScilab amp OW2 (IWSO) pages 1ndash18 2012

[190] Andriy Panchenko Fabian Lanze and Thomas Engel Improvingperformance and anonymity in the tor network In 31st IEEE In-ternational Performance Computing and Communications Conference(IEEE IPCCC 2012) IEEE Press 2012

[191] Samuel Marchal Jerome Francois Radu State and Thomas EngelSemantic based dns forensics In Proceedings of the IEEE InternationalWorkshop on Information Forensics and Security - WIFSrsquo12 IEEE2012

[192] Raphael Frank Maximilien Mouton and Thomas Engel Towardscollaborative traffic sensing using mobile phones In IEEE VehicularNetworking Conference 2012 pages 15ndash20 IEEE 2012

[193] Thorsten Ries Radu State and Thomas Engel Instant degradationof anonymity in low-latency anonymisation systems In DependableNetworks and Services pages 98ndash108 Springer Berlin Heidelberg2012

218 BIBLIOGRAPHY

[194] David Fotue Houda Labiod and Thomas Engel Performance evalua-tion of hybrid channel assignment for wireless sensor networks In The8th International Conference on Mobile Ad-hoc and Sensor Networks(MSN) pages 1ndash8 IEEE 2012

[195] David Fotue Houda Labiod and Thomas Engel An arbitrary mobil-ity model of mini-sinks using controlled data collection for reducingcongestion appearance in wireless sensor networks In 31st IEEE In-ternational Performance Computing and Communications Conference(IPCCC) pages 1ndash9 IEEE 2012

[196] David Fotue Houda Labiod and Thomas Engel Controlled data col-lection of mini-sinks for maximizing packet delivery ratio and through-put using multiple paths in wireless sensor networks In Proceedings ofthe 23rd IEEE International Symposium on Personal Indoor Mobileand Radio Communications (PIMRC) pages 758 ndash764 IEEE 2012

[197] Samuel Marchal Jerome Francois Radu State and Thomas EngelProactive discovery of phishing related domain names In The 15thInternational Symposium on Research in Attacks Intrusions and De-fenses volume 7462 pages 190ndash209 Springer-Verlag Berlin Heidel-berg 2012

[198] Samuel Marchal and Thomas Engel Large scale dns analysis In6th IFIP WG 66 International Conference on Autonomous Infras-tructure Management and Security volume 7279 pages 151ndash154Springer Berlin Heidelberg 2012

[199] Stefan Hommes Radu State and Thomas Engel Detecting stealthybackdoors with association rule mining In Lecture Notes in ComputerScience volume 7290 pages 161ndash171 Springer 2012

[200] Stefan Hommes Radu State and Thomas Engel A distance-basedmethod to detect anomalous attributes in log files In IEEE NetworkOperations and Management Symposium pages 498ndash501 2012

[201] Cynthia Wagner and Thomas Engel Detecting anomalies in netflowrecord time series by using a kernel function In IFIPLNCS De-pendable Network and Services 6th International Conference on Au-tonomous Infrastructure Management and Security (AIMS2012) vol-ume 7279 pages 122ndash125 Springer Verlag 2012

[202] Samuel Marchal Jerome Francois Cynthia Wagner and Thomas En-gel Semantic exploration of dns In 11th Networking Conference 2012pages 370ndash384 Springer Berlin Heidelberg 2012

BIBLIOGRAPHY 219

[203] Samuel Marchal Jerome Francois Cynthia Wagner Radu StateAlexandre Dulaunoy Thomas Engel and Olivier Festor Dnssm Alarge-scale passive dns security monitoring framework In IEEEIFIPNetwork Operations and Management Symposium pages 988 ndash 993IEEE 2012

[204] Jerome Francois Cynthia Wagner Radu State and Thomas EngelSafem Scalable analysis of flows with entropic measures and svm InProceedings of the Network Operations and Management Symposium2012 pages 510 ndash513 IEEE 2012

[205] Cynthia Wagner Jerome Francois Radu State Alexandre DulaunoyGerard Wagener and Thomas Engel Sdbf Smart dns brute-forcer In IEEEIFIP Network Operations and Management Sympo-sium (NOMSrsquo12) pages 1001ndash1007 IEEE 2012 to appear

[206] Jeehyun Hwang Tao Xie Donia Elkateb Tejeddine Mouelhi and YvesLe Traon Selection of regression system tests for security policy evolu-tion In Proceedings of the 27th IEEEACM International Conferenceon Automated Software Engineering pages 266ndash269 ACM 2012

[207] Assaad Moawad Vasileios Efthymiou Patrice Caire Gregory Nainand Yves Le Traon Introducing conviviality as a new paradigm forinteractions among it objects In Proceedings of the Workshop on AIProblems and Approaches for Intelligent Environments volume 907pages 3ndash8 CEUR-WSorg 2012

[208] Alexandre Bartel Jacques Klein Martin Monperrus and YvesLe Traon Automatically securing permission-based software by re-ducing the attack surface An application to android In IEEEACMInternational Conference on Automated Software Engineering pages1ndash4 2012

[209] Assaad Moawad Vasileios Efthymiou Patrice Caire Gregory Nainand Yves Le Traon Introducing conviviality as a new paradigmfor interactions among it objects In Workshop on AI Problems andApproaches for Intelligent Environments (AIIE 2012) volume 907pages 3ndash8 CEUR-WSorg 2012

[210] Antonis Bikakis Vasileios Efthymiou Patrice Caire and YvesLe Traon Introducing conviviality as a property of multi-context sys-tems In Acquisition Representation and Reasoning with Contextual-ized Knowledge (ARCOE 2012) pages 19ndash31 2012

[211] Alexandre Bartel Jacques Klein Martin Monperrus and YvesLe Traon Dexpler Converting android dalvik bytecode to jimple

220 BIBLIOGRAPHY

for static analysis with soot In ACM SIGPLAN International Work-shop on the State Of the Art in Java Program Analysis (SOAP 2012)pages 1ndash12 2012

[212] Donia Elkateb Tejeddine Mouelhi Yves Le Traon Jeehyun Hwangand Tao Xie Refactoring access control policies for performance im-provement In Proceedings of the third joint WOSPSIPEW interna-tional conference on Performance Engineering pages 323ndash334 ACM2012

[213] Yehia Elrakaiby Tejeddine Mouelhi and Yves Le Traon Testing obli-gation policy enforcement using mutation analysis In Proceedings ofthe fourth International Conference on Software Testing Verificationand Validation ICST 2012 pages 673 ndash680 IEEE 2012

[214] Dianxiang Xu Lijo Thomas Michael Kent Tejeddine Mouelhi andYves Le Traon A model-based approach to automated testing ofaccess control policies In Proceedings of the 17th ACM Symposium onAccess Control Models and Technologies pages 209ndash218 2012

[215] Xihui Chen Carlo Harpes Gabriele Lenzini Miguel Martins SjoukeMauw and Jun Pang Implementation and validation of a localisationassurance service provider In Proc of the 6th ESA Workshop onSatellite Navigation Technologies and European Workshop on GNSSSignals and Signal Processing (NAVITEC 2012) pages 1ndash7 IEEE2012

[216] Xihui Chen Gabriele Lenzini Sjouke Mauw and Jun Pang A groupsignature based electronic toll pricing system In Proceedings of the7th International Conference on Availability Reliability and Securitypages 85ndash93 IEEE Computer Society 2012

[217] Gan Zheng Symeon Chatzinotas and Bjorn Ottersten Multi-gatewaycooperation in multibeam satellite systems In IEEE 23rd Interna-tional Symposium on Personal Indoor and Mobile Radio Communica-tions (PIMRC) pages 1360ndash1364 2012

[218] Qingmin Meng Wei Feng Gan Zheng Symeon Chatzinotas andBjorn Ottersten Fixed full duplex relaying for wireless broadbandcommunication In International Conference on Wireless Communi-cations and Signal Processing WCSP 2012 2012

[219] Gan Zheng Li Jiangyuan Kai-Kit Wong Athina P Petropulu andBjorn Ottersten Using simple relays to improve physical-layer secu-rity In 1st IEEE International Conference on Communications inChina (ICCC2012) pages 329ndash333 2012

BIBLIOGRAPHY 221

[220] Sabrina Gerbracht Eduard A Jorswieck Gan Zheng and Bjorn Ot-tersten Non-regenerative two-hop wiretap channels using interferenceneutralization In Proceedings of the International Workshop on In-formation Forensics and Security pages 1ndash1 IEEE 2012

[221] Bhavani Shankar M R Saikat Chatterjee and Bjorn Ottersten De-tection of sparse random signals using compressive measurements InProceedings of IEEE International Conference on Acoustics Speechand Signal Processing pages 3257 ndash 3260 2012

[222] Bjorn Ottersten Signal processing challenges in satellite networks In2012 International Conference on Wireless Communications and Sig-nal Processing(WCSP 2012) pages 1ndash1 WCSP 2012 2012 KeynoteSpeaker

[223] Efthymios Tsakonas Joakim Jalden Nicolas D Sidiropoulos andBjorn Ottersten Maximum likelihood based sparse and distributedconjoint analysis In Statistical Signal Processing Workshop (SSP)2012 IEEE pages 33ndash36 IEEE 2012

[224] Symeon Chatzinotas and Bjorn Ottersten Capacity analysis of dual-hop amplify-and-forward mimo multiple-access channels In Interna-tional Conference on Wireless Communications and Signal ProcessingWCSP 2012 IEEE 2012

[225] Symeon Chatzinotas and Bjorn Ottersten Cognitive interferencealignment between small cells and a macrocell In 19th InternationalConference on Telecommunications (ICT) 2012 volume 1-6 IEEE2012

[226] Alexis Aravanis Bhavani Shankar M R Gregoire Danoy Pantelis-Daniel Arapoglou Panayotis Cottis and Bjorn Ottersten Multi-objective optimization approach to power allocation in multibeam sys-tems In 30th AIAA International Communications Satellite SystemsConference pages 1ndash6 2012

[227] Alexis Aravanis Bhavani Shankar M R Gregoire Danoy Pantelis-Daniel Arapoglou Panayotis Cottis and Bjorn Ottersten Power allo-cation in multibeam satellites - a hybrid-genetic algorithm approachIn 2nd ESA Workshop on Advanced Flexible Telecom Payloads pages1ndash5 European Space Agency 2012

[228] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenSpectrum sensing in dual polarized fading channels for cognitive sat-coms In accepted for publication in the proceedings of the IEEE Globe-com 2012 conference IEEE 2012

222 BIBLIOGRAPHY

[229] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenSatellite cognitive communications Interference modeling and tech-niques selection In 6th Advanced Satellite Multimedia Systems Con-ference (ASMS) and 12th Signal Processing for Space CommunicationsWorkshop (SPSC) pages 111ndash118 2012

[230] Frederic Garcia Djamila Aouada Hashim Kemal Abdella ThomasSolignac Bruno Mirbach and Bjorn Ottersten Depth enhancement byfusion for passive and active sensing In 12th European Conference onComputer Vision (ECCV) volume 7585 of Lecture Notes in ComputerScience pages 506ndash515 Springer Berlin Heidelberg 2012

[231] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenExploiting polarization for spectrum sensing in cognitive satcoms In7th International Conference on Cognitive Radio Oriented WirelessNetworks pages 36ndash41 2012

[232] Kassem Al Ismaeil Djamila Aouada Bruno Mirbach and Bjorn Ot-tersten Bilateral filter evaluation based on exponential kernels In21st International Conference on Pattern Recognition IEEE Xplore2012

[233] Frederic Garcia Djamila Aouada Bruno Mirbach and Bjorn Otter-sten Spatio-temporal tof data enhancement by fusion In IEEE Inter-national Conference on Image Processing (ICIP) pages 1 ndash 4 IEEE2012

[234] Symeon Chatzinotas and Bjorn Ottersten Coordinated multipointuplink capacity over a mimo composite fading channel In Interna-tional Conference on Computing Networking and Communicationspages 1061 ndash1065 IEEE 2012

[235] Jiaheng Wang Mats Bengtsson Bjorn Ottersten and Daniel P Palo-mar Robust maximin mimo precoding for arbitrary convex uncer-tainty sets In Proceedings IEEE International Conference on Acous-ticsSpeechand Signal Processing (ICASSP) pages 3045ndash3048 IEEE2012

[236] Dalia Khader Ben Smyth Peter Y A Ryan and Feng Hao A fairand robust voting system by broadcast In International Conferenceon Electronic Voting volume 205 pages 285ndash299 Lecture Notes inInformatics 2012

[237] Craig Burton Burton Chris Culnane James Heather Thea PeacockPeter Ryan Steve Schneider Vanessa Teague Roland Wen Zhe Xiaand Sriramkrishnan Srinivasan A supervised verifiable voting protocolfor the victorian electoral commission In 5th International Conference

75 Internal Reports 223

on Electronic Voting 2012 5th International Conference on ElectronicVoting (EVOTE 2012) LNI pages 81ndash94 GI 2012

[238] Craig Burton Chris Culnane James Heather Thea Peacock PeterRyan Steve Schneider Sriramkrishnan Srinivasan Vanessa TeagueRoland Wen and Zhe Xia A supervised verifiable voting protocol forthe victorian electoral commission In 2012 Electronic Voting Tech-nology WorkshopWorkshop on Trustworthy Elections pages 1ndash100USENIX 2012

[239] Markus Jostock and Jurgen Sachau Compound model of inverterdriven grids In 5th International Conference on Integration of Re-newable and Distributed Energy Resources pages 194ndash195 OTTI -Ostbayerisches Technologie-Transfer-Institut eV 2012

[240] Markus Jostock and Jurgen Sachau Frequency coupling in invertergrids In 5th International Conference on Integration of RenewableEnergy and Distributed Energy Resources pages 192ndash193 OTTI - Os-tbayerisches Technologie-Transfer-Institut eV 2012

[241] Guido Boella Patrice Caire Leendert van der Torre and Ser-ena Villata Dependence networks for agreement technologies InAT2012 Agreement Technologies Proceedings of the First Interna-tional Conference on Agreement Technologies volume 918 pages 109ndash110 CEUR 2012

[242] Alan Perotti Guido Boella Silvano Colombo Tosatto Artur S drsquoAvilaGarcez Valerio Genovese and Leendert van der Torre Learning andreasoning about norms using neural-symbolic systems In Proceed-ings of the 11th International Conference on Autonomous Agents andMultiagent Systems - Volume 2 volume 2 pages 1023ndash1030 2012

75 Internal Reports

[243] Mihail Minev Christoph Schommer and Theoharry GrammatikosNews and stock markets A survey on abnormal returns and predictionmodels Technical Report - 2012

[244] Alexandre Bartel Jacques Klein Martin Monperrus Kevin Allix andYves Le Traon Improving privacy on android smartphones throughin-vivo bytecode instrumentation Technical report SnT TechnicalReport 2012

[245] Vasileios Efthymiou and Patrice Caire Diagram analysis report Usecases for conviviality and privacy in ambient intelligent systems Tech-nical report SnT Luxembourg 2012

224 BIBLIOGRAPHY

[246] Markus Forster Raphael Frank and Thomas Engel Evaluation ofsensors in modern smartphones for vehicular traffic monitoring Tech-nical report SnT 2012

[247] Raphael Frank Markus Forster Gerla Mario and Thomas EngelA survey on the performance of commercial mobile access networksTechnical report 2012

[248] Christopher Henard Mike Papadakis Gilles Perrouin Jacques KleinPatrick Heymans and Yves Le Traon Bypassing the combinatorialexplosion Using similarity to generate and prioritize t-wise test suitesfor large software product lines Technical report 2012 TechnicalReport

76 Proceedings

[249] Valentin Goranko and Wojciech Jamroga editors Proceedings of the5th Workshop on Logical Aspects of Multi-Agent Systems (LAMAS2012) IFAAMAS 2012

[250] STAST 2012 IEEE 2012

[251] Security and Intelligent Information Systems volume 7053 of LNCSSpringer 2012

Appendix A

Additional References

[252] Lauaro Dolberg Jampaposerome Francois and Thomas Engel EfficientMultidimensional Aggregation for Large Scale Monitoring In LargeInstallation System Administration Conference (LISA) San DiegoUSA 2012 USENIX

[253] Guido Boella Luigi di Caro Livio Robaldo and Llio Humphreys Us-ing legal ontology to improve classification in the eunomos legal docu-ment and knowledge management system In Semantic Processing ofLegal Texts (SPLeT-2012) Workshop Proceedings of the Eighth Inter-national Conference on Language Resources and Evaluation (LRECrsquo12) pages 13ndash20 2012

[254] Alessandra Bagnato Barbara Kordy Per H Meland and PatrickSchweitzer Attribute decoration of attack-defense trees InternationalJournal of Secure Software Engineering 3(2)1ndash35 2012

[255] Xihui Chen David Fonkwe and Jun Pang Post-hoc analysis of usertraceability in electronic toll collection systems In Proc 7th Work-shop on Data Privacy Management (DPMrsquo12) LNCS pages 19ndash42Springer 2013

[256] Xihui Chen Jun Pang and Ran Xue Constructing and comparinguser mobility profiles for location-based services In Proc 28th ACMSymposium on Applied Computing (SACrsquo13) ACM Press 2013

[257] Xihui Chen and Jun Pang Exploring dependency for query privacyprotection in location-based services In Proc 3rd ACM Conference

226 BIBLIOGRAPHY

on Data and Application Security and Privacy (CODASPYrsquo13) ACMPress 2013

[258] Barbara Kordy Sjouke Mauw Sasa Radomirovic and PatrickSchweitzer AttackndashDefense Trees Journal of Logic and Computa-tion 2013 Preprint available at httpsatossunilumembers

barbarapapersADT12pdf

[259] T van Deursen S Mauw and S Radomirovic mCarve Carvingattributed dump sets In 20th USENIX Security Symposium pages107ndash121 USENIX Association August 2011

[260] Simon Kramer Rajeev Gore and Eiji Okamoto Computer-aideddecision-making with trust relations and trust domains (cryptographicapplications) Journal of Logic and Computation 2012

[261] Simon Kramer A logic of interactive proofs Technical report Uni-versity of Luxembourg 2012 Available at httparxivorgabs

12013667

[262] Simon Kramer Logic of negation-complete interactive proofs (formaltheory of epistemic deciders) Technical report University of Luxem-bourg 2012 Available at httparxivorgabs12085913

[263] Simon Kramer Logic of non-monotonic interactive proofs (formaltheory of temporary knowledge transfer) Technical report Universityof Luxembourg 2012 Available at httparxivorgabs1208

1842

[264] Simon Kramer and Joshua Sack Parametric constructive kripke-semantics for standard multi-agent belief and knowledge (knowledgeas unbiased belief) Technical report University of Luxembourg 2012Available at httparxivorgabs12091885

[265] Jerome Francois Shaonan Wang Walter Bronzi Radu State andThomas Engel Botcloud Detecting botnets using mapreduce InProceddings of International Workshop on Information Forensics andSecurity (WIFSrsquo11) pages 1ndash6 IEEE 2011

[266] Andreas Zinnen and Thomas Engel Towards economic energy tradingin cloud environments In IEEE International Conference on CloudComputing Technology and Science pages 477ndash481 2011

[267] Andreas Zinnen and Thomas Engel Deadline constrained schedulingin hybrid clouds with gaussian processes In High Performance Com-puting and Simulation Conference (HPCS) pages 294 ndash 300 2011

BIBLIOGRAPHY 227

[268] Jerome Francois Radu State Thomas Engel and Olivier Festor En-forcing security with behavioral fingerprinting In International Con-ference on Network and Service Management (CNSM) pages 1 ndash92011

[269] Andriy Panchenko Lukas Niessen Andreas Zinnen and Thomas En-gel Website fingerprinting in onion routing based anonymization net-works In Proceedings of the 10th ACM Computer and Communica-tions Security (ACM CCS) Workshop on Privacy in the ElectronicSociety (WPES) pages 103ndash114 ACM Press 2011

[270] Andriy Panchenko Otto Spaniol Andre Egners and Thomas EngelLightweight hidden services In Proceedings of the 10th IEEE Interna-tional Conference on Trust Security and Privacy in Computing andCommunications (IEEE TrustCom 2011) Changsha China Novem-ber 2011 IEEE Computer Society 2011

[271] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Breaking tor anonymity with game theory anddata mining CONCURRENCY AND COMPUTATION PRACTICEAND EXPERIENCE pages 1ndash14 2011

[272] Raphael Frank Eugenio Giordano Mario Gerla and Thomas EngelPerformance bound for routing in urban scenarios In Proceedings ofthe 7th Asian Internet Engineering Conference (AINTEC) pages 38ndash45 2011

[273] Thorsten Ries Volker Fusenig Christian Vilbois and Thomas EngelVerification of data location in cloud networking In 2011 Fourth IEEEInternational Conference on Utility and Cloud Computing pages 439ndash444 2011

[274] Thorsten Ries Radu State and Thomas Engel Measuring anonymityusing network coordinate systems In 11th International Symposiumon Communications and Information Technologies (ISCIT) 2011pages 366ndash371 2011

[275] Stefan Hommes Radu State and Thomas Engel Detection of abnor-mal behaviour in a surveillance environment using control charts InIEEE International Conference on Advanced Video and Signal basedSurveillance (AVSS) pages 113ndash118 2011

[276] David Fotue Foued Melakessou Houda Labiod and Thomas EngelMini-sink mobility with diversity-based routing in wireless sensor net-works In Proceedings of the 8th ACM Symposium on Performanceevaluation of wireless ad hoc sensor and ubiquitous networks (PE-WASUN) pages 9ndash16 ACM 2011

228 BIBLIOGRAPHY

[277] David Fotue Foued Melakessou Houda Labiod and Thomas EngelA distributed hybrid channel selection and routing technique for wire-less sensor networks In IEEE 74th Vehicular Technology ConferenceVTC-Fall pages 1ndash6 IEEE 2011

[278] Cynthia Wagner Gerard Wagener Radu State and Thomas EngelPeeking into ip flow records using a visual kernel method In IWANN2011 workshops Part II CISIS 2011 volume 6694 pages 41ndash49LNCS Springer Verlag 2011

[279] Cynthia Wagner Jerome Francois Radu State and Thomas EngelMachine learning approach for ip-flow record anomaly detection InProceedings of the 10th international IFIP TC 6 conference on Net-working (NETWORKING) volume 6640 pages 28ndash39 Springer Ver-lag 2011

[280] Thorsten Ries Andriy Panchenko Radu State and Thomas EngelComparison of low-latency anonymous communication systems - prac-tical usage and performance In Australasian Information SecurityConference (AISC 2011) volume 116 pages 77ndash86 ACS 2011

[281] David Fotue Foued Melakessou Houda Labiod and Thomas EngelEffect of sink location on aggregation based on degree of connectivityfor wireless sensor networks In First International Workshop on Ad-vanced Communication Technologies and Applications to Intelligenttransportation systems Cognitive radios and Sensor Networks (AC-TICS) pages 271 ndash 276 2011

[282] Pascal Bouvry Horacio Gonzalez-Velez and Joanna Kolodziej In-telligent Decision Systems in Large-Scale Distributed Environmentsvolume 362 of Studies in Computational Intelligence Springer 2011

[283] Bernabe Dorronsoro and Pascal Bouvry Adaptive neighborhoods forcellular genetic algorithms In Nature Inspired Distributed Computing(NIDISC) sessions of the International Parallel and Distributed Pro-cessing Symposium (IPDPS) 2011 Workshop pages 383ndash389 IEEE2011

[284] Patricia Ruiz Bernabe Dorronsoro and Pascal Bouvry Optimiza-tion and performance analysis of the aedb broadcasting algorithmIn IEEE International Workshop on Wireless Mesh and Ad Hoc Net-works pages 1ndash6 IEEE 2011

[285] Mateusz Guzek Johnatan E Pecero Bernabe Dorronsoro and PascalBouvry Energy-aware scheduling of parallel applications with multi-objective evolutionary algorithm In A Bridge between Probability SetOriented Numerics and Evolutionary Computation pages 1ndash4 2011

BIBLIOGRAPHY 229

[286] Bernabe Dorronsoro and Pascal Bouvry On the use of small-world population topologies for genetic algorithms In Proceedingsof EVOLVE 2011 2011

[287] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry Multi-objective cooperative coevolutionary algorithms for robust schedulingIn Proceedings of EVOLVE 2011 2011

[288] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee In Proceedings des 20eme ren-contres francophones du parallelisme (RenParrsquo20) pages 1ndash10 2011

[289] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certiclouda novel tpm-based approach to ensure cloud iaas security In Proceed-ings of the 4th IEEE Intl Conf on Cloud Computing (CLOUD 2011)pages 121 ndash 130 IEEE Computer Society 2011

[290] Julien Schleich Guillaume-Jean Herbiet Patricia Ruiz Pascal Bou-vry Jerome Wagener Paul Bicheler Frederic Guinand and SergeChaumette Enhancing the broadcast process in mobile ad hoc net-works using community knowledge In Proceedings of the first ACMinternational symposium on Design and analysis of intelligent vehicu-lar networks and applications pages 23ndash30 2011

[291] V Goranko W Jamroga and P Turrini Strategic games and trulyplayable effectivity functions In Proceedings of AAMAS2011 pages727ndash734 2011

[292] M de Boer D Gabbay X Parent and M Slavkovik Two dimensionalstandard deontic logic [including a detailed analysis of the 1985 jonesndashporn deontic logic system] Synthese pages 1ndash38 2011

[293] Harold Castro German Sotelo Cesar O Diaz and Pascal BouvryGreen flexible opportunistic computing with virtualization In Pro-ceedings of the 11th IEEE International Conference on Computer andInformation Technology pages 629ndash634 2011

[294] Cesar O Diaz Mateusz Guzek Johnatan E Pecero Pascal Bouvryand Samee U Khan Scalable and energy-efficient scheduling tech-niques for large-scale systems In Proceedings of the 11th IEEE Inter-national Conference on Computer and Information Technology pages641ndash647 2011

[295] Cesar O Diaz Mateusz Guzek Johnatan E Pecero Gregoire DanoyPascal Bouvry and Samee U Khan Energy-aware fast schedulingheuristics in heterogeneous computing systems In Proceedings of the2011 International Conference on High Performance Computing ampSimulation (HPCS 2011) pages 478ndash484 2011

230 BIBLIOGRAPHY

[296] Jean Botev and Marco Milanesio Code - an application-layer frame-work for confidentiality in distributed environments In Proceedingsof the 3rd International Workshop on Collaborative Social Computing(SocialComp 2011) 2011

[297] Jean Botev Wei Tsang Ooi and Ingo Scholtes Getting real - self-organized resource allocation on second life avatar traces In Proceed-ings of the 4th International Workshop on Massively Multiuser VirtualEnvironments (MMVE 2011) pages 170 ndash 175 IEEE 2011

[298] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry New state-of-the-art results for cassini2 global trajectory optimization problemIn International Joint Conference on Artificial Intelligence (IJCAI)Workshop on AI in Space Intelligence beyond planet Earth pages1ndash6 2011

[299] Bernabe Dorronsoro and Pascal Bouvry The explorationexploitationtradeoff in dynamic cellular evolutionary algorithms IEEE Transac-tions on Evolutionary Computation 15(1)67ndash98 2011

[300] Bernabe Dorronsoro Gregoire Danoy Pascal Bouvry and Antonio JNebro Multi-objective Cooperative Coevolutionary Evolutionary Algo-rithms for Continuous and Combinatorial Optimization volume 362of Studies in Computational Intelligence series pages 49ndash74 Springer2011

[301] Alexandru-Adrian Tantar Emilia Tantar and Pascal Bouvry Loadbalancing for sustainable ict In 13th Annual Genetic and Evolution-ary Computation Conference (GECCO 2011) Companion MaterialProceedings pages 733ndash738 ACM 2011

[302] Alexandru-Adrian Tantar Emilia Tantar and Pascal Bouvry A clas-sification of dynamic multi-objective optimization problems In 13thAnnual Genetic and Evolutionary Computation Conference (GECCO2011) Companion Material Proceedings pages 105ndash106 ACM 2011

[303] Emilia Tantar Alexandru-Adrian Tantar and Pascal Bouvry On dy-namic multi- objective optimization - classification and performancemeasures In Proceedings of the IEEE Congress on Evolutionary Com-putation pages 2759ndash2766 2011

[304] Eugenio Giordano Raphael Frank Giovanni Pau and Mario GerlaCorner A radio propagation model for vanets in urban scenariosProceedings of the IEEE 99(7)1280 ndash 1294 2011

[305] Johnatan Pecero Frederic Pinel Bernabe Dorronsoro GregoireDanoy Pascal Bouvry and Albert Zomaya Efficient Hierarchical

BIBLIOGRAPHY 231

Task Scheduling on GRIDS Accounting for Computation and Commu-nications volume 362 of Studies in Computational Intelligence pages25ndash48 Springer 2011

[306] Cynthia Wagner Jerome Francois Radu State and Thomas EngelDanakfinding the odd In Proceedings of the 5th International Con-ference on Network and System Security 2011 (NSS2011) pages 161ndash168 IEEE 2011

[307] Patricia Ruiz Bernabe Dorronsoro Giorgio Valentini Frederic Pineland Pascal Bouvry Optimisation of the enhanced distance basedbroadcasting protocol for manets J of Supercomputing Special Is-sue on Green networks pages 1ndash28 2011

[308] Jean Botev and Steffen Rothkugel Flora - flock-based resource alloca-tion for decentralized distributed virtual environments In Proceedingsof the 2nd International Workshop on Distributed Simulation and On-line Gaming (DISIO 2011) 2011

[309] Sebastien Varrette Emilia Tantar and Pascal Bouvry On the re-silience of [distributed] eas against cheaters in global computing plat-forms In IPDPS Workshops pages 409ndash417 IEEE 2011

[310] Alexandru-Adrian Tantar Gregoire Danoy Pascal Bouvry and SameeKhan Energy-Efficient Computing using Agent-Based Multi-ObjectiveDynamic Optimization pages 267ndash287 Springer New York NY USA2011

[311] Bernabe Dorronsoro and Pascal Bouvry Differential evolution algo-rithms with cellular populations Parallel Problem Solving from Nature(PPSN) Lecture Notes in Computer Science 6239320ndash330 2011

[312] Alexandre Bartel Benoit Baudry Freddy Munoz Jacques KleinTejeddine Mouelhi and Yves Le Model driven mutation applied toadaptative systems testing In Proceedings of the 2011 IEEE FourthInternational Conference on Software Testing Verification and Vali-dation Workshops ICSTW rsquo11 pages 408ndash413 IEEE Computer Soci-ety 2011

[313] Marwane El Kharbili Qin Ma Pierre Kelsen and Elke PulvermuellerEnterprise regulatory compliance modeling using corel An illustra-tive example In 13th IEEE Conference on Commerce and EnterpriseComputing pages 185ndash190 IEEE Computer Society Press 2011

[314] Marwane El Kharbili Qin Ma Pierre Kelsen and Elke PulvermuellerCorel Policy-based and model-driven regulatory compliance manage-ment In Proceedings of the 15th IEEE International Enterprise Dis-

232 BIBLIOGRAPHY

tributed Object Computing Conference pages 247ndash256 IEEE Com-puter Society Press 2011

[315] Wojciech Jamroga Sjouke Mauw and Matthijs Melissen Fairness innon-repudiation protocols In Security and Trust Management LectureNotes in Computer Science volume 7170 pages 122ndash139 Springer2012

[316] Agata Grzybek Gregoire Danoy and Pascal Bouvry Generation ofrealistic traces for vehicular mobility simulations In Proceedings ofthe second ACM international symposium on Design and analysis ofintelligent vehicular networks and applications DIVANet rsquo12 pages131ndash138 New York NY USA 2012 ACM

[317] Clark Thomborson Christian Collberg and Douglas Low A taxonomyof obfuscating transformations 1997

[318] Boaz Barak Oded Goldreich Russel Impagliazzo Steven RudichAmit Sahai Salil Vadhan and Ke Yang On the (im)possibility ofobfuscating programs 2001

[319] Christian Collberg and Jasvir Nagra Surreptitious Software Obfus-cation Watermarking and Tamperproofing for Software ProtectionAddison-Wesley Professional 2009

[320] M H Halstead Elements of software science 1977

[321] E I Oviedo Control flow data flow and program complexity Pro-ceedings of IEEE COMPSAC pages 146ndash152 1980

[322] Terence J Parr T J Parr and R W Quong Antlr A predicated-ll(k)parser generator 1995

[323] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee Technique et science informa-tiques 31(8-9-10)1121ndash1152 2012

[324] Jshadobf A javascript obfuscator based on evolutionary algorithmshttpjshadobfunilu 2013

[325] Apostolos Stathakis Gregoire Danoy El-Ghazali Talbi and PascalBouvry A local search algorithm for telecommunication satellite pay-load configuration In International Conference on Metaheuristics andNature Inspired Computing 2012

[326] Levi Lucio and Nicolas Guelfi A precise definition of operationalresilience Technical Report TR-LASSY-11-02 University of Luxem-bourg 2011

BIBLIOGRAPHY 233

[327] Nicolas Guelfi A formal framework for dependability and resiliencefrom a software engineering perspective Technical Report TR-LASSY-10-01 University of Luxembourg 2010

[328] Guido Boella Gabriella Pigozzi Marija Slavkovik and Leendertvan der Torre Group intentions are social choice with commitmentIn Procs of the 8th European Workshop on Multi-agent Systems (EU-MASrsquo10) 2010

[329] Patricia Ruiz and Pascal Bouvry On the improvement of the enhanceddistance based broadcasting algorithm Int J of Communication Net-works and Distributed Systems in Press

[330] Patricia Ruiz Bernabe Dorronsoro Pascal Bouvry and Lorenzo JTardon Information dissemination in vanets based upon a tree topol-ogy Journal of Ad hoc Networks 10(1)111ndash127 2012

[331] State R Ries T and A Panchenko Comparison of low-latency anony-mous communication systems - practical usage and performance InColin Boyd and Josef Pieprzyk editors Australasian Information Se-curity Conference (AISC 2011) volume 116 of CRPIT pages 77ndash86Perth Australia 2011 ACS

[332] Michael Kirley and Robert Stewart An analysis of the effects of pop-ulation structure on scalable multiobjective optimization problems InProceedings of the 9th annual conference on Genetic and evolutionarycomputation GECCO rsquo07 pages 845ndash852 New York NY USA 2007ACM

[333] Matthijs T J Spaan and Nikos A Vlassis Perseus Randomizedpoint-based value iteration for pomdps J Artif Intell Res (JAIR)24195ndash220 2005

[334] Pierre Del Moral Feynman-Kac formulae genealogical and interact-ing particle systems with applications Springer series in statisticsProbability and its applications Springer 2004

[335] Pierre Del Moral Arnaud Doucet and Ajay Jasra Sequential montecarlo samplers Journal of the Royal Statistical Society Series B (Sta-tistical Methodology) 68(3)411ndash436 2006

[336] Juan Luis Jimenez Laredo Pascal Bouvry Sanaz Mostaghim andJuan Julian Merelo Guervos Validating a peer-to-peer evolutionaryalgorithm In European Conference on the Applications of Evolution-ary Computation Accepted for publication in 2012

234 BIBLIOGRAPHY

[337] Daniel Lombra na Gonzalez Juan Luis Jimenez Laredo Francisco Fer-nandez de Vega and Juan Julian Merelo Guervos CharacterizingFault-tolerance in Evolutionary Algorithms Springer Verlag Acceptedfor publication in 2012

[338] F Caldeira T Schaberreiter E Monteiro J Aubert P Simoes andD Khadraoui Trust based interdependency weighting for on-line riskmonitoring in interdependent critical infrastructures In Risk and Se-curity of Internet and Systems (CRiSIS) 2011 6th International Con-ference on pages 1 ndash7 sept 2011

[339] T Schaberreiter J Aubert and D Khadraoui Critical infrastructuresecurity modelling and resci-monitor A risk based critical infrastruc-ture model In IST-Africa Conference Proceedings 2011 pages 1 ndash8may 2011

[340] Thomas Schaberreiter Filipe Caldeira Jocelyn Aubert EdmundoMonteiro Djamel Khadraoui and Paulo Simones Assurance and trustindicators to evaluate accuracy of on-line risk in critical infrastruc-tures In CRITIS2011 conference proceedings September 2011

[341] Thomas Schaberreiter Kati Kittila Kimmo Halunen Juha Roningand Djamel Khadraoui Risk assessment in critical infrastructuresecurity modelling based on dependency analysis (short paper) InCRITIS2011 conference proceedings September 2011

[342] Andriy Panchenko Privacy in communications on the internet Prac-tice of Information Processing and Communication Praxis der In-formationsverarbeitung und Kommunikation (PIK) 34(2) 2011

[343] Andriy Panchenko Anonymous communication in the digitalworld In 17th Conference on Communication in Distributed Systems(KiVSrsquo11) Kiel Germany march 2011 OASIcs ndash OpenAccess Seriesin Informatics

[344] Andriy Panchenko Otto Spaniol Andre Egners and Thomas EngelLightweight hidden services In 10th IEEE International Conferenceon Trust Security and Privacy in Computing and Communications(IEEE TrustCom 2011) Changsha China nov 2011 IEEE ComputerSociety Press

[345] Jerome Francois Shaonan Wang Walter Bronzi Radu State andThomas Engel Botcloud Detecting botnets using mapreduce InProceddings of International Workshop on Information Forensics andSecurity (WIFSrsquo11) pages 0ndash0 IEEE 2011

BIBLIOGRAPHY 235

[346] Jerome Francois Radu State Thomas Engel and Olivier Festor En-forcing security with behavioral fingerprinting In International Con-ference on Network and Service Management (CNSM) 2011

[347] AJ Nebro JJ Durillo F Luna B Dorronsoro and E Alba MocellA cellular genetic algorithm for multiobjective optimization Interna-tional Journal of Intelligent System Special Issue on Nature InspiredCooperative Strategies 24(7)726ndash746 2009

[348] Gabriella Pigozzi Marija Slavkovik and Leendert van der Torre Acomplete conclusion-based procedure for judgment aggregation InProceedings of the First International Conference on Algorithmic De-cision Theory (ADT) volume 5783 5783 of Lecture Notes in ArtificialIntelligence pages 1ndash13 Springer Verlag 2009

[349] Davide Grossi Gabriella Pigozzi and Marija Slavkovik White ma-nipulation in judgment aggregation In Proceedings of BNAIC 2009- The 21st Benelux Conference on Artificial Intelligence (to appear)2009

[350] Laurent Kirsch Markus Esch and Steffen Rothkugel The SnippetSystem - Fine-Granular Management of Documents and Their Re-lationships In Proceedings of the 6th International Conference onHuman-Computer Interaction (HCI 2011) Washington DC USA2011 IASTED

[351] Bernd Klasen Efficient Content Distribution in Social-Aware HybridNetworks Journal of Computational Science 2011

[352] Jean Botev Sociality and Self-Organization in Next-Generation Dis-tributed Environments PhD thesis University of Luxembourg 2011

[353] Peter Ryan James Heather and Vanessa Teague Pretty good democ-racy for more expressive voting schemes In Computer Security ndash ES-ORICS 2010 15th European Symposium on Research in Computer Se-curity Athens Greece September 20-22 2010 Proceedings pages 405ndash 423 2010

[354] Zhe Xia Chris Culnane James Heather Hugo Jonker Peter RyanSteve Schneider and Sriramkrishnan Srinivasan Versatile pret a voterHandling multiple election methods with a unified interface In Pro-ceedings of the 11th International Conference on Cryptology in India(Indocryptrsquo10) pages 98ndash114 2010

[355] Barbara Kordy Marc Pouly and Patrick Schweitzer Computationalaspects of attack-defense trees In Security and Intelligent InformationSystems volume LNCS 7053 pages 103ndash116 Springer 2012

236 BIBLIOGRAPHY

[356] Gerard Wagener Radu State Alexandre Dulaunoy and Thomas En-gel Heliza talking dirty to the attackers Journal in Computer Vi-rology pages 1ndash12 2010

[357] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Breaking tor anonymity with game theory anddata mining In Proceedings of 4th International Conference on Net-work and System Security NSS2010 pages 47ndash54 IEEE 2010 BestPaper Award of NSS 2010

[358] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Game theory driven monitoring of spatial-aggregated ip flow records In Proceedings of the 6th InternationalConference on Network and Services Management (CNSM) pages 0ndash0 IEEE 2010

[359] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Peekkernelflows Peeking into ip flows In Pro-ceedings of the Seventh International Symposium on Visualization forCyber Security pages 52ndash57 ACM International Conference Proceed-ings Series ACM New York NY USA 2010

[360] Cynthia Wagner Gerard Wagener Radu State and Thomas EngelMonitoring of spatial-aggregated ip-flow records In Advances in SoftComputing Series - CISISrsquo10 volume 85 pages 117ndash124 Springer2010

[361] Bernd Klasen Social fast efficient Content distribution in hybridnetworks In Computers and Communications (ISCC) 2011 IEEESymposium on pages 61ndash67 Kerkyra June 2011 IEEE

[362] Samuel Marchal Jerome Francois Cynthia Wagner and Thomas En-gel Semantic exploration of dns In 11th Networking Conference 2012pages 1ndash8 2012

[363] Samuel Marchal Jerome Francois Cynthia Wagner Radu StateAlexandre Dulaunoy Thomas Engel and Olivier Festor Dnssm Alarge-scale passive dns security monitoring framework In IEEEIFIPNetwork Operations and Management Symposium pages 1ndash8 IEEE2012

[364] David Fotue Foued Melakessou Thomas Engel and Houda LabiodDesign of new aggregation techniques for wireless sensor networks InThe 18th Annual Meeting of the IEEEACM International Symposiumon Modeling Analysis and Simulation of Computer and Telecommu-nication Systems pages 1ndash1 MASCOTS 2010

BIBLIOGRAPHY 237

[365] David Fotue Foued Melakessou Houda Labiod and Thomas EngelDesign of an enhanced energy conserving routing protocol based onroute diversity in wireless sensor networks In The 9th IEEEIFIPAnnual Mediterranean Ad Hoc Networking Worshop pages 1ndash6 IEEEXplore 2010

[366] Guillaume Aucher Guido Boella and Leendert van der Torre Adynamic logic for privacy compliance Artif Intell Law 19(2-3)187ndash231 2011

[367] Jerome Leemans and Nuno Amalio Modelling a cardiac pacemakervisually and formally In VLHCC 2012 pages 257ndash258 IEEE 2012

[368] Mauricio Alferez Nuno Amalio Selim Ciraci et al Aspect-orientedmodel development at different levels of abstraction In ECMFA 2011LNCS pages 361ndash376 Springer 2011

[369] Eric Tobias Eric Ras and Nuno Amalio Suitability of visual mod-elling languages for modelling tangible user interface applications InVLHCC 2012 IEEE 2012

[370] Eric Tobias Eric Ras and Nuno Amalio VML Usability for ModellingTUI Scenarios - A Comparative Study Technical Report TR-LASSY-12-06 University of Luxembourg LASSY 2012 available at http

vclgforgeuniludocVMLCaseStudypdf

[371] Nuno Amalio The VCL model of the barbados crisis managementsystem Technical Report TR-LASSY-12-09 Univ of Luxembourg2012

[372] Jerome Leemans and Nuno Amalio A VCL model of a cardiac pace-maker Technical Report TR-LASSY-12-04 University of Luxem-bourg 2012

238 BIBLIOGRAPHY

Appendix B

CSC Statistics for 2012

B1 CSC publications

For more details see chapter 7 page 197

B2 CSC budget

See also sect23 page 6

Lab structural funding 761070e

UL Research Projects 896775e

Total 1657845 e

Table B1 CSC Internal Budget

240 CSC Statistics for 2012

B3 CSC staff per category

Category Number

Professors 16Associate Professors 7

Scientific Supp Staff Members 12Post-Docs 7

Post-Docs on projects 8PhD Students 40

Technical Support Staff Members 4Technician on project 1Administrative Staff 5Research Facilitator 1

Total 101

Professors Associated Professors Post Docs Scientific support staff PhD Students Post Docs on Project Technical support staff Technicians on projects Administrative staff Research facilitator

Figure B1 CSC HR Repartition

B3 CSC staff per category 241

Professors - Associate Professors

Lastname Firstname Position

BIRYUKOV Alexei Associate-Professor

BISDORFF Raymond Joseph Professor

BOUVRY Pascal Professor

BRIAND Lionel Professor

CORON Jean-Sebastien Associate-Professor

DUHAUTPAS Theo Professor

ENGEL Thomas Professor

GUELFI Nicolas Professor

KELSEN Pierre Professor

LE TRAON Yves Professor

LEPREVOST Frank Professor

MAUW Sjouke Professor

OTTERSTEN Bjorn Professor

MULLER Volker Associate-Professor

NAVET Nicolas Associate-Professor

ROTHKUGEL Steffen Associate-Professor

RYAN Peter Professor

SACHAU Juergen Professor

SCHOMMER Christoph Associate-Professor

SORGER Ulrich Professor

STEENIS Bernard Associate-Professor

VAN DER TORRE Leon Professor

ZAMPUNIERIS Denis Professor

Total 23

242 CSC Statistics for 2012

Research Assistants - PostDocs

Lastname Firstname PositionAMALIO Nuno Scientific Coll on ProjectBERNARD Nicolas Scientific Supp Staff MemberBOTEV Jean Post-DocCAPOZUCCA Alfredo Scientific Supp Staff MemberDANOY Gregoire Scientific Supp Staff MemberGLODT Christian Scientific Supp Staff MemberGROSZSCHADL Johann Scientific Supp Staff MemberJONKER Hugo Scientific Coll on projectKHOVRATOVICH Dmitry PostDocKLEIN Jacques Scientific Supp Staff MemberLEHTONEN Erkko Post-DocMIZERA Andrzej PostDocPANG Jun Scientific Supp Staff MemberPARENT Xavier Post-DocPECERO SANCHEZ Johnatan Post-DocRIES Benoit Scientific Supp Staff MemberRISOLDI Matteo Scientific Coll on ProjectSCHLEICH Julien Scientific Coll on ProjectSTATE Radu Scientific Supp Staff MemberSUCHANECKI Zdzislaw Scientific Supp Staff MemberTANG Qiang Post-DocTEUCHERT Andrea Scientific Coll on ProjectTURRINI Paolo Post-DocVARRETTE Sebastien Scientific Supp Staff MemberVESIC Srdjan Post-DocWEYDERT Emil Scientific Supp Staff Member

Total 27 (AFR Total 1)

B3 CSC staff per category 243

PhD Students

Lastname Firstname PositionALLIX Kevin PhD StudentAMRANI Moussa PhD StudentBERSAN Roxana-Dolores PhD StudentDANILAVA Sviatlana PhD StudentDIAZ Cesar PhD StudentDOBRICAN Remus PhD StudentDONG Naipeng PhD StudentEL KATEB Donia PhD StudentEL KHARBILI Marwane PhD StudentFRANCK Christian PhD StudentGALLAIS Jean-Francois PhD StudentGIUSTOLISI Rosario PhD StudentGOERGEN David PhD StudentKAMPAS Dimitrios PhD StudentKHAN Yasir Imtiaz PhD StudentKIRSCH Laurent PhD StudentLI Yu PhD StudentLIU Zhe PhD StudentMARQUES DIAS Sergio Scientific Coll on ProjectMELISSEN Matthijs PhD StudentMINEV Mihail PhD StudentMULLER Tim PhD StudentMUSZYNSKI Jakub PhD StudentNIELSEN Sune PhD StudentOLTEANU Alexandru-Liviu PhD StudentPEREZ URQUIDI Jose Miguel PhD StudentPINEL Frederic PhD StudentPORAY Jayanta PhD StudentPUSTOGAROV Ivan PhD StudentRIENSTRA Tjitze PhD StudentROY Arnab PhD StudentRUBAB Irman PhD StudentRUIZ Patricia PhD StudentSHIRNIN Denis PhD StudentSIMIONOVICI Ana-Maria PhD StudentSKROBOT Marjan PhD StudentSUN Xin PhD StudentVADNALA Praveen Kumar PhD StudentVENKATESH Srivinas Vivek PhD StudentZHANG Yang PhD Student

Total 40 (AFR Total 8)

244 CSC Statistics for 2012

Technical Support

Lastname Firstname PositionCARTIAUX Hyacinthe Technician on ProjectDUNLOP Dominic Technical Support Staff MemberLE CORRE Yann Technical Support Staff MemberSTEMPER Andre Technical Support Staff MemberREIS Sandro Technician on Project

Total 5

Administrativ Aid

Lastname Firstname PositionDESSART Bertrand Research facilitator

EYJOLFSDOTTIR Ragnhildur Edda SecretaryFLAMMANG Daniele SecretarySCHMITZ Fabienne SecretarySCHROEDER Isabelle SecretaryVIOLET Catherine Secretary

Total 6

Appendix C

Acronyms used

ComSys Communicative Systems Laboratory

CSC Computer Science amp Communications

HPC High Performance Computing

ILIAS Interdisciplinary Laboratory for Intelligent and Adaptive Systems

LACS Laboratory of Algorithmics Cryptology and Security

LASSY Laboratory for Advanced Software Systems

SnT Interdisciplinary Centre for Security Reliability and Trust

UL University of Luxembourg

246 Acronyms used

httpcscunilu

Computer Science amp Communication (CSC) Research UnitUniversity of LuxembourgFaculty of Science Technology and Communication6 rue Richard Coudenhove-KalergiL-1359 LuxembourgLuxembourg

Administrative ContactIsabelle Glemot-Schroeder and Fabienne Schmitz

Email cscunilu

  • 1 The Computer Science amp Communications (CSC) Research Unit
  • 2 Executive Summary
    • 21 Academic Staff Overview
    • 22 Main activities in 2012
    • 23 CSC Budget in 2012
      • 3 CSC Laboratories
        • 31 Laboratory for Advanced Software Systems
        • 32 Laboratory of Algorithmics Cryptology and Security
        • 33 Communicative Systems Laboratory
        • 34 Interdisciplinary Laboratory for Intelligent and Adaptive Systems
          • 4 Projects and Grants in 2012
            • 41 Research projects
              • 411 European funding projects
              • 412 FNR COREINTER Projects
              • 413 UL Projects
              • 414 UL PhD PostDoc
              • 415 Other miscellaneous projects
                • 42 Grants
                  • 421 AFR
                  • 422 Workshop amp Conferences (FNR Accompanying Measures)
                      • 5 CSC Representation
                        • 51 Conferences
                        • 52 PC and other memberships
                        • 53 Doctoral board
                        • 54 Guests
                        • 55 Visits and other representation activities
                        • 56 Research meeting
                          • 6 CSC Software
                          • 7 CSC Publications in 2012
                            • 71 Books
                            • 72 Book Chapters
                            • 73 International journals
                            • 74 Conferences Articles
                            • 75 Internal Reports
                            • 76 Proceedings
                              • Appendix
                              • A Additional References
                              • B CSC Statistics for 2012
                                • B1 CSC publications
                                • B2 CSC budget
                                • B3 CSC staff per category
                                  • C Acronyms used
Page 2: Computer Science and Communications Research Unit

Computer Science andCommunications Research Unit

CSC Activity Report 2012

KeywordsActivity Report University of Luxembourg Computer Science andCommunications Research Unit UL CSC LATEX

Computer Science and Communications Research UnitCSC Activity Report 2012

Editors Gregoire Danoy and Sebastien VarretteRelease date 2012Category 1 (public)Document Version Final v01 ndash SVN Rev

Compiled time 2013-10-08 1108Comments This report has been written using LATEX on the basis of the

template ccopy designed by Sebastien Varrette

AddressComputer Science amp Communication (CSC) Research UnitUniversity of LuxembourgFaculty of Science Technology and Communication6 rue Richard Coudenhove-KalergiL-1359 LuxembourgLuxembourg

Administrative ContactIsabelle Glemot-Schroeder and Fabienne Schmitz

Email cscunilu

httpcscunilu

Preface

You will find in this report the progress and activities made by the ComputerScience amp Communications (Computer Science amp Communications (CSC))research unit in 2012

Let me please summarize

In 2012 CSC features 116 positions including 24 Professors and Associate-Professors 32 Post-doc researchers 47 PhD students and 12 Administrativeand Technical staff

Nicolas Navet formerly at INRIA-Nancy has joined the lab as an associateprofessor specializing in real-time and embedded systems

Prof Denis Zampunieris has been appointed as vice-dean of the Faculty ofScience Technology and Communication and Nicolas Navet succeeds DenisZampunieris as course director of the bachelor in Informatics

Prof Lionel Briand is the recipient of a FNR PEARL grant that officiallystarted in January 2012 His group at the SnT is now composed of 12scientists and PhD students

The renowned logician Dov Gabbay started his second 3-year term (2012-2014) as an invited professor of UL attached to CSC

CSC hosted in Luxembourg several successful workshops

bull ldquoJudgment Aggregationrdquo (Feb 1) an important topic in the emergingarea of computational social choice

bull ldquoDynamics Of Argumentation Rules and Conditionals (DARC)rdquo(April2-3) another one on the Several other events were co-organized locallyand abroad

bull ldquoeVoting PhD Workshoprdquo (15-16 October)

ii

Dmitry Khovratovich obtained the Best PhD thesis award of the Universityof Luxembourg for his research on ldquoNew Approaches to the Cryptanalysisof Symmetric Primitivesrdquo

Dr Foued Melakessou received the first prize in the 2012 Scilab Contest atthe Workshop on Scilab amp OW2 (IWSO) in Nanjing China for his NARVAL(Network Analysis and Routing eVALuation) toolbox NARVAL is builton the Scilab environment and focuses on the analysis of network proto-cols (httpsecan-labuniluindexphpnews161-narval-toolbox-wins-first-prize-in-2012-scilab-contest)

Prof Lionel Briand received the IEEE Computer Society Harlan Mills awardfor his contributions to model-based verification and testing

Prof Bjorn Ottersten and Prof Lionel Briand were appointed members ofthe IEEE Fellow Review Committee

Prof Bjorn Ottersten was appointed ldquoDigital Champion of Luxembourgrdquoby Francois Biltgen Minister for Higher Education and Research

The hackbraten team headed by Piotr Kordy represented the SaToSS groupat the Capture the Flag Competition (http2012hackluindexphpCaptureTheFlag) co-located with the Hacklu conference (http2012hacklu) The team was ranked 24th amongst 575 teams registered forthe event

In 2012 ULCSC was involved in the launch of LAST-JD a new interdisci-plinary ERASMUS MUNDUS PhD program in Law Science and Technologyinvolving several partner universities in Europe and beyond

Dr Jun Pang and Prof Sjouke Mauw initiated a new strand of researchfocusing on formal models for biological systems An expert in the field DrAndrzej Mizera was hired to contribute and further extend this initiative

Prof Dr Pascal BouvryLuxembourg January 17 2013

Contents

1 The Computer Science amp Communications (CSC) ResearchUnit 1

2 Executive Summary 3

21 Academic Staff Overview 4

22 Main activities in 2012 5

23 CSC Budget in 2012 6

3 CSC Laboratories 7

31 Laboratory for Advanced Software Systems 7

32 Laboratory of Algorithmics Cryptology and Security 9

33 Communicative Systems Laboratory 10

34 Interdisciplinary Laboratory for Intelligent and Adaptive Sys-tems 12

4 Projects and Grants in 2012 15

41 Research projects 27

411 European funding projects 27

412 FNR COREINTER Projects 49

413 UL Projects 78

414 UL PhD PostDoc 91

iv CONTENTS

415 Other miscellaneous projects 115

42 Grants 123

421 AFR 123

422 Workshop amp Conferences (FNR Accompanying Mea-sures) 165

5 CSC Representation 167

51 Conferences 167

52 PC and other memberships 170

53 Doctoral board 176

54 Guests 177

55 Visits and other representation activities 181

56 Research meeting 186

6 CSC Software 189

7 CSC Publications in 2012 197

71 Books 197

72 Book Chapters 198

73 International journals 198

74 Conferences Articles 204

75 Internal Reports 223

76 Proceedings 224

Appendix 225

A Additional References 225

B CSC Statistics for 2012 239

B1 CSC publications 239

B2 CSC budget 239

B3 CSC staff per category 240

CONTENTS v

C Acronyms used 245

vi CONTENTS

Chapter 1

The Computer Science ampCommunications (CSC)

Research Unit

The Computer Science amp Communications (CSC) research unit is part ofthe University of Luxembourg with the primary mission to conduct funda-mental and applied research in the area of computer communication andinformation sciences

The goal is to push forward the scientific frontiers of these fields Addition-ally CSC provide support for the educational tasks at the academic andprofessional Bachelor and Master levels as well as for the PhD program

The CSC Research Unit is divided into four laboratories

1 Communicative Systems Laboratory (ComSys)

2 Interdisciplinary Laboratory for Intelligent and Adaptive Systems (ILIAS)

3 Laboratory of Algorithmics Cryptology and Security (LACS)

4 Laboratory for Advanced Software Systems (LASSY)

Three laboratories of the interdisciplinary centre in security reliability andtrust (SnT) are also headed by CSC professors

2 The Computer Science amp Communications (CSC) Research Unit

CSC works intensively towards the University priorities in Security Relia-bility and Trust as well as Systems Biomedicine By providing a strong dis-ciplinary knowledge in computer science telecommunications and appliedmathematics CSC will serve as one of the fundamental bricks to enableinterdisciplinary research through the University of Luxembourgrsquos interdis-ciplinary centres

CSC is currently the largest research unit of the University with a staff ofmore than 100 persons including 22 professors and associate-professors 11scientific support staff members 25 post-doc researchers and scientific col-laborators 40 PhD students 3 technician on project 1 research facilitator3 technical support staff members 3 technicians on project 475 full-time-equivalent administrative support positions

Their research fields range from the investigation of the theoretical founda-tions to the development of interdisciplinary applications

CSC decisions are taken by the chorum of professors As described in Figure11 the head of the research unit is helped by a quality manager a facilitymanager (handled by the scientific facilitator) and the heads of labs in orderto prepare the decision options and the reporting of the CSC Each lab hasits own budget line and a set of support resources

Prof BouvryHead of CSC

Prof ZampunierisDirector of Studies Representative

Prof MauwQuality Manager

Prof SchommerHead of ILIAS

Prof EngelHead of ComSys

Prof GuelfiHead of LASSY

Prof BiryukovHead of LACS

Profs Profs Profs Profs

CSC Steering Board

Bertrand DessartResearch Facilitator

Figure 11 CSC Organisation

Chapter 2

Executive Summary

The Computer Science and Communication research unit aka ComputerScience amp Communications (CSC) includes a staff of over 100 persons Twohundred students at Bachelor and Master levels are registered to CSC bach-elor and master degrees Close supervision and advice is ensured by opendoor policy and project based lecturing

CSC is also involved in life-long learning by organising a master degreein Information Systems Security Management in collaboration with CRPTudor

With regard to the professional branches the main aim consists of reducingthe gap between theory and practice whereas for the academic branchesthe focus is set on a problem-oriented understanding of the theoretical foun-dations of computer science CSC works intensively towards the Universitypriorities in Security Reliability and Trust as well as System BiomedicineBy providing a strong disciplinary knowledge in computer science telecom-munications and applied mathematics CSC will serve as one of the fun-damental bricks to enable interdisciplinary research through the Universityof Luxembourgrsquos interdisciplinary centres CSC is currently the largest re-search unit of the University and is cooperating in a large set of internationalas well as regional projects

In parallel CSC is more and more active in the field of distributed gridcomputing with the aim to propose andor join attractive academic projectsin this area In this context CSC manages the UL HPC (High PerformanceComputing) facility of the UL and inaugurated the new cluster hosted inthe LCSB premises in Belval The current solution includes 151 nodes 1556

4 Executive Summary

cores 14245 TFlops 265 TB NFS storage and 240 TB Lustre storage

21 Academic Staff Overview

bull Jean-Claude Asselborndagger emeritus professor

bull Alex Biryukov associate professor head of LACS

bull Raymond Bisdorff professor

bull Pascal Bouvry professor head of CSC and ILIAS

bull Lionel Briand professor

bull Jean-Sebastien Coron associate professor

bull Dov Gabbay guest professor

bull Theo Duhautpas senior lecturer

bull Thomas Engel professor head of ComSys

bull Nicolas Guelfi professor head of LASSY

bull Pierre Kelsen professor

bull Franck Leprevost professor vice rector

bull Yves Le Traon professor

bull Sjouke Mauw professor

bull Volker Muller associate professor

bull Nicolas Navet professor

bull Bjorn Ottersten professor

bull Steffen Rothkugel associate professor

bull Peter Ryan professor

bull Jurgen Sachau professor

bull Christoph Schommer associate professor

bull Ulrich Sorger professor

bull Bernard Steenis associate professor

bull Leon van der Torre professor

bull Denis Zampunieris professor

22 Main activities in 2012 5

22 Main activities in 2012

The following local events have been organized during 2012

bull IFIP AIMS 2012

bull Capture The Flag competition 2012

bull Workshop on Dynamics of Argumentation Rules and Conditionals

bull Interdisciplinary PhD Workshop on Security in eVoting (eVote PhDDays 2012)

CSC also participates at the organisation of many international conferencesand workshops

CSC is having strong partnerships with the other Luxembourgian researchcentres through the co-supervision of PhD students co-organised projectsand teaching activities

In 2012 13 PhD students successfully defended their PhD thesis at the CSC

CSC members are taking active part in various boards country-wide ex-ecutive direction of ERCIM direction of RESTENA chairman of Luxcloudboard vice-rectorate for international affairs and special projects of the Uni-versity of Luxembourg chairman of Luxconnect SA member of LUXTRUSTadministration board members of the SnT interim steering board and SnTfaculty boards representative of Luxembourg in the COST ICT DG expertsfor EU and national projects

CSC is active in various networks and projects International EU (FPEureka COST) regional (UGR) and local (FNR) networks and projects

CSC participates to various ERCIM workgroups - the European ResearchConsortium for Informatics and Mathematics through the FNR

CSC also participated to the open source community by several contribu-tions

bull ADTool

bull ARGULAB

bull Canephora

bull Democles

bull Face recognition

6 Executive Summary

bull JShadObf

bull MaM Multidimensional Aggregation Monitoring

bull MSC Macro Package for LATEX

bull Visual Contract Builder

CSC in 2012 produced 1 book 7 book chapters edited 3 proceedings andin terms of international peer-reviewed publications 69 journal articles and165 conference and workshop proceedings (see chapter 7 page 197 for moredetails) The full list of CSC publications is available here

23 CSC Budget in 2012

The following table describes the marginal expenses of CSC in terms of struc-tural funding and UL projects The main cost corresponds to the salaries ofthe structural positions (professors research assistants assistants admin-istrative and support staff) expenses related to the buildings and some ofthe operating expenses (eg phone bills electricity etc) are covered by thestructural UL budget

Lab structural funding 761070e

UL Research Projects 896775e

Total 1657845 e

Table 21 CSC Internal Budget

Chapter 3

CSC Laboratories

31 Laboratory for Advanced Software Systems

Laboratory of Advanced Software SystemsAcronym LASSYReference F1R-CSC-LAB-05LASSHead Prof Dr Pierre Kelsen

Scientific Board Nicolas Guelfi Pierre Kelsen Yves Le Traon NicolasNavet Denis Zampunieris

Domain(s)

bull dependability

bull e-learning

bull hardwaresoftware co-design

bull model driven engineering

bull proactive computing

bull real-time and embedded systems

bull security

8 CSC Laboratories

bull software engineering

bull software product lines

bull testing

bull verification

Objectives The LASSY laboratory considers advanced software systemsas objects which are complex (business- or safety-) critical and possiblycontaining both software and hardware From the LASSY perspective thefour main dimensions underpinning the science of engineering these advancedsoftware systems are modeling methodology dependability (including secu-rity) and realization infrastructures LASSY conducts research in modelingand more specifically on model driven engineering which aims at allowing theengineering of such systems by creating and transforming models method-ologies which aim at defining engineering processes (focusing on analysisdesign and verification) and rules allowing for an efficient engineering of suchsystems conceptual frameworks and development platforms for enhancingdependability (focusing on concurrent transactions and fault tolerance) Inour research we promote the early consideration of realization infrastruc-tures (ie the hardware execution platform which integrates acquisitioncomputation communications and presentation hardware devices) Finallywe target specific application domains such as e-business systems auto-motive systems crisis management systems or proactive e-learning systemswhich are used either for experimental validation or for research problemelicitation

The current research objectives are the following ones

bull To develop new engineering processes

bull To investigate modeling languages

bull To use mathematical theories in the definition and verification of newsoftware engineering artifacts

bull To address dependability attributes (availability reliability safety con-fidentiality integrity and maintainability) throughout all the develop-ment life cycle

bull To assist in the development and in the use of e-learning tools

bull To study verification and validation techniques

Skills

32 Laboratory of Algorithmics Cryptology and Security 9

bull Nicolas Guelfi dependability verification software engineering modeldriven engineering

bull Pierre Kelsen model driven engineering software engineering formalmethods

bull Yves Le Traon verification testing software security model drivenengineering

bull Nicolas Navet real-time and embedded systems

bull Denis Zampunieris E-learning Proactive Computing

32 Laboratory of Algorithmics Cryptology andSecurity

Laboratory of Algorithmics Cryptology and SecurityAcronym LACSReference F1R-CSC-LAB-F01L0204Head Prof Dr Alex Biryukov

Scientific Board Jean-Sebastien Coron Franck Leprevost Sjouke MauwVolker Muller Peter Ryan

Domain(s)

bull Cryptography Information and Network Security

bull Information Security Management

bull Embedded Systems Security

bull Side-Channel Analysis and Security of Implementations

bull Algorithmic Number Theory

bull Security protocols

bull Security and trust assessment and modelling

bull Socio-technical security

10 CSC Laboratories

Objectives In recent years information technology has expanded to en-compass most facets of our daily livesmdashat work at school at home forleisure or learning and on the movemdashand it is reaching ever-widening seg-ments of our society The Internet e-mail mobile phones etc are alreadystandard channels for the information society to communicate gain accessto new multimedia services do business or learn new skills The recentldquodigital revolutionrdquo and widespread access to telecommunication networkshave enabled the emergence of e-commerce and e-government This pro-liferation of digital communication and the transition of social interactionsinto the cyberspace have raised new concerns in terms of security and trustlike confidentiality privacy and anonymity data integrity protection ofintellectual property and digital rights management threats of corporateespionage and surveillance systems (such as Echelon) etc These issues areinterdisciplinary in their essence drawing from several fields algorithmicnumber theory cryptography network security signal processing securityof protocols side-channel analysis software engineering legal issues andmany more

Skills NA

33 Communicative Systems Laboratory

Communicative Systems LaboratoryAcronym ComSysReference F1R-CSC-LAB-05COMSHead Prof Dr Thomas Engel

Scientific Board Pascal Bouvry Thomas Engel Steffen Rothkugel SjoukeMauw Theo Duhautpas Yves Le Traon Lionel Briand Bjorn OtterstenPeter Ryan Jurgen Sachau

Domain(s)

bull Information Transmission

bull Wireless Communication Systems

bull Security Protocols

bull Trust Models

33 Communicative Systems Laboratory 11

bull Middleware

bull Parallel and Distributed Systems

bull Cloud Grid and Peer-to-Peer Computing

Objectives The Communicative Systems Laboratory (ComSys) is part ofthe Computer Science and Communication Research Unit and focuses onstate of the art research in digital communications Embracing the end-to-end arguments in system design ComSys focuses on integrated research inthe areas of Information Transfer and Communicating Systems Informa-tion Transfer is concerned with information transmission over potentiallycomplex channels and networks Communicating Systems in turn are thecomposition of multiple distributed entities employing communication net-works to collaboratively achieve a common goal ComSys has strong tech-nical and personal facilities to improve existing and develop new solutionsin the following research topics The ComSys research fields will have astrong impact on the 21st century The rapidly growing demand for infor-mation exchange in peoplersquos daily lives requires technologies like ubiquitousand pervasive computing to meet the expectations of the information so-ciety and novel adaptive concepts tackling the continuing data challengesThe resulting problems have already been a key enabler for some industrialand governmental founded projects at national and European level Currentresearch projects propagate technologies for

bull Hybrid Wireless Networks

bull Green Cloud Computing

bull Information Dissemination in Ad-Hoc Networks

bull Mobile Communication

bull Mobile Learning

bull Network Traffic Analysis and Protection

bull Network Traffic Management and Coordination

bull Secure Satellite Communication

bull Secure Wireless MANETs

Skills

bull Research in networks and service security

12 CSC Laboratories

bull Mobile and vehicular networks

bull Protocol Security and Secure System Design

bull Data Mining for Network Security Monitoring

bull Adaptive and self managed security systems and honeypots

bull VoIP Security

bull Privacy preserving infrastructures

bull Cloud security and cluster based data mining

bull Distributed and P2P based computing

34 Interdisciplinary Laboratory for Intelligent andAdaptive Systems

Interdisciplinary Lab on Intelligent and Adaptative SystemsAcronym ILIASReference F1R-CSC-LAB-05ILIAHead Prof Dr Christoph Schommer

Scientific Board Pascal Bouvry Raymond Bisdorff Christoph SchommerUlrich Sorger Leon van der TorreGuest professor Dov Gabbay

Domain(s)

bull Algorithmic decision theory

bull Bio-inspired computing

bull Cognitive agentsrobotics

bull Data mining and knowledge discovery

bull Information theory and uncertain inference

bull Knowledge representation and applied logic (eg for security)

34 Interdisciplinary Laboratory for Intelligent and Adaptive Systems 13

bull Normative multi-agent systems

bull Optimization

bull Parallel computing

Objectives ILIAS is a cross-disciplinary research group combining exper-tise from computer science operations research information theory ana-lytic philosophy probability theory discrete math and logic The overar-ching topic in research and teaching is information processing in complexand dynamic environments given limited resources and incomplete or un-certain knowledge The ILIAS research teams investigate the theoreticalfoundations and the algorithmic realization of systems performing complexproblem solving with a high degree of autonomy ie intelligent systems andexploiting learning to deal with opaque and dynamic contexts ie adaptivesystems

Skills

bull Raymond Bisdorff (Decision aid systems)

bull Pascal Bouvry (Optimization and parallel computing)

bull Christoph Schommer (Adaptive data mining and information manage-ment)

bull Ulrich Sorger (Information theory and stochastic inference)

bull Leon van der Torre (Knowledge representation and multi-agent sys-tems)

bull Dov Gabbay (Applied logic and knowledge representation)

14 CSC Laboratories

Chapter 4

Projects and Grants in 2012

This chapter lists the research projects running during 2012together withthe grants obtained (typically to organize scientific conferences via the FNRaccompanying measures AM3) This chapter is structured to summarize

1 European funding project (FP7 ERCIM etc) ndash see sect411

2 FNR CORE projects ndash see sect412

3 UL projects ndash see sect413

4 UL PhD and Postdocs ndash see sect414

5 Other miscellaneous projects (French ANR Grant agreement for re-search development and innovation etc) ndash see sect415

6 Grants obtained (AFR FNR AM3 etc) ndash see sect42

The following tables summarize the projects operated in CSC for the year2012

16 Projects and Grants in 2012

European projectsLab Acronym Title PI Funding Duration

CO

MSY

S

InSatNetRef p27

Investigation of Radio ResourceAllocation and Multiple AccessSchemes for Satellite Networks

NA FNR-ERCIM-Alain Bensous-san(46Ke)

2012-06-01 ndash2013-05-31

BUTLERRef p33

uBiquitous secUre inTernet-of-things with Location and contEx-awaReness

Prof DrThomas Engel

FP7 Euro-pean Commis-sion(456Ke)

2011-10-01 ndash2014-09-30

ceFIMSRef p34

SceFIMS-Coordination of theEuropean Future Internet forumof Member States

Prof DrThomas Engel

EC - FP7UL bud-get(35Ke)

2010-09-01 ndash2013-02-28

IoT6Ref p36

Universal Itegration of the Inter-net of Things through an IPv6-Based Service-oriented Architec-ture enabling heterogeneous com-ponents interoperability

Prof DrThomas Engel

EC-FP7(266Ke)

2012-01-01 ndash2014-12-31

OUTSMARTRef p37

Provisioning of urbanregionalsmart services and business mod-els enabled by the Future Internet

Prof DrThomas Engel

FP7 Euro-pean Commis-sion(257Ke)

2011-04-01 ndash2013-03-31

SECRICOMRef p40

Seamless Communication for Cri-sis Management

Prof DrThomas Engel

EC - FP7 Eu-ropean Commis-sionUL(12469Ke)

2008-09-01 ndash2012-04-30

LA

CS TREsPASS

Ref p46

Technology-supported Risk Esti-mation by Predictive Assessmentof Socio-technical Security

Prof DrSjouke Mauw

EUFP7(9999824e)

2012-11-01 ndash2016-10-31

ILIA

S

ALBRRef p42

Argumentation-Based and Logic-Based Reasoning in Multi-AgentSystems

Dr SrdjanVesic

ERCIM 2011-10-01 ndash2012-09-30

TrustGamesRef p43

Trust Games Achieving Cooper-ation in Multi-Agent Systems

Dr Paolo Tur-rini

FNR-FP7 Co-fund

2011-09-01 ndash2013-08-31

WiSafeCarRef p44

Wireless traffic Safety networkbetween Cars

Prof Dr Pas-cal Bouvry

EUREKA -CELTIC(300000e)

2009-07-01 ndash2012-03-31

17

FNR projectsLab Acronym Title PI Funding Duration

CO

MSY

S

MoveRef p52

Mobility Optimization Using VE-hicular Network Technologies

Prof DrThomas Engel

FNRProject(1127ke)

2011-04-01 ndash2013-03-31

LA

CS

STASTRef p63

Socio-Technical Analysis of Secu-rity and Trust

Prof Dr Pe-ter YA Ryan

FNRCORE(765864e)

2012-05-01 ndash2015-04-30

ATREESRef p64

Attack Trees Prof DrSjouke Mauw

FNR-CORE(299000e)

2009-04-01 ndash2012-03-31

CRYPTOSECRef p66

Cryptography and InformationSecurity in the Real World

Dr Jean-SebastienCoron

FNR-CORE(272000e)

2010-10-01 ndash2013-09-30

SeRTVSRef p67

Secure Reliable and TrustworthyVoting Systems

Prof Dr Pe-ter Ryan

FNR-Core333000e FNR-AFR 216216eIMT Luca130000e Uni-versity of Mel-bourne 60000eUL 268596e

2010-02-01 ndash2013-02-01

LA

SSY

E-TEACCHRef p70

e-Training Education Assess-ment and Communication Centerfor Headache Disorders

Prof DrDenis Zam-punieris

FNR-CORE 2011-05-01 ndash2014-04-30

MaRCoRef p71

Managing Regulatory Compli-ance a Business-Centred Ap-proach

Prof DrPierre Kelsen

FNR-CORE(749Ke)

2010-05-01 ndash2013-04-30

MITERRef p73

Modeling Composing and Test-ing of Security Concerns

Dr JacquesKlein

FNR NA

MOVERERef p75

Model-Driven Validation andVerification of Resilient SoftwareSystems

Prof DrNicolas Guelfi

FNR-CORE(265000e)

2010-05-01 ndash2013-04-30

SETERRef p77

Security TEsting for Resilientsystems

Prof DrNicolas Guelfi

FNR-CORE(43830000e)

2009-05-01 ndash2012-04-30

18 Projects and Grants in 2012

FNR projects (cont)Lab Acronym Title PI Funding Duration

ILIA

S

SndashGAMESRef p54

Security Games Prof DrLeon van derTorre

FNR-CORE(314000e)

2009-04-01 ndash2012-03-31

DYNARGRef p56

The Dynamics of Argumentation Prof DrLeon van derTorre

FNR-INTERCNRS

2009-10-01 ndash2012-09-31

MaRCoRef p58

Management Regulatory Compli-ance

Prof DrPierre Kelsen

FNR-CORE 2010-05-01 ndash2013-04-30

GreenCloudRef p59

Multi-Objective Metaheuristicsfor Energy-Aware Scheduling inCloud Computing Systems

Prof Dr Pas-cal Bouvry

FNR Univer-sity of Luxem-bourg(1088440)

2012-07-01 ndash2015-06-30

GreenITRef p60

EnerGy-efficient REsourcE Al-locatioN in AutonomIc CloudCompuTing

Prof Dr Pas-cal Bouvry

FNR-CORE(432000e)

2010-01-01 ndash2012-12-31

19

AFR projectsLab Acronym Title PI Funding Duration

CO

MSY

S RELGRID2009Ref p128

Investigation of boundary condi-tions for a reliable and efficientcontrol of energy systems formedby highly parallelized off-grid in-verters

Prof DrJuergenSachau

FNR-AFR-PhD 2010-04-01 ndash2013-03-31

SCoPeMeterRef p129

Methods for Measuring and Pre-dicting the Security PerformanceReputation of Public Networks

Prof DrThomas Engel

FNR-AFR RedDog

2011-03-22 ndash2015-03-21

WiNSEOMRef p130

Energy Optimization and Moni-toring in Wireless Mesh SensorNetworks

Prof DrThomas Engel

FNR - AFRPhD(37KeYear)

2010-04-08 ndash2013-04-07

LA

CS

ANTI-MALWARE

Ref p154

A Computational Framework forApprehending Evolving Malwareand Malware Engineers

Dr SimonKramer

FNRndashAFR PostDoc(103 236 e)

2011-01-01 ndash2012-12-31

EPRIV-MAARef p155

A Formal Approach to EnforcedPrivacy Modelling Analysis andApplications

Prof DrSjouke Mauw

FNRndashAFR(105222e)

2009-12-01 ndash2013-11-30

GMASecRef p156

Games for Modelling and Analy-sis of Security

Prof DrSjouke Mauw

FNRndashAFR(140000e)

2009-11-01 ndash2013-10-31

SADTRef p157

Security Analysis ThroughAttackndashDefense Trees

Prof DrSjouke Mauw

FNR-AFRPhD(141968e)

2010-01-01 ndash2013-12-31

SECLOCRef p158

Secure and Private LocationProofs Architecture and Designfor Location-Based Services

Prof DrSjouke Mauw

FNR-AFRPhD(109137e)

2010-08-01 ndash2013-07-31

SHARCRef p160

Analysis of the SHA-3 RemainingCandidates

Prof Dr AlexBiryukov

FNR-AFR Post-doc(102620e)

2010-10-15 ndash2012-10-14

20 Projects and Grants in 2012

AFR projects (cont)Lab Acronym Title PI Funding Duration

LA

SSY

DYNOSTRef p161

Dynamic and Composite Service-Oriented Architecture SecurityTesting

Prof DrYves Le Traon

NA 2010-10-01 ndash2013-09-30

PeerunitRef p162

A Testing Framework for Large-Scale Applications

Prof DrYves Le Traon

NA 2011-01-15 ndash2014-01-15

SPEMRef p163

Selected Problems in ExecutableModeling

Prof DrPierre Kelsen

FNR-AFR PhD 2009-11-15 ndash2012-11-15

21

AFR projects (cont)Lab Acronym Title PI Funding Duration

ILIA

S

IELTRef p132

Information Extraction fromLegislative Texts

Prof DrLeon van derTorre

FNR AFR PHD 2012-03-01

LOSECRef p133

Security Logics Prof DrLeon van derTorre

FNR-AFR 2009-09-01 ndash2012-09-01

ProCRobRef p134

Programming Cognitive Robots Prof DrLeon van derTorre

FNR-AFR 2011-05-20 ndash2014-05-20

TABNRef p135

Trust in argumentation-based ne-gotiation

Dr SrdjanVesic

FNR-AFR-Postdoc

2012-10-01 ndash2013-01-14

LAAMIRef p136

Logical Approaches for Analyz-ing Market Irrationality compu-tational aspects

Prof DrLeon van derTorre

FNR-AFR(117840e)

2011-04-01 ndash2013-03-31

Green EECRef p138

Green Energy-Efficient Comput-ing

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2010-04-01 ndash2012-03-31

CIDCRef p139

Confidentiality Integrity issuesin distributed computations

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2010-01-01 ndash2013-12-31

REMORef p141

Reliability of Multi-ObjectiveOptimization techniques

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2010-10-01 ndash2012-09-30

LUXCommTISRef p143

Community-based Vehicular Net-work for Traffic Information inLuxembourg

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2011-09-01 ndash2014-08-31

HERARef p144

Holistic autonomic Energy andthermal aware Resource Alloca-tion in cloud computing

Prof Dr Pas-cal Bouvry

FNR - AFRPhD(37288e)

2011-09-15 ndash2014-09-14

INTERCOMRef p146

Energy-Efficient Networking inAutonomic Cloud Computing

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2011-06-01 ndash2013-05-31

DeTeMOCGAsRef p147

Decision-theoretic fine tuning ofmulti-objective co-evolutionaryalgorithms

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2011-09-15 ndash2014-09-14

EPOCRef p149

Energy-Performance Optimiza-tion of the Cloud

Prof Dr Pas-cal Bouvry

FNR - AFRPhD(10812558e)

2010-09-01 ndash2013-08-31

TIGRISRef p150

Risk Prediction Framework forInterdependent Systems usingGraph Theory

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2009-10-15 ndash2012-10-14

DYMORef p151

Dynamic MixVoip Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2012-11-01 ndash2015-10-31

SaPRORef p152

Satellite Payload ReconfigurationOptimization

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2010-11-15 ndash2013-11-14

22 Projects and Grants in 2012

University of Luxembourg Internal projectLab Acronym Title PI Funding Duration

LA

CS

DEFAULT-PRIV

Ref p85

Privacy by Default Prof DrSjouke Mauw

UL(192853e) 2012-09-01 ndash2014-08-31

EPRIVRef p87

A Formal Approach to EnforcedPrivacy in e-Services

Prof DrSjouke Mauw

UL(254955e) 2009-05-01 ndash2012-04-30

LA

SSY

BLASTRef p88

Better e-Learning AssignmentsSystem Technology

Prof DrDenis Zam-punieris

UL(165000e) 2010-09-01 ndash2012-08-31

COMPEXRef p89

Model Composition for Exe-cutable Modeling

Prof DrPierre Kelsen

UL(173Ke) 2011-10-01 ndash2013-09-30

DYNOSOARRef p90

Dynamic and Composite Service-Oriented Architecture SecurityTesting

Prof DrYves Le Traon

UL NA

ILIA

S

AASTMRef p82

Advanced Argumentation Tech-niques for Trust Management

Prof DrLeon van derTorre

UL 2008-05-01 ndash2012-04-30

LINMASRef p80

Logics Integrated for NormativeMulti-Agent Systems

Prof DrLeon van derTorre

UL 2011-03-01 ndash2013-02-28

DPMHPCRef p83

A discrete approach to modelprocessing of hard metal includ-ing high performance computing

Prof DrBernhardPeters

UL NA

EvoPerfRef p84

Evolutionary Computing andPerformance Guarantees

Prof Dr Pas-cal Bouvry

UL(370ke) 2011-09-01 ndash2013-12-31

23

UL PhD PostDocLab Acronym Title PI Funding Duration

CO

MSY

S

MOVERef p99

Mobility Optimization usingVehicular network technologies(MOVE)

Prof DrThomas Engel

CORE-MOVE(37KYear)

2011-11-15 ndash2014-11-14

Honeypotand MalwareAnalysis

Ref p96

Honeypot and Malware Analysis Prof DrThomas Engel

AFR-PPP(37Kyear)

2011-10-15 ndash2014-10-14

NARef p97

Routing and mobility manage-ment in vehicular networks

Prof DrThomas Engel

FNR - COREMOVE(37Kyear)

2011-09-01 ndash2014-08-31

SMO-MLSRef p98

Securing Mission Operations us-ing Multi-Level Security

Prof DrThomas Engel

European SpaceAgency(48800eUL - 37077 e)

2010-11-01 ndash2014-10-30

NARef p100

Service Dependency andAnomaly Detection

Prof DrThomas Engel

Funded on FP7EFIPSANSproject until31122010 -NetLab

2008-11-01 ndash2012-10-31

LA

SSY

NARef p113

Smartphone Malware detectionand mitigation with Static codeAnalysis

Prof DrYves Le Traon

NA(NA) 2011-10-15 ndash2014-09-30

ACARef p114

Access Control ArchitecturesFrom Multi-objective Require-ments to Deployment

Prof DrYves Le Traon

UL 2011-02-01 ndash2014-01-31

24 Projects and Grants in 2012

UL PhD PostDoc (cont)Lab Acronym Title PI Funding Duration

ILIA

S

ICRRef p100

Individual and Collective Rea-soning

Prof DrLeon van derTorre

UL-PHD 2008-03-12 ndash2012-03-12

NARef p102

Understanding Financial Topicsand their Lifetime in TextualNews by the Content Aging The-ory

Prof DrChristophSchommer

FNRCORE(500000)

2012-06-01 ndash2015-05-31

SPACERef p103

Smart Predictive Algorithms forSpacecraft Anomalies

NA SnT 2011-07-09 ndash2017-07-08

INACSRef p104

An Incremental System to man-age Conversational Streams

Prof DrChristophSchommer

UL 2009-02-01 ndash2013-01-14

FERESRef p105

Feature Extraction and Repre-sentation for Economic Surveys

Prof DrChristophSchommer

Internal Doc-toral Posi-tion(InternalDoctoral Posi-tion)

2011-04-01 ndash2014-03-31

NARef p106

Sentiment Classification in Fi-nancial Texts

Prof DrChristophSchommer

FNRCORE(500000)

2012-06-01 ndash2015-05-31

SPARCRef p108

Artificial Conversational Com-panions

Prof DrChristophSchommer

NA 2011-04-01 ndash2014-03-31

ERACCRef p109

Energy-efficient resource alloca-tion in autonomic cloud comput-ing

Prof Dr Pas-cal Bouvry

UL 2010-10-01 ndash2013-09-30

IICRef p110

Integrity Issues on the Cloud Prof Dr Pas-cal Bouvry

UL 2011-01-16 ndash2013-01-15

NARef p112

Energy-Efficient InformationDissemination in MANETs

Prof Dr Pas-cal Bouvry

UL 2009-09-15 ndash2012-09-14

25

Other misc projectsLab Acronym Title PI Funding Duration

CO

MSY

S BCEERef p115

Enterprise security for the bank-ing and financial sector

Prof DrThomas Engel

BCEE(204Ke) 2011-04-01 ndash2012-03-31

EPTVRef p117

EPT Vehicular Networks Prof DrThomas Engel

EPT(2 298 Ke) 2010-01-01 ndash2014-12-31

Pil to SPELLRef p118

PIL to SPELL conversion Prof DrThomas Engel

SES-ASTRA(Notapplicable)

2011-01-28 ndash2015-01-27

LA

CS LASP

Ref p120

Developing a Prototype of Loca-tion Assurance Service Provider

Prof DrSjouke Mauw

ESA -SnT(160000e(ESA) )

2010-12-08 ndash2012-12-07

LA

SSY

SPLITRef p121

Combine Software Product Lineand Aspect-Oriented SoftwareDevelopment

Prof DrNicolas Guelfi

ULFNR(41000e)

2009-10-01 ndash2012-09-30

ILIA

S AlgoDecRef p119

INTERCNRSGDRI1102 Al-gorithmic Decision Theory

Prof Dr Ray-mond Bisdorff

FNR UL(11 000e)

2011-01-01 ndash2014-12-31

26 Projects and Grants in 2012

Accompanying measures (AM)Lab Acronym Title PI Funding Duration

ILIA

S SandpileRef p165

Building the Skeleton of a SOscheduler

Prof Dr Pas-cal Bouvry

FNR -AM2c(634900)

2012-03-01 ndash2012-05-01

41 Research projects 27

41 Research projects

411 European funding projects

Investigation of Radio Resource Allocation and Multiple AccessSchemes for Satellite NetworksAcronym InSatNetReference NAPI NAFunding FNR-ERCIM-Alain BensoussanBudget 46KeBudget UL NADuration 2012-06-01 ndash 2013-05-31

Members M Butt B Ottersten

Domain(s) NA

Partner(s) NA

Description The demands for data rate are increasing with the emergenceof new applications On the other hand radio resources are becoming scarcedue to dedicated frequency allocation of the spectrum to the operators Itis becoming increasingly challenging to meet the rate and coverage require-ments for the users Satellite systems have the potential to provide largescale coverage and meet throughput requirements for broadband access Inthis project we plan to study the radio resource allocation and multipleaccess schemes for satellite networks We investigate the radio resource al-location problems specifically for the cognitive architecture of satellite net-works and evaluate energy-performance trade-offs for different performanceparameters like delay and loss requirements for the primary and secondaryusers in a cognitive satellite network

Results NA

Publications NA

28 Projects and Grants in 2012

Cognitive Radio and Networking for Cooperative Coexistenceof Heterogeneous wireless NetworksAcronym Cognitive RadioReference NAPI Prof Dr Bjorn OtterstenFunding COST Action IC0902Budget NABudget UL NADuration 2009-07-30 ndash 2013-12-10

Members B Ottersten

Domain(s) Cognitive Radio

Partner(s) Belgium Bosnia and Herzegovinia Croatia Cyprus Czech Re-public Denmark Finland Former Yugoslav Republic of Macedonia FranceGermany Greece Ireland Israel Italy Latvia Luxembourg Norway PolandPortugal Romania Serbia Slovenia Spain Sweden Turkey United King-dom USA China Canada Australia ISPRA (It)

Description NA

Results NA

Publications NA

Cooperative Radio Communications for Green Smart Environ-mentsAcronym Cooperative RadioReference NAPI Prof Dr Bjorn OtterstenFunding Cost Action IC2004Budget NABudget UL NADuration 2011-05-24 ndash 2015-05-18

Members B Ottersten

Domain(s) NA

Partner(s) Austria Belgium Bulgaria Cyprus Czech Republic Den-mark Finland Former Yugoslav Republic of Macedonia France GermanyGreece Ireland Israel Italy Netherlands Norway Poland Portugal Ro-mania Serbia Slovakia Spain Sweden Switzerland UK

41 Research projects 29

Description NA

Results NA

Publications NA

MIMO Hardware DemonstratorAcronym MIMO-HardwareReference 12R-DIR-PAU-10MIMOPI NAFunding ESA -ESTEC-ITTA01-609909NLJKBudget 1199KeBudget UL NADuration 2011-01-01 ndash 2012-03-30

Members B Ottersten D Arapoglou B Shankar S Chatzinotas

Domain(s) Satellite Based Alarm System

Partner(s)

bull Elektrobit Wireless Communications Ltb (Finland)

bull SES Astra Techcom (Luxembourg)

bull Univ of Oulu (Finland)

bull VTT (Finland)

bull Univ of Turku (Finland)

Description development of practical methods utilizing MIMO techniquesfor DVB-SH AB scenarios to improve the air interface performance com-pared to current standard The practical aim of the proposal is to specifyand develop a MIMO HW demonstrator that will be used to carry out prac-tical performance evaluation and demonstrations The project is dividedinto 2 phases The 1st phase provides an overview of state-ofthe- art MIMOtechniques and defines a set of MIMO scenarios based on DVB-SH includingapplicable radio channel models In addition a computer simulation modelwill be developed to evaluate the defined scenarios and the system architec-ture design for implementation of the developed MIMO-DVB-SH waveformwill be carried out During the 2nd phase the specified system will be im-plemented utilizing an existing HW test-bed the RACE-SDR The test-bedwill be used to perform demonstrations and detailed performance evaluationin laboratory environment As a conclusion improvements to the existing

30 Projects and Grants in 2012

standard andor implementation guidelines will be proposed to DVB-forumand ETSI standardization (EB is a member in both organizations)

Results NA

Publications NA

Propagation tools and data for integrate TelecommunicationNavigation and earth Observation systemsAcronym Propagation toolsReference NAPI Prof Dr Bjorn OtterstenFunding COST Action IC0802Budget NABudget UL NADuration 2009-03-03 ndash 2012-11-18

Members B Ottersten

Domain(s) NA

Partner(s) Austria Belgium Bulgaria Cyprus Czech Republic Den-mark Finland France Germany Greece Hungary Israel Italy NorwayPoland Portugal Serbia Slovakia Spain Sweden Switzerland UK BrazilCanada Netherlands India Pakistan USA

Description NA

Results NA

Publications NA

SATellite Network of EXperts - Call off-Order COO2Acronym SatNEx IIIReference NAPI Prof Dr Bjorn OtterstenFunding ESA - gtTRP ARTES1 ARTES5Budget NABudget UL NADuration 2011-03-23

Members B Ottersten

41 Research projects 31

Domain(s) NA

Partner(s) DLR (Germany) Univ of Surrey (UK) Univ of Bologna (It)Aristotle Univ of Thessaloniki (Greece) Univ of Bradford (UK) ConsorzoNazionale Interuniv Per le Telecomunicazioni (It) Italian National Re-search Council (It) Centre Tecnologic de Telecomunicacions de Catalunya(Spain) National Observatory of Athens (Greece) Office National drsquoEtudeset de Recherches Aerospatiales (Fr) Univ of Salzburg (Austria) TeSA As-sociation (Fr) Graz Univ of Technology (Austria) Univ Autonoma deBarcelona (Spain) The Univ Court of the Univ of Aberdeen (UK) UnivDegli Studi di Roma rsquoTor Vergatarsquo (It) Univ de Vigo (Spain) Fraunhofer-Gesellschaft Munchen (Germany) Institute of Computer and Communica-tions Systems (Greece)

Description NA

Results NA

Publications NA

Potential business for an advanced spread spectrum measure-ment system for satellite testingAcronym Spread spectrum satellite commReference I2R-DIR-PAU-11LLV8PI Prof Dr Bjorn OtterstenFunding ESABudget 97KeBudget UL NADuration 2010-12-08 ndash 2011-12-07

Members B Ottersten S Chatzinotas

Domain(s) Satellite spectrum

Partner(s)

bull SES Astra TechCom SA

bull EmTroniX Sarl

Description The study aims at establishing the requirements and anal-yse the market situation to evaluate the business perspectives for a spreadspectrum measurement system or service together with potential customerssuch as satellite operators and satellite manufactures The detailed under-standing of the customers requirements and the kind of drivers for them for

32 Projects and Grants in 2012

buying such a measurement product or service is a key indicator for subse-quent activities Based on these outcomes business scenarios and a businesscases are elaborated and a roadmap for a sustainable Luxembourg exploita-tion in for instance service provisioning and test equipment manufacturingis prepared In addition study activities will lead to an outline proposalready to be submitted to a funding agency In detail the following pointswill be investigated

bull Analyse and quantify the market for spread spectrum measurementsystems and services

bull Identify potential customers capture their requirements

bull Elaborate system concepts and develop and validate system and ser-vice design with potential customers

bull Identify and critically assess competing solutions

bull Establish a business model understand the value chain identify andquantify the opportunity for Luxembourg industry

bull Prepare an outline proposal and identify opportunities for funding

bull Identify state-of-the art in this and similar domains and evaluate tech-niques subject to patent filling

As this study is conducted preliminary to learn about market situation andcustomer needs there are also some Non-objectives

bull Provision of detailed technical solution

bull Development or technical validation activities

bull Definition of the solution prior to the understanding of the market

Results NA

Publications NA

41 Research projects 33

uBiquitous secUre inTernet-of-things with Location andcontEx-awaRenessAcronym BUTLERReference I2R-NET-PEU-11BTLRPI Prof Dr Thomas EngelFunding FP7 European CommissionBudget 456KeBudget UL NADuration 2011-10-01 ndash 2014-09-30

Members T Engel R State T Cholez F Melakessou

Domain(s) internet of things context aware services smart devices net-work security integrated architecture and platform

Partner(s)

bull Inno AG Germany

bull Ericsson Spain

bull Telecom Italia Italy

bull Gemalto SA France

bull CEA France

bull Oulun Yliopisto Finland

bull FBConsulting SARL Luxembourg

bull ISMB Italy

bull Hochschule Luzern Switzerland

bull Swisscom Switzerland

bull SMTMicroelectronics Italy

bull Utrema France

bull University of Luxembourg

bull Universiteit Leuven Belgium

bull Cascard OY Finland

bull TST Spain

bull Alcatel Lucent Bell Labs France

34 Projects and Grants in 2012

bull Jacobs University Germany

Description Recent ICT advances are bringing to reality a world wheresensors actuators and smart portable devices are interconnected into anInternet-of-Things (IoT) ecosystem reaching 50 Billion devices by 2015

The IoT major challenges are from a systemic viewpoint smart resourcemanagement and digital security and from a userservice perspective thepervasiveness (uniformity of performance anytime and anywhere) and aware-ness (inversely proportional to the degree of knowledge required from users)BUTLER will be the first European project to emphasise pervasivenesscontext-awareness and security for IoT Through a consortium of leadingIndustrial Corporate RD and Academic partners with extensive and com-plementary know-how BUTLER will integrate current and develop newtechnologies to form a bundle of applications platform features and servicesthat will bring IoT to life

Results UL already contributed to the definition of the use cases thatpresent our vision of smart-life in the topics of smart city and smart trans-portation We also contributed to the definition of the requirements for theBUTLER platform (WP1- D11)

Publications None yet

SceFIMS-Coordination of the European Future Internet forumof Member StatesAcronym ceFIMSReference IR-DIR-PEU-10CEFIPI Prof Dr Thomas EngelFunding EC - FP7

UL budgetBudget 35KeBudget UL NADuration 2010-09-01 ndash 2013-02-28

Members T Engel L Ladid

Domain(s) IPv6 networking support action

Partner(s)

bull Waterford Institute of Technology Ireland

bull Nederlandse Organisatie voor Wetenschappelijk Onderzoek Nether-lands

41 Research projects 35

bull Nemzeti Kutatasi Es Technologiai Hivatal Hungary

bull UMIC - Agencia Para A Sociedade Do Conhecimento Portugal

bull Asociacion De Empresas De Electronica Tecnologias De La Informa-cion Y Telecomunicaciones De Espana Spain

Description The ceFIMS project addresses the problem of the fragmenta-tion of ICT research between European Member States (MS) ceFIMS willleverage its knowledge of Member State-funded research to gain consensusabout problems and approaches at the Member State level ceFIMS willbuild on that consensus to promote alignment both across Member Statesand also between Member State and EC-funded ICT research This willconsequently unite better the European ICT research community and placeEuropean Future Internet (FI) research in a stronger position

ceFIMS will produce a research roadmap to maximise synergies between EUand MS investments in FI research establishing the basis for an ERA-NET+on the Future Internet An ERA-NET+ will provide the means to developthe EUrsquos strong research position Allied to this a Public-Private Partner-ship (PPP) will provide the means to transfer new knowledge into innovativeproducts with economic and social benefits for EU citizens ceFIMS willincrease awareness among Member States of the role that they can play ina Europe-wide FI PPP and how Member State initiatives and the PPP canbe aligned to the maximum extent possible

ceFIMS-Coordination of the European Future Internet forum of MemberStates-responds to Call 5 from the European Commission for European ex-cellence in Trustworthy ICT In particular the Science and Technology ob-jectives of ceFIMS are highly relevant to Objective ICT-200711 The Net-work of the Future

Results NA

Publications NA

36 Projects and Grants in 2012

Universal Itegration of the Internet of Things through an IPv6-Based Service-oriented Architecture enabling heterogeneouscomponents interoperabilityAcronym IoT6Reference I2R-NET-PEU-11IOT6PI Prof Dr Thomas EngelFunding EC- FP7Budget 266KeBudget UL NADuration 2012-01-01 ndash 2014-12-31

Members T Engel L Ladid

Domain(s) ICT

Partner(s)

bull Mandat international alias fondation pour la cooperation internationale(mi) rdquothe coordinator of the research project iot6

bull Ericsson doo for telecommunications

bull Runmyprocess sas

bull University College London

bull Universidad de murcia

bull Technische Universitaet Wien

bull Haute Ecole Specialisee de Suisse Occidentale

bull Korea Advanced Institute of Science and Technology

Description The UIoT6 project aims at exploiting the potential of IPv6and related standards (6LoWPAN CORE COAP etc) to leverage cur-rent shortcomings of the Internet of Things so that a universally integratedInternet of Things can evolve Its main challenges and objectives are to re-search design and develop an IPv6-based Service Oriented Architecture toachieve multi-protocol integration of heterogenous rdquocommunication thingsrdquoand to research and realize intelligence distribution and smart routing fea-tures within Furthermore transparent and borderless interactions withcloud computing services and applications EPC information service envi-ronments and mobile networks are of main interest The main outcomeof UIoT6 is a well-defined open and distributed IPv6-based Service Ori-ented Architecture that enables interoperability mobility cloud computing

41 Research projects 37

and intelligence distribution among heterogeneous smart things componentsapplications and services

Results NA

Publications NA

Provisioning of urbanregional smart services and businessmodels enabled by the Future InternetAcronym OUTSMARTReference I2R-NET-PEU-11OSMTPI Prof Dr Thomas EngelFunding FP7 European CommissionBudget 257KeBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members T Engel J Francois A Panchenko L Ladid

Domain(s) Internet of Things (IoT) utilities environment ecosystems

Partner(s) Name of the organisations participating in the project (not thepersons) Use small letters list using bullet points specify the country ifnot Luxembourg based

bull France Telecom FR

bull Telefonica Investigacion y Desarrollo SA Unipersonal SP

bull Alcatel-Lucent IT

bull Ericsson RS

bull Engineering Ingegneria Informatica SpA IT

bull ATOS Origin SP

bull Coronis SAS an ELSTER Group Company FR

bull Worldsensing ES

bull CEA-LETI FR

bull University of Luxembourg LU

bull Alexandra Institute DK

bull AMPLEX DK

38 Projects and Grants in 2012

bull Aarhus VAND DK

bull University of Surrey GB

bull AMEY PLC GB

bull FERROVIAL Centro de Innovacion de Infraestructuras InteligentesES

bull Create-NET (Trento RISE) IT

bull Azienda Consorziale Servizi Municipalizzati SpA IT

bull Dolomiti Energia IT

bull Universidad de Cantabria ES

bull Banco de Santander ES

bull Municipality of Santander ES

bull EMCANTA ES

bull EON ESPANA ES

bull TTI Norte ES

bull Fraunhofer-Gesellschaft zur Foerderung der Angewandten Forschungev DE

bull Berliner Stadtreinigungsbetriebe DE

Description The goal of OUTSMART is to contribute to the Future In-ternet (FI) by aiming at the development of five innovation eco-systemsThese eco-systems facilitate the creation of a large variety of pilot servicesand technologies that contribute to optimised supply and access to servicesand resources in urban areas This will contribute to more sustainable utilityprovision and through increased efficiency lower strain on resources and onthe environment Reaching this goal requires the whole value chain namelycity authorities utilities operators ICT companies as well as knowledge in-stitutions in order to have an industry driven approach when developingadvanced services and technologies OUTSMART services and technolo-gies will be based on an open and standardised infrastructure as envisionedby the FI Private Public Partnership (FI PPP) and provided by a serviceframework designed to facilitate provisioning development and access Tothis extend OUTSMART will (1) deliver a set of detailed functional andnon-functional requirements for an FI enabler platform and correspondingbusiness framework able to support the above described eco-systems based

41 Research projects 39

on a deep analysis of the different domain specific use cases in the utility andenvironment application domain (2) provide a specification of the domainspecific enabler functionality with corresponding service interfaces compat-ible and aligned with Core Platform components to be specified alongsidethis project effort (3) provide a realisation of prototypes of domain specificfunctionality for the envisioned eco-system according to the previous spec-ification and a validation thereof in early field trials in the envisioned usecases (4) deliver a business framework specification which serves as blueprint for the foreseen local eco-systems able to provide their sustainabilitybeyond the PPP funding lifetime by creating favourable conditions for localinvestment and innovation and (5) deliver a detailed plan for pilot servicesin the envisioned local eco-systems which act as initial light house showcases for Europe in the utility and environment applications domain

Results The key results of our activity in OUTSMART are

bull Definition and refinement of requirements in particular in terms ofsecurity and privacy

bull Large scale security in distributed environments by developing newmethods for autonomic authentication as well as cloud-computing basedsolutions for attack detection

bull Privacy protection in large scale networks by proposing a novel ap-proach to guarantee the privacy of a service provider and by evaluatingthe degree of protection over encrypted communication

bull Traffic analysis in encrypted network streams We showed that undercertain circumstances cryptography alone is not enough to hide thecontent of communication We also studied countermeasures how tomitigate this attack

bull New methods of path selection that allow performance-improved onionrouting We evaluate the proposed methods in the public networksand present a practical approach to empirically analyze the strengthof anonymity certain methods of path selection provide in comparisonto each other

The 2nd and 3rd items bring the first solutions to the requirements ap-pearing during the first stage These solutions are designed for the FutureInternet context where OUTSMART fits ie with large distributed andheterogeneous environments

This is a long list that enumerates the results obtained until now in LATEXformat

40 Projects and Grants in 2012

bull Fuzzing approaches for IPv6 protocols

bull Game theoretical modeling for fuzzing

bull Flow based monitoring and data mining approaches for large scale flowmonitoring

The key resukts from this project are related to the definition of a threatmodel for autonomic IPv6 networks and its instantiation in the specific caseof GANA architectural paradigm

The major outcomes from this project included a new paradigm for adaptivehoneypots that leverage game theory and reinforcement learning as underly-ing conceptual building blocks for smarter honeypots We have implementedand operated such honeypot and the major publications from this projectare one journal publications accepted for 2011 and another one for [356]

Publications [268 265 270 269] Deliverables D22

[357 359 358 360]

Seamless Communication for Crisis ManagementAcronym SECRICOMReference F1R-CSC-PEU-08SECRPI Prof Dr Thomas EngelFunding EC - FP7 European Commission

ULBudget 12469KeBudget UL NADuration 2008-09-01 ndash 2012-04-30

Members Thomas Engel Aurel Machalek

Domain(s) Emergency services critical infrastructure

Partner(s)

bull QinetiQ Ltd United Kingdom

bull Ardaco as Slovakia

bull Bumar Ltd Poland

bull NEXTEL SA Spain

bull Infineon Technologies AG Germany

41 Research projects 41

bull Institute of Informatics Slovak Academy of Sciences Slovakia

bull Graz University of Technology Austria

bull Smartrends sro Slovakia

bull ITTI Sp z oo Poland

bull British Association of Public Safety Communication Officers UnitedKingdom

bull CEA LETI France

bull Hitachi Europe SAS France

Description SECRICOM is proposed as a collaborative research projectaiming at development of a reference security platform for EU crisis manage-ment operations with two essential ambitions (A) Solve or mitigate prob-lems of contemporary crisis communication infrastructures (Tetra GSMCitizen Band IP) such as poor interoperability of specialized communica-tion means vulnerability against tapping and misuse lack of possibilitiesto recover from failures inability to use alternative data carrier and highdeployment and operational costs (B) Add new smart functions to existingservices which will make the communication more effective and helpful forusers Smart functions will be provided by distributed IT systems based onan agentsrsquo infrastructure Achieving these two project ambitions will allowcreating a pervasive and trusted communication infrastructure fulfilling re-quirements of crisis management users and ready for immediate application

More information httpwwwsecricomeu

Results University of Luxembourg successfully organised and presenteddeveloped crises communication technology of SECRICOM project duringthe NATO CPC seminar and demonstration in Slovakia We did the demon-stration together with Ciwil Protection of Luxembourg The project SE-CRICOM is after first review period marked as rdquoExcellent progress (theproject has fully achieved its objectives and technical goals for the periodor has even exceeded expectations)rdquo

Publications NA

42 Projects and Grants in 2012

Argumentation-Based and Logic-Based Reasoning in Multi-Agent SystemsAcronym ALBRReference F1R-CSC-LAB-05ILIAPI Dr Srdjan VesicFunding ERCIMBudget NABudget UL NADuration 2011-10-01 ndash 2012-09-30

Members Srdjan Vesic

Domain(s) Argumentation Reasoning Logic Multi-Agent Systems

Partner(s) NA

Description The goal of the fellowship is to obtain a better understand-ing of defeasible reasoning about information items in multi-agent contextsand to propose and evaluate specific logic-based approaches for this pur-pose First the link between existing logic-based and argumentation-basedreasoning formalisms is to be studied Then we will develop logics able tosupport deep reasoning about information quality and information handlingbased on incomplete and uncertain background knowledge This is relevantfor modelling information gathering and aggregation eg in e-science or inlegal procedures

Results My main research results during the ERCIM fellowship (Oct 2011to Sept 2012) can be resumed as follows

I studied the link between argumentation-based and non argumentation-based reasoning By argumentation-based approach we refer to a reasoningframework based on construction and evaluation of arguments This line ofresearch is important since it helps to better understand the result obtainedby an argumentation-based approach and to explore its expressive power[109 108]

I participated in the development of an on-line tool for argumentation-baseddecision making The software is still in the beta-testing phase but it canbe accessed online at thesynergyorg [107]

I also worked on a logical language to describe and reason about the beliefsof agents in a multi-agent system where agents have different knowledgemore particularly where every agent is aware of a different set of arguments[114]

Publications [107] [114] [108] [109]

41 Research projects 43

Trust Games Achieving Cooperation in Multi-Agent SystemsAcronym TrustGamesReference 1196394PI Dr Paolo TurriniFunding FNR-FP7 CofundBudget NABudget UL NADuration 2011-09-01 ndash 2013-08-31

Members Paolo Turrini

Domain(s) Game Theory Trust Theory Cooperative Behaviour

Partner(s) NA

Description TrustGames starts from the hypothesis that trust is a socialphenomenon that takes place among decision makers endowed with beliefsand goals and it is seen as a prerequisite for collaborative work (Hardin2004) (Gambetta 2008) (Castelfranchi-Falcone 2010) Up to now the treat-ment of trust in MAS is limited to specific accounts stemming from cog-nitive science (Castelfranchi-Falcone 2010) or from the normative systemsapproach (van der Torre 2010) with no unified formal theory TrustGamesis devoted to an integration of the cognitive and normative accounts of trustwithin the theory of games the discipline that formally models interactivedecision making In particular the fundamental connection between trustand related notions such as dependence and agreements between the stake-holders is intuitively clear but formally not well understood Recent contri-butions (Grossi-Turrini 2010) have shown that dependence and agreementscan be fully incorporated within the theory of games but it abstracts awayfrom cognitive and normative ingredients of trust Concretely TrustGameswill extend the model in (Grossi-Turrini 2010) with the cognitive features of(Castelfranchi-Falcone 2010) and the normative features in (van der Torre2010) in order to model trust in games Thanks to this integration formaltools such as logics to reason about games can be adopted to check whetherdesirable properties are achievable (or undesirable properties are avoidable)in classes of games with trust

Results

The study of cooperation in games The TrustGames project is centeredof the idea of using trust to achieving cooperation in multi-agentsytems Thereby understanding how cooperation is obtained from non-cooperative interaction is of fundamental importance The study has

44 Projects and Grants in 2012

extended and generalized work already carried out during my PhDstudies characterizing the cooperative structures that can arise fromnon-cooperative games

Evaluation in games The TrustGames project is based on a notion oftrust as evaluation of selection of fellow players in interaction TherebyI have directed part of our research effort to the study what it meansfor players to have an evaluation of what it can happen Normallyin games players are assumed to have knowledge of the game thatthey are playing and of the preferences and the possibilities of theiropponents Instead I have shown that when players have a boundedrationality the role of evaluation is crucial

Agreements and norms in games The TrustGames project is also meantto lay a connection between the theory of reciprocity and normativemulti-agent systems in other words to study the normative aspectsof reciprocating someone else trust The last part of this year re-search effort has been devoted to this Building up on the notionof dependence relations studied by Grossi and Turrini on which theTrustGames is based I have constructed a deontic language that couldexpress standard deontic notions (such as obligations prohibitions andpermissions) interpreted in terms of reciprocity

The project results have fully met the original proposal expectations How-ever several novelties have already crop up such as the importance of playersbounded rationality (what I have called ldquoshort sightrdquo) as a precondition fortrust in games

Publications [133] [47] [46] [112]

Wireless traffic Safety network between CarsAcronym WiSafeCarReference NAPI Prof Dr Pascal BouvryFunding EUREKA - CELTICBudget 300000eBudget UL NADuration 2009-07-01 ndash 2012-03-31

Members Pascal Bouvry Gregoire Danoy Yoann Pigne Guillaume-JeanHerbiet Patricia Ruiz

41 Research projects 45

Domain(s) Vehicular Ad Hoc Networks Secure Communications TrafficManagement Accident Warning

Partner(s)

bull Mobisoft Finland

bull Finnish Meteorological Institute Finland

bull VTT Finland

bull Taipale Telematics Finland

bull Sunit Finland

bull Ubridge South Korea

bull CRP Henri Tudor

bull Ubistream Luxembourg

Description WiSafeCar aims to develop an effective service platform andadvanced intelligent wireless traffic safety network between cars and infras-tructure with possibility to exploit vehicle based sensor and observationdata in order to generate secure and reliable intelligent real-time servicesand service platform for vehicles

Results Several works have been pursued in the frame of the developmentof a realistic mobility model of vehicles in Luxembourg VehILux Theparameters of VehILux have been optimized using different metaheuristicsin order to further improve its accuracy and results have been published in[174] In [316] a complementary optimization of VehILux has been proposedin which an iterative algorithm is used ie Gawronrsquos algortihm to betterspread the traffic flow in the road network

The WiSafeCar has ended in March 2012 The final project review has beenheld in Tampere Finland Demonstration of all projects achievements in-cluding the Luxembourgian simulator has been conducted by the consor-tium during a large event covered by Finnish press (newspaper TV)

Publications NA

46 Projects and Grants in 2012

Technology-supported Risk Estimation by Predictive Assess-ment of Socio-technical SecurityAcronym TREsPASSReference FP7 Grant Agreement No 318003PI Prof Dr Sjouke MauwFunding EU FP7Budget 9999824eBudget UL 561320eDuration 2012-11-01 ndash 2016-10-31

Members Sjouke Mauw Barbara Kordy Peter YA Ryan Gabriele Lenzini

Domain(s) Trustworthy ICT

Partner(s) UT the Netherlands DTU Denmark CYB Estonia GMVPPortugal GMVS Spain RHUL UK itrust Luxembourg GUF GermanyIBM Switzerland TUD the Netherlands TUHH Germany AAU DenmarkCHYP UK BD the Netherlands Deloite the Netherlands LUST the Nether-lands

Description Information security threats to organizations have changedcompletely over the last decade due to the complexity and dynamic natureof infrastructures and attacks Successful attacks cost society billions ayear impacting vital services and the economy Examples include StuxNetusing infected USB sticks to sabotage nuclear plants and the DigiNotarattack using fake certificates to spy on website traffic New attacks cleverlyexploit multiple organizational vulnerabilities involving physical securityand human behavior Defenders need to make rapid decisions regardingwhich attacks to block as both infrastructure and attacker knowledge areconstantly evolving Current risk management methods provide descriptivetools for assessing threats by systematic brainstorming In todayrsquos dynamicattack landscape however this process is too slow and exceeds the limits ofhuman imaginative capability Emerging security risks demand an extensionof established methods with an analytical approach to predict prioritizeand prevent complex attacks The TREsPASS project develops quantitativeand organization- specific means to achieve this in complex socio-technicalenvironments The iterative tool-supported framework

bull Represents the structure of complex organizations as socio-technicalsecurity models integrating social and technical viewpoints

bull Predicts socio-technical attacks prioritizes them based on their riskand assesses the aggregated effect of preventive measures

bull Presents results to enable quick understanding and updating of the

41 Research projects 47

current security posture

By integrating European expertise on socio-technical security into a widelyapplicable and standardized framework TREsPASS will reduce security in-cidents in Europe and allow organizations and their customers to makeinformed decisions about security investments This increased resilience ofEuropean businesses both large and small is vital to safeguarding the socialand economic prospects of Europe

All public information about the project can be found at httpwww

trespass-projecteu

TREsPASS is executed jointly by members of SnT and CSC

Results The SaToSS group is contributing to five work packages of theTREsPASS project Socio-technical security model specification (WP1)Quantitative analysis tools (WP3) Visualization process and tools (WP4)Process integration (WP5) and Standardization Dissemination and Ex-ploitation (WP9) Work on all those WPs has been initiated in November2012 at the kick off meeting of TREsPASS which took place at the Univer-sity of Twente in the Netherlands which coordinates the project

A number of initiatives and meetings has been led by BK to contributeto the first phase of the project which concerns identification of necessaryrequirements for model tools ad processes within TREsPASS

bull An initial BYOD case study has been initiated by Barbara Kordy andPatrick Schweitzer (WP1)

bull A survey paper on the state of the art of graphical modeling of at-tack and defenses have been written by Dr Barbara Kordy PatrickSchweitzer and Dr Pietre-Cambacedes from EDF France (WP1) Thepaper will be submitted in early 2013

bull A list of tools for quantitative analysis of security models has beengenerated (WP3)

bull Three meetings have been performed to discuss visualization issues insecurity modeling (WP4)

bull Two interviews concerning auditing methodologies have been carriedout by Barbara Kordy (WP5)

bull A dissemination plan proposed by the leader of WP9 has been ap-proved by UL

Publications NA

48 Projects and Grants in 2012

NESSoS FP7 ProjectNetwork of Excellence on Engineering Se-cure Future Internet Software Services and SystemsAcronym NESSoSReference no budget - participation to the Network of Excel-

lencePI Prof Dr Yves Le TraonFunding noBudget noBudget UL NADuration NA

Members NA

Domain(s) Security Future internet services and system software engi-neering

Partner(s) Core partners Atos SAE Consiglio Nazionale delle RicercheEidgenossische Technische Hochschule Zurich Fundacion IMDEA SoftwareInstitut National de Recherche en Informatique et en Automatique KatholiekeUniversiteit Leuven Ludwig-Maximilians-Universitat Munchen SiemensAG Stiftelsen Sintef University Duisburg-Essen Universidad de MalagaUniversita degli studi di Trento

University of Luxemboug is an associated partner

Description The Network of Excellence on Engineering Secure Future In-ternet Software Services and Systems (NESSoS) aims at constituting and in-tegrating a long lasting research community on engineering secure software-based services and systems

The NESSoS engineering of secure software services is based on the principleof addressing security concerns from the very beginning in system analy-sis and design thus contributing to reduce the amount of system and ser-vice vulnerabilities and enabling the systematic treatment of security needsthrough the engineering process In light of the unique security requirementsthe Future Internet will expose new results will be achieved by means ofan integrated research as to improve the necessary assurance level and toaddress risk and cost during the software development cycle in order to pri-oritize and manage investments NESSoS will integrate the research labs in-volved NESSoS will re-address integrate harmonize and foster the researchactivities in the necessary areas and will increase and spread the researchexcellence NESSoS will also impact training and education activities inEurope to grow a new generation of skilled researchers and practitioners inthe area NESSoS will collaborate with industrial stakeholders to improve

41 Research projects 49

the industry best practices and support a rapid growth of software-basedservice systems in the Future Internet

The research excellence of NESSoS will contribute to increase the trustwor-thiness of the Future Internet by improving the overall security of softwareservices and systems This will support European competitiveness in thisvital area

Results Meetings organisation of the ESSoS 2013 Doctoral Symposium

Publications NA

412 FNR COREINTER Projects

COoperative and COgnitive Architectures for SATellite Net-worksAcronym CO2SATReference 12R-DIR-PFN-10CO2SPI Prof Dr Bjorn OtterstenFunding FNR COREBudget 877KeyearBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members B Ottersten G Zheng S Chatzinotas D Aarapoglou C Xing

Domain(s) Cognitive communication

Partner(s) SES-ASTRA

Description During the last decades the demand for broadband accesshas been ever increasing with various applications in business education andentertainment In this direction satellite systems have the ability to accom-modate this demand providing large-scale coverage even in remote areasHowever in order to compete against other emerging technologies (such asfiber optic and wireless broadband networks) new high-performance satellitearchitectures have to be investigated To this end cooperative and cogni-tive satellite systems can improve both spectral and energy efficiency byexploiting advanced wireless communication techniques Regarding cooper-ative systems the joint processing of beam signals can mitigate inter-beaminterference and lead to better spectrum and power utilization Regardingcognitive systems satellite and terrestrial networks can be employed in par-

50 Projects and Grants in 2012

allel over the same frequency bands in order to provide ubiquitous indoorsand outdoors coverage and at the same time minimize the power consump-tion of the satellite payload The outcome of this investigation will be aninvaluable input to the strateQic planninQ of satellite operators and manu-facturers Based on the derived performance results the key players in thesatellite industry will be able to make informed decisions about the deploy-ment of cooperative and cognitive satellite systems Furthermore satelliteengineers will be able to use the derived insights as guidelines while desiQn-inQ future satellite systems

Results NA

Publications NA

Multi-Sensor Fusion in Mono-View Vision systems Aquisitionand Modeling (FAVE)Acronym CORE FAVEReference 12R-DIR-PFN-11FAVEPI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2011-10-01 ndash 2014-09-31

Members B Ottersten D Aouada K Al Ismaeil

Domain(s) P1 Security Reliability and Trust

Partner(s)

bull IEE

bull Univ de Bourgogne France

Description Video surveillance has become necessary to ensure publicsafety and to secure and protect critical physical infrastructures such asbanks airports and retail stores Current surveillance systems are usuallyrestricted to the deployment of 20 camerasThe effectiveness of these systemsis limited due to 20 cameras sensitivity to illumination and to occlusionswhich inescapably leads to segmentation and tracking failures With the lat-est developments in 30 sensing technologies It is now possible to considercomplementing 20 videos with 3D information in near real time This addi-tion of a third dimension ie depth information ensures a more accuratesensing of the scene We therefore propose to explore fusion approaches to

41 Research projects 51

address the shortfalls of current 20 video surveillance systems Our first ob-jective is to exploit fused data from different sources of visual informationThese include different modalities eg 20 cameras Time-of-Flight rangecameras 30 laser scanners and infrared cameras andor different levels ofabstraction Second after the data acquisition phase we propose to modelthe fused data for an intelligent sensing tailored for real-world security sce-narios In the context of high-level security systems that require a full con-trol over the surveyed area we investigate multi-view 2030 fusion methodsFurthermore for an accurate feature extraction for automatic scene un-derstanding we aim at achieving high resolution space-time depth mapsPrivacy enforcement in digital imaging systems is another important designcomponent that is today impossible to ignore in view of the boiling debateabout privacy violation An interdisciplinary effort will hence be undertakenfor the definition and design of privacy-aware imaging systems

Results NA

Publications NA

Logical Approaches for Analyising Market IrrationalityAcronym LAAMIReference 12R-DIR-PFN-10LAAMPI Prof Dr Bjorn OtterstenFunding FNRBudget 284KeBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members B Ottersten T Neugebauer M Caminada

Domain(s) P1 Security Reliability and Trust

Partner(s) NA

Description The aim of the LAAMI project is to apply techniques de-veloped in the field of Artificial Intelligence to help explaining apparentirrational forms of market behavior as is evidenced by for instance bubblesand crashes The aim is to explain these using formal theories of individualand collective reasoning as they for instance have been developed in the fieldof computational argumentation The aim is not so much to solve irrationalmarket behavior but first and foremost to understand it Our research isaimed at constructing a formal model that is sufficiently rich in order to beaccepted as a realistic model yet sufficiently formal in order to be examinedfor its formal properties and implemented in a software simulator Using

52 Projects and Grants in 2012

the results of the theory development we aim to be able to shed light on theconditions under which irrational forms of market behavior are most likelyto occur

Results NA

Publications NA

Mobility Optimization Using VEhicular Network TechnologiesAcronym MoveReference I2R-DIR-PFN-10MOVEPI Prof Dr Thomas EngelFunding FNR ProjectBudget 1127keBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members Thomas Engel Raphael Frank Andriy Panchenko JeromeFrancois Markus Forster Maximilien Mouton Lautaro Dolberg

Domain(s) vehicluar networks network security vehicular flow optimiza-tion

Partner(s)

bull University of California Los Angeles (UCLA) USA

Description The world is urbanizing rapidly As a consequence trafficcongestion in metropolitan areas has significantly increased over the lasttwo decades Although there has been significant innovation in cars safetysystems and fuel efficiency traffic congestion remains one of the modern illsof our society In most cases existing road infrastructure cannot easily be ex-tended to meet increasing traffic demand As a consequence commuters areoften stuck for hours in traffic chaos causing significant economic damageNew intelligent transportation systems (ITS) are currently being developedto increase traffic efficiency The main idea is to maximize the use of theexisting road infrastructure using smart navigation systems that are awareof the current traffic conditions Communication technologies will play animportant role in the design of such systems In the near future vehicleswill be equipped with communications devices that allow data exchange be-tween cars and Road Side Units (RSUs) Such a vehicular ad hoc network(VANET) can be used to collect and distribute traffic metrics among nearbycars and RSUs and provide advanced navigation services The aim of thisproject is to study and understand vehicular flow characteristics and propose

41 Research projects 53

new schemes using wireless communications technologies to reduce vehicu-lar traffic congestion enhance safety and at the same time reduce emissionsIn this relatively new research area there are multiple challenges As afirst step we will investigate how and where traffic information (eg speeddestination and local traffic density) can efficiently be retrieved from vehi-cles Network planning and management need to be carefully studied inorder to provide the required quality of service Adapted routing and dis-semination protocols that are able to cope with the changing dynamics ofvehicular traffic need to be specified Traffic Coordination Points (TCPs)will be responsible for collecting and evaluating traffic metrics for a givenarea This information will help to predict how the traffic will evolve in thenear future In this way the TCPs can suggest via the vehicular networkindividual routes avoiding traffic jams and thus shorten the travel time Inaddition to advanced route planning services this information can be usedto dynamically adapt the timings of local traffic lights to maximize vehicu-lar throughput A realistic simulation environment will be implemented in afirst phase to evaluate the performance of the proposed system under a va-riety of traffic scenarios A practical prototype will be validated under realtraffic conditions in Luxembourg City using the existing rsquoHot Cityrsquo meshas its infrastructure network Additional tests are foreseen at the UCLAcampus which provides a flexible testbed (up to 200 cars) to validate andtest new communication protocols

Results

bull Development of an analysis tool to evalute communications routes inVANET

bull Implementation of a traffic sensing application for mobile devices

bull Publication of new simulation and emulation tools for high fidelityVANET evaluation

bull Specification of a vehicle coordination scheme to increase vehiculartroughput on highways

bull Lightweight methods for confidentiality in data communication

bull Path selection metrics for performance improved onion routing

bull Lightweight hidden services

bull Traffic analysis in encrypted connections

bull Countermeasures against traffic analysis in encrypted connections

54 Projects and Grants in 2012

We proposed and evaluated a novel approach how to provide network serviceswhile protecting privacy and identity of the service provider [344] Thetechnology can be directly applied in the scope of the MOVE project asprivacy protection is an important fact for the acceptance of the results of theproject by the public We also studied the possibilities of traffic analysis inencrypted network streams It was shown that under certain circumstancescryptography alone is not enough to hide the content of communication Wealso studied countermeasures how to mitigate this attack Our findings areof vital importance as communication in MOVE should protect the data intransit and respect privacy of the involved individuals

Practical usage of methods for confidential communication often leads todelays that are not tolerated by the average end-user which in return dis-courages many of them from using the system In [342 343] we propose newmethods of path selection that allow performance-improved onion routingThese are based on actively measured latencies and estimations of availablelink-wise capacities using passive observations of throughput [331] We eval-uate the proposed methods in the public networks and present a practicalapproach to empirically analyze the strength of anonymity certain methodsof path selection provide in comparison to each other

Regarding the distributed and large scale context of vehicular networks theinvestigation of huge volume of captured network traffic data has been pro-posed by leveraging cloud computing and in particular in the context ofsecurity monitoring [345] As a node in a vehicular network may act as au-tonomous entity and so be easily in contact with malicious ones automaticfingerprinting methods have been proposed in [346] to enhance authentica-tion and to monitor bad behaviors

Publications Publications in 2011 6 peer-reviewed conferences [304 272265 268 270 269]

Security GamesAcronym SndashGAMESReference C08IS03PI Prof Dr Leon van der TorreFunding FNR-COREBudget 314000eBudget UL 314000eDuration 2009-04-01 ndash 2012-03-31

Members L van der Torre S Mauw W Jamroga M Melissen

41 Research projects 55

Domain(s) Game theory Security protocols Non-zero sum games Imper-fect information games Attackndashdefense analysis

Partner(s)

bull GAMES Network

Description Information security is not a static black-and-white systemfeature Rather it is a dynamic balance between a service provider tryingto keep his system secure and an adversary trying to penetrate or abusethe service Such interplay can be considered as a game between the adver-sary and the service provider and the field of game theory provides methodsand tools to analyse such interactions Games for verification and designhave been studied in computer science for the last ten years This funda-mental research into extending and complementing traditional verificationapproaches from formal methods with game theoretic reasoning is pavingthe way for more effective verification tools These developments are ofparticular interest to the field of security in which formal verification hasalways played an important role The purpose of the project is to study howthese new developments can be used to strengthen current analysis and ver-ification techniques in information security The project has two main linesof research 1) A study of the use of game-theoretic methods in the field ofsecurity resulting in requirements on game-theoretic methods for security2) The development of novel verification methods based on the combineduse of formal verification techniques and a game theoretic approach and itsapplication to the field of security For the first line two areas in securityare selected for which the application of these techniques seems particularlypromising fair exchange protocols and attackndashdefense analysis The secondline focuses on the interplay of finite and infinite games mathematical logicand automata theory in particular on analysis techniques for infinite-statesystems linear-time model checking and game models for protocols TheSndashGAMES project is a joint project of the SaToSS group and the ICR groupof Prof Dr Leon van der Torre

Results The S-GAMES project ended in 2012 Most project goals havebeen achieved The project produced a number of important results thatcan be used to analyze information security in game-like scenarios Someof the results have already been significantly cited by other researchers InLuxembourg the effectivity functions methodology is being currently usedin the AFR TrustGames project Moreover effectivity models as well aslogic-based techniques for incomplete information games developed withinthe project are also prominently featured in the FNRDGFndashINTER GaLoTproject (accepted to begin 1022013) Last but not least our results havegenerated interest among more practically-oriented research groups in par-ticular the team behind the VERICS model checker at the Polish Academy

56 Projects and Grants in 2012

of Sciences in Warsaw

The main results obtained in 2012 are as follows

bull We showed how the semantics of strategic logic ATL can be defined interms of abstract models so called coalitional effectivity functions [134]

bull Continuing studies on logic-based specification we developed a com-bination of alternating-time temporal logic ATL and description logicALCO and showed how the resulting language can be used to writelong-term security specifications [130] We showed that while thesatisfiability problem appears to be undecidable model checking istractable We also defined a variant of realizability that combinesmodel checking of the temporal frame with satisfiability of the termi-nological interpretation and showed that the new problem is decidable

bull We used strategic logics like ATL to study fairness in non-repudiationprotocols [315] We showed that existing specifications of fairness forma natural taxonomy of weaker and stronger variants We also arguedthat none of the specifications works correctly in the context of imper-fect information and we proposed our own notion as a remedy

bull We continued our studies on the relationship between models of coali-tional power coming from cooperative game theory and standard gamemodels from non-cooperative game theory In a follow-up to our pre-vious work [291] we showed how the concept and characterization canbe extended to games over infinite time horizon typical in modelingof computational systems [134]

Publications The project resulted in the following publications in 2012[134] [130] [315] [291]

The Dynamics of ArgumentationAcronym DYNARGReference F1R-CSC-PFN-09DYNARPI Prof Dr Leon van der TorreFunding FNR-INTERCNRSBudget NABudget UL NADuration 2009-10-01 ndash 2012-09-31

Members Richard Booth Tjitze Rienstra Martin Caminada Emil Wey-dert

41 Research projects 57

Domain(s) Argumentation theory Belief dynamics Multi-agent systems

Partner(s) Universite drsquoArtois Lens France (Dr Souhila Kaci)

Description Artificial Intelligence is a science that aims to implementhuman intelligence For this purpose it studies the behaviour of rationalagents Pertinent information may however be insufficient or there may betoo much relevant but partially incoherent information Different theorieshave been proposed for decision-making in these contexts In particular thegrowing development of multi-agent systems requires the handling of collec-tive decisions and of information coming from different sources Moreoverin multi-agent systems agents need to interact in order to inform convinceand negotiate with other agents Argumentation theory is a suitable theoryto support such interactions In this project we will create an abstract the-ory of dynamic argumentation in which argumentsconflict relations can beaddedremoved We will also investigate the aggregation of argumentationframeworks to model the interaction among arguing agents To this end wewill eg develop new notions of distance between argument graph labelingsin order to define when an agent position can be said to beldquoclose tordquoorldquofarrdquofrom that of another Finally we plan to apply the dynamic argumentationtheory to dialogue between agents We want to study these problems bothfrom within abstract argumentation frameworks in which the focus is onhow arguments interact with each other without specifying the actual formof the arguments as well as using more concrete representations of what anargument consists of (eg a number of explicit possibly defeasible ldquorulesrdquosupporting a ldquoconclusionrdquo)

Results

bull In [156] we proposed a number of intuitive measures of distance be-tween two sets of evaluations over a set of arguments and showed thatthey fail to satisfy basic desirable postulates Then we proposed ameasure that satisfies them all Our results inform the design of pro-cedures for revising onersquos position in order to reach agreement withothers or to conduct minimal revision to incorporate new evidence

bull Dung-style abstract argumentation assumes full awareness of the ar-guments relevant to the evaluation However this is generally not arealistic assumption Moreover argumentation frameworks have ex-planatory power which allows us to reason abductively or counter-factually but this is lost under the usual semantics To recover thisaspect in [159] we generalised conventional acceptance and presentedthe concept of a conditional acceptance function We also provided amodal-logical framework for reasoning about argument awareness in[114]

58 Projects and Grants in 2012

bull In [31] we introduced a new model for belief dynamics where beliefstates are ranking measures and informational inputs are finite setsof parametrized conditionals interpreted by ranking constraints Theapproach generalises ranking construction strategies developed for de-fault reasoning

bull In [115] we generalised the ASPIC argumentation system so that eachinference rule can be associated with a probability that expresses un-certainty about whether the rule is active The uncertainty about rulescarries over to uncertainty about whether or not a particular argumentis active The usual Dung-style abstract argumentation semantics wasgeneralised in order to deal with this uncertainty

Publications [156] [159] [114] [31] Weydert9861

Management Regulatory ComplianceAcronym MaRCoReference I2R-DIR-BPI-11KELSPI Prof Dr Pierre KelsenFunding FNR-COREBudget NABudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Pierre Kelsen Leon van der Torre Qin Ma Marwane ElKhar-bili Silvano Colombo Tosatto

Domain(s) Business process compliance

Partner(s) Guido Governatori NICTA Queensland Research Laboratory

Description The processes that underpin the businesses of our everydaylives are governed by regulations of ever growing complexity In this contextit is important

ndash to be able to describe these complex regulations rigorously precisely andunambiguouslyndash that business practitioners are actually able to specify both regulationsand business processesndash to be able to check in an automated way that business processes complywith their underlying regulations

MaRCo proposes to tackle these three issues On one hand MaRCo improves

41 Research projects 59

existing approaches to formally describe (or model) norms On the otherhand MaRCo makes this practical and usable by practitioners in such away that the mathematical based formalisms involved in norm specificationdo not constitute a barrier to practitioners that know the business domainbut not the underlying mathematical formalism being used and so MaRCoproposes a visual-based approach to norm specification Finally MaRCochecks the compliance of business processes against the norms that governthem in order to be able to detect in an automated way business processesthat violate their underlying regulations

MaRCo aims at creating added value for service-related industries (eg inthe banking sector) by making the specification of business processes andnorms rigorous and precise yet accessible to domain experts and enablingan automated approach to compliance checking This should provide meansto ensure that services are aligned with their underlying local and interna-tional regulations With the growing need for regulatory compliance thiswill strengthen the expertise in service science in Luxembourg

See also httpmarcogforgeunilu

Results CoReL Policy-Based and Model-Driven Regulatory ComplianceManagement Marwane El Kharbili Qin Ma Pierre Kelsen and Elke Pul-vermueller In Proc of the 15th IEEE International Enterprise DistributedObject Computing Conference (EDOC 2011) IEEE Computer Society 2011

Publications 1 conference publication [314]

Multi-Objective Metaheuristics for Energy-Aware Scheduling inCloud Computing SystemsAcronym GreenCloudReference NAPI Prof Dr Pascal BouvryFunding FNR University of LuxembourgBudget 1088440Budget UL NADuration 2012-07-01 ndash 2015-06-30

Members Alexandru-Adrian Tantar Sebastien Varrette Gregoire Danoy

Domain(s) NA

Partner(s) University of Lille

Description The project GreenCloud aims at developing an energy-aware scheduling framework able to reduce the energy needed for high-

60 Projects and Grants in 2012

performance computing and networking operations in large-scale distributedsystems (data centers clouds grids) With the advent of new petaflopsdata centers and the next-generation Internet (rdquoInternet of Thingsrdquo rdquoHigh-Performance Internetrdquo) energy consumption is becoming a major challengefor the IT world To build up this new energy-aware scheduling frameworkthe project GreenCloud will first develop multi-criteria mathematical op-timization models (eg makespan energy robustness) and then designmulti-objective optimization methods to solve the problem These tech-niques along with statistical and machine learning components will be usedto provide autonomous fault-tolerant and robust scheduling paradigms forvirtual machines running inside a dynamic environment A series of time-varying deterministic and stochastic factors will be considered as part of theenvironment eg renewable energy supply computational demand or activ-ity of users Experimentation and validation will be carried on a real test bedusing large-scale equipments (eg Gridrsquo5000) while relying on distributedscenarios

Results Accepted project with a start date in November 2012 A firstmeeting of the involved members was held in December

Publications NA

EnerGy-efficient REsourcE AllocatioN in AutonomIc CloudCompuTingAcronym GreenITReference F1R-CSC-PFN-08IS21PI Prof Dr Pascal BouvryFunding FNR-COREBudget 432000eBudget UL NADuration 2010-01-01 ndash 2012-12-31

Members Pascal Bouvry Samee U Khan Thomas Engel Zdislaw Zucha-necki Johnatan Pecero Beranbe Dorronsoro Marcin Seredynski GregoireDanoy Sebastien Varrette Alexandru-Adrian Tantar Dzmitry KliazovichRadha Thanga Raj Frederic Pinel Cesar Diaz

Domain(s) Energy-efficiency resource management heterogeneous com-puting multi-objective optimization multi-agent systems parallel and dis-tributed computing telecommunication networks cloud computing

Partner(s)

41 Research projects 61

bull North Dakota University USA

bull LuxConnect

Description The project GreenIT aims to provide a holistic autonomicenergy-efficient solution to manage provision and administer the variousresources of Cloud-Computing (CC) dataHPC centers

The main research challenges that will be tackled to achieve the holisticapproach are

bull Development of a multi-objective mathematical meta-model CC is acomplex system of numerous pervasive devices that request servicesover heterogeneous network infrastructures from a data center that isenergy gobbler Because each computing entityrsquos performance is de-fined uniquely we must develop a multi-objective meta-model that canadequately define a unified and performance metric of the whole sys-tem The multiple constraints and objectives dealing with the qualityof service (QoS) cost and environment impact must be formulated andtheir relationship analyzed

bull Develop resource management and optimization methodologies Withseveral possible objectives and constraints the meta-models must re-sult in multi-objective multi-constraint optimization problems (MOP)Green-ICT will develop refine and evolve solutions for MOP that willprimarily be based on metaheuristics (eg multi-objective evolution-ary algorithms multi-objective local search hybrid metaheuristics)

bull Develop autonomic resource management The anytime anywhere slo-gan only will be effective when an autonomic management of resourcescan be achieved The resource allocation methodologies developedmust go further refinement such that the system at hand is self- heal-ing repairing and optimizing In particular it is our intention toutilize multi-agent systems (MAS) that can learn to adapt (machinelearning methodologies) and gracefully evolve to adapt (evolutionarygame theoretical methodologies)

Results For the computational aspects (WP1) contributions in the fol-lowing domains have been proposed in 2011

bull Energy-aware scheduling algorithms Different problems related to theschedule of tasks on Grids targeting energy efficient solutions in differ-ent aspects are defined In [285] we solve the problem of energy-awarescheduling for dependent tasks on Grids Then we consider a simi-lar problem but minimizing the energy required for communicationsin [305]

62 Projects and Grants in 2012

bull Robust-aware scheduling algorithms The problem analyzed here is tofind highly efficient schedules for allocating tasks on Grids but withthe additional characteristic that they are as robust as possible againstchanges in the predicted time to accomplish the scheduled tasks Themore robust the schedule is the less important will be the influenceof these changes on the final makespan (ie time when the latest jobis finished) Different highly efficient and accurate parallel coevolu-tionary multi-objective algorithms (with highly super-linear speed-up)have been proposed for this project [287 300]

bull Development of new efficient general-purpose optimization algorithmsIn addition to the previously described problems some work target-ing the design of new efficient algorithms was done In particular weare interested on enhancing well-known algorithms and reducing theirparameters [283] proposes the use of new adaptive neighborhoodsfor cellular genetic algorithms (cGAs) improving their performanceand reducing the neighborhood to use a very important parameter ofcGAs In [286] the use of a new class of algorithms with small worldtopologies for the population is proposed showing highly accurate re-sults and high efficiency compared to a canonical cGA with the sameparameters Later we compare many different topologies for differ-ential evolution algorithms in [299] and we propose a new efficientoperator for this kind of algorithms too In [311] we propose the useof cellular populations for differential evolution algorithms showingthat it enhances the behavior of the several state of the art algorithmstested

bull Validation of the algorithms on other complex real-world problems asthe optimization of energy-aware broadcasting algorithms for mobilead-hoc networks [307 284] or the configuration of the Cassini space-craft trajectory [298] outperforming in this latter case the state of theart

Volunteer-based systems have also been studied in the second semester of2011 We have been developing an optimization tool based on such sys-tems and evolutionary algorithms metaheuristics The following enumera-tion points out the main results obtained until now

bull Validation of a Peer-to-Peer Evolutionary Algorithm [336] Acceptedfor publication in Evostar 2012

bull Characterizing Fault-tolerance in Evolutionary Algorithms [337] Ac-cepted for publication during 2012

41 Research projects 63

For the communication aspects (WP3) the GreenCloud network simulatordevelopment has been continued

Several works of editorship and organization of new events have been also un-dertaken that will ensure additional impact in the following years includingeditorship of the book entitled rdquoIntelligent Decision Systems in Large-ScaleDistributed Environments [282] published by Springer)

Two websites contain the project informationhttpgreenitgforgeunilu and httpsgforgeuniluprojectsgreencloudto provide access to the energy efficiency simulator for distributed data cen-ters developed in the framework of the GreenIT project

Publications NA

Socio-Technical Analysis of Security and TrustAcronym STASTReference C11IS1183245PI Prof Dr Peter YA RyanFunding FNR COREBudget 765864eBudget UL 765864eDuration 2012-05-01 ndash 2015-04-30

Members Peter YA Ryan Sjouke Mauw Gabriele Lenzini VincentKoenig Ana Ferreira Jean-Louis Huynen

Domain(s) security analysis human factor security protocols

Partner(s) University of Catania Royal Holloway University LondonNewcastle University University College London Norwegian University ofScience and Technology

Description Over the last 20-30 years the security community has mademajor strides in the design and (semi-automated) analysis of security pro-tocols Nevertheless security critical systems continue to be successfullyattacked There appear to be two main explanations of this situation (1)the implementation of the protocol designs introduce flaws that are notpresent at the design level and (2) attackers target and exploit the usuallymore vulnerable non- technical aspects of the system

Information security systems are typically complex socio-technical systemsand the role of humans in either maintaining or undermining security is cru-

64 Projects and Grants in 2012

cial Often system designers fail to take proper account of human charac-teristics resulting in vulnerabilities at the interface between the humans andthe purely technical components Attackers often target such vulnerabilitiesrather than attempt to break the technical security mechanisms Despitethis the socio-technical aspects of security have been largely neglected bythe information security community

Addressing these socio-technical aspects is very challenging and highly inter-disciplinary This project focuses on this most urgent and critical aspect ofsecurity It will build on the existing knowledge expertise and tools for theanalysis of security protocols but extend and enrich it to capture the humanand social dimension

Key elements of our approach are

bull To enrich existing models to encompass the role of the users and en-hanced attacker models

bull To develop tools and methodologies to analyze system designs againstthese enriched models

STAST is executed jointly by members of SnT and CSC

Results Selection of the PhD candidate who will be working on theSTAST project within the SaToSS group has started in 2012 We haveinterviewed a number of candidates and we hope to fill the position in early2013

Publications NA

Attack TreesAcronym ATREESReference C08IS26PI Prof Dr Sjouke MauwFunding FNR-COREBudget 299000eBudget UL 299000eDuration 2009-04-01 ndash 2012-03-31

Members Sjouke Mauw Barbara Kordy Patrick Schweitzer Sasa Radomirovic

Domain(s) security attackndashdefense trees security assessment formal meth-ods

Partner(s)

41 Research projects 65

bull Telindus Luxembourg

bull Sintef Norway

bull TXT e-solutions Italy

bull Cybernetica Estonia

bull EDF France

bull Lucerne University of Applied Sciences and Arts Switzerland

bull THALES Research amp Technology France

Description Security assessment of systems is a standard but subopti-mal procedure due to its informal nature While a formal approach wouldbe desirable but out of reach a systematic approach would be beneficialand feasible Attack trees are a wellndashknown methodology to describe thepossible security weaknesses of a system An attack tree basically consistsof a description of an attackerrsquos goals and their refinement into sub-goalsWe believe that attack trees provide an ideal systematic approach for se-curity assessment The objective of this project is to extend attack treeswith defensive measures Consequently the attackndashdefense tree method-ology will be developed and formalized in order to provide a systematicfullyndashfledged and practical security assessment tool The project benefitsfrom our contacts with several industrial and academic partners with whomwe conduct case studies More information can be found on the project webpage httpsatossuniluprojectsatrees

Results In 2012 the ATREES project resulted in following output

bull An article published in the Journal of Logic and Computation de-scribing the attackndashdefense tree methodology developed within theATREES project [258]

bull A presentation and publication of an article describing how to quan-titatively analyze attackndashdefense trees in practice

bull A publication of a journal article describing the case study performedin 2011 [254]

bull A publication of the conference article [355] about computational as-pects of attackndashdefense trees

bull Development of the ADTool a software tool supporting creation andquantitative analysis of attackndashdefense trees The ADTool is availableat httpsatossuniluprojectsatreesadtool

66 Projects and Grants in 2012

The results of the project were presented in six research talks and invitedlectures given at NTNU in Norway Sintef in Norway RHUL in UK LORIAin France THALES in France and ICISCrsquo12 conference in Korea as well asin one internal SRM presentation

The collaboration with related projects have also been initiated Currentlywe perform two case studies using the attackndashdefense tree methodology oneabout an analysis of an e-voting system (in collaboration with the CORESeRTVS project lead by Prof Ryan) and one on BYOD issues (in collabo-ration with the CORE CoPAINS project led by Prof Le Traon) We haveinitiated a collaboration on attack trees between the University of Luxem-bourg and THALES Research amp Technology in France

The methodologies developed and results obtained within the ATREESproject will serve as input for the FP7 EU project TREsPASS and theCORE project STAST

Publications The project resulted in following publications in 2012 [258][254] [355]

Cryptography and Information Security in the Real WorldAcronym CRYPTOSECReference F1R-CSC-PFN-09IS04PI Dr Jean-Sebastien CoronFunding FNR-COREBudget 272000eBudget UL NADuration 2010-10-01 ndash 2013-09-30

Members NA

Domain(s) Cryptography Information Security Side-Channel Attacks

Partner(s) NA

Description Cryptography is only one component of information securitybut it is a crucial component Without cryptography it would be impossi-ble to establish secure communications between users over insecure networkslike the internet In particular public-key cryptography (invented by Diffieand Hellmann in 1974) enables to establish secure communications betweenusers who have never met physically before One can argue that compa-nies like E-Bay or Amazon could not exist without public-key cryptographySince 30 years the theory of cryptography has developed considerably How-ever cryptography is not only a theoretical science namely at some point

41 Research projects 67

the cryptographic algorithms must be implemented on physical devices likePCs smart-cards or RFIDs Then problems arise in general smart-cardsand RFIDs have limited computing power and leak information throughpower consumption and electro-magnetic radiations A cryptographic al-gorithm which is perfectly secure in theory can be completely insecure inpractice if improperly implemented Therefore the aim of this proposal isto take into account every aspect of the implementation of secure systemsin the real world from the mathematical algorithms to the cryptographicprotocols and from the cryptographic protocols to their implementation inthe real world This allows creating a bridge between theoretical research incryptography on the one side and its applications and the end users of thenew technology on the other side When dealing with cryptographic pro-tocols we will work in the framework of provable security every securitygoal will be clearly defined and every new cryptographic scheme or protocolshould have a proof that the corresponding security goal is achieved basedon some well defined computational hardness assumption When dealingwith cryptographic implementations we will try to cover all known side-channel attacks timing attacks power attacks cache attack etc

Results Due to administrative reasons the actual start of the project ispostponed to the first half of 2011

Publications NA

Secure Reliable and Trustworthy Voting SystemsAcronym SeRTVSReference I2R-DIR-PFN-09IS06PI Prof Dr Peter RyanFunding FNR-Core 333000e FNR-AFR 216216e IMT

Luca 130000e University of Melbourne 60000eUL 268596e

Budget NABudget UL NADuration 2010-02-01 ndash 2013-02-01

Members NA

Domain(s) Electronic voting

Partner(s) University of Surrey (UK) University of Birmingham (UK)IMT - Institute for Advanced Studies Lucca (Italy) University of Melbourne(Australia)

Description Ensuring that the outcome of an election is demonstrably

68 Projects and Grants in 2012

correct while maintaining ballot privacy and minimising the dependence onelection officials has been a challenge since the dawn of democracy For overa century the US has experimented with various technologies to try to makevoting easier and more secure All of these have proved problematic mostnotably the more recent use of touch screen machines The danger here isthat the outcome is critically dependent on the correct execution of the coderunning on the voting devices

Recent research has explored the use of modern cryptography to address thischallenge Significant advances have been made in particular advancing thenotion of ldquovoter-verifiabilityrdquo allowing voters to confirm that their voteis accurately counted while avoiding threats of vote buying or coercionNotable amongst such schemes is the Pret a Voter system proposed bythe PI in 2004 and subsequently developed to make it more usable secureand flexible The Pret a Voter approach is widely regarded as one of themost secure and useable of such schemes and is arguably the most promisingin terms of providing a practical scheme for real-world use

Despite the successes achieved in this field the issues of robustness andtrustworthiness remain open Verification procedures are a part of mostproposed systems intended to offer trust However systems universallylack procedures in case the verification finds errors and the complexity ofthe verification procedures often undermines trust instead of bolstering it

The aim of the SeRTVS project is to develop and evaluate designs for prac-tical secure and trustworthy voting systems Such schemes should yielda demonstrably correct outcome of the election while guaranteeing ballotprivacy Furthermore such systems must be sufficiently simple to use andunderstandable as to gain widespread acceptance by voters and other stake-holders The starting point will be the existing Pret a Voter and PrettyGood Democracy schemes Vulnerability or deficiencies identified duringthe evaluation will be addressed by enhancements to the scheme

To date very little has been done to investigate robust recovery mechanismsfor voting systems The project will develop effective recovery mechanismsand strategies The project will also investigate the issues of public percep-tion and trust of verifiable systems It is not enough for the system to betrustworthy it must also be universally perceived as trustworthy A goaltherefore is to measure and advance public understanding and trust in suchschemes

Results In the course of the project Dr Gabriele Lenzini was recruited asa post-doctoral researcher to start in February 2011 The project staged theInternational Summer School on Secure Voting (SECVOTE 2010) in Berti-noro (Italy) jointly with the TVS project Research results were publishedin the proceedings of ESORICS 2010 [353] and INDOCRYPT 2010 [354]

41 Research projects 69

Publications NA

Conviviality and Privacy in Ambient Intelligence SystemsAcronym CoPainsReference NAPI Prof Dr Yves Le TraonFunding FNRBudget 4Budget UL 486000Duration 2012-01-01 ndash 2013-12-31

Members Patrice Caire Yehia El Rakaiby Assaad Moawad

Domain(s) Security and Privacy defeasible logic AAL conviviality soft-ware engineering

Partner(s) Hot City

Description Ambient Intelligence constitutes a new paradigm for the in-teractions among intelligent devices and smart objects acting on behalf ofhumans The ultimate goal of Ambient Intelligence systems is to transformour living and working environments into intelligent spaces able to adapt tochanges in context and to users social needs Such systems must have thecapability of interpreting their contexts Moreover the open nature of Ambi-ent Intelligence systems and the unnoticeable ways in which various sensorsmay access users personal data make two seemingly antagonistic require-ments preserve users privacy and facilitate convivial interactions amonghumans and devices The concept of conviviality has recently been intro-duced as a social science concept for Ambient Intelligence to highlight softqualitative requirements like user friendliness of systems To make AmbientIntelligent systems desirable for humans they must be convivial and privateie fulfil both their need for social interactions making communication andcooperation among participants easier while also preserving the privacy ofeach individual Hence the need for trade-offs between being private andconvivial intuitively the former keeping information to a small circle of in-siders while the later shares it with all The aims are to enable knowledgesharing for the collective achievement of common objectives among enti-ties through coalition formation while at the same time respecting eachentityrsquos privacy needs Hence the CoPAInS project is about designing anddeveloping models of interaction among intelligent devices it is also abouttheir corresponding methods The main goal of CoPAInS is to facilitateprivacy and conviviality in Ambient Intelligence and to provide tools forit To achieve our objective first we develop a formal framework for con-

70 Projects and Grants in 2012

text representation privacy and conviviality using methods of KnowledgeRepresentation and Reasoning Second we validate and verif y privacy andconviviality properties of Ambient Intelligence systems using model-checkingtechniques We then simulate and test use cases from the field of AmbientAssisted Living Third to demonstrate the feasibility of our approach andits usefulness to support Luxembourg citizens everyday activities we applythe gained expertise to use cases provided by Hotcity Finally we produceguidelines to assist system designers in the development of privacyaware andconvivial assistive systems

Results Development of the IoT lab in SnT

Publications [210 209 140 245 152 139]

e-Training Education Assessment and Communication Centerfor Headache DisordersAcronym E-TEACCHReference F1R-CSC-PFN-10ETEAPI Prof Dr Denis ZampunierisFunding FNR-COREBudget NABudget UL NADuration 2011-05-01 ndash 2014-04-30

Members Sergio Dias Andrea Teuchert Denis Zampunieris

Domain(s) public health disease-management headache e-learning mu-timedia

Partner(s) CRP Sante

Description Headache including migraine is a common and disablingneurobiological disorder which is under-recognized under-treated commonlymismanaged and it imposes a substantial health burden with a major im-pact on both quality of life and the economy Migraine alone the mostprevalent neurological brain disorder is more prevalent than asthma di-abetes and epilepsy combined According to WHO the burden weight ofmigraine is higher than that of epilepsy multiple sclerosis and ParkinsonasdiseaseEffective treatments exist but general practitionersrsquo misdiagnosisand mismanagement of headache disorders easy access to various over thecounter drugs have led to a high rate of self-medication Long-term sideeffects increase of secondary headaches and dependency are the major prob-lems Health care failure has its roots in education failure at every level inEurope and in the resulting and widespread lack of understanding With

41 Research projects 71

E-TEACCH the CRP-Sante and the University of Luxembourg will buildan innovative demonstrational electronic multilingual Training EducationAssessment and Communication Center on Headache with easy-to-use in-teractive modular and extensible content for different target groups (pa-tients doctors pharmacists) The two Luxembourg centers represent anideal combination technical professionals experienced pedagogic e-learningand Headache teams with established support of international and Euro-pean scientific and lay organizations international interdisciplinary expertsas well as the WHO campaign aLifting the burdena E-TEACCH will im-prove headache disorder screening diagnosis disease-management preven-tion treatment adherence and in doing so allow headache sufferers a betterquality of life reduce socio-economic costs chronification and comorbidityE-TEACCH will offer latest headache disorder scientific news webinarsscreening tools diagnostic aids treatment control and communication sup-port disability measurements disease-management guidelines video basedcase studies and accredited knowledge assessment tests

Results NA

Publications NA

Managing Regulatory Compliance a Business-Centred Ap-proachAcronym MaRCoReference I2R-DIR-PFN-09IS01PI Prof Dr Pierre KelsenFunding FNR-COREBudget 749K eBudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Pierre Kelsen Qin Ma Marwane El Kharbili Christian GlodtLeon van der Torre Silvano Colombo Tosatto

Domain(s) Compliance Management Business Process Management Pol-icy Management Normative Systems Enterprise Models Model-Driven En-gineering (MDE) Visual Languages Formal Methods

Partner(s)

bull NICTA Queensland Research Laboratory Australia

bull University of Osnabrueck Germany

72 Projects and Grants in 2012

Description The processes that underpin the businesses of our everydaylives are governed by regulations of ever growing complexity In this con-text it is important (a) to be able to describe these complex regulationsrigorously precisely and unambiguously (b) that business practitioners areactually able to specify both regulations and business processes and (c) tobe able to check in an automated way that business processes comply withtheir underlying regulations This project proposes to tackle these threeissues On one hand we want to improve existing approaches to formallydescribe (or model) norms On the other hand we would like to make thispractical and usable by practitioners in such a way that the mathematicalbased formalisms involved in norm specification do not constitute a bar-rier to practitioners that know the business domain but not the underlyingmathematical formalism being used and so we propose a visual-based ap-proach to norm specification Finally we intend to check the compliance ofbusiness processes against the norms that govern them in order to be able todetect in an automated way business processes that violate their underlyingregulations The proposed research project aims at creating added value forservice-related industries (eg in the banking sector) by making the specifi-cation of business processes and norms rigorous and precise yet accessible todomain experts and enabling an automated approach to compliance check-ing This should provide means to ensure that services are aligned with theirunderlying local and international regulations With the growing need forregulatory compliance this will strengthen the expertise in service science inLuxembourg

Results - We have carried out a systematic literature survey of regulatorycompliance management in business process management elicited a set ofsuccess requirements and performed a comparative analysis of literature so-lutions against the requirements The result has been reported in a LASSYtechnical report (TR-LASSY-11-07) and an excerpt of the technical reportis accepted by the 8th Asia-Pacific Conferences on Conceptual Modelling(APCCM) for publication in 2012 - We have designed E3PC (EnterpriseExtended Event-driven Process Chains) E3PC is a formal model-driven en-terprise modeling language that extend EPC (Event-driven Process Chains)The formal semantics of E3PC is defined in terms of a translation fromE3PC models to Algebraic Petri-Nets (APN) We have reported the resultin a LASSY technical report (TR-LASSY-11-12) - We have designed CoReL(Compliance Requirement Language) CoReL is domain-specific modelinglanguage for representing compliance requirements that has a user-friendlygraphical concrete syntax Two papers have been published reporting re-sults on CoReL one[314]describes the language itself and the other[313]reports an illustrative example of using this language - We have developedan editor for E3PC and an editor for CoReL both implemented as Eclipseplug-ins We have also implemented the formal semantics of E3PC by de-

41 Research projects 73

veloping model transformations from E3PC to APN in both DSLTrans andATL - We have identified a sub-set of business processes called structuredbusiness processes in which only XOR and AND connectors are allowed andsplits and joins are always paired up properly Based on these structuredbusiness processes we have already derived efficient algorithms for certainsimple compliance requirements providing thus some evidence that theserestrictions on business process help to reduce complexity of compliancecheckingWe report the results in [90] and and a paper to be published atESSS 2013 - We have started the work on norm dynamics by investigatingthe use of an argumentation framework to determine the priorities betweenthe norms This approach can also be used within business processes todynamically determine to which policies the business process should complydepending from the context of the execution -We have started to work onan abstract framework to define compliance We propose an abstract frame-work to define business process compliance and its elements First we definethe elements that constitute a business process and its functioning Secondwe define the policies governing the processes and their obligations takingalso into account the temporal constraints that can exist between differentobligations

Publications [314 313 90 2 88 89 242 366]

Modeling Composing and Testing of Security ConcernsAcronym MITERReference NAPI Dr Jacques KleinFunding FNRBudget NABudget UL NADuration NA

Members Jacques Klein Yves Le Traon Phu Nguyen Qin Zhang MaxKramer

Domain(s) software engineering Model Composition Model-Driven Se-curity Model-Based Testing

Partner(s) KIT Karlruhe Germany

Description Security is not only a keyword it is currently a critical issuethat has to be embraced by modern software engineering (SE) techniquesFrom this SE point of view ensuring confidence in the implemented securitymechanisms is the key objective when deploying a security concern This

74 Projects and Grants in 2012

objective can be reached by improving the design and implementation pro-cess via modeling and automation such as security code generation frommodels and by systematic testing and verification

As stated in the FNR programme description ldquoInformation Security andTrust Managementrdquo is one of the cornerstones of the Information Societya ldquotransversalrdquo research domain of central and ever-growing importance notonly for the banking industry but for nearly all other ICT applicationsand e-services Thus security concerns impact many ICT domains in manydifferent ways

Secure programming techniques are now better understood and guidelinesteach programmers how to avoid buffer overflows when to validate inputsand how to apply cryptography The key problem is that security should notbe under the sole responsibility of the programmer (hopefully competent)Dealing with security at a programming level is risky often not sufficient andis not the most productive Indeed to face large classes of attacks securityexperts must express the security policy which is the result of a risks andthreats analysis This security policy cannot be deployed without taking intoaccount the software development lifecycle in a whole In other words itis necessary to consider the requirements analysis and design developmentsphases and the links between these phases to be able to represent (with mod-els) and analyze (with model analysis security methods) security concernsin order to detect or prevent from attacks Second the fact that securityconcerns impact ma ny ICT domains in many different ways amplified bythe fact that economic pressure reduces development time and increases thefrequency modifications are made constantly imposes more productive andflexible development methods To sum up for agile modeling there is anurgent need for modeling tools which allows composing functional architec-tural and - in MITER project - security expert viewpoints into an integratedproductive model

In this context the MITER project aims at developing new modeling tech-niques to 1) represent security concerns (eg access control and usage con-trol policies) 2) compose them with the business logic model (called tar-get model) and 3) test the security model composition against security re-quirements These three objectives converge to an integrated model-drivensecurity process which allows a business model to embed various securityconcerns and makes these security properties testable by construction

Results We have worked on an extension of one of our papers on dynamicaccess control Our goal being to perform performance analysis on the meth-ods that we propose We have also worked on Delegation management Morespecifically among the variety of models that have been studied in a MDEperspective one can mention Access Control policy that specifies the accessrights These work mainly focus on a static definition of a policy without

41 Research projects 75

taking into account the more complex but essential delegation of rightsmechanism User delegation is a meta-level mechanism for administratingaccess rights by specifying who can delegate access rights from one user toanother including his own rights We analyse the main hardpoints for intro-ducing various delegation semantics in model-driven security and proposesa model-driven framework for enforcing access control policies taking intoaccount all delegation requirements

We worked on the second main goal of the MITER project the compositionof security concerns As a result first we have proposed a new version of theGeKo weaver (available at httpcodegooglecomaeclipselabsorgpgeko-model-weaver) a generic and practical aspect-oriented modelling weaverA paper describing GeKo is currently under submission at the Model con-ference Second we applied GeKo to weave building specifications in thecontext of construction industry A workshop paper has been accepted in2012 This paper and this work have been done in collaboration with theUniversity of Queensland

Publications none in 2011

Model-Driven Validation and Verification of Resilient SoftwareSystemsAcronym MOVEREReference F1R-CSC-PFN-09IS02PI Prof Dr Nicolas GuelfiFunding FNR-COREBudget 265 000eBudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Levi Lucio Yasir Khan Qin Zhang

Domain(s) Software Engineering Security Dependability Resilience ModelChecking Model Driven Engineering

Partner(s) University of Geneva Switzerland

Description Verification and Validation of software have nowadays clearmeanings in the context of Model- Driven Development With test basedverification we worry about producing a set of test cases that will on theone hand find faults in an implementation - also called in the test literatureSystem Under Test (SUT) - and on the other hand increase trust in thefinal product With validation we worry about understanding if the modelwe are using as reference for implementation and for extracting test cases

76 Projects and Grants in 2012

from is sound Formal validation is often achieved by mechanically provingproperties the model should satisfy For example dynamic properties couldbe expressed in a temporal logic and static properties on the system statecould be expressed using logical invariants and then verified on the systemrsquosmodel In this project we will focus our attention on the application of val-idation and verification techniques to the Model Driven Engineering of sys-tems where resilience mechanisms are explicitly modelled and implementedaccording to that model Resilience corresponds to the fact that a systemhas the capability to adapt to harmful events and recover to a stable state orat least continue operation in a degraded mode without failing completelyThese harmful events might cause the fundamental security properties (con-fidentiality integrity and availability) to be violated With this project weaim at improving the state of the art of the construction of reliable resilientsystems by using verification and validation techniques within the context ofModel Driven Development (MDD) The current trend of Software Engineer-ing is to increasingly reason about the system being built at the model levelby using appropriate Domain Specific Languages (DSL) for each conceptualdomain In this project we will concentrate on resilience and materializeit as a DSL Model composition techniques can then be used in order tocompose resilience features expressed in the resilience DSL with other do-mains equally defined as DSLs When the composed model is validatedverification techniques can then be used to insure the resilience propertiesare well implemented We will tackle this problem both at a theoretical anda practical level

Results Since the beginning of the project in May 2010 we have hadtwo main results The first one is an abstract definition of resilience froma software engineering perspective This work is accessible as a technicalreport in [327] It has also been submitted to the journal rdquoTransactions onSoftware Engineering and Methodologyrdquo and for which approval is pendingThe second result is an operational definition of resilience using a modeldriven approach and model checking tools The work is based on [327]and is accessible also as a technical report in [326] A paper based on thistechnical report has been submitted to TOOLS 2011 Both these papersconcern work packages 1 and 2 of project MOVERE

Two PhD students Yasir Khan and Qin Zhang have been hired for workingfor MOVERE funded by the FNR AFR program Qin Zhang has startedat the University of Geneva in November 2010 and is currently familiarizinghimself with the project and the tools he will be using Yasir Khan has fileda visa demand at the Belgium embassy in his home country and is expectedat the Luxembourg in a few months

Publications NA

41 Research projects 77

Security TEsting for Resilient systemsAcronym SETERReference F1R-CSC-PFN-08IS01PI Prof Dr Nicolas GuelfiFunding FNR-COREBudget 43830000 eBudget UL NADuration 2009-05-01 ndash 2012-04-30

Members Nicolas Guelfi Yves Le Traon Ayda Saidane Iram Rubab

Domain(s) Security Resilience Model based Testing Requirement engi-neering Software architecture AADL

Partner(s) Telecom Bretagne France

Description Resilient systems can be viewed as open distributed systemsthat have capabilities to dynamically adapt in a predictable way to unex-pected and harmful events including faults and errors Engineering suchsystems is a challenging issue which implies reasoning explicitly and in aconsistent way about functional and non-functional characteristics of sys-tems The difficulty to build resilient systems and the economic pressureto produce high quality software with constraints on costs quality securityreliability etc enforce the use of practical solutions founded on scientificknowledge One of these solutions is to propose an innovative testing pro-cess Testing is an activity that aims at both demonstrating discrepanciesbetween a systems actual and intended behaviours and increasing the con-fidence that there is no such discrepancy One of the main features of asystem to test is the security of the system especially for those which aresafety or business critical The security of a system classically relates tothe confidentiality and integrity of data as well as the availability of sys-tems and the non-repudiation of transactions Testing security propertiesis a real challenge especially for resilient systems which have the capabilityto dynamically evolve to improve the security attributes The aim of theSETER project is to define a new testing approach that will ease the ver-ification of resilient programs that implement this security property Thisapproach must be aware that confidentiality and integrity can be compro-mised in many different ways (and consequently the resilient system canevolve in many different ways too) that availability and non-repudiationguarantees are difficult to ensure and that it must be compliant with theother tests addressing the core functionalities of the system Current trendsadvocate the idea that resilience should become an integral part of all stepsof software development Moreover testing is important for detecting errors

78 Projects and Grants in 2012

early in the development life cycle The earlier an error is detected theeasier and cheaper it is to resolve Therefore the objective of the SETERproject fits with these ideas by proposing new security testing approachesfor resilient systems the earlier possible during the software developmentlifecycle to propose more secure and more reliable system

Results

bull result 1 A Formal Framework for Dependability and Resilience (WP3 - Resilient System Specification and Security Requirements)

bull result 2 model based security testing approach (WP 4 - Test CaseSpecification and Selection)

bull result 3 AADL adaptation for expressing resilience requirements (WP3 - Resilient System Specification and Security Requirements)

Publications NA

413 UL Projects

Techniques and Technologies for multi-spot beam Ku-bandSatellite NetworksAcronym Multibeam KuReference 12R-DIR-PAU-11MSBKPI NAFunding ESA ITTBudget NABudget UL NADuration 2010-12-01 ndash 2012-02-28

Members B Ottersten B Shankar

Domain(s) NA

Partner(s)

bull SES-ASTRA (Luxembourg)

bull EADS Astrium (Fr)

41 Research projects 79

Description The objective of the study is to assess the advantages broughtby the introduction of multi-bearms and associated flexibility on Ku bandpayloads in particular for the present consortium the objective of the studyis to define assess and consolidate the benefits that a multi-beam architec-ture and flexibility could bring to follow-on satellites to NSS-6 satellite

Results NA

Publications NA

Guest professor Dov GabbayAcronym NAReference F1R-CSC-LAB-05ILIAPI Prof Dr Dov GabbayFunding ULBudget NABudget UL NADuration 2011-09-01 ndash 2014-08-31

Members NA

Domain(s) Logic Networks Argumentation

Partner(s) NA

Description

bull Further development of a unifying equational approach to logic andnetworks in particular argumentation

bull Interdisiplinary perspective on Security and trust bridging the gapbetween the areas of logic philosophy and security

bull Development of the foundation and applicability of input output logicespecially concerning its geometrical point of view which seems promis-ingly applicable to many non-classical logics

Results Progress was made in 3 related areas

bull Reactive Kripke modelsThese are Kripke models with additional accessibility relations whichcan change the model in the course of evaluations Several importantresults about the logical properties of such models were provided andpublished

80 Projects and Grants in 2012

bull Deontic logic and contrary to duty obligationsThe reactive semantics was used to build coherent models for intriguingpuzzles of permission and obligation

bull Meta-logical investigations in argumentation theoryA new point of view on argumentation was developed and connectedto other areas

Publications 21 publications in 2012 among them 14 journal publications

The Springer journal ANNALS OF MATHEMATICS IN ARTIFICIAL IN-TELLIGENCE (AMAI) devoted a special volume (4 issues) in 2012 to pub-lish these results

AMAI Volume 66 Numbers 1-4 December 2012

The journal ARGUMENT AND COMPUTATION also published a specialdouble issue

Argument and Computation Volume 3 issues 2-3 2012

Logics Integrated for Normative Multi-Agent SystemsAcronym LINMASReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding ULBudget NABudget UL NADuration 2011-03-01 ndash 2013-02-28

Members Xavier Parent Dov Gabbay Xin Sun Paolo Turrini

Domain(s) Normative multi-agent systems Deontic logic Knowledge rep-resentation Intelligent Systems

Partner(s) NA

Description The project aims at providing an advanced model for reason-ing about norms with both a formal semantics and a proof theory Two keycomponents that will be brought together are conflict resolution and normenforcement which are for instance relevant for the design of e-institutions

41 Research projects 81

The goal is to establish rigorous theoretical foundations for the design ofNormative Multi-Agent systems that is both amenable to computer scien-tists and understandable by stakeholders

A PhD student Xin Sun has been hired in July 2012 The topic is deonticlogic from a game-theoretic perspective The idea is to look in a new way atfamiliar problems in normative reasoning which promises a novel approachfor handling norms in intelligent systems The fields of deontic logic andgame theory have developed independently from each other with few in-teractions between the two The PhD thesis will aim at lling this gap byinvestigating how techniques developed in game theory may shed light onlong-standing issues in the study of normative reasoning like norm emer-gence and (vice-versa) how the use of norms may shed light on problemsthat have beset game theory

Results ur results are related to the notion of rsquonorm enforcementrsquo

[4] we look at the theoretical foundations of one of the existing standards fornormative reasoning so-called dyadic deontic logic We discuss the prob-lem of the import or non-import of the identity principle for conditionalobligation

Based on this insight in [292] we develop a new model for reasoning aboutnorm violation In a multi-agent setting norm enforcement is facilitatedthrough the use of sanctions Thus so-called contrary-to-duty (CTD) obliga-tions (they say what should be done if some other obligation is violated) area key component of the system The problem of how to model such a com-ponent is one of the main problems of deontic logic There is a widespreadagreement in the literature that such a problem calls for the need to distin-guish between different senses of rsquooughtrsquo ideal vs actual rsquooughtrsquo Our keyidea is to capture the distinction using tools from two-dimentional modallogic

[2] goes one step further and brings the notion of contrary-to-duty to therealm of game theory so far not investigated in relation to optimality ofstrategic decisions We show that under a game-theoretical semanticsCTDs are well-suited to treat sub-ideal decisionsWe also argue that ina wide class of interactions CTDs can used as a compact representation ofcoalitional choices leading to the achievement of optimal outcomes Finallywe investigate the properties of the proposed operators

Publications NA

82 Projects and Grants in 2012

Advanced Argumentation Techniques for Trust ManagementAcronym AASTMReference F1R-CSC-PUL-08AASTMPI Prof Dr Leon van der TorreFunding ULBudget NABudget UL NADuration 2008-05-01 ndash 2012-04-30

Members Leon van der Torre Martin Caminada Yining Wu

Domain(s) Computational argumentation Trust

Partner(s) NA

Description The overall aim of AASTM is to enhance todayrsquos genera-tion of argumentation formalisms and implementations in order to becomesuitable for a wider variety of real-life applications such as reasoning abouttrust This requires a unified theory that integrates the various forms of ar-gumentation related functionality as well as efficient proof procedures andsound and scalable software components

Results

bull A dialectical discussion game for stable semantics

bull A more refined notion of the overall status of arguments based on thenotion of a complete labelling and give the procedure to determine anddefend the justification status This refinement has put the notion ofargument labelings into good use and raises interesting new questionsabout the psychological plausibility of such labelings

bull The equivalence between complete semantics in argumentation and3-valued stable model semantics in logic programming opens up thepossibility of reusing algorithms and results from logic programmingin argumentation theory

bull We define the postulates of closure direct consistency indirect con-sistency non-interference and crash resistance in the specific case ofthe ASPIC Lite formalism Then we identity a set of conditions underwhich the ASPIC Lite system satisfies all the mentioned rationalitypostulates under complete semantics

Publications Yning Wu Between Argument and Conclusion PhD thesisUniversity of Luxembourg 2012

41 Research projects 83

A discrete approach to model processing of hard metal includinghigh performance computingAcronym DPMHPCReference NAPI Prof Dr Bernhard PetersFunding ULBudget NABudget UL NADuration NA

Members Pascal Bouvry (2nd PI) Xavier Besseron

Domain(s) Process Engineering Parallelisation

Partner(s) NA

Description Conversion of pulverised tungsten oxide to metallic tungstenin a packed bed for production of hard metal is investigated by numericalmodelling The manufacturing process is a very important tool for ma-chining various materials The chemical process is described by a reactionscheme that reduces tungsten oxide stepwise to tungsten in a hydrogen at-mosphere Hydrogen is introduced as a reducing agent that streams overa packed bed of tungsten oxide particles in an oven The flow over andpenetration of hydrogen into the bed of tungsten particles is represented byadvanced two-phase CFD-tools for a porous media Evolution of particletemperature and its reaction progress is described by the Discrete ParticleMethod (DPM) Thus very detailed results are obtained by this approachand will be compared to experimental data Therefore this effort will com-plement experimental investigations and provide a deeper insight into theprocess in particular since particle temperatures and interaction of par-ticles with the fluid are inaccessible in a packed bed during experimentsAs these predictions of the particulate phase of tungsten oxide require sig-nificant amounts of CPU-time parallelisation of the conversion module ofthe Discrete Particle Method is approached by an interdisciplinary conceptas collaboration between engineering and computer science disciplines Theworkload for each processor is determined by the Orthogonal Recursive Bi-section (ORB) algorithm that distributes the particles uniformly onto theprocessors available The well-established Message Passing Interface (MPI)is employed to describe thermal conversion of an arbitrary number of tung-sten oxide particles It has additionally the advantage that MPI is supportedby Windows and Linux operating systems which apply equally to the soft-ware package of the Discrete Particle Method Additionally the scalability

84 Projects and Grants in 2012

of the approach on massively parallel machines will be investigated and theapplication of GPUs will be promoted

Results On the CSC side the work on this project focuses on providing anew design of the DPM software in order to execute coupled simulation inparallel The new enhanced design relies on the following aspects

bull A simulation module interface is designed to reflect the two majorsteps of the simulation workflow interactions and the integration

bull A simulation driver that builds an unified timebase to schedule andexecute all the modules involved according to their own timesteps

bull A parallel simulation driver that implements domain decompositionapproach using the Message Passing Interface (MPI) in order to lever-age distributed execution platforms like High Performance Computing(HPC) clusters It relies on the concepts of domain cells and partitionand can use different partitioners (eg ORB or METIS)

The enhanced design has been validated and it has been verified that itsatisfies the constraints of the numerical methods used by the process engi-neering The implementation of the new design is in progress in the DPMsoftware

Publications NA

Evolutionary Computing and Performance GuaranteesAcronym EvoPerfReference F1R-CSC-PUL-11EVOPPI Prof Dr Pascal BouvryFunding ULBudget 370keBudget UL NADuration 2011-09-01 ndash 2013-12-31

Members Xavier Besseron Sebastien Varrette Gregoire Danoy Sune SNielsen Emilia Tantar Yves Le Traon Antonio del Sol Nikos Vlassis

Domain(s) Meta Heuristics Evolutionary Computation OptimisationPerformance evaluation Bioinformatics

Partner(s) NA

Description Evoperf aims at providing the bases for robust and perfor-mance guaranteed evolutionary computations Such methods have a large

41 Research projects 85

spectrum of applications By choosing a system biomedicine applicationEvoperf aims at performing interdisciplinary research Many of the realworld problems are intractable (NP-Hard) whereas different approaches ex-ist including problem relaxation or local approaches However most tech-niques rely on stochastics to explore different starting points (iterated gradi-ent) or diversify the search (meta-heuristics) More than 15 years ago proofof convergences of stochastic based approaches were provided eg in [332]for simulated annealing and [333] for genetic algorithms But most of the re-search on genetic type particle algorithms evolutionary computation andorMonte Carlo literature seems to be developed with no visible connectionsto the physical or the mathematical sides of this field We mention thatthe design and the mathematical analysis of genetic type and branchingparticle interpretations of Feynman-Kac semigroups and vice versa (cf forinstance [347]) has been started by Prof Del Moral and his collaboratorsand acknowledged important advances [334 335] These nice theoreticalresults are however under-exploited In the current project we intend to ex-tend the approach to cutting edge parallel and robust multi-objective parti-cle algorithms (differential evolution cellular genetic algorithms) both at atheoretical and implementation level Validation will be carried on cuttingedge system biomedicine issues providing new modelstools for genepro-tein interaction networks Where appropriate a set of solvers will be usedas part of a multi player game Based on non-cooperative game theory itwas proved that these games converge to Nash equilibrium We will alsoinclude a decision-theory based approach that will regulate when and howthe different players exchange information and share the global cost functionby decomposition as to make Nash equilibrium correspond to global optima

Results The EvoPerf Project kickoff has taken place in 2011

The following human resources have been hired in 2011 Dr Xavier Besseronas Postdoc and Sune S Nielsen as PhD student

Publications NA

Privacy by DefaultAcronym DEFAULT-PRIVReference F1R-CSC-PUL-12DEPRPI Prof Dr Sjouke MauwFunding ULBudget 192853eBudget UL 192853eDuration 2012-09-01 ndash 2014-08-31

86 Projects and Grants in 2012

Members Sjouke Mauw Hugo Jonker

Domain(s) privacy verification formal analysis social networks mobilenetworks

Partner(s) Goethe University Frankfurt Germany

Description With the online proliferation of user-generated content (egblogs Youtube) and social media (eg Twitter Facebook) a new phe-nomenon has occurred people nowadays have a digital online rdquoliferdquo Rela-tions to others photos attended events opinions on current events all ofthis and more may be found online

As in real life privacy of the individual concerned must be safeguardedHowever the experience of privacy in the real world does not translate di-rectly to privacy in the digital life Privacy-sensitive aspects of the digitallife can leak out as in the real world but unlike the real world they are notbound to their context An angry letter in a newspaper will be used the nextday to wrap the fish but an angry letter online can still be found for yearsto come Whereas printed photos are by default stored in one album thedefault for digital photos is copying - website to browser camera to harddisk hard disk to email etc

The goal of this project is to connect user experience of privacy in real lifewith privacy offered in digital life and so overcome the divorce betweenthem As such the project investigates the effects of this divorce in andexplores possible resolutions for several aspects of digital life

bull Protecting user-generated contents

bull Keeping digital life fragmented

bull Mobile privacy

The project does not aim to enforce privacy ndash as in real life an individualrsquosprivacy may be breached by others (eg gossip) Instead the goal is toensure rdquoprivacy by defaultrdquo it may be possible to violate privacy to do soan individual needs to take conscious steps

Results The project started in September 2012 and so far has led to acollaboration with Verimag laboratory (Grenoble France) on verifiability ofonline auctions which has been submitted to ASIA-CCSrsquo13

Publications NA

41 Research projects 87

A Formal Approach to Enforced Privacy in e-ServicesAcronym EPRIVReference PUL-09EPRIPI Prof Dr Sjouke MauwFunding ULBudget 254955eBudget UL 254955eDuration 2009-05-01 ndash 2012-04-30

Members Sjouke Mauw Jun Pang Hugo Jonker Naipeng Dong

Domain(s) enforced privacy verification formal modelling e-services

Partner(s) ENS Cachan Paris France

Description Privacy has been a fundamental property for distributed sys-tems which provide e-services to users In these systems users become moreand more concerned about their anonymity and how their personal infor-mation has been used For example in voting systems a voter wants tokeep her vote secret Recently strong privacy properties in voting suchas receipt-freeness and coercion-resistance were proposed and have receivedconsiderable attention These notions seek to prevent vote buying (where avoter chooses to renounce her vote) These strong notions of privacy whichwe will call enforced privacy actually capture the essential idea that pri-vacy must be enforced by a system upon its users instead of users desiringprivacy The first aim of this project is to extend enforced privacy fromvoting to other domains such as online auctions anonymous communica-tions healthcare and digital rights management where enforced privacy isa paramount requirement For example in healthcare a patientrsquos healthrecord is private information However a patient contracting a serious dis-ease is at risk of discrimination by parties aware of her illness The inabilityto unveil (specific parts of) the health record of a patient is a minimal re-quirement for her privacy The second aim of the project is to develop adomain-independent formal framework in which enforced privacy proper-ties in different domains can be captured in a natural uniform and preciseway Typically enforced privacy properties will be formalized as equivalencerelations on traces which take into account both the knowledge of the in-truder and the users Within the framework algorithms can be designed tosupport analysis of e-service systems which claim to have enforced privacyproperties In the end the formalization and techniques will be applied toverify existing real-life systems and to help the design of new systems withenforced privacy properties

Results The project finished in 2012 In that year the project resultedin 3 conference papers [141] at ESORICSrsquo12 [144] at EVOTErsquo12 [141] at

88 Projects and Grants in 2012

FHIESrsquo11 and one book chapter [5] in Digital Enlightenment Yearbook 2012The projectrsquos EVOTErsquo12 paper Random Block Verification Improving theNorwegian Electoral Mix Net [144] won the best paper award of the confer-ence In the context of the project the Second International Summer Schoolon Secure Voting was organized in Schloszlig Dagstuhl Germany

Publications The following publications resulted from the project in2012 [141] [144] [141] [5]

Better e-Learning Assignments System TechnologyAcronym BLASTReference F1R-CSC-PUL-10BLASPI Prof Dr Denis ZampunierisFunding ULBudget 165000eBudget UL NADuration 2010-09-01 ndash 2012-08-31

Members Sandro Reis Denis Shirnin Denis Zampunieris

Domain(s) Proactive computing E-learning Online assignments manage-ment system

Partner(s) NA

Description The project aims at the design and implementation of aproactive online assignments system for blended teachings at the Univer-sity of Luxembourg which will actively support students as well as teachersin a collaborative way The main output product of this research and devel-opment project will be an online assignments system with advanced featureswhile remaining easily usable by every user beginner or expert that is usefulfor our teachings and which will be based on software currently in use at theUL The design will rely on the innovative concept of proactive computingapplied to the e-learning technologies field Indeed instead of waiting foruser interaction like in existing reactive learning management systems ourproactive assignments system (embedded into a standard e-learning plat-form) will allow us to define analysis and management rules that will beapplied autonomously by the system to support and drive the workflowwhen a teacher online assigned tasks to students The possible rules willrange from simple reminders and notifications to both parties to the mostelaborated automatic detection of potential problems based on successivedetection of (non-) events over a period of time

Results NA

41 Research projects 89

Publications NA

Model Composition for Executable ModelingAcronym COMPEXReference F1R-CSC-PUL-10MCEMPI Prof Dr Pierre KelsenFunding ULBudget 173KeBudget UL NADuration 2011-10-01 ndash 2013-09-30

Members Pierre Kelsen Nuno Amalio

Domain(s) Model-Driven Software Development Model Composition Ex-ecutable Modeling Software Engineering

Partner(s) NA

Description In model-driven software development models are the pri-mary artifacts for constructing software Model composition helps in master-ing the complexity of model-driven development Most of the current modelcomposition techniques can be viewed naturally as model transformationstaking two input models and producing one output model In our workwe have introduced a new composition technique for building executablemodels It has several properties that traditional composition techniques donot have it is additive rather than transformational it can be applied toany meta-model and it has a formal semantics The present project willinvestigate the power of our composition technique In particular we willcompare our technique with approaches from aspect-oriented modeling thatare typically used to express crosscutting concerns The project will inves-tigate whether our approach can be extended to match the power of thesetechniques andor how it can complement the existing approaches in mod-eling systems in a more straightforward elegant and light-weight mannerThe main goal is to enhance our current modeling framework and tool forexecutable modeling with new model composition techniques so that theycan handle not only the academic examples studied so far but can be usedeffectively on larger systems

Results The following results have been achieved on this project

bull A paper comparing different aspect-oriented modelling approaches in-cluding VCL [368]

bull A paper [369] a master thesis (of Eric Tobias 2012) and a techni-

90 Projects and Grants in 2012

cal report [370] with a comparative study that compares VCL againstother Visual Modelling Languages (VMLs) Part of the criteria forthis comparison is precisely VCL mechanisms of composition and de-composition

bull VCL has been applied to a case study from the modelling and aspect-oriented communities A technical reporting presenting a VCL modelof this case study [371] was presented at a workshop on comparingModelling Approaches of conference Models 2012

bull VCL has been applied to an industrial case study coming from theresearch community of formal methods This resulted in a paper [367]a technical report [372] and a masters thesis (Jerome Leemans 2011)

bull VCL and its composition mechanisms have been applied to a largecase study coming from the research efforts of CRP Henri Tudor onuser interfaces This work is part of Eric Tobias Master Thesis (2012)We intend to work towards a publication regarding this piece of workin close collaboration with the CRP in 2013

Publications NA

Dynamic and Composite Service-Oriented Architecture Secu-rity TestingAcronym DYNOSOARReference NAPI Prof Dr Yves Le TraonFunding ULBudget NABudget UL NADuration NA

Members Tejeddine Mouelhi Jacques Klein

Domain(s) Model-driven engineering Security testing SOA

Partner(s) NA

Description In Dynosoar project we aim at proposing reconfigurationcapabilities to Service-Oriented Architecture (SOA) targeting user-definedsecurity policies which can be trusted through innovative security testingmethods and tools SOA aims at decreasing the level of coupling betweenservices and at increasing the reuse evolution and adaptation of the sys-tem A SOA consists of an orchestration that models the services and the

41 Research projects 91

control flow of events between services A service integrator composes thesedifferent services (maybe dynamically discovered on the web) to propose anew composite service From this perspective SOA offers a very excitingsolution for building composite distributed systems Services are dynamicand highly reconfigurable a service integrator can compose different ser-vices in many different ways each service proposing different variants Itrapidly leads to the combinatorial explosion of possible composite servicesAmong reconfiguration criteria one aspect is becoming crucial for trustinga configured orchestration its capacity to embed a reconfigurable securitypolicy In Dynosoar we consider security policies dedicated to SOA whichallow each user expressing how her data can be manipulated into an or-chestration The problem is thus (1) to select valid orchestrations amongthe huge number of possible reconfigurations and (2) to test the robustnessof security mechanisms of the selected orchestrations Dynosoar addressestwo crucial dimensions the generation of valid orchestrations embedding asecurity policy from the set of possible reconfigurations and the final secu-rity testing of orchestrations The hard points we focus on are 1) choosingamong a possibly infinite number of services (re)configurations the smallestand more relevant subset which have to be tested This subset of serviceconfigurations must satisfy the security policy as well as sequential executionconstraints 2) testing one specific configuration in isolation ie withoutreal external service providers We specifically target the security policieswith testing

Results NA

Publications NA

414 UL PhD PostDoc

Seamless Communication for Crisis ManagementAcronym SECRICOMReference NAPI Prof Dr Thomas EngelFunding FullbrightBudget NABudget UL NADuration 2008-09-01 ndash 2012-04-30

Members Thomas Engel Sheila Becker

92 Projects and Grants in 2012

Domain(s) Security

Partner(s)

bull QinetiQ Ltd

bull Ardaco as

bull Bumar Ltd

bull NEXTEL SA

bull Infineon Technologies AG

bull Institute of Informatics Slovak Academy of Sciences

bull Graz University of Technology

bull Smartrends sro

bull ITTI Sp z oo

bull British Association of Public Safety Communication Officers

bull CEA LETI

bull Hitachi Europe SAS

Description Peer-to-peer real-time communication and media streamingapplications optimize their performance by using application-level topologyestimation services such as virtual coordinate systems Virtual coordinatesystems allow nodes in a peer-to-peer network to accurately predict latencybetween arbitrary nodes without the need of performing extensive measure-ments However systems that leverage virtual coordinates as supportingbuilding blocks are prone to attacks conducted by compromised nodes thataim at disrupting eavesdropping or mangling with the underlying commu-nications

Recent research proposed techniques to mitigate basic attacks ( inflationdeflation oscillation) considering a single attack strategy model where at-tackers perform only one type of attack In this work we define and usea game theory framework in order to identify the best attack and defensestrategies assuming that the attacker is aware of the defense mechanismsOur approach leverages concepts derived from the Nash equilibrium to modelmore powerful adversaries We apply the game theory framework to demon-strate the impact and efficiency of these attack and defense strategies usinga well-known virtual coordinate system and real-life Internet data sets

41 Research projects 93

Thereafter we explore supervised machine learning techniques to mitigatemore subtle yet highly effective attacks ( frog-boiling network-partition)that are able to bypass existing defenses We evaluate our techniques onthe Vivaldi system against a more complex attack strategy model whereattackers perform sequences of all known attacks against virtual coordinatesystems using both simulations and Internet deployments

Results The exploitation of existing publicly available communication net-work infrastructure with interface towards emerging SDR systems Interop-erability between heterogeneous secure communication systems A paralleldistributed mobile agent-based transaction system for effective procurementInfrastructure based on custom chip-level security

Publications NA

The Snippet System - A Fine-Granular Semantic-Aware DataStoreAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding ULBudget NABudget UL NADuration 2010-11-01 ndash 2013-10-31

Members Laurent Kirsch (PhD candidate) Steffen Rothkugel (supervi-sor)

Domain(s) compound documents file systems semantic desktop

Partner(s) NA

Description The Snippet System represents a novel data storage approachtackling several problems and shortcomings inherent to traditional file sys-tem based document management One of the main targets of the SnippetSystem is to improve human computer interaction by introducing new datamanagement facilities which enable a more intuitive way of working withdata and information By developing these file system level data manage-ment concepts with the usability of the system in mind it is possible toconsider usability aspects already in the design of the data storage architec-ture This in turn allows the realization of concepts like so-called Relationsand vFolders which contribute to a better user interface and interactionscheme

94 Projects and Grants in 2012

Results NA

Publications 1 conference publication [350]

Analysis of low-latency anonymisation networksAcronym NAReference I2R-NET-COM-110000PI Prof Dr Thomas EngelFunding funded on Fp7 EFIPSANS until 31122010 - Net-

LabBudget 37KyearBudget UL NADuration 2008-11-15 ndash 2012-11-14

Members Thomas Engel Thorsten Ries

Domain(s) Anonymity privacy low-latency anonymisation networks anonymi-sation network performance

Partner(s) NA

Description For various reasons low-latency anonymisation systems likeTor I2P JonDonym or proxy based solutions are widely used nowadaysoffering a certain performance and protection against adversaries Howeverit is very difficult for users to evaluate these systems especially when itcomes to the degree of anonymity Therefore the goal of this work is toprovide measures for users in order to evaluate the systems in regard toanonymity and performance

Basis of the work are performance evaluations of typical anonymisation sys-tems in regard to throughput round trip time and packet variation In orderto describe the degree of anonymity an attack using virtual network coordi-nate systems will be defined that allows an instant degradation of anonymityby positioning users geographically which aim to stay anonymous Classifi-cation algorithms like Support Vector Machines and Instance Based learningalgorithms will be used to allow the calculation of the degree of anonymityFinally a comparison to existing approaches will be provided

A second emphasis is on anonymisation performance particularly on Torthe most prevalent anonymisaton system nowadays Existing performancemetrics will be reviewed and evaluated aiming to improve the overall per-formance in terms of throughput and round trip time by an optimised relaynode selection for instance

Results The major outcome of this project is expected to be a quantifi-

41 Research projects 95

cation of anonymity in anonymisation networks by making use of virtualnetwork coordinate systems in order to identify node locations and by thisto provide an anonymity measure for users Another result will be perfor-mance improvements of the Tor anonymisation network

Publications [273 274 280]

Sociality and Self-Organization in Next-Generation DistributedEnvironmentsAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding AFRBudget NABudget UL NADuration 2009-02-01 ndash 2012-01-31

Members Jean Botev (Post Doc) Steffen Rothkugel (supervisor)

Domain(s) large-scale distributed environments sociality self-organization

Partner(s)

bull National University of Singapore

bull George Mason University USA

bull Universitat Trier

Description The proliferation of computationally powerful interconnecteddevices entails a new generation of networked applications and social utilitiescharacterized by a strong growth in scale and dynamics Distributed virtualenvironments constitute a privileged example involving a high degree of in-teractivity as well as tightened constraints and requirements As a responseto these issues this dissertation explores and substantiates sociality as a fun-damental principle both in and for the design of such systems A specializeddual peer-to-peer architecture is introduced combining a highly-structuredbackbone overlay with a loosely-structured geometric client overlay synergis-tically complementing each other To enable a global-scale single-instancedenvironment it is imperative to include as many client-side resources as pos-sible and unburden the backbone The focus of this dissertation thereforelies upon the latter geometric overlay By taking an interdisciplinary per-spective and leveraging different aspects of sociality a series of self-organizedapproaches addressing major problem areas are proposed a collaborative

96 Projects and Grants in 2012

filtering mechanism for the handling of information overload created fromthe soaring amounts of users and objects a confidentiality framework for theprotection of sensitive data more likely exposed due to an increased inter-activity and two resource allocation schemes for fairly distributing surpluscapacities in the face of critical regional surges Detailed evaluations showthat these decentralized algorithms operate robustly and effectively whileyielding well-converging results in comparison to optimal global-knowledgescenarios

Results NA

Publications 3 peer-reviewed conferences [297] [308][296]and one PhDthesis [352]

Honeypot and Malware AnalysisAcronym Honeypot and Malware AnalysisReference I2R-DIR-PIC-09SECPI Prof Dr Thomas EngelFunding AFR-PPPBudget 37KyearBudget UL NADuration 2011-10-15 ndash 2014-10-14

Members T Engel S Marchal

Domain(s) Is- Information and Communication Technologies Honeypotmalware analysis malware detection passive DNS network traffic analysis

Partner(s) CETREL

Description This research proposal presents the development of a newkind of honeypot Honeypots are widely used for more than ten years nowfor several purposes such as threat detection mitigation of the impact of net-work attacks malware analysis automatic generation of wormsrsquo signatureetc However honeypots are often designed to particular network applica-tions or services to offer a tailor-made threat detection and deflection Inthis proposal I exhibit potential new wider applications of honeypots lever-aging passive DNS analysis DNS probing and fast network traffic analysisin order to protect a specific network from its specific threats I highlightseveral areas for active research and provide an overview on existing ap-proaches This project is part of a public private partnership between SnTand CETREL SA and will be realized in the framework of a PhD coveringa 3 year period

41 Research projects 97

Results NA

Publications 2 peer-reviewed conferences [363 362]

Routing and mobility management in vehicular networksAcronym NAReference I2R-NET-PFN-10MOVEPI Prof Dr Thomas EngelFunding FNR - CORE MOVEBudget 37KyearBudget UL NADuration 2011-09-01 ndash 2014-08-31

Members T Engel M Mouton

Domain(s) NA

Partner(s) NA

Description research in the area of Vehicular Ad Hoc Networks (VANETs)A VANET is an emerging network technology which enables data com-munication between vehicles and the Internet The network protocols andhardware have been specifically designed for efficient data exchange in vehic-ular environments The high mobility and intermittent network connectivityraise major challenges for both security and network management tasks

The main contribution of the thesis of Maximilien Mouton consists in -The setup and maintenance up a simulationemulation platform that canbe used for large scale protocol validation and analysis (joint research withUCLA) - Integration of realistic mobility and signal propagation models -Identifying and proposing new application specific routing mechanisms formobile vehicular networks - Investigation of application specific dissemina-tion techniques (eg traffic

Results NA

Publications NA

98 Projects and Grants in 2012

Securing Mission Operations using Multi-Level SecurityAcronym SMO-MLSReference I2R-NET-PAU-11ELSKPI Prof Dr Thomas EngelFunding European Space AgencyBudget 48800e

UL - 37077 eBudget UL NADuration 2010-11-01 ndash 2014-10-30

Members Thomas Engel ESkoutaris

Domain(s) Spacecraft mission control systems MLS security

Partner(s) ESAESOC Germany

Description SMO-MLS is an ongoing research project that aims to pro-viding an enhanced security support at the spacecraft control infrastructureof ESAESOC by establishing multi-level security (MLS) solutions on itsMission Control System (MCS) Within this research activity MLS solu-tions will ensure an enforced separation of command and control data flowsof different sensitivity and classification levels between missions and also be-tween individual payload data flows of the same mission SCOS-2000 (S2K)is the ESA generic software infrastructure implementing the common fea-tures required by a spacecraft MCS Therefore a SCOS-2000 MLS prototypeis to be developed and built upon an operating system that supports multi-level security (ie Security-Enhanced Linux) The primary three objectivesof this project and that represent the direct security needs of future spacemissions are

(A) Enforcement of integrity policies between telecommand chain data flows(B) Enforcement of integrity policies between telemetry chain data flows (C)Confidentiality of third party telecommand chain data flows

This research project will advance the research on the area of MLS systemsand will provide an MLS model tailored for spacecraft command and controlsystems

Results As a result of this project a prototype MLS system based oncurrent ESA mission control system infrastructure will be developed andimplemented This may include the development of specific protocols andprocedures Such protocols may be subject to standardization

Publications NA

41 Research projects 99

Mobility Optimization using Vehicular network technologies(MOVE)Acronym MOVEReference I2R-NET-PFN-10MOVEPI Prof Dr Thomas EngelFunding CORE- MOVEBudget 37KYearBudget UL NADuration 2011-11-15 ndash 2014-11-14

Members T Engel M Forster R Frank J Francois A Panchenko MMouton L Dolberg

Domain(s) ICT

Partner(s) UCLA (non contracting)

Description The student will be working on the FNR MOVE projectThe goal of this project is to optimize vehicular traffic flows using ubiqui-tous network technologies (eg VANET 3G) The student will focus ondeveloping new traffic flow deviation paradigms that can be employed toreduce vehicular traffic congestion for urban and highway scenarios

Vehicular Ad Hoc Networks (VANETs) are mobile networks specificallysuited for vehicular environments Moreover the student will focus on spe-cific optimisation problems related to vehicular traffic flows Using VANETswill allow specifying decentralised and distributed coordinated algorithms toprovide the drivers with smart navigation services

The main contributions of the thesis of Markus Forster consist in - Iden-tifying the specificity of the vehicular traffic for the area of Luxembourg -Understanding the limitations and bottlenecks of the current Luxembour-gish road network - Modelling of the traffic in order to realistically reproducethe flow behaviour in a simulations environment - Testing existing and novelflow optimisation techniques that will allow to improve

Results NA

Publications NA

100 Projects and Grants in 2012

Service Dependency and Anomaly DetectionAcronym NAReference I2R-NET-COM-110000PI Prof Dr Thomas EngelFunding Funded on FP7 EFIPSANS project until 31122010

- NetLabBudget NABudget UL NADuration 2008-11-01 ndash 2012-10-31

Members T Engel C Wagner

Domain(s) NA

Partner(s) NA

Description NA

Results NA

Publications The following articles have been published in 2011 1 jour-nal [271] and 3 peer-reviewed conferences [306] [278] [279]

Individual and Collective ReasoningAcronym ICRReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding UL-PHDBudget NABudget UL NADuration 2008-03-12 ndash 2012-03-12

Members Gabriella Pigozzi Marija Slavkovik Leon van der Torre

Domain(s) Judgment aggregation Group-decision making Social choicetheory Normative systems

Partner(s) NA

Description Traditional decision-making is driven by the concept of a ra-tional agent who acts in his own best interest by maximizing the expectedutility Opposite to the rational agent modeled as Homo Economicus peopledo not make decisions by generating alternative options and by comparingthem on the same set of evaluation dimensions nor do they generate prob-ability and utility estimates for different courses of action They search for

41 Research projects 101

what Herbert A Simon called satisficing or ldquogood enoughrdquo decisions Wedefine a satisficing decision as one that is determined by making a yesnoestimate for each element of a given set of decision-relevant criteria Theaim of this project is to investigate how groups of artificial agents can reachsatisficing decisions The contribution of the thesis is threefold For the areaof multi-agent systems we propose a new way in which group decisions canbe reached As a show-case we apply our decision-reaching method to theroblem of determining group intentions For the field of judgment aggrega-tion our contribution is a new set of judgment aggregation operators Forthe field of belief merging our contribution is the identification of a newproblem of iterated belief merging

Results

bull In order to avoid an untenable collective outcome individuals mayprefer to declare a less preferred judgment set Thus the prospect ofan individual trying to manipulate the social outcome by submittingan insincere judgment set is turned from being an undesirable to aldquovirtuous (or white) manipulation In [349] we defined and studiedwhite manipulation as a coordinated action of the whole group

bull In [348] we presented an aggregation procedure providing completejudgment sets ie judgment sets with premises and conclusion Weshowed that our procedure satisfies the desirable properties of non-manipulability and it can be modified to preserve unanimity on thepremises

bull In order to show the practical applicability of group decision-reachingthrough judgment aggregation we studied the problem of determin-ing group intentions based on declared beliefs or acceptances of thememebers In [328] we present a formal model for deciding on collec-tive intentions and study the related group commitment and intentionrevision problems

Publications Marija Slavkovik

102 Projects and Grants in 2012

Understanding Financial Topics and their Lifetime in TextualNews by the Content Aging TheoryAcronym NAReference F2R-LSF-PFN-11ESCAPI Prof Dr Christoph SchommerFunding FNR COREBudget 500000Budget UL NADuration 2012-06-01 ndash 2015-05-31

Members Christoph Schommer Roxana Bersan Dimitrios Kampas An-dreas Chouliaras Theoharry Grammatikos Yannis Ioannidis

Domain(s) Computational Finance Topic Extraction Content AgingTheory Machine Learning Text Mining

Partner(s)

bull Dept of Finance (Luxembourg School of Finance)

bull Dept of Computer Science

bull University of Athens Dept of Computer Science

Description The project is part of the FNR CORE project ESCAPEESCAPE applies Data Mining and Machine Learning methods on publiclyavailable news sources to document in a measurable way the structure andevolution of Europersquos financial policy to address the on-going threat to theEuro-zone stability How do the important euro policy players present them-selves in the pallet of the policies map Are there subgroups with similarpositions How coherent are these groups among themselves Are theredominant players in each group How different are the different group posi-tions One expects that the euro players eventually will reach a consensuspolicy to stem the risk threatening the EURO Documenting in a measur-able way how the different policy positions converge over time should provideadditional insights into the complex process of (financial) policy evolutionFinancial policy ultimately affects capital markets but as the recent cri-sis has highlighted capital markets may force or extract policy concessionsUnderstanding the interplay of financial policy formulation and capital mar-ket ex-pectations therefore is extremely important for the effectiveness ofpolicy responses and eventually for the stability of the financial system ES-CAPE provides statistical evidence on whether capital markets lead or reactconcurrently to the financial policy evolution It is expected to shed lighton the powerful role of the ldquoinvisible handrdquo of capital markets in extractingdesired policies from politicians

41 Research projects 103

The research project concerns the identification of financial topics in Thom-son Reuters News data The extraction of this kind of information will beperformed based on machine learning and content aging theory methodsWe are currently working on the mathematical formalization of this systemThe extraction of this kind of information will be used by financial expertsto better understand the Sovereign Debt Crisis in Europe

Results

bull We were concerned with masses of financial news data from Thom-son Reuters (gt 2TB) the understanding of the data structure themanagement of the data and its preprocessing

bull We have elaborated on and worked out Topic ExtractionFinding indetail

bull Extensive Literature Review Topic Extraction and Content AgingTheory

bull Paper writing which has led to a conference paper to be presented atICAART 2013 in Barcelona

Publications to appear in 2013 at ICAART 2013

Smart Predictive Algorithms for Spacecraft AnomaliesAcronym SPACEReference I2R-DIR-BPI-11SCHOPI NAFunding SnTBudget NABudget UL NADuration 2011-07-09 ndash 2017-07-08

Members F Bouleau Prof Schommer Prof Bouvry Dr Krier

Domain(s) Keywords Fourier fit least square Kalmanrsquos filter data min-ing artificial intelligence pattern matching data stream decision helpingclassification correlation

Partner(s)

bull University of Luxembourg Dept of Computer Science and Commu-nication

bull SES Astra

104 Projects and Grants in 2012

Description Geostationary satellites are monitored from Earth to captureand react on anomalies A stream of sampled sensor information (telemetry)is downloaded by a ground control system which is processing and storing theinformation in dedicated databases which grow very large over the satellitelifetime (up to 20 years) The satellite engineers crew who is analyzing thisdata nevertheless take less than 10

Results My interest is on one hand to use the mathematical modellingcreated by the satellite engineers to optimize browsing into the telemetrydatabase and help in the pattern matching and classification that will belinked to the existing reports database On the other hand an artificialintelligence algorithm will use the classified patterns in order to correlate thereports with other events and provide analysis and decision helping elements

Publications in progress

An Incremental System to manage Conversational StreamsAcronym INACSReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding ULBudget NABudget UL F1R-CSC-LAB-05ILIADuration 2009-02-01 ndash 2013-01-14

Members Jayanta Poray Christoph Schommer Raymond Bisdorff ThomasEngel

Domain(s) Adaptive Systems Graph Theory and Modelling Chat Con-versation Computational Reputation

Partner(s)

bull Dept of Computer Science ILIAS Lab

Description The research project is inspired by the information process-ing mechanism of the human brain where every input signal is realisedprocessed and stored in a highly sophisticated manner The goal has beento develop a robust information processing system for text streams in theform of explorative and adaptive mind-graphs to use this structured infor-mation to fulfil textual conversational challenges between artificial agents

Results The thesis has been successfully submitted and defended(December 13 2012)

41 Research projects 105

Publications

1 J Poray and C Schommer Operations on Conversational Mind-Graphs In Proceedings of the 4th International Conference on Agentsand Artificial Intelligence pp 511-514 Vilamoura Algarve Portugal

Feature Extraction and Representation for Economic SurveysAcronym FERESReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding Internal Doctoral PositionBudget Internal Doctoral PositionBudget UL NADuration 2011-04-01 ndash 2014-03-31

Members Mihail Minev Christoph Schommer Theoharry GrammatikosUlrich Schaefer Philippe Karas

Domain(s) News Analytics Feature Extraction Course Volatilities EventClassification Trend Prediction

Partner(s)

bull Dept of Computer Science ILIAS Lab

bull Luxembourg School of Finance University Luxembourg

bull German Research Center for Artificial Intelligence (DFKI) GmbH

bull Thomson Reuters Finance SA

Description The study concerns the manifold news articles which re-flect the adjustments in the monetary policy during the financial crisis Inparticular we consider official decisions conducted by the Federal ReserveSystem but also information leaks in the press One goal of this work isto retrieve and quantify such information using modern pre-processing andtext mining techniques Further the implications of news on the stock mar-kets are examined by discovering and modelling composite index volatilitiesas functions of key announcements A model for the prediction of pricetrends is targeted which should reveal the economic value of informationHere an important aspect is the definition extraction and management oftopic-related features Keywords data projection feature selection newsclassification monetary policy stock markets

106 Projects and Grants in 2012

Results

bull Discovery of a strong evidence for a measurable link between eventsrelated to monetary policy and stock market volatilities

bull Proposal for a comparison framework of computer science projectswhich aim news classification and trend forecasting

bull Identification of information sources and sophisticated data character-istics

bull Design of a procedure model containing the data workflow and themilestones for the learning and the operational phase

bull Project presentation at the ldquoTrusted ICT for Financerdquo organized bythe Digital Enlightenment Forum Luxembourg

Publications

bull M Minev C Schommer T Grammatikos News and stock marketsA survey on abnormal returns and prediction models Technical Re-port August 2012

bull C Schommer and M Minev Data Mining in Finance PresentationTrusted ICT for Finance Luxembourg April 2012

Sentiment Classification in Financial TextsAcronym NAReference F2R-LSF-PFN-11ESCAPI Prof Dr Christoph SchommerFunding FNR COREBudget 500000Budget UL NADuration 2012-06-01 ndash 2015-05-31

Members Christoph Schommer Roxana Bersan Dimitrios Kampas An-dreas Chouliaras Theoharry Grammatikos Yannis Ioannidis

Domain(s) Computational Finance Sentiment Analysis Machine Learn-ing Text Mining Natural Language Processing

Partner(s)

bull Dept of Finance (Luxembourg School of Finance)

41 Research projects 107

bull Dept of Computer Science

bull University of Athens Dept of Computer Science

Description The work is part of the FNR CORE project ESCAPE ES-CAPE applies Data Mining and Machine Learning methods on publiclyavailable news sources to document in a measurable way the structure andevolution of Europersquos financial policy to address the on-going threat to theEuro-zone stability How do the important euro policy players present them-selves in the pallet of the policies map Are there subgroups with similarpositions How coherent are these groups among themselves Are theredominant players in each group How different are the different group posi-tions One expects that the euro players eventually will reach a consensuspolicy to stem the risk threatening the EURO Documenting in a measur-able way how the different policy positions converge over time should provideadditional insights into the complex process of (financial) policy evolutionFinancial policy ultimately affects capital markets but as the recent cri-sis has highlighted capital markets may force or extract policy concessionsUnderstanding the interplay of financial policy formulation and capital mar-ket ex-pectations therefore is extremely important for the effectiveness ofpolicy responses and eventually for the stability of the financial system ES-CAPE provides statistical evidence on whether capital markets lead or reactconcurrently to the financial policy evolution It is expected to shed lighton the powerful role of the ldquoinvisible handrdquo of capital markets in extractingdesired policies from politicians

The research topic that Mrs Bersan is addressing is sentiment analysisnamely identifying subjective information in the financial news We analyzea specific topic and assign this subjective information to a mathematicalindex in order to reflex its polarity orientation The techniques used are fromthe research fields of machine learning text analytics and natural languageprocessing

Results

bull We were concerned with masses of financial news data from Thom-son Reuters (gt 2TB) the understanding of the data structure themanagement of the data and its preprocessing

bull We have elaborated on and worked out Sentiment Classification indetail

bull Extensive Literature Review Sentiment Analysis (vs Opinion Min-ing Polarity Classification)

bull Paper writing which has led to a conference paper to be presented atICAART 2013 in Barcelona

108 Projects and Grants in 2012

Publications A first scientific paper will be published at ICAART 2013in Barcelona

Artificial Conversational CompanionsAcronym SPARCReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding NABudget NABudget UL NADuration 2011-04-01 ndash 2014-03-31

Members Sviatlana Danilava Christoph Schommer Gudrun Ziegler StephanBusemann

Domain(s) Artificial Companions Conversational Agents Models of In-teraction Interaction Profiles Long-Term interaction between human users

Partner(s)

bull University Luxembourg Dept of Computer Science and Communica-tion

bull University Luxembourg Dica Lab

bull German Research Centre for Artificial Intelligence Saarbruecken

Description The goal of the project is design and implementation of anArtificial Conversational Companion (ACC) which helps foreign languagelearners to improve their conversation skills In order to model a long-terminteraction with an ACC via instant messaging dialogue for conversationtraining it is necessary to understand how natural long-term IM interactionbetween human language experts (usually native speakers) and languagelearners works Data from chat dialogues between advanced learners of alanguage L as a second language(L2) and native speakers of L who rdquojust chatrdquofor a longer period of time were collected A data-driven model of long-term interaction is in focus in particular modelling of usersrsquo interactionprofiles including usersrsquo responsiveness behaviour and learnersrsquo languageWe use methods of conversation analysis (qualitative research) to developcomputational models of long-term human-machine interaction

Results

1 Data collection We initiated long IM dialogues (ca 30-90 minutes)

41 Research projects 109

between advanced learners of German as L2 and German native speak-ers for a prolonged period of time (4-8 weeks) The participants pro-duced in total 72 dialogues which correspond to ca 2500 minutes ofIM interaction ca 4800 messages with ca 52000 tokens in total andca 6100 unique tokens The average message length is 10 tokens

2 Data analysis We obtained the initial model of responsiveness profilesfor the learners We developed an initial annotation scheme for thelearners language We annotate the corpus according to the scheme

Other Activities

1 International Conference on Agents and Artificial Intelligence (Vilam-oura Portugal) presentation on ldquoArtificial Conversational Compan-ions - A Requirements Analysisrdquo

2 DICA-Lab PhD Day 2012 presentation on rdquoComputational Models ofInteraction Based on Empirical Data from Chat Dialoguesrdquo

3 Seminar with the participants of the data collection Vitebsk Belarus

4 Participation in intervention ldquoChercheurs a lrsquoecole 2012rsquorsquo

5 Participation in Foire de lrsquoEtudiant 2012 (Invited by Ministere delrsquoEgalite des Chances)

Publications

1 S Danilava Ch Schommer and G Ziegler (2012) Long-term Human-machine Interaction Organisation and Adaptability of Talk-in-interactionPoster presentation CHIST-ERA Conference Edinburgh Scotland

2 S Danilava S Busemann and Ch Schommer (2012) Artificial Con-versational Companions - A Requirements Analysis In Proceedings ofthe 4th International Conference on Agents and Artificial Intelligence282-289 Vilamoura Algarve Portugal

Energy-efficient resource allocation in autonomic cloud comput-ingAcronym ERACCReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2010-10-01 ndash 2013-09-30

110 Projects and Grants in 2012

Members Cesar Diaz

Domain(s) Computer Science Information Science Cloud ComputingGreen Computing Resource Allocation Optimization

Partner(s) NA

Description In the new era of Information Technologies (IT) and glob-alization massive computing power is desired to generate business insightsand competitive advantage for enterprises Traditionally enterprises processtheir data using the computing power provided by their own in-house datacentres However maintaining and operating a private data centre to keepup with the rapid growing data processing request can be costly and com-plicated Cloud Computing (CC) offers an alternative It is a concept thathas emerged out of the conception of heterogenous distributed computinggrid computing utility computing and autonomic computing It promisesto provided on-demand computing power with little maintenance quick im-plementation and low cost Nevertheless electrical power consumption hasbecome a major concern in CC systems

Results Models and algorithms are developed for the energy-efficient man-agement of processing elements that comprises a CC Based on the state ofthe art we have designed low complexity green scheduling heuristics thatexploit the heterogeneity of computing resources published in [295] Theseheuristics were designed to take into account scalability issues of the system[294]

In parallel research on opportunistic Desktop Grid Computing is conductedin conjunction with researchers from University of los Andes ColombiaSome techniques like DVFS ACPI DPM and virtualization are also consid-ered Moreover we are also investigating resource allocation and schedulingmodels [293]

Publications NA

Integrity Issues on the CloudAcronym IICReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2011-01-16 ndash 2013-01-15

41 Research projects 111

Members Jakub Muszynski

Domain(s) cloud computing distributed computing security integrityfault-tolerance

Partner(s) NA

Description A simple concept that has emerged out of the conceptionsof heterogeneous distributed computing is that of Cloud Computing (CC)where customers do not own or rent any part of the infrastructure Theysimply use the available services and pay for what they use This approachis often viewed as the next IT revolution similar to the birth of the Webor the e-commerce CC naturally extends grid computing Even if thislast domain attracted academic interest for several years it hardly caughtindustrial attention On the contrary CC arouse enthusiasm and interestfrom the same actors probably because it formalizes a concept that reducescomputing cost at a time where computing power is primordial to reachcompetitiveness Additionally the technology to interface such platforms isnow mature enough to make this concept a reality as initiated by some ofthe biggest vendors worldwide (Google Amazon etc)

To transform the current euphoria on CC into concrete investments andwide acceptance several security issues still need to be fixed In this con-text this PhD proposal focus on integrity and fault-tolerance aspects inthe CC paradigm in order to provide guarantees on programs and data ei-ther before during or after a run on the CC platform More generally theidea is to provide qualified and quantified measures of the confidence overthe resources used the execution conducted and the results returned to theuser This involves the design of novel protocols based on TPM (TrustedPlatform Modules) so as to provide trusted executions and migration pathfor the virtual environment deployed on the CC platform It also requirenew contributions in result-checking techniques middleware hardening andgame-theory based trust management

Results The general robustness analysis of distributed Evolutionary Al-gorithms (dEAs) against cheating faults and crash-faults (subject startedduring previous year) was finished with publication in Computers amp Math-ematics with Applications journal As a result conditions of convergenceor non-convergence of dEAs executed in malicious environment were givenHaving promising results from previous work currently it is being extendedby the experimental and theoretical analysis of running times of dEAs Theaim of the work is to quantify the overhead introduced by malicious acts onthe execution time Influence of underlying connection network between theworking nodes is also explored with the main focus on the P2P networks

112 Projects and Grants in 2012

Additionally a subject of generating hash functions by means of Gene Ex-pression Programming (GEP) was studied Journal paper as an extensionof conference paper (presented at the rdquoCryptography and Security Systems2013rdquo) is currently in preparation

Publications [40]

Energy-Efficient Information Dissemination in MANETsAcronym NAReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2009-09-15 ndash 2012-09-14

Members Patricia Ruiz

Domain(s) Communication Protocols Mobile Ad Hoc Networks Energy-Efficiency Optimisation

Partner(s) NA

Description Patricia Ruiz is working on broadcasting algorithms over adhoc networks indeed over both mobile ad hoc networks (MANETs) and ve-hicular ad hoc networks (VANETs) During the first year she developed anenergy aware dissemination protocol based on the state of the art distancebased broadcasting algorithm for MANETs For that she did a cross-layerdesign that informs the upper layers about the reception energy at the phys-ical layer Thus upper layers can use this information to take decisions inorder to outperform the performance of the protocol

During the second year she improved the previous version of her work butalso made several extensions including new features and optimizations tothe protocol originally proposed The candidate has been using multiobjec-tive metaheuristics approaches to optimize the parameters of the differentvariants of the protocol

Results We are developing communication algorithms for ad hoc networksMore precisely dissemination algorithms for both MANETs and VANETsIn [330] an study of the performance of a tree topology over a VANETwas presented and also a comparison of different broadcasting algorithmsover different topologies for both MANETs and VANETs Considering theintrinsic energy constrain of MANETs an energy aware broadcasting algo-

41 Research projects 113

rithm (EDB hereinafter) was proposed in [329] This protocol is configuredby a set of different parameters that must be tuned for obtaining a goodperformance In order to optimize EDB we are using some multiobjectivealgorithm cellDE for finding the best possible configuration in [307] Thisalgorithm gives a set of feasible solutions that optimize the performance ofthe protocol in terms of some predefined objectives In [284] a new ver-sion of EDB the Adaptive Enhaced Distance Based broadcasting protocol(AEDB hereinafter) was optimized in terms of the energy used the coverageachieved and the broadcasting time The solutions were analyzed and somehints were given to the designer for choosing the parameters for promotingone objective or another Moreover in [290] the Enhanced Distanced BasedBroadcasting algorithm (EDB) was improved by using some social knowl-edge of the network A community detection technique was used in orderto improve the coverage achieved by EDB in sparse networks Additionallythe parameters of the new protocol were also optimized in terms of the samethree objectives we mentioned before

Publications NA

Smartphone Malware detection and mitigation with Static codeAnalysisAcronym NAReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2011-10-15 ndash 2014-09-30

Members Kevin Allix (PhD)

Domain(s) Security code static analysis android malware detection soft-ware engineering techniques

Partner(s) NA

Description By leveraging Static code analysis methods our researcheffort aims at improving our ability to detect known and unknown malwareusing heuristics-based detection technichs and similarity computation withnew fingerprinting schemes

Results This a starting PhD No results yet but a state of the art

Publications NA

114 Projects and Grants in 2012

Access Control Architectures From Multi-objective Require-ments to DeploymentAcronym ACAReference NAPI Prof Dr Yves Le TraonFunding ULBudget NABudget UL NADuration 2011-02-01 ndash 2014-01-31

Members Donia El Kateb (PhD)

Domain(s) NA

Partner(s) NA

Description The subject of the PhD thesis is ldquoAccess Control Architec-tures From Multi-objective Requirements to Deploymentrdquo Todayrsquos infor-mation systems are becoming more and more heterogeneous and distributedthis has impacted software systems which become more and more complexAdditionally software systems are a target to many changes that occur atthe environment level requirement level or at the system level This raisesthe necessity to consider multi-level requirements at their design of softwarearchitecture like functional requirements performance requirements secu-rity requirements etc Among the security requirements access control isthe most deployed one An access control architecture implements the re-quirements and enforces a policy that satisfies the requirements This thesisconsiders policy-based access control architectures and aims to build a gen-eral framework that defines an access control architecture that is supposedto comply to multi-level requirements and to respect multiple competingquality attributes security performance and so forth These attributes in-teract and improving one often comes at the price of worsening one or moreof the others In this thesis we reason about architectural decisions thataffect those quality attribute interactions

bull RQ1 How to ensure the tradeoff between security and performancewhen designing an access control architecture

bull RQ2 How to automate policy specification to assist policy writers toavoid policies errors so that the policy is compliant with the require-ments

bull RQ3 How to test the secure deployment of the access control ar-

41 Research projects 115

chitecture its compliance with the policies and how to do that in anoptimized fashion

Results More specifically during this first year the student did a stateof the art on access control and on security requirement engineering Shestudied one of the issues related the standard access control architecturenamely the performance issue caused by bottlenecks She successfully pro-posed a new solution for solving this issue and developed an automated toolthat implements this approach and enables improving current access con-trol architecture In addition during her first years she did an interestingwork on policy enforcement points (PEP) localization In fact it is impor-tant to locate the PEP in order to understand how security mechanism areimplemented and provide a way to improve the performance This workwas actually complementary to the work that she did on performance im-provement She implemented this approach and applied it successfully tothree case studies This work is under submission and will be submittedsoon She conducted this work in collaboration with Prof Tao Xie team(from North Carolina State University USA) who helped by providing casestudies used in the experiments The results were very promising since theperformance was improved up to 10 times This work has been submittedto ICPE conference and will appear in 2012

Publications NA

415 Other miscellaneous projects

Enterprise security for the banking and financial sectorAcronym BCEEReference I2R-Net-Pau-11PS2CPI Prof Dr Thomas EngelFunding BCEEBudget 204KeBudget UL NADuration 2011-04-01 ndash 2012-03-31

Members T Engel A Zinnen

Domain(s) security for the banking and financial sector

Partner(s) BCEE

116 Projects and Grants in 2012

Description Although many companies seem to approach the cloud com-puting paradigm at a faster pace the financial sector still remains an excep-tion Selling cloud computing to financial services companies seems prob-lematic The sector is known for its reluctance to give up control overoperations Additionally this area is characterized by a high number oflaws and regulations In Luxembourg banks are for example constrainedby law to store data within the country This fact contradicts the conceptof cloud computing in its current development The biggest challenge andkey success point in the implementation of cloud computing in the financialsector will be the assurance of safety policies

In Luxembourg this topic is a subject of special interest Resource poolingamong companies with similar interests would save administrative costs Onthe basis of a cloud environment banks could completely put their focus ontheir core competence However an open question is what steps will benecessary in order to achieve this goal In any case it will be important tofurther invest in research to fulfill the seven introduced security challengesA pilot project in cooperation with the Interdisciplinary Centre for SecurityReliability and Trust (SnT) provides preliminary work and an analysis of aframework to migrate financial services to cloud computing This work isdiverse and addresses both the identification of necessary research topics andthe exploration of services that might run in the cloud This evaluation isbased on a comparison of benefits versus riskschallenges for specific servicesA dialogue with legal and audit institutions as well as a discussion withsoftware providers will be a first step towards a framework for the financialcloud in Luxembourg

Results So far we have evaluated the protection of state-of-the art anonymiza-tion networks Anonymization networks such as Tor and JAP claim tohide the recipient and the content of communications from a local observerie an entity that can eavesdrop the traffic between the user and the firstanonymization node Especially users in totalitarian regimes strongly de-pend on such networks to freely communicate For these people anonymityis particularly important and an analysis of the anonymization methodsagainst various attacks is necessary to ensure adequate protection Weshowed that anonymity in Tor and JAP is not as strong as expected so farand cannot resist website fingerprinting attacks under certain circumstancesWe defined features for website fingerprinting solely based on volume timeand direction of the traffic As a result the subsequent classification be-came much easier We applied support vector machines with the introducedfeatures We were able to improve recognition results of existing works on agiven state-of-the-art dataset in Tor from 3 to 55 and in JAP from 20to 80

The datasets assume a closed-world with 775 websites only In a next step

41 Research projects 117

we transferred our findings to a more complex and realistic open-world sce-nario ie recognition of several websites in a set of thousands of randomunknown websites To the best of our knowledge this work is the first suc-cessful attack in the open-world scenario We achieve a surprisingly hightrue positive rate of up to 73 for a false positive rate of 005 Finally weshowed preliminary results of a proof-of-concept implementation that ap-plies camouflage as a countermeasure to hamper the fingerprinting attackFor JAP the detection rate decreases from 80 to 4 and for Tor it dropsfrom 55 to about 3

Publications Two conference publications [267] [266]

EPT Vehicular NetworksAcronym EPTVReference I2R-DIR-PAU-09EPTVPI Prof Dr Thomas EngelFunding EPTBudget 2 298 KeBudget UL NADuration 2010-01-01 ndash 2014-12-31

Members Thomas Engel Raphael Frank Marcin Seredynski

Domain(s) Vehicular Ad Hoc Networks

Partner(s) Entreprise des Postes et Telecommunications Luxembourg -EPT

Description A standard for vehicular ad hoc networks is expected during2011 In 2025 0 of the vehicle fleet within Europe is predicted to ap-ply to the standards enabling new services and application A main goalwill be to increase traffic safety and reduce the environmental impact ofthe vehicular transportation system The vision of the proposed researchproject is to develop efficient secure and reliable communication networksto enable the transformation of the vehicular transport system of today toa greener smarter and safer system Recent advances in sensor technologylow power electronics radio-frequency devices wireless communications se-curity and networking have enabled the engineering of intelligent vehiclesandintelligent transport infrastructure which have the potential to drasticallyincrease road safety decrease cost of transportation and contribute to a sus-tainable environment This research will address 3 main areas of vehicularnetworks 1) Sensor and Mobile Ad Hoc Networks 2) Embedded Systemsand 3) Applications and Services

118 Projects and Grants in 2012

Results NA

Publications NA

PIL to SPELL conversionAcronym Pil to SPELLReference I2R-NET-PAU-11PS2CPI Prof Dr Thomas EngelFunding SES-ASTRABudget Not applicableBudget UL NADuration 2011-01-28 ndash 2015-01-27

Members Thomas Engel Frank Hermann b Braatz

Domain(s) Satellite control language

Partner(s) SES-ASTRA

Description Until now satellite vendors operate their satellites in theirown satellite control languages which are restrictive proprietary dependenton 3rd party software and very heterogeneous As a consequence SES de-veloped SPELL (Satellite Procedure Execution Language and Library) as aunified and open-source satellite control language usable for each satellitevendor In order to migrate the existing procedures delivered by the man-ufacturer Astrium SES requested for an automated translation that takesAstrium PIL procedures as input and generates equivalent SPELL proce-dures This translation has to guarantee a very high standard regardingcorrectness and reliability in order to minimize the need for revalidation ofthe generated SPELL procedures

Results Fully automated translator from PIL to SPELL (project P1)

a SES and Astrium engineers successfully tested the generated SPELLprocedures - more than 15 man month of testing from 2011-12 till 2012-05

b First planned operational use for a satellite to be launched in 2nd halfof 2012

Publications 8 Related Publications 5 Journal papers 2 conferencepapers 3 technical reports

41 Research projects 119

INTERCNRSGDRI1102 Algorithmic Decision TheoryAcronym AlgoDecReference F1R-CSC-PFN-11ADECPI Prof Dr Raymond BisdorffFunding FNR ULBudget 11 000 eBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members P Bouvry Ch Schommer U Sorger L van der Torre

Domain(s) Algorithmic Decision Theory is a research area developed atthe edge of several disciplines including Operational Research Decision the-ory Computer Science Mathematics Cognitive and the Social Sciences

Partner(s)

bull CNRS France

bull Universite Paris-Dauphine France

bull Universite Pierre Marie-Curie France

bull Universite drsquoArtois France

bull Universite de Mons Belgique

bull FNRS Belgique

bull ULB Belgique

bull FNR Luxembourg

bull Uniersidad Rey Juan Carlos Spain

bull DIMACS USA

Description Its aim is at developing formal and analytical methods andtools in order to improve decision making in and for complex organiza-tions in presence of hard algorithmic challenges It also aims at establishinga comprehensive methodology aiding real decision makers within the realworld to better understand the problem situations where they are involvedshape analyze an explore the possible actions that can be undertaken andultimately help to make better decisions The founding partners of the AL-GODEC Network established by the present Agreement have more than 20years of joint research activities resulting in joint PhDs papers books andresearch projects (both client and knowledge driven) Today they represent

120 Projects and Grants in 2012

a leading force worldwide in the area of Decision Sciences and TechnologiesThe ALGODEC Network is expected to create synergy in order to organizejoint doctoral courses promote the co-tutoring of PhD students promotemobility of early stage and experienced researchers promote the joint impli-cation of cross-members teams to client-driven research contracts organizejoint seminars act as a unique reference in fund raising

Results NA

Publications NA

Developing a Prototype of Location Assurance Service ProviderAcronym LASPReference ESA Bidder Code 52056PI Prof Dr Sjouke MauwFunding ESA - SnTBudget 160000e (ESA)Budget UL 80000e (SnT)Duration 2010-12-08 ndash 2012-12-07

Members Sjouke Mauw Jun Pang Xihui Chen Gabriele Lenzini

Domain(s) location assurance privacy of location assurance locationbased services GNSS network security

Partner(s) itrust Luxembourg

Description The objective of this project is to develop a prototype toprovide a high quality level of assurance in the location information thatoriginates from the GNSS network while protecting location owners fromintrusions into their privacy We approach these objectives from five per-spectives Analysis The objective is to precisely describe the requirementsthe execution and threat models the trust relations and the assumptionson the environment Design The objective is to design an architecture forlocation information assurance and to develop data protection algorithmsand decision logic to find out the appropriate assurance level of the loca-tion information The protocols devoted to security and privacy are alsodeveloped and integrated in a service architecture Verification The objec-tive is to analyse the result of decision logic in presence of an attacker andevaluate the quality of the output of the designed algorithms Moreoverbased on existing formal verification approaches a verification methodologywhich considers trustworthiness of the service together with user privacy willalso be studied Validation The objective is to set up the LAP prototypeand perform a set of laboratorial tests in order to assess the overall perfor-

41 Research projects 121

mance The robustness and performance is optimized through parametertuning Exploitation The objective is to define risk management principlesand prepare a strategy that should apply to assure the requirements in alargest deployment of the solution

Results The project was accomplished in this December 2012 and theevaluation meeting will be carried out in February 2013 So far the projectteam has submitted all the reports required by ESA and these documentshave been approved and accepted by the agency A Luxembourgish PatentApplication which describes the design of the localization assurance providerhas been successfully filed

Publications NA

Combine Software Product Line and Aspect-Oriented SoftwareDevelopmentAcronym SPLITReference F1R-CSC-PFN-09SPLIPI Prof Dr Nicolas GuelfiFunding ULFNRBudget 41 000eBudget UL NADuration 2009-10-01 ndash 2012-09-30

Members Nicolas Guelfi Alfredo Capozucca Jean-Marc Jezequel OlivierBarais Benoit Baudry Benoit Ries Vasco Sousa

Domain(s) Software Engineering Model Driven Engineering SoftwareProduct Line Aspect Oriented Modeling Model Composition UML

Partner(s)

bull CNRSINRIA University of Rennes France

bull Public Research Center Gabriel Lippmann

Description Software engineering proposes practical solutions founded onscientific knowledge to produce and maintain software with constraints oncosts quality and deadlines The complexity of software increases dramati-cally with its size A challenging trade-off for software engineering exists ina reality where the amount of software in existence is on average multipliedby ten every ten years as against the economic pressure to reduce devel-opment time and increase the rate at which modifications are made Toface these problems many of todayrsquos mainstream approaches are built on

122 Projects and Grants in 2012

the concepts of Model-Driven Engineering (MDE) Software Product Line(SPL) or Aspect-Oriented Software Development (AOSD) to foster softwarereuse In an emerging MDE context SPL and AOSD share the common ob-jectives to reduce the cost and the risk of adapting software systems to wideranges of new contexts On the one hand SPL techniques allow the model-ing of product variability and commonalities A SPL development approachstrongly depend on a composition mechanism supporting product deriva-tion from the SPL definition at any level of abstraction (analysis designimplementation ) On the other hand AOSD proposes new techniquesto compose and weave separate concerns which can represent features butAOSD does not propose mechanism to manage the variability of softwareThus both approaches complement each other and the combination of SPLand AOSD paradigms provides an exciting challenge allowing the use of ef-ficient product lines through the whole software development lifecycle Thiscollaboration aims at investigating further the complementarities betweenSPL and AOSD approaches in a MDE context This should make it possi-ble to discover entirely new ways of formally decomposing and recomposingsoftware systems at a much higher level of abstraction than anything thatis available today (notion of modularity based on classes and components)In order to do so several main technical areas must be addressed

bull Identify the common concepts and the difference between SPL andAOSD to combine the both approaches

bull Study the special activity of horizontal model transformation in thecontext of SPL and AOSD methodologies and to propose a transfor-mation language to support them

bull Provide rigorous and generic means to guaranties the consistency be-tween models through aspect weaving and product derivation

bull Build a generic AOM weaver with built-in variability mechanism todrive runtime adaptation

The problems inherent to this research project are in the heart of the soft-ware engineering problems such as model composition model transforma-tion model evolution model reusability model consistency etc

Results

bull Analysis of tools and procedings for the development of the genericAOM approach toolnamely analysing and testing the requirements forintegration as eclipse plug-in for tool deployment compatability of thiscompatibility requirements with the test projects already developed inKermeta and Drools

42 Grants 123

bull Development and specification of the Aspect metamodel composedof Pointcut information and Advice including specification alterna-tives to be tested during tool development for acersion of the best andclearest specification approach

bull Development and specification of a meta-model for internal informa-tion exchange within the several steps of the AOM tools execution

Publications NA

42 Grants

421 AFR

Multimedia Sensor NetworksAcronym AFR Grant PhD-09-188Reference I2R-DIR-AFR-090000PI Prof Dr Thomas EngelFunding FNR-AFRBudget 37KeBudget UL NADuration 2010-04-01 ndash 2013-03-31

Members Thomas Engel Radu State Alexander Clemm Stefan Hommes

Domain(s) anomaly detection network security rare event detection

Partner(s)

bull PampT Luxembourg

bull CISCO USA

Description Security officers monitoring security cameras face problemswith boredom and subsequent inattentiveness Critical events such as in-trusions can be missed While traditional surveillance systems store thedata recorded by cameras on hard disks examining the videos after a crimehas been committed is too late Together with PampT Luxembourg SnT de-velops in this project techniques for automated video surveillance with IP

124 Projects and Grants in 2012

network cameras The advantage Security officers can be alerted immedi-ately at critical moments and defensive actions can be initiated Automatedvideo surveillance techniques will be designed to detect and track objects in ascene to recognise normal activities in a scene and to differentiate anomalousfrom normal activity patterns Supervised and unsupervised learning usingthe video data will be applied to classify scenes as normal and suspiciousSpecial algorithms will be adopted or developed to detect the patterns ofobjects in the image control charts will raise an alarm when certain param-eters are out of the normal range Finally the spatial-temporal behaviourof an object in a scene will be analysed to gain more information aboutan activity Combining such analytical techniques will result in improvedintrusion detection and better support for security personnel The projectwill also address privacy issues at a high level to assure personal rights inpublic space Background of this project is that PampT Luxembourg wantsto replace its currently installed security network with IP network camerasin its main buildings and at other sites in Luxembourg The collaborationwith SnT guarantees the combination of an economically relevant highlyinteresting scientific question with cutting edge basic research

Results

bull Online-detection of a scene with self-tuning of all system parameters

bull Control charts for classifying a sequence of correlated images

bull Development of an open-source prototyp for an automated video surveil-lance solution

Publications 1 peer-reviewed conference [275]

Mashups in Clouds combined with Sematically enriched Infor-mation SetsAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding AFR-PHD-09-029Budget NABudget UL NADuration 2009-07-01 ndash 2013-06-30

Members Bernd Klasen (PhD candidate) Steffen Rothkugel (supervisor)

Domain(s) mashups cloud computing satellite communication

42 Grants 125

Partner(s)

bull SES Astra

bull Universitat Trier

Description This project implements and analyzes mashups - new ser-vices based on seamless composition of existing ones - running and beingcreated inside computing clouds The latter provides soft- and hardware asan abstract service which offers a high computational power that can beaccessed via specified interfaces while the internal - possibly heterogeneous -infrastructure is hidden This approach is supposed to overcome limitationsof existing (clientserver-based) solutions which suffer from performancedegradation Furthermore it will be investigated how users can be assistedduring the mashup creation process by automatic suggestions based on col-laborative filtering approaches and ontologies The result will be a platformprototype that enhances possibilities for end users as well as for enterprisessince it eases the service-creation process thus reduces time-to-market andwill liberate a multitude of new services Running this system on a scalableinfrastructure - a cloud - ensures availability and short response-times evenon unexpected peak loads

Results NA

Publications 2 publications in 2011 one journal [351] and one peer-reviewed conference [361]

Trusted Location Services for Managed Community NetworksAcronym UL TelindusReference I2R-DIR-PAU-10TSCNPI Prof Dr Thomas EngelFunding AFR-PPPBudget 574KyearBudget UL NADuration 2010-04-01 ndash 2014-03-31

Members T Engel Y Nesius

Domain(s) Computer Science and Informatics

Partner(s) Telindus

Description The Objective of this work will be the integration of pri-vately owned access points into a managed wireless outdoor mesh network

126 Projects and Grants in 2012

Community features like incentive schemes shall be added to the network toallow an extension of the network in terms of coverage by reusing existinginfrastructure The managed outdoor network supports passive localisationThat is the wireless mesh access points are able to locate the position ofa signal emitting device This location is assumed as trustworthy as thewireless infrastructure is controlled and managed by a single trustworthyentity This can not be assumed anymore if privately owned access pointsare added to the network as then private peoplersquos access points are involvedinto the location determination process They may manipulate the signallingor just try to replace their node The contribution of this work will be tore-establish the trustworthiness of this localization service while supportingthe integration of 3rd party access points The project will build upon anexisting mesh network Real world estimates are done to measure a privateuserrsquos potential impact on the localization process and how this can be de-tected and to what extend it can be detected and potentially masqueradedeg by using information from nearby nodes or by involving other sourcesfor location information

Results NA

Publications NA

Spectrum sensing- Resource re-allocation and Spectrum man-agement strategies for satellite cognitive RadioAcronym SaCoRadReference 12R-DIR-AFR-090000PI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2011-10-15 ndash 2014-10-14

Members Shree Krishna Sharma Bjorn Ottersten

Domain(s) Security Reliability and Trust in Information Technology

Partner(s) SES

Description In this project the problem of enhancing the efficiency ofspectrum usage rather than exploring new spectrum bands for new serviceshas been considered Satellite cognitive radio has been proposed as mainresearch domain The problem of finding out innovative spectrum sens-ing resource re-allocation and resource management strategies for satellitecognitive radio is the main research topic of this proposal This research

42 Grants 127

work will mainly focus on investigating advanced techniques to improve theperformance of satellite users in different wireless environments as well asincreasing the resource usage efficiency in hybridintegrated Platform

Results NA

Publications NA

Sensor Fusion-Combining 3D and 2D sensor data for safety andsecurity applicationAcronym Sensor FusionReference 12R-DIR-AFR-090000PI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2008-07-08 ndash 2012-07-07

Members Frederic Garcia Bjorn Ottersten

Domain(s) Sensor fusion

Partner(s) IEE

Description Recently 3D-cameras based on the lime-of-flight principlehave been developed to allow capturing range images of a scene The ben-efit of such a 3D-camera is that it enables the robust segmentation andlocalization of objects in 3D-space Objects can be classified based on theircontour thus independently on the light condition and the texture of theobject which IS crucial for safety critical applications

A general drawback of time-of-flight 3D-cameras IS however their low res-olution being approximately a factor 100 below the resolution of standard2D-imager and limited in frame rate compared to video rate These draw-backs limit the field of applications for 3D-cameras An approach to over-come the limitations of the low resolution is to combine a 3D-camera with ahigh resolution imager and to perform a fusion of the data on software level

The core of the project will be the development and elaboration of methodsfor image fusion targeting on increasing the spatial resolution of the 3Dimage and at the same improve the depth precision of the range informationThe elaboration of these methods will be done based on real data acquiredby a first prototype camera to be building up using an existing 3D cameraThe project both comprises the elaboration and development of entirelynew mathematical concepts as well as the implementation of the methods

128 Projects and Grants in 2012

for real-time applications Mathematical modelling of the camera behaviouris addressed and the development of tools for calibration

Results Best student paper award at the IEEE7th international Sympo-sium on Image and Signal Processing and Analysis (ISPA 2011) in Dubrovnik(Croatia) PhD Thesis March 2012

Publications NA

Investigation of boundary conditions for a reliable and efficientcontrol of energy systems formed by highly parallelized off-gridinvertersAcronym RELGRID2009Reference NAPI Prof Dr Juergen SachauFunding FNR-AFR-PhDBudget NABudget UL NADuration 2010-04-01 ndash 2013-03-31

Members Markus Jostock

Domain(s) NA

Partner(s)

bull CREOS

bull U Kaiserslautern

Description The work aims at providing a model which will allow pre-diction of stability for highly dynamic grids From the control perspectiveconnecting several stable components will no necessarily result in a stableoverall structure particularly when each of the components has a highlydynamic behaviour To avid hazardous interdependencies of coupled dy-namics control specifications for the single inverter controls are sought thatguarantee reliable cooperation

Results NA

Publications NA

42 Grants 129

Methods for Measuring and Predicting the Security Perfor-mance Reputation of Public NetworksAcronym SCoPeMeterReference 12R-NET-PAU-11MSRPPI Prof Dr Thomas EngelFunding FNR-AFR RedDogBudget NABudget UL NADuration 2011-03-22 ndash 2015-03-21

Members Thomas Engel Fabian Lanze Andriy Panchenko Jerome Fran-cois

Domain(s) Security Performance Wireless Networks Fingerprinting Hotspots

Partner(s)

bull Interdisciplinary Centre for Security Reliability and Trust UL

bull Red Dog Communications sa

Description In recent years the usage of Internet based services shiftedfrom fixed workplaces to mobile environments Wireless access points areavailable almost everywhere and users tend more and more to carry outonline activities on mobile devices such as smart phones or tablets This at-tracts potential attackers since most users neglect the risk of eavesdroppingdata manipulation or the possibility of an access point being controlledby a malicious entity Besides the performance of hotspots can differ sig-nificantly making it difficult for users to chose an intermediary fulfillinghisher particular requirements The goal of this project is to build a secu-rity and performance barometer system that provides long-term judgmentof hotspots regarding their performance and security reputation Informa-tion will be contributed to this system by data automatically collected andderived from a userrsquos mobile device application and userrsquos experiences Sev-eral research challenges arise from this A technique for uniquely identifyingwireless devices without trusting any third party is essential to make surethat connection is established to an authentic device Metrics for measur-ing performance and trustworthiness have to be defined in order to analyzequality of service and reputation of public networks This will be done in away that protects privacy of the clients reporting the values and at the sametime guards from malicious clients trying to subvert the system Finally wewill study the possibility to offer privacy-preserving location based servicesusing the available data In the proposal we describe the methodology howwe plan to reach our research objectives and to develop a practically usablesecurity and performance barometer for public wireless networks

130 Projects and Grants in 2012

Results The major result of this project so far is a large-scale evaluation ofunique device fingerprinting based on the unavoidable physical phenomenoncalled clock skew The method is fully implemented and can be performed onarbitrary out-of-the-box UNIX based systems It was evaluated using morethan 350 different wireless access points The resulting paper ldquoClock SkewBased Remote Device Fingerprinting - Demystifiedrdquo(FLanze APanchenkoBBraatz AZinnen) is currently under review for ACM Conference on Se-curity and Privacy in Wireless and Mobile Networks (ACM WiSec rsquo12)

Publications Three conference publications in 2011 [277] [276] [281]

Energy Optimization and Monitoring in Wireless Mesh SensorNetworksAcronym WiNSEOMReference I2R-DIR-AFR-090000PI Prof Dr Thomas EngelFunding FNR - AFR PhDBudget 37KeYearBudget UL NADuration 2010-04-08 ndash 2013-04-07

Members David Fotue Thomas Engel Houda Labiod Foued MelakessouSunil Kumar and Prasant Mohapatra

Domain(s) Wireless Sensor Networks

Partner(s) - Telecom ParisTech France- University of San Diego USA- University of California Davis USA- Ville du Luxembourg- Service de Coordination Hotcity

Description Air pollution is now considered as an important issue thatneeds to be treated as a critical phenomenon It belongs to a set of crucialphysical factors that drastically decrease peoplersquos health of human beingsIn this proposal we aim to deploy an efficient monitoring architecture ded-icated to Air Pollution in Luxembourg based on Wireless Sensor Networks(WSNs) WSNs have been the subject of much recent study and are a po-tential solution for the deploymentof measurement architectures at low costThey allow the measurement of data and their transmission towards a cen-tral workstation often called the sink in an efficient manner Currentlyair pollution monitoring is done locally over a small area The deployment

42 Grants 131

of a large set of sensors enables better mapping of pollution occurrencesat a higher measurement frequency Optimal communication in WSNs iscurrently a hot research topic For instance during the last ten years re-searchers have suggested many routing protocols in order to optimize datatransfer between network nodes We propose new routing protocols and for-warding mechanisms that increase network lifetime through the set of routediversity and efficient energy management schemes A set of maximally dis-joint paths between each sensor and the sink can partially or completelyavoid the appearance of congestion in the network The residual energy ofsensors is also taking into account our model Consequently data packetswill be forwarded towards candidates that present the widestcapabilities andhave the greatest residual energy Consequently global traffic will be spreadalong non-overlapping paths in order to increase the global WSN lifetimeThe PhD work consists of the analysis of this energy routing protocol in thecase of a real scenario that will be deployed in Luxembourg for air pollutionanalysis

Results After a study of the state of the art in the area of WSNs forenergy optimization we proposed A new Energy Conserving Routing Pro-tocol that aims to optimize the transmission cost over a path from a sourceto a defined destination in a Wireless Sensor Network The results appearsin proceedings of the 9th IEEEIFIP Annual Mediterranean Ad Hoc Net-working Worshop France 2010 New Aggregation Techniques for WirelessSensor Networks have been proposed the results appears in proceddindsof the 18th Annual Meeting of the IEEEACM International Symposiumon Modeling Analysis and Simulation of Computer and TelecommunicationSystems(MASCOTS) USA 2010 3 We study the effect of Sink Locationon Aggregation based on Degree of connectivity for Wireless Sensor Net-works The results are under reviews at the First International Workshopon Advanced Communication Technologies and Applications to Intelligenttransportation systems Cognitive radios and Sensor networks(ACTIS) Ko-rea 2011 4 We proposed a new Hybrid method to assign the channelfor Wireless Sensor Networks The results are under reviews at the 9th In-ternational Symposiumon Modeling and Optimization in Mobile Ad Hocand Wireless Networks(WiOpt) USA 2011 5 Finally we concluded allinvestigations done this year by submitting a journal paper at EURASIPJournal on Wireless Communications and Networking in the special issuerdquoLocalization in Mobile Wirelessand Sensor Networksrdquo

Publications Four related publications [276 277 364 365]

132 Projects and Grants in 2012

Information Extraction from Legislative TextsAcronym IELTReference NAPI Prof Dr Leon van der TorreFunding FNR AFR PHDBudget NABudget UL NADuration 2012-03-01

Members Llio Humphreys

Domain(s) Legal informatics Ontologies Information extraction Norms

Partner(s) Guido Boella University of Turin

Description With the growth of the internet laws can now be easilyaccessed by most citizens but with normative production increasing at Eu-ropean national and regional levels citizens and organisations need moreadvanced tools to understand the law within their domain of interest Legalinformatics is a growing field of research Legislative XML legal ontolo-gies and reasoning for normative systems have reached a point of maturityHowever building such resources beyond narrow applications involves a pro-hibitively expensive level of manual effort Advances in natural languageprocessing tools such as part-of-speech taggers and parsers the growingusage of statistical algorithms for handling uncertainty and the availabil-ity of semantic resources such as WordNet and FrameNet has resulted inrobust information extraction tools Information extraction for law is anunder-researched area Legal text particularly legislative text has partic-ular features that pose significant challenges - long sentences with severalclause dependencies lists where each item are usually not standalone sen-tences and references to other articles the content of which is not quotedwithin the referring article This research investigates the transformation oflegislative text into normalized sentences representation in formal logic andinformation extraction for ontologies

Results My first year in the doctoral programme has mainly involved for-mal and informal study of relevant topics at the Universities of LuxembourgTurin and Delft as well as publications on legal informatics and complianceCourses in transferable skills have been omitted in this account

bull study of propositional logic belief revision and dynamic epistemiclogic information extraction and data mining in Luxembourg andof the Pi-calculus in Turin

bull essay on Theory Change and Law

42 Grants 133

bull research visit to Joris Hulstijn University of Delft for the study ofcompliance monitoring systems

Publications

bull Conference papers

ndash [81][82][253]

bull Book chapter

ndash [83]

Security LogicsAcronym LOSECReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding FNR-AFRBudget NABudget UL NADuration 2009-09-01 ndash 2012-09-01

Members Valerio Genovese

Domain(s) Authorization Access Control Modal Logic

Partner(s) NA

Description Access Control Authorization and Authentication are main-stream topics in computer science security that can be grouped under thenotion of rdquotrust managementrdquo In an increasingly interconnected world secu-rity policies are evolving from a static disconnected environment to a highlydynamic and distributed one (eg Internet Social Networks)

The main aim of this project is to create a formal and expressive logicthrough which computers can reason to grant access to external entitiesand users can model and specify in a clear and explicit way what are thepolicies which govern their systems The new logic we plan to develop deeplyextends and enrich existing approaches appeared in the literature We alsoplan to create a calculus for this logic in order to define an efficient algorithmto automatize the reasoning process for large scale applications From themodelling point of view we aim to define a model checking methodology toassist ICT security officers in crafting secure and stable systems

Results

134 Projects and Grants in 2012

bull Seq-ACL+ (software)

bull ACL-Lean (software)

bull delegation2spass (software)

bull macl2spass (software)

bull secommunity (software) available at httpwwwdiunitoit~genovesetoolssecommunitysecommunityhtml

Publications [10][242]

Valerio Genovese Modalities for Access Control Logics Proof-Theory andApplications University of Luxembourg 2012

Programming Cognitive RobotsAcronym ProCRobReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding FNR-AFRBudget NABudget UL NADuration 2011-05-20 ndash 2014-05-20

Members Pouyan Ziafati

Domain(s) Agent Programming Languages Robotics

Partner(s) Mehdi Dastani Utrecht University

Description The ProcRob project aims at extending existing agent pro-gramming languages with sensory and action components to support theirapplication in autonomous robot programming

Results

bull The requirements of agent programming languages for autonomousrobot programming have been identified and presented in the ProMASworkshop of the AAMAS 2012 conference and published in the BNIAC2012 conference [84]

bull An environment software library for 2APL agent programming lan-guage has been developed which facilitates its integration with ROSthe current de facto standard robotic framework

42 Grants 135

bull A face recognition software package for ROS has been developed andreleased publicly

bull A demo application of NAO robot using 2APL and ROS has beendeveloped In this demo NAO can recognize faces and be controlledby voice A more complex demo application for NAO is under thedevelopment including path planning while avoiding obstacles

bull A more detailed analysis of the agent programming languages require-ments for event processing in autonomous robot programming has beenperformed and a software library for addressing such requirements iscurrently under the development The result has been submitted toAAMAS 2013 In this work an extension of ETALIS event process-ing language has been proposed to develop sensory components for anautonomous robot

Publications [84]

Trust in argumentation-based negotiationAcronym TABNReference F1R-CSC-LAB-05ILIAPI Dr Srdjan VesicFunding FNR-AFR-PostdocBudget NABudget UL NADuration 2012-10-01 ndash 2013-01-14

Members Srdjan Vesic

Domain(s) Argumentation Negotiation Trust

Partner(s) NA

Description he goal of the project was to study the notion of trust inargumentation-based negotiation in particular to study the notion of n-aryattack relations

Results Due to the early termination of the contract only its first partwas finalised It was to study the notion of n-ary attack relations Thischallenge was selected as the first research objective since existing argu-mentation systems rely on binary attack relations and I believe that a moregeneral framework allowing for ternary (or more) attack relation is necessaryin argument-based negotiation I worked on this problem with Dr MartinCaminada We plan to finish the work and submit it to an international

136 Projects and Grants in 2012

journal

I also worked with Dr Madalina Croitoru (University of Montpellier II) oncreating an argumentation framework for reasoning in the scenario whereseveral agents have individually consistent ontologies but the union of allthe ontologies is inconsistent This argumentation formalism can be used byagents to negotiate ie to send only some data from their ontology in form ofarguments (compared to the existing approach where the union of ontologiesis created in a centralised place) This is a step forward considering theprivacy and the notion of trust in this type of negotiation is to be carefullystudied

Publications Some papers were submitted

Logical Approaches for Analyzing Market Irrationality compu-tational aspectsAcronym LAAMIReference I2R-DIR-AFR-090000PI Prof Dr Leon van der TorreFunding FNR-AFRBudget 117 840eBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members Mikoaj Podlaszewski Martin Caminada Tibor Neugebauer

Domain(s) market efficiency finance epistemic reasoning

Partner(s) Luxembourg School of Finance

Description The proposed PhD project is to be carried out in closecooperation with the recently approved LAAMI (CORE) project (LogicalApproaches for Analyzing Market Irrationality) which aims to apply theparadigm of agent-based computational economics (Tesfatsion and Judd2006) to model complex reasoning processes in a market setting Basicallywe assume a market in which the main product is information and com-plex analysis on an issue that does not provide immediate feedback fromthe objective world We are interested in examining under which conditionsthe information providers (consultants) have sufficient incentives to providegood quality analysis to their clients The preliminary results of a prototypesoftware simulator (Staab and Caminada 2010) as well as other research(Mathis et al 2009) indicate that these incentives are not always strongenough to rule out providing low quality information If such becomes thepervasive strategy of the consultants there are consequences regarding the

42 Grants 137

informedness not only of individual information consumers (clients) but alsofor the system as a whole since unfounded collective beliefs can easily leadto various forms of market imperfections In essence we would like to ex-plain these market imperfections by examining how markets can becomeill-informed For this we use the technique of agent-based simulation Thespecific role of the PhD student will be to focus on implementation aspectsas well as on aspects of computability and bounded rationality of individualagents

Results

bull In [55] we examined an argument-based semantics called semi-stablesemantics which is quite close to traditional stable semantics in thesense that every stable extension is also a semi-stable extension Oneadvantages of semi-stable semantics is that for finite argumentationframeworks there always exists at least one semi-stable extension Fur-thermore if there exists at least one stable extension then the semi-stable and the stable extensions coincide Semi-stable semantics canbe seen as a general approach that can be applied to abstract ar-gumentation default logic and answer set programming yielding aninterpretation with properties similar to those of paraconsistent logic

bull In [165] we introduced a unified logical approach based on QuantifiedBoolean Formulas (QBFs) that can be used for representing and rea-soning with various argumentation-based decision problems By thiswe were able to represent a wide range of extension-based semantics forargumentation theory including complete grounded preferred semi-stable stage ideal and eager semantics Furthermore our approachinvolved only propositional languages and quantifications over propo-sitional variables making decision problems like skeptical and cred-ulous acceptance of arguments simply a matter of logical entailmentand satisfiability which can be verified by existing QBF-solvers

bull One of the differences between the fields of dialogue theory and thefield of (Dung-style) argumentation is that the former is mainly con-cerned with procedural aspects of discussion whereas the latter ismainly concerned with the results of a nonmonotonic reasoning pro-cess Nevertheless one can use dialogue theory as a conceptual basisfor Dung-style argumentation semantics The idea is that an argu-ment is accepted if and only if it can be defended in formal dialogueMoreover different argumentation semantics can be shown to coincidewith different types of dialogue In [151] we showed that groundedsemantics can be described in terms of persuasion dialogue providingan implementation of this dialogue in [150]

138 Projects and Grants in 2012

Publications [55] [165] [151] [150]

Green Energy-Efficient ComputingAcronym Green EECReference PDR-09-067PI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2010-04-01 ndash 2012-03-31

Members Alexandru-Adrian Tantar

Domain(s) decentralized algorithms global optimization dynamic envi-ronments with uncertainties

Partner(s) NA

Description Large scale computing environments like data centers can befunctionally defined by several dynamic factors At the same time depend-ing on for example availability constraints nature of the energy sourcesor computational load distribution different stochastic factors need to beconsidered as well Energy-efficient computing therefore requires not only tocomply with contradictory objectives eg provide full computational powerwhile minimizing energy consumption but also demands anticipating theimpact of current decisions dealing with uncertainties like low power andemergency operation or provide fault tolerance all in an autonomic mannerFrom a multi-objective optimization perspective there is a need to under-stand and deal with the concepts that define a dynamic environment in thepresence of stochastic factors and provide corresponding models

Results As part of the existing framework a system is defined as a col-lection of interacting autonomous nodes [310] described by overall and localsystem load performance and energy consumption balance operating price(off) load rate task acceptance etc Energy vs performance trade-off re-quirements can be expressed as a resultant of operating costs emergencylevel or thermal readings At node level transitions are conducted by ex-pert systems (decentralized approach) that dynamically control frequencyand voltage task (off) load rate and type (communication or computationintensive) or power states A strategyscenario driven anticipation model isused to determine the outcomes and consequences of current decisions

As a continuation of the practical study and in order to provide the requiredformal support an analysis of the nature of dynamic and stochastic factors

42 Grants 139

that are considered in optimization problems was conducted This led to theidentification and modeling of four classes along with different performancemeasures [302 303] as follows (a) first order dynamic transform of the in-put parameters (b) second order evolution of the objective function(s) (c)third order parameter or function state time-dependency (d) fourth ordertime-dependent environment Also in addition to the previous design thecurrent model is defined to provide support (as part of the dynamic opti-mization process) for priority and expected due date based local schedulingpolicies transitions between active and shutdown states or the managementof volatile environments In parallel a dynamic preemptive load balancingmodel with stochastic execution times in heterogeneous environments wasdeveloped [301] This model considers different node constraints eg stor-age and computational load while being able to deal with a series of powerstates for minimizing energy consumption Defined objectives include mem-ory and computational load balancing energy number of active physicalmachines and passive tasks or virtual machines Last a study on land-scape approximation using generalized quadratic forms is currently beingcarried for characterizing and tracking local optima describing robustnessconfidence radius and sensitivity analysis

Publications NA

Confidentiality Integrity issues in distributed computationsAcronym CIDCReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2010-01-01 ndash 2013-12-31

Members Benoit Bertholon

Domain(s) Confidentiality of execution Integrity of execution CloudComputing IaaS Trusted Platform Modules Parallel and Distributed Com-puting

Partner(s) NA

Description Computing grids as defined in [Fos97] are distributed infras-tructures that gather thousands of computers geographically scattered andinterconnected through the Internet A simple concept that has emerged outof such an architecture is that of cloud computing (CC) where customers do

140 Projects and Grants in 2012

not own or rent any part of the infrastructure They simply use the availableservices and pay for what they use

The CC paradigm currently arouse enthusiasm and interest from the privatesector because it allows to reduce computing cost at a time where computingpower is primordial to reach competitiveness Despite the initiative of severalvendors to propose CC services (Amazon Google etc) several researchquestions remain open especially as regards security aspect from the userpoint of view CC highlights strong needs in integrity certifications andexecution confidentiality the latter focusing few academic interest until nowThe current policy at this level is to blindly trust the vendor providing theCC service This doesnrsquot hold for critical applications that eventually use orgenerate sensitive data especially when physical machines are distributedin different administrative domains and shared with other users that maybe business competitors

In the framework of the CC paradigm the purpose of this PhD is thereforeto investigate and design novel mechanisms to cover the following domains

- confidentiality of both application code and user data- integrity and fault-tolerance to provide guarantees on programs anddata either before during or after a run on the CC platform

To make this study more concrete the developed solutions must be validatedon a CC platform build on top of the University of Luxembourgrsquos computingclusters and the Grid5000 platform

By addressing those issues this PhD opens the perspective of intellectualpatents in a key area able to address industrial needs in an emerging tech-nology

Results In the preliminary work I studied the TPM I read the documentsissued by the Trusted Computing Group (TCG) regarding the specificationof the TPM as well as other papers using the TPM for different purposesThis has been done in order to develop what has been the main contributionof the first year CertiCloud

CertiCloud is a framework developed to verify the integrity of a runningVirtual Machine in a Cloud environment The creation of this first versionis based on a network communication protocol which has been developedand studied specifically for CertiCloud The resulted implementation is inpython for simplicity and fast prototyping The CertiCloud frameworkconsist as well in patches to adapt the Cloud scheduler to take into accountthe protocols developed This framework has been integrated in Nimbus bycreating some small patches specifically for this platform and can be easily

42 Grants 141

modified to use other Cloud platforms This lead to publications [323] [288]and [289]

The second part of the PhD is on obfuscation techniques and how to applythem to decrease the readability of a source code The software JShadObf[324] has been developed to validate the approach and to develop new tech-niques and metrics allowing better code obfuscation The literature [317][318] [319] [320] [321] has been studied to implement the state of the artin JShadObf

After the study compiler techniques and parsing softwares such as BisonANTLR [322] or bnfc ANTLR has been selected to parse JavaScript codeand a grammar has been developed ANTLR has many advantages such asbeing an active project generating parser in different languages (includingpython) and allowing the generation of the Abstract Syntax Tree Many codetransformations has been implemented such as the insertion of dead code theinsertion of predicates the generation of dummy expressions the outliningof code and the modification of the control and data flow Combined withevolutionary algorithms the transformations and the metrics are used tomutate and rate the generations creating multiple obfuscated versions ofthe same source code

This lead to publications under review to NSS2013 and NIDISC2013 (ac-cepted)

Publications [323]

Reliability of Multi-Objective Optimization techniquesAcronym REMOReference TR-PHD BFR07-105PI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2010-10-01 ndash 2012-09-30

Members Emilia Tantar

Domain(s) evolutionary techniques dynamic multi-objective optimiza-tion performance guarantee factors particle methods robustness

Partner(s) NA

Description The real-world optimization problems arising from disci-plines as various as Green IT or systems biology all have in common the

142 Projects and Grants in 2012

growing complexity of the problems to be optimized due to the need of scala-bility to larger environments or the number and type of factors needed in de-scribing the system and these are by far the only aspects to consider Otherdifficulties coming from the sensitivity of problems to dynamical changesoccurring in the environment or the need of handling several objectives si-multaneously should also be considered Evolutionary algorithms which area class of stochastic optimization methods constitue one of the commonlyused alternative in finding a good approximate solution for these problemsNevertheless their efficiency is mainly proved through experimentally at-tained performances Given the consequences of applying non-reliable solu-tions in the safety and security of complex systems (ex with applicationsin medicine) performance guarantee factors that overpass the experimentalboundary should be considered Therefore a framework allowing to quantifythe expected performances of the used techniques represents the main goalof this research

Results The aim of this project is the study of evolutionary algorithmsthat scale performances from theory to practice The focus is set on provid-ing performance guarantee factors for the study of multi-objective complexsystems including factors such as dynamism distributed behavior or the oc-currence of stochastic factors The first step consists in constructing a solidframework through the identification and design of the different classes ofproblems that can occur This has been done for the dynamic multi-objectivecontext towards a classification which allowed us to identify classes that lacka common ground for study [302 303]

As the faced real problems have different characteristics in order to compareand analyze the performances of various approximation techniques com-mon testbeds are required Synthetic or randomly generated problems areneeded in providing different fitness landscape structures or correlations be-tween objective functions or variables over time By understanding how dif-ferent techniques react to modifications occurring in the problem structurethe extent of their generality can be quantified To this end we proposedseveral variants of MNK-landscapes in order to fill the lack of syntheticproblems for online dynamic multi-objective problems Furthermore webuilt a new metric that tracks the set of best approximate solutions in time[303]These results were scaled to real-life problems arising from sustainableICT as the load balancing of resources [301]

In the context of dynamic environments we studied the stability of evo-lutionary algorithms for which the value of the objective functions changesdynamically subject to stochastic factors One of the application that I usedin order to illustrate the advantages and simplicity of this generic frameworkis by the convergence results that I provided in the case of distributed evo-lutionary algorithms subject to cheating [309]

42 Grants 143

Publications NA

Community-based Vehicular Network for Traffic Information inLuxembourgAcronym LUXCommTISReference PHD 2011-1ISPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2011-09-01 ndash 2014-08-31

Members Agata Grzybek

Domain(s) vehicular ad hoc networks coperative traffic information sys-tems trust management optimisation

Partner(s) NA

Description The near future will see a rapid proliferation of wireless com-munication technologies to vehicles allowing creation of wireless VehicularAd Hoc Networks (VANETs) The main motivation for this research is ve-hicular traffic efficiency in Luxembourg The objective of this PhD projectis to propose a cooperative traffic information system based on VANETs Itsmain goal is to capture evaluate and disseminate information about trafficsituation in Luxembourg received from vehicles connected by VANETs Thesystem is envisioned as an extension of the current solutions coordinated bycentralised traffic information agency These solutions are based on fixed in-frastructure like cameras and infrared sensors The information they provideis primarily limited to highways The VANET-based extension will allow areal-time trip planning based on up-to-date traffic information for all typesof roads The role of VANET-based part will be to collect traffic data ex-change it within the network and share it with the agency The role of theagency will be to collect the date from VANETs evaluate its quality inte-grate and disseminate to vehicles The use of the of vehicular-community andtrust management techniques will be used to ensure high quality of informa-tion The research will focus on the analysis modeling and implementationof novel mechanisms for (i) distributed VANET-based traffic data collec-tion (ii) efficient traffic data dissemination (within VANETs and betweenVANETs and traffic information agency) (iii) trust and user managementtechniques enabling to evaluate traffic data quality and trustworthiness ofsystem users To evaluate the system the project will also develop a gener-ator of realistic vehicular traffic for Luxembourg

144 Projects and Grants in 2012

Results The aim of this project is to propose Traffic Information System(TIS) using architecture based on Vehicular Ad Hoc Networks

bull Initial research requires a comprehensive literature survey in areas con-nected with VANETs (a) Network standards DSCR IEEE 80111pWAVE WiMax LTE (b) Routing protocols broadcast multicast(topology location based) unicast (c ) Traffic engineering (d) Trafficassignment (e) Game theory (f) Social networks

bull The first objective is to provide a framework for VANETs simulationwhich joins the latest versions of the most advanced Network Simu-lator (NS-3) with Traffic Simulator (SUMO) in a bidirectionaly wayThe aim of the developed simulation platform is to reproduce realistictraffic behavior in Luxembourg and then analyse and asses benefitsthat can be obtained by implementation of VANETs application Thepart of the project is to extend and optimise the realistic mobilitytraces generator (VehlLux)

bull After developing simulation platform TIS will be proposed Algorithmfor the evaluation of the quality of traffic information and new dissem-ination protocol will be tested and evaluated

Publications NA

Holistic autonomic Energy and thermal aware Resource Alloca-tion in cloud computingAcronym HERAReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget 37288eBudget UL NADuration 2011-09-15 ndash 2014-09-14

Members Mateusz Guzek

Domain(s) Cloud Computing Holistic Model Resource Allocation Multi-Objective Optimization Multi-Agent System Energy-Aware

Partner(s) Tri-ICT

Description Cloud Computing (CC) is a concept that has emerged outof the conception of heterogeneous distributed computing grid computingutility computing and autonomic computing Based on a pay-as-you-go

42 Grants 145

model it enables hosting pervasive applications from consumer scientificand business domains However data centers hosting Cloud applicationsconsume huge amounts of energy contributing to high operational costs andcarbon footprints to the environment Therefore Green Cloud computingsolutions are needed they should not only save energy for the environmentbut also reduce operational costs

Although Green computing in Cloud data centers has brought a tremen-dous interest many of the current green activities represent isolated op-timizations focusing on processing units memory networking or coolingIn order to efficiently manage Cloud data centersrsquo energy consumption wemust tackle the problem in a holistic manner which considers the variousresources and thermal aspects within the cloud computing as a whole Inthis context the aim of this PhD project is to design and develop a newholistic and autonomic energy-efficient approach to efficiently manage theresources of a CC The main milestones of this project are

bull creation of a novel holistic model In order to efficiently manage data-centersrsquo energy consumption we must tackle the problem in a holisticmanner

bull centralized optimization of the CC processing by multi-objective light-weight meta-heuristics using created holistic model to the least ensurethat a proper working of the CC system is established

bull proposition of a decentralized autonomic system which will dynami-cally optimize the CC system

The results of the centralized and decentralized system will be benchmarkedand then compared Final system will be tested using realistic assumptionsusing the field expertise supported by Tri ICT company

Results During the preparatory part of the project in the period 01012011-14092011 a number of publications were produced They investigate theprocessing (CPU) and its energy aspects of resource allocation

bull rdquoEnergy-Aware Scheduling of Parallel Applications with Multi-ObjectiveEvolutionary Algorithmrdquo EVOLVE 2011 [285]

bull rdquoScalable and Energy-Efficient Scheduling Techniques for Large-ScaleSystemsrdquo SCALSOL 2011 [294]

bull rdquoEnergy-Aware Fast Scheduling Heuristics in Heterogeneous Comput-ing Systemsrdquo OPTIM 2011 [295]

The first year of the project was devoted to holistic model creation andcentralized approaches exlporation and refinement which resulted in one

146 Projects and Grants in 2012

published conference paper [170] and one journal submission still under re-vision Additionally the multi-agent track of the project was tackled result-ing in one accepted conference submission to appear in 2013 The currentwork includes holistic model verification and development of Green Cloudsimulator

Publications NA

Energy-Efficient Networking in Autonomic Cloud ComputingAcronym INTERCOMReference PDR 2010-2ISPI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2011-06-01 ndash 2013-05-31

Members Dzmitry Kliazovich

Domain(s) Energy efficiency Cloud Computing Data center communica-tions

Partner(s) NA

Description The proposed INTERCOM project aims to provide a holisticenergy-efficient solution to autonomous management of interconnection net-works in a cloud computing environment It is a part of the currently ongoingFNR-COREGreen-IT project funded by Fonds National de la Recherche(FNR) Luxembourg The INTERCOM project aims to develop novel tech-niques and deliver efficient solutions in the form of prototype software mod-ules for energy-efficient performance optimization of (a) networking com-ponents (links transceivers switches etc) (b) data center communicationsystem as a whole and (c) communication protocols Most of current energyefficient solutions for data centers focus solely on either computing fabricoptimization or thermal management and only a few solutions account fornetworking aspects Therefore providing a holistic energy-efficient solutionfor a communication network at both hardware components and systemlevels of hierarchy constitutes the main innovative point of the project

Results One of the main results achieved in the project is related tothe release of GreenCloud simulation platform capable of fine-grained sim-ulation of cloud computing environments focusing on communication andenergy efficiency The GreenCloud platform is available for download athttpgreencloudgforgeunilu The detailed description of GreenCloud

42 Grants 147

and its components was published in Journal of Supercomputing specialissue on Green Networks citeKliazovich7483 Furthermore the Green-Cloud platform formed the basis for developing energy-efficient network-aware scheduling approaches published in Cluster Computing special issueon Green Networks in 2011 and in the IEEE International Conference onCloud Networking (CLOUDNET) citeKliazovich9732

Publications NA

Decision-theoretic fine tuning of multi-objective co-evolutionaryalgorithmsAcronym DeTeMOCGAsReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2011-09-15 ndash 2014-09-14

Members Sune Steinbjoern Nielsen

Domain(s) Coevolutionary Genetic Algorithms Multi-Objective Opti-mization Decision theory Algorithm Fine-Tuning Systems Biology

Partner(s) LCSB

Description Most real world problems are extremely hard and approxi-mated approaches are used to solve them As a solution meta-heuristicsare nowadays used in many places from cutting steel bars to logistics toportfolio management on stock exchange But these parameter-based algo-rithms are either using some default value or hand tuning which might leadto very suboptimal results This PhD project aims at providing an analysisdesign and experimentation of Adaptive Multi-objective Competitive Co-evolutionary Genetic Algorithms a term that combines several state-of-the-art concepts from various fields We aim at reaching the following researchobjectives

bull Design and implement a novel competitive multi-objective coevolu-tionary genetic algorithm based on a game-theoretical model

bull Develop a decision-theoretic approach based on Markov decision pro-cesses game theory and fuzzy logic which will allow the adaptation(offline or online) of the local operators and parameters of the devel-oped algorithm so as to optimize its performance in practical prob-

148 Projects and Grants in 2012

lems

bull Carry out a detailed analysis of the special case of adaptive multi-objective competitive evolutionary algorithms which - to the best ofour knowledge - has not been addressed so far in the literature

bull Validate experimentally the new algorithms on cutting-edge problemsfrom Systems Biology in collaboration with the Luxembourg Centrefor Systems Biomedicine (LCSB) providing new tools for the analysisof biochemical (geneprotein) interaction networks

In addition to the novelty of using decision theory and machine learningto help steeringcontrolling game-theoretic models for global optimizationand the uniqueness of its meta-model representation this PhD project willalso provide a scientific bridge between the Luxembourg Centre of SystemBiomedicine (LCSB) and the Computer Science and Communications re-search unit (CSC)

Results Below is a list that enumerates the results obtained until now

bull Implemented cooperative co-evolutionary in jCell and adapted andoptimised the VehILux model The model was extended to supportmore fine-grained tuning as well as decomposed to specifically suit thecooperative coevolutionary algorithm The intelligent model decom-position was shown to help the coevolutionary algorithm find betterresults than both random decomposition and single population ap-proaches (article submitted to Genetic and Evolutionary ComputationConference - GECCO 2013)

bull Started collaboration with LCSB on a cutting edge protein-structureoptimisation problem

Publications

bull Improved a state-of-the-art cooperative co-evolutionary multi-objectiveevolutionary algorithm [300] by an alternative asynchronous imple-mentation in the jMetal(java) framework The modification imple-mented produced an additional speedup of 14 times on average andup to 19 times in best test cases (article submitted to Congress onEvolutionary Computation - CEC 2012)

bull Novel Efficient Asynchronous Cooperative Co-evolutionary Multi-ObjectiveAlgorithms [300]

42 Grants 149

Energy-Performance Optimization of the CloudAcronym EPOCReference AFR MARP C09IS05PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget 10812558 eBudget UL NADuration 2010-09-01 ndash 2013-08-31

Members Frederic Pinel

Domain(s) energy-efficiency cloud computing optimisation

Partner(s) North Dakota State University USA

Description This MARP PhD project as part of the overall FNR COREproject Green-IT will contribute to the solution of the energy efficiency inthe following ways

bull Model the computing clouds so that new methods can be designedto tackle the challenge This involves mathematical analysis of thevarious parts of the cloud

bull Based on the models defined previously design new algorithms (forexample from the fields of meta-heuristics and game theory) to energy-efficiently allocate resources of the cloud to client requests

bull Design methods for autonomic management of the cloud Distributedagents will cooperate to allow the cloud to self-recover from any inci-dent

bull Validate the implemented algorithms on large scale real-world infras-tructures Both Grid 5000 and North Dakota State Data Centers areavailable for this step

In addition to the theoretical contributions this project will develop realsoftware solutions

Results In order to find new algorithms to solve a scheduling problemwe used a statistical method to assist in the design of algorithms [38] Thisalgorithm was then applied to the energy-efficient mapping of tasks on a dis-tributed platform including recent low-power clusters operating the ARMprocessors

A new metaheuristic was designed specifically for the GPU [39] This al-gorithm was applied to the problem of scheduling tasks to a distributed

150 Projects and Grants in 2012

system such as a cloud or cluster This algorithm introduces a new sourceof concurrency that enables larger problem sizes to be solved on the GPUparallel computing platform

Publications See results

Risk Prediction Framework for Interdependent Systems usingGraph TheoryAcronym TIGRISReference PHD-09-103PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2009-10-15 ndash 2012-10-14

Members Thomas Schaberreiter

Domain(s) critical infrastructures security modelling graph modelling

Partner(s) NA

Description Critical infrastructure protection is an up-to-date topic Crit-ical infrastructure is usually composed of interdependent systems that relyon each other in order to function correctly or provide adequate securityThe interdependencies of the systems are usually quite complex to under-stand and therefore modelling of the infrastructure and its interdependenciescan be helpful in determining the security requirements During this worka model of interdependent systems based on graph theory will be proposedthat aims to model the security attributes of interdependent systems Ade-quate ways to model the security properties of infrastructure as well as of theinterdependencies will have to be found in order to achieve a close-to-realitymodel Furthermore machine learning tools will have to be developed inorder to process the graph and allow real-time simulations

Results

bull A method for critical infrastructure dependency analysis for criticalinfrastructure security modelling was investigated and published atCRITIS2011 conference (rdquoRisk assessment in critical infrastructure se-curity modelling based on dependency analysis (short paper)rdquo [341])

bull For the IST-Africa conference a publication about the critical infras-tructure security modelling approach and RESCI-MONITOR a crit-

42 Grants 151

ical infrastructure service risk monitoring tool were described andpresented (rdquoCritical Infrastructure Security Modelling and RESCI-MONITOR A Risk Based Critical Infrastructure Modelrdquo [339])

bull A trust-based method to evaluate the impact of a dependent critical in-frastructure service to a critical infrastructure service was investigatedand published CRISIS2011 conference (rdquoTrust based interdependencyweighting for on-line risk monitoring in interdependent critical infras-tructuresrdquo [338])

bull A set of assurance indicators that can evaluate correctness of calculatedcritical infrastructure service risk was investigated and published atCRITIS2011 conference (rdquoAssurance and trust indicators to evaluateaccuracy of on-line risk in critical infrastructuresrdquo [340])

Publications NA

Dynamic MixVoipAcronym DYMOReference 4105139PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2012-11-01 ndash 2015-10-31

Members Ana-Maria Simionovici

Domain(s) Optimization Learning and Anticipation Load BalancingVirtualization Evolutionary Computing Particle Algorithms

Partner(s) MixVoIP

Description The aims and context of this research project are built ona collaboration between the Computer Science and Communications (CSC)Research Unit University of Luxembourg and MixVoIP a Luxembourgbased company specialized in VoIP services The solutions currently de-ployed by MixVoIP while executed inside clouds are monolithic and notnatively designed for such environments As such the nature of the opera-tions carried by MixVoIP is deeply static and does not allow coping with thehighly dynamic evolution of requests load or other stochastic events There-fore in an effort of addressing those problems several axes of research will beinvestigated including dynamic optimization based on incoming load analy-sis and prediction resource allocation load balancing or energy-efficient op-

152 Projects and Grants in 2012

timization and management The study will hence investigate and proposenovel solutions that effectively combine evolutionary computing algorithmsexact methods learning and anticipation techniques (expert systems neuralnetworks and auto-regressive models) as well as resource allocation and loadbalancing methods All proposed approaches will be first tested on syn-thetic data benchmarks designed out of MixVoIP logs for the cloud-basedenvironment currently in use and last inside the real-life actual platformExpected outcomes and implications consider a significant extension of hestate of the art (with respect to dynamic predictive driven optimization)and our knowledge on how dynamic systems can be modeled and dealt within the presence of high magnitude stochastic factors At a practical levelas a direct application of those paradigms it is expected to attain an im-provement in voice quality and energy efficiency with a direct connection toinfrastructure management costs and performance

Results NA

Publications NA

Satellite Payload Reconfiguration OptimizationAcronym SaPROReference 1094873PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2010-11-15 ndash 2013-11-14

Members Apostolos Stathakis

Domain(s) Satellite Payload Reconfiguration Exact algorithms Combi-natorial Optimization

Partner(s) SES Betzdorf Luxembourg

Description In order to answer the modern requirements for flexibilityand efficiency in communication satellites services the complexity and thesize of satellite payloads increases significantly As a consequence the man-ual management of the payload reconfiguration process is getting difficultand error prone for the engineers The problem of optimally configure andreconfigure the satellite payload is a multi-objective problem that comprisesobjectives like different path losses outage time to customers or threat tothe onboard equipment during the sequence of changes that would need tobe made to the switch matrix difficulty on restoring service for any single

42 Grants 153

amplifier failure etc This PhD work aims at addressing those issues withcontributions in the following domains

bull Payload architecture modeling propose a modular and scalable satel-lite payload architecture mathematical model describing all technicalconstraints and operational objectives

bull Multi-objective optimization provide payload configurations with op-timal or near optimal solutions for the whole set of objectives andrespecting all the satellite technical constraints

In addition to the theoretical contributions this project will develop a soft-ware framework that will help payload engineers to optimally reconfigurethe payloads efficiently

Results An Integer Linear Programming (ILP) model has been proposedfor the satellite payload reconfiguration problem that has been validatedwith success on realistic payloads The model describes the main opera-tional objectives It is extendable to new ones that may be of interest forthe satellite operator Additionally apart from its flexibility that allows theengineers to use the model for any payload system it interacts efficientlywith the internal software tools used by the engineers [173] [79] Theprocess of payload reconfiguration is a time critical operation It could bedemonstrated by the experimental results that many single and bi-objectiveproblem instances could be solved exactly within an acceptable time limitdefined by the engineers [78] However this is not the case for larger andmore complex instances where the required computational time for optimalsolutions may exceed the acceptable time constraints [79] We thus investi-gate metaheuristic methods to generate optimal or near optimal solutionsA first method that applies a local search algorithm was proposed and im-plemented providing promising results [325] A software framework thatintegrates the current theoritical results has been developped and is used bythe satelltie operator

Publications NA

154 Projects and Grants in 2012

A Computational Framework for Apprehending Evolving Mal-ware and Malware EngineersAcronym ANTI-MALWAREReference NAPI Dr Simon KramerFunding FNRndashAFR Post DocBudget 103 236 eBudget UL NADuration 2011-01-01 ndash 2012-12-31

Members Simon Kramer Sjouke Mauw

Domain(s) applied modal logic malware

Partner(s) NA

Description Simon Kramer carries out an AFR-FNR project that willdeliver a computational framework for apprehending evolving malware andmalware engineers In recent years the problem of malware (so-called ma-licious soft- and hardware and even entire computer networks) has becomea security-critical issue of national and even international importance withthe typical accompanying phenomenon which is the one of an arms raceThe proposed framework will address the multiple dimensions of the mal-ware problem in a unified way These dimensions are of spatial temporaleconomic legal and psychological nature The proposed framework willempower the multiple stake holders of computer systems which are theirdesigners and users the detectives and judges of malware engineers and thenational policy makers with computer assistance in their respective tasksThese tasks are the design of correct computer systems the safe use of com-puter systems the catching and conviction of malware engineers and thetaking of informed decisions and effective counter-measures against theserecent perpetrators of societal security

Results NA

Publications In 2012 the project resulted in the following publications [260261 262 263 264]

42 Grants 155

A Formal Approach to Enforced Privacy Modelling Analysisand ApplicationsAcronym EPRIV-MAAReference PHD-09-027PI Prof Dr Sjouke MauwFunding FNRndashAFRBudget 105222eBudget UL 105222eDuration 2009-12-01 ndash 2013-11-30

Members Sjouke Mauw Jun Pang Hugo Jonker Naipeng Dong

Domain(s) formal methods verification model checking security privacye-services

Partner(s) ENS Cachan Paris France

Description The project is part of a peerndashreviewed UL research projectEPRIV mdash lsquoA Formal Approach to Enforced Privacy in e-Servicesrsquo Theoverall goal of this project is to develop a domainndashindependent formal frame-work to express the proposed concept of enforced privacy We extend thenotion of enforced privacy outside the domain of voting Our formalizationwill take into account coalitionndashforming and defensive options Moreoverwithin this framework algorithms to verify these requirements will be de-veloped to facilitate verification with tool support This generic goal iscomposed of the following sub-goals

bull Lifting the notion of enforced privacy to other e-service domains suchas online auctions anonymous communications and healthcare andformalizing the resulting notions

bull Establishing per-domain formal notions to verify enforced privacy

bull Capturing these notions in a domain-independent formal framework

bull Investigating enhancements to the formal framework to verify privacy

Results The paper lsquoFormal Analysis of Privacy in an eHealth Protocolrsquo wasaccepted and presented at at the 17th European Symposium on Research inComputer Security ndash ESORICSrsquo12 [141]

Given the nature of health data privacy of eHealth systems is of prime im-portance An eHealth system must enforce that users remain private evenif they are bribed or coerced to reveal themselves or others Consider ega pharmaceutical company that bribes a pharmacist to reveal information

156 Projects and Grants in 2012

which breaks a doctorrsquos privacy In this paper we identify and formal-ize several new but important privacy notions on enforcing doctor privacyThen we analyze privacy of a complicated and practical eHealth protocolOur analysis shows to what extent these properties as well as propertiessuch as anonymity and untraceability are satisfied by the protocol Finallywe address the found ambiguities resulting in privacy flaws and proposesuggestions for fixing them

Publications The project resulted in the following publication in 2012[141]

Games for Modelling and Analysis of SecurityAcronym GMASecReference FNRndashAFR PHD-09-082PI Prof Dr Sjouke MauwFunding FNRndashAFRBudget 140000eBudget UL 140000eDuration 2009-11-01 ndash 2013-10-31

Members Sjouke Mauw Matthijs Melissen Wojciech Jamroga Leon vander Torre

Domain(s) formal methods game theory security imperfect informationgames verification model checking

Partner(s)

bull Universite Libre de Bruxelles Belgium

bull Colorado State University USA

bull GAMES Network

Description Game theory models the strategic interaction among vari-ous agents assuming each of the agents strives to increase his own pay-offSuch an interaction frequently occurs in security problems Examples arethe interaction between the attacker of a system and its defender or the in-teraction between two possibly dishonest participants in a security protocolTherefore game theory is a particularly relevant tool in the field of security

The GMASec project is executed in the context of the SndashGAMES projectand is a joint project of the SaToSS group headed by Prof Sjouke Mauwand the ICR group headed by Prof Leon van der Torre

42 Grants 157

Results A paper lsquoFairness in Non-Repudiation Protocolsrsquo [315] was pub-lished in the Proceedings of the 7th International Workshop on Security andTrust Management (STM) In this paper we indicate two problems withthe specifications of fairness that are currently used for the verification ofnon-repudiation and other fair-exchange protocols The first of these prob-lems is the implicit assumption of perfect information The second problemis the possible lack of effectiveness We solve both problems in isolation bygiving new definitions of fairness but leave the combined solution for furtherwork Moreover we establish a hierarchy of various definitions of fairnessand indicate the consequences for existing work

Publications The project resulted in the following publication in 2012[315]

Security Analysis Through AttackndashDefense TreesAcronym SADTReference PHD-09-167PI Prof Dr Sjouke MauwFunding FNR-AFR PhDBudget 141968eBudget UL 141968eDuration 2010-01-01 ndash 2013-12-31

Members Sjouke Mauw Patrick Schweitzer Barbara Kordy Sasa Radomirovic

Domain(s) security formal methods attack trees defense trees attack-defense trees security assessment

Partner(s)

bull Telindus Luxembourg

bull Sintef Norway

bull TXT e-solutions Italy

bull Cybernetica Estonia

bull EDF France

bull Lucerne University of Applied Sciences and Arts

Description The project Security Analysis Through AttackndashDefense Trees(SADT) is part of the ATREES project It aims to extend and unify at-tack trees introduced by Bruce Schneier in 1999 The extension of attack

158 Projects and Grants in 2012

trees will be achieved by adding defensive measures to attack trees to createAttackndashDefense Trees (ADTrees) This will allow security analysts to in-clude countermeasures into their analysis The unification will be achievedby developing one coherent formal framework for ADTrees This unificationwill facilitate the development of a software tool This tool will encompassmost existing attack tree approaches using only a single formalism

More concretely we will define a unified language for ADTrees introduceseveral semantics arising from different mathematical disciplines and alreadyexisting attack tree approaches and create a software tool that supportsthe work of security analysts With the help of case studies provided bythe several industry partners different use cases will be examined This willallow us to tailor and refine the language and semantics It will also help usto improve the usability of the software tool

The SADT project is a joint research project of the Interdisciplinary Centrefor Security Reliability and Trust (SnT) and SaToSS

Results In 2012 we published two journal articles and presented our workat one international conference The first journal article [258] lays the foun-dation of the ADTrees presents the results of the previous years The secondone [254] is an extended case study on how to apply the methodology AtICISCrsquo12 we presented our research on an informal and a correspondingformal way of how to use ADTrees for quantitative analysis

Publications The project resulted in following publications in 2012 [258][254]

Secure and Private Location Proofs Architecture and Designfor Location-Based ServicesAcronym SECLOCReference 794361PI Prof Dr Sjouke MauwFunding FNR-AFR PhDBudget 109137eBudget UL 109137eDuration 2010-08-01 ndash 2013-07-31

Members Sjouke Mauw Xihui Chen Jun Pang Gabriele Lenzini

Domain(s) security and privacy location based services location proofsformal verification trustworthy services security protocols

Partner(s) itrust Consulting Luxembourg

42 Grants 159

Description Location-based services are rapidly growing as mobile net-works become increasingly pervasive and the use of mobile devices is gettingmore popular Location-based applications make use of the physical loca-tion of the mobile device to provide services that are customized to thatlocation To be effective location-based services need trustworthy (secureand private) positioning data this depends upon the technology the com-ponents and the communication protocols employed for service compositionand provision For this reason researcher effort has been devoted to ad-dressing the problem of how to certify a physical location and of how toensure that location information is secure eg in term of data integritynon-transferability unforgeability and non-repudiation Meanwhile usershave their privacy concerns about how their location proofs are used egthey want to control when and to whom they need to present such proofs(anonymity) or they do not want a service provider to trace them

Both security and privacy are essential in the development of location proofsfor location-based services While in the literature most researchers onlyconsider security or privacy in isolation we will address the problem ofhow to securely provide a userrsquos location while adhering to the need-to-know principle for all other involved parties thereby satisfying also privacyrequirements of the users

We approach this challenge by analyzing the concepts and requirements forsecurity and privacy in a location proof management system We aim at anarchitecture addressing both security and privacy requirements We will de-sign securitycryptographic protocols which can be used as building blocksin implementing such architecture for a concrete application domain Thecorrectness of the developed protocols is guaranteed through formal verifi-cation At last an experimental system based on the proposed architectureand protocols will be built to validate our solutions wrt the security andprivacy requirements identified

Results In 2012 we have four international conference papers accepted andone journal paper submitted

bull we design a new electronic toll pricing system based on group signa-tures This paper has been published and presented in ARESrsquo12 [216]

bull we propose a post-hoc analysis on location privacy in electronic pricingsystems [255] This paper is co-authored with David Fonkwe and hasbeen presented in DPMrsquo12

bull we propose a new method to construct and compare usersrsquo mobilityprofiles [256] This paper is co-authored by Ran Xue and has beenaccepted by SACrsquo13

160 Projects and Grants in 2012

bull we measure usersrsquo query privacy when query dependency is taken intoaccount and propose a new anonymization algorithm to protect usersrsquoquery privacy [257] This paper has been accepted by CODASPYrsquo13

bull we perform a formal analysis on our electronic toll pricing systemndash GroupETP using ProVerif This paper has been submitted to thejournal JOWUA

Publications The project resulted in the following publications in 2012[216] [255] [256] [257]

Analysis of the SHA-3 Remaining CandidatesAcronym SHARCReference F1R-CSC-AFR-080000PI Prof Dr Alex BiryukovFunding FNR-AFR PostdocBudget 102620eBudget UL NADuration 2010-10-15 ndash 2012-10-14

Members Gaetan Leurent

Domain(s) Cryptography Secret Key Hash Functions CryptanalysisSHA-3

Partner(s) NA

Description This project is about the analysis of hash functions andwill be closely related to the SHA-3 competition currently run by NISTIn cryptography a hash function is a public function with no structuralproperties It is an essential primitive in modern cryptography used inmany protocols and standards including signatures schemes authenticationcodes and key derivation

Following devastating attacks against many widely used hash functions (in-cluding MD4 MD5 and SHA-1) NIST organized the SHA-3 competition toselect and standardize a new hash function This competition is similar tothe AES competition held in 1998-2000 and attracts worldwide attentionwith a large effort underway to assess the security of the candidates Duringthis project we will study the application of known cryptanalysis techniquesto the new designs submitted for the SHA-3 competition and try to developnew dedicated techniques tailored to some of the SHA-3 candidates

Results The paper ldquoPractical Partial-Collisions on the Compression Func-

42 Grants 161

tion of BMWrdquo is accepted for presentation at the 18th IACR Workshop onFast Software Encryption (FSE 2011)

Publications NA

Dynamic and Composite Service-Oriented Architecture Secu-rity TestingAcronym DYNOSTReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2010-10-01 ndash 2013-09-30

Members Alexandre Bartel PhD

Domain(s) Dynamic adaptive systems andoid security access-control pol-cies permission-based architecture Model-driven engineering

Partner(s) NA

Description Initially DYNOST dealt with rdquoDynamic and Composite Service-Oriented Architecture Security Testingrdquo

Dynamically Adaptive Systems modify their behavior and structure in re-sponse to changes in their surrounding environment and according to anadaptation logic Critical systems increasingly incorporate dynamic adap-tation capabilities examples include disaster relief and space explorationsystems One of the main questions to adress is rdquoHow can we test the secu-rity of such a system which is often seen as a black boxrdquo

As a first step we propose a fault model for adaptation logics which classifiesfaults into environmental completeness and adaptation correctness [1] Sincethere are several adaptation logic languages relying on the same underlyingconcepts the fault model is expressed independently from specific adapta-tion languages Taking benefit from model-driven engineering technologywe express these common concepts in a metamodel and define the opera-tional semantics of mutation operators at this level Mutation is appliedon model elements and model transformations are used to propagate thesechanges to a given adaptation policy in the chosen formalism Preliminaryresults on an adaptive web server highlight the difficulty of killing mutantsfor adaptive systems and thus the difficulty of generating efficient tests

Shift to Android

162 Projects and Grants in 2012

With FNR agreement the project evolved and now focuses much more on thesecurity of the Android software stack still keeping the dynamic adaptationaspect in mind Android is a permission based system on top of which runapplication developed by programmers and downloaded from markets byend-users Every application comes with a Manifest file containing a list ofthe permissions the application requires to run

Results We developed a static analysis tools which computes the appro-priate permission set for an application by analyzing its bytecode By com-paring the permission list generated by our tool to the original permissionlist we noticed that a non-negligible part of Android applications are over-privileged they do not respect the principle of least privilege

Publications One publication in 2011 [312]

A Testing Framework for Large-Scale ApplicationsAcronym PeerunitReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2011-01-15 ndash 2014-01-15

Members Jorge Meira (PhD)

Domain(s) NA

Partner(s) Federal University of Parana Brazil

Description The aim of this project is to develop a highly scalable testingarchitecture for large-scale systems This project has three main objectives

bull To design a scalable testing synchronization algorithm to execute large-scale tests This algorithm will be incorporated to the PeerUnit archi-tecture to test any kind of large-scale application besides P2P

bull To design a highly scalable and automatic oracle approach to vali-date large-scale tests This approach will be also incorporated to thePeerUnit architecture

bull To test popular large-scale systems (eg Hadoop Hive FreePastry)and to validate our algorithm and oracle approach Tests can be exe-cuted in an incremental schedule from a less complex scenario to a morecomplex one First we start testing simple applications in small-scale

42 Grants 163

(eg distributed word count) Then we test the same application inlarge-scale Finally we test a complex large-scale application (egHive data warehouse architecture)

Results The student has started his PhD this year (January 2011) and isfinishing his basic formation that is part of the Brazilian regulations to getthe degree This is predicted in the co-joint agreement In this formationthe student must fulfil thirty six (36) credits in taught courses which ingeneral takes 12-18 months The student will finish by December 2011 Inresearch the student is finishing his first paper and is already mastering thelarge-scale environment (ie Grid5000) that is going to be used throughoutthe project His findings are interesting and it is expected at least twoconference paper in the following couple of months

Publications NA

Selected Problems in Executable ModelingAcronym SPEMReference PHD-09-084PI Prof Dr Pierre KelsenFunding FNR-AFR PhDBudget NABudget UL NADuration 2009-11-15 ndash 2012-11-15

Members Moussa Amrani and Nuno Amalio

Domain(s) Model-Driven Engineering Domain-Specific Modeling Lan-guages Structural and Behavioural Specification Structural and BehavioralSemantics Executability

Partner(s) NA

Description Model-Driven Engineering considers models as first-class en-tity in the development process In this way developers deal only withmodels which are used at the required level of abstraction for each taskthey need to perform to finally generate actual code on a given platform

Transformations can also be modeled Transformations are the Model-Driven Engineering tool that allow one to make models change evolve to fi-nally compute something Transformation Languages can be classified in twotrends object-oriented languages and rule-based languages Each of thempresent some strengths but comes with some complications when dealingwith huge models and or huge transformations

164 Projects and Grants in 2012

The Model-Driven Engineering approach gained maturity over the yearsand started to be used for safety-critical and embedded softwares whereformal verification plays a key role in the validation of applications Formalverification could be performed either by model-checking exhaustively theexecution state space or by theorem-proving assertions and properties aboutthe execution states But to be able to use such techniques formal semanticsof transformation languages must be precisely specified

This PhD has three goals

1 Define the semantics of a transformation language

2 Equip a transformation language with the ability to define contractswhich are an abstract and adequate way of defining behavior withoutgoing into implementation details

3 Apply theorem-proving techniques to formally verify models and trans-formations against dynamic properties

Results Since the PhD started the last year the results are just comingThe results basically follows the first workpackages defined in the Afr pro-posal It is also important to mention participation in conferences and paperreview for a PhD

State of the Art in Model-Driven Engineering This year was largelydedicated to study the existing techniques and tools for structural andbehavioral modeling A Technical Report will be soon published onbehalf of the LassyCsc adressing these points and completed withthe graph- based tools

Semantics Specification of an Object-Oriented Transformation LanguageAn important result regarding the development of formal verificationtechniques over Domain-Specific Modeling Languages is the formalspecification of the semantics of such languages It is known to bea hard task but it is a necessary step towards formal and trustableverification In the next few months an article paper will be publishedsoon

Conference Summer School Participation The candidate participatedto one important conference in the domain namely the European Con-ference on Modeling Foundations and Applications (Ecmfa 2010) andthe First Summer School on Domain-Specific Modeling Theory andPractice (Dsm- Tp 2010)

Publications NA

42 Grants 165

422 Workshop amp Conferences (FNR Accompanying Mea-sures)

Building the Skeleton of a SO schedulerAcronym SandpileReference FNR11AM2c32PI Prof Dr Pascal BouvryFunding FNR - AM2cBudget 634900Budget UL NADuration 2012-03-01 ndash 2012-05-01

Members Juan Luis Jimenez Laredo

Domain(s) Optimization GridCloud Computing Load balancing schedul-ing

Partner(s) NA

Description This project aims at designing and implementing the skele-ton of an organic scheduler for GridCloud Computing so that it acquiresautonomic properties such as self-organization of tasks or self-healing underresource failures To cope with these goals the working hypothesis relieson the Self-Organizing Criticality theory (SOC) that describes a property ofcomplex systems and consists in a critical state formed by self-organizationat the border of order and chaos More specifically we will extend a SOCsystem so-called sandpile The sandpile is a nature-inspired cellular automa-ton where piles of sand are accumulated and balanced in a self-organized wayalong the lattice The metaphore here is that tasks can be seen as grainsof sand and resources as cells in the lattice Given the decentralized natureof resources in GridCloud Computing systems we propose a Peer-to-Peeragent-based system as the underlying infrastructure to construct the cel-lular automaton (ie agents represent cells with a neighbourhood definedby the Peer-to-Peer overlay network) In order to study the viability ofthe approach the initial objective of the project is to reduce the schedulelength (or makespan) of scientific directed acyclic graph (DAG) in whichthe destination group in Innsbruck has an extensive expertise and after-wards compare results against state-of-the-art approaches Here it has tobe noted that there are two divergent trends in the literature when ap-proaching DAG scheduling On the one hand the fittest approaches assume

166 Projects and Grants in 2012

an unrealistic accurate knowledge on the problem structure On the otherhand real middleware frameworks use much simpler heuristics such as justin-time planning or round robin Our approach aims to bridge this gap andproposes the skeleton of a scheduler for a do-as-you-like scheduling ie bymodifing simple rules the approach can be tuned from a non-clairvoyant to aperfectly-informed scheduler Not only this we aim to take advantage of thepotentials of the approach and redefine the optimization objective to meetthe energy-aware criteria described in the FNR Core GreenIT project forwhich the candidate Dr Jimenez Laredo is working As can be graspedfrom this summary the ambitious nature of the project will require of amulti-disciplinary set of experts We find that both organizations Inns-bruck and Luxembourg account with complementary people to bring theproject to success with Luxembourg having a stronger focus on energy op-timization and green computing and Innsbruck on middleware developmentand scientific workflows analysis The candidate Juan Luis Jimenez Laredofits especially well in this project given his expertise on the aforementionedareas that can be assessed by referring to some of his publications either inSOC or agent-based decentralized optimization

Results In this project we have designed and developed an on-line anddecentralized scheduler based on a Self-Organized Criticallity Model calledsandpile in which every computing resource executes a sandpile agent Thesource-code with the simulator has been released as open-source and is avail-able at httpssandpile-schedulergooglecodecom published under GPL v3public license Additionally a first publication has been already publishedin the Workshop of Soft-Computing Techniques in Cluster and Grid Com-puting Systems (httpalturlcom33vo3) from which an extended version isexpected to be published in Cluster Computing (2010 Impact Factor 0679)(httpalturlcomxkzuh) The whole text of the publication is available forchecking at httpalturlcomcypi6 This report presents the problem def-inition the main points of the followed methodology and a summary of theachieved results

Publications NA

Chapter 5

CSC Representation

51 Conferences

The following local events have been organized during 2012

bull IFIP AIMS 2012 Luxembourg Luxembourg Radu State

ndash Description 6th International Conference on Autonomous In-frastructure Management and Security (AIMS 2012) June 04-08 2012 University of Luxembourg Luxembourg

bull 13th International Workshop on Computational Logic in Multi-AgentSystems (2012-08-27 ndash 2012-08-28) Montpellier France Leon van derTorre

bull Capture The Flag competition 2012 (2012-10-23 ndash 2012-10-25) Lux-embourg Luxembourg Piotr Kordy Matthijs Melissen Sasa RadomirovicPatrick Schweitzer Hugo Jonker Andrzej Mizera Yann Le Corre aswell as a former member of the SaToSS group Dr Ton van Deursen

ndash Description In 2012 the hackbraten team headed by Piotr Ko-rdy represented the SaToSS group at the Capture the Flag Com-petition co-located with the Hacklu conference Capture TheFlag is a competition where registered teams solve computer chal-lenges within limited time It is part of the Hacklu conferenceTopics of the challenges include (among others) web security

168 CSC Representation

cryptography reverse engineering and forensic Example chal-lenges include finding vulnerabilities in the servers exploitingbuffer overflows in binary files or reverse engineering javascriptcode embedded in a pdf file The hackbraten team was ranked24th amongst 575 teams registered for the event

bull Workshop on Dynamics of Argumentation Rules and Conditionals(2012-04-02 ndash 2012-04-03) Luxembourg Luxembourg Richard BoothEmil Weydert Tjitze Rienstra (organisers)

bull European Conference on Artificial Intelligence (2012-08-27 ndash 2012-08-31) Montpellier France Tjitze Rienstra

bull EVOLVE 2012 International Conference Mexico City Mexico Alexandru-Adrian Tantar Emilia Tantar Pascal BOUVRY (General Chairs)

ndash Description A Bridge between Probability Set Oriented Numer-ics and Evolutionary Computing

bull Interdisciplinary PhD Workshop on Security in eVoting (eVote PhDDays 2012) (2012-10-14 ndash 2012-10-15) Luxembourg Luxembourg HugoJonker (main organizer)

ndash Description In 2012 the University of Luxembourg hosted the5th installment of the Interdisciplinary PhD Workshop on Se-curity in eVoting The goal of this workshop series is to fosterunderstanding and collaboration between the various disciplinesworking on e-voting as well as to provide an informal platformfor young researchers to present results discuss research ideasand research directions with their peers and expand their net-works There were 14 participants from 10 institutes across Eu-rope What makes this workshop series special is that it is trulyinterdisciplinary where PhD students from legal backgroundsare joined by PhD students with computer science and cryptog-raphy backgrounds and by social scientists

bull GreenGEC Workshop Genetic and Evolutionary Computation Con-ference Philadelphia USA Pascal Bouvry Alexandru-Adrian TantarEmilia Tantar Bernabe Dorronsoro Gregoire Danoy

ndash Description Green and Efficient Energy Applications of Geneticand Evolutionary Computation

bull The 5th Workshop on Logical Aspects of Multi-Agent Systems (LAMASrsquo2012)(2012-06-05 ndash 2012-06-05) Valencia Spain Wojciech Jamroga (co-organizer) Matthijs Melissen (co-organizer)

51 Conferences 169

ndash Description LAMAS is a scientific network spanning an inter-disciplinary community of researchers working on logical aspectsof MAS from the perspectives of logic artificial intelligence com-puter science game theory etc The LAMAS workshop is thepivotal event of the network and it provides a platform for pre-sentation exchange and publication of ideas in all these areasincluding

lowast Logical systems for specification analysis and reasoning aboutMAS

lowast Modeling MAS with logic-based models

lowast Deductive systems and decision procedures for logics for MAS

lowast Development complexity analysis and implementation of al-gorithmic methods for formal verification of MAS

lowast Logic-based tools for MAS

lowast Applications of logics in MAS

bull Normative Multi-Agent Systems (2012-03-12 ndash 2012-03-16) DagstuhlGermany Leon van der Torre

bull OPTIM 2012 (2012-07-02 ndash 2012-07-06) Madrid Spain Pascal Bou-vry Gregoire Danoy Bernabe Dorronsoro Sebastien Varrette (Work-shop Organisers)

ndash Description Workshop on Optimization Issues in Energy Effi-cient Distributed Systems

bull 20th International Conference on Real-Time and Network Systems(2012-11-08 ndash 2012-11-09) Pont-a-mousson France Nicolas Navet(General Chair)

ndash Description The purpose of the conference is to share ideas ex-periences and informations among academic researchers devel-opers and service providers in the field of real-time systems andnetworks

bull SCCG 2012 Victoria Canada Bernabe Dorronsoro (Workshop Or-ganisers)

ndash Description First International Workshop on Soft ComputingTechniques in Cluster and Grid Computing Systems

bull Summer School on Secure Voting (SecVotersquo2012) (2012-07-16 ndash 2012-07-20) Dagstuhl Germany Hugo Jonker (general chair)

170 CSC Representation

ndash Description The SecVote 2012 summer school covered the foun-dations of secure voting as well as examine recent developmentsin the field of e-voting The school provided a good overview ofwork in voting including design of voting systems social choicecryptography practical experiences practical deployment andauditing There were 27 participants coming from AustraliaBrazil the USA Israel Estonia Poland the UK the Nether-lands Luxembourg Italy and Germany

bull VTP 2012 San Francisco USA Pascal Bouvry Gregoire Danoy Patri-cia Ruiz Julien Schleich Marcin Seredynski (Workshop Organisers)

ndash Description Workshop on VANETs From Theory to Practice

bull Summer School on Verification Technology Systems amp Applications(VTSArsquo2012) (2012-09-03 ndash 2012-09-07) Saarbrucken Germany JunPang (coordinator)

ndash Description The fourth summer school on verification technol-ogy systems amp applications takes place at Max Planck Institutefor Informatics at Saarbrucken Germany from September 03rdto 7th 2012 All three aspects verification technology systems ampapplications strongly depend on each other and that progress inthe area of formal analysis and verification can only be madeif all three aspects are considered as a whole Five speakersArmin Biere Ahmed Bouajjani Jurgen Giesl David Monniauxand Carsten Schurmann stand for this view in that they repre-sent and will present a particular verification technology and itsimplementation in a system in order to successfully apply theapproach to real world verification problems There were about30 participants for the summer school More information can befound at httpwwwmpi-infmpgdeVTSA12

52 PC and other memberships

bull 26th AAAI Conference on Artificial Intelligence (2012-07-22 ndash 2012-07-26) Toronto Canada Richard Booth (PC member)

bull 25th Australasian Joint Conference on Artificial Intelligence Dec 4-72012 Sydney Australia Richard Booth (PC member)

bull 24th Benelux Conference on Artificial Intelligence Oct 25-26 2012Maastricht Netherlands Richard Booth (PC member)

52 PC and other memberships 171

bull Workshop on Belief Change Nonmonotonic Reasoning and ConflictResolution (2012-08-27 Montpellier France Richard Booth (PC mem-ber)

bull 3rd IIAI International Conference on e-Services and Knowledge Man-agement (2012-09-20 ndash 2012-09-22) Fukuoka Japan Richard Booth(PC member)

bull 13th European Conference on Logics in Artificial Intelligence (2012-09-26 ndash 2012-09-28) Toulouse Franch Richard Booth (PC member)

bull 6th Multi-Disciplinary International Workshop on Artificial Intelli-gence (2012-12-26 ndash 2012-12-28) Ho Chi Minh City Vietnam RichardBooth (PC member)

bull NMR 2012 - 14th International Workshop on Non-Monotonic Rea-soning (2012-06-08 ndash 2012-06-10) Rome Italy Richard Booth (PCmember)

bull NIDISC 2012 (2012-05-21 ndash 2012-05-25) Shanghai China PascalBouvry (Program Chair)

ndash Description 15th International Workshop on Nature InspiredDistributed Computing held in conjunction with the 26th IEEEACMInternational Parallel and Distributed Processing (IPDPS 2012)

bull VTP 2012 (2012-06-25 ndash 2012-06-25) San Francisco USA PAscalBouvry (General Chair)

ndash Description VANETs from Theory to Practice

bull BNAIC 2012 (2012-10-25 ndash 2012-10-26) Maastricht Netherlands Gre-goire Danoy (PC Member)

ndash Description 24th Benelux Conference on Artificial Intelligence

bull ICUMT 2012 (2012-10-03 ndash 2012-10-05) St Petersburg Russia Gre-goire Danoy (PC Member)

bull IEEE MENS 2012 (2012-12-03 ndash 2012-12-07) Anaheim USA GregoireDanoy (PC Member)

ndash Description 4th IEEE International Workshop on Managementof Emerging Networks and Services

bull NIDISC 12 (2012-05-21 ndash 2012-05-25) Shanghai China GregoireDanoy (Publicity Chair)

172 CSC Representation

ndash Description 15th International Workshop on Nature InspiredDistributed Computing held in conjunction with the 26th IEEEACMInternational Parallel and Distributed Processing (IPDPS 2012)

bull SCALSOL 2012 (2012-12-18 ndash 2012-12-18) Changzhou China Gre-goire Danoy (PC Member)

ndash Description The International Workshop on Scalable Solutionsfor GreenIT (SCALSOL) as part of The 12th IEEE InternationalConference on Scalable Computing and Communications (SCAL-COM 2012)

bull SCCG-2012 (2012-11-12 ndash 2012-11-14) Victoria Canada GregoireDanoy (PC Member)

ndash Description Workshop 1st International Workshop on Soft Com-puting Techniques in Cluster and Grid Computing Systems

bull VTP 2012 (2012-06-25 ndash 2012-06-25) San Francisco USA GregoireDanoy (PC Chair)

ndash Description VANETs from Theory to Practice

bull EVOLVE 2012 (2012-08-07 ndash 2012-08-09) Mexico City Mexico Bern-abe Dorronsoto (Program Committee)

ndash Description VOLVE 2012 A bridge between Probability SetOriented Numerics and Evolutionary Computation

bull GECCO 2012 (2012-07-07 ndash 2012-07-11) Philadelphia USA BernabeDorronsoto (Program Committee)

ndash Description ACM International Genetic and Evolutionary Op-timization Conference

bull GreenCom 2012 (2012-11-20 ndash 2012-11-23) Besancon France Bern-abe Dorronsoto (Program Committee)

ndash Description IEEE GreenCom 2012

bull HPMS-ECMS 2012 (2012-05-29 ndash 2012-06-01) Koblenz GermanyBernabe Dorronsoto (Program Committee)

ndash Description 26th European Conference on Modelling and Simu-lation (ECMS 2012) Track on High Perfomance Modelling andSimulation

52 PC and other memberships 173

bull IC3 2012 (2012-08-06 ndash 2012-08-08) Noida India Bernabe Dorronsoto(Program Committee)

ndash Description The Fifth International Conference on Contempo-rary Computing

bull MAEB 2012 (2012-02-08 ndash 2012-02-10) Albacete Spain BernabeDorronsoro (Program Committee)

ndash Description VIII Congreso Espanol sobre Metaheurısticas Al-goritmos Evolutivos y Bioinspirados

bull MENS-GLOBECOM 2012 Anaheim California USA Bernabe Dor-ronsoto (Program Committee)

ndash Description The 4th IEEE International Workshop on Manage-ment of Emerging Networks and Services (IEEE MENS 2012) inconjunction with IEEE GLOBECOM 2012

bull MICAI 2012 (2012-10-27 San Luis Potosı Mexico Bernabe Dor-ronsoto (Program Committee)

ndash Description The 11th Mexican International Conference on Ar-tificial Intelligence

bull NostraDamus 2012 Ostrava Czech Republic Bernabe Dorronsoto(Program Committee)

ndash Description The NostraDamus conference

bull P2PAMN track at 3PGCIC 2012 (2012-11-12 ndash 2012-11-14) VictoriaCanada Bernabe Dorronsoto (Program Committee)

ndash Description The 7th International Conference on P2P ParallelGrid Cloud and Internet Computing (3PGCIC-2012) track onP2P Ad-hoc and Mobile Networking

bull SCALSOL-SCALCOM 2012 (2012-12-18 ndash 2012-12-18) ChangzhouChina Bernabe Dorronsoro (Program Committee)

ndash Description The International Workshop on Scalable Solutionsfor GreenIT (SCALSOL) as part of The 12th IEEE InternationalConference on Scalable Computing and Communications (SCAL-COM 2012)

174 CSC Representation

bull WASI-CACIC 2012 ndash 2012-10-12) Bahıa Blanca Argentina BernabeDorronsoto (Program Committee)

ndash Description Workshop de Agentes y Sistemas Inteligentes (WASI)- XVIII Congreso Argentino de Ciencias de la Computacion (CACIC)

bull LAMAS 2012 (2012-06-05 ndash 2012-06-05) Valencia Spain WojciechJamroga (PC Co-chair)

ndash Description 5th Workshop on Logical Aspects of Multi-AgentSystems

bull The Twenty-Sixth Conference on Artificial Intelligence (AAAI-12) (2012-07-22 ndash 2012-07-26) Toronto Canada Wojciech Jamroga (PC Mem-ber)

ndash Description The purpose of the AAAI-12 conference is to pro-mote research in AI and scientific exchange among AI researcherspractitioners scientists and engineers in related disciplines

bull AAMAS 2012 (2012-06-04 ndash 2012-06-08) Valencia Spain WojciechJamroga (PC Member)

ndash Description The AAMAS conference series was initiated in 2002in Bologna Italy as a joint event comprising the 6th Interna-tional Conference on Autonomous Agents (AA) the 5th Interna-tional Conference on Multiagent Systems (ICMAS) and the 9thInternational Workshop on Agent Theories Architectures andLanguages (ATAL)

Subsequent AAMAS conferences have been held in MelbourneAustralia (July 2003) New York City NY USA (July 2004)Utrecht The Netherlands (July 2005) Hakodate Japan (May2006) Honolulu Hawaii USA (May 2007) Estoril Portugal(May 2008) Budapest Hungary (May 2009) Toronto Canada(May 2010) Taipei Taiwan (May 2011) AAMAS 2012 will beheld in June in Valencia Spain AAMAS is the largest and mostinfluential conference in the area of agents and multiagent sys-tems the aim of the conference is to bring together researchersand practitioners in all areas of agent technology and to providea single high-profile internationally renowned forum for researchin the theory and practice of autonomous agents and multiagentsystems

AAMAS is the flagship conference of the non-profit InternationalFoundation for Autonomous Agents and Multiagent Systems (IFAA-MAS)

52 PC and other memberships 175

bull BNAIC 2012 (2012-11-25 ndash 2012-11-26) Maastricht the NetherlandsWojciech Jamroga (PC Member)

ndash Description The 24th Benelux Conference on Artificial Intelli-gence (BNAIC 2012) is organised by the Department of Knowl-edge Engineering (DKE) of Maastricht University (UM) BNAIC2012 is organised under the auspices of the Benelux Associa-tion for Artificial Intelligence (BNVKI) and the Dutch ResearchSchool for Information and Knowledge Systems (SIKS)

bull CLIMA XIII (2012-08-27 ndash 2012-08-28) Montpellier France WojciechJamroga (PC Member)

ndash Description 13th International Workshop on Computational Logicin Multi-Agent Systems The purpose of the CLIMA workshops isto provide a forum for discussing techniques based on computa-tional logic for representing programming and reasoning aboutagents and multi-agent systems in a formal way More informa-tion about the series os CLIMA workshops including its previouseditions and publications can be found here

The 13th edition of CLIMA will be affiliated with ECAIrsquo12 andwill take place in Montpellier France between the 27th and 28thof August 2012

bull ECAI 2012 (2012-08-27 ndash 2012-08-31) Montpellier France WojciechJamroga PC Member()

ndash Description ECAI the biennial European Conference on Artifi-cial Intelligence is the leading conference on Artificial Intelligencein Europe

ECAI 2012 the 20th conference in this series will be jointly or-ganized by the European Coordination Committee for ArtificialIntelligence (ECCAI) the French Association for Artificial In-telligence (AFIA) and Montpellier Laboratory for InformaticsRobotics and Microelectronics (LIRMM)

LIRMM is a research laboratory supervised by both MontpellierUniversity (Universite Montpellier 2) and the French NationalCenter for Scientific Research (CNRS)

ECAI 2012 will give researchers from all over the world the possi-bility to identify important new trends and challenges in all sub-fields of Artificial Intelligence and it will provide a major forumfor potential users of innovative AI techniques

bull EUMASrsquo12 (2012-12-18 ndash 2012-12-19) Dublin Ireland Wojciech Jam-roga (PC Member)

176 CSC Representation

ndash Description Research on multi-agent systems has shed light ontoand provided solutions to many real life problems As the fieldmatures academics and industrialists benefit from European-based forums where state-of-the-art and state-of-the-practice arepresented and discussed The EUMAS series of events have servedthis purpose and in this 10th edition (following Maastricht TheNetherlands 2011 Paris France 2010 Aiya Napa Cyprus 2009Bath England 2008 Hammamet Tunisia 2007 Lisbon Portu-gal 2006 Brussels Belgium 2005 Barcelona Spain 2004 Ox-ford England 2003) we shall carry on in this tradition The EU-MAS series of workshops is primarily intended as a European fo-rum at which researchers and those interested in activities relat-ing to research in the area of autonomous agents and multi-agentsystems can meet present (potentially preliminary) research re-sults problems and issues in an open and informal but academicenvironment

bull ICAART 2012 (2012-02-06 ndash 2012-02-08) Vilamoura Portugal Woj-ciech Jamroga (PC Member)

ndash Description The purpose of the 5th International Conference onAgents and Artificial Intelligence (ICAART) is to bring togetherresearchers engineers and practitioners interested in the theoryand applications in these areas Two simultaneous but stronglyrelated tracks will be held covering both applications and currentresearch work within the area of Agents Multi-Agent Systemsand Software Platforms Distributed Problem Solving and Dis-tributed AI in general including web applications on one handand within the area of non-distributed AI including the moretraditional areas such as Knowledge Representation PlanningLearning Scheduling Perception and also not so traditional ar-eas such as Reactive AI Systems Evolutionary Computing andother aspects of Computational Intelligence and many other areasrelated to intelligent systems on the other hand

53 Doctoral board

bull Cynthia Wagner University of Luxembourg Luxembourg Luxem-bourg March 2012 2012 Thomas Engel

bull Shaonan Wang University of Luxembourg Luxembourg LuxembourgApril 2012 Thomas Engel

54 Guests 177

bull Sheila Becker University of Luxembourg Luxembourg LuxembourgOctober 2012 2012 Thomas Engel

bull Sheila Becker UL Luxembourg Luxembourg October 2012 2012Yves Le Traon

bull Frederic Garcia Becerro University of Luxembourg Luxembourg Lux-embourg March 2012 2012 Bjorn Ottersten Thomas Engel

bull Thorsten Ries University of Luxembourg Luxembourg LuxembourgOctober 2012 2012 Thomas Engel

54 Guests

Invited Researchers

bull Prof Dr Andreas Albers (Goethe University of Frankfurt) October2012 Hugo Jonker Reason Research collaboration and presentation

bull Dr Dragos Horvath (Louis Pasteur University Strasbourg) October2012 Alexandru-Adrian Tantar Reason collaboration on samplingalgorithms

bull Dr Marek Bednarczyk (Polish Academy of Sciences Gdansk) May2012 Wojciech Jamroga Reason Research collaboration and pre-sentation

bull Dr Fei Gao (Norwegian University of Science and Technology (NTNU))October 1-12 2012 Pascal Bouvry Reason Collaboration on parallelevolutionary computing

bull Prof Dr Joanna Kolodziej (Cracow University of Technology) June2012 Pascal Bouvry Reason Collaboration on green computing re-search activities

bull Prof Dr Pierre Manneback (University of Mons) April 2012 PascalBouvry Reason Parallel computing research collaboration

bull Prof Dr Malgorzata Sterna (Poznan University of Technology) Jan-uary 2012 Pascal Bouvry Reason Collaboration on scheduling re-search activities

bull Dr Alexey Vinel (Tampere University of Technology Finland) august2012 Pascal Bouvry Reason Collaboration on wireless networksactivities

178 CSC Representation

bull Dr Nils Bulling (Clausthal University of Technology ) April 2012Wojciech Jamroga Reason Research collaboration and presentation

bull Dr Kostas Chatzikokolakis (LIX Ecole Polytechnique amp INRIASaclay) April 2012 Jun Pang Xihui Chen Reason Research col-laboration and presentation

bull Prof Dr Jason Crampton (Royal Holloway University of London)JUly 2012 Barbara Kordy Reason Research collaboration and pre-sentation

bull Dr Cas Cremers (ETH Zurich) August 2012 Sjouke Mauw ReasonResearch collaboration and presentation

bull Mrs Denise Demirel (TU Darmstadt) May 2012 Hugo Jonker Rea-son Research collaboration

bull Mr Andre Deuker (Goethe University of Frankfurt) October 2012Hugo Jonker Reason Research collaboration and presentation

bull Prof Dr Josep Domingo-Ferrer (Universitat Rovira i Virgili Catalunya) October 2012 Sjouke Mauw Barbara Kordy Reason Research col-laboration and presentation

bull Mr Santiago Iturriaga (Universidad de la Republica Uruguay) April1 to June 30 2012 Pascal Bouvry Reason Co-advising his workon parallel multi-objective local search heuristics for multi-objectivescheduling problems

bull Prof Dr Sergio Nesmachnow (Universidad de la Republica Uruguay)14-18 May 2012 Pascal Bouvry Reason Co-advising his work on par-allel multi-objective local search heuristics for multi-objective schedul-ing problems

bull Dr Alexandre Dulaunoy (CIRCLSMILE Luxembourg) December2012 Gabriele Lenzini Barbara Kordy Reason Research discussionand presentation

bull Prof Dr Eduardo Ferme (University of Madeira Portugal) Nov 1-22012 Reason ICR-ILIAS talk research collaboration

bull Ms Weili Fu (Free University of Bolzano and Technical University ofDresden ) July 2012 Sjouke Mauw Barbara Kordy Reason Researchpresentation

bull Dr Flavio Garcia (Radboud University Nijmegen) April 2012 SjoukeMauw Reason Research discussion

54 Guests 179

bull Prof Dr Valentin Goranko (Technical University of Denmark) June2012 Wojciech Jamroga Reason Research collaboration and presen-tation

bull Mr Mohammad Hassan Habibi (ISSL Lab EE Department SharifUniversity of Technology) April 2012 Sjouke Mauw Barbara Kordy Reason Research presentation

bull Prof Dr Lynda Hardman (CWI Amsterdam) December 2012 SjoukeMauw Reason discussion

bull Prof Dr Iyad Rahwan ( Masdar Institute of Science and Technology)May 17-19 2012 ICR-ILIAS Reason attending the defence ceremonyof Yining Wu

bull Mr Oljira Dejene Boru (University of Trento Italy) March - June2012 Dzmitry Kliazovich Reason Master internship

bull Mr Sisay Tadesse (University of Trento Italy) March - June 2012Dzmitry Kliazovich Reason Master internship

bull Prof Dr Tomasz Lipniacki (Institute of Fundamental Technologi-cal Research Polish Academy of Sciences) December 2012 AndrzejMizera Jun Pang Reason CSC-Bio research presentation

bull Dr Yang Liu (National University of Singapore) June 2012 Jun Pang Reason Research collaboration and presentation

bull Dr Madalina Croitoru (University of Montpellier 2) November 26-302012 Reason ICR-ILIASresearch collaboration

bull Mr Artur Meski (Polish Academy of Sciences Warsaw) April 2012Wojciech Jamroga Reason Research presentation

bull Prof Dr Marko Bertogna (University of Modena Italy) June 2012Nicolas Navet Reason Real-time Dependable Systems seminar atLASSY

bull Dr Liliana Cucu-Grosjean (INRIA France) June 2012 Nicolas NavetReason Real-time Dependable Systems seminar at LASSY

bull Dr Rob Davis (University of York UK) June 2012 Nicolas NavetReason Real-time Dependable Systems seminar at LASSY

bull Mr Stephan Neumann (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration and presentation

bull Dr Evangelos Evangelos (University of the Aegean) January 2012Sasa Radomirovic Reason Research collaboration and presentation

180 CSC Representation

bull Mrs Maina Olembo (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration

bull Prof Dr Andrei Tchernykh (CICESE research center EnsenadaMexico) October 2012 Pascal Bouvry Reason Collaboration andcontribution to FNR CORE GreenIT project

bull Prof Dr Pierre-Etienne Moreau (INRIA-Nancy France) Yves LeTraon Reason Collaboration

bull Prof Dr Selwyn Piramuthu (University of Florida) June-July 2012SaToSS group Reason visiting professor at SnT and SaToSS group

bull Prof Dr Henry Prakken (Utrecht University) May 2012 Leon vander Torre Reason Attending the defence ceremony of Yining Wu

bull Dr Hongyang Qu (Oxford University) November 2012 Jun Pang Reason Research collaboration and presentation

bull Dr Sasa Radomirovic (ETH Zurich) November 2012 Sjouke MauwBarbara Kordy Reason Research collaboration and presentation

bull Dr Rolando Trujillo Rasua (Universitat Rovira i Virgili Catalunya) October 2012 Sjouke Mauw Barbara Kordy Reason Researchcollaboration and presentation

bull Dr MohammadReza Mousavi (Eindhoven University) January 2012Jun Pang Reason Research collaboration and presentation

bull Prof Dr Olivier Roux (Ecole Centrale de Nantes) April 2012 SjoukeMauw Jun Pang Reason Research collaboration and presentation

bull Prof Dr Samir Chopra (Brooklyn College of the City University ofNew York USA) Nov 12-16 2012 Reason talk research collabora-tion

bull Dr Samy Passos (Universidade Federal do Ceara) Jul 10 - Aug 122012 Reason ICR-SnT talk research collaboration

bull Mr Maciej Szreter (Polish Academy of Sciences Warsaw) April 2012Wojciech Jamroga Reason Research collaboration

bull Ms Iuliia Tkachenko (University Bordeaux 1) July 2012 Sjouke MauwBarbara Kordy Reason Research presentation

bull Dr Devrim Unal (TUBITAK-BILGEM UEKAE Turkey ) November2012 Sjouke Mauw Barbara Kordy Reason Research presentationand discussion

55 Visits and other representation activities 181

bull Dr Matthias Thimm (Universitat Koblenz) June 18-19 2012 ICR-ILIAS Reason talk research collaboration

bull Dr Harm van Beek (Netherlands Forensic Institute) June 2012 SjoukeMauw Reason Research collaboration and presentation

bull Mr Andre van Cleeff (University of Twente) March 2012 SjoukeMauw Reason Research collaboration and presentation

bull Dr Melanie Volkamer (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration

bull Dr Melanie Volkamer (TU Darmstad CASED) October 2012 HugoJonker Reason invited lecture

bull Mr Pim Vullers (Radboud University Nijmegen) February 2012 SjoukeMauw Sasa Radomirovic Reason Research collaboration and pre-sentation

bull Dr Roland Wen (University of New South Wales Australia ) Septem-ber 2012 Hugo Jonker Reason Research collaboration

bull Dr Jan Willemson (Cybernetica Estonia) May 2012 Barbara KordyPatrick Schweitzer Sjouke Mauw Reason Research collaborationand presentation

bull Dr Zhenchang Xing (National University of Singapore) June 2012Jun Pang Reason Research collaboration and presentation

55 Visits and other representation activities

bull Richard Booth Visited organization Katholieke Universiteit Leuven(Oct 18-23 2012) Reason Research collaboration

bull Martin Caminada Visited organization (June 1-2 2012) Reasonparticipation in COST AT coordination network on behalf of ICR

bull Wojciech Jamroga Visited organization (6-8062012) Reasonconference participation contributed talk poster presentation

bull Wojciech Jamroga Visited organization Polish Academy of Sciences(2minus 4042012) Reason work on a joint paper

bull Wojciech Jamroga Visited organization Technical University of Den-mark (19minus 21042012) Reason Research collaboration and presen-tation

182 CSC Representation

bull Wojciech Jamroga Visited organization Clausthal University ofTechnology (20minus 25022012) Reason Research collaboration

bull Wojciech Jamroga Visited organization Polish-Japanese IT Institute(31012012) Reason Research collaboration

bull Wojciech Jamroga Visited organization International PhD Programme(29 minus 30012012) Reason Meeting of the International PhD Pro-gramme project overview talk

bull Wojciech Jamroga Visited organization Polish Academy of Sciences(25minus 26062012 ) Reason supervision of a PhD student

bull Wojciech Jamroga Visited organization LAMAS 2012 (4minus5062012)Reason workshop organization

bull Wojciech Jamroga Visited organization Dagstuhl seminar on Nor-mative Multi-Agent Systems (14032012) Reason seminar visit

bull Wojciech Jamroga Visited organization Trento University (28 minus29052012) Reason Research collaboration and presentation

bull Hugo Jonker Visited organization Cyberwarfare thinktank (09112012)Reason Founding meeting Cyberwarfare thinktank

bull Hugo Jonker Visited organization Privacy Lab (03042012) Rea-son Privacy Lab opening

bull Hugo Jonker Visited organization Digital Enlightenment Forum(18minus 19062012) Reason networking event

bull Hugo Jonker Visited organization TDL Consortium (05102012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization TDL Consortium (23012012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization TDL Consortium (12062012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization Thales Research amp Technology(29112012) Reason Attack Trees workshop research collaboration

bull Hugo Jonker Visited organization VeriMag (11minus 13112012) Rea-son Research collaboration

bull Dzmitry Kliazovich Visited organization GREENET project meet-ing (19-09-2012 - 21-09-2012) Reason Initial Training Network onGreen Wireless Networks - Seminar presentation

55 Visits and other representation activities 183

bull Dzmitry Kliazovich Visited organization Koc Universtiy - COSTIC0804 Meeting (05-10-2012 - 07-10-2012) Reason Presentation -GreenCloud A Packet-level Simulator of Energy-aware Cloud Com-puting Data Centers

bull Dzmitry Kliazovich Visited organization University of Trento (17-11-2012) Reason Seminar presentaiton - Energy-Efficient Design inCloud Computing Communication Systems

bull Barbara Kordy Visited organization University of Twente (05 minus06112012) Reason FP7 TREsPASS project kick off meeting

bull Barbara Kordy Visited organization LORIA (15052012) ReasonResearch collaboration and presentation

bull Barbara Kordy Visited organization Royal Holloway University ofLondon (01032012) Reason Research collaboration and presenta-tion

bull Barbara Kordy Visited organization SINTEF (16 minus 19042012)Reason Research collaboration

bull Barbara Kordy Visited organization NTNU (16minus19042012) Rea-son Invited talk

bull Barbara Kordy Visited organization Thales Research amp Technol-ogy (29112012) Reason Keynote presentation at the Attack Treesworkshop and collaboration

bull Simon Kramer Visited organization Institute of Mathematical Sci-ences (0101minus 28022012) Reason invited research visit

bull Juan Luis Jimenez Laredo Visited organization University of Inns-bruck (01-03-2012 to 05-05-2012) Reason Research visit in the con-text of the AM2c FNR11AM2c32Building the Skeleton of a SOscheduler

bull Yves Le Traon Visited organization 7th International Workshopon Automation of Software Test (AST 2012) (June 2012) ReasonKeynote on Security testing and software engineering challenges

bull Yves Le Traon Visited organization 8th International Summer Schoolon Training And Research On Testing (TAROT 2012) (July 2012)Reason Invited Keynote on Security Testing

bull Yves Le Traon Visited organization LCIS-ESISAR INPG (23-25August 2012) Reason Attract PhD students build collaboration onsensor networks and testing

184 CSC Representation

bull Yves Le Traon Visited organization INRIA-IRISA (August Novem-ber ) Reason Continuous collaboration Project writing seminarsrecruitment of research associates

bull Yves Le Traon Visited organization Microsoft Luxembourg (March2012) Reason Presentation of my group research activities to MS

bull Yves Le Traon Visited organization KIT Karlsruhe (several meetingsper year) Reason Collaboration (EU project PhD co-supervision)

bull Yves Le Traon Visited organization Lip6 - Univ Paris VI (July2012) Reason Collaboration on SPL reverse engineering and testing

bull Yves Le Traon Visited organization Telecom Bretagne (April andJuly 2012) Reason PhD supervision Project proposals writing

bull Llio Humphreys Visited organization Delft University of Technology(18-21 November2012) Reason research visit

bull Llio Humphreys Visited organization Kings College London (28 June2012) Reason research visit

bull Sjouke Mauw Visited organization COST DC ICT (13minus16062012)Reason project meeting

bull Sjouke Mauw Visited organization COST IC1205 (30112012)Reason project meeting

bull Sjouke Mauw Visited organization COST DC ICT (10minus11092012)Reason project meeting

bull Sjouke Mauw Visited organization Digital Enlightenment Forum(18minus 19062012) Reason networking event

bull Sjouke Mauw Visited organization University of Twente (05minus06112012)Reason FP7 TREsPASS project kick off meeting

bull Sjouke Mauw Visited organization Nationaal Instituut voor Crim-inalistiek en Criminologie (NICC) (23012012) Reason Researchcollaboration and presentation

bull Sjouke Mauw Visited organization IFIP WG 112 seminar (04072012)Reason presentation

bull Sjouke Mauw Visited organization STM 2012 (12 minus 14092012)Reason conference visit and presentation

bull Sjouke Mauw Visited organization Thales Research amp Technology(29112012) Reason Attack Trees workshop research collaboration

55 Visits and other representation activities 185

bull Nicolas Navet Visited organization University of Nantes (June 82012) Reason Lecture rdquoIndustrial practices of real-time schedulingrdquoat the colloquium rdquo1972-2012 40 years of research in real-time schedul-ingrdquo scientific days of the University of Nantes June 8 2012

bull Jun Pang Visited organization Nanjing University (08minus12102012)Reason Research collaboration

bull Xavier Parent Visited organization Imperial College and Kingrsquos Col-lege London (29 April - 4 march 2012) Reason Presentation at sym-posium and research collaboration

bull Johnatan E Pecero Visited organization National Electronics andComputer Technology Center (NECTEC) (6-12-2012) Reason En-ergy efficient solutions for cloud and HPC green scheduling and nextgeneration hardware

bull Sasa Radomirovic Visited organization Nationaal Instituut voorCriminalistiek en Criminologie (NICC) (23012012) Reason Re-search collaboration and presentation

bull Tjitze Rienstra Visited organization Twente University (February27 - March 2 2012) Reason talk research collaboration

bull Patrick Schweitzer Visited organization KTH (24042012) ReasonResearch presentation

bull Patrick Schweitzer Visited organization NTNU (16 minus 19042012)Reason Research collaboration

bull Patrick Schweitzer Visited organization SINTEF (16minus 19042012)Reason Research collaboration and presentation

bull Alexandru-Adrian Tantar Visited organization 2012 IEEE WorldCongress on Computational Intelligence (WCCI) (June 10-15 2012)Reason Green Evolutionary Computing for Sustainable Environments(tutorial)

bull Silvano Tosatto Visited organization Sophia Antipolis (February 8-11 2012) Reason Research collaboration

bull Silvano Tosatto Visited organization University of Queensland (May15- June 1 2012) Reason Research collaboration

bull Paolo Turrini Visited organization Technical University of Denmark(May 1-8 2012) Reason Research collaboration

186 CSC Representation

56 Research meeting

bull 13th International Workshop on Computational Logic in Multi-AgentSystems (2012-08-27 ndash 2012-08-28)

ndash Description Montpellier France

bull Joint UR-Math and UR-CSC Discrete Mathematics Colloquium (2010-05-10 ndash 2012-04-03) Number of presentations 15

ndash Description The Decision Aid Systems group within the Com-puter Science and Communication Research Unit (CSC) and theDiscrete Mathematics group within the Mathematics ResearchUnit (MATH) of the University of Luxembourg organize period-ically a common research seminar Regular Members

lowast R Bisdorff (responsible co-organiser CSC)

lowast M Couceiro (ass researcher postdoc MATH)

lowast E Lehtonen (ass researcher postdoc CSC)

lowast J-L Marichal(responsible co-organiser MATH)

lowast P Mathoney (ass researcher postdoc MATH)

lowast A Olteanu (assistantPhd studentCSC)

lowast Th Veneziano (assistantPhd studentCSC)

lowast T Walhauser (ass researcher postdoc MATH)

bull ICR Seminars

ndash Description Typically weekly (Monday 4pm) Seminar with guestresearchersInternal seminar

bull MINE Research Meeting (2012-01-09 ndash 2012-12-04) Number of presen-tations 24

ndash Description Research meetings

lowast Prof Dr Stephan Busemann German Research Centre forArtificial Intelligence 5 CET meetings (official and unofficialmeetings)

lowast Dr Urich Schaefer German Research Centre for ArtificialIntelligence 2 CET meetings (official and unofficial meet-ings)

lowast Prof Dr Theoharry Grammatikos Dept of Finance (LSF)15 meetings FNR CORE Project ESCAPE

lowast Dr Georges Krier SES 2 CET meetings (official and unoffi-cial meetings)

56 Research meeting 187

lowast Prof Dr Susanne Jekat University of Winterthur Dept ofLinguistics 1 inofficial CET meeting

bull ILIAS - TeamBouvry Seminars

ndash Description Research team meetings and one yearly team meet-ing with 25 presentations organized in November

bull Lassy Seminar

ndash Description This seminar is given several times a year by invitedspeakers on topics related to software construction

bull MAO - Multi-Agent Organisation (2011-12-19 ndash 2011-12-23)

ndash Description Leiden The Netherlands

bull Norm group research meeting

ndash Description weekly (Friday 2pm) presentations by guest re-searchers and internal members

bull Normative Multi-Agent Systems (2012-03-11 ndash 2012-03-16)

ndash Description Dagstuhl Germany

bull SaToSS Research Meeting

ndash Description On Tuesdays from 1030 to 1130 the SaToSS groupand the APSIA group led by Prof Peter YA Ryan hold theirweekly Security Research Meeting (SRM) The purpose of theSRM is to present and discuss research problems that are interest-ing for the members of both groups In 2012 Sasa RadomirovicBarbara Kordy and Jean Lancrenon were responsible for the or-ganization of the SRM The meeting featured 50 presentations in2012 Notable speakers in 2012 include Prof Luca Vigano ProfJason Crampton and Prof Josep Domingo-Ferrer The completelist of speakers as well as our seminar rules can be found at theseminar webpage httpsatossuniluseminarssrm

188 CSC Representation

Chapter 6

CSC Software

bull ACL-Lean Licence Free

ndash Description Developers Daniele Rispoli and Valerio Genovese

ACL-Lean is a decidable theorem prover (written in PROLOG)for propositional access control logics with says operator ACL-Lean implements an analytic labelled sequent calculus for condi-tional access control logics presented in V Genovese L GiordanoV Gliozzi and G L Pozzato ldquoA Conditional Constructive Logicfor Access Control and its Sequent Calculusrdquo 20th InternationalConference on Automated Reasoning with Analytic Tableaux andRelated Methods

bull ADTool Licence free use

ndash Description The attackndashdefense tree language formalizes andextends the attack tree formalism It is a methodology to graph-ically analyze security aspects of scenarios With the help ofattributes on attackndashdefense trees also quantitative analysis canbe performed As attackndashdefense tree models grow they soonbecome intractable to be analyzed by hand Hence computersupport is desirable Software toll called the ADTool has beenimplemented as a part of the ATREES project to support theattackndashdefense tree methodology for security modeling The mainfeatures of the ADTool are easy creation efficient editing andquantitative analysis of attackndashdefense trees The tool is avail-able at httpsatossunilusoftwareadtool The tool was

190 CSC Software

realized by Piotr Kordy and its manual was written by PatrickSchweitzer

bull ARGULAB Licence GPL v3

ndash Description Developers Mikolaj Podlaszewski

We present an implementation of the recently developed per-suasion dialogue game for formal argumentation theory undergrounded semantics The idea is to apply Mackenzie-style dia-logue to convince the user that an argument is or is not in thegrounded extension Hence to provide a (semi-)natural user in-terface to formal argumentation theory

bull bagit Licence non-redistributable for internal use only

ndash Description An internal web-based tool that provides assistanceto research groups by storing pooling tagging and indexing pa-pers and other publications Developed by Christian Glodt In2012 minor bugfixes have been applied to Bagit

bull Canephora Licence free use

ndash Description Trust opinions can be represented as probability dis-tributions over an (unknown) integrity parameter Simple trustopinions (that are based only on personal observations) can berepresented as a class of distributions known as Beta distribu-tions Trust opinions that are based on recommendations do not(necessarily) have such a simple representation Canephora nu-merically approximates the trust opinion that can be inferredfrom a recommendation Precision and coarseness of the resultcan be selected The result may depend on the strategy of therecommender Canephora allows implementations of such pos-sible strategies to be added on the fly The tool was createdby Tim Muller and can be accessed at httpsatossunilu

softwarecanephora

bull mCarve and cCarve Licence free use

ndash Description mCarve and cCarve are software tools for carvingattributed dump sets These dump sets can for instance beobtained by dumping the memory of a number of smart cards orby regularly dumping the memory of a single smart card duringits lifetime The tools help in determining at which location inthe dumps certain attributes are stored mCarve is written inPython and is available from httpsatossunilusoftware

191

mcarve More information about mCarve can be obtained fromour paper [259] cCarve is written in C++ It implements alinear algorithm for carving attributed dump sets which improvesits run time with respect to mCarve cCarve is available fromhttpsatossunilusoftwareccarve

bull delegation2spass Licence Free

ndash Description Developers Daniele Rispoli and Valerio Genovese

delegstion2spass is a parser (written in SCHEME) which imple-ments a set of complete reduction axioms and translates dynamicformulas for a delegationrevocation logic into propositional logicexpressed in DFG syntax

bull Democles Licence Freely redistributable see details athttpdemocleslassyunilulicensehtml

ndash Description Democles is a modeling tool that supports the EPlanguage developed by LASSYs MDE group It is mainly devel-oped by Christian Glodt In 2012 the following improvementswere made to Democles Nuno Amalio started work on imple-menting an EP-to-Alloy transformation for EP systems in Demo-cles Christian Glodt created a branch of Democles implement-ing model bridging interfaces as described in Sam Schmitrsquos MasterThesis rdquoA Bridging Mechanism for Adapting Abstract Models toPlatformsrdquo

bull Discrete Particle Method (DPM) Licence Internal use only

ndash Description The Discrete Particle Method (DPM) itself is anadvanced numerical simulation tool which deals with both mo-tion and chemical conversion of particulate material such as coalor biomass in furnaces However predictions of solely motion orconversion in a de-coupled mode are also applicable The DiscreteParticle Method uses object oriented techniques that support ob-jects representing three-dimensional particles of various shapessuch as cylinders discs or tetrahedrons for example size and ma-terial properties This makes it a highly versatile tool dealingwith a large variety of different industrial applications of granu-lar matter A user interface allows easily extending the softwarefurther by adding user-defined models or material properties toan already available selection of materials properties and reac-tion systems describing conversion Thus the user is relievedof underlying mathematics or software design and therefore is

192 CSC Software

able to direct his focus entirely on the application The DiscreteParticle Method is organised in a hierarchical structure of C++classes and works both in Linux and XP environments also onmulti-processor machines

This software is developed by the XDEM research team from theResearch Unit in Engineering Science (RUES) in collaborationwith the Computer Science and Communications (CSC) researchunit

bull GreenCloud Licence Open source

ndash Description Greencloud is a sophisticated packet-level simulatorfor energy-aware cloud computing data centers with a focus oncloud communications It offers a detailed fine-grained modelingof the energy consumed by the data center IT equipment such ascomputing servers network switches and communication links

bull JShadObf

ndash Description A JavaScript Obfuscation Framework based on evo-lutionary algorithms

bull LuxTraffic

ndash Description LuxTraffic is a project aiming to provide real timetraffic information by using smartphones as mobile traffic sensorsLuxembourg is an ideal location to validate the suggested systembecause of several factors The country has a well developed roadinfrastructure with 282 km of highways in total on its territorywhich permits to have a country- scoped instead of city-scopedapproach Also the recent high penetration rate of smartphonesin combination with the data flat rates create a favorable envi-ronment for community based traffic sensing using mobile phonesTaking these factors into account we designed LuxTraffic a trafficinformation system which is in essence an online repository aim-ing at centralizing all information related to individual mobilityin Luxembourg

The system has two main goals The first is to create and main-tain a community of users that will actively participate in col-lecting relevant traffic information using smartphone devices inan anonymous and autonomous manner To accomplish this ap-plications (APPs) for the two dominant mobile platforms iOSand Android have been developed In return the users benefitfrom a variety of traffic information services available online In

193

the first phase the system provides detailed information abouttraffic fluidity on Luxembourg highways In the second phasethe system will be extended to cover the entire road network

The second purpose of the LuxTraffic platform is to gather archiveand analyze the collected traffic data centrally in order to identifytraffic bottlenecks and propose solutions To provide additionalinformation we interface with the local highway traffic controlsystem called CITA which among others provides a 24 hoursaccess to highway cameras

bull MaM Multidimensional Aggregation Monitoring Licence Open Source

ndash Description MaM Multidimensional Aggregation MonitoringMaM performs multidimensional aggregation over various typesof data The targegeted use is the storage visualisation and anal-ysis of big data For example network operators may capturelarge quantities of flow based data which includes source and des-tination IP addresses and ports number of packets etc Aggre-gation allows to leverage global view and so is particularly helpfulfor anomaly tracking as the most powerful like spam campaignsbotnets distributed denial of service are distributed phenomenaand can only be observed assuming a global point of view How-ever defining the aggregation granularity is quite difficult andshould not fixed over all the space For example some IP net-works may require a small granularity while others need only ahigh level overview Hence MaM automatically selects the gran-ularity by creating irregular dimension splits which are so betterfitted to the underlying distribution In addition if a user doesnot know exactly what is looking for when he is monitoring hisnetwork it does not know which dimension is the most importantFor example there is no reason to aggregate first on source IPaddresses and then destination ports or vice-versa Thus MaMwill automatically optimizes that by selecting the proper order ofdimensions and even on multiple levels involving twice or morethe same dimension with different granularity levels

To achieve a good scalability MaM uses an underneath tree struc-ture A MaM tree is updated online with a limited complexityusing a Least Recently Used strategy to keep the tree size com-pact and so to save resources

MaM is a generic tool and can be extended to any hierarchicaltypes of data by implementing very few functions which describethe hierarchy

To summarize the advantages of MaM are - support of het-erogeneous types of data simultaneously - high scalability - easy

194 CSC Software

to extend - user friendly outputs and graphical user interface -open-source (available at httpsgithubcomjfrancoismam)

The practicability of MaM have been highlighted in [252] and apresentation is available at (demonstration at 1415)

httpswwwusenixorgconferencelisa12efficient-multidimensional-aggregation-large-scale-monitoring

bull MiCS Management System Licence non-redistributable for internaluse only

ndash Description An internal web-based tool developed for the man-agement of modules courses and profiles of the Master in Infor-mation and Computer Sciences Developed by Christian GlodtNumerous improvements have been made to the MiCS Manage-ment System in 2012

bull Model Decomposer Licence free to use binary redistribution per-mitted

ndash Description An Eclipse plugin that implements a generic modeldecomposition technique which is applicable to Ecore instancesand EP models and is described in a paper published in the pro-ceedings of the FASE 2011 conference Developed by ChristianGlodt

bull MSC Macro Package for LATEX Licence free use

ndash Description The message sequence chart (MSC) language is avisual language for the description of the interaction between dif-ferent components of a system This language is standardizedby the ITU (International Telecommunication Union) in Recom-mendation Z120 MSCs have a wide application domain rang-ing from requirements specification to testing and documenta-tion In order to support easy drawing of MSCs in LATEX doc-uments Sjouke Mauw and coworkers have developed the MSCmacro package Currently Piotr Kordy is responsible for main-tenance of the package Version 117 is currently available fromhttpsatossunilumscpackage In 2012 work started onrecoding the package as to make it compatible with pdflatex

bull OVNIS

ndash Description For online vehicular wireless and traffic simulationAn integration of traffic simulator SUMO with network simulatorns-3

195

bull ROS face recognition package Licence Attribution-NonCommercial30

ndash Description Developers Pouyan Ziafati Provides a ROS simpleactionlib server interface for performing different face recognitionfunctionalities in video stream

bull Seq-ACL+ Licence Free

ndash Description Developers Daniele Rispoli Valerio Genovese andDeepak Garg

Seq-ACL+ is a decidable theorem prover (written in PROLOG)for the modal access control logic ACL+ presented in V Genoveseand D Garg rdquoNew Modalities for Access Control Logics Permis-sion Control and Ratificationrdquo 7th International Workshop onSecurity and Trust Management - STM 2011

bull SHARC Licence GPL v3

ndash Description Source code and benchmarking framework for theSHARC (Sharper Heuristic for Assignment of Robust Communi-ties) protocol

bull VehILux

ndash Description Large set of realistic vehicular traces over the areaof Luxembourg country (110000 trips) than can be used by trafficsimulators like SUMO and in other simulations of traffic informa-tion systems

bull Visual Contract Builder Licence free to use binary redistributionpermitted

ndash Description A suite of Eclipse plugins that provide supportfor graphically editing and typechecking VCL (Visual ContractLanguage) diagrams Developed by Christian Glodt and NunoAmalio

196 CSC Software

Chapter 7

CSC Publications in 2012

The publications listed in this chapter have been generated from the officialpublication record repository of the university

httppublicationsunilu

An overview of the publication quantity (per category) is provided in thetable below

Publication category Quantity Section

Books 1 sect71 page 197Book Chapters 7 sect72 page 198

International journals 69 sect73 page 198Conferences Articles 165 sect74 page 204

Internal Reports 6 sect75 page 223Proceedings 3 sect76 page 224

Total 251

Table 71 Overview of CSC publications in 2012

71 Books

[1] Cas Cremers and Sjouke Mauw Operational semantics and verificationof security protocols Springer-Verlag 2012

198 BIBLIOGRAPHY

72 Book Chapters

[2] Paolo Turrini Xavier Parent Leendert van der Torre and SilvanoColombo Tosatto Contrary-To-Duties in Games pages 329ndash348Springer 2012

[3] Johnatan E Pecero Bernabe Dorronsoro Mateusz Guzek and Pas-cal Bouvry Memetic Algorithms for Energy-Aware Computation andCommunications Optimization in Computing Clusters pages 443 ndash473 Chapman and HallCRC Press 2012

[4] Xavier Parent Why Be Afraid of Identity volume 7360 of LectureNotes in Computer Science pages 295ndash307 Springer 2012

[5] Hugo Jonker Sjouke Mauw and Jun Pang Location-Based ServicesPrivacy Security and Assurance pages 235ndash244 IOS Press 2012

[6] Moussa Amrani A Formal Semantics of Kermeta pages 274 ndash 315IGI Global Hershey PA USA 2012

[7] Marcin Seredynski and Pascal Bouvry The Application of Evolution-ary Heuristics for Solving Soft Security Issues in MANETs pages 97ndash114 Springer 2012

[8] Jianguo Ding Ilangko Balasingham and Pascal Bouvry ManagementChallenges for Emerging Wireless Networks pages 3ndash34 CRC Press2012

73 International journals

[9] Raymond Bisdorff On polarizing outranking relations with large per-formance differences Journal of Multi-Criteria Decision AnalysisDOI 101002mcda14721ndash20 2012

[10] Christoph Benzmuller Dov Gabbay Valerio Genovese and DanieleRispoli Embedding and automating conditional logics in classicalhigher-order logic Ann Math Artif Intell 66(1-4)257ndash271 2012

[11] Benoıt Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee Technique et science informa-tiques 31(8-9-10)1121ndash1152 2012

[12] Alex Biryukov and Johann Grosschadl Cryptanalysis of the full aesusing gpu-like special-purpose hardware Fundamenta Informaticae114(3-4)221ndash237 2012

BIBLIOGRAPHY 199

[13] Alexander Bochman and Dov Gabbay Causal dynamic inference AnnMath Artif Intell 66(1-4)231ndash256 2012

[14] Davide Falessi Mehrdad Sabetzadeh Lionel Briand EmanueleTurella Thierry Coq and Rajwinder Kaur Panesar-Walawege Plan-ning for safety standards compliance A model-based tool-supportedapproach IEEE Software 29(3)64ndash70 2012

[15] Dov Gabbay Overview on the connection between reactive kripkemodels and argumentation networks Ann Math Artif Intell 66(1-4)1ndash5 2012

[16] Dov Gabbay Introducing reactive kripke semantics and arc accessi-bility Ann Math Artif Intell 66(1-4)7ndash53 2012

[17] Dov Gabbay Introducing reactive modal tableaux Ann Math ArtifIntell 66(1-4)55ndash79 2012

[18] Dov Gabbay Completeness theorems for reactive modal logics AnnMath Artif Intell 66(1-4)81ndash129 2012

[19] Dov Gabbay and Sergio Marcelino Global view on reactivity switchgraphs and their logics Ann Math Artif Intell 66(1-4)131ndash1622012

[20] Philipp Grabher Johann Grosschadl Simon Hoerder Kimmo Jarvi-nen Dan Page Stefan Tillich and Marcin Wojcik An explorationof mechanisms for dynamic cryptographic instruction set extensionJournal of Cryptographic Engineering 2(1)1ndash18 2012

[21] Laurent Kirsch Jean Botev and Steffen Rothkugel Snippets andcomponent-based authoring tools for reusing and connecting docu-ments Journal of Digital Information Management 10(6)399ndash4092012

[22] Tom Mens and Jacques Klein Evolving software - introduction to thespecial theme Ercim News 888ndash9 2012

[23] Gilles Perrouin Sebastian Oster Sagar Sen Jacques Klein BenoitBaudry and Yves Le Traon Pairwise testing for software prod-uct lines Comparison of two approaches Software Quality Journal20(3)605ndash643 2012

[24] Selwyn Piramuthu Gaurav Kapoor Wei Zhou and Sjouke MauwInput online review data and related bias in recommender systemsDecision Support Systems 53(3)418ndash424 2012

200 BIBLIOGRAPHY

[25] Qiang Tang Public key encryption schemes supporting equality testwith authorization of different granularity International Journal ofApplied Cryptography pages 304ndash321 2012

[26] Qiang Tang Public key encryption supporting plaintext equality testand user specified authorization Security and Communication Net-works pages 1351ndash1362 2012

[27] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre Modelling defeasible and prioritized support in bipolar argu-mentation Ann Math Artif Intell 66(1-4)163ndash197 2012

[28] Serena Villata Guido Boella Dov Gabbay Leendert van der Torreand Joris Hulstijn A logic of argumentation for specification andverification of abstract argumentation frameworks Ann Math ArtifIntell 66(1-4)199ndash230 2012

[29] Ying Zhang Chenyi Zhang Jun Pang and Sjouke Mauw Game-based verification of contract signing protocols with minimal messagesInnovations in Systems and Software Engineering 8111ndash124 2012

[30] Qixia Yuan Panuwat Trairatphisan Jun Pang Sjouke MauwMonique Wiesinger and Thomas Sauter Probabilistic model check-ing of the pdgf signaling pathway Transactions on ComputationalSystems Biology XIV151ndash180 2012

[31] Emil Weydert Conditional ranking revision - iterated revision withsets of conditionals Journal of Philosophical Logic 41(1)237ndash2712012

[32] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre Modelling defeasible and prioritized support in bipolar argu-mentation Ann Math Artif Intell 66(1-4)163ndash197 2012

[33] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre A logic of argumentation for specification and verification ofabstract argumentation frameworks Ann Math Artif Intell 66(1-4)199ndash230 2012

[34] Paolo Turrini Jan Broersen Rosja Mastrop and John-Jules ChMeyer Regulating competing coalitions a logic for socially optimalgroup choices Journal of Applied Non-Classical Logics 22(1-2)181ndash202 2012

[35] Yanjie Sun Chenyi Zhang Jun Pang Baptiste Alcalde and SjoukeMauw A trust-augmented voting scheme for collaborative privacymanagement Journal of Computer Security 20(4)437ndash459 2012

BIBLIOGRAPHY 201

[36] Hanna Scholzel Hartmut Ehrig Maria Maximova Karsten Gabrieland Frank Hermann Satisfaction restriction and amalgamation ofconstraints in the framework of m-adhesive categories Electronic Pro-ceedings in Theoretical Computer Science (EPTCS) 9383ndash104 2012

[37] Ayda Saidane and Nicolas Guelfi Seter Towards architecture-modelbased security engineering International Journal of secure softwareengineering to appear 0920120ndash0 2012

[38] Frederic Pinel Bernabe Dorronsoro Johnatan E Pecero Pascal Bou-vry and Samee U Khan A two-phase heuristic for the energy-efficientscheduling of independent tasks on computational grids Cluster Com-puting 2012

[39] Frederic Pinel Bernabe Dorronsoro and Pascal Bouvry Solving verylarge instances of the scheduling of independent tasks problem on thegpu Journal of Parallel and Distributed Computing 2012

[40] Jakub Muszynski Sebastien Varrettte Pascal Bouvry FranciszekSeredynski and Samee U Khan Convergence analysis of evolutionaryalgorithms in the presence of crash-faults and cheaters InternationalJournal of Computers amp Mathematics with Applications 64(12)3809ndash 3819 2012

[41] Roman Ledyayev Benoıt Ries and Anatoliy Gorbenko React anarchitectural framework for the development of a software productline for dependable crisis management systems Radioelectronic andComputer Systems 59(7)284ndash288 2012

[42] Simon Kramer Rajeev Gore and Eiji Okamoto Computer-aideddecision-making with trust relations and trust domains (cryptographicapplications) Journal of Logic and Computation pages 0 ndash 0 2012page numbers not yet known

[43] Dzmitry Kliazovich Simone Redana and Fabrizio Granelli Arqproxy Cross-layer error recovery in wireless access networks Inter-national Journal of Communication Systems 25(4)461 ndash 477 2012

[44] You Ilsun Lenzini Gabriele Ogiela Marek R and Bertino Elisa De-fending against insider threats and internal data leakage (guest edito-rial) Security and Communication Networks 5(8)831 ndash 833 2012

[45] Frank Hermann and Janis Voigtlander First international work-shop on bidirectional transformations (bx 2012) Preface ElectronicCommunications of the European Association of Software Science andTechnology (ECEASST) 491ndash4 2012

202 BIBLIOGRAPHY

[46] Davide Grossi and Paolo Turrini Dependence in games and de-pendence games Autonomous Agents and Multi-Agent Systems25(2)284ndash312 2012

[47] Valentin Goranko Wojciech Jamroga and Paolo Turrini Strategicgames and truly playable effectivity functions Autonomous Agentsand Multi-Agent Systems 2012

[48] David Galindo Rodrigo Roman and Javier Lopez On the energy costof authenticated key agreement in wireless sensor networks WirelessCommunications and Mobile Computing 12(1)133 ndash 143 2012

[49] Claudia Ermel Frank Hermann Jurgen Gall and Daniel BinanzerVisual modeling and analysis of emf model transformations based ontriple graph grammars Electronic Communications European Associ-ation of Software Science and Technology (EC-EASST) pages 1ndash122012

[50] Vasileios Efthymiou Maria Koutraki and Grigoris Antoniou Real-time activity recognition and assistance in smart classrooms Advancesin Distributed Computing and Artificial Intelligence Journal 15367ndash74 2012

[51] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry New state-of-the-art results for cassini2 global trajectory optimization problemThe Journal of the Advanced Concepts Team 556 ndash 72 2012

[52] Miguel Couceiro and Erkko Lehtonen Galois theory for sets of op-erations closed under permutation cylindrification and compositionAlgebra Universalis 67(3)273ndash297 2012

[53] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser The aritygap of order-preserving functions and extensions of pseudo-booleanfunctions Discrete Applied Mathematics 160(4-5)383ndash390 2012

[54] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser Decom-positions of functions based on arity gap Discrete Mathematics312(2)238ndash247 2012

[55] Martin Caminada Walter Carnielli and Paul Dunne Semi-stablesemantics J Log Comput 22(5)1207ndash1254 2012

[56] Richard Booth Thomas Meyer and Chattrakul Sombattheera A gen-eral family of preferential belief removal operators Journal of Philo-sophical Logic 41(4)711ndash733 2012

[57] Mike Behrisch Miguel Couceiro Keith A Kearnes Erkko Lehtonenand Agnes Szendrei Commuting polynomial operations of distributivelattices Order 29(2)245ndash269 2012

BIBLIOGRAPHY 203

[58] Alessandra Bagnato Barbara Kordy Per H Meland and PatrickSchweitzer Attribute decoration of attack-defense trees InternationalJournal of Secure Software Engineering 3(2)1ndash35 2012

[59] Peter Ryan and Thea Peacock Verifiable voting Recent advances andfuture challenges Voting What Has Changed What Hasnrsquot amp WhatNeeds Improvement 1(1)1ndash84 2012

[60] Le-Nam Tran Mats Bengtsson and Bjorn Ottersten Iterative pre-coder design and user scheduling for block-diagonalized systems IEEETransactions on Signal Processing 60(7)3726ndash3739 2012

[61] Yongming Huang Gan Zheng Mats Bengtsson Kai-Kit Wong LuxiYang and Bjorn Ottersten Distributed multicell beamforming designapproaching pareto boundary with max-min fairness IEEE Transac-tions on Wireless Communications 11(8)2921ndash2933 2012

[62] Bhavani Shankar Daniel Arapoglou Pantelis and Bjorn OtterstenSpace-frequency coding for dual polarized hybrid mobile satellite sys-tems IEEE Transactions on Wireless Communications 11(8)2806ndash2814 2012

[63] Emil Bjornson Mats Bengtsson and Bjorn Ottersten Pareto char-acterization of the multicell mimo performance region with simple re-ceivers IEEE Transactions on Signal Processing 60(8)4464ndash44692012

[64] Symeon Chatzinotas Gan Zheng and Bjorn Ottersten Generic op-timization of linear precoding in multibeam satellite systems IEEETransactions on Wireless Communications 11(6)2308ndash2320 2012

[65] Bhavani Shankar M R Pantelis-Daniel Arapoglou and Bjorn Otter-sten Space-frequency coding for dual polarized hybrid mobile satellitesystems IEEE Transactions on Wireless Communications 11(8)2806ndash 2814 2012

[66] Frederic Garcia Djamila Aouada Bruno Mirbach and Bjorn Otter-sten Real-time distance-dependent mapping for a hybrid tof multi-camera rig IEEE Journal of Selected Topics in Signal Procesing(JSTSP) 6(5)1ndash12 2012

[67] Dimitrios Christopoulos Symeon Chatzinotas Gan Zheng Joel Grotzand Bjorn Ottersten Multibeam joint processing in satellite communi-cations Eurasip Journal on Wireless Communications and Network-ing 2012(1) 2012

204 BIBLIOGRAPHY

[68] Emil Bjornson Gan Zheng Mats Bengtsson and Bjorn OtterstenRobust monotonic optimization framework for multicell miso systemsIEEE Transactions on Signal Processing 60(5)2508ndash2523 2012

[69] David Fotue Houda Labiod and Thomas Engel Performance eval-uation of mini-sinks mobility using multiple paths in wireless sensornetworks International Journal of Computer Science and Security(IJCSS) 6(3)150ndash167 2012

[70] Marcin Seredynski and Pascal Bouvry Analysing the development ofcooperation in manets The Journal of Supercomputing pages 1ndash172012

[71] Marcin Seredynski and Pascal Bouvry Direct reciprocity-based coop-eration in mobile ad hoc networks International Journal of Founda-tions of Computer Science 23(2)501ndash521 2012

[72] Dzmitry Kliazovich Pascal Bouvry and Samee U Khan Greenclouda packet-level simulator of energy-aware cloud computing data centersThe Journal of Supercomputing 62(3)pp 1263ndash1283 2012

[73] Patricia Ruiz Bernabe Dorronsoro Pascal Bouvry and Lorenzo JTardon Information dissemination in vanets based upon a tree topol-ogy Journal of Ad hoc Networks 10(1)111ndash127 2012

[74] Patricia Ruiz Bernabe Dorronsoro Giorgio Valentini Frederic Pineland Pascal Bouvry Optimisation of the enhanced distance basedbroadcasting protocol for manets J of Supercomputing Special Is-sue on Green networks 62(3)1213ndash1240 2012

[75] Shaukat Ali Tao Yue and Lionel Briand Does aspect-oriented mod-eling help improve the readability of uml state machines Softwareand Systems Modeling 2012

[76] Andrea Arcuri and Lionel Briand A hitchhikerrsquos guide to statisti-cal tests for assessing randomized algorithms in software engineeringSoftware Testing Verification and Reliability 2012

[77] Andrea Arcuri and Lionel Briand Formal analysis of the probability ofinteraction fault detection using random testing IEEE Transactionson Software Engineering 38(5)1088ndash1099 2012

74 Conferences Articles

[78] Apostolos Stathakis Gregoire Danoy Thomas Veneziano Pascal Bou-vry and Gianluigi Morelli Bi-objective optimisation of satellite pay-load configuration In Proceedings of the 13e congres annuel de la

BIBLIOGRAPHY 205

Societe francaise de Recherche Operationnelle et drsquoAide a la Decision(ROADEF) pages 1ndash2 2012

[79] Apostolos Stathakis Gregoire Danoy Thomas Veneziano JulienSchleich and Pascal Bouvry Optimising satellite payload reconfig-uration An ilp approach for minimising channel interruptions In 2ndESA Workshop on Advanced Flexible Telecom Payloads pages 1ndash8ESA 2012

[80] Guido Boella Joris Hulstijn Llio Humphreys Livio Robaldo andLeendert Van der Torre Legal knowledge management systems forregulatory compliance In IX Conference of the Italian Chapter ofAIS pages 1ndash8 2012

[81] Guido Boella Joris Hulstijn Llio Humphreys Marijn Janssen andLeendert van der Torre Towards legal knowledge management systemsfor regulatory compliance In IX Conference of the Italian Chapter ofAIS pages 1ndash8 2012

[82] Guido Boella Luigi di Caro Llio Humphreys Livio Robaldo andLeendert van der Torre Nlp challenges for eunomos a tool to build andmanage legal knowledge In Proceedings of the Eighth InternationalConference on Language Resources and Evaluation (LREC rsquo12) pages3672ndash3678 European Language Resources Association (ELRA) 2012

[83] Guido Boella Llio Humphreys Marco Martin Piercarlo Rossi andLeendert van der Torre Eunomos a legal document and knowledgemanagement system to build legal services In Monica (Editor) Palmi-rani Ugo (Editor) Pagallo Pompeu (Editor) Casanovas and Gio-vanni (Editor) Sartor editors AI Approaches to the Complexity ofLegal Systems Models and Ethical Challenges for Legal Systems LegalLanguage and Legal Ontologies Argumentation and Software Agentsvolume 7639 of Lecture Notes in Computer Science pages 131ndash146Berlin Heidelberg 2012 Springer

[84] Pouyan Ziafati Mehdi Dastani John-Jules Meyer and Leon VanDer Torre Agent programming languages requirements for program-ming cognitive robots (extended abstract) In Proceedings of the 24thBenelux Conference on Artificial Intelligence pages 337ndash338 2012

[85] Eric Tobias Eric Ras and Nuno Amalio Suitability of visual mod-elling languages for modelling tangible user interface applicationsIn Symposium on Visual Languages and Human-Centric Computing(VLHCC) pages 269 ndash270 IEEE 2012

206 BIBLIOGRAPHY

[86] Jerome Leemans and Nuno Amalio Modelling a cardiac pacemakervisually and formally In Symposium on Visual Languages and Human-Centric Computing (VLHCC) pages 257 ndash258 IEEE 2012

[87] Mike Papadakis and Yves Le Traon Using mutants to locate ldquoun-knownrdquo faults In Fifth International Conference on Software TestingVerification and Validation (ICST) pages 691ndash700 2012

[88] Silvano Colombo Tosatto Guido Boella Leendert van der Torre andSerena Villata Abstract normative systems Semantics and prooftheory In Proceedings of the Thirteenth International Conference onPrinciples of Knowledge Representation and Reasoning pages 358ndash368 2012

[89] Silvano Colombo Tosatto Guido Boella Leon van der Torre and Ser-ena Villata Visualizing normative systems an abstract approach InDeontic Logic in Computer Science - 11th International ConferenceDEON 2012 pages 16ndash30 2012

[90] Silvano Colombo Tosatto Marwane El Kharbili Guido GovernatoriPierre Kelsen Qin Ma and Leender van der Torre Algorithms forbasic compliance problems In Benelux conference on Artificial Intel-ligence (BNAIC) 2012

[91] Jayanta Poray and Christoph Schommer Operations on conver-sational mind-graphs In The 4th International Conference onAgents and Artificial Intelligence (ICAART - 2012) pages 511ndash514SciTePress 2012

[92] Christoph Bosch Qiang Tang Peter Hartel and Willem Jonker Selec-tive document retrieval from encrypted database In Information Se-curity - 15th International Conference ISC 2012 volume 7483 pages224ndash241 Springer 2012

[93] Xiaofeng Chen Jin Li Jianfeng Ma Qiang Tang and Wenjing LouNew algorithms for secure outsourcing of modular exponentiations InComputer Security - ESORICS 2012 - 17th European Symposium onResearch in Computer Security volume 7459 pages 541ndash556 Springer2012

[94] Johann Grosschadl Dan Page and Stefan Tillich Efficient java im-plementation of elliptic curve cryptography for j2me-enabled mobiledevices In Information Security Theory and Practice mdash WISTP 2012volume LNCS 7322 pages 189ndash207 Springer Verlag 2012

[95] Arjan Jeckmans Qiang Tang and Pieter Hartel Privacy-preservingcollaborative filtering based on horizontally partitioned dataset In

BIBLIOGRAPHY 207

International Symposium on Security in Collaboration Technologiesand Systems pages 439ndash446 2012

[96] Max E Kramer Jacques Klein and Jim R H Stell Building specifica-tions as a domain-specific aspect language In Proceedings of the Sev-enth Workshop on Domain-Specific Aspect Languages at the Aspect-Oriented Software Development Conference pages 29ndash32 ACM 2012

[97] Daniel Marnach Sjouke Mauw Miguel Martins and Carlo HarpesDetecting meaconing attacks by analysing the clock bias of gnss re-ceivers In European Navigation Conference (ENC 2012) pages 1ndash192012

[98] Jorge Augusto Meira Eduardo Cunha Almeida Yves Le Traon andGerson Sunye Peer-to-peer load testing In ICST - 2012 IEEE FifthInternational Conference on Software Testing Verification and Vali-dation pages 642ndash647 IEEE 2012

[99] Gilles Perrouin Brice Morin Franck Chauvel Franck Fleurey JacquesKlein Yves Le Traon Olivier Barais and Jean-Marc Jezequel To-wards flexible evolution of dynamically adaptive systems in the newideas amp emerging results track of the international conference ofsoftware engineering (niericse) In New Ideas amp Emerging Re-sults Track of the International Conference of Software Engineering(NIERICSE) Zurich Switzerland 2012 pages 1353ndash1356 IEEEPress 2012

[100] Qiang Tang Cryptographic framework for analyzing the privacy ofrecommender algorithms In International Conference on Collabora-tion Technologies and Systems pages 455ndash462 IEEE 2012

[101] Ton van Deursen and Sasa Radomirovic Insider attacks and privacy ofrfid protocols In Public Key Infrastructures Services and Applications-8th European Workshop EuroPKI 2011 volume 7163 pages 91ndash105Springer 2012

[102] Erich Wenger and Johann Grosschadl An 8-bit avr-based elliptic curvecryptographic risc processor for the internet of things In Proceedingsof the 1st Workshop on Hardware and Architectural Support for Secu-rity and Privacy (HASP 2012) pages 37ndash45 IEEE Computer Society2012

[103] Reiko Heckel Hartmut Ehrig Ulrike Golas and Frank Hermann Par-allelism and concurrency of stochastic graph transformations In GraphTransformations volume 7562 of Lecture Notes in Computer Sciencepages 96ndash110 Springer Berlin Heidelberg 2012

208 BIBLIOGRAPHY

[104] Jan Broersen Dov Gabbay and Leendert van der Torre Discussionpaper Changing norms is changing obligation change In DeonticLogic in Computer Science volume 7393 of Lecture notes in ComputerScience pages 199ndash214 Springer 2012

[105] Chenyi Zhang and Jun Pang An algorithm for probabilistic alternat-ing simulation In Proc the 38th International Conference on CurrentTrends in Theory and Practice of Computer Science pages 431ndash4422012

[106] Emil Weydert On arguments and conditionals In ECAI WS WeightedLogics for AI (WL4AI) pages 69ndash78 IRIT 2012

[107] Srdjan Vesic Mykhailo Ianchuk and Andrii Rubtsov The synergy Aplatform for argumentation-based group decision making In Proceed-ings of the 4th International Conference on Computational Models ofArgument COMMA 2012 pages 501ndash502 2012

[108] Srdjan Vesic and Leendert van der Torre Beyond maxi-consistent ar-gumentation operators In Proceedings of the 13th European Confer-ence on Logics in Artificial Intelligence JELIA 2012 pages 424ndash4362012

[109] Srdjan Vesic Maxi-consistent operators in argumentation In Proceed-ings of the 20th European Conference on Artificial Intelligence ECAI2012 pages 810ndash815 2012

[110] Leendert van der Torre and Guido Boella Reasoning for agreementtechnologies In Proceedings of the 20th European Conference on Ar-tificial Intelligence (ECAI) pages 895ndash896 2012

[111] Leendert van der Torre Logics for security and privacy In Data andApplications Security and Privacy XXVI pages 1ndash7 Springer 2012

[112] Paolo Turrini Agreements as norms In Deontic Logic in ComputerScience pages 31ndash45 2012

[113] Marija Slavkovik and Wojciech Jamroga Distance-based rules forweighted judgment aggregation (extended abstract) In Proceedings ofthe 11th International Conference on Autonomous Agents and Multi-agent Systems AAMAS2012 pages 1405ndash1406 2012

[114] Francois Schwarzentruber Srdjan Vesic and Tjitze Rienstra Build-ing an epistemic logic for argumentation In Proceedings of the 13thEuropean Conference on Logics in Artificial Intelligence JELIA 2012pages 359ndash371 2012

BIBLIOGRAPHY 209

[115] Tjitze Rienstra Towards a probabilistic dung-style argumentationsystem In AT 2012 Agreement Technologies Proceedings of the FirstInternational Conference on Agreement Technologies pages 138ndash152CEUR 2012

[116] Sandro Reis Denis Shirnin and Denis Zampunieris Design ofproactive scenarios and rules for enhanced e-learning In Proceed-ings CSEDU 2012 4th International Conference on Computer Sup-ported Education Porto (Portugal) 2012 volume 1 pages 253 ndash 258SciTePress ndash Science and Technology Publications 2012

[117] Raghunath Rajachandrasekar Xavier Besseron and Dhabaleswar KPanda Monitoring and predicting hardware failures in hpc clusterswith ftb-ipmi In 2012 IEEE 26th International Parallel and Dis-tributed Processing Symposium Workshops amp PhD Forum pages 1136ndash1443 IEEE Computer Society 2012

[118] Johnatan E Pecero Hector Joaquin Fraire Huacuja Pascal BouvryAurelio Alejandro Santiago Pineda Mario Cesar Lopez Loces andJuan Javier Gonzalez Barbosa On the energy optimization for prece-dence constrained applications using local search algorithms In Pro-ceedings of the 2012 International Conference on High PerformanceComputing amp Simulation (HPCS 2012) pages 133 ndash 139 2012

[119] Patrick Meyer and Alexandru-Liviu Olteanu Preferentially orderedclustering In Modelling Decisions for Artificial Intelligence pages87ndash98 2012

[120] Juan Julian Merelo Antonio M Mora Carlos Fernandes Anna IEsparcia-Alcazar and Juan Luis Jimenez Laredo Pool vs island basedevolutionary algorithms an initial exploration In 2012 Seventh In-ternational Conference on P2P Parallel Grid Cloud and InternetComputing pages 19ndash24 IEEE Computer Society 2012

[121] Sergio Marques Dias Sandro Reis and Denis Zampunieris Proac-tive computing based implementation of personalized and adaptivetechnology enhanced learning over moodle(tm) In Proceedings ofICALT 2012 IEEE 12th International Conference on Advanced Learn-ing Technologies pages 674 ndash 675 IEEE Computer Society Publica-tions 2012

[122] Diana Marosin Alex Handrik Proper and Leendert van der TorreChanging agreements Intention reconsideration based on assumptionsand reasons In Proceedings of the First International Conference onAgreement Technologies AT 2012 pages 296ndash297 2012

210 BIBLIOGRAPHY

[123] Qian Li Peter Schaffer Jun Pang and Sjouke Mauw Comparativeanalysis of clustering protocols with probabilistic model checking InProceedings of the 6th IEEE Symposium on Theoretical Aspects of Soft-ware Engineering pages 249ndash252 IEEE Computer Society 2012

[124] Erkko Lehtonen and Agnes Szendrei Partial orders induced by quasi-linear clones In Contributions to General Algebra volume 20 pages51ndash84 Verlag Johannes Heyn 2012

[125] Barbara Kordy Marc Pouly and Patrick Schweitzer Computationalaspects of attack-defense trees In Security amp Intelligent InformationSystems volume LNCS 7053 pages 103ndash116 Springer 2012

[126] Laurent Kirsch Jean Botev and Steffen Rothkugel The snippet sys-tem - reusing and connecting documents In Proceedings of the 7thInternational Conference on Digital Information Management pages138ndash144 2012

[127] Laurent Kirsch Jean Botev and Steffen Rothkugel An extensible toolset for creating and connecting reusable documents In Proceedings ofWorld Conference in Educational Media Hypermedia and Telecommu-nications pages 1434ndash1442 2012

[128] Coron Jean-Sebastien Giraud Christophe Prouff Emmanuel Ren-ner Soline Rivain Matthieu and Vadnala Praveen Kumar Conver-sion of security proofs from one leakage model to another A newissue In Constructive Side-Channel Analysis and Secure Design vol-ume 72752012 pages 69ndash81 Springer Lecture Notes in ComputerScience 2012 2012

[129] Gallais Jean-Francois Roy Arnab and Vadnala Praveen Kumar Fullkey recovery attacks on modular addition An application to threefishIn Workshop on Embedded Systems Security 2012 pages 1ndash9 ACM2012

[130] Wojciech Jamroga Concepts agents and coalitions in alternatingtime In Proceedings of the 20th European Conference on ArtificialIntelligence ECAI 2012 pages 438ndash443 2012

[131] Santiago Iturriaga Sergio Nesmachnow and Bernabe Dorronsoro Amultithreading local search for multiobjective energy-aware schedulingin heterogeneous computing systems In 26th European Conference onModelling and Simulation (ECMS) pages 1 ndash 7 2012

[132] Frank Hermann Hartmut Ehrig and Claudia Ermel Concurrentmodel synchronization with conflict resolution based on triple graphgrammars In Fundamental Approaches to Software Engineering vol-ume 7212 pages 178ndash193 Springer 2012

BIBLIOGRAPHY 211

[133] Davide Grossi and Paolo Turrini Short sight in extensive gamesIn Proceedings of the 11th International Conference on AutonomousAgents and Multiagent Systems (AAMAS 2012) pages 805ndash812 2012

[134] Valentin Goranko and Wojciech Jamroga State and path effectivitymodels for logics of multi-player games In Proceedings of the 11thInternational Conference on Autonomous Agents and Multiagent Sys-tems AAMAS 2012 pages 1123ndash1130 Springer 2012

[135] Eugenio Giordano Lara Codeca Brian Geffon Giulio Grassi Gio-vanni Pau and Mario Gerla Movit The mobile network virtual-ized testbed In Proceedings of the ninth ACM international workshopon Vehicular inter-networking systems and applications pages 3ndash12ACM New York NY USA ccopy2012 2012

[136] Nicolas Genon Patrice Caire Hubert Toussaint Patrick Heymansand Daniel Moody Towards a more semantically transparent i visualsyntax In Requirements Engineering Foundation for Software Qual-ity - 18th International Working Conference REFSQ 2012 EssenGermany March 19-22 2012 Proceedings Lecture Notes in Com-puter Science 7195 Springer 2012 volume 7195 of Lecture Notes inComputer Science pages 140ndash146 Springer Berlin Heidelberg 2012

[137] Vijayalakshmi Ganesan Sergio Sousa Marija Slavkovik and Leendertvan der Torre Selecting judgment aggregation rules for nao robotsan experimental approach In Proceedings of the 11th InternationalConference on Autonomous Agents and Multiagent Systems (AAMAS2012) pages 1403ndash1404 International Foundation for AutonomousAgents and Multiagent Systems 2012

[138] Francois Fouquet Gregory Nain Brice Morin Erwan Daubert OlivierBarais Noel Plouzeau and Jean-Marc Jezequel An eclipse modellingframework alternative to meet the modelsruntime requirements InMODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMSvolume 7590 pages 87ndash101 Springer Berlin Heidelberg 2012

[139] Vasileios Efthymiou and Patrice Caire Privacy challenges in ambientintelligent systems A critical discussion In Proceedings of the 3rdPrivacy Protection Symposium - Atelier protection de la vie privee(APVP) 2012

[140] Vasileios Efthymiou Patrice Caire and Antonis Bikakis Modeling andevaluating cooperation in multi-context systems using conviviality InProceedings of BNAIC 2012 The 24th Benelux Conference on ArtificialIntelligence pages 83ndash90 2012

212 BIBLIOGRAPHY

[141] Naipeng Dong Hugo Jonker and Jun Pang Formal analysis of privacyin an ehealth protocol In Proceedings of the 17th European Symposiumon Research in Computer Security volume 7459 of Lecture Notes inComputer Science pages 325ndash342 Springer-Verlag 2012

[142] Naipeng Dong Hugo Jonker and Jun Pang Challenges in ehealthfrom enabling to enforcing privacy In Proceedings of the First inter-national conference on Foundations of Health Informatics Engineeringand Systems (FHIESrsquo11) volume 7151 of Lecture Notes in ComputerScience pages 195ndash206 Springer-Verlag 2012

[143] Sergio Dias Marques Sandro Reis and Denis Zampunieris Personal-ized adaptive and intelligent support for online assignments based onproactive computing In Proceedings of ICALT 2012 IEEE 12th In-ternational Conference on Advanced Learning Technologies pages 668ndash 669 IEEE Computer Society Conference Publishing Services 2012

[144] Denise Demirel Hugo Jonker and Melanie Volkamer Random blockverification Improving the norwegian electoral mix net In Proceed-ings of the 5th International Conference on Electronic Voting (EVOTE2012) volume 205 pages 65ndash78 Gesellschaft fur Informatik eV 2012

[145] Mehdi Dastani Leendert van der Torre and Neil Yorke-Smith A pro-gramming approach to monitoring communication in an organisationalenvironment In AAMAS rsquo12 Proceedings of the 11th InternationalConference on Autonomous Agents and Multiagent Systems - Volume3 pages 1373ndash1374 2012

[146] Sviatlana Danilava Stephan Busemann and Christoph SchommerArtificial conversational companions In Proceedings of the 4th Inter-national Conference on Agents and Artificial Intelligence volume 2pages 282ndash289 SciTePress 2012 2012

[147] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser Gap vspag In 42nd IEEE International Symposium on Multiple-Valued Logic(ISMVL 2012) pages 268ndash273 IEEE Computer Society 2012

[148] Xihui Chen and Jun Pang Measuring query privacy in location-basedservices In Proceeding of 2nd ACM Conference on Data and Applica-tion Security and Privacy pages 49 ndash 61 ACM 2012

[149] Martin Caminada and Podlaszewski Mikolaj Grounded semantics aspersuasion dialogue In Computational Models of Argument - Proceed-ings of COMMA 2012 volume 245 pages 478ndash485 IOS Press 2012

[150] Martin Caminada and Mikolaj Podlaszewski User-computer persua-sion dialogue for grounded semantics In Proceedings of the 24th

BIBLIOGRAPHY 213

Benelux Conference on Artificial Intelligence (BNAIC 2012) pages343ndash344 2012

[151] Martin Caminada and Mikolaj Podlaszewski Grounded semantics aspersuasion dialogue In Proceedings of the 4th International Confer-ence on Computational Models of Argument (COMMA 2012) volume245 pages 478ndash485 IOS Press 2012

[152] Patrice Caire Antonis Bikakis and Vasileios Efthymiou Convivialityby design In Social computing Social cognition social networks Ac-quisition representation and reasoning with contextualized knowledge(ARCOE 2012) 2012

[153] M Majid Butt and Eduard A Jorsweick Energy efficient multiuserscheduling Exploiting the loss tolerance of the application In IEEEGlobecom - Symposium on Selected Areas in Communications pages3555ndash3560 IEEE 2012

[154] M Majid Butt Benjamin Schubert Martin Kurras Kai BornerThomas Haustein and Lars Thiele On the energy-bandwidth trade-off in green wireless networks System level results In Workshop onSmart and Green Communications amp Networks (SGCNet) at Interna-tional conference on communication in China (ICCC) pages 91ndash95IEEE 2012

[155] M Majid Butt Deadline delay constrained multiuser multicell sys-tems Energy efficient scheduling In 13th IEEE International Work-shop on Signal Processing Advances in Wireless Communications(SPAWC) pages 309ndash313 IEEE 2012

[156] Richard Booth Martin Caminada Mikolaj Podlaszewski and IyadRahwan Quantifying disagreement in argument-based reasoningIn Proceedings of the 11th International Conference on AutonomousAgents and Multiagent Systems (AAMAS 2012) pages 493ndash500 Inter-national Foundation for Autonomous Agents and Multiagent Systems2012

[157] Richard Booth Eduardo Ferme Sebastien Konieczny and RamonPino Perez Credibility-limited revision operators in propositionallogicrsquo In Proceedings of the 24th Benelux Conference on ArtificialIntelligence (BNAIC 2012) pages 277ndash278 2012

[158] Richard Booth Eduardo Ferme Sebastien Konieczny and RamonPino Perez Credibility-limited revision operators in propositionallogic In Proceedings of the 13th International Conference on Prin-ciples of Knowledge Representation and Reasoning (KR 2012) pages116ndash125 AAAI 2012

214 BIBLIOGRAPHY

[159] Richard Booth Souhila Kaci Tjitze Rienstra and Leon van der TorreConditional acceptance functions In Proceedings of the 4th Interna-tional Conference on Computational Models of Argument (COMMA2012) volume 245 pages 470ndash477 IOS Press 2012

[160] Richard Booth Thomas Meyer and Ivan Vazinczak Ptl A proposi-tional typicality logic In 13th Conference on Logics in Artificial In-telligence (JELIA 2012) volume 7519 pages 107ndash119 Springer BerlinHeidelberg 2012

[161] Nicolas Bernard and Franck Leprevost Beyond tor The truenymsprotocol In Security and Intelligent Information Systems volume7053 of Lecture Notes in Computer Science pages 68ndash84 Springer2012

[162] Aritz Barrondo Andrei Tchernykh Elisa Shaeffer and JohnatanPecero Energy efficiency of knowledge-free scheduling in peer-to-peerdesktop grids In Proceedings of the 2012 International Conferenceon High Performance Computing amp Simulation (HPCS 2012) pages105ndash111 IEEE 2012

[163] Pietro Baroni Guido Boella Federico Cerutti Massimiliano Gia-comin Leendert van der Torre and Serena Villata On inputoutputargumentation frameworks In Computational Models of Argument(Proceedings of COMMA 2012) pages 358ndash365 IOS Press 2012

[164] Arash Atashpendar Laurent Kirsch Jean Botev and SteffenRothkugel A native approach to semantics and inference in fine-grained documents In Proceedings of the 2nd Joint International Se-mantic Technology Conference 2012

[165] Ofer Arieli and Martin Caminada A general qbf-based formalization ofabstract argumentation theory In Computational Models of Argument- Proceedings of COMMA 2012 volume 245 pages 105ndash116 IOS Press2012

[166] Giulia Andrighetto Guido Governatori Pablo Noriega and Leendertvan der Torre Normative multi-agent systems In Dagstuhl Reportsvolume 2 pages 23ndash49 2012

[167] Maha Alodeh Qoe for spatial cognitive systems In IEEE Interna-tional Conference on Communications 2012

[168] Dzmitry Kliazovich Pascal Bouvry and Samee Ullah Khan Sim-ulating communication processes in energy-efficient cloud computingsystems In IEEE 1st International Conference on Cloud Networkingpages 2015ndash2017 2012

BIBLIOGRAPHY 215

[169] Juan Luis Jimenez Laredo Bernabe Dorronsoro Johnatan PeceroPascal Bouvry Juan Jose Durillo and Carlos Fernandes Designing aself-organized approach for scheduling bag-of-tasks In Proceedings ofthe 7th International Conference on P2P Parallel Grid Cloud andInternet Computing (3PGCIC) pages 315ndash320 IEEE 2012

[170] Mateusz Guzek Cesar O Diaz Johnatan E Pecero Pascal Bouvryand Albert Y Zomaya Impact of voltage levels number for energy-aware bi-objective dag scheduling for multi-processors systems InCommunications in Computer and Information Science volume 344pages 70ndash80 Springer 2012

[171] Bernabe Dorronsoro and Pascal Bouvry Study of different small-worldtopology generation mechanisms for genetic algorithms In Proceedingsof the IEEE Congress on Evolutionary Computation (CEC) part ofWorld Conference in Computational Intelligence (WCCI) pages 1580ndash 1587 IEEE 2012

[172] Sune S Nielsen Bernabe Dorronsoro Gregoire Danoy and PascalBouvry Novel efficient asynchronous cooperative co-evolutionarymulti-objective algorithms In Congress on Evolutionary Computa-tion pages 1ndash7 IEEE 2012

[173] Apostolos Stathakis Gregoire Danoy Pascal Bouvry and GianluigiMorelli Satellite payload reconfiguration optimisation An ilp modelIn INTELLIGENT INFORMATION AND DATABASE SYSTEMSvolume 7197 pages 311ndash320 Springer 2012

[174] Marcin Seredynski Gregoire Danoy Masoud Tabatabaei Pascal Bou-vry and Yoann Pignie Generation of realistic mobility for vanetsusing genetic algorithms In Proceedings of the IEEE Congress onEvolutionary Computation pages 1ndash8 IEEE 2012

[175] Marcin Seredynski and Pascal Bouvry The necessity for strong re-ciprocators in mobile ad hoc networks In Proceedings of the 2012IEEE International Symposium on Parallel and Distributed Process-ing Workshops and PhD Forum pages 609ndash616 IEEE 2012

[176] Juan Luis Jimenez Laredo Pascal Bouvry Sanaz Mostaghim andJuan Julian Merelo Guervos Validating a peer-to-peer evolutionaryalgorithm In European Conference on the Applications of Evolution-ary Computation volume 7248 pages 436ndash445 Springer Berlin Hei-delberg 2012

[177] Marcin Seredynski and Pascal Bouvry Solving soft security prob-lem in manets using an evolutionary approach In Security and In-telligent Information Systems International Joint Confererence SIIS

216 BIBLIOGRAPHY

2011 Warsaw Poland June 13-14 2011 Revised Selected Papersvolume 7053 pages 33ndash44 Springer LNCS 2012

[178] Muhammad Zohaib Iqbal Andrea Arcuri and Lionel Briand Empir-ical investigation of search algorithms for environment model-basedtesting of real-time embedded software In Proceedings of the Inter-national Symposium on Software Testing and Analysis (ISSTArsquo12)pages 199ndash209 ACM 2012

[179] Muhammad Zohaib Iqbal Andrea Arcuri and Lionel Briand Com-bining search-based and adaptive random testing strategies for envi-ronment model-based testing of real-time embedded systems In Pro-ceedings of the 4th Symposium on Search Based Software Engineering(SSBSErsquo12) pages 136ndash151 Springer-Verlag 2012

[180] Muhammad Zohaib Iqbal Shaukat Ali Tao Yue and Lionel BriandExperiences of applying umlmarte on three industrial projects InProceedings of ACMIEEE 15th International Conference on ModelDriven Engineering Languages amp Systems (MODELSrsquo12) pages 642ndash658 Springer-Verlag 2012

[181] Razieh Behjati Tao Yue and Lionel Briand A modeling approach tosupport the similarity-based reuse of configuration data In Proceed-ings of ACMIEEE 15th International Conference on Model DrivenEngineering Languages amp Systems (MODELSrsquo12) pages 497ndash513Springer-Verlag 2012

[182] Shaukat Ali Tao Yue Lionel Briand and Suneth Walawege A prod-uct line modeling and configuration methodology to support model-based testing An industrial case study In Proceedings of ACMIEEE15th International Conference on Model Driven Engineering Lan-guages amp Systems (MODELSrsquo12) pages 726ndash742 Springer-Verlag2012

[183] Nina Elisabeth Holt Richard Torkar Lionel Briand and Kai HansenState-based testing Industrial evaluation of the cost-effectiveness ofround-trip path and sneak-path strategies In Proceedings of the 23rdIEEE International Symposium on Software Reliability Engineering(ISSRE 2012) IEEE Computer Society 2012

[184] Stefano Di Alesio Arnaud Gotlieb Shiva Nejati and Lionel BriandTesting deadline misses for real-time systems using constraint opti-mization techniques In Workshop on Constraints in Software Test-ing Verification and Analysis (CSTVA 2012) pages 764ndash769 IEEE2012

BIBLIOGRAPHY 217

[185] Lionel Briand Davide Falessi Shiva Nejati Mehrdad Sabetzadeh andTao Yue Research-based innovation A tale of three projects in model-driven engineering In 15th International Conference Model DrivenEngineering Languages and Systems - volume 7590 pages 759ndash775Springer Berlin Heidelberg 2012

[186] Razieh Behjati Shiva Nejati Tao Yue Arnaud Gotlieb and LionelBriand Model-based automated and guided configuration of embed-ded software systems In Modelling Foundations and Applications -8th European Conference volume 7349 of Lecture Notes in ComputerScience pages 226ndash243 Springer Berlin Heidelberg 2012

[187] Shiva Nejati Stefano Di Alesio Mehrdad Sabetzadeh and LionelBriand Modeling and analysis of cpu usage in safety-critical embeddedsystems to support stress testing In Proceedings of ACMIEEE 15thInternational Conference on Model Driven Engineering Languages ampSystems (MODELSrsquo12) pages 759ndash775 2012

[188] Markus Forster Raphael Frank Mario Gerla and Thomas Engel Im-proving highway traffic through partial velocity synchronization In2012 IEEE Global Communications Conference (GLOBECOM) 3-7December 2012 Anaheim CA USA pages 5795ndash5800 2012

[189] Foued Melakessou and Thomas Engel Narval scilab toolbox Networkanalysis and routing evaluation In 2012 International Workshop onScilab amp OW2 (IWSO) pages 1ndash18 2012

[190] Andriy Panchenko Fabian Lanze and Thomas Engel Improvingperformance and anonymity in the tor network In 31st IEEE In-ternational Performance Computing and Communications Conference(IEEE IPCCC 2012) IEEE Press 2012

[191] Samuel Marchal Jerome Francois Radu State and Thomas EngelSemantic based dns forensics In Proceedings of the IEEE InternationalWorkshop on Information Forensics and Security - WIFSrsquo12 IEEE2012

[192] Raphael Frank Maximilien Mouton and Thomas Engel Towardscollaborative traffic sensing using mobile phones In IEEE VehicularNetworking Conference 2012 pages 15ndash20 IEEE 2012

[193] Thorsten Ries Radu State and Thomas Engel Instant degradationof anonymity in low-latency anonymisation systems In DependableNetworks and Services pages 98ndash108 Springer Berlin Heidelberg2012

218 BIBLIOGRAPHY

[194] David Fotue Houda Labiod and Thomas Engel Performance evalua-tion of hybrid channel assignment for wireless sensor networks In The8th International Conference on Mobile Ad-hoc and Sensor Networks(MSN) pages 1ndash8 IEEE 2012

[195] David Fotue Houda Labiod and Thomas Engel An arbitrary mobil-ity model of mini-sinks using controlled data collection for reducingcongestion appearance in wireless sensor networks In 31st IEEE In-ternational Performance Computing and Communications Conference(IPCCC) pages 1ndash9 IEEE 2012

[196] David Fotue Houda Labiod and Thomas Engel Controlled data col-lection of mini-sinks for maximizing packet delivery ratio and through-put using multiple paths in wireless sensor networks In Proceedings ofthe 23rd IEEE International Symposium on Personal Indoor Mobileand Radio Communications (PIMRC) pages 758 ndash764 IEEE 2012

[197] Samuel Marchal Jerome Francois Radu State and Thomas EngelProactive discovery of phishing related domain names In The 15thInternational Symposium on Research in Attacks Intrusions and De-fenses volume 7462 pages 190ndash209 Springer-Verlag Berlin Heidel-berg 2012

[198] Samuel Marchal and Thomas Engel Large scale dns analysis In6th IFIP WG 66 International Conference on Autonomous Infras-tructure Management and Security volume 7279 pages 151ndash154Springer Berlin Heidelberg 2012

[199] Stefan Hommes Radu State and Thomas Engel Detecting stealthybackdoors with association rule mining In Lecture Notes in ComputerScience volume 7290 pages 161ndash171 Springer 2012

[200] Stefan Hommes Radu State and Thomas Engel A distance-basedmethod to detect anomalous attributes in log files In IEEE NetworkOperations and Management Symposium pages 498ndash501 2012

[201] Cynthia Wagner and Thomas Engel Detecting anomalies in netflowrecord time series by using a kernel function In IFIPLNCS De-pendable Network and Services 6th International Conference on Au-tonomous Infrastructure Management and Security (AIMS2012) vol-ume 7279 pages 122ndash125 Springer Verlag 2012

[202] Samuel Marchal Jerome Francois Cynthia Wagner and Thomas En-gel Semantic exploration of dns In 11th Networking Conference 2012pages 370ndash384 Springer Berlin Heidelberg 2012

BIBLIOGRAPHY 219

[203] Samuel Marchal Jerome Francois Cynthia Wagner Radu StateAlexandre Dulaunoy Thomas Engel and Olivier Festor Dnssm Alarge-scale passive dns security monitoring framework In IEEEIFIPNetwork Operations and Management Symposium pages 988 ndash 993IEEE 2012

[204] Jerome Francois Cynthia Wagner Radu State and Thomas EngelSafem Scalable analysis of flows with entropic measures and svm InProceedings of the Network Operations and Management Symposium2012 pages 510 ndash513 IEEE 2012

[205] Cynthia Wagner Jerome Francois Radu State Alexandre DulaunoyGerard Wagener and Thomas Engel Sdbf Smart dns brute-forcer In IEEEIFIP Network Operations and Management Sympo-sium (NOMSrsquo12) pages 1001ndash1007 IEEE 2012 to appear

[206] Jeehyun Hwang Tao Xie Donia Elkateb Tejeddine Mouelhi and YvesLe Traon Selection of regression system tests for security policy evolu-tion In Proceedings of the 27th IEEEACM International Conferenceon Automated Software Engineering pages 266ndash269 ACM 2012

[207] Assaad Moawad Vasileios Efthymiou Patrice Caire Gregory Nainand Yves Le Traon Introducing conviviality as a new paradigm forinteractions among it objects In Proceedings of the Workshop on AIProblems and Approaches for Intelligent Environments volume 907pages 3ndash8 CEUR-WSorg 2012

[208] Alexandre Bartel Jacques Klein Martin Monperrus and YvesLe Traon Automatically securing permission-based software by re-ducing the attack surface An application to android In IEEEACMInternational Conference on Automated Software Engineering pages1ndash4 2012

[209] Assaad Moawad Vasileios Efthymiou Patrice Caire Gregory Nainand Yves Le Traon Introducing conviviality as a new paradigmfor interactions among it objects In Workshop on AI Problems andApproaches for Intelligent Environments (AIIE 2012) volume 907pages 3ndash8 CEUR-WSorg 2012

[210] Antonis Bikakis Vasileios Efthymiou Patrice Caire and YvesLe Traon Introducing conviviality as a property of multi-context sys-tems In Acquisition Representation and Reasoning with Contextual-ized Knowledge (ARCOE 2012) pages 19ndash31 2012

[211] Alexandre Bartel Jacques Klein Martin Monperrus and YvesLe Traon Dexpler Converting android dalvik bytecode to jimple

220 BIBLIOGRAPHY

for static analysis with soot In ACM SIGPLAN International Work-shop on the State Of the Art in Java Program Analysis (SOAP 2012)pages 1ndash12 2012

[212] Donia Elkateb Tejeddine Mouelhi Yves Le Traon Jeehyun Hwangand Tao Xie Refactoring access control policies for performance im-provement In Proceedings of the third joint WOSPSIPEW interna-tional conference on Performance Engineering pages 323ndash334 ACM2012

[213] Yehia Elrakaiby Tejeddine Mouelhi and Yves Le Traon Testing obli-gation policy enforcement using mutation analysis In Proceedings ofthe fourth International Conference on Software Testing Verificationand Validation ICST 2012 pages 673 ndash680 IEEE 2012

[214] Dianxiang Xu Lijo Thomas Michael Kent Tejeddine Mouelhi andYves Le Traon A model-based approach to automated testing ofaccess control policies In Proceedings of the 17th ACM Symposium onAccess Control Models and Technologies pages 209ndash218 2012

[215] Xihui Chen Carlo Harpes Gabriele Lenzini Miguel Martins SjoukeMauw and Jun Pang Implementation and validation of a localisationassurance service provider In Proc of the 6th ESA Workshop onSatellite Navigation Technologies and European Workshop on GNSSSignals and Signal Processing (NAVITEC 2012) pages 1ndash7 IEEE2012

[216] Xihui Chen Gabriele Lenzini Sjouke Mauw and Jun Pang A groupsignature based electronic toll pricing system In Proceedings of the7th International Conference on Availability Reliability and Securitypages 85ndash93 IEEE Computer Society 2012

[217] Gan Zheng Symeon Chatzinotas and Bjorn Ottersten Multi-gatewaycooperation in multibeam satellite systems In IEEE 23rd Interna-tional Symposium on Personal Indoor and Mobile Radio Communica-tions (PIMRC) pages 1360ndash1364 2012

[218] Qingmin Meng Wei Feng Gan Zheng Symeon Chatzinotas andBjorn Ottersten Fixed full duplex relaying for wireless broadbandcommunication In International Conference on Wireless Communi-cations and Signal Processing WCSP 2012 2012

[219] Gan Zheng Li Jiangyuan Kai-Kit Wong Athina P Petropulu andBjorn Ottersten Using simple relays to improve physical-layer secu-rity In 1st IEEE International Conference on Communications inChina (ICCC2012) pages 329ndash333 2012

BIBLIOGRAPHY 221

[220] Sabrina Gerbracht Eduard A Jorswieck Gan Zheng and Bjorn Ot-tersten Non-regenerative two-hop wiretap channels using interferenceneutralization In Proceedings of the International Workshop on In-formation Forensics and Security pages 1ndash1 IEEE 2012

[221] Bhavani Shankar M R Saikat Chatterjee and Bjorn Ottersten De-tection of sparse random signals using compressive measurements InProceedings of IEEE International Conference on Acoustics Speechand Signal Processing pages 3257 ndash 3260 2012

[222] Bjorn Ottersten Signal processing challenges in satellite networks In2012 International Conference on Wireless Communications and Sig-nal Processing(WCSP 2012) pages 1ndash1 WCSP 2012 2012 KeynoteSpeaker

[223] Efthymios Tsakonas Joakim Jalden Nicolas D Sidiropoulos andBjorn Ottersten Maximum likelihood based sparse and distributedconjoint analysis In Statistical Signal Processing Workshop (SSP)2012 IEEE pages 33ndash36 IEEE 2012

[224] Symeon Chatzinotas and Bjorn Ottersten Capacity analysis of dual-hop amplify-and-forward mimo multiple-access channels In Interna-tional Conference on Wireless Communications and Signal ProcessingWCSP 2012 IEEE 2012

[225] Symeon Chatzinotas and Bjorn Ottersten Cognitive interferencealignment between small cells and a macrocell In 19th InternationalConference on Telecommunications (ICT) 2012 volume 1-6 IEEE2012

[226] Alexis Aravanis Bhavani Shankar M R Gregoire Danoy Pantelis-Daniel Arapoglou Panayotis Cottis and Bjorn Ottersten Multi-objective optimization approach to power allocation in multibeam sys-tems In 30th AIAA International Communications Satellite SystemsConference pages 1ndash6 2012

[227] Alexis Aravanis Bhavani Shankar M R Gregoire Danoy Pantelis-Daniel Arapoglou Panayotis Cottis and Bjorn Ottersten Power allo-cation in multibeam satellites - a hybrid-genetic algorithm approachIn 2nd ESA Workshop on Advanced Flexible Telecom Payloads pages1ndash5 European Space Agency 2012

[228] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenSpectrum sensing in dual polarized fading channels for cognitive sat-coms In accepted for publication in the proceedings of the IEEE Globe-com 2012 conference IEEE 2012

222 BIBLIOGRAPHY

[229] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenSatellite cognitive communications Interference modeling and tech-niques selection In 6th Advanced Satellite Multimedia Systems Con-ference (ASMS) and 12th Signal Processing for Space CommunicationsWorkshop (SPSC) pages 111ndash118 2012

[230] Frederic Garcia Djamila Aouada Hashim Kemal Abdella ThomasSolignac Bruno Mirbach and Bjorn Ottersten Depth enhancement byfusion for passive and active sensing In 12th European Conference onComputer Vision (ECCV) volume 7585 of Lecture Notes in ComputerScience pages 506ndash515 Springer Berlin Heidelberg 2012

[231] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenExploiting polarization for spectrum sensing in cognitive satcoms In7th International Conference on Cognitive Radio Oriented WirelessNetworks pages 36ndash41 2012

[232] Kassem Al Ismaeil Djamila Aouada Bruno Mirbach and Bjorn Ot-tersten Bilateral filter evaluation based on exponential kernels In21st International Conference on Pattern Recognition IEEE Xplore2012

[233] Frederic Garcia Djamila Aouada Bruno Mirbach and Bjorn Otter-sten Spatio-temporal tof data enhancement by fusion In IEEE Inter-national Conference on Image Processing (ICIP) pages 1 ndash 4 IEEE2012

[234] Symeon Chatzinotas and Bjorn Ottersten Coordinated multipointuplink capacity over a mimo composite fading channel In Interna-tional Conference on Computing Networking and Communicationspages 1061 ndash1065 IEEE 2012

[235] Jiaheng Wang Mats Bengtsson Bjorn Ottersten and Daniel P Palo-mar Robust maximin mimo precoding for arbitrary convex uncer-tainty sets In Proceedings IEEE International Conference on Acous-ticsSpeechand Signal Processing (ICASSP) pages 3045ndash3048 IEEE2012

[236] Dalia Khader Ben Smyth Peter Y A Ryan and Feng Hao A fairand robust voting system by broadcast In International Conferenceon Electronic Voting volume 205 pages 285ndash299 Lecture Notes inInformatics 2012

[237] Craig Burton Burton Chris Culnane James Heather Thea PeacockPeter Ryan Steve Schneider Vanessa Teague Roland Wen Zhe Xiaand Sriramkrishnan Srinivasan A supervised verifiable voting protocolfor the victorian electoral commission In 5th International Conference

75 Internal Reports 223

on Electronic Voting 2012 5th International Conference on ElectronicVoting (EVOTE 2012) LNI pages 81ndash94 GI 2012

[238] Craig Burton Chris Culnane James Heather Thea Peacock PeterRyan Steve Schneider Sriramkrishnan Srinivasan Vanessa TeagueRoland Wen and Zhe Xia A supervised verifiable voting protocol forthe victorian electoral commission In 2012 Electronic Voting Tech-nology WorkshopWorkshop on Trustworthy Elections pages 1ndash100USENIX 2012

[239] Markus Jostock and Jurgen Sachau Compound model of inverterdriven grids In 5th International Conference on Integration of Re-newable and Distributed Energy Resources pages 194ndash195 OTTI -Ostbayerisches Technologie-Transfer-Institut eV 2012

[240] Markus Jostock and Jurgen Sachau Frequency coupling in invertergrids In 5th International Conference on Integration of RenewableEnergy and Distributed Energy Resources pages 192ndash193 OTTI - Os-tbayerisches Technologie-Transfer-Institut eV 2012

[241] Guido Boella Patrice Caire Leendert van der Torre and Ser-ena Villata Dependence networks for agreement technologies InAT2012 Agreement Technologies Proceedings of the First Interna-tional Conference on Agreement Technologies volume 918 pages 109ndash110 CEUR 2012

[242] Alan Perotti Guido Boella Silvano Colombo Tosatto Artur S drsquoAvilaGarcez Valerio Genovese and Leendert van der Torre Learning andreasoning about norms using neural-symbolic systems In Proceed-ings of the 11th International Conference on Autonomous Agents andMultiagent Systems - Volume 2 volume 2 pages 1023ndash1030 2012

75 Internal Reports

[243] Mihail Minev Christoph Schommer and Theoharry GrammatikosNews and stock markets A survey on abnormal returns and predictionmodels Technical Report - 2012

[244] Alexandre Bartel Jacques Klein Martin Monperrus Kevin Allix andYves Le Traon Improving privacy on android smartphones throughin-vivo bytecode instrumentation Technical report SnT TechnicalReport 2012

[245] Vasileios Efthymiou and Patrice Caire Diagram analysis report Usecases for conviviality and privacy in ambient intelligent systems Tech-nical report SnT Luxembourg 2012

224 BIBLIOGRAPHY

[246] Markus Forster Raphael Frank and Thomas Engel Evaluation ofsensors in modern smartphones for vehicular traffic monitoring Tech-nical report SnT 2012

[247] Raphael Frank Markus Forster Gerla Mario and Thomas EngelA survey on the performance of commercial mobile access networksTechnical report 2012

[248] Christopher Henard Mike Papadakis Gilles Perrouin Jacques KleinPatrick Heymans and Yves Le Traon Bypassing the combinatorialexplosion Using similarity to generate and prioritize t-wise test suitesfor large software product lines Technical report 2012 TechnicalReport

76 Proceedings

[249] Valentin Goranko and Wojciech Jamroga editors Proceedings of the5th Workshop on Logical Aspects of Multi-Agent Systems (LAMAS2012) IFAAMAS 2012

[250] STAST 2012 IEEE 2012

[251] Security and Intelligent Information Systems volume 7053 of LNCSSpringer 2012

Appendix A

Additional References

[252] Lauaro Dolberg Jampaposerome Francois and Thomas Engel EfficientMultidimensional Aggregation for Large Scale Monitoring In LargeInstallation System Administration Conference (LISA) San DiegoUSA 2012 USENIX

[253] Guido Boella Luigi di Caro Livio Robaldo and Llio Humphreys Us-ing legal ontology to improve classification in the eunomos legal docu-ment and knowledge management system In Semantic Processing ofLegal Texts (SPLeT-2012) Workshop Proceedings of the Eighth Inter-national Conference on Language Resources and Evaluation (LRECrsquo12) pages 13ndash20 2012

[254] Alessandra Bagnato Barbara Kordy Per H Meland and PatrickSchweitzer Attribute decoration of attack-defense trees InternationalJournal of Secure Software Engineering 3(2)1ndash35 2012

[255] Xihui Chen David Fonkwe and Jun Pang Post-hoc analysis of usertraceability in electronic toll collection systems In Proc 7th Work-shop on Data Privacy Management (DPMrsquo12) LNCS pages 19ndash42Springer 2013

[256] Xihui Chen Jun Pang and Ran Xue Constructing and comparinguser mobility profiles for location-based services In Proc 28th ACMSymposium on Applied Computing (SACrsquo13) ACM Press 2013

[257] Xihui Chen and Jun Pang Exploring dependency for query privacyprotection in location-based services In Proc 3rd ACM Conference

226 BIBLIOGRAPHY

on Data and Application Security and Privacy (CODASPYrsquo13) ACMPress 2013

[258] Barbara Kordy Sjouke Mauw Sasa Radomirovic and PatrickSchweitzer AttackndashDefense Trees Journal of Logic and Computa-tion 2013 Preprint available at httpsatossunilumembers

barbarapapersADT12pdf

[259] T van Deursen S Mauw and S Radomirovic mCarve Carvingattributed dump sets In 20th USENIX Security Symposium pages107ndash121 USENIX Association August 2011

[260] Simon Kramer Rajeev Gore and Eiji Okamoto Computer-aideddecision-making with trust relations and trust domains (cryptographicapplications) Journal of Logic and Computation 2012

[261] Simon Kramer A logic of interactive proofs Technical report Uni-versity of Luxembourg 2012 Available at httparxivorgabs

12013667

[262] Simon Kramer Logic of negation-complete interactive proofs (formaltheory of epistemic deciders) Technical report University of Luxem-bourg 2012 Available at httparxivorgabs12085913

[263] Simon Kramer Logic of non-monotonic interactive proofs (formaltheory of temporary knowledge transfer) Technical report Universityof Luxembourg 2012 Available at httparxivorgabs1208

1842

[264] Simon Kramer and Joshua Sack Parametric constructive kripke-semantics for standard multi-agent belief and knowledge (knowledgeas unbiased belief) Technical report University of Luxembourg 2012Available at httparxivorgabs12091885

[265] Jerome Francois Shaonan Wang Walter Bronzi Radu State andThomas Engel Botcloud Detecting botnets using mapreduce InProceddings of International Workshop on Information Forensics andSecurity (WIFSrsquo11) pages 1ndash6 IEEE 2011

[266] Andreas Zinnen and Thomas Engel Towards economic energy tradingin cloud environments In IEEE International Conference on CloudComputing Technology and Science pages 477ndash481 2011

[267] Andreas Zinnen and Thomas Engel Deadline constrained schedulingin hybrid clouds with gaussian processes In High Performance Com-puting and Simulation Conference (HPCS) pages 294 ndash 300 2011

BIBLIOGRAPHY 227

[268] Jerome Francois Radu State Thomas Engel and Olivier Festor En-forcing security with behavioral fingerprinting In International Con-ference on Network and Service Management (CNSM) pages 1 ndash92011

[269] Andriy Panchenko Lukas Niessen Andreas Zinnen and Thomas En-gel Website fingerprinting in onion routing based anonymization net-works In Proceedings of the 10th ACM Computer and Communica-tions Security (ACM CCS) Workshop on Privacy in the ElectronicSociety (WPES) pages 103ndash114 ACM Press 2011

[270] Andriy Panchenko Otto Spaniol Andre Egners and Thomas EngelLightweight hidden services In Proceedings of the 10th IEEE Interna-tional Conference on Trust Security and Privacy in Computing andCommunications (IEEE TrustCom 2011) Changsha China Novem-ber 2011 IEEE Computer Society 2011

[271] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Breaking tor anonymity with game theory anddata mining CONCURRENCY AND COMPUTATION PRACTICEAND EXPERIENCE pages 1ndash14 2011

[272] Raphael Frank Eugenio Giordano Mario Gerla and Thomas EngelPerformance bound for routing in urban scenarios In Proceedings ofthe 7th Asian Internet Engineering Conference (AINTEC) pages 38ndash45 2011

[273] Thorsten Ries Volker Fusenig Christian Vilbois and Thomas EngelVerification of data location in cloud networking In 2011 Fourth IEEEInternational Conference on Utility and Cloud Computing pages 439ndash444 2011

[274] Thorsten Ries Radu State and Thomas Engel Measuring anonymityusing network coordinate systems In 11th International Symposiumon Communications and Information Technologies (ISCIT) 2011pages 366ndash371 2011

[275] Stefan Hommes Radu State and Thomas Engel Detection of abnor-mal behaviour in a surveillance environment using control charts InIEEE International Conference on Advanced Video and Signal basedSurveillance (AVSS) pages 113ndash118 2011

[276] David Fotue Foued Melakessou Houda Labiod and Thomas EngelMini-sink mobility with diversity-based routing in wireless sensor net-works In Proceedings of the 8th ACM Symposium on Performanceevaluation of wireless ad hoc sensor and ubiquitous networks (PE-WASUN) pages 9ndash16 ACM 2011

228 BIBLIOGRAPHY

[277] David Fotue Foued Melakessou Houda Labiod and Thomas EngelA distributed hybrid channel selection and routing technique for wire-less sensor networks In IEEE 74th Vehicular Technology ConferenceVTC-Fall pages 1ndash6 IEEE 2011

[278] Cynthia Wagner Gerard Wagener Radu State and Thomas EngelPeeking into ip flow records using a visual kernel method In IWANN2011 workshops Part II CISIS 2011 volume 6694 pages 41ndash49LNCS Springer Verlag 2011

[279] Cynthia Wagner Jerome Francois Radu State and Thomas EngelMachine learning approach for ip-flow record anomaly detection InProceedings of the 10th international IFIP TC 6 conference on Net-working (NETWORKING) volume 6640 pages 28ndash39 Springer Ver-lag 2011

[280] Thorsten Ries Andriy Panchenko Radu State and Thomas EngelComparison of low-latency anonymous communication systems - prac-tical usage and performance In Australasian Information SecurityConference (AISC 2011) volume 116 pages 77ndash86 ACS 2011

[281] David Fotue Foued Melakessou Houda Labiod and Thomas EngelEffect of sink location on aggregation based on degree of connectivityfor wireless sensor networks In First International Workshop on Ad-vanced Communication Technologies and Applications to Intelligenttransportation systems Cognitive radios and Sensor Networks (AC-TICS) pages 271 ndash 276 2011

[282] Pascal Bouvry Horacio Gonzalez-Velez and Joanna Kolodziej In-telligent Decision Systems in Large-Scale Distributed Environmentsvolume 362 of Studies in Computational Intelligence Springer 2011

[283] Bernabe Dorronsoro and Pascal Bouvry Adaptive neighborhoods forcellular genetic algorithms In Nature Inspired Distributed Computing(NIDISC) sessions of the International Parallel and Distributed Pro-cessing Symposium (IPDPS) 2011 Workshop pages 383ndash389 IEEE2011

[284] Patricia Ruiz Bernabe Dorronsoro and Pascal Bouvry Optimiza-tion and performance analysis of the aedb broadcasting algorithmIn IEEE International Workshop on Wireless Mesh and Ad Hoc Net-works pages 1ndash6 IEEE 2011

[285] Mateusz Guzek Johnatan E Pecero Bernabe Dorronsoro and PascalBouvry Energy-aware scheduling of parallel applications with multi-objective evolutionary algorithm In A Bridge between Probability SetOriented Numerics and Evolutionary Computation pages 1ndash4 2011

BIBLIOGRAPHY 229

[286] Bernabe Dorronsoro and Pascal Bouvry On the use of small-world population topologies for genetic algorithms In Proceedingsof EVOLVE 2011 2011

[287] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry Multi-objective cooperative coevolutionary algorithms for robust schedulingIn Proceedings of EVOLVE 2011 2011

[288] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee In Proceedings des 20eme ren-contres francophones du parallelisme (RenParrsquo20) pages 1ndash10 2011

[289] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certiclouda novel tpm-based approach to ensure cloud iaas security In Proceed-ings of the 4th IEEE Intl Conf on Cloud Computing (CLOUD 2011)pages 121 ndash 130 IEEE Computer Society 2011

[290] Julien Schleich Guillaume-Jean Herbiet Patricia Ruiz Pascal Bou-vry Jerome Wagener Paul Bicheler Frederic Guinand and SergeChaumette Enhancing the broadcast process in mobile ad hoc net-works using community knowledge In Proceedings of the first ACMinternational symposium on Design and analysis of intelligent vehicu-lar networks and applications pages 23ndash30 2011

[291] V Goranko W Jamroga and P Turrini Strategic games and trulyplayable effectivity functions In Proceedings of AAMAS2011 pages727ndash734 2011

[292] M de Boer D Gabbay X Parent and M Slavkovik Two dimensionalstandard deontic logic [including a detailed analysis of the 1985 jonesndashporn deontic logic system] Synthese pages 1ndash38 2011

[293] Harold Castro German Sotelo Cesar O Diaz and Pascal BouvryGreen flexible opportunistic computing with virtualization In Pro-ceedings of the 11th IEEE International Conference on Computer andInformation Technology pages 629ndash634 2011

[294] Cesar O Diaz Mateusz Guzek Johnatan E Pecero Pascal Bouvryand Samee U Khan Scalable and energy-efficient scheduling tech-niques for large-scale systems In Proceedings of the 11th IEEE Inter-national Conference on Computer and Information Technology pages641ndash647 2011

[295] Cesar O Diaz Mateusz Guzek Johnatan E Pecero Gregoire DanoyPascal Bouvry and Samee U Khan Energy-aware fast schedulingheuristics in heterogeneous computing systems In Proceedings of the2011 International Conference on High Performance Computing ampSimulation (HPCS 2011) pages 478ndash484 2011

230 BIBLIOGRAPHY

[296] Jean Botev and Marco Milanesio Code - an application-layer frame-work for confidentiality in distributed environments In Proceedingsof the 3rd International Workshop on Collaborative Social Computing(SocialComp 2011) 2011

[297] Jean Botev Wei Tsang Ooi and Ingo Scholtes Getting real - self-organized resource allocation on second life avatar traces In Proceed-ings of the 4th International Workshop on Massively Multiuser VirtualEnvironments (MMVE 2011) pages 170 ndash 175 IEEE 2011

[298] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry New state-of-the-art results for cassini2 global trajectory optimization problemIn International Joint Conference on Artificial Intelligence (IJCAI)Workshop on AI in Space Intelligence beyond planet Earth pages1ndash6 2011

[299] Bernabe Dorronsoro and Pascal Bouvry The explorationexploitationtradeoff in dynamic cellular evolutionary algorithms IEEE Transac-tions on Evolutionary Computation 15(1)67ndash98 2011

[300] Bernabe Dorronsoro Gregoire Danoy Pascal Bouvry and Antonio JNebro Multi-objective Cooperative Coevolutionary Evolutionary Algo-rithms for Continuous and Combinatorial Optimization volume 362of Studies in Computational Intelligence series pages 49ndash74 Springer2011

[301] Alexandru-Adrian Tantar Emilia Tantar and Pascal Bouvry Loadbalancing for sustainable ict In 13th Annual Genetic and Evolution-ary Computation Conference (GECCO 2011) Companion MaterialProceedings pages 733ndash738 ACM 2011

[302] Alexandru-Adrian Tantar Emilia Tantar and Pascal Bouvry A clas-sification of dynamic multi-objective optimization problems In 13thAnnual Genetic and Evolutionary Computation Conference (GECCO2011) Companion Material Proceedings pages 105ndash106 ACM 2011

[303] Emilia Tantar Alexandru-Adrian Tantar and Pascal Bouvry On dy-namic multi- objective optimization - classification and performancemeasures In Proceedings of the IEEE Congress on Evolutionary Com-putation pages 2759ndash2766 2011

[304] Eugenio Giordano Raphael Frank Giovanni Pau and Mario GerlaCorner A radio propagation model for vanets in urban scenariosProceedings of the IEEE 99(7)1280 ndash 1294 2011

[305] Johnatan Pecero Frederic Pinel Bernabe Dorronsoro GregoireDanoy Pascal Bouvry and Albert Zomaya Efficient Hierarchical

BIBLIOGRAPHY 231

Task Scheduling on GRIDS Accounting for Computation and Commu-nications volume 362 of Studies in Computational Intelligence pages25ndash48 Springer 2011

[306] Cynthia Wagner Jerome Francois Radu State and Thomas EngelDanakfinding the odd In Proceedings of the 5th International Con-ference on Network and System Security 2011 (NSS2011) pages 161ndash168 IEEE 2011

[307] Patricia Ruiz Bernabe Dorronsoro Giorgio Valentini Frederic Pineland Pascal Bouvry Optimisation of the enhanced distance basedbroadcasting protocol for manets J of Supercomputing Special Is-sue on Green networks pages 1ndash28 2011

[308] Jean Botev and Steffen Rothkugel Flora - flock-based resource alloca-tion for decentralized distributed virtual environments In Proceedingsof the 2nd International Workshop on Distributed Simulation and On-line Gaming (DISIO 2011) 2011

[309] Sebastien Varrette Emilia Tantar and Pascal Bouvry On the re-silience of [distributed] eas against cheaters in global computing plat-forms In IPDPS Workshops pages 409ndash417 IEEE 2011

[310] Alexandru-Adrian Tantar Gregoire Danoy Pascal Bouvry and SameeKhan Energy-Efficient Computing using Agent-Based Multi-ObjectiveDynamic Optimization pages 267ndash287 Springer New York NY USA2011

[311] Bernabe Dorronsoro and Pascal Bouvry Differential evolution algo-rithms with cellular populations Parallel Problem Solving from Nature(PPSN) Lecture Notes in Computer Science 6239320ndash330 2011

[312] Alexandre Bartel Benoit Baudry Freddy Munoz Jacques KleinTejeddine Mouelhi and Yves Le Model driven mutation applied toadaptative systems testing In Proceedings of the 2011 IEEE FourthInternational Conference on Software Testing Verification and Vali-dation Workshops ICSTW rsquo11 pages 408ndash413 IEEE Computer Soci-ety 2011

[313] Marwane El Kharbili Qin Ma Pierre Kelsen and Elke PulvermuellerEnterprise regulatory compliance modeling using corel An illustra-tive example In 13th IEEE Conference on Commerce and EnterpriseComputing pages 185ndash190 IEEE Computer Society Press 2011

[314] Marwane El Kharbili Qin Ma Pierre Kelsen and Elke PulvermuellerCorel Policy-based and model-driven regulatory compliance manage-ment In Proceedings of the 15th IEEE International Enterprise Dis-

232 BIBLIOGRAPHY

tributed Object Computing Conference pages 247ndash256 IEEE Com-puter Society Press 2011

[315] Wojciech Jamroga Sjouke Mauw and Matthijs Melissen Fairness innon-repudiation protocols In Security and Trust Management LectureNotes in Computer Science volume 7170 pages 122ndash139 Springer2012

[316] Agata Grzybek Gregoire Danoy and Pascal Bouvry Generation ofrealistic traces for vehicular mobility simulations In Proceedings ofthe second ACM international symposium on Design and analysis ofintelligent vehicular networks and applications DIVANet rsquo12 pages131ndash138 New York NY USA 2012 ACM

[317] Clark Thomborson Christian Collberg and Douglas Low A taxonomyof obfuscating transformations 1997

[318] Boaz Barak Oded Goldreich Russel Impagliazzo Steven RudichAmit Sahai Salil Vadhan and Ke Yang On the (im)possibility ofobfuscating programs 2001

[319] Christian Collberg and Jasvir Nagra Surreptitious Software Obfus-cation Watermarking and Tamperproofing for Software ProtectionAddison-Wesley Professional 2009

[320] M H Halstead Elements of software science 1977

[321] E I Oviedo Control flow data flow and program complexity Pro-ceedings of IEEE COMPSAC pages 146ndash152 1980

[322] Terence J Parr T J Parr and R W Quong Antlr A predicated-ll(k)parser generator 1995

[323] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee Technique et science informa-tiques 31(8-9-10)1121ndash1152 2012

[324] Jshadobf A javascript obfuscator based on evolutionary algorithmshttpjshadobfunilu 2013

[325] Apostolos Stathakis Gregoire Danoy El-Ghazali Talbi and PascalBouvry A local search algorithm for telecommunication satellite pay-load configuration In International Conference on Metaheuristics andNature Inspired Computing 2012

[326] Levi Lucio and Nicolas Guelfi A precise definition of operationalresilience Technical Report TR-LASSY-11-02 University of Luxem-bourg 2011

BIBLIOGRAPHY 233

[327] Nicolas Guelfi A formal framework for dependability and resiliencefrom a software engineering perspective Technical Report TR-LASSY-10-01 University of Luxembourg 2010

[328] Guido Boella Gabriella Pigozzi Marija Slavkovik and Leendertvan der Torre Group intentions are social choice with commitmentIn Procs of the 8th European Workshop on Multi-agent Systems (EU-MASrsquo10) 2010

[329] Patricia Ruiz and Pascal Bouvry On the improvement of the enhanceddistance based broadcasting algorithm Int J of Communication Net-works and Distributed Systems in Press

[330] Patricia Ruiz Bernabe Dorronsoro Pascal Bouvry and Lorenzo JTardon Information dissemination in vanets based upon a tree topol-ogy Journal of Ad hoc Networks 10(1)111ndash127 2012

[331] State R Ries T and A Panchenko Comparison of low-latency anony-mous communication systems - practical usage and performance InColin Boyd and Josef Pieprzyk editors Australasian Information Se-curity Conference (AISC 2011) volume 116 of CRPIT pages 77ndash86Perth Australia 2011 ACS

[332] Michael Kirley and Robert Stewart An analysis of the effects of pop-ulation structure on scalable multiobjective optimization problems InProceedings of the 9th annual conference on Genetic and evolutionarycomputation GECCO rsquo07 pages 845ndash852 New York NY USA 2007ACM

[333] Matthijs T J Spaan and Nikos A Vlassis Perseus Randomizedpoint-based value iteration for pomdps J Artif Intell Res (JAIR)24195ndash220 2005

[334] Pierre Del Moral Feynman-Kac formulae genealogical and interact-ing particle systems with applications Springer series in statisticsProbability and its applications Springer 2004

[335] Pierre Del Moral Arnaud Doucet and Ajay Jasra Sequential montecarlo samplers Journal of the Royal Statistical Society Series B (Sta-tistical Methodology) 68(3)411ndash436 2006

[336] Juan Luis Jimenez Laredo Pascal Bouvry Sanaz Mostaghim andJuan Julian Merelo Guervos Validating a peer-to-peer evolutionaryalgorithm In European Conference on the Applications of Evolution-ary Computation Accepted for publication in 2012

234 BIBLIOGRAPHY

[337] Daniel Lombra na Gonzalez Juan Luis Jimenez Laredo Francisco Fer-nandez de Vega and Juan Julian Merelo Guervos CharacterizingFault-tolerance in Evolutionary Algorithms Springer Verlag Acceptedfor publication in 2012

[338] F Caldeira T Schaberreiter E Monteiro J Aubert P Simoes andD Khadraoui Trust based interdependency weighting for on-line riskmonitoring in interdependent critical infrastructures In Risk and Se-curity of Internet and Systems (CRiSIS) 2011 6th International Con-ference on pages 1 ndash7 sept 2011

[339] T Schaberreiter J Aubert and D Khadraoui Critical infrastructuresecurity modelling and resci-monitor A risk based critical infrastruc-ture model In IST-Africa Conference Proceedings 2011 pages 1 ndash8may 2011

[340] Thomas Schaberreiter Filipe Caldeira Jocelyn Aubert EdmundoMonteiro Djamel Khadraoui and Paulo Simones Assurance and trustindicators to evaluate accuracy of on-line risk in critical infrastruc-tures In CRITIS2011 conference proceedings September 2011

[341] Thomas Schaberreiter Kati Kittila Kimmo Halunen Juha Roningand Djamel Khadraoui Risk assessment in critical infrastructuresecurity modelling based on dependency analysis (short paper) InCRITIS2011 conference proceedings September 2011

[342] Andriy Panchenko Privacy in communications on the internet Prac-tice of Information Processing and Communication Praxis der In-formationsverarbeitung und Kommunikation (PIK) 34(2) 2011

[343] Andriy Panchenko Anonymous communication in the digitalworld In 17th Conference on Communication in Distributed Systems(KiVSrsquo11) Kiel Germany march 2011 OASIcs ndash OpenAccess Seriesin Informatics

[344] Andriy Panchenko Otto Spaniol Andre Egners and Thomas EngelLightweight hidden services In 10th IEEE International Conferenceon Trust Security and Privacy in Computing and Communications(IEEE TrustCom 2011) Changsha China nov 2011 IEEE ComputerSociety Press

[345] Jerome Francois Shaonan Wang Walter Bronzi Radu State andThomas Engel Botcloud Detecting botnets using mapreduce InProceddings of International Workshop on Information Forensics andSecurity (WIFSrsquo11) pages 0ndash0 IEEE 2011

BIBLIOGRAPHY 235

[346] Jerome Francois Radu State Thomas Engel and Olivier Festor En-forcing security with behavioral fingerprinting In International Con-ference on Network and Service Management (CNSM) 2011

[347] AJ Nebro JJ Durillo F Luna B Dorronsoro and E Alba MocellA cellular genetic algorithm for multiobjective optimization Interna-tional Journal of Intelligent System Special Issue on Nature InspiredCooperative Strategies 24(7)726ndash746 2009

[348] Gabriella Pigozzi Marija Slavkovik and Leendert van der Torre Acomplete conclusion-based procedure for judgment aggregation InProceedings of the First International Conference on Algorithmic De-cision Theory (ADT) volume 5783 5783 of Lecture Notes in ArtificialIntelligence pages 1ndash13 Springer Verlag 2009

[349] Davide Grossi Gabriella Pigozzi and Marija Slavkovik White ma-nipulation in judgment aggregation In Proceedings of BNAIC 2009- The 21st Benelux Conference on Artificial Intelligence (to appear)2009

[350] Laurent Kirsch Markus Esch and Steffen Rothkugel The SnippetSystem - Fine-Granular Management of Documents and Their Re-lationships In Proceedings of the 6th International Conference onHuman-Computer Interaction (HCI 2011) Washington DC USA2011 IASTED

[351] Bernd Klasen Efficient Content Distribution in Social-Aware HybridNetworks Journal of Computational Science 2011

[352] Jean Botev Sociality and Self-Organization in Next-Generation Dis-tributed Environments PhD thesis University of Luxembourg 2011

[353] Peter Ryan James Heather and Vanessa Teague Pretty good democ-racy for more expressive voting schemes In Computer Security ndash ES-ORICS 2010 15th European Symposium on Research in Computer Se-curity Athens Greece September 20-22 2010 Proceedings pages 405ndash 423 2010

[354] Zhe Xia Chris Culnane James Heather Hugo Jonker Peter RyanSteve Schneider and Sriramkrishnan Srinivasan Versatile pret a voterHandling multiple election methods with a unified interface In Pro-ceedings of the 11th International Conference on Cryptology in India(Indocryptrsquo10) pages 98ndash114 2010

[355] Barbara Kordy Marc Pouly and Patrick Schweitzer Computationalaspects of attack-defense trees In Security and Intelligent InformationSystems volume LNCS 7053 pages 103ndash116 Springer 2012

236 BIBLIOGRAPHY

[356] Gerard Wagener Radu State Alexandre Dulaunoy and Thomas En-gel Heliza talking dirty to the attackers Journal in Computer Vi-rology pages 1ndash12 2010

[357] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Breaking tor anonymity with game theory anddata mining In Proceedings of 4th International Conference on Net-work and System Security NSS2010 pages 47ndash54 IEEE 2010 BestPaper Award of NSS 2010

[358] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Game theory driven monitoring of spatial-aggregated ip flow records In Proceedings of the 6th InternationalConference on Network and Services Management (CNSM) pages 0ndash0 IEEE 2010

[359] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Peekkernelflows Peeking into ip flows In Pro-ceedings of the Seventh International Symposium on Visualization forCyber Security pages 52ndash57 ACM International Conference Proceed-ings Series ACM New York NY USA 2010

[360] Cynthia Wagner Gerard Wagener Radu State and Thomas EngelMonitoring of spatial-aggregated ip-flow records In Advances in SoftComputing Series - CISISrsquo10 volume 85 pages 117ndash124 Springer2010

[361] Bernd Klasen Social fast efficient Content distribution in hybridnetworks In Computers and Communications (ISCC) 2011 IEEESymposium on pages 61ndash67 Kerkyra June 2011 IEEE

[362] Samuel Marchal Jerome Francois Cynthia Wagner and Thomas En-gel Semantic exploration of dns In 11th Networking Conference 2012pages 1ndash8 2012

[363] Samuel Marchal Jerome Francois Cynthia Wagner Radu StateAlexandre Dulaunoy Thomas Engel and Olivier Festor Dnssm Alarge-scale passive dns security monitoring framework In IEEEIFIPNetwork Operations and Management Symposium pages 1ndash8 IEEE2012

[364] David Fotue Foued Melakessou Thomas Engel and Houda LabiodDesign of new aggregation techniques for wireless sensor networks InThe 18th Annual Meeting of the IEEEACM International Symposiumon Modeling Analysis and Simulation of Computer and Telecommu-nication Systems pages 1ndash1 MASCOTS 2010

BIBLIOGRAPHY 237

[365] David Fotue Foued Melakessou Houda Labiod and Thomas EngelDesign of an enhanced energy conserving routing protocol based onroute diversity in wireless sensor networks In The 9th IEEEIFIPAnnual Mediterranean Ad Hoc Networking Worshop pages 1ndash6 IEEEXplore 2010

[366] Guillaume Aucher Guido Boella and Leendert van der Torre Adynamic logic for privacy compliance Artif Intell Law 19(2-3)187ndash231 2011

[367] Jerome Leemans and Nuno Amalio Modelling a cardiac pacemakervisually and formally In VLHCC 2012 pages 257ndash258 IEEE 2012

[368] Mauricio Alferez Nuno Amalio Selim Ciraci et al Aspect-orientedmodel development at different levels of abstraction In ECMFA 2011LNCS pages 361ndash376 Springer 2011

[369] Eric Tobias Eric Ras and Nuno Amalio Suitability of visual mod-elling languages for modelling tangible user interface applications InVLHCC 2012 IEEE 2012

[370] Eric Tobias Eric Ras and Nuno Amalio VML Usability for ModellingTUI Scenarios - A Comparative Study Technical Report TR-LASSY-12-06 University of Luxembourg LASSY 2012 available at http

vclgforgeuniludocVMLCaseStudypdf

[371] Nuno Amalio The VCL model of the barbados crisis managementsystem Technical Report TR-LASSY-12-09 Univ of Luxembourg2012

[372] Jerome Leemans and Nuno Amalio A VCL model of a cardiac pace-maker Technical Report TR-LASSY-12-04 University of Luxem-bourg 2012

238 BIBLIOGRAPHY

Appendix B

CSC Statistics for 2012

B1 CSC publications

For more details see chapter 7 page 197

B2 CSC budget

See also sect23 page 6

Lab structural funding 761070e

UL Research Projects 896775e

Total 1657845 e

Table B1 CSC Internal Budget

240 CSC Statistics for 2012

B3 CSC staff per category

Category Number

Professors 16Associate Professors 7

Scientific Supp Staff Members 12Post-Docs 7

Post-Docs on projects 8PhD Students 40

Technical Support Staff Members 4Technician on project 1Administrative Staff 5Research Facilitator 1

Total 101

Professors Associated Professors Post Docs Scientific support staff PhD Students Post Docs on Project Technical support staff Technicians on projects Administrative staff Research facilitator

Figure B1 CSC HR Repartition

B3 CSC staff per category 241

Professors - Associate Professors

Lastname Firstname Position

BIRYUKOV Alexei Associate-Professor

BISDORFF Raymond Joseph Professor

BOUVRY Pascal Professor

BRIAND Lionel Professor

CORON Jean-Sebastien Associate-Professor

DUHAUTPAS Theo Professor

ENGEL Thomas Professor

GUELFI Nicolas Professor

KELSEN Pierre Professor

LE TRAON Yves Professor

LEPREVOST Frank Professor

MAUW Sjouke Professor

OTTERSTEN Bjorn Professor

MULLER Volker Associate-Professor

NAVET Nicolas Associate-Professor

ROTHKUGEL Steffen Associate-Professor

RYAN Peter Professor

SACHAU Juergen Professor

SCHOMMER Christoph Associate-Professor

SORGER Ulrich Professor

STEENIS Bernard Associate-Professor

VAN DER TORRE Leon Professor

ZAMPUNIERIS Denis Professor

Total 23

242 CSC Statistics for 2012

Research Assistants - PostDocs

Lastname Firstname PositionAMALIO Nuno Scientific Coll on ProjectBERNARD Nicolas Scientific Supp Staff MemberBOTEV Jean Post-DocCAPOZUCCA Alfredo Scientific Supp Staff MemberDANOY Gregoire Scientific Supp Staff MemberGLODT Christian Scientific Supp Staff MemberGROSZSCHADL Johann Scientific Supp Staff MemberJONKER Hugo Scientific Coll on projectKHOVRATOVICH Dmitry PostDocKLEIN Jacques Scientific Supp Staff MemberLEHTONEN Erkko Post-DocMIZERA Andrzej PostDocPANG Jun Scientific Supp Staff MemberPARENT Xavier Post-DocPECERO SANCHEZ Johnatan Post-DocRIES Benoit Scientific Supp Staff MemberRISOLDI Matteo Scientific Coll on ProjectSCHLEICH Julien Scientific Coll on ProjectSTATE Radu Scientific Supp Staff MemberSUCHANECKI Zdzislaw Scientific Supp Staff MemberTANG Qiang Post-DocTEUCHERT Andrea Scientific Coll on ProjectTURRINI Paolo Post-DocVARRETTE Sebastien Scientific Supp Staff MemberVESIC Srdjan Post-DocWEYDERT Emil Scientific Supp Staff Member

Total 27 (AFR Total 1)

B3 CSC staff per category 243

PhD Students

Lastname Firstname PositionALLIX Kevin PhD StudentAMRANI Moussa PhD StudentBERSAN Roxana-Dolores PhD StudentDANILAVA Sviatlana PhD StudentDIAZ Cesar PhD StudentDOBRICAN Remus PhD StudentDONG Naipeng PhD StudentEL KATEB Donia PhD StudentEL KHARBILI Marwane PhD StudentFRANCK Christian PhD StudentGALLAIS Jean-Francois PhD StudentGIUSTOLISI Rosario PhD StudentGOERGEN David PhD StudentKAMPAS Dimitrios PhD StudentKHAN Yasir Imtiaz PhD StudentKIRSCH Laurent PhD StudentLI Yu PhD StudentLIU Zhe PhD StudentMARQUES DIAS Sergio Scientific Coll on ProjectMELISSEN Matthijs PhD StudentMINEV Mihail PhD StudentMULLER Tim PhD StudentMUSZYNSKI Jakub PhD StudentNIELSEN Sune PhD StudentOLTEANU Alexandru-Liviu PhD StudentPEREZ URQUIDI Jose Miguel PhD StudentPINEL Frederic PhD StudentPORAY Jayanta PhD StudentPUSTOGAROV Ivan PhD StudentRIENSTRA Tjitze PhD StudentROY Arnab PhD StudentRUBAB Irman PhD StudentRUIZ Patricia PhD StudentSHIRNIN Denis PhD StudentSIMIONOVICI Ana-Maria PhD StudentSKROBOT Marjan PhD StudentSUN Xin PhD StudentVADNALA Praveen Kumar PhD StudentVENKATESH Srivinas Vivek PhD StudentZHANG Yang PhD Student

Total 40 (AFR Total 8)

244 CSC Statistics for 2012

Technical Support

Lastname Firstname PositionCARTIAUX Hyacinthe Technician on ProjectDUNLOP Dominic Technical Support Staff MemberLE CORRE Yann Technical Support Staff MemberSTEMPER Andre Technical Support Staff MemberREIS Sandro Technician on Project

Total 5

Administrativ Aid

Lastname Firstname PositionDESSART Bertrand Research facilitator

EYJOLFSDOTTIR Ragnhildur Edda SecretaryFLAMMANG Daniele SecretarySCHMITZ Fabienne SecretarySCHROEDER Isabelle SecretaryVIOLET Catherine Secretary

Total 6

Appendix C

Acronyms used

ComSys Communicative Systems Laboratory

CSC Computer Science amp Communications

HPC High Performance Computing

ILIAS Interdisciplinary Laboratory for Intelligent and Adaptive Systems

LACS Laboratory of Algorithmics Cryptology and Security

LASSY Laboratory for Advanced Software Systems

SnT Interdisciplinary Centre for Security Reliability and Trust

UL University of Luxembourg

246 Acronyms used

httpcscunilu

Computer Science amp Communication (CSC) Research UnitUniversity of LuxembourgFaculty of Science Technology and Communication6 rue Richard Coudenhove-KalergiL-1359 LuxembourgLuxembourg

Administrative ContactIsabelle Glemot-Schroeder and Fabienne Schmitz

Email cscunilu

  • 1 The Computer Science amp Communications (CSC) Research Unit
  • 2 Executive Summary
    • 21 Academic Staff Overview
    • 22 Main activities in 2012
    • 23 CSC Budget in 2012
      • 3 CSC Laboratories
        • 31 Laboratory for Advanced Software Systems
        • 32 Laboratory of Algorithmics Cryptology and Security
        • 33 Communicative Systems Laboratory
        • 34 Interdisciplinary Laboratory for Intelligent and Adaptive Systems
          • 4 Projects and Grants in 2012
            • 41 Research projects
              • 411 European funding projects
              • 412 FNR COREINTER Projects
              • 413 UL Projects
              • 414 UL PhD PostDoc
              • 415 Other miscellaneous projects
                • 42 Grants
                  • 421 AFR
                  • 422 Workshop amp Conferences (FNR Accompanying Measures)
                      • 5 CSC Representation
                        • 51 Conferences
                        • 52 PC and other memberships
                        • 53 Doctoral board
                        • 54 Guests
                        • 55 Visits and other representation activities
                        • 56 Research meeting
                          • 6 CSC Software
                          • 7 CSC Publications in 2012
                            • 71 Books
                            • 72 Book Chapters
                            • 73 International journals
                            • 74 Conferences Articles
                            • 75 Internal Reports
                            • 76 Proceedings
                              • Appendix
                              • A Additional References
                              • B CSC Statistics for 2012
                                • B1 CSC publications
                                • B2 CSC budget
                                • B3 CSC staff per category
                                  • C Acronyms used
Page 3: Computer Science and Communications Research Unit

Computer Science and Communications Research UnitCSC Activity Report 2012

Editors Gregoire Danoy and Sebastien VarretteRelease date 2012Category 1 (public)Document Version Final v01 ndash SVN Rev

Compiled time 2013-10-08 1108Comments This report has been written using LATEX on the basis of the

template ccopy designed by Sebastien Varrette

AddressComputer Science amp Communication (CSC) Research UnitUniversity of LuxembourgFaculty of Science Technology and Communication6 rue Richard Coudenhove-KalergiL-1359 LuxembourgLuxembourg

Administrative ContactIsabelle Glemot-Schroeder and Fabienne Schmitz

Email cscunilu

httpcscunilu

Preface

You will find in this report the progress and activities made by the ComputerScience amp Communications (Computer Science amp Communications (CSC))research unit in 2012

Let me please summarize

In 2012 CSC features 116 positions including 24 Professors and Associate-Professors 32 Post-doc researchers 47 PhD students and 12 Administrativeand Technical staff

Nicolas Navet formerly at INRIA-Nancy has joined the lab as an associateprofessor specializing in real-time and embedded systems

Prof Denis Zampunieris has been appointed as vice-dean of the Faculty ofScience Technology and Communication and Nicolas Navet succeeds DenisZampunieris as course director of the bachelor in Informatics

Prof Lionel Briand is the recipient of a FNR PEARL grant that officiallystarted in January 2012 His group at the SnT is now composed of 12scientists and PhD students

The renowned logician Dov Gabbay started his second 3-year term (2012-2014) as an invited professor of UL attached to CSC

CSC hosted in Luxembourg several successful workshops

bull ldquoJudgment Aggregationrdquo (Feb 1) an important topic in the emergingarea of computational social choice

bull ldquoDynamics Of Argumentation Rules and Conditionals (DARC)rdquo(April2-3) another one on the Several other events were co-organized locallyand abroad

bull ldquoeVoting PhD Workshoprdquo (15-16 October)

ii

Dmitry Khovratovich obtained the Best PhD thesis award of the Universityof Luxembourg for his research on ldquoNew Approaches to the Cryptanalysisof Symmetric Primitivesrdquo

Dr Foued Melakessou received the first prize in the 2012 Scilab Contest atthe Workshop on Scilab amp OW2 (IWSO) in Nanjing China for his NARVAL(Network Analysis and Routing eVALuation) toolbox NARVAL is builton the Scilab environment and focuses on the analysis of network proto-cols (httpsecan-labuniluindexphpnews161-narval-toolbox-wins-first-prize-in-2012-scilab-contest)

Prof Lionel Briand received the IEEE Computer Society Harlan Mills awardfor his contributions to model-based verification and testing

Prof Bjorn Ottersten and Prof Lionel Briand were appointed members ofthe IEEE Fellow Review Committee

Prof Bjorn Ottersten was appointed ldquoDigital Champion of Luxembourgrdquoby Francois Biltgen Minister for Higher Education and Research

The hackbraten team headed by Piotr Kordy represented the SaToSS groupat the Capture the Flag Competition (http2012hackluindexphpCaptureTheFlag) co-located with the Hacklu conference (http2012hacklu) The team was ranked 24th amongst 575 teams registered forthe event

In 2012 ULCSC was involved in the launch of LAST-JD a new interdisci-plinary ERASMUS MUNDUS PhD program in Law Science and Technologyinvolving several partner universities in Europe and beyond

Dr Jun Pang and Prof Sjouke Mauw initiated a new strand of researchfocusing on formal models for biological systems An expert in the field DrAndrzej Mizera was hired to contribute and further extend this initiative

Prof Dr Pascal BouvryLuxembourg January 17 2013

Contents

1 The Computer Science amp Communications (CSC) ResearchUnit 1

2 Executive Summary 3

21 Academic Staff Overview 4

22 Main activities in 2012 5

23 CSC Budget in 2012 6

3 CSC Laboratories 7

31 Laboratory for Advanced Software Systems 7

32 Laboratory of Algorithmics Cryptology and Security 9

33 Communicative Systems Laboratory 10

34 Interdisciplinary Laboratory for Intelligent and Adaptive Sys-tems 12

4 Projects and Grants in 2012 15

41 Research projects 27

411 European funding projects 27

412 FNR COREINTER Projects 49

413 UL Projects 78

414 UL PhD PostDoc 91

iv CONTENTS

415 Other miscellaneous projects 115

42 Grants 123

421 AFR 123

422 Workshop amp Conferences (FNR Accompanying Mea-sures) 165

5 CSC Representation 167

51 Conferences 167

52 PC and other memberships 170

53 Doctoral board 176

54 Guests 177

55 Visits and other representation activities 181

56 Research meeting 186

6 CSC Software 189

7 CSC Publications in 2012 197

71 Books 197

72 Book Chapters 198

73 International journals 198

74 Conferences Articles 204

75 Internal Reports 223

76 Proceedings 224

Appendix 225

A Additional References 225

B CSC Statistics for 2012 239

B1 CSC publications 239

B2 CSC budget 239

B3 CSC staff per category 240

CONTENTS v

C Acronyms used 245

vi CONTENTS

Chapter 1

The Computer Science ampCommunications (CSC)

Research Unit

The Computer Science amp Communications (CSC) research unit is part ofthe University of Luxembourg with the primary mission to conduct funda-mental and applied research in the area of computer communication andinformation sciences

The goal is to push forward the scientific frontiers of these fields Addition-ally CSC provide support for the educational tasks at the academic andprofessional Bachelor and Master levels as well as for the PhD program

The CSC Research Unit is divided into four laboratories

1 Communicative Systems Laboratory (ComSys)

2 Interdisciplinary Laboratory for Intelligent and Adaptive Systems (ILIAS)

3 Laboratory of Algorithmics Cryptology and Security (LACS)

4 Laboratory for Advanced Software Systems (LASSY)

Three laboratories of the interdisciplinary centre in security reliability andtrust (SnT) are also headed by CSC professors

2 The Computer Science amp Communications (CSC) Research Unit

CSC works intensively towards the University priorities in Security Relia-bility and Trust as well as Systems Biomedicine By providing a strong dis-ciplinary knowledge in computer science telecommunications and appliedmathematics CSC will serve as one of the fundamental bricks to enableinterdisciplinary research through the University of Luxembourgrsquos interdis-ciplinary centres

CSC is currently the largest research unit of the University with a staff ofmore than 100 persons including 22 professors and associate-professors 11scientific support staff members 25 post-doc researchers and scientific col-laborators 40 PhD students 3 technician on project 1 research facilitator3 technical support staff members 3 technicians on project 475 full-time-equivalent administrative support positions

Their research fields range from the investigation of the theoretical founda-tions to the development of interdisciplinary applications

CSC decisions are taken by the chorum of professors As described in Figure11 the head of the research unit is helped by a quality manager a facilitymanager (handled by the scientific facilitator) and the heads of labs in orderto prepare the decision options and the reporting of the CSC Each lab hasits own budget line and a set of support resources

Prof BouvryHead of CSC

Prof ZampunierisDirector of Studies Representative

Prof MauwQuality Manager

Prof SchommerHead of ILIAS

Prof EngelHead of ComSys

Prof GuelfiHead of LASSY

Prof BiryukovHead of LACS

Profs Profs Profs Profs

CSC Steering Board

Bertrand DessartResearch Facilitator

Figure 11 CSC Organisation

Chapter 2

Executive Summary

The Computer Science and Communication research unit aka ComputerScience amp Communications (CSC) includes a staff of over 100 persons Twohundred students at Bachelor and Master levels are registered to CSC bach-elor and master degrees Close supervision and advice is ensured by opendoor policy and project based lecturing

CSC is also involved in life-long learning by organising a master degreein Information Systems Security Management in collaboration with CRPTudor

With regard to the professional branches the main aim consists of reducingthe gap between theory and practice whereas for the academic branchesthe focus is set on a problem-oriented understanding of the theoretical foun-dations of computer science CSC works intensively towards the Universitypriorities in Security Reliability and Trust as well as System BiomedicineBy providing a strong disciplinary knowledge in computer science telecom-munications and applied mathematics CSC will serve as one of the fun-damental bricks to enable interdisciplinary research through the Universityof Luxembourgrsquos interdisciplinary centres CSC is currently the largest re-search unit of the University and is cooperating in a large set of internationalas well as regional projects

In parallel CSC is more and more active in the field of distributed gridcomputing with the aim to propose andor join attractive academic projectsin this area In this context CSC manages the UL HPC (High PerformanceComputing) facility of the UL and inaugurated the new cluster hosted inthe LCSB premises in Belval The current solution includes 151 nodes 1556

4 Executive Summary

cores 14245 TFlops 265 TB NFS storage and 240 TB Lustre storage

21 Academic Staff Overview

bull Jean-Claude Asselborndagger emeritus professor

bull Alex Biryukov associate professor head of LACS

bull Raymond Bisdorff professor

bull Pascal Bouvry professor head of CSC and ILIAS

bull Lionel Briand professor

bull Jean-Sebastien Coron associate professor

bull Dov Gabbay guest professor

bull Theo Duhautpas senior lecturer

bull Thomas Engel professor head of ComSys

bull Nicolas Guelfi professor head of LASSY

bull Pierre Kelsen professor

bull Franck Leprevost professor vice rector

bull Yves Le Traon professor

bull Sjouke Mauw professor

bull Volker Muller associate professor

bull Nicolas Navet professor

bull Bjorn Ottersten professor

bull Steffen Rothkugel associate professor

bull Peter Ryan professor

bull Jurgen Sachau professor

bull Christoph Schommer associate professor

bull Ulrich Sorger professor

bull Bernard Steenis associate professor

bull Leon van der Torre professor

bull Denis Zampunieris professor

22 Main activities in 2012 5

22 Main activities in 2012

The following local events have been organized during 2012

bull IFIP AIMS 2012

bull Capture The Flag competition 2012

bull Workshop on Dynamics of Argumentation Rules and Conditionals

bull Interdisciplinary PhD Workshop on Security in eVoting (eVote PhDDays 2012)

CSC also participates at the organisation of many international conferencesand workshops

CSC is having strong partnerships with the other Luxembourgian researchcentres through the co-supervision of PhD students co-organised projectsand teaching activities

In 2012 13 PhD students successfully defended their PhD thesis at the CSC

CSC members are taking active part in various boards country-wide ex-ecutive direction of ERCIM direction of RESTENA chairman of Luxcloudboard vice-rectorate for international affairs and special projects of the Uni-versity of Luxembourg chairman of Luxconnect SA member of LUXTRUSTadministration board members of the SnT interim steering board and SnTfaculty boards representative of Luxembourg in the COST ICT DG expertsfor EU and national projects

CSC is active in various networks and projects International EU (FPEureka COST) regional (UGR) and local (FNR) networks and projects

CSC participates to various ERCIM workgroups - the European ResearchConsortium for Informatics and Mathematics through the FNR

CSC also participated to the open source community by several contribu-tions

bull ADTool

bull ARGULAB

bull Canephora

bull Democles

bull Face recognition

6 Executive Summary

bull JShadObf

bull MaM Multidimensional Aggregation Monitoring

bull MSC Macro Package for LATEX

bull Visual Contract Builder

CSC in 2012 produced 1 book 7 book chapters edited 3 proceedings andin terms of international peer-reviewed publications 69 journal articles and165 conference and workshop proceedings (see chapter 7 page 197 for moredetails) The full list of CSC publications is available here

23 CSC Budget in 2012

The following table describes the marginal expenses of CSC in terms of struc-tural funding and UL projects The main cost corresponds to the salaries ofthe structural positions (professors research assistants assistants admin-istrative and support staff) expenses related to the buildings and some ofthe operating expenses (eg phone bills electricity etc) are covered by thestructural UL budget

Lab structural funding 761070e

UL Research Projects 896775e

Total 1657845 e

Table 21 CSC Internal Budget

Chapter 3

CSC Laboratories

31 Laboratory for Advanced Software Systems

Laboratory of Advanced Software SystemsAcronym LASSYReference F1R-CSC-LAB-05LASSHead Prof Dr Pierre Kelsen

Scientific Board Nicolas Guelfi Pierre Kelsen Yves Le Traon NicolasNavet Denis Zampunieris

Domain(s)

bull dependability

bull e-learning

bull hardwaresoftware co-design

bull model driven engineering

bull proactive computing

bull real-time and embedded systems

bull security

8 CSC Laboratories

bull software engineering

bull software product lines

bull testing

bull verification

Objectives The LASSY laboratory considers advanced software systemsas objects which are complex (business- or safety-) critical and possiblycontaining both software and hardware From the LASSY perspective thefour main dimensions underpinning the science of engineering these advancedsoftware systems are modeling methodology dependability (including secu-rity) and realization infrastructures LASSY conducts research in modelingand more specifically on model driven engineering which aims at allowing theengineering of such systems by creating and transforming models method-ologies which aim at defining engineering processes (focusing on analysisdesign and verification) and rules allowing for an efficient engineering of suchsystems conceptual frameworks and development platforms for enhancingdependability (focusing on concurrent transactions and fault tolerance) Inour research we promote the early consideration of realization infrastruc-tures (ie the hardware execution platform which integrates acquisitioncomputation communications and presentation hardware devices) Finallywe target specific application domains such as e-business systems auto-motive systems crisis management systems or proactive e-learning systemswhich are used either for experimental validation or for research problemelicitation

The current research objectives are the following ones

bull To develop new engineering processes

bull To investigate modeling languages

bull To use mathematical theories in the definition and verification of newsoftware engineering artifacts

bull To address dependability attributes (availability reliability safety con-fidentiality integrity and maintainability) throughout all the develop-ment life cycle

bull To assist in the development and in the use of e-learning tools

bull To study verification and validation techniques

Skills

32 Laboratory of Algorithmics Cryptology and Security 9

bull Nicolas Guelfi dependability verification software engineering modeldriven engineering

bull Pierre Kelsen model driven engineering software engineering formalmethods

bull Yves Le Traon verification testing software security model drivenengineering

bull Nicolas Navet real-time and embedded systems

bull Denis Zampunieris E-learning Proactive Computing

32 Laboratory of Algorithmics Cryptology andSecurity

Laboratory of Algorithmics Cryptology and SecurityAcronym LACSReference F1R-CSC-LAB-F01L0204Head Prof Dr Alex Biryukov

Scientific Board Jean-Sebastien Coron Franck Leprevost Sjouke MauwVolker Muller Peter Ryan

Domain(s)

bull Cryptography Information and Network Security

bull Information Security Management

bull Embedded Systems Security

bull Side-Channel Analysis and Security of Implementations

bull Algorithmic Number Theory

bull Security protocols

bull Security and trust assessment and modelling

bull Socio-technical security

10 CSC Laboratories

Objectives In recent years information technology has expanded to en-compass most facets of our daily livesmdashat work at school at home forleisure or learning and on the movemdashand it is reaching ever-widening seg-ments of our society The Internet e-mail mobile phones etc are alreadystandard channels for the information society to communicate gain accessto new multimedia services do business or learn new skills The recentldquodigital revolutionrdquo and widespread access to telecommunication networkshave enabled the emergence of e-commerce and e-government This pro-liferation of digital communication and the transition of social interactionsinto the cyberspace have raised new concerns in terms of security and trustlike confidentiality privacy and anonymity data integrity protection ofintellectual property and digital rights management threats of corporateespionage and surveillance systems (such as Echelon) etc These issues areinterdisciplinary in their essence drawing from several fields algorithmicnumber theory cryptography network security signal processing securityof protocols side-channel analysis software engineering legal issues andmany more

Skills NA

33 Communicative Systems Laboratory

Communicative Systems LaboratoryAcronym ComSysReference F1R-CSC-LAB-05COMSHead Prof Dr Thomas Engel

Scientific Board Pascal Bouvry Thomas Engel Steffen Rothkugel SjoukeMauw Theo Duhautpas Yves Le Traon Lionel Briand Bjorn OtterstenPeter Ryan Jurgen Sachau

Domain(s)

bull Information Transmission

bull Wireless Communication Systems

bull Security Protocols

bull Trust Models

33 Communicative Systems Laboratory 11

bull Middleware

bull Parallel and Distributed Systems

bull Cloud Grid and Peer-to-Peer Computing

Objectives The Communicative Systems Laboratory (ComSys) is part ofthe Computer Science and Communication Research Unit and focuses onstate of the art research in digital communications Embracing the end-to-end arguments in system design ComSys focuses on integrated research inthe areas of Information Transfer and Communicating Systems Informa-tion Transfer is concerned with information transmission over potentiallycomplex channels and networks Communicating Systems in turn are thecomposition of multiple distributed entities employing communication net-works to collaboratively achieve a common goal ComSys has strong tech-nical and personal facilities to improve existing and develop new solutionsin the following research topics The ComSys research fields will have astrong impact on the 21st century The rapidly growing demand for infor-mation exchange in peoplersquos daily lives requires technologies like ubiquitousand pervasive computing to meet the expectations of the information so-ciety and novel adaptive concepts tackling the continuing data challengesThe resulting problems have already been a key enabler for some industrialand governmental founded projects at national and European level Currentresearch projects propagate technologies for

bull Hybrid Wireless Networks

bull Green Cloud Computing

bull Information Dissemination in Ad-Hoc Networks

bull Mobile Communication

bull Mobile Learning

bull Network Traffic Analysis and Protection

bull Network Traffic Management and Coordination

bull Secure Satellite Communication

bull Secure Wireless MANETs

Skills

bull Research in networks and service security

12 CSC Laboratories

bull Mobile and vehicular networks

bull Protocol Security and Secure System Design

bull Data Mining for Network Security Monitoring

bull Adaptive and self managed security systems and honeypots

bull VoIP Security

bull Privacy preserving infrastructures

bull Cloud security and cluster based data mining

bull Distributed and P2P based computing

34 Interdisciplinary Laboratory for Intelligent andAdaptive Systems

Interdisciplinary Lab on Intelligent and Adaptative SystemsAcronym ILIASReference F1R-CSC-LAB-05ILIAHead Prof Dr Christoph Schommer

Scientific Board Pascal Bouvry Raymond Bisdorff Christoph SchommerUlrich Sorger Leon van der TorreGuest professor Dov Gabbay

Domain(s)

bull Algorithmic decision theory

bull Bio-inspired computing

bull Cognitive agentsrobotics

bull Data mining and knowledge discovery

bull Information theory and uncertain inference

bull Knowledge representation and applied logic (eg for security)

34 Interdisciplinary Laboratory for Intelligent and Adaptive Systems 13

bull Normative multi-agent systems

bull Optimization

bull Parallel computing

Objectives ILIAS is a cross-disciplinary research group combining exper-tise from computer science operations research information theory ana-lytic philosophy probability theory discrete math and logic The overar-ching topic in research and teaching is information processing in complexand dynamic environments given limited resources and incomplete or un-certain knowledge The ILIAS research teams investigate the theoreticalfoundations and the algorithmic realization of systems performing complexproblem solving with a high degree of autonomy ie intelligent systems andexploiting learning to deal with opaque and dynamic contexts ie adaptivesystems

Skills

bull Raymond Bisdorff (Decision aid systems)

bull Pascal Bouvry (Optimization and parallel computing)

bull Christoph Schommer (Adaptive data mining and information manage-ment)

bull Ulrich Sorger (Information theory and stochastic inference)

bull Leon van der Torre (Knowledge representation and multi-agent sys-tems)

bull Dov Gabbay (Applied logic and knowledge representation)

14 CSC Laboratories

Chapter 4

Projects and Grants in 2012

This chapter lists the research projects running during 2012together withthe grants obtained (typically to organize scientific conferences via the FNRaccompanying measures AM3) This chapter is structured to summarize

1 European funding project (FP7 ERCIM etc) ndash see sect411

2 FNR CORE projects ndash see sect412

3 UL projects ndash see sect413

4 UL PhD and Postdocs ndash see sect414

5 Other miscellaneous projects (French ANR Grant agreement for re-search development and innovation etc) ndash see sect415

6 Grants obtained (AFR FNR AM3 etc) ndash see sect42

The following tables summarize the projects operated in CSC for the year2012

16 Projects and Grants in 2012

European projectsLab Acronym Title PI Funding Duration

CO

MSY

S

InSatNetRef p27

Investigation of Radio ResourceAllocation and Multiple AccessSchemes for Satellite Networks

NA FNR-ERCIM-Alain Bensous-san(46Ke)

2012-06-01 ndash2013-05-31

BUTLERRef p33

uBiquitous secUre inTernet-of-things with Location and contEx-awaReness

Prof DrThomas Engel

FP7 Euro-pean Commis-sion(456Ke)

2011-10-01 ndash2014-09-30

ceFIMSRef p34

SceFIMS-Coordination of theEuropean Future Internet forumof Member States

Prof DrThomas Engel

EC - FP7UL bud-get(35Ke)

2010-09-01 ndash2013-02-28

IoT6Ref p36

Universal Itegration of the Inter-net of Things through an IPv6-Based Service-oriented Architec-ture enabling heterogeneous com-ponents interoperability

Prof DrThomas Engel

EC-FP7(266Ke)

2012-01-01 ndash2014-12-31

OUTSMARTRef p37

Provisioning of urbanregionalsmart services and business mod-els enabled by the Future Internet

Prof DrThomas Engel

FP7 Euro-pean Commis-sion(257Ke)

2011-04-01 ndash2013-03-31

SECRICOMRef p40

Seamless Communication for Cri-sis Management

Prof DrThomas Engel

EC - FP7 Eu-ropean Commis-sionUL(12469Ke)

2008-09-01 ndash2012-04-30

LA

CS TREsPASS

Ref p46

Technology-supported Risk Esti-mation by Predictive Assessmentof Socio-technical Security

Prof DrSjouke Mauw

EUFP7(9999824e)

2012-11-01 ndash2016-10-31

ILIA

S

ALBRRef p42

Argumentation-Based and Logic-Based Reasoning in Multi-AgentSystems

Dr SrdjanVesic

ERCIM 2011-10-01 ndash2012-09-30

TrustGamesRef p43

Trust Games Achieving Cooper-ation in Multi-Agent Systems

Dr Paolo Tur-rini

FNR-FP7 Co-fund

2011-09-01 ndash2013-08-31

WiSafeCarRef p44

Wireless traffic Safety networkbetween Cars

Prof Dr Pas-cal Bouvry

EUREKA -CELTIC(300000e)

2009-07-01 ndash2012-03-31

17

FNR projectsLab Acronym Title PI Funding Duration

CO

MSY

S

MoveRef p52

Mobility Optimization Using VE-hicular Network Technologies

Prof DrThomas Engel

FNRProject(1127ke)

2011-04-01 ndash2013-03-31

LA

CS

STASTRef p63

Socio-Technical Analysis of Secu-rity and Trust

Prof Dr Pe-ter YA Ryan

FNRCORE(765864e)

2012-05-01 ndash2015-04-30

ATREESRef p64

Attack Trees Prof DrSjouke Mauw

FNR-CORE(299000e)

2009-04-01 ndash2012-03-31

CRYPTOSECRef p66

Cryptography and InformationSecurity in the Real World

Dr Jean-SebastienCoron

FNR-CORE(272000e)

2010-10-01 ndash2013-09-30

SeRTVSRef p67

Secure Reliable and TrustworthyVoting Systems

Prof Dr Pe-ter Ryan

FNR-Core333000e FNR-AFR 216216eIMT Luca130000e Uni-versity of Mel-bourne 60000eUL 268596e

2010-02-01 ndash2013-02-01

LA

SSY

E-TEACCHRef p70

e-Training Education Assess-ment and Communication Centerfor Headache Disorders

Prof DrDenis Zam-punieris

FNR-CORE 2011-05-01 ndash2014-04-30

MaRCoRef p71

Managing Regulatory Compli-ance a Business-Centred Ap-proach

Prof DrPierre Kelsen

FNR-CORE(749Ke)

2010-05-01 ndash2013-04-30

MITERRef p73

Modeling Composing and Test-ing of Security Concerns

Dr JacquesKlein

FNR NA

MOVERERef p75

Model-Driven Validation andVerification of Resilient SoftwareSystems

Prof DrNicolas Guelfi

FNR-CORE(265000e)

2010-05-01 ndash2013-04-30

SETERRef p77

Security TEsting for Resilientsystems

Prof DrNicolas Guelfi

FNR-CORE(43830000e)

2009-05-01 ndash2012-04-30

18 Projects and Grants in 2012

FNR projects (cont)Lab Acronym Title PI Funding Duration

ILIA

S

SndashGAMESRef p54

Security Games Prof DrLeon van derTorre

FNR-CORE(314000e)

2009-04-01 ndash2012-03-31

DYNARGRef p56

The Dynamics of Argumentation Prof DrLeon van derTorre

FNR-INTERCNRS

2009-10-01 ndash2012-09-31

MaRCoRef p58

Management Regulatory Compli-ance

Prof DrPierre Kelsen

FNR-CORE 2010-05-01 ndash2013-04-30

GreenCloudRef p59

Multi-Objective Metaheuristicsfor Energy-Aware Scheduling inCloud Computing Systems

Prof Dr Pas-cal Bouvry

FNR Univer-sity of Luxem-bourg(1088440)

2012-07-01 ndash2015-06-30

GreenITRef p60

EnerGy-efficient REsourcE Al-locatioN in AutonomIc CloudCompuTing

Prof Dr Pas-cal Bouvry

FNR-CORE(432000e)

2010-01-01 ndash2012-12-31

19

AFR projectsLab Acronym Title PI Funding Duration

CO

MSY

S RELGRID2009Ref p128

Investigation of boundary condi-tions for a reliable and efficientcontrol of energy systems formedby highly parallelized off-grid in-verters

Prof DrJuergenSachau

FNR-AFR-PhD 2010-04-01 ndash2013-03-31

SCoPeMeterRef p129

Methods for Measuring and Pre-dicting the Security PerformanceReputation of Public Networks

Prof DrThomas Engel

FNR-AFR RedDog

2011-03-22 ndash2015-03-21

WiNSEOMRef p130

Energy Optimization and Moni-toring in Wireless Mesh SensorNetworks

Prof DrThomas Engel

FNR - AFRPhD(37KeYear)

2010-04-08 ndash2013-04-07

LA

CS

ANTI-MALWARE

Ref p154

A Computational Framework forApprehending Evolving Malwareand Malware Engineers

Dr SimonKramer

FNRndashAFR PostDoc(103 236 e)

2011-01-01 ndash2012-12-31

EPRIV-MAARef p155

A Formal Approach to EnforcedPrivacy Modelling Analysis andApplications

Prof DrSjouke Mauw

FNRndashAFR(105222e)

2009-12-01 ndash2013-11-30

GMASecRef p156

Games for Modelling and Analy-sis of Security

Prof DrSjouke Mauw

FNRndashAFR(140000e)

2009-11-01 ndash2013-10-31

SADTRef p157

Security Analysis ThroughAttackndashDefense Trees

Prof DrSjouke Mauw

FNR-AFRPhD(141968e)

2010-01-01 ndash2013-12-31

SECLOCRef p158

Secure and Private LocationProofs Architecture and Designfor Location-Based Services

Prof DrSjouke Mauw

FNR-AFRPhD(109137e)

2010-08-01 ndash2013-07-31

SHARCRef p160

Analysis of the SHA-3 RemainingCandidates

Prof Dr AlexBiryukov

FNR-AFR Post-doc(102620e)

2010-10-15 ndash2012-10-14

20 Projects and Grants in 2012

AFR projects (cont)Lab Acronym Title PI Funding Duration

LA

SSY

DYNOSTRef p161

Dynamic and Composite Service-Oriented Architecture SecurityTesting

Prof DrYves Le Traon

NA 2010-10-01 ndash2013-09-30

PeerunitRef p162

A Testing Framework for Large-Scale Applications

Prof DrYves Le Traon

NA 2011-01-15 ndash2014-01-15

SPEMRef p163

Selected Problems in ExecutableModeling

Prof DrPierre Kelsen

FNR-AFR PhD 2009-11-15 ndash2012-11-15

21

AFR projects (cont)Lab Acronym Title PI Funding Duration

ILIA

S

IELTRef p132

Information Extraction fromLegislative Texts

Prof DrLeon van derTorre

FNR AFR PHD 2012-03-01

LOSECRef p133

Security Logics Prof DrLeon van derTorre

FNR-AFR 2009-09-01 ndash2012-09-01

ProCRobRef p134

Programming Cognitive Robots Prof DrLeon van derTorre

FNR-AFR 2011-05-20 ndash2014-05-20

TABNRef p135

Trust in argumentation-based ne-gotiation

Dr SrdjanVesic

FNR-AFR-Postdoc

2012-10-01 ndash2013-01-14

LAAMIRef p136

Logical Approaches for Analyz-ing Market Irrationality compu-tational aspects

Prof DrLeon van derTorre

FNR-AFR(117840e)

2011-04-01 ndash2013-03-31

Green EECRef p138

Green Energy-Efficient Comput-ing

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2010-04-01 ndash2012-03-31

CIDCRef p139

Confidentiality Integrity issuesin distributed computations

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2010-01-01 ndash2013-12-31

REMORef p141

Reliability of Multi-ObjectiveOptimization techniques

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2010-10-01 ndash2012-09-30

LUXCommTISRef p143

Community-based Vehicular Net-work for Traffic Information inLuxembourg

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2011-09-01 ndash2014-08-31

HERARef p144

Holistic autonomic Energy andthermal aware Resource Alloca-tion in cloud computing

Prof Dr Pas-cal Bouvry

FNR - AFRPhD(37288e)

2011-09-15 ndash2014-09-14

INTERCOMRef p146

Energy-Efficient Networking inAutonomic Cloud Computing

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2011-06-01 ndash2013-05-31

DeTeMOCGAsRef p147

Decision-theoretic fine tuning ofmulti-objective co-evolutionaryalgorithms

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2011-09-15 ndash2014-09-14

EPOCRef p149

Energy-Performance Optimiza-tion of the Cloud

Prof Dr Pas-cal Bouvry

FNR - AFRPhD(10812558e)

2010-09-01 ndash2013-08-31

TIGRISRef p150

Risk Prediction Framework forInterdependent Systems usingGraph Theory

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2009-10-15 ndash2012-10-14

DYMORef p151

Dynamic MixVoip Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2012-11-01 ndash2015-10-31

SaPRORef p152

Satellite Payload ReconfigurationOptimization

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2010-11-15 ndash2013-11-14

22 Projects and Grants in 2012

University of Luxembourg Internal projectLab Acronym Title PI Funding Duration

LA

CS

DEFAULT-PRIV

Ref p85

Privacy by Default Prof DrSjouke Mauw

UL(192853e) 2012-09-01 ndash2014-08-31

EPRIVRef p87

A Formal Approach to EnforcedPrivacy in e-Services

Prof DrSjouke Mauw

UL(254955e) 2009-05-01 ndash2012-04-30

LA

SSY

BLASTRef p88

Better e-Learning AssignmentsSystem Technology

Prof DrDenis Zam-punieris

UL(165000e) 2010-09-01 ndash2012-08-31

COMPEXRef p89

Model Composition for Exe-cutable Modeling

Prof DrPierre Kelsen

UL(173Ke) 2011-10-01 ndash2013-09-30

DYNOSOARRef p90

Dynamic and Composite Service-Oriented Architecture SecurityTesting

Prof DrYves Le Traon

UL NA

ILIA

S

AASTMRef p82

Advanced Argumentation Tech-niques for Trust Management

Prof DrLeon van derTorre

UL 2008-05-01 ndash2012-04-30

LINMASRef p80

Logics Integrated for NormativeMulti-Agent Systems

Prof DrLeon van derTorre

UL 2011-03-01 ndash2013-02-28

DPMHPCRef p83

A discrete approach to modelprocessing of hard metal includ-ing high performance computing

Prof DrBernhardPeters

UL NA

EvoPerfRef p84

Evolutionary Computing andPerformance Guarantees

Prof Dr Pas-cal Bouvry

UL(370ke) 2011-09-01 ndash2013-12-31

23

UL PhD PostDocLab Acronym Title PI Funding Duration

CO

MSY

S

MOVERef p99

Mobility Optimization usingVehicular network technologies(MOVE)

Prof DrThomas Engel

CORE-MOVE(37KYear)

2011-11-15 ndash2014-11-14

Honeypotand MalwareAnalysis

Ref p96

Honeypot and Malware Analysis Prof DrThomas Engel

AFR-PPP(37Kyear)

2011-10-15 ndash2014-10-14

NARef p97

Routing and mobility manage-ment in vehicular networks

Prof DrThomas Engel

FNR - COREMOVE(37Kyear)

2011-09-01 ndash2014-08-31

SMO-MLSRef p98

Securing Mission Operations us-ing Multi-Level Security

Prof DrThomas Engel

European SpaceAgency(48800eUL - 37077 e)

2010-11-01 ndash2014-10-30

NARef p100

Service Dependency andAnomaly Detection

Prof DrThomas Engel

Funded on FP7EFIPSANSproject until31122010 -NetLab

2008-11-01 ndash2012-10-31

LA

SSY

NARef p113

Smartphone Malware detectionand mitigation with Static codeAnalysis

Prof DrYves Le Traon

NA(NA) 2011-10-15 ndash2014-09-30

ACARef p114

Access Control ArchitecturesFrom Multi-objective Require-ments to Deployment

Prof DrYves Le Traon

UL 2011-02-01 ndash2014-01-31

24 Projects and Grants in 2012

UL PhD PostDoc (cont)Lab Acronym Title PI Funding Duration

ILIA

S

ICRRef p100

Individual and Collective Rea-soning

Prof DrLeon van derTorre

UL-PHD 2008-03-12 ndash2012-03-12

NARef p102

Understanding Financial Topicsand their Lifetime in TextualNews by the Content Aging The-ory

Prof DrChristophSchommer

FNRCORE(500000)

2012-06-01 ndash2015-05-31

SPACERef p103

Smart Predictive Algorithms forSpacecraft Anomalies

NA SnT 2011-07-09 ndash2017-07-08

INACSRef p104

An Incremental System to man-age Conversational Streams

Prof DrChristophSchommer

UL 2009-02-01 ndash2013-01-14

FERESRef p105

Feature Extraction and Repre-sentation for Economic Surveys

Prof DrChristophSchommer

Internal Doc-toral Posi-tion(InternalDoctoral Posi-tion)

2011-04-01 ndash2014-03-31

NARef p106

Sentiment Classification in Fi-nancial Texts

Prof DrChristophSchommer

FNRCORE(500000)

2012-06-01 ndash2015-05-31

SPARCRef p108

Artificial Conversational Com-panions

Prof DrChristophSchommer

NA 2011-04-01 ndash2014-03-31

ERACCRef p109

Energy-efficient resource alloca-tion in autonomic cloud comput-ing

Prof Dr Pas-cal Bouvry

UL 2010-10-01 ndash2013-09-30

IICRef p110

Integrity Issues on the Cloud Prof Dr Pas-cal Bouvry

UL 2011-01-16 ndash2013-01-15

NARef p112

Energy-Efficient InformationDissemination in MANETs

Prof Dr Pas-cal Bouvry

UL 2009-09-15 ndash2012-09-14

25

Other misc projectsLab Acronym Title PI Funding Duration

CO

MSY

S BCEERef p115

Enterprise security for the bank-ing and financial sector

Prof DrThomas Engel

BCEE(204Ke) 2011-04-01 ndash2012-03-31

EPTVRef p117

EPT Vehicular Networks Prof DrThomas Engel

EPT(2 298 Ke) 2010-01-01 ndash2014-12-31

Pil to SPELLRef p118

PIL to SPELL conversion Prof DrThomas Engel

SES-ASTRA(Notapplicable)

2011-01-28 ndash2015-01-27

LA

CS LASP

Ref p120

Developing a Prototype of Loca-tion Assurance Service Provider

Prof DrSjouke Mauw

ESA -SnT(160000e(ESA) )

2010-12-08 ndash2012-12-07

LA

SSY

SPLITRef p121

Combine Software Product Lineand Aspect-Oriented SoftwareDevelopment

Prof DrNicolas Guelfi

ULFNR(41000e)

2009-10-01 ndash2012-09-30

ILIA

S AlgoDecRef p119

INTERCNRSGDRI1102 Al-gorithmic Decision Theory

Prof Dr Ray-mond Bisdorff

FNR UL(11 000e)

2011-01-01 ndash2014-12-31

26 Projects and Grants in 2012

Accompanying measures (AM)Lab Acronym Title PI Funding Duration

ILIA

S SandpileRef p165

Building the Skeleton of a SOscheduler

Prof Dr Pas-cal Bouvry

FNR -AM2c(634900)

2012-03-01 ndash2012-05-01

41 Research projects 27

41 Research projects

411 European funding projects

Investigation of Radio Resource Allocation and Multiple AccessSchemes for Satellite NetworksAcronym InSatNetReference NAPI NAFunding FNR-ERCIM-Alain BensoussanBudget 46KeBudget UL NADuration 2012-06-01 ndash 2013-05-31

Members M Butt B Ottersten

Domain(s) NA

Partner(s) NA

Description The demands for data rate are increasing with the emergenceof new applications On the other hand radio resources are becoming scarcedue to dedicated frequency allocation of the spectrum to the operators Itis becoming increasingly challenging to meet the rate and coverage require-ments for the users Satellite systems have the potential to provide largescale coverage and meet throughput requirements for broadband access Inthis project we plan to study the radio resource allocation and multipleaccess schemes for satellite networks We investigate the radio resource al-location problems specifically for the cognitive architecture of satellite net-works and evaluate energy-performance trade-offs for different performanceparameters like delay and loss requirements for the primary and secondaryusers in a cognitive satellite network

Results NA

Publications NA

28 Projects and Grants in 2012

Cognitive Radio and Networking for Cooperative Coexistenceof Heterogeneous wireless NetworksAcronym Cognitive RadioReference NAPI Prof Dr Bjorn OtterstenFunding COST Action IC0902Budget NABudget UL NADuration 2009-07-30 ndash 2013-12-10

Members B Ottersten

Domain(s) Cognitive Radio

Partner(s) Belgium Bosnia and Herzegovinia Croatia Cyprus Czech Re-public Denmark Finland Former Yugoslav Republic of Macedonia FranceGermany Greece Ireland Israel Italy Latvia Luxembourg Norway PolandPortugal Romania Serbia Slovenia Spain Sweden Turkey United King-dom USA China Canada Australia ISPRA (It)

Description NA

Results NA

Publications NA

Cooperative Radio Communications for Green Smart Environ-mentsAcronym Cooperative RadioReference NAPI Prof Dr Bjorn OtterstenFunding Cost Action IC2004Budget NABudget UL NADuration 2011-05-24 ndash 2015-05-18

Members B Ottersten

Domain(s) NA

Partner(s) Austria Belgium Bulgaria Cyprus Czech Republic Den-mark Finland Former Yugoslav Republic of Macedonia France GermanyGreece Ireland Israel Italy Netherlands Norway Poland Portugal Ro-mania Serbia Slovakia Spain Sweden Switzerland UK

41 Research projects 29

Description NA

Results NA

Publications NA

MIMO Hardware DemonstratorAcronym MIMO-HardwareReference 12R-DIR-PAU-10MIMOPI NAFunding ESA -ESTEC-ITTA01-609909NLJKBudget 1199KeBudget UL NADuration 2011-01-01 ndash 2012-03-30

Members B Ottersten D Arapoglou B Shankar S Chatzinotas

Domain(s) Satellite Based Alarm System

Partner(s)

bull Elektrobit Wireless Communications Ltb (Finland)

bull SES Astra Techcom (Luxembourg)

bull Univ of Oulu (Finland)

bull VTT (Finland)

bull Univ of Turku (Finland)

Description development of practical methods utilizing MIMO techniquesfor DVB-SH AB scenarios to improve the air interface performance com-pared to current standard The practical aim of the proposal is to specifyand develop a MIMO HW demonstrator that will be used to carry out prac-tical performance evaluation and demonstrations The project is dividedinto 2 phases The 1st phase provides an overview of state-ofthe- art MIMOtechniques and defines a set of MIMO scenarios based on DVB-SH includingapplicable radio channel models In addition a computer simulation modelwill be developed to evaluate the defined scenarios and the system architec-ture design for implementation of the developed MIMO-DVB-SH waveformwill be carried out During the 2nd phase the specified system will be im-plemented utilizing an existing HW test-bed the RACE-SDR The test-bedwill be used to perform demonstrations and detailed performance evaluationin laboratory environment As a conclusion improvements to the existing

30 Projects and Grants in 2012

standard andor implementation guidelines will be proposed to DVB-forumand ETSI standardization (EB is a member in both organizations)

Results NA

Publications NA

Propagation tools and data for integrate TelecommunicationNavigation and earth Observation systemsAcronym Propagation toolsReference NAPI Prof Dr Bjorn OtterstenFunding COST Action IC0802Budget NABudget UL NADuration 2009-03-03 ndash 2012-11-18

Members B Ottersten

Domain(s) NA

Partner(s) Austria Belgium Bulgaria Cyprus Czech Republic Den-mark Finland France Germany Greece Hungary Israel Italy NorwayPoland Portugal Serbia Slovakia Spain Sweden Switzerland UK BrazilCanada Netherlands India Pakistan USA

Description NA

Results NA

Publications NA

SATellite Network of EXperts - Call off-Order COO2Acronym SatNEx IIIReference NAPI Prof Dr Bjorn OtterstenFunding ESA - gtTRP ARTES1 ARTES5Budget NABudget UL NADuration 2011-03-23

Members B Ottersten

41 Research projects 31

Domain(s) NA

Partner(s) DLR (Germany) Univ of Surrey (UK) Univ of Bologna (It)Aristotle Univ of Thessaloniki (Greece) Univ of Bradford (UK) ConsorzoNazionale Interuniv Per le Telecomunicazioni (It) Italian National Re-search Council (It) Centre Tecnologic de Telecomunicacions de Catalunya(Spain) National Observatory of Athens (Greece) Office National drsquoEtudeset de Recherches Aerospatiales (Fr) Univ of Salzburg (Austria) TeSA As-sociation (Fr) Graz Univ of Technology (Austria) Univ Autonoma deBarcelona (Spain) The Univ Court of the Univ of Aberdeen (UK) UnivDegli Studi di Roma rsquoTor Vergatarsquo (It) Univ de Vigo (Spain) Fraunhofer-Gesellschaft Munchen (Germany) Institute of Computer and Communica-tions Systems (Greece)

Description NA

Results NA

Publications NA

Potential business for an advanced spread spectrum measure-ment system for satellite testingAcronym Spread spectrum satellite commReference I2R-DIR-PAU-11LLV8PI Prof Dr Bjorn OtterstenFunding ESABudget 97KeBudget UL NADuration 2010-12-08 ndash 2011-12-07

Members B Ottersten S Chatzinotas

Domain(s) Satellite spectrum

Partner(s)

bull SES Astra TechCom SA

bull EmTroniX Sarl

Description The study aims at establishing the requirements and anal-yse the market situation to evaluate the business perspectives for a spreadspectrum measurement system or service together with potential customerssuch as satellite operators and satellite manufactures The detailed under-standing of the customers requirements and the kind of drivers for them for

32 Projects and Grants in 2012

buying such a measurement product or service is a key indicator for subse-quent activities Based on these outcomes business scenarios and a businesscases are elaborated and a roadmap for a sustainable Luxembourg exploita-tion in for instance service provisioning and test equipment manufacturingis prepared In addition study activities will lead to an outline proposalready to be submitted to a funding agency In detail the following pointswill be investigated

bull Analyse and quantify the market for spread spectrum measurementsystems and services

bull Identify potential customers capture their requirements

bull Elaborate system concepts and develop and validate system and ser-vice design with potential customers

bull Identify and critically assess competing solutions

bull Establish a business model understand the value chain identify andquantify the opportunity for Luxembourg industry

bull Prepare an outline proposal and identify opportunities for funding

bull Identify state-of-the art in this and similar domains and evaluate tech-niques subject to patent filling

As this study is conducted preliminary to learn about market situation andcustomer needs there are also some Non-objectives

bull Provision of detailed technical solution

bull Development or technical validation activities

bull Definition of the solution prior to the understanding of the market

Results NA

Publications NA

41 Research projects 33

uBiquitous secUre inTernet-of-things with Location andcontEx-awaRenessAcronym BUTLERReference I2R-NET-PEU-11BTLRPI Prof Dr Thomas EngelFunding FP7 European CommissionBudget 456KeBudget UL NADuration 2011-10-01 ndash 2014-09-30

Members T Engel R State T Cholez F Melakessou

Domain(s) internet of things context aware services smart devices net-work security integrated architecture and platform

Partner(s)

bull Inno AG Germany

bull Ericsson Spain

bull Telecom Italia Italy

bull Gemalto SA France

bull CEA France

bull Oulun Yliopisto Finland

bull FBConsulting SARL Luxembourg

bull ISMB Italy

bull Hochschule Luzern Switzerland

bull Swisscom Switzerland

bull SMTMicroelectronics Italy

bull Utrema France

bull University of Luxembourg

bull Universiteit Leuven Belgium

bull Cascard OY Finland

bull TST Spain

bull Alcatel Lucent Bell Labs France

34 Projects and Grants in 2012

bull Jacobs University Germany

Description Recent ICT advances are bringing to reality a world wheresensors actuators and smart portable devices are interconnected into anInternet-of-Things (IoT) ecosystem reaching 50 Billion devices by 2015

The IoT major challenges are from a systemic viewpoint smart resourcemanagement and digital security and from a userservice perspective thepervasiveness (uniformity of performance anytime and anywhere) and aware-ness (inversely proportional to the degree of knowledge required from users)BUTLER will be the first European project to emphasise pervasivenesscontext-awareness and security for IoT Through a consortium of leadingIndustrial Corporate RD and Academic partners with extensive and com-plementary know-how BUTLER will integrate current and develop newtechnologies to form a bundle of applications platform features and servicesthat will bring IoT to life

Results UL already contributed to the definition of the use cases thatpresent our vision of smart-life in the topics of smart city and smart trans-portation We also contributed to the definition of the requirements for theBUTLER platform (WP1- D11)

Publications None yet

SceFIMS-Coordination of the European Future Internet forumof Member StatesAcronym ceFIMSReference IR-DIR-PEU-10CEFIPI Prof Dr Thomas EngelFunding EC - FP7

UL budgetBudget 35KeBudget UL NADuration 2010-09-01 ndash 2013-02-28

Members T Engel L Ladid

Domain(s) IPv6 networking support action

Partner(s)

bull Waterford Institute of Technology Ireland

bull Nederlandse Organisatie voor Wetenschappelijk Onderzoek Nether-lands

41 Research projects 35

bull Nemzeti Kutatasi Es Technologiai Hivatal Hungary

bull UMIC - Agencia Para A Sociedade Do Conhecimento Portugal

bull Asociacion De Empresas De Electronica Tecnologias De La Informa-cion Y Telecomunicaciones De Espana Spain

Description The ceFIMS project addresses the problem of the fragmenta-tion of ICT research between European Member States (MS) ceFIMS willleverage its knowledge of Member State-funded research to gain consensusabout problems and approaches at the Member State level ceFIMS willbuild on that consensus to promote alignment both across Member Statesand also between Member State and EC-funded ICT research This willconsequently unite better the European ICT research community and placeEuropean Future Internet (FI) research in a stronger position

ceFIMS will produce a research roadmap to maximise synergies between EUand MS investments in FI research establishing the basis for an ERA-NET+on the Future Internet An ERA-NET+ will provide the means to developthe EUrsquos strong research position Allied to this a Public-Private Partner-ship (PPP) will provide the means to transfer new knowledge into innovativeproducts with economic and social benefits for EU citizens ceFIMS willincrease awareness among Member States of the role that they can play ina Europe-wide FI PPP and how Member State initiatives and the PPP canbe aligned to the maximum extent possible

ceFIMS-Coordination of the European Future Internet forum of MemberStates-responds to Call 5 from the European Commission for European ex-cellence in Trustworthy ICT In particular the Science and Technology ob-jectives of ceFIMS are highly relevant to Objective ICT-200711 The Net-work of the Future

Results NA

Publications NA

36 Projects and Grants in 2012

Universal Itegration of the Internet of Things through an IPv6-Based Service-oriented Architecture enabling heterogeneouscomponents interoperabilityAcronym IoT6Reference I2R-NET-PEU-11IOT6PI Prof Dr Thomas EngelFunding EC- FP7Budget 266KeBudget UL NADuration 2012-01-01 ndash 2014-12-31

Members T Engel L Ladid

Domain(s) ICT

Partner(s)

bull Mandat international alias fondation pour la cooperation internationale(mi) rdquothe coordinator of the research project iot6

bull Ericsson doo for telecommunications

bull Runmyprocess sas

bull University College London

bull Universidad de murcia

bull Technische Universitaet Wien

bull Haute Ecole Specialisee de Suisse Occidentale

bull Korea Advanced Institute of Science and Technology

Description The UIoT6 project aims at exploiting the potential of IPv6and related standards (6LoWPAN CORE COAP etc) to leverage cur-rent shortcomings of the Internet of Things so that a universally integratedInternet of Things can evolve Its main challenges and objectives are to re-search design and develop an IPv6-based Service Oriented Architecture toachieve multi-protocol integration of heterogenous rdquocommunication thingsrdquoand to research and realize intelligence distribution and smart routing fea-tures within Furthermore transparent and borderless interactions withcloud computing services and applications EPC information service envi-ronments and mobile networks are of main interest The main outcomeof UIoT6 is a well-defined open and distributed IPv6-based Service Ori-ented Architecture that enables interoperability mobility cloud computing

41 Research projects 37

and intelligence distribution among heterogeneous smart things componentsapplications and services

Results NA

Publications NA

Provisioning of urbanregional smart services and businessmodels enabled by the Future InternetAcronym OUTSMARTReference I2R-NET-PEU-11OSMTPI Prof Dr Thomas EngelFunding FP7 European CommissionBudget 257KeBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members T Engel J Francois A Panchenko L Ladid

Domain(s) Internet of Things (IoT) utilities environment ecosystems

Partner(s) Name of the organisations participating in the project (not thepersons) Use small letters list using bullet points specify the country ifnot Luxembourg based

bull France Telecom FR

bull Telefonica Investigacion y Desarrollo SA Unipersonal SP

bull Alcatel-Lucent IT

bull Ericsson RS

bull Engineering Ingegneria Informatica SpA IT

bull ATOS Origin SP

bull Coronis SAS an ELSTER Group Company FR

bull Worldsensing ES

bull CEA-LETI FR

bull University of Luxembourg LU

bull Alexandra Institute DK

bull AMPLEX DK

38 Projects and Grants in 2012

bull Aarhus VAND DK

bull University of Surrey GB

bull AMEY PLC GB

bull FERROVIAL Centro de Innovacion de Infraestructuras InteligentesES

bull Create-NET (Trento RISE) IT

bull Azienda Consorziale Servizi Municipalizzati SpA IT

bull Dolomiti Energia IT

bull Universidad de Cantabria ES

bull Banco de Santander ES

bull Municipality of Santander ES

bull EMCANTA ES

bull EON ESPANA ES

bull TTI Norte ES

bull Fraunhofer-Gesellschaft zur Foerderung der Angewandten Forschungev DE

bull Berliner Stadtreinigungsbetriebe DE

Description The goal of OUTSMART is to contribute to the Future In-ternet (FI) by aiming at the development of five innovation eco-systemsThese eco-systems facilitate the creation of a large variety of pilot servicesand technologies that contribute to optimised supply and access to servicesand resources in urban areas This will contribute to more sustainable utilityprovision and through increased efficiency lower strain on resources and onthe environment Reaching this goal requires the whole value chain namelycity authorities utilities operators ICT companies as well as knowledge in-stitutions in order to have an industry driven approach when developingadvanced services and technologies OUTSMART services and technolo-gies will be based on an open and standardised infrastructure as envisionedby the FI Private Public Partnership (FI PPP) and provided by a serviceframework designed to facilitate provisioning development and access Tothis extend OUTSMART will (1) deliver a set of detailed functional andnon-functional requirements for an FI enabler platform and correspondingbusiness framework able to support the above described eco-systems based

41 Research projects 39

on a deep analysis of the different domain specific use cases in the utility andenvironment application domain (2) provide a specification of the domainspecific enabler functionality with corresponding service interfaces compat-ible and aligned with Core Platform components to be specified alongsidethis project effort (3) provide a realisation of prototypes of domain specificfunctionality for the envisioned eco-system according to the previous spec-ification and a validation thereof in early field trials in the envisioned usecases (4) deliver a business framework specification which serves as blueprint for the foreseen local eco-systems able to provide their sustainabilitybeyond the PPP funding lifetime by creating favourable conditions for localinvestment and innovation and (5) deliver a detailed plan for pilot servicesin the envisioned local eco-systems which act as initial light house showcases for Europe in the utility and environment applications domain

Results The key results of our activity in OUTSMART are

bull Definition and refinement of requirements in particular in terms ofsecurity and privacy

bull Large scale security in distributed environments by developing newmethods for autonomic authentication as well as cloud-computing basedsolutions for attack detection

bull Privacy protection in large scale networks by proposing a novel ap-proach to guarantee the privacy of a service provider and by evaluatingthe degree of protection over encrypted communication

bull Traffic analysis in encrypted network streams We showed that undercertain circumstances cryptography alone is not enough to hide thecontent of communication We also studied countermeasures how tomitigate this attack

bull New methods of path selection that allow performance-improved onionrouting We evaluate the proposed methods in the public networksand present a practical approach to empirically analyze the strengthof anonymity certain methods of path selection provide in comparisonto each other

The 2nd and 3rd items bring the first solutions to the requirements ap-pearing during the first stage These solutions are designed for the FutureInternet context where OUTSMART fits ie with large distributed andheterogeneous environments

This is a long list that enumerates the results obtained until now in LATEXformat

40 Projects and Grants in 2012

bull Fuzzing approaches for IPv6 protocols

bull Game theoretical modeling for fuzzing

bull Flow based monitoring and data mining approaches for large scale flowmonitoring

The key resukts from this project are related to the definition of a threatmodel for autonomic IPv6 networks and its instantiation in the specific caseof GANA architectural paradigm

The major outcomes from this project included a new paradigm for adaptivehoneypots that leverage game theory and reinforcement learning as underly-ing conceptual building blocks for smarter honeypots We have implementedand operated such honeypot and the major publications from this projectare one journal publications accepted for 2011 and another one for [356]

Publications [268 265 270 269] Deliverables D22

[357 359 358 360]

Seamless Communication for Crisis ManagementAcronym SECRICOMReference F1R-CSC-PEU-08SECRPI Prof Dr Thomas EngelFunding EC - FP7 European Commission

ULBudget 12469KeBudget UL NADuration 2008-09-01 ndash 2012-04-30

Members Thomas Engel Aurel Machalek

Domain(s) Emergency services critical infrastructure

Partner(s)

bull QinetiQ Ltd United Kingdom

bull Ardaco as Slovakia

bull Bumar Ltd Poland

bull NEXTEL SA Spain

bull Infineon Technologies AG Germany

41 Research projects 41

bull Institute of Informatics Slovak Academy of Sciences Slovakia

bull Graz University of Technology Austria

bull Smartrends sro Slovakia

bull ITTI Sp z oo Poland

bull British Association of Public Safety Communication Officers UnitedKingdom

bull CEA LETI France

bull Hitachi Europe SAS France

Description SECRICOM is proposed as a collaborative research projectaiming at development of a reference security platform for EU crisis manage-ment operations with two essential ambitions (A) Solve or mitigate prob-lems of contemporary crisis communication infrastructures (Tetra GSMCitizen Band IP) such as poor interoperability of specialized communica-tion means vulnerability against tapping and misuse lack of possibilitiesto recover from failures inability to use alternative data carrier and highdeployment and operational costs (B) Add new smart functions to existingservices which will make the communication more effective and helpful forusers Smart functions will be provided by distributed IT systems based onan agentsrsquo infrastructure Achieving these two project ambitions will allowcreating a pervasive and trusted communication infrastructure fulfilling re-quirements of crisis management users and ready for immediate application

More information httpwwwsecricomeu

Results University of Luxembourg successfully organised and presenteddeveloped crises communication technology of SECRICOM project duringthe NATO CPC seminar and demonstration in Slovakia We did the demon-stration together with Ciwil Protection of Luxembourg The project SE-CRICOM is after first review period marked as rdquoExcellent progress (theproject has fully achieved its objectives and technical goals for the periodor has even exceeded expectations)rdquo

Publications NA

42 Projects and Grants in 2012

Argumentation-Based and Logic-Based Reasoning in Multi-Agent SystemsAcronym ALBRReference F1R-CSC-LAB-05ILIAPI Dr Srdjan VesicFunding ERCIMBudget NABudget UL NADuration 2011-10-01 ndash 2012-09-30

Members Srdjan Vesic

Domain(s) Argumentation Reasoning Logic Multi-Agent Systems

Partner(s) NA

Description The goal of the fellowship is to obtain a better understand-ing of defeasible reasoning about information items in multi-agent contextsand to propose and evaluate specific logic-based approaches for this pur-pose First the link between existing logic-based and argumentation-basedreasoning formalisms is to be studied Then we will develop logics able tosupport deep reasoning about information quality and information handlingbased on incomplete and uncertain background knowledge This is relevantfor modelling information gathering and aggregation eg in e-science or inlegal procedures

Results My main research results during the ERCIM fellowship (Oct 2011to Sept 2012) can be resumed as follows

I studied the link between argumentation-based and non argumentation-based reasoning By argumentation-based approach we refer to a reasoningframework based on construction and evaluation of arguments This line ofresearch is important since it helps to better understand the result obtainedby an argumentation-based approach and to explore its expressive power[109 108]

I participated in the development of an on-line tool for argumentation-baseddecision making The software is still in the beta-testing phase but it canbe accessed online at thesynergyorg [107]

I also worked on a logical language to describe and reason about the beliefsof agents in a multi-agent system where agents have different knowledgemore particularly where every agent is aware of a different set of arguments[114]

Publications [107] [114] [108] [109]

41 Research projects 43

Trust Games Achieving Cooperation in Multi-Agent SystemsAcronym TrustGamesReference 1196394PI Dr Paolo TurriniFunding FNR-FP7 CofundBudget NABudget UL NADuration 2011-09-01 ndash 2013-08-31

Members Paolo Turrini

Domain(s) Game Theory Trust Theory Cooperative Behaviour

Partner(s) NA

Description TrustGames starts from the hypothesis that trust is a socialphenomenon that takes place among decision makers endowed with beliefsand goals and it is seen as a prerequisite for collaborative work (Hardin2004) (Gambetta 2008) (Castelfranchi-Falcone 2010) Up to now the treat-ment of trust in MAS is limited to specific accounts stemming from cog-nitive science (Castelfranchi-Falcone 2010) or from the normative systemsapproach (van der Torre 2010) with no unified formal theory TrustGamesis devoted to an integration of the cognitive and normative accounts of trustwithin the theory of games the discipline that formally models interactivedecision making In particular the fundamental connection between trustand related notions such as dependence and agreements between the stake-holders is intuitively clear but formally not well understood Recent contri-butions (Grossi-Turrini 2010) have shown that dependence and agreementscan be fully incorporated within the theory of games but it abstracts awayfrom cognitive and normative ingredients of trust Concretely TrustGameswill extend the model in (Grossi-Turrini 2010) with the cognitive features of(Castelfranchi-Falcone 2010) and the normative features in (van der Torre2010) in order to model trust in games Thanks to this integration formaltools such as logics to reason about games can be adopted to check whetherdesirable properties are achievable (or undesirable properties are avoidable)in classes of games with trust

Results

The study of cooperation in games The TrustGames project is centeredof the idea of using trust to achieving cooperation in multi-agentsytems Thereby understanding how cooperation is obtained from non-cooperative interaction is of fundamental importance The study has

44 Projects and Grants in 2012

extended and generalized work already carried out during my PhDstudies characterizing the cooperative structures that can arise fromnon-cooperative games

Evaluation in games The TrustGames project is based on a notion oftrust as evaluation of selection of fellow players in interaction TherebyI have directed part of our research effort to the study what it meansfor players to have an evaluation of what it can happen Normallyin games players are assumed to have knowledge of the game thatthey are playing and of the preferences and the possibilities of theiropponents Instead I have shown that when players have a boundedrationality the role of evaluation is crucial

Agreements and norms in games The TrustGames project is also meantto lay a connection between the theory of reciprocity and normativemulti-agent systems in other words to study the normative aspectsof reciprocating someone else trust The last part of this year re-search effort has been devoted to this Building up on the notionof dependence relations studied by Grossi and Turrini on which theTrustGames is based I have constructed a deontic language that couldexpress standard deontic notions (such as obligations prohibitions andpermissions) interpreted in terms of reciprocity

The project results have fully met the original proposal expectations How-ever several novelties have already crop up such as the importance of playersbounded rationality (what I have called ldquoshort sightrdquo) as a precondition fortrust in games

Publications [133] [47] [46] [112]

Wireless traffic Safety network between CarsAcronym WiSafeCarReference NAPI Prof Dr Pascal BouvryFunding EUREKA - CELTICBudget 300000eBudget UL NADuration 2009-07-01 ndash 2012-03-31

Members Pascal Bouvry Gregoire Danoy Yoann Pigne Guillaume-JeanHerbiet Patricia Ruiz

41 Research projects 45

Domain(s) Vehicular Ad Hoc Networks Secure Communications TrafficManagement Accident Warning

Partner(s)

bull Mobisoft Finland

bull Finnish Meteorological Institute Finland

bull VTT Finland

bull Taipale Telematics Finland

bull Sunit Finland

bull Ubridge South Korea

bull CRP Henri Tudor

bull Ubistream Luxembourg

Description WiSafeCar aims to develop an effective service platform andadvanced intelligent wireless traffic safety network between cars and infras-tructure with possibility to exploit vehicle based sensor and observationdata in order to generate secure and reliable intelligent real-time servicesand service platform for vehicles

Results Several works have been pursued in the frame of the developmentof a realistic mobility model of vehicles in Luxembourg VehILux Theparameters of VehILux have been optimized using different metaheuristicsin order to further improve its accuracy and results have been published in[174] In [316] a complementary optimization of VehILux has been proposedin which an iterative algorithm is used ie Gawronrsquos algortihm to betterspread the traffic flow in the road network

The WiSafeCar has ended in March 2012 The final project review has beenheld in Tampere Finland Demonstration of all projects achievements in-cluding the Luxembourgian simulator has been conducted by the consor-tium during a large event covered by Finnish press (newspaper TV)

Publications NA

46 Projects and Grants in 2012

Technology-supported Risk Estimation by Predictive Assess-ment of Socio-technical SecurityAcronym TREsPASSReference FP7 Grant Agreement No 318003PI Prof Dr Sjouke MauwFunding EU FP7Budget 9999824eBudget UL 561320eDuration 2012-11-01 ndash 2016-10-31

Members Sjouke Mauw Barbara Kordy Peter YA Ryan Gabriele Lenzini

Domain(s) Trustworthy ICT

Partner(s) UT the Netherlands DTU Denmark CYB Estonia GMVPPortugal GMVS Spain RHUL UK itrust Luxembourg GUF GermanyIBM Switzerland TUD the Netherlands TUHH Germany AAU DenmarkCHYP UK BD the Netherlands Deloite the Netherlands LUST the Nether-lands

Description Information security threats to organizations have changedcompletely over the last decade due to the complexity and dynamic natureof infrastructures and attacks Successful attacks cost society billions ayear impacting vital services and the economy Examples include StuxNetusing infected USB sticks to sabotage nuclear plants and the DigiNotarattack using fake certificates to spy on website traffic New attacks cleverlyexploit multiple organizational vulnerabilities involving physical securityand human behavior Defenders need to make rapid decisions regardingwhich attacks to block as both infrastructure and attacker knowledge areconstantly evolving Current risk management methods provide descriptivetools for assessing threats by systematic brainstorming In todayrsquos dynamicattack landscape however this process is too slow and exceeds the limits ofhuman imaginative capability Emerging security risks demand an extensionof established methods with an analytical approach to predict prioritizeand prevent complex attacks The TREsPASS project develops quantitativeand organization- specific means to achieve this in complex socio-technicalenvironments The iterative tool-supported framework

bull Represents the structure of complex organizations as socio-technicalsecurity models integrating social and technical viewpoints

bull Predicts socio-technical attacks prioritizes them based on their riskand assesses the aggregated effect of preventive measures

bull Presents results to enable quick understanding and updating of the

41 Research projects 47

current security posture

By integrating European expertise on socio-technical security into a widelyapplicable and standardized framework TREsPASS will reduce security in-cidents in Europe and allow organizations and their customers to makeinformed decisions about security investments This increased resilience ofEuropean businesses both large and small is vital to safeguarding the socialand economic prospects of Europe

All public information about the project can be found at httpwww

trespass-projecteu

TREsPASS is executed jointly by members of SnT and CSC

Results The SaToSS group is contributing to five work packages of theTREsPASS project Socio-technical security model specification (WP1)Quantitative analysis tools (WP3) Visualization process and tools (WP4)Process integration (WP5) and Standardization Dissemination and Ex-ploitation (WP9) Work on all those WPs has been initiated in November2012 at the kick off meeting of TREsPASS which took place at the Univer-sity of Twente in the Netherlands which coordinates the project

A number of initiatives and meetings has been led by BK to contributeto the first phase of the project which concerns identification of necessaryrequirements for model tools ad processes within TREsPASS

bull An initial BYOD case study has been initiated by Barbara Kordy andPatrick Schweitzer (WP1)

bull A survey paper on the state of the art of graphical modeling of at-tack and defenses have been written by Dr Barbara Kordy PatrickSchweitzer and Dr Pietre-Cambacedes from EDF France (WP1) Thepaper will be submitted in early 2013

bull A list of tools for quantitative analysis of security models has beengenerated (WP3)

bull Three meetings have been performed to discuss visualization issues insecurity modeling (WP4)

bull Two interviews concerning auditing methodologies have been carriedout by Barbara Kordy (WP5)

bull A dissemination plan proposed by the leader of WP9 has been ap-proved by UL

Publications NA

48 Projects and Grants in 2012

NESSoS FP7 ProjectNetwork of Excellence on Engineering Se-cure Future Internet Software Services and SystemsAcronym NESSoSReference no budget - participation to the Network of Excel-

lencePI Prof Dr Yves Le TraonFunding noBudget noBudget UL NADuration NA

Members NA

Domain(s) Security Future internet services and system software engi-neering

Partner(s) Core partners Atos SAE Consiglio Nazionale delle RicercheEidgenossische Technische Hochschule Zurich Fundacion IMDEA SoftwareInstitut National de Recherche en Informatique et en Automatique KatholiekeUniversiteit Leuven Ludwig-Maximilians-Universitat Munchen SiemensAG Stiftelsen Sintef University Duisburg-Essen Universidad de MalagaUniversita degli studi di Trento

University of Luxemboug is an associated partner

Description The Network of Excellence on Engineering Secure Future In-ternet Software Services and Systems (NESSoS) aims at constituting and in-tegrating a long lasting research community on engineering secure software-based services and systems

The NESSoS engineering of secure software services is based on the principleof addressing security concerns from the very beginning in system analy-sis and design thus contributing to reduce the amount of system and ser-vice vulnerabilities and enabling the systematic treatment of security needsthrough the engineering process In light of the unique security requirementsthe Future Internet will expose new results will be achieved by means ofan integrated research as to improve the necessary assurance level and toaddress risk and cost during the software development cycle in order to pri-oritize and manage investments NESSoS will integrate the research labs in-volved NESSoS will re-address integrate harmonize and foster the researchactivities in the necessary areas and will increase and spread the researchexcellence NESSoS will also impact training and education activities inEurope to grow a new generation of skilled researchers and practitioners inthe area NESSoS will collaborate with industrial stakeholders to improve

41 Research projects 49

the industry best practices and support a rapid growth of software-basedservice systems in the Future Internet

The research excellence of NESSoS will contribute to increase the trustwor-thiness of the Future Internet by improving the overall security of softwareservices and systems This will support European competitiveness in thisvital area

Results Meetings organisation of the ESSoS 2013 Doctoral Symposium

Publications NA

412 FNR COREINTER Projects

COoperative and COgnitive Architectures for SATellite Net-worksAcronym CO2SATReference 12R-DIR-PFN-10CO2SPI Prof Dr Bjorn OtterstenFunding FNR COREBudget 877KeyearBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members B Ottersten G Zheng S Chatzinotas D Aarapoglou C Xing

Domain(s) Cognitive communication

Partner(s) SES-ASTRA

Description During the last decades the demand for broadband accesshas been ever increasing with various applications in business education andentertainment In this direction satellite systems have the ability to accom-modate this demand providing large-scale coverage even in remote areasHowever in order to compete against other emerging technologies (such asfiber optic and wireless broadband networks) new high-performance satellitearchitectures have to be investigated To this end cooperative and cogni-tive satellite systems can improve both spectral and energy efficiency byexploiting advanced wireless communication techniques Regarding cooper-ative systems the joint processing of beam signals can mitigate inter-beaminterference and lead to better spectrum and power utilization Regardingcognitive systems satellite and terrestrial networks can be employed in par-

50 Projects and Grants in 2012

allel over the same frequency bands in order to provide ubiquitous indoorsand outdoors coverage and at the same time minimize the power consump-tion of the satellite payload The outcome of this investigation will be aninvaluable input to the strateQic planninQ of satellite operators and manu-facturers Based on the derived performance results the key players in thesatellite industry will be able to make informed decisions about the deploy-ment of cooperative and cognitive satellite systems Furthermore satelliteengineers will be able to use the derived insights as guidelines while desiQn-inQ future satellite systems

Results NA

Publications NA

Multi-Sensor Fusion in Mono-View Vision systems Aquisitionand Modeling (FAVE)Acronym CORE FAVEReference 12R-DIR-PFN-11FAVEPI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2011-10-01 ndash 2014-09-31

Members B Ottersten D Aouada K Al Ismaeil

Domain(s) P1 Security Reliability and Trust

Partner(s)

bull IEE

bull Univ de Bourgogne France

Description Video surveillance has become necessary to ensure publicsafety and to secure and protect critical physical infrastructures such asbanks airports and retail stores Current surveillance systems are usuallyrestricted to the deployment of 20 camerasThe effectiveness of these systemsis limited due to 20 cameras sensitivity to illumination and to occlusionswhich inescapably leads to segmentation and tracking failures With the lat-est developments in 30 sensing technologies It is now possible to considercomplementing 20 videos with 3D information in near real time This addi-tion of a third dimension ie depth information ensures a more accuratesensing of the scene We therefore propose to explore fusion approaches to

41 Research projects 51

address the shortfalls of current 20 video surveillance systems Our first ob-jective is to exploit fused data from different sources of visual informationThese include different modalities eg 20 cameras Time-of-Flight rangecameras 30 laser scanners and infrared cameras andor different levels ofabstraction Second after the data acquisition phase we propose to modelthe fused data for an intelligent sensing tailored for real-world security sce-narios In the context of high-level security systems that require a full con-trol over the surveyed area we investigate multi-view 2030 fusion methodsFurthermore for an accurate feature extraction for automatic scene un-derstanding we aim at achieving high resolution space-time depth mapsPrivacy enforcement in digital imaging systems is another important designcomponent that is today impossible to ignore in view of the boiling debateabout privacy violation An interdisciplinary effort will hence be undertakenfor the definition and design of privacy-aware imaging systems

Results NA

Publications NA

Logical Approaches for Analyising Market IrrationalityAcronym LAAMIReference 12R-DIR-PFN-10LAAMPI Prof Dr Bjorn OtterstenFunding FNRBudget 284KeBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members B Ottersten T Neugebauer M Caminada

Domain(s) P1 Security Reliability and Trust

Partner(s) NA

Description The aim of the LAAMI project is to apply techniques de-veloped in the field of Artificial Intelligence to help explaining apparentirrational forms of market behavior as is evidenced by for instance bubblesand crashes The aim is to explain these using formal theories of individualand collective reasoning as they for instance have been developed in the fieldof computational argumentation The aim is not so much to solve irrationalmarket behavior but first and foremost to understand it Our research isaimed at constructing a formal model that is sufficiently rich in order to beaccepted as a realistic model yet sufficiently formal in order to be examinedfor its formal properties and implemented in a software simulator Using

52 Projects and Grants in 2012

the results of the theory development we aim to be able to shed light on theconditions under which irrational forms of market behavior are most likelyto occur

Results NA

Publications NA

Mobility Optimization Using VEhicular Network TechnologiesAcronym MoveReference I2R-DIR-PFN-10MOVEPI Prof Dr Thomas EngelFunding FNR ProjectBudget 1127keBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members Thomas Engel Raphael Frank Andriy Panchenko JeromeFrancois Markus Forster Maximilien Mouton Lautaro Dolberg

Domain(s) vehicluar networks network security vehicular flow optimiza-tion

Partner(s)

bull University of California Los Angeles (UCLA) USA

Description The world is urbanizing rapidly As a consequence trafficcongestion in metropolitan areas has significantly increased over the lasttwo decades Although there has been significant innovation in cars safetysystems and fuel efficiency traffic congestion remains one of the modern illsof our society In most cases existing road infrastructure cannot easily be ex-tended to meet increasing traffic demand As a consequence commuters areoften stuck for hours in traffic chaos causing significant economic damageNew intelligent transportation systems (ITS) are currently being developedto increase traffic efficiency The main idea is to maximize the use of theexisting road infrastructure using smart navigation systems that are awareof the current traffic conditions Communication technologies will play animportant role in the design of such systems In the near future vehicleswill be equipped with communications devices that allow data exchange be-tween cars and Road Side Units (RSUs) Such a vehicular ad hoc network(VANET) can be used to collect and distribute traffic metrics among nearbycars and RSUs and provide advanced navigation services The aim of thisproject is to study and understand vehicular flow characteristics and propose

41 Research projects 53

new schemes using wireless communications technologies to reduce vehicu-lar traffic congestion enhance safety and at the same time reduce emissionsIn this relatively new research area there are multiple challenges As afirst step we will investigate how and where traffic information (eg speeddestination and local traffic density) can efficiently be retrieved from vehi-cles Network planning and management need to be carefully studied inorder to provide the required quality of service Adapted routing and dis-semination protocols that are able to cope with the changing dynamics ofvehicular traffic need to be specified Traffic Coordination Points (TCPs)will be responsible for collecting and evaluating traffic metrics for a givenarea This information will help to predict how the traffic will evolve in thenear future In this way the TCPs can suggest via the vehicular networkindividual routes avoiding traffic jams and thus shorten the travel time Inaddition to advanced route planning services this information can be usedto dynamically adapt the timings of local traffic lights to maximize vehicu-lar throughput A realistic simulation environment will be implemented in afirst phase to evaluate the performance of the proposed system under a va-riety of traffic scenarios A practical prototype will be validated under realtraffic conditions in Luxembourg City using the existing rsquoHot Cityrsquo meshas its infrastructure network Additional tests are foreseen at the UCLAcampus which provides a flexible testbed (up to 200 cars) to validate andtest new communication protocols

Results

bull Development of an analysis tool to evalute communications routes inVANET

bull Implementation of a traffic sensing application for mobile devices

bull Publication of new simulation and emulation tools for high fidelityVANET evaluation

bull Specification of a vehicle coordination scheme to increase vehiculartroughput on highways

bull Lightweight methods for confidentiality in data communication

bull Path selection metrics for performance improved onion routing

bull Lightweight hidden services

bull Traffic analysis in encrypted connections

bull Countermeasures against traffic analysis in encrypted connections

54 Projects and Grants in 2012

We proposed and evaluated a novel approach how to provide network serviceswhile protecting privacy and identity of the service provider [344] Thetechnology can be directly applied in the scope of the MOVE project asprivacy protection is an important fact for the acceptance of the results of theproject by the public We also studied the possibilities of traffic analysis inencrypted network streams It was shown that under certain circumstancescryptography alone is not enough to hide the content of communication Wealso studied countermeasures how to mitigate this attack Our findings areof vital importance as communication in MOVE should protect the data intransit and respect privacy of the involved individuals

Practical usage of methods for confidential communication often leads todelays that are not tolerated by the average end-user which in return dis-courages many of them from using the system In [342 343] we propose newmethods of path selection that allow performance-improved onion routingThese are based on actively measured latencies and estimations of availablelink-wise capacities using passive observations of throughput [331] We eval-uate the proposed methods in the public networks and present a practicalapproach to empirically analyze the strength of anonymity certain methodsof path selection provide in comparison to each other

Regarding the distributed and large scale context of vehicular networks theinvestigation of huge volume of captured network traffic data has been pro-posed by leveraging cloud computing and in particular in the context ofsecurity monitoring [345] As a node in a vehicular network may act as au-tonomous entity and so be easily in contact with malicious ones automaticfingerprinting methods have been proposed in [346] to enhance authentica-tion and to monitor bad behaviors

Publications Publications in 2011 6 peer-reviewed conferences [304 272265 268 270 269]

Security GamesAcronym SndashGAMESReference C08IS03PI Prof Dr Leon van der TorreFunding FNR-COREBudget 314000eBudget UL 314000eDuration 2009-04-01 ndash 2012-03-31

Members L van der Torre S Mauw W Jamroga M Melissen

41 Research projects 55

Domain(s) Game theory Security protocols Non-zero sum games Imper-fect information games Attackndashdefense analysis

Partner(s)

bull GAMES Network

Description Information security is not a static black-and-white systemfeature Rather it is a dynamic balance between a service provider tryingto keep his system secure and an adversary trying to penetrate or abusethe service Such interplay can be considered as a game between the adver-sary and the service provider and the field of game theory provides methodsand tools to analyse such interactions Games for verification and designhave been studied in computer science for the last ten years This funda-mental research into extending and complementing traditional verificationapproaches from formal methods with game theoretic reasoning is pavingthe way for more effective verification tools These developments are ofparticular interest to the field of security in which formal verification hasalways played an important role The purpose of the project is to study howthese new developments can be used to strengthen current analysis and ver-ification techniques in information security The project has two main linesof research 1) A study of the use of game-theoretic methods in the field ofsecurity resulting in requirements on game-theoretic methods for security2) The development of novel verification methods based on the combineduse of formal verification techniques and a game theoretic approach and itsapplication to the field of security For the first line two areas in securityare selected for which the application of these techniques seems particularlypromising fair exchange protocols and attackndashdefense analysis The secondline focuses on the interplay of finite and infinite games mathematical logicand automata theory in particular on analysis techniques for infinite-statesystems linear-time model checking and game models for protocols TheSndashGAMES project is a joint project of the SaToSS group and the ICR groupof Prof Dr Leon van der Torre

Results The S-GAMES project ended in 2012 Most project goals havebeen achieved The project produced a number of important results thatcan be used to analyze information security in game-like scenarios Someof the results have already been significantly cited by other researchers InLuxembourg the effectivity functions methodology is being currently usedin the AFR TrustGames project Moreover effectivity models as well aslogic-based techniques for incomplete information games developed withinthe project are also prominently featured in the FNRDGFndashINTER GaLoTproject (accepted to begin 1022013) Last but not least our results havegenerated interest among more practically-oriented research groups in par-ticular the team behind the VERICS model checker at the Polish Academy

56 Projects and Grants in 2012

of Sciences in Warsaw

The main results obtained in 2012 are as follows

bull We showed how the semantics of strategic logic ATL can be defined interms of abstract models so called coalitional effectivity functions [134]

bull Continuing studies on logic-based specification we developed a com-bination of alternating-time temporal logic ATL and description logicALCO and showed how the resulting language can be used to writelong-term security specifications [130] We showed that while thesatisfiability problem appears to be undecidable model checking istractable We also defined a variant of realizability that combinesmodel checking of the temporal frame with satisfiability of the termi-nological interpretation and showed that the new problem is decidable

bull We used strategic logics like ATL to study fairness in non-repudiationprotocols [315] We showed that existing specifications of fairness forma natural taxonomy of weaker and stronger variants We also arguedthat none of the specifications works correctly in the context of imper-fect information and we proposed our own notion as a remedy

bull We continued our studies on the relationship between models of coali-tional power coming from cooperative game theory and standard gamemodels from non-cooperative game theory In a follow-up to our pre-vious work [291] we showed how the concept and characterization canbe extended to games over infinite time horizon typical in modelingof computational systems [134]

Publications The project resulted in the following publications in 2012[134] [130] [315] [291]

The Dynamics of ArgumentationAcronym DYNARGReference F1R-CSC-PFN-09DYNARPI Prof Dr Leon van der TorreFunding FNR-INTERCNRSBudget NABudget UL NADuration 2009-10-01 ndash 2012-09-31

Members Richard Booth Tjitze Rienstra Martin Caminada Emil Wey-dert

41 Research projects 57

Domain(s) Argumentation theory Belief dynamics Multi-agent systems

Partner(s) Universite drsquoArtois Lens France (Dr Souhila Kaci)

Description Artificial Intelligence is a science that aims to implementhuman intelligence For this purpose it studies the behaviour of rationalagents Pertinent information may however be insufficient or there may betoo much relevant but partially incoherent information Different theorieshave been proposed for decision-making in these contexts In particular thegrowing development of multi-agent systems requires the handling of collec-tive decisions and of information coming from different sources Moreoverin multi-agent systems agents need to interact in order to inform convinceand negotiate with other agents Argumentation theory is a suitable theoryto support such interactions In this project we will create an abstract the-ory of dynamic argumentation in which argumentsconflict relations can beaddedremoved We will also investigate the aggregation of argumentationframeworks to model the interaction among arguing agents To this end wewill eg develop new notions of distance between argument graph labelingsin order to define when an agent position can be said to beldquoclose tordquoorldquofarrdquofrom that of another Finally we plan to apply the dynamic argumentationtheory to dialogue between agents We want to study these problems bothfrom within abstract argumentation frameworks in which the focus is onhow arguments interact with each other without specifying the actual formof the arguments as well as using more concrete representations of what anargument consists of (eg a number of explicit possibly defeasible ldquorulesrdquosupporting a ldquoconclusionrdquo)

Results

bull In [156] we proposed a number of intuitive measures of distance be-tween two sets of evaluations over a set of arguments and showed thatthey fail to satisfy basic desirable postulates Then we proposed ameasure that satisfies them all Our results inform the design of pro-cedures for revising onersquos position in order to reach agreement withothers or to conduct minimal revision to incorporate new evidence

bull Dung-style abstract argumentation assumes full awareness of the ar-guments relevant to the evaluation However this is generally not arealistic assumption Moreover argumentation frameworks have ex-planatory power which allows us to reason abductively or counter-factually but this is lost under the usual semantics To recover thisaspect in [159] we generalised conventional acceptance and presentedthe concept of a conditional acceptance function We also provided amodal-logical framework for reasoning about argument awareness in[114]

58 Projects and Grants in 2012

bull In [31] we introduced a new model for belief dynamics where beliefstates are ranking measures and informational inputs are finite setsof parametrized conditionals interpreted by ranking constraints Theapproach generalises ranking construction strategies developed for de-fault reasoning

bull In [115] we generalised the ASPIC argumentation system so that eachinference rule can be associated with a probability that expresses un-certainty about whether the rule is active The uncertainty about rulescarries over to uncertainty about whether or not a particular argumentis active The usual Dung-style abstract argumentation semantics wasgeneralised in order to deal with this uncertainty

Publications [156] [159] [114] [31] Weydert9861

Management Regulatory ComplianceAcronym MaRCoReference I2R-DIR-BPI-11KELSPI Prof Dr Pierre KelsenFunding FNR-COREBudget NABudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Pierre Kelsen Leon van der Torre Qin Ma Marwane ElKhar-bili Silvano Colombo Tosatto

Domain(s) Business process compliance

Partner(s) Guido Governatori NICTA Queensland Research Laboratory

Description The processes that underpin the businesses of our everydaylives are governed by regulations of ever growing complexity In this contextit is important

ndash to be able to describe these complex regulations rigorously precisely andunambiguouslyndash that business practitioners are actually able to specify both regulationsand business processesndash to be able to check in an automated way that business processes complywith their underlying regulations

MaRCo proposes to tackle these three issues On one hand MaRCo improves

41 Research projects 59

existing approaches to formally describe (or model) norms On the otherhand MaRCo makes this practical and usable by practitioners in such away that the mathematical based formalisms involved in norm specificationdo not constitute a barrier to practitioners that know the business domainbut not the underlying mathematical formalism being used and so MaRCoproposes a visual-based approach to norm specification Finally MaRCochecks the compliance of business processes against the norms that governthem in order to be able to detect in an automated way business processesthat violate their underlying regulations

MaRCo aims at creating added value for service-related industries (eg inthe banking sector) by making the specification of business processes andnorms rigorous and precise yet accessible to domain experts and enablingan automated approach to compliance checking This should provide meansto ensure that services are aligned with their underlying local and interna-tional regulations With the growing need for regulatory compliance thiswill strengthen the expertise in service science in Luxembourg

See also httpmarcogforgeunilu

Results CoReL Policy-Based and Model-Driven Regulatory ComplianceManagement Marwane El Kharbili Qin Ma Pierre Kelsen and Elke Pul-vermueller In Proc of the 15th IEEE International Enterprise DistributedObject Computing Conference (EDOC 2011) IEEE Computer Society 2011

Publications 1 conference publication [314]

Multi-Objective Metaheuristics for Energy-Aware Scheduling inCloud Computing SystemsAcronym GreenCloudReference NAPI Prof Dr Pascal BouvryFunding FNR University of LuxembourgBudget 1088440Budget UL NADuration 2012-07-01 ndash 2015-06-30

Members Alexandru-Adrian Tantar Sebastien Varrette Gregoire Danoy

Domain(s) NA

Partner(s) University of Lille

Description The project GreenCloud aims at developing an energy-aware scheduling framework able to reduce the energy needed for high-

60 Projects and Grants in 2012

performance computing and networking operations in large-scale distributedsystems (data centers clouds grids) With the advent of new petaflopsdata centers and the next-generation Internet (rdquoInternet of Thingsrdquo rdquoHigh-Performance Internetrdquo) energy consumption is becoming a major challengefor the IT world To build up this new energy-aware scheduling frameworkthe project GreenCloud will first develop multi-criteria mathematical op-timization models (eg makespan energy robustness) and then designmulti-objective optimization methods to solve the problem These tech-niques along with statistical and machine learning components will be usedto provide autonomous fault-tolerant and robust scheduling paradigms forvirtual machines running inside a dynamic environment A series of time-varying deterministic and stochastic factors will be considered as part of theenvironment eg renewable energy supply computational demand or activ-ity of users Experimentation and validation will be carried on a real test bedusing large-scale equipments (eg Gridrsquo5000) while relying on distributedscenarios

Results Accepted project with a start date in November 2012 A firstmeeting of the involved members was held in December

Publications NA

EnerGy-efficient REsourcE AllocatioN in AutonomIc CloudCompuTingAcronym GreenITReference F1R-CSC-PFN-08IS21PI Prof Dr Pascal BouvryFunding FNR-COREBudget 432000eBudget UL NADuration 2010-01-01 ndash 2012-12-31

Members Pascal Bouvry Samee U Khan Thomas Engel Zdislaw Zucha-necki Johnatan Pecero Beranbe Dorronsoro Marcin Seredynski GregoireDanoy Sebastien Varrette Alexandru-Adrian Tantar Dzmitry KliazovichRadha Thanga Raj Frederic Pinel Cesar Diaz

Domain(s) Energy-efficiency resource management heterogeneous com-puting multi-objective optimization multi-agent systems parallel and dis-tributed computing telecommunication networks cloud computing

Partner(s)

41 Research projects 61

bull North Dakota University USA

bull LuxConnect

Description The project GreenIT aims to provide a holistic autonomicenergy-efficient solution to manage provision and administer the variousresources of Cloud-Computing (CC) dataHPC centers

The main research challenges that will be tackled to achieve the holisticapproach are

bull Development of a multi-objective mathematical meta-model CC is acomplex system of numerous pervasive devices that request servicesover heterogeneous network infrastructures from a data center that isenergy gobbler Because each computing entityrsquos performance is de-fined uniquely we must develop a multi-objective meta-model that canadequately define a unified and performance metric of the whole sys-tem The multiple constraints and objectives dealing with the qualityof service (QoS) cost and environment impact must be formulated andtheir relationship analyzed

bull Develop resource management and optimization methodologies Withseveral possible objectives and constraints the meta-models must re-sult in multi-objective multi-constraint optimization problems (MOP)Green-ICT will develop refine and evolve solutions for MOP that willprimarily be based on metaheuristics (eg multi-objective evolution-ary algorithms multi-objective local search hybrid metaheuristics)

bull Develop autonomic resource management The anytime anywhere slo-gan only will be effective when an autonomic management of resourcescan be achieved The resource allocation methodologies developedmust go further refinement such that the system at hand is self- heal-ing repairing and optimizing In particular it is our intention toutilize multi-agent systems (MAS) that can learn to adapt (machinelearning methodologies) and gracefully evolve to adapt (evolutionarygame theoretical methodologies)

Results For the computational aspects (WP1) contributions in the fol-lowing domains have been proposed in 2011

bull Energy-aware scheduling algorithms Different problems related to theschedule of tasks on Grids targeting energy efficient solutions in differ-ent aspects are defined In [285] we solve the problem of energy-awarescheduling for dependent tasks on Grids Then we consider a simi-lar problem but minimizing the energy required for communicationsin [305]

62 Projects and Grants in 2012

bull Robust-aware scheduling algorithms The problem analyzed here is tofind highly efficient schedules for allocating tasks on Grids but withthe additional characteristic that they are as robust as possible againstchanges in the predicted time to accomplish the scheduled tasks Themore robust the schedule is the less important will be the influenceof these changes on the final makespan (ie time when the latest jobis finished) Different highly efficient and accurate parallel coevolu-tionary multi-objective algorithms (with highly super-linear speed-up)have been proposed for this project [287 300]

bull Development of new efficient general-purpose optimization algorithmsIn addition to the previously described problems some work target-ing the design of new efficient algorithms was done In particular weare interested on enhancing well-known algorithms and reducing theirparameters [283] proposes the use of new adaptive neighborhoodsfor cellular genetic algorithms (cGAs) improving their performanceand reducing the neighborhood to use a very important parameter ofcGAs In [286] the use of a new class of algorithms with small worldtopologies for the population is proposed showing highly accurate re-sults and high efficiency compared to a canonical cGA with the sameparameters Later we compare many different topologies for differ-ential evolution algorithms in [299] and we propose a new efficientoperator for this kind of algorithms too In [311] we propose the useof cellular populations for differential evolution algorithms showingthat it enhances the behavior of the several state of the art algorithmstested

bull Validation of the algorithms on other complex real-world problems asthe optimization of energy-aware broadcasting algorithms for mobilead-hoc networks [307 284] or the configuration of the Cassini space-craft trajectory [298] outperforming in this latter case the state of theart

Volunteer-based systems have also been studied in the second semester of2011 We have been developing an optimization tool based on such sys-tems and evolutionary algorithms metaheuristics The following enumera-tion points out the main results obtained until now

bull Validation of a Peer-to-Peer Evolutionary Algorithm [336] Acceptedfor publication in Evostar 2012

bull Characterizing Fault-tolerance in Evolutionary Algorithms [337] Ac-cepted for publication during 2012

41 Research projects 63

For the communication aspects (WP3) the GreenCloud network simulatordevelopment has been continued

Several works of editorship and organization of new events have been also un-dertaken that will ensure additional impact in the following years includingeditorship of the book entitled rdquoIntelligent Decision Systems in Large-ScaleDistributed Environments [282] published by Springer)

Two websites contain the project informationhttpgreenitgforgeunilu and httpsgforgeuniluprojectsgreencloudto provide access to the energy efficiency simulator for distributed data cen-ters developed in the framework of the GreenIT project

Publications NA

Socio-Technical Analysis of Security and TrustAcronym STASTReference C11IS1183245PI Prof Dr Peter YA RyanFunding FNR COREBudget 765864eBudget UL 765864eDuration 2012-05-01 ndash 2015-04-30

Members Peter YA Ryan Sjouke Mauw Gabriele Lenzini VincentKoenig Ana Ferreira Jean-Louis Huynen

Domain(s) security analysis human factor security protocols

Partner(s) University of Catania Royal Holloway University LondonNewcastle University University College London Norwegian University ofScience and Technology

Description Over the last 20-30 years the security community has mademajor strides in the design and (semi-automated) analysis of security pro-tocols Nevertheless security critical systems continue to be successfullyattacked There appear to be two main explanations of this situation (1)the implementation of the protocol designs introduce flaws that are notpresent at the design level and (2) attackers target and exploit the usuallymore vulnerable non- technical aspects of the system

Information security systems are typically complex socio-technical systemsand the role of humans in either maintaining or undermining security is cru-

64 Projects and Grants in 2012

cial Often system designers fail to take proper account of human charac-teristics resulting in vulnerabilities at the interface between the humans andthe purely technical components Attackers often target such vulnerabilitiesrather than attempt to break the technical security mechanisms Despitethis the socio-technical aspects of security have been largely neglected bythe information security community

Addressing these socio-technical aspects is very challenging and highly inter-disciplinary This project focuses on this most urgent and critical aspect ofsecurity It will build on the existing knowledge expertise and tools for theanalysis of security protocols but extend and enrich it to capture the humanand social dimension

Key elements of our approach are

bull To enrich existing models to encompass the role of the users and en-hanced attacker models

bull To develop tools and methodologies to analyze system designs againstthese enriched models

STAST is executed jointly by members of SnT and CSC

Results Selection of the PhD candidate who will be working on theSTAST project within the SaToSS group has started in 2012 We haveinterviewed a number of candidates and we hope to fill the position in early2013

Publications NA

Attack TreesAcronym ATREESReference C08IS26PI Prof Dr Sjouke MauwFunding FNR-COREBudget 299000eBudget UL 299000eDuration 2009-04-01 ndash 2012-03-31

Members Sjouke Mauw Barbara Kordy Patrick Schweitzer Sasa Radomirovic

Domain(s) security attackndashdefense trees security assessment formal meth-ods

Partner(s)

41 Research projects 65

bull Telindus Luxembourg

bull Sintef Norway

bull TXT e-solutions Italy

bull Cybernetica Estonia

bull EDF France

bull Lucerne University of Applied Sciences and Arts Switzerland

bull THALES Research amp Technology France

Description Security assessment of systems is a standard but subopti-mal procedure due to its informal nature While a formal approach wouldbe desirable but out of reach a systematic approach would be beneficialand feasible Attack trees are a wellndashknown methodology to describe thepossible security weaknesses of a system An attack tree basically consistsof a description of an attackerrsquos goals and their refinement into sub-goalsWe believe that attack trees provide an ideal systematic approach for se-curity assessment The objective of this project is to extend attack treeswith defensive measures Consequently the attackndashdefense tree method-ology will be developed and formalized in order to provide a systematicfullyndashfledged and practical security assessment tool The project benefitsfrom our contacts with several industrial and academic partners with whomwe conduct case studies More information can be found on the project webpage httpsatossuniluprojectsatrees

Results In 2012 the ATREES project resulted in following output

bull An article published in the Journal of Logic and Computation de-scribing the attackndashdefense tree methodology developed within theATREES project [258]

bull A presentation and publication of an article describing how to quan-titatively analyze attackndashdefense trees in practice

bull A publication of a journal article describing the case study performedin 2011 [254]

bull A publication of the conference article [355] about computational as-pects of attackndashdefense trees

bull Development of the ADTool a software tool supporting creation andquantitative analysis of attackndashdefense trees The ADTool is availableat httpsatossuniluprojectsatreesadtool

66 Projects and Grants in 2012

The results of the project were presented in six research talks and invitedlectures given at NTNU in Norway Sintef in Norway RHUL in UK LORIAin France THALES in France and ICISCrsquo12 conference in Korea as well asin one internal SRM presentation

The collaboration with related projects have also been initiated Currentlywe perform two case studies using the attackndashdefense tree methodology oneabout an analysis of an e-voting system (in collaboration with the CORESeRTVS project lead by Prof Ryan) and one on BYOD issues (in collabo-ration with the CORE CoPAINS project led by Prof Le Traon) We haveinitiated a collaboration on attack trees between the University of Luxem-bourg and THALES Research amp Technology in France

The methodologies developed and results obtained within the ATREESproject will serve as input for the FP7 EU project TREsPASS and theCORE project STAST

Publications The project resulted in following publications in 2012 [258][254] [355]

Cryptography and Information Security in the Real WorldAcronym CRYPTOSECReference F1R-CSC-PFN-09IS04PI Dr Jean-Sebastien CoronFunding FNR-COREBudget 272000eBudget UL NADuration 2010-10-01 ndash 2013-09-30

Members NA

Domain(s) Cryptography Information Security Side-Channel Attacks

Partner(s) NA

Description Cryptography is only one component of information securitybut it is a crucial component Without cryptography it would be impossi-ble to establish secure communications between users over insecure networkslike the internet In particular public-key cryptography (invented by Diffieand Hellmann in 1974) enables to establish secure communications betweenusers who have never met physically before One can argue that compa-nies like E-Bay or Amazon could not exist without public-key cryptographySince 30 years the theory of cryptography has developed considerably How-ever cryptography is not only a theoretical science namely at some point

41 Research projects 67

the cryptographic algorithms must be implemented on physical devices likePCs smart-cards or RFIDs Then problems arise in general smart-cardsand RFIDs have limited computing power and leak information throughpower consumption and electro-magnetic radiations A cryptographic al-gorithm which is perfectly secure in theory can be completely insecure inpractice if improperly implemented Therefore the aim of this proposal isto take into account every aspect of the implementation of secure systemsin the real world from the mathematical algorithms to the cryptographicprotocols and from the cryptographic protocols to their implementation inthe real world This allows creating a bridge between theoretical research incryptography on the one side and its applications and the end users of thenew technology on the other side When dealing with cryptographic pro-tocols we will work in the framework of provable security every securitygoal will be clearly defined and every new cryptographic scheme or protocolshould have a proof that the corresponding security goal is achieved basedon some well defined computational hardness assumption When dealingwith cryptographic implementations we will try to cover all known side-channel attacks timing attacks power attacks cache attack etc

Results Due to administrative reasons the actual start of the project ispostponed to the first half of 2011

Publications NA

Secure Reliable and Trustworthy Voting SystemsAcronym SeRTVSReference I2R-DIR-PFN-09IS06PI Prof Dr Peter RyanFunding FNR-Core 333000e FNR-AFR 216216e IMT

Luca 130000e University of Melbourne 60000eUL 268596e

Budget NABudget UL NADuration 2010-02-01 ndash 2013-02-01

Members NA

Domain(s) Electronic voting

Partner(s) University of Surrey (UK) University of Birmingham (UK)IMT - Institute for Advanced Studies Lucca (Italy) University of Melbourne(Australia)

Description Ensuring that the outcome of an election is demonstrably

68 Projects and Grants in 2012

correct while maintaining ballot privacy and minimising the dependence onelection officials has been a challenge since the dawn of democracy For overa century the US has experimented with various technologies to try to makevoting easier and more secure All of these have proved problematic mostnotably the more recent use of touch screen machines The danger here isthat the outcome is critically dependent on the correct execution of the coderunning on the voting devices

Recent research has explored the use of modern cryptography to address thischallenge Significant advances have been made in particular advancing thenotion of ldquovoter-verifiabilityrdquo allowing voters to confirm that their voteis accurately counted while avoiding threats of vote buying or coercionNotable amongst such schemes is the Pret a Voter system proposed bythe PI in 2004 and subsequently developed to make it more usable secureand flexible The Pret a Voter approach is widely regarded as one of themost secure and useable of such schemes and is arguably the most promisingin terms of providing a practical scheme for real-world use

Despite the successes achieved in this field the issues of robustness andtrustworthiness remain open Verification procedures are a part of mostproposed systems intended to offer trust However systems universallylack procedures in case the verification finds errors and the complexity ofthe verification procedures often undermines trust instead of bolstering it

The aim of the SeRTVS project is to develop and evaluate designs for prac-tical secure and trustworthy voting systems Such schemes should yielda demonstrably correct outcome of the election while guaranteeing ballotprivacy Furthermore such systems must be sufficiently simple to use andunderstandable as to gain widespread acceptance by voters and other stake-holders The starting point will be the existing Pret a Voter and PrettyGood Democracy schemes Vulnerability or deficiencies identified duringthe evaluation will be addressed by enhancements to the scheme

To date very little has been done to investigate robust recovery mechanismsfor voting systems The project will develop effective recovery mechanismsand strategies The project will also investigate the issues of public percep-tion and trust of verifiable systems It is not enough for the system to betrustworthy it must also be universally perceived as trustworthy A goaltherefore is to measure and advance public understanding and trust in suchschemes

Results In the course of the project Dr Gabriele Lenzini was recruited asa post-doctoral researcher to start in February 2011 The project staged theInternational Summer School on Secure Voting (SECVOTE 2010) in Berti-noro (Italy) jointly with the TVS project Research results were publishedin the proceedings of ESORICS 2010 [353] and INDOCRYPT 2010 [354]

41 Research projects 69

Publications NA

Conviviality and Privacy in Ambient Intelligence SystemsAcronym CoPainsReference NAPI Prof Dr Yves Le TraonFunding FNRBudget 4Budget UL 486000Duration 2012-01-01 ndash 2013-12-31

Members Patrice Caire Yehia El Rakaiby Assaad Moawad

Domain(s) Security and Privacy defeasible logic AAL conviviality soft-ware engineering

Partner(s) Hot City

Description Ambient Intelligence constitutes a new paradigm for the in-teractions among intelligent devices and smart objects acting on behalf ofhumans The ultimate goal of Ambient Intelligence systems is to transformour living and working environments into intelligent spaces able to adapt tochanges in context and to users social needs Such systems must have thecapability of interpreting their contexts Moreover the open nature of Ambi-ent Intelligence systems and the unnoticeable ways in which various sensorsmay access users personal data make two seemingly antagonistic require-ments preserve users privacy and facilitate convivial interactions amonghumans and devices The concept of conviviality has recently been intro-duced as a social science concept for Ambient Intelligence to highlight softqualitative requirements like user friendliness of systems To make AmbientIntelligent systems desirable for humans they must be convivial and privateie fulfil both their need for social interactions making communication andcooperation among participants easier while also preserving the privacy ofeach individual Hence the need for trade-offs between being private andconvivial intuitively the former keeping information to a small circle of in-siders while the later shares it with all The aims are to enable knowledgesharing for the collective achievement of common objectives among enti-ties through coalition formation while at the same time respecting eachentityrsquos privacy needs Hence the CoPAInS project is about designing anddeveloping models of interaction among intelligent devices it is also abouttheir corresponding methods The main goal of CoPAInS is to facilitateprivacy and conviviality in Ambient Intelligence and to provide tools forit To achieve our objective first we develop a formal framework for con-

70 Projects and Grants in 2012

text representation privacy and conviviality using methods of KnowledgeRepresentation and Reasoning Second we validate and verif y privacy andconviviality properties of Ambient Intelligence systems using model-checkingtechniques We then simulate and test use cases from the field of AmbientAssisted Living Third to demonstrate the feasibility of our approach andits usefulness to support Luxembourg citizens everyday activities we applythe gained expertise to use cases provided by Hotcity Finally we produceguidelines to assist system designers in the development of privacyaware andconvivial assistive systems

Results Development of the IoT lab in SnT

Publications [210 209 140 245 152 139]

e-Training Education Assessment and Communication Centerfor Headache DisordersAcronym E-TEACCHReference F1R-CSC-PFN-10ETEAPI Prof Dr Denis ZampunierisFunding FNR-COREBudget NABudget UL NADuration 2011-05-01 ndash 2014-04-30

Members Sergio Dias Andrea Teuchert Denis Zampunieris

Domain(s) public health disease-management headache e-learning mu-timedia

Partner(s) CRP Sante

Description Headache including migraine is a common and disablingneurobiological disorder which is under-recognized under-treated commonlymismanaged and it imposes a substantial health burden with a major im-pact on both quality of life and the economy Migraine alone the mostprevalent neurological brain disorder is more prevalent than asthma di-abetes and epilepsy combined According to WHO the burden weight ofmigraine is higher than that of epilepsy multiple sclerosis and ParkinsonasdiseaseEffective treatments exist but general practitionersrsquo misdiagnosisand mismanagement of headache disorders easy access to various over thecounter drugs have led to a high rate of self-medication Long-term sideeffects increase of secondary headaches and dependency are the major prob-lems Health care failure has its roots in education failure at every level inEurope and in the resulting and widespread lack of understanding With

41 Research projects 71

E-TEACCH the CRP-Sante and the University of Luxembourg will buildan innovative demonstrational electronic multilingual Training EducationAssessment and Communication Center on Headache with easy-to-use in-teractive modular and extensible content for different target groups (pa-tients doctors pharmacists) The two Luxembourg centers represent anideal combination technical professionals experienced pedagogic e-learningand Headache teams with established support of international and Euro-pean scientific and lay organizations international interdisciplinary expertsas well as the WHO campaign aLifting the burdena E-TEACCH will im-prove headache disorder screening diagnosis disease-management preven-tion treatment adherence and in doing so allow headache sufferers a betterquality of life reduce socio-economic costs chronification and comorbidityE-TEACCH will offer latest headache disorder scientific news webinarsscreening tools diagnostic aids treatment control and communication sup-port disability measurements disease-management guidelines video basedcase studies and accredited knowledge assessment tests

Results NA

Publications NA

Managing Regulatory Compliance a Business-Centred Ap-proachAcronym MaRCoReference I2R-DIR-PFN-09IS01PI Prof Dr Pierre KelsenFunding FNR-COREBudget 749K eBudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Pierre Kelsen Qin Ma Marwane El Kharbili Christian GlodtLeon van der Torre Silvano Colombo Tosatto

Domain(s) Compliance Management Business Process Management Pol-icy Management Normative Systems Enterprise Models Model-Driven En-gineering (MDE) Visual Languages Formal Methods

Partner(s)

bull NICTA Queensland Research Laboratory Australia

bull University of Osnabrueck Germany

72 Projects and Grants in 2012

Description The processes that underpin the businesses of our everydaylives are governed by regulations of ever growing complexity In this con-text it is important (a) to be able to describe these complex regulationsrigorously precisely and unambiguously (b) that business practitioners areactually able to specify both regulations and business processes and (c) tobe able to check in an automated way that business processes comply withtheir underlying regulations This project proposes to tackle these threeissues On one hand we want to improve existing approaches to formallydescribe (or model) norms On the other hand we would like to make thispractical and usable by practitioners in such a way that the mathematicalbased formalisms involved in norm specification do not constitute a bar-rier to practitioners that know the business domain but not the underlyingmathematical formalism being used and so we propose a visual-based ap-proach to norm specification Finally we intend to check the compliance ofbusiness processes against the norms that govern them in order to be able todetect in an automated way business processes that violate their underlyingregulations The proposed research project aims at creating added value forservice-related industries (eg in the banking sector) by making the specifi-cation of business processes and norms rigorous and precise yet accessible todomain experts and enabling an automated approach to compliance check-ing This should provide means to ensure that services are aligned with theirunderlying local and international regulations With the growing need forregulatory compliance this will strengthen the expertise in service science inLuxembourg

Results - We have carried out a systematic literature survey of regulatorycompliance management in business process management elicited a set ofsuccess requirements and performed a comparative analysis of literature so-lutions against the requirements The result has been reported in a LASSYtechnical report (TR-LASSY-11-07) and an excerpt of the technical reportis accepted by the 8th Asia-Pacific Conferences on Conceptual Modelling(APCCM) for publication in 2012 - We have designed E3PC (EnterpriseExtended Event-driven Process Chains) E3PC is a formal model-driven en-terprise modeling language that extend EPC (Event-driven Process Chains)The formal semantics of E3PC is defined in terms of a translation fromE3PC models to Algebraic Petri-Nets (APN) We have reported the resultin a LASSY technical report (TR-LASSY-11-12) - We have designed CoReL(Compliance Requirement Language) CoReL is domain-specific modelinglanguage for representing compliance requirements that has a user-friendlygraphical concrete syntax Two papers have been published reporting re-sults on CoReL one[314]describes the language itself and the other[313]reports an illustrative example of using this language - We have developedan editor for E3PC and an editor for CoReL both implemented as Eclipseplug-ins We have also implemented the formal semantics of E3PC by de-

41 Research projects 73

veloping model transformations from E3PC to APN in both DSLTrans andATL - We have identified a sub-set of business processes called structuredbusiness processes in which only XOR and AND connectors are allowed andsplits and joins are always paired up properly Based on these structuredbusiness processes we have already derived efficient algorithms for certainsimple compliance requirements providing thus some evidence that theserestrictions on business process help to reduce complexity of compliancecheckingWe report the results in [90] and and a paper to be published atESSS 2013 - We have started the work on norm dynamics by investigatingthe use of an argumentation framework to determine the priorities betweenthe norms This approach can also be used within business processes todynamically determine to which policies the business process should complydepending from the context of the execution -We have started to work onan abstract framework to define compliance We propose an abstract frame-work to define business process compliance and its elements First we definethe elements that constitute a business process and its functioning Secondwe define the policies governing the processes and their obligations takingalso into account the temporal constraints that can exist between differentobligations

Publications [314 313 90 2 88 89 242 366]

Modeling Composing and Testing of Security ConcernsAcronym MITERReference NAPI Dr Jacques KleinFunding FNRBudget NABudget UL NADuration NA

Members Jacques Klein Yves Le Traon Phu Nguyen Qin Zhang MaxKramer

Domain(s) software engineering Model Composition Model-Driven Se-curity Model-Based Testing

Partner(s) KIT Karlruhe Germany

Description Security is not only a keyword it is currently a critical issuethat has to be embraced by modern software engineering (SE) techniquesFrom this SE point of view ensuring confidence in the implemented securitymechanisms is the key objective when deploying a security concern This

74 Projects and Grants in 2012

objective can be reached by improving the design and implementation pro-cess via modeling and automation such as security code generation frommodels and by systematic testing and verification

As stated in the FNR programme description ldquoInformation Security andTrust Managementrdquo is one of the cornerstones of the Information Societya ldquotransversalrdquo research domain of central and ever-growing importance notonly for the banking industry but for nearly all other ICT applicationsand e-services Thus security concerns impact many ICT domains in manydifferent ways

Secure programming techniques are now better understood and guidelinesteach programmers how to avoid buffer overflows when to validate inputsand how to apply cryptography The key problem is that security should notbe under the sole responsibility of the programmer (hopefully competent)Dealing with security at a programming level is risky often not sufficient andis not the most productive Indeed to face large classes of attacks securityexperts must express the security policy which is the result of a risks andthreats analysis This security policy cannot be deployed without taking intoaccount the software development lifecycle in a whole In other words itis necessary to consider the requirements analysis and design developmentsphases and the links between these phases to be able to represent (with mod-els) and analyze (with model analysis security methods) security concernsin order to detect or prevent from attacks Second the fact that securityconcerns impact ma ny ICT domains in many different ways amplified bythe fact that economic pressure reduces development time and increases thefrequency modifications are made constantly imposes more productive andflexible development methods To sum up for agile modeling there is anurgent need for modeling tools which allows composing functional architec-tural and - in MITER project - security expert viewpoints into an integratedproductive model

In this context the MITER project aims at developing new modeling tech-niques to 1) represent security concerns (eg access control and usage con-trol policies) 2) compose them with the business logic model (called tar-get model) and 3) test the security model composition against security re-quirements These three objectives converge to an integrated model-drivensecurity process which allows a business model to embed various securityconcerns and makes these security properties testable by construction

Results We have worked on an extension of one of our papers on dynamicaccess control Our goal being to perform performance analysis on the meth-ods that we propose We have also worked on Delegation management Morespecifically among the variety of models that have been studied in a MDEperspective one can mention Access Control policy that specifies the accessrights These work mainly focus on a static definition of a policy without

41 Research projects 75

taking into account the more complex but essential delegation of rightsmechanism User delegation is a meta-level mechanism for administratingaccess rights by specifying who can delegate access rights from one user toanother including his own rights We analyse the main hardpoints for intro-ducing various delegation semantics in model-driven security and proposesa model-driven framework for enforcing access control policies taking intoaccount all delegation requirements

We worked on the second main goal of the MITER project the compositionof security concerns As a result first we have proposed a new version of theGeKo weaver (available at httpcodegooglecomaeclipselabsorgpgeko-model-weaver) a generic and practical aspect-oriented modelling weaverA paper describing GeKo is currently under submission at the Model con-ference Second we applied GeKo to weave building specifications in thecontext of construction industry A workshop paper has been accepted in2012 This paper and this work have been done in collaboration with theUniversity of Queensland

Publications none in 2011

Model-Driven Validation and Verification of Resilient SoftwareSystemsAcronym MOVEREReference F1R-CSC-PFN-09IS02PI Prof Dr Nicolas GuelfiFunding FNR-COREBudget 265 000eBudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Levi Lucio Yasir Khan Qin Zhang

Domain(s) Software Engineering Security Dependability Resilience ModelChecking Model Driven Engineering

Partner(s) University of Geneva Switzerland

Description Verification and Validation of software have nowadays clearmeanings in the context of Model- Driven Development With test basedverification we worry about producing a set of test cases that will on theone hand find faults in an implementation - also called in the test literatureSystem Under Test (SUT) - and on the other hand increase trust in thefinal product With validation we worry about understanding if the modelwe are using as reference for implementation and for extracting test cases

76 Projects and Grants in 2012

from is sound Formal validation is often achieved by mechanically provingproperties the model should satisfy For example dynamic properties couldbe expressed in a temporal logic and static properties on the system statecould be expressed using logical invariants and then verified on the systemrsquosmodel In this project we will focus our attention on the application of val-idation and verification techniques to the Model Driven Engineering of sys-tems where resilience mechanisms are explicitly modelled and implementedaccording to that model Resilience corresponds to the fact that a systemhas the capability to adapt to harmful events and recover to a stable state orat least continue operation in a degraded mode without failing completelyThese harmful events might cause the fundamental security properties (con-fidentiality integrity and availability) to be violated With this project weaim at improving the state of the art of the construction of reliable resilientsystems by using verification and validation techniques within the context ofModel Driven Development (MDD) The current trend of Software Engineer-ing is to increasingly reason about the system being built at the model levelby using appropriate Domain Specific Languages (DSL) for each conceptualdomain In this project we will concentrate on resilience and materializeit as a DSL Model composition techniques can then be used in order tocompose resilience features expressed in the resilience DSL with other do-mains equally defined as DSLs When the composed model is validatedverification techniques can then be used to insure the resilience propertiesare well implemented We will tackle this problem both at a theoretical anda practical level

Results Since the beginning of the project in May 2010 we have hadtwo main results The first one is an abstract definition of resilience froma software engineering perspective This work is accessible as a technicalreport in [327] It has also been submitted to the journal rdquoTransactions onSoftware Engineering and Methodologyrdquo and for which approval is pendingThe second result is an operational definition of resilience using a modeldriven approach and model checking tools The work is based on [327]and is accessible also as a technical report in [326] A paper based on thistechnical report has been submitted to TOOLS 2011 Both these papersconcern work packages 1 and 2 of project MOVERE

Two PhD students Yasir Khan and Qin Zhang have been hired for workingfor MOVERE funded by the FNR AFR program Qin Zhang has startedat the University of Geneva in November 2010 and is currently familiarizinghimself with the project and the tools he will be using Yasir Khan has fileda visa demand at the Belgium embassy in his home country and is expectedat the Luxembourg in a few months

Publications NA

41 Research projects 77

Security TEsting for Resilient systemsAcronym SETERReference F1R-CSC-PFN-08IS01PI Prof Dr Nicolas GuelfiFunding FNR-COREBudget 43830000 eBudget UL NADuration 2009-05-01 ndash 2012-04-30

Members Nicolas Guelfi Yves Le Traon Ayda Saidane Iram Rubab

Domain(s) Security Resilience Model based Testing Requirement engi-neering Software architecture AADL

Partner(s) Telecom Bretagne France

Description Resilient systems can be viewed as open distributed systemsthat have capabilities to dynamically adapt in a predictable way to unex-pected and harmful events including faults and errors Engineering suchsystems is a challenging issue which implies reasoning explicitly and in aconsistent way about functional and non-functional characteristics of sys-tems The difficulty to build resilient systems and the economic pressureto produce high quality software with constraints on costs quality securityreliability etc enforce the use of practical solutions founded on scientificknowledge One of these solutions is to propose an innovative testing pro-cess Testing is an activity that aims at both demonstrating discrepanciesbetween a systems actual and intended behaviours and increasing the con-fidence that there is no such discrepancy One of the main features of asystem to test is the security of the system especially for those which aresafety or business critical The security of a system classically relates tothe confidentiality and integrity of data as well as the availability of sys-tems and the non-repudiation of transactions Testing security propertiesis a real challenge especially for resilient systems which have the capabilityto dynamically evolve to improve the security attributes The aim of theSETER project is to define a new testing approach that will ease the ver-ification of resilient programs that implement this security property Thisapproach must be aware that confidentiality and integrity can be compro-mised in many different ways (and consequently the resilient system canevolve in many different ways too) that availability and non-repudiationguarantees are difficult to ensure and that it must be compliant with theother tests addressing the core functionalities of the system Current trendsadvocate the idea that resilience should become an integral part of all stepsof software development Moreover testing is important for detecting errors

78 Projects and Grants in 2012

early in the development life cycle The earlier an error is detected theeasier and cheaper it is to resolve Therefore the objective of the SETERproject fits with these ideas by proposing new security testing approachesfor resilient systems the earlier possible during the software developmentlifecycle to propose more secure and more reliable system

Results

bull result 1 A Formal Framework for Dependability and Resilience (WP3 - Resilient System Specification and Security Requirements)

bull result 2 model based security testing approach (WP 4 - Test CaseSpecification and Selection)

bull result 3 AADL adaptation for expressing resilience requirements (WP3 - Resilient System Specification and Security Requirements)

Publications NA

413 UL Projects

Techniques and Technologies for multi-spot beam Ku-bandSatellite NetworksAcronym Multibeam KuReference 12R-DIR-PAU-11MSBKPI NAFunding ESA ITTBudget NABudget UL NADuration 2010-12-01 ndash 2012-02-28

Members B Ottersten B Shankar

Domain(s) NA

Partner(s)

bull SES-ASTRA (Luxembourg)

bull EADS Astrium (Fr)

41 Research projects 79

Description The objective of the study is to assess the advantages broughtby the introduction of multi-bearms and associated flexibility on Ku bandpayloads in particular for the present consortium the objective of the studyis to define assess and consolidate the benefits that a multi-beam architec-ture and flexibility could bring to follow-on satellites to NSS-6 satellite

Results NA

Publications NA

Guest professor Dov GabbayAcronym NAReference F1R-CSC-LAB-05ILIAPI Prof Dr Dov GabbayFunding ULBudget NABudget UL NADuration 2011-09-01 ndash 2014-08-31

Members NA

Domain(s) Logic Networks Argumentation

Partner(s) NA

Description

bull Further development of a unifying equational approach to logic andnetworks in particular argumentation

bull Interdisiplinary perspective on Security and trust bridging the gapbetween the areas of logic philosophy and security

bull Development of the foundation and applicability of input output logicespecially concerning its geometrical point of view which seems promis-ingly applicable to many non-classical logics

Results Progress was made in 3 related areas

bull Reactive Kripke modelsThese are Kripke models with additional accessibility relations whichcan change the model in the course of evaluations Several importantresults about the logical properties of such models were provided andpublished

80 Projects and Grants in 2012

bull Deontic logic and contrary to duty obligationsThe reactive semantics was used to build coherent models for intriguingpuzzles of permission and obligation

bull Meta-logical investigations in argumentation theoryA new point of view on argumentation was developed and connectedto other areas

Publications 21 publications in 2012 among them 14 journal publications

The Springer journal ANNALS OF MATHEMATICS IN ARTIFICIAL IN-TELLIGENCE (AMAI) devoted a special volume (4 issues) in 2012 to pub-lish these results

AMAI Volume 66 Numbers 1-4 December 2012

The journal ARGUMENT AND COMPUTATION also published a specialdouble issue

Argument and Computation Volume 3 issues 2-3 2012

Logics Integrated for Normative Multi-Agent SystemsAcronym LINMASReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding ULBudget NABudget UL NADuration 2011-03-01 ndash 2013-02-28

Members Xavier Parent Dov Gabbay Xin Sun Paolo Turrini

Domain(s) Normative multi-agent systems Deontic logic Knowledge rep-resentation Intelligent Systems

Partner(s) NA

Description The project aims at providing an advanced model for reason-ing about norms with both a formal semantics and a proof theory Two keycomponents that will be brought together are conflict resolution and normenforcement which are for instance relevant for the design of e-institutions

41 Research projects 81

The goal is to establish rigorous theoretical foundations for the design ofNormative Multi-Agent systems that is both amenable to computer scien-tists and understandable by stakeholders

A PhD student Xin Sun has been hired in July 2012 The topic is deonticlogic from a game-theoretic perspective The idea is to look in a new way atfamiliar problems in normative reasoning which promises a novel approachfor handling norms in intelligent systems The fields of deontic logic andgame theory have developed independently from each other with few in-teractions between the two The PhD thesis will aim at lling this gap byinvestigating how techniques developed in game theory may shed light onlong-standing issues in the study of normative reasoning like norm emer-gence and (vice-versa) how the use of norms may shed light on problemsthat have beset game theory

Results ur results are related to the notion of rsquonorm enforcementrsquo

[4] we look at the theoretical foundations of one of the existing standards fornormative reasoning so-called dyadic deontic logic We discuss the prob-lem of the import or non-import of the identity principle for conditionalobligation

Based on this insight in [292] we develop a new model for reasoning aboutnorm violation In a multi-agent setting norm enforcement is facilitatedthrough the use of sanctions Thus so-called contrary-to-duty (CTD) obliga-tions (they say what should be done if some other obligation is violated) area key component of the system The problem of how to model such a com-ponent is one of the main problems of deontic logic There is a widespreadagreement in the literature that such a problem calls for the need to distin-guish between different senses of rsquooughtrsquo ideal vs actual rsquooughtrsquo Our keyidea is to capture the distinction using tools from two-dimentional modallogic

[2] goes one step further and brings the notion of contrary-to-duty to therealm of game theory so far not investigated in relation to optimality ofstrategic decisions We show that under a game-theoretical semanticsCTDs are well-suited to treat sub-ideal decisionsWe also argue that ina wide class of interactions CTDs can used as a compact representation ofcoalitional choices leading to the achievement of optimal outcomes Finallywe investigate the properties of the proposed operators

Publications NA

82 Projects and Grants in 2012

Advanced Argumentation Techniques for Trust ManagementAcronym AASTMReference F1R-CSC-PUL-08AASTMPI Prof Dr Leon van der TorreFunding ULBudget NABudget UL NADuration 2008-05-01 ndash 2012-04-30

Members Leon van der Torre Martin Caminada Yining Wu

Domain(s) Computational argumentation Trust

Partner(s) NA

Description The overall aim of AASTM is to enhance todayrsquos genera-tion of argumentation formalisms and implementations in order to becomesuitable for a wider variety of real-life applications such as reasoning abouttrust This requires a unified theory that integrates the various forms of ar-gumentation related functionality as well as efficient proof procedures andsound and scalable software components

Results

bull A dialectical discussion game for stable semantics

bull A more refined notion of the overall status of arguments based on thenotion of a complete labelling and give the procedure to determine anddefend the justification status This refinement has put the notion ofargument labelings into good use and raises interesting new questionsabout the psychological plausibility of such labelings

bull The equivalence between complete semantics in argumentation and3-valued stable model semantics in logic programming opens up thepossibility of reusing algorithms and results from logic programmingin argumentation theory

bull We define the postulates of closure direct consistency indirect con-sistency non-interference and crash resistance in the specific case ofthe ASPIC Lite formalism Then we identity a set of conditions underwhich the ASPIC Lite system satisfies all the mentioned rationalitypostulates under complete semantics

Publications Yning Wu Between Argument and Conclusion PhD thesisUniversity of Luxembourg 2012

41 Research projects 83

A discrete approach to model processing of hard metal includinghigh performance computingAcronym DPMHPCReference NAPI Prof Dr Bernhard PetersFunding ULBudget NABudget UL NADuration NA

Members Pascal Bouvry (2nd PI) Xavier Besseron

Domain(s) Process Engineering Parallelisation

Partner(s) NA

Description Conversion of pulverised tungsten oxide to metallic tungstenin a packed bed for production of hard metal is investigated by numericalmodelling The manufacturing process is a very important tool for ma-chining various materials The chemical process is described by a reactionscheme that reduces tungsten oxide stepwise to tungsten in a hydrogen at-mosphere Hydrogen is introduced as a reducing agent that streams overa packed bed of tungsten oxide particles in an oven The flow over andpenetration of hydrogen into the bed of tungsten particles is represented byadvanced two-phase CFD-tools for a porous media Evolution of particletemperature and its reaction progress is described by the Discrete ParticleMethod (DPM) Thus very detailed results are obtained by this approachand will be compared to experimental data Therefore this effort will com-plement experimental investigations and provide a deeper insight into theprocess in particular since particle temperatures and interaction of par-ticles with the fluid are inaccessible in a packed bed during experimentsAs these predictions of the particulate phase of tungsten oxide require sig-nificant amounts of CPU-time parallelisation of the conversion module ofthe Discrete Particle Method is approached by an interdisciplinary conceptas collaboration between engineering and computer science disciplines Theworkload for each processor is determined by the Orthogonal Recursive Bi-section (ORB) algorithm that distributes the particles uniformly onto theprocessors available The well-established Message Passing Interface (MPI)is employed to describe thermal conversion of an arbitrary number of tung-sten oxide particles It has additionally the advantage that MPI is supportedby Windows and Linux operating systems which apply equally to the soft-ware package of the Discrete Particle Method Additionally the scalability

84 Projects and Grants in 2012

of the approach on massively parallel machines will be investigated and theapplication of GPUs will be promoted

Results On the CSC side the work on this project focuses on providing anew design of the DPM software in order to execute coupled simulation inparallel The new enhanced design relies on the following aspects

bull A simulation module interface is designed to reflect the two majorsteps of the simulation workflow interactions and the integration

bull A simulation driver that builds an unified timebase to schedule andexecute all the modules involved according to their own timesteps

bull A parallel simulation driver that implements domain decompositionapproach using the Message Passing Interface (MPI) in order to lever-age distributed execution platforms like High Performance Computing(HPC) clusters It relies on the concepts of domain cells and partitionand can use different partitioners (eg ORB or METIS)

The enhanced design has been validated and it has been verified that itsatisfies the constraints of the numerical methods used by the process engi-neering The implementation of the new design is in progress in the DPMsoftware

Publications NA

Evolutionary Computing and Performance GuaranteesAcronym EvoPerfReference F1R-CSC-PUL-11EVOPPI Prof Dr Pascal BouvryFunding ULBudget 370keBudget UL NADuration 2011-09-01 ndash 2013-12-31

Members Xavier Besseron Sebastien Varrette Gregoire Danoy Sune SNielsen Emilia Tantar Yves Le Traon Antonio del Sol Nikos Vlassis

Domain(s) Meta Heuristics Evolutionary Computation OptimisationPerformance evaluation Bioinformatics

Partner(s) NA

Description Evoperf aims at providing the bases for robust and perfor-mance guaranteed evolutionary computations Such methods have a large

41 Research projects 85

spectrum of applications By choosing a system biomedicine applicationEvoperf aims at performing interdisciplinary research Many of the realworld problems are intractable (NP-Hard) whereas different approaches ex-ist including problem relaxation or local approaches However most tech-niques rely on stochastics to explore different starting points (iterated gradi-ent) or diversify the search (meta-heuristics) More than 15 years ago proofof convergences of stochastic based approaches were provided eg in [332]for simulated annealing and [333] for genetic algorithms But most of the re-search on genetic type particle algorithms evolutionary computation andorMonte Carlo literature seems to be developed with no visible connectionsto the physical or the mathematical sides of this field We mention thatthe design and the mathematical analysis of genetic type and branchingparticle interpretations of Feynman-Kac semigroups and vice versa (cf forinstance [347]) has been started by Prof Del Moral and his collaboratorsand acknowledged important advances [334 335] These nice theoreticalresults are however under-exploited In the current project we intend to ex-tend the approach to cutting edge parallel and robust multi-objective parti-cle algorithms (differential evolution cellular genetic algorithms) both at atheoretical and implementation level Validation will be carried on cuttingedge system biomedicine issues providing new modelstools for genepro-tein interaction networks Where appropriate a set of solvers will be usedas part of a multi player game Based on non-cooperative game theory itwas proved that these games converge to Nash equilibrium We will alsoinclude a decision-theory based approach that will regulate when and howthe different players exchange information and share the global cost functionby decomposition as to make Nash equilibrium correspond to global optima

Results The EvoPerf Project kickoff has taken place in 2011

The following human resources have been hired in 2011 Dr Xavier Besseronas Postdoc and Sune S Nielsen as PhD student

Publications NA

Privacy by DefaultAcronym DEFAULT-PRIVReference F1R-CSC-PUL-12DEPRPI Prof Dr Sjouke MauwFunding ULBudget 192853eBudget UL 192853eDuration 2012-09-01 ndash 2014-08-31

86 Projects and Grants in 2012

Members Sjouke Mauw Hugo Jonker

Domain(s) privacy verification formal analysis social networks mobilenetworks

Partner(s) Goethe University Frankfurt Germany

Description With the online proliferation of user-generated content (egblogs Youtube) and social media (eg Twitter Facebook) a new phe-nomenon has occurred people nowadays have a digital online rdquoliferdquo Rela-tions to others photos attended events opinions on current events all ofthis and more may be found online

As in real life privacy of the individual concerned must be safeguardedHowever the experience of privacy in the real world does not translate di-rectly to privacy in the digital life Privacy-sensitive aspects of the digitallife can leak out as in the real world but unlike the real world they are notbound to their context An angry letter in a newspaper will be used the nextday to wrap the fish but an angry letter online can still be found for yearsto come Whereas printed photos are by default stored in one album thedefault for digital photos is copying - website to browser camera to harddisk hard disk to email etc

The goal of this project is to connect user experience of privacy in real lifewith privacy offered in digital life and so overcome the divorce betweenthem As such the project investigates the effects of this divorce in andexplores possible resolutions for several aspects of digital life

bull Protecting user-generated contents

bull Keeping digital life fragmented

bull Mobile privacy

The project does not aim to enforce privacy ndash as in real life an individualrsquosprivacy may be breached by others (eg gossip) Instead the goal is toensure rdquoprivacy by defaultrdquo it may be possible to violate privacy to do soan individual needs to take conscious steps

Results The project started in September 2012 and so far has led to acollaboration with Verimag laboratory (Grenoble France) on verifiability ofonline auctions which has been submitted to ASIA-CCSrsquo13

Publications NA

41 Research projects 87

A Formal Approach to Enforced Privacy in e-ServicesAcronym EPRIVReference PUL-09EPRIPI Prof Dr Sjouke MauwFunding ULBudget 254955eBudget UL 254955eDuration 2009-05-01 ndash 2012-04-30

Members Sjouke Mauw Jun Pang Hugo Jonker Naipeng Dong

Domain(s) enforced privacy verification formal modelling e-services

Partner(s) ENS Cachan Paris France

Description Privacy has been a fundamental property for distributed sys-tems which provide e-services to users In these systems users become moreand more concerned about their anonymity and how their personal infor-mation has been used For example in voting systems a voter wants tokeep her vote secret Recently strong privacy properties in voting suchas receipt-freeness and coercion-resistance were proposed and have receivedconsiderable attention These notions seek to prevent vote buying (where avoter chooses to renounce her vote) These strong notions of privacy whichwe will call enforced privacy actually capture the essential idea that pri-vacy must be enforced by a system upon its users instead of users desiringprivacy The first aim of this project is to extend enforced privacy fromvoting to other domains such as online auctions anonymous communica-tions healthcare and digital rights management where enforced privacy isa paramount requirement For example in healthcare a patientrsquos healthrecord is private information However a patient contracting a serious dis-ease is at risk of discrimination by parties aware of her illness The inabilityto unveil (specific parts of) the health record of a patient is a minimal re-quirement for her privacy The second aim of the project is to develop adomain-independent formal framework in which enforced privacy proper-ties in different domains can be captured in a natural uniform and preciseway Typically enforced privacy properties will be formalized as equivalencerelations on traces which take into account both the knowledge of the in-truder and the users Within the framework algorithms can be designed tosupport analysis of e-service systems which claim to have enforced privacyproperties In the end the formalization and techniques will be applied toverify existing real-life systems and to help the design of new systems withenforced privacy properties

Results The project finished in 2012 In that year the project resultedin 3 conference papers [141] at ESORICSrsquo12 [144] at EVOTErsquo12 [141] at

88 Projects and Grants in 2012

FHIESrsquo11 and one book chapter [5] in Digital Enlightenment Yearbook 2012The projectrsquos EVOTErsquo12 paper Random Block Verification Improving theNorwegian Electoral Mix Net [144] won the best paper award of the confer-ence In the context of the project the Second International Summer Schoolon Secure Voting was organized in Schloszlig Dagstuhl Germany

Publications The following publications resulted from the project in2012 [141] [144] [141] [5]

Better e-Learning Assignments System TechnologyAcronym BLASTReference F1R-CSC-PUL-10BLASPI Prof Dr Denis ZampunierisFunding ULBudget 165000eBudget UL NADuration 2010-09-01 ndash 2012-08-31

Members Sandro Reis Denis Shirnin Denis Zampunieris

Domain(s) Proactive computing E-learning Online assignments manage-ment system

Partner(s) NA

Description The project aims at the design and implementation of aproactive online assignments system for blended teachings at the Univer-sity of Luxembourg which will actively support students as well as teachersin a collaborative way The main output product of this research and devel-opment project will be an online assignments system with advanced featureswhile remaining easily usable by every user beginner or expert that is usefulfor our teachings and which will be based on software currently in use at theUL The design will rely on the innovative concept of proactive computingapplied to the e-learning technologies field Indeed instead of waiting foruser interaction like in existing reactive learning management systems ourproactive assignments system (embedded into a standard e-learning plat-form) will allow us to define analysis and management rules that will beapplied autonomously by the system to support and drive the workflowwhen a teacher online assigned tasks to students The possible rules willrange from simple reminders and notifications to both parties to the mostelaborated automatic detection of potential problems based on successivedetection of (non-) events over a period of time

Results NA

41 Research projects 89

Publications NA

Model Composition for Executable ModelingAcronym COMPEXReference F1R-CSC-PUL-10MCEMPI Prof Dr Pierre KelsenFunding ULBudget 173KeBudget UL NADuration 2011-10-01 ndash 2013-09-30

Members Pierre Kelsen Nuno Amalio

Domain(s) Model-Driven Software Development Model Composition Ex-ecutable Modeling Software Engineering

Partner(s) NA

Description In model-driven software development models are the pri-mary artifacts for constructing software Model composition helps in master-ing the complexity of model-driven development Most of the current modelcomposition techniques can be viewed naturally as model transformationstaking two input models and producing one output model In our workwe have introduced a new composition technique for building executablemodels It has several properties that traditional composition techniques donot have it is additive rather than transformational it can be applied toany meta-model and it has a formal semantics The present project willinvestigate the power of our composition technique In particular we willcompare our technique with approaches from aspect-oriented modeling thatare typically used to express crosscutting concerns The project will inves-tigate whether our approach can be extended to match the power of thesetechniques andor how it can complement the existing approaches in mod-eling systems in a more straightforward elegant and light-weight mannerThe main goal is to enhance our current modeling framework and tool forexecutable modeling with new model composition techniques so that theycan handle not only the academic examples studied so far but can be usedeffectively on larger systems

Results The following results have been achieved on this project

bull A paper comparing different aspect-oriented modelling approaches in-cluding VCL [368]

bull A paper [369] a master thesis (of Eric Tobias 2012) and a techni-

90 Projects and Grants in 2012

cal report [370] with a comparative study that compares VCL againstother Visual Modelling Languages (VMLs) Part of the criteria forthis comparison is precisely VCL mechanisms of composition and de-composition

bull VCL has been applied to a case study from the modelling and aspect-oriented communities A technical reporting presenting a VCL modelof this case study [371] was presented at a workshop on comparingModelling Approaches of conference Models 2012

bull VCL has been applied to an industrial case study coming from theresearch community of formal methods This resulted in a paper [367]a technical report [372] and a masters thesis (Jerome Leemans 2011)

bull VCL and its composition mechanisms have been applied to a largecase study coming from the research efforts of CRP Henri Tudor onuser interfaces This work is part of Eric Tobias Master Thesis (2012)We intend to work towards a publication regarding this piece of workin close collaboration with the CRP in 2013

Publications NA

Dynamic and Composite Service-Oriented Architecture Secu-rity TestingAcronym DYNOSOARReference NAPI Prof Dr Yves Le TraonFunding ULBudget NABudget UL NADuration NA

Members Tejeddine Mouelhi Jacques Klein

Domain(s) Model-driven engineering Security testing SOA

Partner(s) NA

Description In Dynosoar project we aim at proposing reconfigurationcapabilities to Service-Oriented Architecture (SOA) targeting user-definedsecurity policies which can be trusted through innovative security testingmethods and tools SOA aims at decreasing the level of coupling betweenservices and at increasing the reuse evolution and adaptation of the sys-tem A SOA consists of an orchestration that models the services and the

41 Research projects 91

control flow of events between services A service integrator composes thesedifferent services (maybe dynamically discovered on the web) to propose anew composite service From this perspective SOA offers a very excitingsolution for building composite distributed systems Services are dynamicand highly reconfigurable a service integrator can compose different ser-vices in many different ways each service proposing different variants Itrapidly leads to the combinatorial explosion of possible composite servicesAmong reconfiguration criteria one aspect is becoming crucial for trustinga configured orchestration its capacity to embed a reconfigurable securitypolicy In Dynosoar we consider security policies dedicated to SOA whichallow each user expressing how her data can be manipulated into an or-chestration The problem is thus (1) to select valid orchestrations amongthe huge number of possible reconfigurations and (2) to test the robustnessof security mechanisms of the selected orchestrations Dynosoar addressestwo crucial dimensions the generation of valid orchestrations embedding asecurity policy from the set of possible reconfigurations and the final secu-rity testing of orchestrations The hard points we focus on are 1) choosingamong a possibly infinite number of services (re)configurations the smallestand more relevant subset which have to be tested This subset of serviceconfigurations must satisfy the security policy as well as sequential executionconstraints 2) testing one specific configuration in isolation ie withoutreal external service providers We specifically target the security policieswith testing

Results NA

Publications NA

414 UL PhD PostDoc

Seamless Communication for Crisis ManagementAcronym SECRICOMReference NAPI Prof Dr Thomas EngelFunding FullbrightBudget NABudget UL NADuration 2008-09-01 ndash 2012-04-30

Members Thomas Engel Sheila Becker

92 Projects and Grants in 2012

Domain(s) Security

Partner(s)

bull QinetiQ Ltd

bull Ardaco as

bull Bumar Ltd

bull NEXTEL SA

bull Infineon Technologies AG

bull Institute of Informatics Slovak Academy of Sciences

bull Graz University of Technology

bull Smartrends sro

bull ITTI Sp z oo

bull British Association of Public Safety Communication Officers

bull CEA LETI

bull Hitachi Europe SAS

Description Peer-to-peer real-time communication and media streamingapplications optimize their performance by using application-level topologyestimation services such as virtual coordinate systems Virtual coordinatesystems allow nodes in a peer-to-peer network to accurately predict latencybetween arbitrary nodes without the need of performing extensive measure-ments However systems that leverage virtual coordinates as supportingbuilding blocks are prone to attacks conducted by compromised nodes thataim at disrupting eavesdropping or mangling with the underlying commu-nications

Recent research proposed techniques to mitigate basic attacks ( inflationdeflation oscillation) considering a single attack strategy model where at-tackers perform only one type of attack In this work we define and usea game theory framework in order to identify the best attack and defensestrategies assuming that the attacker is aware of the defense mechanismsOur approach leverages concepts derived from the Nash equilibrium to modelmore powerful adversaries We apply the game theory framework to demon-strate the impact and efficiency of these attack and defense strategies usinga well-known virtual coordinate system and real-life Internet data sets

41 Research projects 93

Thereafter we explore supervised machine learning techniques to mitigatemore subtle yet highly effective attacks ( frog-boiling network-partition)that are able to bypass existing defenses We evaluate our techniques onthe Vivaldi system against a more complex attack strategy model whereattackers perform sequences of all known attacks against virtual coordinatesystems using both simulations and Internet deployments

Results The exploitation of existing publicly available communication net-work infrastructure with interface towards emerging SDR systems Interop-erability between heterogeneous secure communication systems A paralleldistributed mobile agent-based transaction system for effective procurementInfrastructure based on custom chip-level security

Publications NA

The Snippet System - A Fine-Granular Semantic-Aware DataStoreAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding ULBudget NABudget UL NADuration 2010-11-01 ndash 2013-10-31

Members Laurent Kirsch (PhD candidate) Steffen Rothkugel (supervi-sor)

Domain(s) compound documents file systems semantic desktop

Partner(s) NA

Description The Snippet System represents a novel data storage approachtackling several problems and shortcomings inherent to traditional file sys-tem based document management One of the main targets of the SnippetSystem is to improve human computer interaction by introducing new datamanagement facilities which enable a more intuitive way of working withdata and information By developing these file system level data manage-ment concepts with the usability of the system in mind it is possible toconsider usability aspects already in the design of the data storage architec-ture This in turn allows the realization of concepts like so-called Relationsand vFolders which contribute to a better user interface and interactionscheme

94 Projects and Grants in 2012

Results NA

Publications 1 conference publication [350]

Analysis of low-latency anonymisation networksAcronym NAReference I2R-NET-COM-110000PI Prof Dr Thomas EngelFunding funded on Fp7 EFIPSANS until 31122010 - Net-

LabBudget 37KyearBudget UL NADuration 2008-11-15 ndash 2012-11-14

Members Thomas Engel Thorsten Ries

Domain(s) Anonymity privacy low-latency anonymisation networks anonymi-sation network performance

Partner(s) NA

Description For various reasons low-latency anonymisation systems likeTor I2P JonDonym or proxy based solutions are widely used nowadaysoffering a certain performance and protection against adversaries Howeverit is very difficult for users to evaluate these systems especially when itcomes to the degree of anonymity Therefore the goal of this work is toprovide measures for users in order to evaluate the systems in regard toanonymity and performance

Basis of the work are performance evaluations of typical anonymisation sys-tems in regard to throughput round trip time and packet variation In orderto describe the degree of anonymity an attack using virtual network coordi-nate systems will be defined that allows an instant degradation of anonymityby positioning users geographically which aim to stay anonymous Classifi-cation algorithms like Support Vector Machines and Instance Based learningalgorithms will be used to allow the calculation of the degree of anonymityFinally a comparison to existing approaches will be provided

A second emphasis is on anonymisation performance particularly on Torthe most prevalent anonymisaton system nowadays Existing performancemetrics will be reviewed and evaluated aiming to improve the overall per-formance in terms of throughput and round trip time by an optimised relaynode selection for instance

Results The major outcome of this project is expected to be a quantifi-

41 Research projects 95

cation of anonymity in anonymisation networks by making use of virtualnetwork coordinate systems in order to identify node locations and by thisto provide an anonymity measure for users Another result will be perfor-mance improvements of the Tor anonymisation network

Publications [273 274 280]

Sociality and Self-Organization in Next-Generation DistributedEnvironmentsAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding AFRBudget NABudget UL NADuration 2009-02-01 ndash 2012-01-31

Members Jean Botev (Post Doc) Steffen Rothkugel (supervisor)

Domain(s) large-scale distributed environments sociality self-organization

Partner(s)

bull National University of Singapore

bull George Mason University USA

bull Universitat Trier

Description The proliferation of computationally powerful interconnecteddevices entails a new generation of networked applications and social utilitiescharacterized by a strong growth in scale and dynamics Distributed virtualenvironments constitute a privileged example involving a high degree of in-teractivity as well as tightened constraints and requirements As a responseto these issues this dissertation explores and substantiates sociality as a fun-damental principle both in and for the design of such systems A specializeddual peer-to-peer architecture is introduced combining a highly-structuredbackbone overlay with a loosely-structured geometric client overlay synergis-tically complementing each other To enable a global-scale single-instancedenvironment it is imperative to include as many client-side resources as pos-sible and unburden the backbone The focus of this dissertation thereforelies upon the latter geometric overlay By taking an interdisciplinary per-spective and leveraging different aspects of sociality a series of self-organizedapproaches addressing major problem areas are proposed a collaborative

96 Projects and Grants in 2012

filtering mechanism for the handling of information overload created fromthe soaring amounts of users and objects a confidentiality framework for theprotection of sensitive data more likely exposed due to an increased inter-activity and two resource allocation schemes for fairly distributing surpluscapacities in the face of critical regional surges Detailed evaluations showthat these decentralized algorithms operate robustly and effectively whileyielding well-converging results in comparison to optimal global-knowledgescenarios

Results NA

Publications 3 peer-reviewed conferences [297] [308][296]and one PhDthesis [352]

Honeypot and Malware AnalysisAcronym Honeypot and Malware AnalysisReference I2R-DIR-PIC-09SECPI Prof Dr Thomas EngelFunding AFR-PPPBudget 37KyearBudget UL NADuration 2011-10-15 ndash 2014-10-14

Members T Engel S Marchal

Domain(s) Is- Information and Communication Technologies Honeypotmalware analysis malware detection passive DNS network traffic analysis

Partner(s) CETREL

Description This research proposal presents the development of a newkind of honeypot Honeypots are widely used for more than ten years nowfor several purposes such as threat detection mitigation of the impact of net-work attacks malware analysis automatic generation of wormsrsquo signatureetc However honeypots are often designed to particular network applica-tions or services to offer a tailor-made threat detection and deflection Inthis proposal I exhibit potential new wider applications of honeypots lever-aging passive DNS analysis DNS probing and fast network traffic analysisin order to protect a specific network from its specific threats I highlightseveral areas for active research and provide an overview on existing ap-proaches This project is part of a public private partnership between SnTand CETREL SA and will be realized in the framework of a PhD coveringa 3 year period

41 Research projects 97

Results NA

Publications 2 peer-reviewed conferences [363 362]

Routing and mobility management in vehicular networksAcronym NAReference I2R-NET-PFN-10MOVEPI Prof Dr Thomas EngelFunding FNR - CORE MOVEBudget 37KyearBudget UL NADuration 2011-09-01 ndash 2014-08-31

Members T Engel M Mouton

Domain(s) NA

Partner(s) NA

Description research in the area of Vehicular Ad Hoc Networks (VANETs)A VANET is an emerging network technology which enables data com-munication between vehicles and the Internet The network protocols andhardware have been specifically designed for efficient data exchange in vehic-ular environments The high mobility and intermittent network connectivityraise major challenges for both security and network management tasks

The main contribution of the thesis of Maximilien Mouton consists in -The setup and maintenance up a simulationemulation platform that canbe used for large scale protocol validation and analysis (joint research withUCLA) - Integration of realistic mobility and signal propagation models -Identifying and proposing new application specific routing mechanisms formobile vehicular networks - Investigation of application specific dissemina-tion techniques (eg traffic

Results NA

Publications NA

98 Projects and Grants in 2012

Securing Mission Operations using Multi-Level SecurityAcronym SMO-MLSReference I2R-NET-PAU-11ELSKPI Prof Dr Thomas EngelFunding European Space AgencyBudget 48800e

UL - 37077 eBudget UL NADuration 2010-11-01 ndash 2014-10-30

Members Thomas Engel ESkoutaris

Domain(s) Spacecraft mission control systems MLS security

Partner(s) ESAESOC Germany

Description SMO-MLS is an ongoing research project that aims to pro-viding an enhanced security support at the spacecraft control infrastructureof ESAESOC by establishing multi-level security (MLS) solutions on itsMission Control System (MCS) Within this research activity MLS solu-tions will ensure an enforced separation of command and control data flowsof different sensitivity and classification levels between missions and also be-tween individual payload data flows of the same mission SCOS-2000 (S2K)is the ESA generic software infrastructure implementing the common fea-tures required by a spacecraft MCS Therefore a SCOS-2000 MLS prototypeis to be developed and built upon an operating system that supports multi-level security (ie Security-Enhanced Linux) The primary three objectivesof this project and that represent the direct security needs of future spacemissions are

(A) Enforcement of integrity policies between telecommand chain data flows(B) Enforcement of integrity policies between telemetry chain data flows (C)Confidentiality of third party telecommand chain data flows

This research project will advance the research on the area of MLS systemsand will provide an MLS model tailored for spacecraft command and controlsystems

Results As a result of this project a prototype MLS system based oncurrent ESA mission control system infrastructure will be developed andimplemented This may include the development of specific protocols andprocedures Such protocols may be subject to standardization

Publications NA

41 Research projects 99

Mobility Optimization using Vehicular network technologies(MOVE)Acronym MOVEReference I2R-NET-PFN-10MOVEPI Prof Dr Thomas EngelFunding CORE- MOVEBudget 37KYearBudget UL NADuration 2011-11-15 ndash 2014-11-14

Members T Engel M Forster R Frank J Francois A Panchenko MMouton L Dolberg

Domain(s) ICT

Partner(s) UCLA (non contracting)

Description The student will be working on the FNR MOVE projectThe goal of this project is to optimize vehicular traffic flows using ubiqui-tous network technologies (eg VANET 3G) The student will focus ondeveloping new traffic flow deviation paradigms that can be employed toreduce vehicular traffic congestion for urban and highway scenarios

Vehicular Ad Hoc Networks (VANETs) are mobile networks specificallysuited for vehicular environments Moreover the student will focus on spe-cific optimisation problems related to vehicular traffic flows Using VANETswill allow specifying decentralised and distributed coordinated algorithms toprovide the drivers with smart navigation services

The main contributions of the thesis of Markus Forster consist in - Iden-tifying the specificity of the vehicular traffic for the area of Luxembourg -Understanding the limitations and bottlenecks of the current Luxembour-gish road network - Modelling of the traffic in order to realistically reproducethe flow behaviour in a simulations environment - Testing existing and novelflow optimisation techniques that will allow to improve

Results NA

Publications NA

100 Projects and Grants in 2012

Service Dependency and Anomaly DetectionAcronym NAReference I2R-NET-COM-110000PI Prof Dr Thomas EngelFunding Funded on FP7 EFIPSANS project until 31122010

- NetLabBudget NABudget UL NADuration 2008-11-01 ndash 2012-10-31

Members T Engel C Wagner

Domain(s) NA

Partner(s) NA

Description NA

Results NA

Publications The following articles have been published in 2011 1 jour-nal [271] and 3 peer-reviewed conferences [306] [278] [279]

Individual and Collective ReasoningAcronym ICRReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding UL-PHDBudget NABudget UL NADuration 2008-03-12 ndash 2012-03-12

Members Gabriella Pigozzi Marija Slavkovik Leon van der Torre

Domain(s) Judgment aggregation Group-decision making Social choicetheory Normative systems

Partner(s) NA

Description Traditional decision-making is driven by the concept of a ra-tional agent who acts in his own best interest by maximizing the expectedutility Opposite to the rational agent modeled as Homo Economicus peopledo not make decisions by generating alternative options and by comparingthem on the same set of evaluation dimensions nor do they generate prob-ability and utility estimates for different courses of action They search for

41 Research projects 101

what Herbert A Simon called satisficing or ldquogood enoughrdquo decisions Wedefine a satisficing decision as one that is determined by making a yesnoestimate for each element of a given set of decision-relevant criteria Theaim of this project is to investigate how groups of artificial agents can reachsatisficing decisions The contribution of the thesis is threefold For the areaof multi-agent systems we propose a new way in which group decisions canbe reached As a show-case we apply our decision-reaching method to theroblem of determining group intentions For the field of judgment aggrega-tion our contribution is a new set of judgment aggregation operators Forthe field of belief merging our contribution is the identification of a newproblem of iterated belief merging

Results

bull In order to avoid an untenable collective outcome individuals mayprefer to declare a less preferred judgment set Thus the prospect ofan individual trying to manipulate the social outcome by submittingan insincere judgment set is turned from being an undesirable to aldquovirtuous (or white) manipulation In [349] we defined and studiedwhite manipulation as a coordinated action of the whole group

bull In [348] we presented an aggregation procedure providing completejudgment sets ie judgment sets with premises and conclusion Weshowed that our procedure satisfies the desirable properties of non-manipulability and it can be modified to preserve unanimity on thepremises

bull In order to show the practical applicability of group decision-reachingthrough judgment aggregation we studied the problem of determin-ing group intentions based on declared beliefs or acceptances of thememebers In [328] we present a formal model for deciding on collec-tive intentions and study the related group commitment and intentionrevision problems

Publications Marija Slavkovik

102 Projects and Grants in 2012

Understanding Financial Topics and their Lifetime in TextualNews by the Content Aging TheoryAcronym NAReference F2R-LSF-PFN-11ESCAPI Prof Dr Christoph SchommerFunding FNR COREBudget 500000Budget UL NADuration 2012-06-01 ndash 2015-05-31

Members Christoph Schommer Roxana Bersan Dimitrios Kampas An-dreas Chouliaras Theoharry Grammatikos Yannis Ioannidis

Domain(s) Computational Finance Topic Extraction Content AgingTheory Machine Learning Text Mining

Partner(s)

bull Dept of Finance (Luxembourg School of Finance)

bull Dept of Computer Science

bull University of Athens Dept of Computer Science

Description The project is part of the FNR CORE project ESCAPEESCAPE applies Data Mining and Machine Learning methods on publiclyavailable news sources to document in a measurable way the structure andevolution of Europersquos financial policy to address the on-going threat to theEuro-zone stability How do the important euro policy players present them-selves in the pallet of the policies map Are there subgroups with similarpositions How coherent are these groups among themselves Are theredominant players in each group How different are the different group posi-tions One expects that the euro players eventually will reach a consensuspolicy to stem the risk threatening the EURO Documenting in a measur-able way how the different policy positions converge over time should provideadditional insights into the complex process of (financial) policy evolutionFinancial policy ultimately affects capital markets but as the recent cri-sis has highlighted capital markets may force or extract policy concessionsUnderstanding the interplay of financial policy formulation and capital mar-ket ex-pectations therefore is extremely important for the effectiveness ofpolicy responses and eventually for the stability of the financial system ES-CAPE provides statistical evidence on whether capital markets lead or reactconcurrently to the financial policy evolution It is expected to shed lighton the powerful role of the ldquoinvisible handrdquo of capital markets in extractingdesired policies from politicians

41 Research projects 103

The research project concerns the identification of financial topics in Thom-son Reuters News data The extraction of this kind of information will beperformed based on machine learning and content aging theory methodsWe are currently working on the mathematical formalization of this systemThe extraction of this kind of information will be used by financial expertsto better understand the Sovereign Debt Crisis in Europe

Results

bull We were concerned with masses of financial news data from Thom-son Reuters (gt 2TB) the understanding of the data structure themanagement of the data and its preprocessing

bull We have elaborated on and worked out Topic ExtractionFinding indetail

bull Extensive Literature Review Topic Extraction and Content AgingTheory

bull Paper writing which has led to a conference paper to be presented atICAART 2013 in Barcelona

Publications to appear in 2013 at ICAART 2013

Smart Predictive Algorithms for Spacecraft AnomaliesAcronym SPACEReference I2R-DIR-BPI-11SCHOPI NAFunding SnTBudget NABudget UL NADuration 2011-07-09 ndash 2017-07-08

Members F Bouleau Prof Schommer Prof Bouvry Dr Krier

Domain(s) Keywords Fourier fit least square Kalmanrsquos filter data min-ing artificial intelligence pattern matching data stream decision helpingclassification correlation

Partner(s)

bull University of Luxembourg Dept of Computer Science and Commu-nication

bull SES Astra

104 Projects and Grants in 2012

Description Geostationary satellites are monitored from Earth to captureand react on anomalies A stream of sampled sensor information (telemetry)is downloaded by a ground control system which is processing and storing theinformation in dedicated databases which grow very large over the satellitelifetime (up to 20 years) The satellite engineers crew who is analyzing thisdata nevertheless take less than 10

Results My interest is on one hand to use the mathematical modellingcreated by the satellite engineers to optimize browsing into the telemetrydatabase and help in the pattern matching and classification that will belinked to the existing reports database On the other hand an artificialintelligence algorithm will use the classified patterns in order to correlate thereports with other events and provide analysis and decision helping elements

Publications in progress

An Incremental System to manage Conversational StreamsAcronym INACSReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding ULBudget NABudget UL F1R-CSC-LAB-05ILIADuration 2009-02-01 ndash 2013-01-14

Members Jayanta Poray Christoph Schommer Raymond Bisdorff ThomasEngel

Domain(s) Adaptive Systems Graph Theory and Modelling Chat Con-versation Computational Reputation

Partner(s)

bull Dept of Computer Science ILIAS Lab

Description The research project is inspired by the information process-ing mechanism of the human brain where every input signal is realisedprocessed and stored in a highly sophisticated manner The goal has beento develop a robust information processing system for text streams in theform of explorative and adaptive mind-graphs to use this structured infor-mation to fulfil textual conversational challenges between artificial agents

Results The thesis has been successfully submitted and defended(December 13 2012)

41 Research projects 105

Publications

1 J Poray and C Schommer Operations on Conversational Mind-Graphs In Proceedings of the 4th International Conference on Agentsand Artificial Intelligence pp 511-514 Vilamoura Algarve Portugal

Feature Extraction and Representation for Economic SurveysAcronym FERESReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding Internal Doctoral PositionBudget Internal Doctoral PositionBudget UL NADuration 2011-04-01 ndash 2014-03-31

Members Mihail Minev Christoph Schommer Theoharry GrammatikosUlrich Schaefer Philippe Karas

Domain(s) News Analytics Feature Extraction Course Volatilities EventClassification Trend Prediction

Partner(s)

bull Dept of Computer Science ILIAS Lab

bull Luxembourg School of Finance University Luxembourg

bull German Research Center for Artificial Intelligence (DFKI) GmbH

bull Thomson Reuters Finance SA

Description The study concerns the manifold news articles which re-flect the adjustments in the monetary policy during the financial crisis Inparticular we consider official decisions conducted by the Federal ReserveSystem but also information leaks in the press One goal of this work isto retrieve and quantify such information using modern pre-processing andtext mining techniques Further the implications of news on the stock mar-kets are examined by discovering and modelling composite index volatilitiesas functions of key announcements A model for the prediction of pricetrends is targeted which should reveal the economic value of informationHere an important aspect is the definition extraction and management oftopic-related features Keywords data projection feature selection newsclassification monetary policy stock markets

106 Projects and Grants in 2012

Results

bull Discovery of a strong evidence for a measurable link between eventsrelated to monetary policy and stock market volatilities

bull Proposal for a comparison framework of computer science projectswhich aim news classification and trend forecasting

bull Identification of information sources and sophisticated data character-istics

bull Design of a procedure model containing the data workflow and themilestones for the learning and the operational phase

bull Project presentation at the ldquoTrusted ICT for Financerdquo organized bythe Digital Enlightenment Forum Luxembourg

Publications

bull M Minev C Schommer T Grammatikos News and stock marketsA survey on abnormal returns and prediction models Technical Re-port August 2012

bull C Schommer and M Minev Data Mining in Finance PresentationTrusted ICT for Finance Luxembourg April 2012

Sentiment Classification in Financial TextsAcronym NAReference F2R-LSF-PFN-11ESCAPI Prof Dr Christoph SchommerFunding FNR COREBudget 500000Budget UL NADuration 2012-06-01 ndash 2015-05-31

Members Christoph Schommer Roxana Bersan Dimitrios Kampas An-dreas Chouliaras Theoharry Grammatikos Yannis Ioannidis

Domain(s) Computational Finance Sentiment Analysis Machine Learn-ing Text Mining Natural Language Processing

Partner(s)

bull Dept of Finance (Luxembourg School of Finance)

41 Research projects 107

bull Dept of Computer Science

bull University of Athens Dept of Computer Science

Description The work is part of the FNR CORE project ESCAPE ES-CAPE applies Data Mining and Machine Learning methods on publiclyavailable news sources to document in a measurable way the structure andevolution of Europersquos financial policy to address the on-going threat to theEuro-zone stability How do the important euro policy players present them-selves in the pallet of the policies map Are there subgroups with similarpositions How coherent are these groups among themselves Are theredominant players in each group How different are the different group posi-tions One expects that the euro players eventually will reach a consensuspolicy to stem the risk threatening the EURO Documenting in a measur-able way how the different policy positions converge over time should provideadditional insights into the complex process of (financial) policy evolutionFinancial policy ultimately affects capital markets but as the recent cri-sis has highlighted capital markets may force or extract policy concessionsUnderstanding the interplay of financial policy formulation and capital mar-ket ex-pectations therefore is extremely important for the effectiveness ofpolicy responses and eventually for the stability of the financial system ES-CAPE provides statistical evidence on whether capital markets lead or reactconcurrently to the financial policy evolution It is expected to shed lighton the powerful role of the ldquoinvisible handrdquo of capital markets in extractingdesired policies from politicians

The research topic that Mrs Bersan is addressing is sentiment analysisnamely identifying subjective information in the financial news We analyzea specific topic and assign this subjective information to a mathematicalindex in order to reflex its polarity orientation The techniques used are fromthe research fields of machine learning text analytics and natural languageprocessing

Results

bull We were concerned with masses of financial news data from Thom-son Reuters (gt 2TB) the understanding of the data structure themanagement of the data and its preprocessing

bull We have elaborated on and worked out Sentiment Classification indetail

bull Extensive Literature Review Sentiment Analysis (vs Opinion Min-ing Polarity Classification)

bull Paper writing which has led to a conference paper to be presented atICAART 2013 in Barcelona

108 Projects and Grants in 2012

Publications A first scientific paper will be published at ICAART 2013in Barcelona

Artificial Conversational CompanionsAcronym SPARCReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding NABudget NABudget UL NADuration 2011-04-01 ndash 2014-03-31

Members Sviatlana Danilava Christoph Schommer Gudrun Ziegler StephanBusemann

Domain(s) Artificial Companions Conversational Agents Models of In-teraction Interaction Profiles Long-Term interaction between human users

Partner(s)

bull University Luxembourg Dept of Computer Science and Communica-tion

bull University Luxembourg Dica Lab

bull German Research Centre for Artificial Intelligence Saarbruecken

Description The goal of the project is design and implementation of anArtificial Conversational Companion (ACC) which helps foreign languagelearners to improve their conversation skills In order to model a long-terminteraction with an ACC via instant messaging dialogue for conversationtraining it is necessary to understand how natural long-term IM interactionbetween human language experts (usually native speakers) and languagelearners works Data from chat dialogues between advanced learners of alanguage L as a second language(L2) and native speakers of L who rdquojust chatrdquofor a longer period of time were collected A data-driven model of long-term interaction is in focus in particular modelling of usersrsquo interactionprofiles including usersrsquo responsiveness behaviour and learnersrsquo languageWe use methods of conversation analysis (qualitative research) to developcomputational models of long-term human-machine interaction

Results

1 Data collection We initiated long IM dialogues (ca 30-90 minutes)

41 Research projects 109

between advanced learners of German as L2 and German native speak-ers for a prolonged period of time (4-8 weeks) The participants pro-duced in total 72 dialogues which correspond to ca 2500 minutes ofIM interaction ca 4800 messages with ca 52000 tokens in total andca 6100 unique tokens The average message length is 10 tokens

2 Data analysis We obtained the initial model of responsiveness profilesfor the learners We developed an initial annotation scheme for thelearners language We annotate the corpus according to the scheme

Other Activities

1 International Conference on Agents and Artificial Intelligence (Vilam-oura Portugal) presentation on ldquoArtificial Conversational Compan-ions - A Requirements Analysisrdquo

2 DICA-Lab PhD Day 2012 presentation on rdquoComputational Models ofInteraction Based on Empirical Data from Chat Dialoguesrdquo

3 Seminar with the participants of the data collection Vitebsk Belarus

4 Participation in intervention ldquoChercheurs a lrsquoecole 2012rsquorsquo

5 Participation in Foire de lrsquoEtudiant 2012 (Invited by Ministere delrsquoEgalite des Chances)

Publications

1 S Danilava Ch Schommer and G Ziegler (2012) Long-term Human-machine Interaction Organisation and Adaptability of Talk-in-interactionPoster presentation CHIST-ERA Conference Edinburgh Scotland

2 S Danilava S Busemann and Ch Schommer (2012) Artificial Con-versational Companions - A Requirements Analysis In Proceedings ofthe 4th International Conference on Agents and Artificial Intelligence282-289 Vilamoura Algarve Portugal

Energy-efficient resource allocation in autonomic cloud comput-ingAcronym ERACCReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2010-10-01 ndash 2013-09-30

110 Projects and Grants in 2012

Members Cesar Diaz

Domain(s) Computer Science Information Science Cloud ComputingGreen Computing Resource Allocation Optimization

Partner(s) NA

Description In the new era of Information Technologies (IT) and glob-alization massive computing power is desired to generate business insightsand competitive advantage for enterprises Traditionally enterprises processtheir data using the computing power provided by their own in-house datacentres However maintaining and operating a private data centre to keepup with the rapid growing data processing request can be costly and com-plicated Cloud Computing (CC) offers an alternative It is a concept thathas emerged out of the conception of heterogenous distributed computinggrid computing utility computing and autonomic computing It promisesto provided on-demand computing power with little maintenance quick im-plementation and low cost Nevertheless electrical power consumption hasbecome a major concern in CC systems

Results Models and algorithms are developed for the energy-efficient man-agement of processing elements that comprises a CC Based on the state ofthe art we have designed low complexity green scheduling heuristics thatexploit the heterogeneity of computing resources published in [295] Theseheuristics were designed to take into account scalability issues of the system[294]

In parallel research on opportunistic Desktop Grid Computing is conductedin conjunction with researchers from University of los Andes ColombiaSome techniques like DVFS ACPI DPM and virtualization are also consid-ered Moreover we are also investigating resource allocation and schedulingmodels [293]

Publications NA

Integrity Issues on the CloudAcronym IICReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2011-01-16 ndash 2013-01-15

41 Research projects 111

Members Jakub Muszynski

Domain(s) cloud computing distributed computing security integrityfault-tolerance

Partner(s) NA

Description A simple concept that has emerged out of the conceptionsof heterogeneous distributed computing is that of Cloud Computing (CC)where customers do not own or rent any part of the infrastructure Theysimply use the available services and pay for what they use This approachis often viewed as the next IT revolution similar to the birth of the Webor the e-commerce CC naturally extends grid computing Even if thislast domain attracted academic interest for several years it hardly caughtindustrial attention On the contrary CC arouse enthusiasm and interestfrom the same actors probably because it formalizes a concept that reducescomputing cost at a time where computing power is primordial to reachcompetitiveness Additionally the technology to interface such platforms isnow mature enough to make this concept a reality as initiated by some ofthe biggest vendors worldwide (Google Amazon etc)

To transform the current euphoria on CC into concrete investments andwide acceptance several security issues still need to be fixed In this con-text this PhD proposal focus on integrity and fault-tolerance aspects inthe CC paradigm in order to provide guarantees on programs and data ei-ther before during or after a run on the CC platform More generally theidea is to provide qualified and quantified measures of the confidence overthe resources used the execution conducted and the results returned to theuser This involves the design of novel protocols based on TPM (TrustedPlatform Modules) so as to provide trusted executions and migration pathfor the virtual environment deployed on the CC platform It also requirenew contributions in result-checking techniques middleware hardening andgame-theory based trust management

Results The general robustness analysis of distributed Evolutionary Al-gorithms (dEAs) against cheating faults and crash-faults (subject startedduring previous year) was finished with publication in Computers amp Math-ematics with Applications journal As a result conditions of convergenceor non-convergence of dEAs executed in malicious environment were givenHaving promising results from previous work currently it is being extendedby the experimental and theoretical analysis of running times of dEAs Theaim of the work is to quantify the overhead introduced by malicious acts onthe execution time Influence of underlying connection network between theworking nodes is also explored with the main focus on the P2P networks

112 Projects and Grants in 2012

Additionally a subject of generating hash functions by means of Gene Ex-pression Programming (GEP) was studied Journal paper as an extensionof conference paper (presented at the rdquoCryptography and Security Systems2013rdquo) is currently in preparation

Publications [40]

Energy-Efficient Information Dissemination in MANETsAcronym NAReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2009-09-15 ndash 2012-09-14

Members Patricia Ruiz

Domain(s) Communication Protocols Mobile Ad Hoc Networks Energy-Efficiency Optimisation

Partner(s) NA

Description Patricia Ruiz is working on broadcasting algorithms over adhoc networks indeed over both mobile ad hoc networks (MANETs) and ve-hicular ad hoc networks (VANETs) During the first year she developed anenergy aware dissemination protocol based on the state of the art distancebased broadcasting algorithm for MANETs For that she did a cross-layerdesign that informs the upper layers about the reception energy at the phys-ical layer Thus upper layers can use this information to take decisions inorder to outperform the performance of the protocol

During the second year she improved the previous version of her work butalso made several extensions including new features and optimizations tothe protocol originally proposed The candidate has been using multiobjec-tive metaheuristics approaches to optimize the parameters of the differentvariants of the protocol

Results We are developing communication algorithms for ad hoc networksMore precisely dissemination algorithms for both MANETs and VANETsIn [330] an study of the performance of a tree topology over a VANETwas presented and also a comparison of different broadcasting algorithmsover different topologies for both MANETs and VANETs Considering theintrinsic energy constrain of MANETs an energy aware broadcasting algo-

41 Research projects 113

rithm (EDB hereinafter) was proposed in [329] This protocol is configuredby a set of different parameters that must be tuned for obtaining a goodperformance In order to optimize EDB we are using some multiobjectivealgorithm cellDE for finding the best possible configuration in [307] Thisalgorithm gives a set of feasible solutions that optimize the performance ofthe protocol in terms of some predefined objectives In [284] a new ver-sion of EDB the Adaptive Enhaced Distance Based broadcasting protocol(AEDB hereinafter) was optimized in terms of the energy used the coverageachieved and the broadcasting time The solutions were analyzed and somehints were given to the designer for choosing the parameters for promotingone objective or another Moreover in [290] the Enhanced Distanced BasedBroadcasting algorithm (EDB) was improved by using some social knowl-edge of the network A community detection technique was used in orderto improve the coverage achieved by EDB in sparse networks Additionallythe parameters of the new protocol were also optimized in terms of the samethree objectives we mentioned before

Publications NA

Smartphone Malware detection and mitigation with Static codeAnalysisAcronym NAReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2011-10-15 ndash 2014-09-30

Members Kevin Allix (PhD)

Domain(s) Security code static analysis android malware detection soft-ware engineering techniques

Partner(s) NA

Description By leveraging Static code analysis methods our researcheffort aims at improving our ability to detect known and unknown malwareusing heuristics-based detection technichs and similarity computation withnew fingerprinting schemes

Results This a starting PhD No results yet but a state of the art

Publications NA

114 Projects and Grants in 2012

Access Control Architectures From Multi-objective Require-ments to DeploymentAcronym ACAReference NAPI Prof Dr Yves Le TraonFunding ULBudget NABudget UL NADuration 2011-02-01 ndash 2014-01-31

Members Donia El Kateb (PhD)

Domain(s) NA

Partner(s) NA

Description The subject of the PhD thesis is ldquoAccess Control Architec-tures From Multi-objective Requirements to Deploymentrdquo Todayrsquos infor-mation systems are becoming more and more heterogeneous and distributedthis has impacted software systems which become more and more complexAdditionally software systems are a target to many changes that occur atthe environment level requirement level or at the system level This raisesthe necessity to consider multi-level requirements at their design of softwarearchitecture like functional requirements performance requirements secu-rity requirements etc Among the security requirements access control isthe most deployed one An access control architecture implements the re-quirements and enforces a policy that satisfies the requirements This thesisconsiders policy-based access control architectures and aims to build a gen-eral framework that defines an access control architecture that is supposedto comply to multi-level requirements and to respect multiple competingquality attributes security performance and so forth These attributes in-teract and improving one often comes at the price of worsening one or moreof the others In this thesis we reason about architectural decisions thataffect those quality attribute interactions

bull RQ1 How to ensure the tradeoff between security and performancewhen designing an access control architecture

bull RQ2 How to automate policy specification to assist policy writers toavoid policies errors so that the policy is compliant with the require-ments

bull RQ3 How to test the secure deployment of the access control ar-

41 Research projects 115

chitecture its compliance with the policies and how to do that in anoptimized fashion

Results More specifically during this first year the student did a stateof the art on access control and on security requirement engineering Shestudied one of the issues related the standard access control architecturenamely the performance issue caused by bottlenecks She successfully pro-posed a new solution for solving this issue and developed an automated toolthat implements this approach and enables improving current access con-trol architecture In addition during her first years she did an interestingwork on policy enforcement points (PEP) localization In fact it is impor-tant to locate the PEP in order to understand how security mechanism areimplemented and provide a way to improve the performance This workwas actually complementary to the work that she did on performance im-provement She implemented this approach and applied it successfully tothree case studies This work is under submission and will be submittedsoon She conducted this work in collaboration with Prof Tao Xie team(from North Carolina State University USA) who helped by providing casestudies used in the experiments The results were very promising since theperformance was improved up to 10 times This work has been submittedto ICPE conference and will appear in 2012

Publications NA

415 Other miscellaneous projects

Enterprise security for the banking and financial sectorAcronym BCEEReference I2R-Net-Pau-11PS2CPI Prof Dr Thomas EngelFunding BCEEBudget 204KeBudget UL NADuration 2011-04-01 ndash 2012-03-31

Members T Engel A Zinnen

Domain(s) security for the banking and financial sector

Partner(s) BCEE

116 Projects and Grants in 2012

Description Although many companies seem to approach the cloud com-puting paradigm at a faster pace the financial sector still remains an excep-tion Selling cloud computing to financial services companies seems prob-lematic The sector is known for its reluctance to give up control overoperations Additionally this area is characterized by a high number oflaws and regulations In Luxembourg banks are for example constrainedby law to store data within the country This fact contradicts the conceptof cloud computing in its current development The biggest challenge andkey success point in the implementation of cloud computing in the financialsector will be the assurance of safety policies

In Luxembourg this topic is a subject of special interest Resource poolingamong companies with similar interests would save administrative costs Onthe basis of a cloud environment banks could completely put their focus ontheir core competence However an open question is what steps will benecessary in order to achieve this goal In any case it will be important tofurther invest in research to fulfill the seven introduced security challengesA pilot project in cooperation with the Interdisciplinary Centre for SecurityReliability and Trust (SnT) provides preliminary work and an analysis of aframework to migrate financial services to cloud computing This work isdiverse and addresses both the identification of necessary research topics andthe exploration of services that might run in the cloud This evaluation isbased on a comparison of benefits versus riskschallenges for specific servicesA dialogue with legal and audit institutions as well as a discussion withsoftware providers will be a first step towards a framework for the financialcloud in Luxembourg

Results So far we have evaluated the protection of state-of-the art anonymiza-tion networks Anonymization networks such as Tor and JAP claim tohide the recipient and the content of communications from a local observerie an entity that can eavesdrop the traffic between the user and the firstanonymization node Especially users in totalitarian regimes strongly de-pend on such networks to freely communicate For these people anonymityis particularly important and an analysis of the anonymization methodsagainst various attacks is necessary to ensure adequate protection Weshowed that anonymity in Tor and JAP is not as strong as expected so farand cannot resist website fingerprinting attacks under certain circumstancesWe defined features for website fingerprinting solely based on volume timeand direction of the traffic As a result the subsequent classification be-came much easier We applied support vector machines with the introducedfeatures We were able to improve recognition results of existing works on agiven state-of-the-art dataset in Tor from 3 to 55 and in JAP from 20to 80

The datasets assume a closed-world with 775 websites only In a next step

41 Research projects 117

we transferred our findings to a more complex and realistic open-world sce-nario ie recognition of several websites in a set of thousands of randomunknown websites To the best of our knowledge this work is the first suc-cessful attack in the open-world scenario We achieve a surprisingly hightrue positive rate of up to 73 for a false positive rate of 005 Finally weshowed preliminary results of a proof-of-concept implementation that ap-plies camouflage as a countermeasure to hamper the fingerprinting attackFor JAP the detection rate decreases from 80 to 4 and for Tor it dropsfrom 55 to about 3

Publications Two conference publications [267] [266]

EPT Vehicular NetworksAcronym EPTVReference I2R-DIR-PAU-09EPTVPI Prof Dr Thomas EngelFunding EPTBudget 2 298 KeBudget UL NADuration 2010-01-01 ndash 2014-12-31

Members Thomas Engel Raphael Frank Marcin Seredynski

Domain(s) Vehicular Ad Hoc Networks

Partner(s) Entreprise des Postes et Telecommunications Luxembourg -EPT

Description A standard for vehicular ad hoc networks is expected during2011 In 2025 0 of the vehicle fleet within Europe is predicted to ap-ply to the standards enabling new services and application A main goalwill be to increase traffic safety and reduce the environmental impact ofthe vehicular transportation system The vision of the proposed researchproject is to develop efficient secure and reliable communication networksto enable the transformation of the vehicular transport system of today toa greener smarter and safer system Recent advances in sensor technologylow power electronics radio-frequency devices wireless communications se-curity and networking have enabled the engineering of intelligent vehiclesandintelligent transport infrastructure which have the potential to drasticallyincrease road safety decrease cost of transportation and contribute to a sus-tainable environment This research will address 3 main areas of vehicularnetworks 1) Sensor and Mobile Ad Hoc Networks 2) Embedded Systemsand 3) Applications and Services

118 Projects and Grants in 2012

Results NA

Publications NA

PIL to SPELL conversionAcronym Pil to SPELLReference I2R-NET-PAU-11PS2CPI Prof Dr Thomas EngelFunding SES-ASTRABudget Not applicableBudget UL NADuration 2011-01-28 ndash 2015-01-27

Members Thomas Engel Frank Hermann b Braatz

Domain(s) Satellite control language

Partner(s) SES-ASTRA

Description Until now satellite vendors operate their satellites in theirown satellite control languages which are restrictive proprietary dependenton 3rd party software and very heterogeneous As a consequence SES de-veloped SPELL (Satellite Procedure Execution Language and Library) as aunified and open-source satellite control language usable for each satellitevendor In order to migrate the existing procedures delivered by the man-ufacturer Astrium SES requested for an automated translation that takesAstrium PIL procedures as input and generates equivalent SPELL proce-dures This translation has to guarantee a very high standard regardingcorrectness and reliability in order to minimize the need for revalidation ofthe generated SPELL procedures

Results Fully automated translator from PIL to SPELL (project P1)

a SES and Astrium engineers successfully tested the generated SPELLprocedures - more than 15 man month of testing from 2011-12 till 2012-05

b First planned operational use for a satellite to be launched in 2nd halfof 2012

Publications 8 Related Publications 5 Journal papers 2 conferencepapers 3 technical reports

41 Research projects 119

INTERCNRSGDRI1102 Algorithmic Decision TheoryAcronym AlgoDecReference F1R-CSC-PFN-11ADECPI Prof Dr Raymond BisdorffFunding FNR ULBudget 11 000 eBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members P Bouvry Ch Schommer U Sorger L van der Torre

Domain(s) Algorithmic Decision Theory is a research area developed atthe edge of several disciplines including Operational Research Decision the-ory Computer Science Mathematics Cognitive and the Social Sciences

Partner(s)

bull CNRS France

bull Universite Paris-Dauphine France

bull Universite Pierre Marie-Curie France

bull Universite drsquoArtois France

bull Universite de Mons Belgique

bull FNRS Belgique

bull ULB Belgique

bull FNR Luxembourg

bull Uniersidad Rey Juan Carlos Spain

bull DIMACS USA

Description Its aim is at developing formal and analytical methods andtools in order to improve decision making in and for complex organiza-tions in presence of hard algorithmic challenges It also aims at establishinga comprehensive methodology aiding real decision makers within the realworld to better understand the problem situations where they are involvedshape analyze an explore the possible actions that can be undertaken andultimately help to make better decisions The founding partners of the AL-GODEC Network established by the present Agreement have more than 20years of joint research activities resulting in joint PhDs papers books andresearch projects (both client and knowledge driven) Today they represent

120 Projects and Grants in 2012

a leading force worldwide in the area of Decision Sciences and TechnologiesThe ALGODEC Network is expected to create synergy in order to organizejoint doctoral courses promote the co-tutoring of PhD students promotemobility of early stage and experienced researchers promote the joint impli-cation of cross-members teams to client-driven research contracts organizejoint seminars act as a unique reference in fund raising

Results NA

Publications NA

Developing a Prototype of Location Assurance Service ProviderAcronym LASPReference ESA Bidder Code 52056PI Prof Dr Sjouke MauwFunding ESA - SnTBudget 160000e (ESA)Budget UL 80000e (SnT)Duration 2010-12-08 ndash 2012-12-07

Members Sjouke Mauw Jun Pang Xihui Chen Gabriele Lenzini

Domain(s) location assurance privacy of location assurance locationbased services GNSS network security

Partner(s) itrust Luxembourg

Description The objective of this project is to develop a prototype toprovide a high quality level of assurance in the location information thatoriginates from the GNSS network while protecting location owners fromintrusions into their privacy We approach these objectives from five per-spectives Analysis The objective is to precisely describe the requirementsthe execution and threat models the trust relations and the assumptionson the environment Design The objective is to design an architecture forlocation information assurance and to develop data protection algorithmsand decision logic to find out the appropriate assurance level of the loca-tion information The protocols devoted to security and privacy are alsodeveloped and integrated in a service architecture Verification The objec-tive is to analyse the result of decision logic in presence of an attacker andevaluate the quality of the output of the designed algorithms Moreoverbased on existing formal verification approaches a verification methodologywhich considers trustworthiness of the service together with user privacy willalso be studied Validation The objective is to set up the LAP prototypeand perform a set of laboratorial tests in order to assess the overall perfor-

41 Research projects 121

mance The robustness and performance is optimized through parametertuning Exploitation The objective is to define risk management principlesand prepare a strategy that should apply to assure the requirements in alargest deployment of the solution

Results The project was accomplished in this December 2012 and theevaluation meeting will be carried out in February 2013 So far the projectteam has submitted all the reports required by ESA and these documentshave been approved and accepted by the agency A Luxembourgish PatentApplication which describes the design of the localization assurance providerhas been successfully filed

Publications NA

Combine Software Product Line and Aspect-Oriented SoftwareDevelopmentAcronym SPLITReference F1R-CSC-PFN-09SPLIPI Prof Dr Nicolas GuelfiFunding ULFNRBudget 41 000eBudget UL NADuration 2009-10-01 ndash 2012-09-30

Members Nicolas Guelfi Alfredo Capozucca Jean-Marc Jezequel OlivierBarais Benoit Baudry Benoit Ries Vasco Sousa

Domain(s) Software Engineering Model Driven Engineering SoftwareProduct Line Aspect Oriented Modeling Model Composition UML

Partner(s)

bull CNRSINRIA University of Rennes France

bull Public Research Center Gabriel Lippmann

Description Software engineering proposes practical solutions founded onscientific knowledge to produce and maintain software with constraints oncosts quality and deadlines The complexity of software increases dramati-cally with its size A challenging trade-off for software engineering exists ina reality where the amount of software in existence is on average multipliedby ten every ten years as against the economic pressure to reduce devel-opment time and increase the rate at which modifications are made Toface these problems many of todayrsquos mainstream approaches are built on

122 Projects and Grants in 2012

the concepts of Model-Driven Engineering (MDE) Software Product Line(SPL) or Aspect-Oriented Software Development (AOSD) to foster softwarereuse In an emerging MDE context SPL and AOSD share the common ob-jectives to reduce the cost and the risk of adapting software systems to wideranges of new contexts On the one hand SPL techniques allow the model-ing of product variability and commonalities A SPL development approachstrongly depend on a composition mechanism supporting product deriva-tion from the SPL definition at any level of abstraction (analysis designimplementation ) On the other hand AOSD proposes new techniquesto compose and weave separate concerns which can represent features butAOSD does not propose mechanism to manage the variability of softwareThus both approaches complement each other and the combination of SPLand AOSD paradigms provides an exciting challenge allowing the use of ef-ficient product lines through the whole software development lifecycle Thiscollaboration aims at investigating further the complementarities betweenSPL and AOSD approaches in a MDE context This should make it possi-ble to discover entirely new ways of formally decomposing and recomposingsoftware systems at a much higher level of abstraction than anything thatis available today (notion of modularity based on classes and components)In order to do so several main technical areas must be addressed

bull Identify the common concepts and the difference between SPL andAOSD to combine the both approaches

bull Study the special activity of horizontal model transformation in thecontext of SPL and AOSD methodologies and to propose a transfor-mation language to support them

bull Provide rigorous and generic means to guaranties the consistency be-tween models through aspect weaving and product derivation

bull Build a generic AOM weaver with built-in variability mechanism todrive runtime adaptation

The problems inherent to this research project are in the heart of the soft-ware engineering problems such as model composition model transforma-tion model evolution model reusability model consistency etc

Results

bull Analysis of tools and procedings for the development of the genericAOM approach toolnamely analysing and testing the requirements forintegration as eclipse plug-in for tool deployment compatability of thiscompatibility requirements with the test projects already developed inKermeta and Drools

42 Grants 123

bull Development and specification of the Aspect metamodel composedof Pointcut information and Advice including specification alterna-tives to be tested during tool development for acersion of the best andclearest specification approach

bull Development and specification of a meta-model for internal informa-tion exchange within the several steps of the AOM tools execution

Publications NA

42 Grants

421 AFR

Multimedia Sensor NetworksAcronym AFR Grant PhD-09-188Reference I2R-DIR-AFR-090000PI Prof Dr Thomas EngelFunding FNR-AFRBudget 37KeBudget UL NADuration 2010-04-01 ndash 2013-03-31

Members Thomas Engel Radu State Alexander Clemm Stefan Hommes

Domain(s) anomaly detection network security rare event detection

Partner(s)

bull PampT Luxembourg

bull CISCO USA

Description Security officers monitoring security cameras face problemswith boredom and subsequent inattentiveness Critical events such as in-trusions can be missed While traditional surveillance systems store thedata recorded by cameras on hard disks examining the videos after a crimehas been committed is too late Together with PampT Luxembourg SnT de-velops in this project techniques for automated video surveillance with IP

124 Projects and Grants in 2012

network cameras The advantage Security officers can be alerted immedi-ately at critical moments and defensive actions can be initiated Automatedvideo surveillance techniques will be designed to detect and track objects in ascene to recognise normal activities in a scene and to differentiate anomalousfrom normal activity patterns Supervised and unsupervised learning usingthe video data will be applied to classify scenes as normal and suspiciousSpecial algorithms will be adopted or developed to detect the patterns ofobjects in the image control charts will raise an alarm when certain param-eters are out of the normal range Finally the spatial-temporal behaviourof an object in a scene will be analysed to gain more information aboutan activity Combining such analytical techniques will result in improvedintrusion detection and better support for security personnel The projectwill also address privacy issues at a high level to assure personal rights inpublic space Background of this project is that PampT Luxembourg wantsto replace its currently installed security network with IP network camerasin its main buildings and at other sites in Luxembourg The collaborationwith SnT guarantees the combination of an economically relevant highlyinteresting scientific question with cutting edge basic research

Results

bull Online-detection of a scene with self-tuning of all system parameters

bull Control charts for classifying a sequence of correlated images

bull Development of an open-source prototyp for an automated video surveil-lance solution

Publications 1 peer-reviewed conference [275]

Mashups in Clouds combined with Sematically enriched Infor-mation SetsAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding AFR-PHD-09-029Budget NABudget UL NADuration 2009-07-01 ndash 2013-06-30

Members Bernd Klasen (PhD candidate) Steffen Rothkugel (supervisor)

Domain(s) mashups cloud computing satellite communication

42 Grants 125

Partner(s)

bull SES Astra

bull Universitat Trier

Description This project implements and analyzes mashups - new ser-vices based on seamless composition of existing ones - running and beingcreated inside computing clouds The latter provides soft- and hardware asan abstract service which offers a high computational power that can beaccessed via specified interfaces while the internal - possibly heterogeneous -infrastructure is hidden This approach is supposed to overcome limitationsof existing (clientserver-based) solutions which suffer from performancedegradation Furthermore it will be investigated how users can be assistedduring the mashup creation process by automatic suggestions based on col-laborative filtering approaches and ontologies The result will be a platformprototype that enhances possibilities for end users as well as for enterprisessince it eases the service-creation process thus reduces time-to-market andwill liberate a multitude of new services Running this system on a scalableinfrastructure - a cloud - ensures availability and short response-times evenon unexpected peak loads

Results NA

Publications 2 publications in 2011 one journal [351] and one peer-reviewed conference [361]

Trusted Location Services for Managed Community NetworksAcronym UL TelindusReference I2R-DIR-PAU-10TSCNPI Prof Dr Thomas EngelFunding AFR-PPPBudget 574KyearBudget UL NADuration 2010-04-01 ndash 2014-03-31

Members T Engel Y Nesius

Domain(s) Computer Science and Informatics

Partner(s) Telindus

Description The Objective of this work will be the integration of pri-vately owned access points into a managed wireless outdoor mesh network

126 Projects and Grants in 2012

Community features like incentive schemes shall be added to the network toallow an extension of the network in terms of coverage by reusing existinginfrastructure The managed outdoor network supports passive localisationThat is the wireless mesh access points are able to locate the position ofa signal emitting device This location is assumed as trustworthy as thewireless infrastructure is controlled and managed by a single trustworthyentity This can not be assumed anymore if privately owned access pointsare added to the network as then private peoplersquos access points are involvedinto the location determination process They may manipulate the signallingor just try to replace their node The contribution of this work will be tore-establish the trustworthiness of this localization service while supportingthe integration of 3rd party access points The project will build upon anexisting mesh network Real world estimates are done to measure a privateuserrsquos potential impact on the localization process and how this can be de-tected and to what extend it can be detected and potentially masqueradedeg by using information from nearby nodes or by involving other sourcesfor location information

Results NA

Publications NA

Spectrum sensing- Resource re-allocation and Spectrum man-agement strategies for satellite cognitive RadioAcronym SaCoRadReference 12R-DIR-AFR-090000PI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2011-10-15 ndash 2014-10-14

Members Shree Krishna Sharma Bjorn Ottersten

Domain(s) Security Reliability and Trust in Information Technology

Partner(s) SES

Description In this project the problem of enhancing the efficiency ofspectrum usage rather than exploring new spectrum bands for new serviceshas been considered Satellite cognitive radio has been proposed as mainresearch domain The problem of finding out innovative spectrum sens-ing resource re-allocation and resource management strategies for satellitecognitive radio is the main research topic of this proposal This research

42 Grants 127

work will mainly focus on investigating advanced techniques to improve theperformance of satellite users in different wireless environments as well asincreasing the resource usage efficiency in hybridintegrated Platform

Results NA

Publications NA

Sensor Fusion-Combining 3D and 2D sensor data for safety andsecurity applicationAcronym Sensor FusionReference 12R-DIR-AFR-090000PI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2008-07-08 ndash 2012-07-07

Members Frederic Garcia Bjorn Ottersten

Domain(s) Sensor fusion

Partner(s) IEE

Description Recently 3D-cameras based on the lime-of-flight principlehave been developed to allow capturing range images of a scene The ben-efit of such a 3D-camera is that it enables the robust segmentation andlocalization of objects in 3D-space Objects can be classified based on theircontour thus independently on the light condition and the texture of theobject which IS crucial for safety critical applications

A general drawback of time-of-flight 3D-cameras IS however their low res-olution being approximately a factor 100 below the resolution of standard2D-imager and limited in frame rate compared to video rate These draw-backs limit the field of applications for 3D-cameras An approach to over-come the limitations of the low resolution is to combine a 3D-camera with ahigh resolution imager and to perform a fusion of the data on software level

The core of the project will be the development and elaboration of methodsfor image fusion targeting on increasing the spatial resolution of the 3Dimage and at the same improve the depth precision of the range informationThe elaboration of these methods will be done based on real data acquiredby a first prototype camera to be building up using an existing 3D cameraThe project both comprises the elaboration and development of entirelynew mathematical concepts as well as the implementation of the methods

128 Projects and Grants in 2012

for real-time applications Mathematical modelling of the camera behaviouris addressed and the development of tools for calibration

Results Best student paper award at the IEEE7th international Sympo-sium on Image and Signal Processing and Analysis (ISPA 2011) in Dubrovnik(Croatia) PhD Thesis March 2012

Publications NA

Investigation of boundary conditions for a reliable and efficientcontrol of energy systems formed by highly parallelized off-gridinvertersAcronym RELGRID2009Reference NAPI Prof Dr Juergen SachauFunding FNR-AFR-PhDBudget NABudget UL NADuration 2010-04-01 ndash 2013-03-31

Members Markus Jostock

Domain(s) NA

Partner(s)

bull CREOS

bull U Kaiserslautern

Description The work aims at providing a model which will allow pre-diction of stability for highly dynamic grids From the control perspectiveconnecting several stable components will no necessarily result in a stableoverall structure particularly when each of the components has a highlydynamic behaviour To avid hazardous interdependencies of coupled dy-namics control specifications for the single inverter controls are sought thatguarantee reliable cooperation

Results NA

Publications NA

42 Grants 129

Methods for Measuring and Predicting the Security Perfor-mance Reputation of Public NetworksAcronym SCoPeMeterReference 12R-NET-PAU-11MSRPPI Prof Dr Thomas EngelFunding FNR-AFR RedDogBudget NABudget UL NADuration 2011-03-22 ndash 2015-03-21

Members Thomas Engel Fabian Lanze Andriy Panchenko Jerome Fran-cois

Domain(s) Security Performance Wireless Networks Fingerprinting Hotspots

Partner(s)

bull Interdisciplinary Centre for Security Reliability and Trust UL

bull Red Dog Communications sa

Description In recent years the usage of Internet based services shiftedfrom fixed workplaces to mobile environments Wireless access points areavailable almost everywhere and users tend more and more to carry outonline activities on mobile devices such as smart phones or tablets This at-tracts potential attackers since most users neglect the risk of eavesdroppingdata manipulation or the possibility of an access point being controlledby a malicious entity Besides the performance of hotspots can differ sig-nificantly making it difficult for users to chose an intermediary fulfillinghisher particular requirements The goal of this project is to build a secu-rity and performance barometer system that provides long-term judgmentof hotspots regarding their performance and security reputation Informa-tion will be contributed to this system by data automatically collected andderived from a userrsquos mobile device application and userrsquos experiences Sev-eral research challenges arise from this A technique for uniquely identifyingwireless devices without trusting any third party is essential to make surethat connection is established to an authentic device Metrics for measur-ing performance and trustworthiness have to be defined in order to analyzequality of service and reputation of public networks This will be done in away that protects privacy of the clients reporting the values and at the sametime guards from malicious clients trying to subvert the system Finally wewill study the possibility to offer privacy-preserving location based servicesusing the available data In the proposal we describe the methodology howwe plan to reach our research objectives and to develop a practically usablesecurity and performance barometer for public wireless networks

130 Projects and Grants in 2012

Results The major result of this project so far is a large-scale evaluation ofunique device fingerprinting based on the unavoidable physical phenomenoncalled clock skew The method is fully implemented and can be performed onarbitrary out-of-the-box UNIX based systems It was evaluated using morethan 350 different wireless access points The resulting paper ldquoClock SkewBased Remote Device Fingerprinting - Demystifiedrdquo(FLanze APanchenkoBBraatz AZinnen) is currently under review for ACM Conference on Se-curity and Privacy in Wireless and Mobile Networks (ACM WiSec rsquo12)

Publications Three conference publications in 2011 [277] [276] [281]

Energy Optimization and Monitoring in Wireless Mesh SensorNetworksAcronym WiNSEOMReference I2R-DIR-AFR-090000PI Prof Dr Thomas EngelFunding FNR - AFR PhDBudget 37KeYearBudget UL NADuration 2010-04-08 ndash 2013-04-07

Members David Fotue Thomas Engel Houda Labiod Foued MelakessouSunil Kumar and Prasant Mohapatra

Domain(s) Wireless Sensor Networks

Partner(s) - Telecom ParisTech France- University of San Diego USA- University of California Davis USA- Ville du Luxembourg- Service de Coordination Hotcity

Description Air pollution is now considered as an important issue thatneeds to be treated as a critical phenomenon It belongs to a set of crucialphysical factors that drastically decrease peoplersquos health of human beingsIn this proposal we aim to deploy an efficient monitoring architecture ded-icated to Air Pollution in Luxembourg based on Wireless Sensor Networks(WSNs) WSNs have been the subject of much recent study and are a po-tential solution for the deploymentof measurement architectures at low costThey allow the measurement of data and their transmission towards a cen-tral workstation often called the sink in an efficient manner Currentlyair pollution monitoring is done locally over a small area The deployment

42 Grants 131

of a large set of sensors enables better mapping of pollution occurrencesat a higher measurement frequency Optimal communication in WSNs iscurrently a hot research topic For instance during the last ten years re-searchers have suggested many routing protocols in order to optimize datatransfer between network nodes We propose new routing protocols and for-warding mechanisms that increase network lifetime through the set of routediversity and efficient energy management schemes A set of maximally dis-joint paths between each sensor and the sink can partially or completelyavoid the appearance of congestion in the network The residual energy ofsensors is also taking into account our model Consequently data packetswill be forwarded towards candidates that present the widestcapabilities andhave the greatest residual energy Consequently global traffic will be spreadalong non-overlapping paths in order to increase the global WSN lifetimeThe PhD work consists of the analysis of this energy routing protocol in thecase of a real scenario that will be deployed in Luxembourg for air pollutionanalysis

Results After a study of the state of the art in the area of WSNs forenergy optimization we proposed A new Energy Conserving Routing Pro-tocol that aims to optimize the transmission cost over a path from a sourceto a defined destination in a Wireless Sensor Network The results appearsin proceedings of the 9th IEEEIFIP Annual Mediterranean Ad Hoc Net-working Worshop France 2010 New Aggregation Techniques for WirelessSensor Networks have been proposed the results appears in proceddindsof the 18th Annual Meeting of the IEEEACM International Symposiumon Modeling Analysis and Simulation of Computer and TelecommunicationSystems(MASCOTS) USA 2010 3 We study the effect of Sink Locationon Aggregation based on Degree of connectivity for Wireless Sensor Net-works The results are under reviews at the First International Workshopon Advanced Communication Technologies and Applications to Intelligenttransportation systems Cognitive radios and Sensor networks(ACTIS) Ko-rea 2011 4 We proposed a new Hybrid method to assign the channelfor Wireless Sensor Networks The results are under reviews at the 9th In-ternational Symposiumon Modeling and Optimization in Mobile Ad Hocand Wireless Networks(WiOpt) USA 2011 5 Finally we concluded allinvestigations done this year by submitting a journal paper at EURASIPJournal on Wireless Communications and Networking in the special issuerdquoLocalization in Mobile Wirelessand Sensor Networksrdquo

Publications Four related publications [276 277 364 365]

132 Projects and Grants in 2012

Information Extraction from Legislative TextsAcronym IELTReference NAPI Prof Dr Leon van der TorreFunding FNR AFR PHDBudget NABudget UL NADuration 2012-03-01

Members Llio Humphreys

Domain(s) Legal informatics Ontologies Information extraction Norms

Partner(s) Guido Boella University of Turin

Description With the growth of the internet laws can now be easilyaccessed by most citizens but with normative production increasing at Eu-ropean national and regional levels citizens and organisations need moreadvanced tools to understand the law within their domain of interest Legalinformatics is a growing field of research Legislative XML legal ontolo-gies and reasoning for normative systems have reached a point of maturityHowever building such resources beyond narrow applications involves a pro-hibitively expensive level of manual effort Advances in natural languageprocessing tools such as part-of-speech taggers and parsers the growingusage of statistical algorithms for handling uncertainty and the availabil-ity of semantic resources such as WordNet and FrameNet has resulted inrobust information extraction tools Information extraction for law is anunder-researched area Legal text particularly legislative text has partic-ular features that pose significant challenges - long sentences with severalclause dependencies lists where each item are usually not standalone sen-tences and references to other articles the content of which is not quotedwithin the referring article This research investigates the transformation oflegislative text into normalized sentences representation in formal logic andinformation extraction for ontologies

Results My first year in the doctoral programme has mainly involved for-mal and informal study of relevant topics at the Universities of LuxembourgTurin and Delft as well as publications on legal informatics and complianceCourses in transferable skills have been omitted in this account

bull study of propositional logic belief revision and dynamic epistemiclogic information extraction and data mining in Luxembourg andof the Pi-calculus in Turin

bull essay on Theory Change and Law

42 Grants 133

bull research visit to Joris Hulstijn University of Delft for the study ofcompliance monitoring systems

Publications

bull Conference papers

ndash [81][82][253]

bull Book chapter

ndash [83]

Security LogicsAcronym LOSECReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding FNR-AFRBudget NABudget UL NADuration 2009-09-01 ndash 2012-09-01

Members Valerio Genovese

Domain(s) Authorization Access Control Modal Logic

Partner(s) NA

Description Access Control Authorization and Authentication are main-stream topics in computer science security that can be grouped under thenotion of rdquotrust managementrdquo In an increasingly interconnected world secu-rity policies are evolving from a static disconnected environment to a highlydynamic and distributed one (eg Internet Social Networks)

The main aim of this project is to create a formal and expressive logicthrough which computers can reason to grant access to external entitiesand users can model and specify in a clear and explicit way what are thepolicies which govern their systems The new logic we plan to develop deeplyextends and enrich existing approaches appeared in the literature We alsoplan to create a calculus for this logic in order to define an efficient algorithmto automatize the reasoning process for large scale applications From themodelling point of view we aim to define a model checking methodology toassist ICT security officers in crafting secure and stable systems

Results

134 Projects and Grants in 2012

bull Seq-ACL+ (software)

bull ACL-Lean (software)

bull delegation2spass (software)

bull macl2spass (software)

bull secommunity (software) available at httpwwwdiunitoit~genovesetoolssecommunitysecommunityhtml

Publications [10][242]

Valerio Genovese Modalities for Access Control Logics Proof-Theory andApplications University of Luxembourg 2012

Programming Cognitive RobotsAcronym ProCRobReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding FNR-AFRBudget NABudget UL NADuration 2011-05-20 ndash 2014-05-20

Members Pouyan Ziafati

Domain(s) Agent Programming Languages Robotics

Partner(s) Mehdi Dastani Utrecht University

Description The ProcRob project aims at extending existing agent pro-gramming languages with sensory and action components to support theirapplication in autonomous robot programming

Results

bull The requirements of agent programming languages for autonomousrobot programming have been identified and presented in the ProMASworkshop of the AAMAS 2012 conference and published in the BNIAC2012 conference [84]

bull An environment software library for 2APL agent programming lan-guage has been developed which facilitates its integration with ROSthe current de facto standard robotic framework

42 Grants 135

bull A face recognition software package for ROS has been developed andreleased publicly

bull A demo application of NAO robot using 2APL and ROS has beendeveloped In this demo NAO can recognize faces and be controlledby voice A more complex demo application for NAO is under thedevelopment including path planning while avoiding obstacles

bull A more detailed analysis of the agent programming languages require-ments for event processing in autonomous robot programming has beenperformed and a software library for addressing such requirements iscurrently under the development The result has been submitted toAAMAS 2013 In this work an extension of ETALIS event process-ing language has been proposed to develop sensory components for anautonomous robot

Publications [84]

Trust in argumentation-based negotiationAcronym TABNReference F1R-CSC-LAB-05ILIAPI Dr Srdjan VesicFunding FNR-AFR-PostdocBudget NABudget UL NADuration 2012-10-01 ndash 2013-01-14

Members Srdjan Vesic

Domain(s) Argumentation Negotiation Trust

Partner(s) NA

Description he goal of the project was to study the notion of trust inargumentation-based negotiation in particular to study the notion of n-aryattack relations

Results Due to the early termination of the contract only its first partwas finalised It was to study the notion of n-ary attack relations Thischallenge was selected as the first research objective since existing argu-mentation systems rely on binary attack relations and I believe that a moregeneral framework allowing for ternary (or more) attack relation is necessaryin argument-based negotiation I worked on this problem with Dr MartinCaminada We plan to finish the work and submit it to an international

136 Projects and Grants in 2012

journal

I also worked with Dr Madalina Croitoru (University of Montpellier II) oncreating an argumentation framework for reasoning in the scenario whereseveral agents have individually consistent ontologies but the union of allthe ontologies is inconsistent This argumentation formalism can be used byagents to negotiate ie to send only some data from their ontology in form ofarguments (compared to the existing approach where the union of ontologiesis created in a centralised place) This is a step forward considering theprivacy and the notion of trust in this type of negotiation is to be carefullystudied

Publications Some papers were submitted

Logical Approaches for Analyzing Market Irrationality compu-tational aspectsAcronym LAAMIReference I2R-DIR-AFR-090000PI Prof Dr Leon van der TorreFunding FNR-AFRBudget 117 840eBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members Mikoaj Podlaszewski Martin Caminada Tibor Neugebauer

Domain(s) market efficiency finance epistemic reasoning

Partner(s) Luxembourg School of Finance

Description The proposed PhD project is to be carried out in closecooperation with the recently approved LAAMI (CORE) project (LogicalApproaches for Analyzing Market Irrationality) which aims to apply theparadigm of agent-based computational economics (Tesfatsion and Judd2006) to model complex reasoning processes in a market setting Basicallywe assume a market in which the main product is information and com-plex analysis on an issue that does not provide immediate feedback fromthe objective world We are interested in examining under which conditionsthe information providers (consultants) have sufficient incentives to providegood quality analysis to their clients The preliminary results of a prototypesoftware simulator (Staab and Caminada 2010) as well as other research(Mathis et al 2009) indicate that these incentives are not always strongenough to rule out providing low quality information If such becomes thepervasive strategy of the consultants there are consequences regarding the

42 Grants 137

informedness not only of individual information consumers (clients) but alsofor the system as a whole since unfounded collective beliefs can easily leadto various forms of market imperfections In essence we would like to ex-plain these market imperfections by examining how markets can becomeill-informed For this we use the technique of agent-based simulation Thespecific role of the PhD student will be to focus on implementation aspectsas well as on aspects of computability and bounded rationality of individualagents

Results

bull In [55] we examined an argument-based semantics called semi-stablesemantics which is quite close to traditional stable semantics in thesense that every stable extension is also a semi-stable extension Oneadvantages of semi-stable semantics is that for finite argumentationframeworks there always exists at least one semi-stable extension Fur-thermore if there exists at least one stable extension then the semi-stable and the stable extensions coincide Semi-stable semantics canbe seen as a general approach that can be applied to abstract ar-gumentation default logic and answer set programming yielding aninterpretation with properties similar to those of paraconsistent logic

bull In [165] we introduced a unified logical approach based on QuantifiedBoolean Formulas (QBFs) that can be used for representing and rea-soning with various argumentation-based decision problems By thiswe were able to represent a wide range of extension-based semantics forargumentation theory including complete grounded preferred semi-stable stage ideal and eager semantics Furthermore our approachinvolved only propositional languages and quantifications over propo-sitional variables making decision problems like skeptical and cred-ulous acceptance of arguments simply a matter of logical entailmentand satisfiability which can be verified by existing QBF-solvers

bull One of the differences between the fields of dialogue theory and thefield of (Dung-style) argumentation is that the former is mainly con-cerned with procedural aspects of discussion whereas the latter ismainly concerned with the results of a nonmonotonic reasoning pro-cess Nevertheless one can use dialogue theory as a conceptual basisfor Dung-style argumentation semantics The idea is that an argu-ment is accepted if and only if it can be defended in formal dialogueMoreover different argumentation semantics can be shown to coincidewith different types of dialogue In [151] we showed that groundedsemantics can be described in terms of persuasion dialogue providingan implementation of this dialogue in [150]

138 Projects and Grants in 2012

Publications [55] [165] [151] [150]

Green Energy-Efficient ComputingAcronym Green EECReference PDR-09-067PI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2010-04-01 ndash 2012-03-31

Members Alexandru-Adrian Tantar

Domain(s) decentralized algorithms global optimization dynamic envi-ronments with uncertainties

Partner(s) NA

Description Large scale computing environments like data centers can befunctionally defined by several dynamic factors At the same time depend-ing on for example availability constraints nature of the energy sourcesor computational load distribution different stochastic factors need to beconsidered as well Energy-efficient computing therefore requires not only tocomply with contradictory objectives eg provide full computational powerwhile minimizing energy consumption but also demands anticipating theimpact of current decisions dealing with uncertainties like low power andemergency operation or provide fault tolerance all in an autonomic mannerFrom a multi-objective optimization perspective there is a need to under-stand and deal with the concepts that define a dynamic environment in thepresence of stochastic factors and provide corresponding models

Results As part of the existing framework a system is defined as a col-lection of interacting autonomous nodes [310] described by overall and localsystem load performance and energy consumption balance operating price(off) load rate task acceptance etc Energy vs performance trade-off re-quirements can be expressed as a resultant of operating costs emergencylevel or thermal readings At node level transitions are conducted by ex-pert systems (decentralized approach) that dynamically control frequencyand voltage task (off) load rate and type (communication or computationintensive) or power states A strategyscenario driven anticipation model isused to determine the outcomes and consequences of current decisions

As a continuation of the practical study and in order to provide the requiredformal support an analysis of the nature of dynamic and stochastic factors

42 Grants 139

that are considered in optimization problems was conducted This led to theidentification and modeling of four classes along with different performancemeasures [302 303] as follows (a) first order dynamic transform of the in-put parameters (b) second order evolution of the objective function(s) (c)third order parameter or function state time-dependency (d) fourth ordertime-dependent environment Also in addition to the previous design thecurrent model is defined to provide support (as part of the dynamic opti-mization process) for priority and expected due date based local schedulingpolicies transitions between active and shutdown states or the managementof volatile environments In parallel a dynamic preemptive load balancingmodel with stochastic execution times in heterogeneous environments wasdeveloped [301] This model considers different node constraints eg stor-age and computational load while being able to deal with a series of powerstates for minimizing energy consumption Defined objectives include mem-ory and computational load balancing energy number of active physicalmachines and passive tasks or virtual machines Last a study on land-scape approximation using generalized quadratic forms is currently beingcarried for characterizing and tracking local optima describing robustnessconfidence radius and sensitivity analysis

Publications NA

Confidentiality Integrity issues in distributed computationsAcronym CIDCReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2010-01-01 ndash 2013-12-31

Members Benoit Bertholon

Domain(s) Confidentiality of execution Integrity of execution CloudComputing IaaS Trusted Platform Modules Parallel and Distributed Com-puting

Partner(s) NA

Description Computing grids as defined in [Fos97] are distributed infras-tructures that gather thousands of computers geographically scattered andinterconnected through the Internet A simple concept that has emerged outof such an architecture is that of cloud computing (CC) where customers do

140 Projects and Grants in 2012

not own or rent any part of the infrastructure They simply use the availableservices and pay for what they use

The CC paradigm currently arouse enthusiasm and interest from the privatesector because it allows to reduce computing cost at a time where computingpower is primordial to reach competitiveness Despite the initiative of severalvendors to propose CC services (Amazon Google etc) several researchquestions remain open especially as regards security aspect from the userpoint of view CC highlights strong needs in integrity certifications andexecution confidentiality the latter focusing few academic interest until nowThe current policy at this level is to blindly trust the vendor providing theCC service This doesnrsquot hold for critical applications that eventually use orgenerate sensitive data especially when physical machines are distributedin different administrative domains and shared with other users that maybe business competitors

In the framework of the CC paradigm the purpose of this PhD is thereforeto investigate and design novel mechanisms to cover the following domains

- confidentiality of both application code and user data- integrity and fault-tolerance to provide guarantees on programs anddata either before during or after a run on the CC platform

To make this study more concrete the developed solutions must be validatedon a CC platform build on top of the University of Luxembourgrsquos computingclusters and the Grid5000 platform

By addressing those issues this PhD opens the perspective of intellectualpatents in a key area able to address industrial needs in an emerging tech-nology

Results In the preliminary work I studied the TPM I read the documentsissued by the Trusted Computing Group (TCG) regarding the specificationof the TPM as well as other papers using the TPM for different purposesThis has been done in order to develop what has been the main contributionof the first year CertiCloud

CertiCloud is a framework developed to verify the integrity of a runningVirtual Machine in a Cloud environment The creation of this first versionis based on a network communication protocol which has been developedand studied specifically for CertiCloud The resulted implementation is inpython for simplicity and fast prototyping The CertiCloud frameworkconsist as well in patches to adapt the Cloud scheduler to take into accountthe protocols developed This framework has been integrated in Nimbus bycreating some small patches specifically for this platform and can be easily

42 Grants 141

modified to use other Cloud platforms This lead to publications [323] [288]and [289]

The second part of the PhD is on obfuscation techniques and how to applythem to decrease the readability of a source code The software JShadObf[324] has been developed to validate the approach and to develop new tech-niques and metrics allowing better code obfuscation The literature [317][318] [319] [320] [321] has been studied to implement the state of the artin JShadObf

After the study compiler techniques and parsing softwares such as BisonANTLR [322] or bnfc ANTLR has been selected to parse JavaScript codeand a grammar has been developed ANTLR has many advantages such asbeing an active project generating parser in different languages (includingpython) and allowing the generation of the Abstract Syntax Tree Many codetransformations has been implemented such as the insertion of dead code theinsertion of predicates the generation of dummy expressions the outliningof code and the modification of the control and data flow Combined withevolutionary algorithms the transformations and the metrics are used tomutate and rate the generations creating multiple obfuscated versions ofthe same source code

This lead to publications under review to NSS2013 and NIDISC2013 (ac-cepted)

Publications [323]

Reliability of Multi-Objective Optimization techniquesAcronym REMOReference TR-PHD BFR07-105PI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2010-10-01 ndash 2012-09-30

Members Emilia Tantar

Domain(s) evolutionary techniques dynamic multi-objective optimiza-tion performance guarantee factors particle methods robustness

Partner(s) NA

Description The real-world optimization problems arising from disci-plines as various as Green IT or systems biology all have in common the

142 Projects and Grants in 2012

growing complexity of the problems to be optimized due to the need of scala-bility to larger environments or the number and type of factors needed in de-scribing the system and these are by far the only aspects to consider Otherdifficulties coming from the sensitivity of problems to dynamical changesoccurring in the environment or the need of handling several objectives si-multaneously should also be considered Evolutionary algorithms which area class of stochastic optimization methods constitue one of the commonlyused alternative in finding a good approximate solution for these problemsNevertheless their efficiency is mainly proved through experimentally at-tained performances Given the consequences of applying non-reliable solu-tions in the safety and security of complex systems (ex with applicationsin medicine) performance guarantee factors that overpass the experimentalboundary should be considered Therefore a framework allowing to quantifythe expected performances of the used techniques represents the main goalof this research

Results The aim of this project is the study of evolutionary algorithmsthat scale performances from theory to practice The focus is set on provid-ing performance guarantee factors for the study of multi-objective complexsystems including factors such as dynamism distributed behavior or the oc-currence of stochastic factors The first step consists in constructing a solidframework through the identification and design of the different classes ofproblems that can occur This has been done for the dynamic multi-objectivecontext towards a classification which allowed us to identify classes that lacka common ground for study [302 303]

As the faced real problems have different characteristics in order to compareand analyze the performances of various approximation techniques com-mon testbeds are required Synthetic or randomly generated problems areneeded in providing different fitness landscape structures or correlations be-tween objective functions or variables over time By understanding how dif-ferent techniques react to modifications occurring in the problem structurethe extent of their generality can be quantified To this end we proposedseveral variants of MNK-landscapes in order to fill the lack of syntheticproblems for online dynamic multi-objective problems Furthermore webuilt a new metric that tracks the set of best approximate solutions in time[303]These results were scaled to real-life problems arising from sustainableICT as the load balancing of resources [301]

In the context of dynamic environments we studied the stability of evo-lutionary algorithms for which the value of the objective functions changesdynamically subject to stochastic factors One of the application that I usedin order to illustrate the advantages and simplicity of this generic frameworkis by the convergence results that I provided in the case of distributed evo-lutionary algorithms subject to cheating [309]

42 Grants 143

Publications NA

Community-based Vehicular Network for Traffic Information inLuxembourgAcronym LUXCommTISReference PHD 2011-1ISPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2011-09-01 ndash 2014-08-31

Members Agata Grzybek

Domain(s) vehicular ad hoc networks coperative traffic information sys-tems trust management optimisation

Partner(s) NA

Description The near future will see a rapid proliferation of wireless com-munication technologies to vehicles allowing creation of wireless VehicularAd Hoc Networks (VANETs) The main motivation for this research is ve-hicular traffic efficiency in Luxembourg The objective of this PhD projectis to propose a cooperative traffic information system based on VANETs Itsmain goal is to capture evaluate and disseminate information about trafficsituation in Luxembourg received from vehicles connected by VANETs Thesystem is envisioned as an extension of the current solutions coordinated bycentralised traffic information agency These solutions are based on fixed in-frastructure like cameras and infrared sensors The information they provideis primarily limited to highways The VANET-based extension will allow areal-time trip planning based on up-to-date traffic information for all typesof roads The role of VANET-based part will be to collect traffic data ex-change it within the network and share it with the agency The role of theagency will be to collect the date from VANETs evaluate its quality inte-grate and disseminate to vehicles The use of the of vehicular-community andtrust management techniques will be used to ensure high quality of informa-tion The research will focus on the analysis modeling and implementationof novel mechanisms for (i) distributed VANET-based traffic data collec-tion (ii) efficient traffic data dissemination (within VANETs and betweenVANETs and traffic information agency) (iii) trust and user managementtechniques enabling to evaluate traffic data quality and trustworthiness ofsystem users To evaluate the system the project will also develop a gener-ator of realistic vehicular traffic for Luxembourg

144 Projects and Grants in 2012

Results The aim of this project is to propose Traffic Information System(TIS) using architecture based on Vehicular Ad Hoc Networks

bull Initial research requires a comprehensive literature survey in areas con-nected with VANETs (a) Network standards DSCR IEEE 80111pWAVE WiMax LTE (b) Routing protocols broadcast multicast(topology location based) unicast (c ) Traffic engineering (d) Trafficassignment (e) Game theory (f) Social networks

bull The first objective is to provide a framework for VANETs simulationwhich joins the latest versions of the most advanced Network Simu-lator (NS-3) with Traffic Simulator (SUMO) in a bidirectionaly wayThe aim of the developed simulation platform is to reproduce realistictraffic behavior in Luxembourg and then analyse and asses benefitsthat can be obtained by implementation of VANETs application Thepart of the project is to extend and optimise the realistic mobilitytraces generator (VehlLux)

bull After developing simulation platform TIS will be proposed Algorithmfor the evaluation of the quality of traffic information and new dissem-ination protocol will be tested and evaluated

Publications NA

Holistic autonomic Energy and thermal aware Resource Alloca-tion in cloud computingAcronym HERAReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget 37288eBudget UL NADuration 2011-09-15 ndash 2014-09-14

Members Mateusz Guzek

Domain(s) Cloud Computing Holistic Model Resource Allocation Multi-Objective Optimization Multi-Agent System Energy-Aware

Partner(s) Tri-ICT

Description Cloud Computing (CC) is a concept that has emerged outof the conception of heterogeneous distributed computing grid computingutility computing and autonomic computing Based on a pay-as-you-go

42 Grants 145

model it enables hosting pervasive applications from consumer scientificand business domains However data centers hosting Cloud applicationsconsume huge amounts of energy contributing to high operational costs andcarbon footprints to the environment Therefore Green Cloud computingsolutions are needed they should not only save energy for the environmentbut also reduce operational costs

Although Green computing in Cloud data centers has brought a tremen-dous interest many of the current green activities represent isolated op-timizations focusing on processing units memory networking or coolingIn order to efficiently manage Cloud data centersrsquo energy consumption wemust tackle the problem in a holistic manner which considers the variousresources and thermal aspects within the cloud computing as a whole Inthis context the aim of this PhD project is to design and develop a newholistic and autonomic energy-efficient approach to efficiently manage theresources of a CC The main milestones of this project are

bull creation of a novel holistic model In order to efficiently manage data-centersrsquo energy consumption we must tackle the problem in a holisticmanner

bull centralized optimization of the CC processing by multi-objective light-weight meta-heuristics using created holistic model to the least ensurethat a proper working of the CC system is established

bull proposition of a decentralized autonomic system which will dynami-cally optimize the CC system

The results of the centralized and decentralized system will be benchmarkedand then compared Final system will be tested using realistic assumptionsusing the field expertise supported by Tri ICT company

Results During the preparatory part of the project in the period 01012011-14092011 a number of publications were produced They investigate theprocessing (CPU) and its energy aspects of resource allocation

bull rdquoEnergy-Aware Scheduling of Parallel Applications with Multi-ObjectiveEvolutionary Algorithmrdquo EVOLVE 2011 [285]

bull rdquoScalable and Energy-Efficient Scheduling Techniques for Large-ScaleSystemsrdquo SCALSOL 2011 [294]

bull rdquoEnergy-Aware Fast Scheduling Heuristics in Heterogeneous Comput-ing Systemsrdquo OPTIM 2011 [295]

The first year of the project was devoted to holistic model creation andcentralized approaches exlporation and refinement which resulted in one

146 Projects and Grants in 2012

published conference paper [170] and one journal submission still under re-vision Additionally the multi-agent track of the project was tackled result-ing in one accepted conference submission to appear in 2013 The currentwork includes holistic model verification and development of Green Cloudsimulator

Publications NA

Energy-Efficient Networking in Autonomic Cloud ComputingAcronym INTERCOMReference PDR 2010-2ISPI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2011-06-01 ndash 2013-05-31

Members Dzmitry Kliazovich

Domain(s) Energy efficiency Cloud Computing Data center communica-tions

Partner(s) NA

Description The proposed INTERCOM project aims to provide a holisticenergy-efficient solution to autonomous management of interconnection net-works in a cloud computing environment It is a part of the currently ongoingFNR-COREGreen-IT project funded by Fonds National de la Recherche(FNR) Luxembourg The INTERCOM project aims to develop novel tech-niques and deliver efficient solutions in the form of prototype software mod-ules for energy-efficient performance optimization of (a) networking com-ponents (links transceivers switches etc) (b) data center communicationsystem as a whole and (c) communication protocols Most of current energyefficient solutions for data centers focus solely on either computing fabricoptimization or thermal management and only a few solutions account fornetworking aspects Therefore providing a holistic energy-efficient solutionfor a communication network at both hardware components and systemlevels of hierarchy constitutes the main innovative point of the project

Results One of the main results achieved in the project is related tothe release of GreenCloud simulation platform capable of fine-grained sim-ulation of cloud computing environments focusing on communication andenergy efficiency The GreenCloud platform is available for download athttpgreencloudgforgeunilu The detailed description of GreenCloud

42 Grants 147

and its components was published in Journal of Supercomputing specialissue on Green Networks citeKliazovich7483 Furthermore the Green-Cloud platform formed the basis for developing energy-efficient network-aware scheduling approaches published in Cluster Computing special issueon Green Networks in 2011 and in the IEEE International Conference onCloud Networking (CLOUDNET) citeKliazovich9732

Publications NA

Decision-theoretic fine tuning of multi-objective co-evolutionaryalgorithmsAcronym DeTeMOCGAsReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2011-09-15 ndash 2014-09-14

Members Sune Steinbjoern Nielsen

Domain(s) Coevolutionary Genetic Algorithms Multi-Objective Opti-mization Decision theory Algorithm Fine-Tuning Systems Biology

Partner(s) LCSB

Description Most real world problems are extremely hard and approxi-mated approaches are used to solve them As a solution meta-heuristicsare nowadays used in many places from cutting steel bars to logistics toportfolio management on stock exchange But these parameter-based algo-rithms are either using some default value or hand tuning which might leadto very suboptimal results This PhD project aims at providing an analysisdesign and experimentation of Adaptive Multi-objective Competitive Co-evolutionary Genetic Algorithms a term that combines several state-of-the-art concepts from various fields We aim at reaching the following researchobjectives

bull Design and implement a novel competitive multi-objective coevolu-tionary genetic algorithm based on a game-theoretical model

bull Develop a decision-theoretic approach based on Markov decision pro-cesses game theory and fuzzy logic which will allow the adaptation(offline or online) of the local operators and parameters of the devel-oped algorithm so as to optimize its performance in practical prob-

148 Projects and Grants in 2012

lems

bull Carry out a detailed analysis of the special case of adaptive multi-objective competitive evolutionary algorithms which - to the best ofour knowledge - has not been addressed so far in the literature

bull Validate experimentally the new algorithms on cutting-edge problemsfrom Systems Biology in collaboration with the Luxembourg Centrefor Systems Biomedicine (LCSB) providing new tools for the analysisof biochemical (geneprotein) interaction networks

In addition to the novelty of using decision theory and machine learningto help steeringcontrolling game-theoretic models for global optimizationand the uniqueness of its meta-model representation this PhD project willalso provide a scientific bridge between the Luxembourg Centre of SystemBiomedicine (LCSB) and the Computer Science and Communications re-search unit (CSC)

Results Below is a list that enumerates the results obtained until now

bull Implemented cooperative co-evolutionary in jCell and adapted andoptimised the VehILux model The model was extended to supportmore fine-grained tuning as well as decomposed to specifically suit thecooperative coevolutionary algorithm The intelligent model decom-position was shown to help the coevolutionary algorithm find betterresults than both random decomposition and single population ap-proaches (article submitted to Genetic and Evolutionary ComputationConference - GECCO 2013)

bull Started collaboration with LCSB on a cutting edge protein-structureoptimisation problem

Publications

bull Improved a state-of-the-art cooperative co-evolutionary multi-objectiveevolutionary algorithm [300] by an alternative asynchronous imple-mentation in the jMetal(java) framework The modification imple-mented produced an additional speedup of 14 times on average andup to 19 times in best test cases (article submitted to Congress onEvolutionary Computation - CEC 2012)

bull Novel Efficient Asynchronous Cooperative Co-evolutionary Multi-ObjectiveAlgorithms [300]

42 Grants 149

Energy-Performance Optimization of the CloudAcronym EPOCReference AFR MARP C09IS05PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget 10812558 eBudget UL NADuration 2010-09-01 ndash 2013-08-31

Members Frederic Pinel

Domain(s) energy-efficiency cloud computing optimisation

Partner(s) North Dakota State University USA

Description This MARP PhD project as part of the overall FNR COREproject Green-IT will contribute to the solution of the energy efficiency inthe following ways

bull Model the computing clouds so that new methods can be designedto tackle the challenge This involves mathematical analysis of thevarious parts of the cloud

bull Based on the models defined previously design new algorithms (forexample from the fields of meta-heuristics and game theory) to energy-efficiently allocate resources of the cloud to client requests

bull Design methods for autonomic management of the cloud Distributedagents will cooperate to allow the cloud to self-recover from any inci-dent

bull Validate the implemented algorithms on large scale real-world infras-tructures Both Grid 5000 and North Dakota State Data Centers areavailable for this step

In addition to the theoretical contributions this project will develop realsoftware solutions

Results In order to find new algorithms to solve a scheduling problemwe used a statistical method to assist in the design of algorithms [38] Thisalgorithm was then applied to the energy-efficient mapping of tasks on a dis-tributed platform including recent low-power clusters operating the ARMprocessors

A new metaheuristic was designed specifically for the GPU [39] This al-gorithm was applied to the problem of scheduling tasks to a distributed

150 Projects and Grants in 2012

system such as a cloud or cluster This algorithm introduces a new sourceof concurrency that enables larger problem sizes to be solved on the GPUparallel computing platform

Publications See results

Risk Prediction Framework for Interdependent Systems usingGraph TheoryAcronym TIGRISReference PHD-09-103PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2009-10-15 ndash 2012-10-14

Members Thomas Schaberreiter

Domain(s) critical infrastructures security modelling graph modelling

Partner(s) NA

Description Critical infrastructure protection is an up-to-date topic Crit-ical infrastructure is usually composed of interdependent systems that relyon each other in order to function correctly or provide adequate securityThe interdependencies of the systems are usually quite complex to under-stand and therefore modelling of the infrastructure and its interdependenciescan be helpful in determining the security requirements During this worka model of interdependent systems based on graph theory will be proposedthat aims to model the security attributes of interdependent systems Ade-quate ways to model the security properties of infrastructure as well as of theinterdependencies will have to be found in order to achieve a close-to-realitymodel Furthermore machine learning tools will have to be developed inorder to process the graph and allow real-time simulations

Results

bull A method for critical infrastructure dependency analysis for criticalinfrastructure security modelling was investigated and published atCRITIS2011 conference (rdquoRisk assessment in critical infrastructure se-curity modelling based on dependency analysis (short paper)rdquo [341])

bull For the IST-Africa conference a publication about the critical infras-tructure security modelling approach and RESCI-MONITOR a crit-

42 Grants 151

ical infrastructure service risk monitoring tool were described andpresented (rdquoCritical Infrastructure Security Modelling and RESCI-MONITOR A Risk Based Critical Infrastructure Modelrdquo [339])

bull A trust-based method to evaluate the impact of a dependent critical in-frastructure service to a critical infrastructure service was investigatedand published CRISIS2011 conference (rdquoTrust based interdependencyweighting for on-line risk monitoring in interdependent critical infras-tructuresrdquo [338])

bull A set of assurance indicators that can evaluate correctness of calculatedcritical infrastructure service risk was investigated and published atCRITIS2011 conference (rdquoAssurance and trust indicators to evaluateaccuracy of on-line risk in critical infrastructuresrdquo [340])

Publications NA

Dynamic MixVoipAcronym DYMOReference 4105139PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2012-11-01 ndash 2015-10-31

Members Ana-Maria Simionovici

Domain(s) Optimization Learning and Anticipation Load BalancingVirtualization Evolutionary Computing Particle Algorithms

Partner(s) MixVoIP

Description The aims and context of this research project are built ona collaboration between the Computer Science and Communications (CSC)Research Unit University of Luxembourg and MixVoIP a Luxembourgbased company specialized in VoIP services The solutions currently de-ployed by MixVoIP while executed inside clouds are monolithic and notnatively designed for such environments As such the nature of the opera-tions carried by MixVoIP is deeply static and does not allow coping with thehighly dynamic evolution of requests load or other stochastic events There-fore in an effort of addressing those problems several axes of research will beinvestigated including dynamic optimization based on incoming load analy-sis and prediction resource allocation load balancing or energy-efficient op-

152 Projects and Grants in 2012

timization and management The study will hence investigate and proposenovel solutions that effectively combine evolutionary computing algorithmsexact methods learning and anticipation techniques (expert systems neuralnetworks and auto-regressive models) as well as resource allocation and loadbalancing methods All proposed approaches will be first tested on syn-thetic data benchmarks designed out of MixVoIP logs for the cloud-basedenvironment currently in use and last inside the real-life actual platformExpected outcomes and implications consider a significant extension of hestate of the art (with respect to dynamic predictive driven optimization)and our knowledge on how dynamic systems can be modeled and dealt within the presence of high magnitude stochastic factors At a practical levelas a direct application of those paradigms it is expected to attain an im-provement in voice quality and energy efficiency with a direct connection toinfrastructure management costs and performance

Results NA

Publications NA

Satellite Payload Reconfiguration OptimizationAcronym SaPROReference 1094873PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2010-11-15 ndash 2013-11-14

Members Apostolos Stathakis

Domain(s) Satellite Payload Reconfiguration Exact algorithms Combi-natorial Optimization

Partner(s) SES Betzdorf Luxembourg

Description In order to answer the modern requirements for flexibilityand efficiency in communication satellites services the complexity and thesize of satellite payloads increases significantly As a consequence the man-ual management of the payload reconfiguration process is getting difficultand error prone for the engineers The problem of optimally configure andreconfigure the satellite payload is a multi-objective problem that comprisesobjectives like different path losses outage time to customers or threat tothe onboard equipment during the sequence of changes that would need tobe made to the switch matrix difficulty on restoring service for any single

42 Grants 153

amplifier failure etc This PhD work aims at addressing those issues withcontributions in the following domains

bull Payload architecture modeling propose a modular and scalable satel-lite payload architecture mathematical model describing all technicalconstraints and operational objectives

bull Multi-objective optimization provide payload configurations with op-timal or near optimal solutions for the whole set of objectives andrespecting all the satellite technical constraints

In addition to the theoretical contributions this project will develop a soft-ware framework that will help payload engineers to optimally reconfigurethe payloads efficiently

Results An Integer Linear Programming (ILP) model has been proposedfor the satellite payload reconfiguration problem that has been validatedwith success on realistic payloads The model describes the main opera-tional objectives It is extendable to new ones that may be of interest forthe satellite operator Additionally apart from its flexibility that allows theengineers to use the model for any payload system it interacts efficientlywith the internal software tools used by the engineers [173] [79] Theprocess of payload reconfiguration is a time critical operation It could bedemonstrated by the experimental results that many single and bi-objectiveproblem instances could be solved exactly within an acceptable time limitdefined by the engineers [78] However this is not the case for larger andmore complex instances where the required computational time for optimalsolutions may exceed the acceptable time constraints [79] We thus investi-gate metaheuristic methods to generate optimal or near optimal solutionsA first method that applies a local search algorithm was proposed and im-plemented providing promising results [325] A software framework thatintegrates the current theoritical results has been developped and is used bythe satelltie operator

Publications NA

154 Projects and Grants in 2012

A Computational Framework for Apprehending Evolving Mal-ware and Malware EngineersAcronym ANTI-MALWAREReference NAPI Dr Simon KramerFunding FNRndashAFR Post DocBudget 103 236 eBudget UL NADuration 2011-01-01 ndash 2012-12-31

Members Simon Kramer Sjouke Mauw

Domain(s) applied modal logic malware

Partner(s) NA

Description Simon Kramer carries out an AFR-FNR project that willdeliver a computational framework for apprehending evolving malware andmalware engineers In recent years the problem of malware (so-called ma-licious soft- and hardware and even entire computer networks) has becomea security-critical issue of national and even international importance withthe typical accompanying phenomenon which is the one of an arms raceThe proposed framework will address the multiple dimensions of the mal-ware problem in a unified way These dimensions are of spatial temporaleconomic legal and psychological nature The proposed framework willempower the multiple stake holders of computer systems which are theirdesigners and users the detectives and judges of malware engineers and thenational policy makers with computer assistance in their respective tasksThese tasks are the design of correct computer systems the safe use of com-puter systems the catching and conviction of malware engineers and thetaking of informed decisions and effective counter-measures against theserecent perpetrators of societal security

Results NA

Publications In 2012 the project resulted in the following publications [260261 262 263 264]

42 Grants 155

A Formal Approach to Enforced Privacy Modelling Analysisand ApplicationsAcronym EPRIV-MAAReference PHD-09-027PI Prof Dr Sjouke MauwFunding FNRndashAFRBudget 105222eBudget UL 105222eDuration 2009-12-01 ndash 2013-11-30

Members Sjouke Mauw Jun Pang Hugo Jonker Naipeng Dong

Domain(s) formal methods verification model checking security privacye-services

Partner(s) ENS Cachan Paris France

Description The project is part of a peerndashreviewed UL research projectEPRIV mdash lsquoA Formal Approach to Enforced Privacy in e-Servicesrsquo Theoverall goal of this project is to develop a domainndashindependent formal frame-work to express the proposed concept of enforced privacy We extend thenotion of enforced privacy outside the domain of voting Our formalizationwill take into account coalitionndashforming and defensive options Moreoverwithin this framework algorithms to verify these requirements will be de-veloped to facilitate verification with tool support This generic goal iscomposed of the following sub-goals

bull Lifting the notion of enforced privacy to other e-service domains suchas online auctions anonymous communications and healthcare andformalizing the resulting notions

bull Establishing per-domain formal notions to verify enforced privacy

bull Capturing these notions in a domain-independent formal framework

bull Investigating enhancements to the formal framework to verify privacy

Results The paper lsquoFormal Analysis of Privacy in an eHealth Protocolrsquo wasaccepted and presented at at the 17th European Symposium on Research inComputer Security ndash ESORICSrsquo12 [141]

Given the nature of health data privacy of eHealth systems is of prime im-portance An eHealth system must enforce that users remain private evenif they are bribed or coerced to reveal themselves or others Consider ega pharmaceutical company that bribes a pharmacist to reveal information

156 Projects and Grants in 2012

which breaks a doctorrsquos privacy In this paper we identify and formal-ize several new but important privacy notions on enforcing doctor privacyThen we analyze privacy of a complicated and practical eHealth protocolOur analysis shows to what extent these properties as well as propertiessuch as anonymity and untraceability are satisfied by the protocol Finallywe address the found ambiguities resulting in privacy flaws and proposesuggestions for fixing them

Publications The project resulted in the following publication in 2012[141]

Games for Modelling and Analysis of SecurityAcronym GMASecReference FNRndashAFR PHD-09-082PI Prof Dr Sjouke MauwFunding FNRndashAFRBudget 140000eBudget UL 140000eDuration 2009-11-01 ndash 2013-10-31

Members Sjouke Mauw Matthijs Melissen Wojciech Jamroga Leon vander Torre

Domain(s) formal methods game theory security imperfect informationgames verification model checking

Partner(s)

bull Universite Libre de Bruxelles Belgium

bull Colorado State University USA

bull GAMES Network

Description Game theory models the strategic interaction among vari-ous agents assuming each of the agents strives to increase his own pay-offSuch an interaction frequently occurs in security problems Examples arethe interaction between the attacker of a system and its defender or the in-teraction between two possibly dishonest participants in a security protocolTherefore game theory is a particularly relevant tool in the field of security

The GMASec project is executed in the context of the SndashGAMES projectand is a joint project of the SaToSS group headed by Prof Sjouke Mauwand the ICR group headed by Prof Leon van der Torre

42 Grants 157

Results A paper lsquoFairness in Non-Repudiation Protocolsrsquo [315] was pub-lished in the Proceedings of the 7th International Workshop on Security andTrust Management (STM) In this paper we indicate two problems withthe specifications of fairness that are currently used for the verification ofnon-repudiation and other fair-exchange protocols The first of these prob-lems is the implicit assumption of perfect information The second problemis the possible lack of effectiveness We solve both problems in isolation bygiving new definitions of fairness but leave the combined solution for furtherwork Moreover we establish a hierarchy of various definitions of fairnessand indicate the consequences for existing work

Publications The project resulted in the following publication in 2012[315]

Security Analysis Through AttackndashDefense TreesAcronym SADTReference PHD-09-167PI Prof Dr Sjouke MauwFunding FNR-AFR PhDBudget 141968eBudget UL 141968eDuration 2010-01-01 ndash 2013-12-31

Members Sjouke Mauw Patrick Schweitzer Barbara Kordy Sasa Radomirovic

Domain(s) security formal methods attack trees defense trees attack-defense trees security assessment

Partner(s)

bull Telindus Luxembourg

bull Sintef Norway

bull TXT e-solutions Italy

bull Cybernetica Estonia

bull EDF France

bull Lucerne University of Applied Sciences and Arts

Description The project Security Analysis Through AttackndashDefense Trees(SADT) is part of the ATREES project It aims to extend and unify at-tack trees introduced by Bruce Schneier in 1999 The extension of attack

158 Projects and Grants in 2012

trees will be achieved by adding defensive measures to attack trees to createAttackndashDefense Trees (ADTrees) This will allow security analysts to in-clude countermeasures into their analysis The unification will be achievedby developing one coherent formal framework for ADTrees This unificationwill facilitate the development of a software tool This tool will encompassmost existing attack tree approaches using only a single formalism

More concretely we will define a unified language for ADTrees introduceseveral semantics arising from different mathematical disciplines and alreadyexisting attack tree approaches and create a software tool that supportsthe work of security analysts With the help of case studies provided bythe several industry partners different use cases will be examined This willallow us to tailor and refine the language and semantics It will also help usto improve the usability of the software tool

The SADT project is a joint research project of the Interdisciplinary Centrefor Security Reliability and Trust (SnT) and SaToSS

Results In 2012 we published two journal articles and presented our workat one international conference The first journal article [258] lays the foun-dation of the ADTrees presents the results of the previous years The secondone [254] is an extended case study on how to apply the methodology AtICISCrsquo12 we presented our research on an informal and a correspondingformal way of how to use ADTrees for quantitative analysis

Publications The project resulted in following publications in 2012 [258][254]

Secure and Private Location Proofs Architecture and Designfor Location-Based ServicesAcronym SECLOCReference 794361PI Prof Dr Sjouke MauwFunding FNR-AFR PhDBudget 109137eBudget UL 109137eDuration 2010-08-01 ndash 2013-07-31

Members Sjouke Mauw Xihui Chen Jun Pang Gabriele Lenzini

Domain(s) security and privacy location based services location proofsformal verification trustworthy services security protocols

Partner(s) itrust Consulting Luxembourg

42 Grants 159

Description Location-based services are rapidly growing as mobile net-works become increasingly pervasive and the use of mobile devices is gettingmore popular Location-based applications make use of the physical loca-tion of the mobile device to provide services that are customized to thatlocation To be effective location-based services need trustworthy (secureand private) positioning data this depends upon the technology the com-ponents and the communication protocols employed for service compositionand provision For this reason researcher effort has been devoted to ad-dressing the problem of how to certify a physical location and of how toensure that location information is secure eg in term of data integritynon-transferability unforgeability and non-repudiation Meanwhile usershave their privacy concerns about how their location proofs are used egthey want to control when and to whom they need to present such proofs(anonymity) or they do not want a service provider to trace them

Both security and privacy are essential in the development of location proofsfor location-based services While in the literature most researchers onlyconsider security or privacy in isolation we will address the problem ofhow to securely provide a userrsquos location while adhering to the need-to-know principle for all other involved parties thereby satisfying also privacyrequirements of the users

We approach this challenge by analyzing the concepts and requirements forsecurity and privacy in a location proof management system We aim at anarchitecture addressing both security and privacy requirements We will de-sign securitycryptographic protocols which can be used as building blocksin implementing such architecture for a concrete application domain Thecorrectness of the developed protocols is guaranteed through formal verifi-cation At last an experimental system based on the proposed architectureand protocols will be built to validate our solutions wrt the security andprivacy requirements identified

Results In 2012 we have four international conference papers accepted andone journal paper submitted

bull we design a new electronic toll pricing system based on group signa-tures This paper has been published and presented in ARESrsquo12 [216]

bull we propose a post-hoc analysis on location privacy in electronic pricingsystems [255] This paper is co-authored with David Fonkwe and hasbeen presented in DPMrsquo12

bull we propose a new method to construct and compare usersrsquo mobilityprofiles [256] This paper is co-authored by Ran Xue and has beenaccepted by SACrsquo13

160 Projects and Grants in 2012

bull we measure usersrsquo query privacy when query dependency is taken intoaccount and propose a new anonymization algorithm to protect usersrsquoquery privacy [257] This paper has been accepted by CODASPYrsquo13

bull we perform a formal analysis on our electronic toll pricing systemndash GroupETP using ProVerif This paper has been submitted to thejournal JOWUA

Publications The project resulted in the following publications in 2012[216] [255] [256] [257]

Analysis of the SHA-3 Remaining CandidatesAcronym SHARCReference F1R-CSC-AFR-080000PI Prof Dr Alex BiryukovFunding FNR-AFR PostdocBudget 102620eBudget UL NADuration 2010-10-15 ndash 2012-10-14

Members Gaetan Leurent

Domain(s) Cryptography Secret Key Hash Functions CryptanalysisSHA-3

Partner(s) NA

Description This project is about the analysis of hash functions andwill be closely related to the SHA-3 competition currently run by NISTIn cryptography a hash function is a public function with no structuralproperties It is an essential primitive in modern cryptography used inmany protocols and standards including signatures schemes authenticationcodes and key derivation

Following devastating attacks against many widely used hash functions (in-cluding MD4 MD5 and SHA-1) NIST organized the SHA-3 competition toselect and standardize a new hash function This competition is similar tothe AES competition held in 1998-2000 and attracts worldwide attentionwith a large effort underway to assess the security of the candidates Duringthis project we will study the application of known cryptanalysis techniquesto the new designs submitted for the SHA-3 competition and try to developnew dedicated techniques tailored to some of the SHA-3 candidates

Results The paper ldquoPractical Partial-Collisions on the Compression Func-

42 Grants 161

tion of BMWrdquo is accepted for presentation at the 18th IACR Workshop onFast Software Encryption (FSE 2011)

Publications NA

Dynamic and Composite Service-Oriented Architecture Secu-rity TestingAcronym DYNOSTReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2010-10-01 ndash 2013-09-30

Members Alexandre Bartel PhD

Domain(s) Dynamic adaptive systems andoid security access-control pol-cies permission-based architecture Model-driven engineering

Partner(s) NA

Description Initially DYNOST dealt with rdquoDynamic and Composite Service-Oriented Architecture Security Testingrdquo

Dynamically Adaptive Systems modify their behavior and structure in re-sponse to changes in their surrounding environment and according to anadaptation logic Critical systems increasingly incorporate dynamic adap-tation capabilities examples include disaster relief and space explorationsystems One of the main questions to adress is rdquoHow can we test the secu-rity of such a system which is often seen as a black boxrdquo

As a first step we propose a fault model for adaptation logics which classifiesfaults into environmental completeness and adaptation correctness [1] Sincethere are several adaptation logic languages relying on the same underlyingconcepts the fault model is expressed independently from specific adapta-tion languages Taking benefit from model-driven engineering technologywe express these common concepts in a metamodel and define the opera-tional semantics of mutation operators at this level Mutation is appliedon model elements and model transformations are used to propagate thesechanges to a given adaptation policy in the chosen formalism Preliminaryresults on an adaptive web server highlight the difficulty of killing mutantsfor adaptive systems and thus the difficulty of generating efficient tests

Shift to Android

162 Projects and Grants in 2012

With FNR agreement the project evolved and now focuses much more on thesecurity of the Android software stack still keeping the dynamic adaptationaspect in mind Android is a permission based system on top of which runapplication developed by programmers and downloaded from markets byend-users Every application comes with a Manifest file containing a list ofthe permissions the application requires to run

Results We developed a static analysis tools which computes the appro-priate permission set for an application by analyzing its bytecode By com-paring the permission list generated by our tool to the original permissionlist we noticed that a non-negligible part of Android applications are over-privileged they do not respect the principle of least privilege

Publications One publication in 2011 [312]

A Testing Framework for Large-Scale ApplicationsAcronym PeerunitReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2011-01-15 ndash 2014-01-15

Members Jorge Meira (PhD)

Domain(s) NA

Partner(s) Federal University of Parana Brazil

Description The aim of this project is to develop a highly scalable testingarchitecture for large-scale systems This project has three main objectives

bull To design a scalable testing synchronization algorithm to execute large-scale tests This algorithm will be incorporated to the PeerUnit archi-tecture to test any kind of large-scale application besides P2P

bull To design a highly scalable and automatic oracle approach to vali-date large-scale tests This approach will be also incorporated to thePeerUnit architecture

bull To test popular large-scale systems (eg Hadoop Hive FreePastry)and to validate our algorithm and oracle approach Tests can be exe-cuted in an incremental schedule from a less complex scenario to a morecomplex one First we start testing simple applications in small-scale

42 Grants 163

(eg distributed word count) Then we test the same application inlarge-scale Finally we test a complex large-scale application (egHive data warehouse architecture)

Results The student has started his PhD this year (January 2011) and isfinishing his basic formation that is part of the Brazilian regulations to getthe degree This is predicted in the co-joint agreement In this formationthe student must fulfil thirty six (36) credits in taught courses which ingeneral takes 12-18 months The student will finish by December 2011 Inresearch the student is finishing his first paper and is already mastering thelarge-scale environment (ie Grid5000) that is going to be used throughoutthe project His findings are interesting and it is expected at least twoconference paper in the following couple of months

Publications NA

Selected Problems in Executable ModelingAcronym SPEMReference PHD-09-084PI Prof Dr Pierre KelsenFunding FNR-AFR PhDBudget NABudget UL NADuration 2009-11-15 ndash 2012-11-15

Members Moussa Amrani and Nuno Amalio

Domain(s) Model-Driven Engineering Domain-Specific Modeling Lan-guages Structural and Behavioural Specification Structural and BehavioralSemantics Executability

Partner(s) NA

Description Model-Driven Engineering considers models as first-class en-tity in the development process In this way developers deal only withmodels which are used at the required level of abstraction for each taskthey need to perform to finally generate actual code on a given platform

Transformations can also be modeled Transformations are the Model-Driven Engineering tool that allow one to make models change evolve to fi-nally compute something Transformation Languages can be classified in twotrends object-oriented languages and rule-based languages Each of thempresent some strengths but comes with some complications when dealingwith huge models and or huge transformations

164 Projects and Grants in 2012

The Model-Driven Engineering approach gained maturity over the yearsand started to be used for safety-critical and embedded softwares whereformal verification plays a key role in the validation of applications Formalverification could be performed either by model-checking exhaustively theexecution state space or by theorem-proving assertions and properties aboutthe execution states But to be able to use such techniques formal semanticsof transformation languages must be precisely specified

This PhD has three goals

1 Define the semantics of a transformation language

2 Equip a transformation language with the ability to define contractswhich are an abstract and adequate way of defining behavior withoutgoing into implementation details

3 Apply theorem-proving techniques to formally verify models and trans-formations against dynamic properties

Results Since the PhD started the last year the results are just comingThe results basically follows the first workpackages defined in the Afr pro-posal It is also important to mention participation in conferences and paperreview for a PhD

State of the Art in Model-Driven Engineering This year was largelydedicated to study the existing techniques and tools for structural andbehavioral modeling A Technical Report will be soon published onbehalf of the LassyCsc adressing these points and completed withthe graph- based tools

Semantics Specification of an Object-Oriented Transformation LanguageAn important result regarding the development of formal verificationtechniques over Domain-Specific Modeling Languages is the formalspecification of the semantics of such languages It is known to bea hard task but it is a necessary step towards formal and trustableverification In the next few months an article paper will be publishedsoon

Conference Summer School Participation The candidate participatedto one important conference in the domain namely the European Con-ference on Modeling Foundations and Applications (Ecmfa 2010) andthe First Summer School on Domain-Specific Modeling Theory andPractice (Dsm- Tp 2010)

Publications NA

42 Grants 165

422 Workshop amp Conferences (FNR Accompanying Mea-sures)

Building the Skeleton of a SO schedulerAcronym SandpileReference FNR11AM2c32PI Prof Dr Pascal BouvryFunding FNR - AM2cBudget 634900Budget UL NADuration 2012-03-01 ndash 2012-05-01

Members Juan Luis Jimenez Laredo

Domain(s) Optimization GridCloud Computing Load balancing schedul-ing

Partner(s) NA

Description This project aims at designing and implementing the skele-ton of an organic scheduler for GridCloud Computing so that it acquiresautonomic properties such as self-organization of tasks or self-healing underresource failures To cope with these goals the working hypothesis relieson the Self-Organizing Criticality theory (SOC) that describes a property ofcomplex systems and consists in a critical state formed by self-organizationat the border of order and chaos More specifically we will extend a SOCsystem so-called sandpile The sandpile is a nature-inspired cellular automa-ton where piles of sand are accumulated and balanced in a self-organized wayalong the lattice The metaphore here is that tasks can be seen as grainsof sand and resources as cells in the lattice Given the decentralized natureof resources in GridCloud Computing systems we propose a Peer-to-Peeragent-based system as the underlying infrastructure to construct the cel-lular automaton (ie agents represent cells with a neighbourhood definedby the Peer-to-Peer overlay network) In order to study the viability ofthe approach the initial objective of the project is to reduce the schedulelength (or makespan) of scientific directed acyclic graph (DAG) in whichthe destination group in Innsbruck has an extensive expertise and after-wards compare results against state-of-the-art approaches Here it has tobe noted that there are two divergent trends in the literature when ap-proaching DAG scheduling On the one hand the fittest approaches assume

166 Projects and Grants in 2012

an unrealistic accurate knowledge on the problem structure On the otherhand real middleware frameworks use much simpler heuristics such as justin-time planning or round robin Our approach aims to bridge this gap andproposes the skeleton of a scheduler for a do-as-you-like scheduling ie bymodifing simple rules the approach can be tuned from a non-clairvoyant to aperfectly-informed scheduler Not only this we aim to take advantage of thepotentials of the approach and redefine the optimization objective to meetthe energy-aware criteria described in the FNR Core GreenIT project forwhich the candidate Dr Jimenez Laredo is working As can be graspedfrom this summary the ambitious nature of the project will require of amulti-disciplinary set of experts We find that both organizations Inns-bruck and Luxembourg account with complementary people to bring theproject to success with Luxembourg having a stronger focus on energy op-timization and green computing and Innsbruck on middleware developmentand scientific workflows analysis The candidate Juan Luis Jimenez Laredofits especially well in this project given his expertise on the aforementionedareas that can be assessed by referring to some of his publications either inSOC or agent-based decentralized optimization

Results In this project we have designed and developed an on-line anddecentralized scheduler based on a Self-Organized Criticallity Model calledsandpile in which every computing resource executes a sandpile agent Thesource-code with the simulator has been released as open-source and is avail-able at httpssandpile-schedulergooglecodecom published under GPL v3public license Additionally a first publication has been already publishedin the Workshop of Soft-Computing Techniques in Cluster and Grid Com-puting Systems (httpalturlcom33vo3) from which an extended version isexpected to be published in Cluster Computing (2010 Impact Factor 0679)(httpalturlcomxkzuh) The whole text of the publication is available forchecking at httpalturlcomcypi6 This report presents the problem def-inition the main points of the followed methodology and a summary of theachieved results

Publications NA

Chapter 5

CSC Representation

51 Conferences

The following local events have been organized during 2012

bull IFIP AIMS 2012 Luxembourg Luxembourg Radu State

ndash Description 6th International Conference on Autonomous In-frastructure Management and Security (AIMS 2012) June 04-08 2012 University of Luxembourg Luxembourg

bull 13th International Workshop on Computational Logic in Multi-AgentSystems (2012-08-27 ndash 2012-08-28) Montpellier France Leon van derTorre

bull Capture The Flag competition 2012 (2012-10-23 ndash 2012-10-25) Lux-embourg Luxembourg Piotr Kordy Matthijs Melissen Sasa RadomirovicPatrick Schweitzer Hugo Jonker Andrzej Mizera Yann Le Corre aswell as a former member of the SaToSS group Dr Ton van Deursen

ndash Description In 2012 the hackbraten team headed by Piotr Ko-rdy represented the SaToSS group at the Capture the Flag Com-petition co-located with the Hacklu conference Capture TheFlag is a competition where registered teams solve computer chal-lenges within limited time It is part of the Hacklu conferenceTopics of the challenges include (among others) web security

168 CSC Representation

cryptography reverse engineering and forensic Example chal-lenges include finding vulnerabilities in the servers exploitingbuffer overflows in binary files or reverse engineering javascriptcode embedded in a pdf file The hackbraten team was ranked24th amongst 575 teams registered for the event

bull Workshop on Dynamics of Argumentation Rules and Conditionals(2012-04-02 ndash 2012-04-03) Luxembourg Luxembourg Richard BoothEmil Weydert Tjitze Rienstra (organisers)

bull European Conference on Artificial Intelligence (2012-08-27 ndash 2012-08-31) Montpellier France Tjitze Rienstra

bull EVOLVE 2012 International Conference Mexico City Mexico Alexandru-Adrian Tantar Emilia Tantar Pascal BOUVRY (General Chairs)

ndash Description A Bridge between Probability Set Oriented Numer-ics and Evolutionary Computing

bull Interdisciplinary PhD Workshop on Security in eVoting (eVote PhDDays 2012) (2012-10-14 ndash 2012-10-15) Luxembourg Luxembourg HugoJonker (main organizer)

ndash Description In 2012 the University of Luxembourg hosted the5th installment of the Interdisciplinary PhD Workshop on Se-curity in eVoting The goal of this workshop series is to fosterunderstanding and collaboration between the various disciplinesworking on e-voting as well as to provide an informal platformfor young researchers to present results discuss research ideasand research directions with their peers and expand their net-works There were 14 participants from 10 institutes across Eu-rope What makes this workshop series special is that it is trulyinterdisciplinary where PhD students from legal backgroundsare joined by PhD students with computer science and cryptog-raphy backgrounds and by social scientists

bull GreenGEC Workshop Genetic and Evolutionary Computation Con-ference Philadelphia USA Pascal Bouvry Alexandru-Adrian TantarEmilia Tantar Bernabe Dorronsoro Gregoire Danoy

ndash Description Green and Efficient Energy Applications of Geneticand Evolutionary Computation

bull The 5th Workshop on Logical Aspects of Multi-Agent Systems (LAMASrsquo2012)(2012-06-05 ndash 2012-06-05) Valencia Spain Wojciech Jamroga (co-organizer) Matthijs Melissen (co-organizer)

51 Conferences 169

ndash Description LAMAS is a scientific network spanning an inter-disciplinary community of researchers working on logical aspectsof MAS from the perspectives of logic artificial intelligence com-puter science game theory etc The LAMAS workshop is thepivotal event of the network and it provides a platform for pre-sentation exchange and publication of ideas in all these areasincluding

lowast Logical systems for specification analysis and reasoning aboutMAS

lowast Modeling MAS with logic-based models

lowast Deductive systems and decision procedures for logics for MAS

lowast Development complexity analysis and implementation of al-gorithmic methods for formal verification of MAS

lowast Logic-based tools for MAS

lowast Applications of logics in MAS

bull Normative Multi-Agent Systems (2012-03-12 ndash 2012-03-16) DagstuhlGermany Leon van der Torre

bull OPTIM 2012 (2012-07-02 ndash 2012-07-06) Madrid Spain Pascal Bou-vry Gregoire Danoy Bernabe Dorronsoro Sebastien Varrette (Work-shop Organisers)

ndash Description Workshop on Optimization Issues in Energy Effi-cient Distributed Systems

bull 20th International Conference on Real-Time and Network Systems(2012-11-08 ndash 2012-11-09) Pont-a-mousson France Nicolas Navet(General Chair)

ndash Description The purpose of the conference is to share ideas ex-periences and informations among academic researchers devel-opers and service providers in the field of real-time systems andnetworks

bull SCCG 2012 Victoria Canada Bernabe Dorronsoro (Workshop Or-ganisers)

ndash Description First International Workshop on Soft ComputingTechniques in Cluster and Grid Computing Systems

bull Summer School on Secure Voting (SecVotersquo2012) (2012-07-16 ndash 2012-07-20) Dagstuhl Germany Hugo Jonker (general chair)

170 CSC Representation

ndash Description The SecVote 2012 summer school covered the foun-dations of secure voting as well as examine recent developmentsin the field of e-voting The school provided a good overview ofwork in voting including design of voting systems social choicecryptography practical experiences practical deployment andauditing There were 27 participants coming from AustraliaBrazil the USA Israel Estonia Poland the UK the Nether-lands Luxembourg Italy and Germany

bull VTP 2012 San Francisco USA Pascal Bouvry Gregoire Danoy Patri-cia Ruiz Julien Schleich Marcin Seredynski (Workshop Organisers)

ndash Description Workshop on VANETs From Theory to Practice

bull Summer School on Verification Technology Systems amp Applications(VTSArsquo2012) (2012-09-03 ndash 2012-09-07) Saarbrucken Germany JunPang (coordinator)

ndash Description The fourth summer school on verification technol-ogy systems amp applications takes place at Max Planck Institutefor Informatics at Saarbrucken Germany from September 03rdto 7th 2012 All three aspects verification technology systems ampapplications strongly depend on each other and that progress inthe area of formal analysis and verification can only be madeif all three aspects are considered as a whole Five speakersArmin Biere Ahmed Bouajjani Jurgen Giesl David Monniauxand Carsten Schurmann stand for this view in that they repre-sent and will present a particular verification technology and itsimplementation in a system in order to successfully apply theapproach to real world verification problems There were about30 participants for the summer school More information can befound at httpwwwmpi-infmpgdeVTSA12

52 PC and other memberships

bull 26th AAAI Conference on Artificial Intelligence (2012-07-22 ndash 2012-07-26) Toronto Canada Richard Booth (PC member)

bull 25th Australasian Joint Conference on Artificial Intelligence Dec 4-72012 Sydney Australia Richard Booth (PC member)

bull 24th Benelux Conference on Artificial Intelligence Oct 25-26 2012Maastricht Netherlands Richard Booth (PC member)

52 PC and other memberships 171

bull Workshop on Belief Change Nonmonotonic Reasoning and ConflictResolution (2012-08-27 Montpellier France Richard Booth (PC mem-ber)

bull 3rd IIAI International Conference on e-Services and Knowledge Man-agement (2012-09-20 ndash 2012-09-22) Fukuoka Japan Richard Booth(PC member)

bull 13th European Conference on Logics in Artificial Intelligence (2012-09-26 ndash 2012-09-28) Toulouse Franch Richard Booth (PC member)

bull 6th Multi-Disciplinary International Workshop on Artificial Intelli-gence (2012-12-26 ndash 2012-12-28) Ho Chi Minh City Vietnam RichardBooth (PC member)

bull NMR 2012 - 14th International Workshop on Non-Monotonic Rea-soning (2012-06-08 ndash 2012-06-10) Rome Italy Richard Booth (PCmember)

bull NIDISC 2012 (2012-05-21 ndash 2012-05-25) Shanghai China PascalBouvry (Program Chair)

ndash Description 15th International Workshop on Nature InspiredDistributed Computing held in conjunction with the 26th IEEEACMInternational Parallel and Distributed Processing (IPDPS 2012)

bull VTP 2012 (2012-06-25 ndash 2012-06-25) San Francisco USA PAscalBouvry (General Chair)

ndash Description VANETs from Theory to Practice

bull BNAIC 2012 (2012-10-25 ndash 2012-10-26) Maastricht Netherlands Gre-goire Danoy (PC Member)

ndash Description 24th Benelux Conference on Artificial Intelligence

bull ICUMT 2012 (2012-10-03 ndash 2012-10-05) St Petersburg Russia Gre-goire Danoy (PC Member)

bull IEEE MENS 2012 (2012-12-03 ndash 2012-12-07) Anaheim USA GregoireDanoy (PC Member)

ndash Description 4th IEEE International Workshop on Managementof Emerging Networks and Services

bull NIDISC 12 (2012-05-21 ndash 2012-05-25) Shanghai China GregoireDanoy (Publicity Chair)

172 CSC Representation

ndash Description 15th International Workshop on Nature InspiredDistributed Computing held in conjunction with the 26th IEEEACMInternational Parallel and Distributed Processing (IPDPS 2012)

bull SCALSOL 2012 (2012-12-18 ndash 2012-12-18) Changzhou China Gre-goire Danoy (PC Member)

ndash Description The International Workshop on Scalable Solutionsfor GreenIT (SCALSOL) as part of The 12th IEEE InternationalConference on Scalable Computing and Communications (SCAL-COM 2012)

bull SCCG-2012 (2012-11-12 ndash 2012-11-14) Victoria Canada GregoireDanoy (PC Member)

ndash Description Workshop 1st International Workshop on Soft Com-puting Techniques in Cluster and Grid Computing Systems

bull VTP 2012 (2012-06-25 ndash 2012-06-25) San Francisco USA GregoireDanoy (PC Chair)

ndash Description VANETs from Theory to Practice

bull EVOLVE 2012 (2012-08-07 ndash 2012-08-09) Mexico City Mexico Bern-abe Dorronsoto (Program Committee)

ndash Description VOLVE 2012 A bridge between Probability SetOriented Numerics and Evolutionary Computation

bull GECCO 2012 (2012-07-07 ndash 2012-07-11) Philadelphia USA BernabeDorronsoto (Program Committee)

ndash Description ACM International Genetic and Evolutionary Op-timization Conference

bull GreenCom 2012 (2012-11-20 ndash 2012-11-23) Besancon France Bern-abe Dorronsoto (Program Committee)

ndash Description IEEE GreenCom 2012

bull HPMS-ECMS 2012 (2012-05-29 ndash 2012-06-01) Koblenz GermanyBernabe Dorronsoto (Program Committee)

ndash Description 26th European Conference on Modelling and Simu-lation (ECMS 2012) Track on High Perfomance Modelling andSimulation

52 PC and other memberships 173

bull IC3 2012 (2012-08-06 ndash 2012-08-08) Noida India Bernabe Dorronsoto(Program Committee)

ndash Description The Fifth International Conference on Contempo-rary Computing

bull MAEB 2012 (2012-02-08 ndash 2012-02-10) Albacete Spain BernabeDorronsoro (Program Committee)

ndash Description VIII Congreso Espanol sobre Metaheurısticas Al-goritmos Evolutivos y Bioinspirados

bull MENS-GLOBECOM 2012 Anaheim California USA Bernabe Dor-ronsoto (Program Committee)

ndash Description The 4th IEEE International Workshop on Manage-ment of Emerging Networks and Services (IEEE MENS 2012) inconjunction with IEEE GLOBECOM 2012

bull MICAI 2012 (2012-10-27 San Luis Potosı Mexico Bernabe Dor-ronsoto (Program Committee)

ndash Description The 11th Mexican International Conference on Ar-tificial Intelligence

bull NostraDamus 2012 Ostrava Czech Republic Bernabe Dorronsoto(Program Committee)

ndash Description The NostraDamus conference

bull P2PAMN track at 3PGCIC 2012 (2012-11-12 ndash 2012-11-14) VictoriaCanada Bernabe Dorronsoto (Program Committee)

ndash Description The 7th International Conference on P2P ParallelGrid Cloud and Internet Computing (3PGCIC-2012) track onP2P Ad-hoc and Mobile Networking

bull SCALSOL-SCALCOM 2012 (2012-12-18 ndash 2012-12-18) ChangzhouChina Bernabe Dorronsoro (Program Committee)

ndash Description The International Workshop on Scalable Solutionsfor GreenIT (SCALSOL) as part of The 12th IEEE InternationalConference on Scalable Computing and Communications (SCAL-COM 2012)

174 CSC Representation

bull WASI-CACIC 2012 ndash 2012-10-12) Bahıa Blanca Argentina BernabeDorronsoto (Program Committee)

ndash Description Workshop de Agentes y Sistemas Inteligentes (WASI)- XVIII Congreso Argentino de Ciencias de la Computacion (CACIC)

bull LAMAS 2012 (2012-06-05 ndash 2012-06-05) Valencia Spain WojciechJamroga (PC Co-chair)

ndash Description 5th Workshop on Logical Aspects of Multi-AgentSystems

bull The Twenty-Sixth Conference on Artificial Intelligence (AAAI-12) (2012-07-22 ndash 2012-07-26) Toronto Canada Wojciech Jamroga (PC Mem-ber)

ndash Description The purpose of the AAAI-12 conference is to pro-mote research in AI and scientific exchange among AI researcherspractitioners scientists and engineers in related disciplines

bull AAMAS 2012 (2012-06-04 ndash 2012-06-08) Valencia Spain WojciechJamroga (PC Member)

ndash Description The AAMAS conference series was initiated in 2002in Bologna Italy as a joint event comprising the 6th Interna-tional Conference on Autonomous Agents (AA) the 5th Interna-tional Conference on Multiagent Systems (ICMAS) and the 9thInternational Workshop on Agent Theories Architectures andLanguages (ATAL)

Subsequent AAMAS conferences have been held in MelbourneAustralia (July 2003) New York City NY USA (July 2004)Utrecht The Netherlands (July 2005) Hakodate Japan (May2006) Honolulu Hawaii USA (May 2007) Estoril Portugal(May 2008) Budapest Hungary (May 2009) Toronto Canada(May 2010) Taipei Taiwan (May 2011) AAMAS 2012 will beheld in June in Valencia Spain AAMAS is the largest and mostinfluential conference in the area of agents and multiagent sys-tems the aim of the conference is to bring together researchersand practitioners in all areas of agent technology and to providea single high-profile internationally renowned forum for researchin the theory and practice of autonomous agents and multiagentsystems

AAMAS is the flagship conference of the non-profit InternationalFoundation for Autonomous Agents and Multiagent Systems (IFAA-MAS)

52 PC and other memberships 175

bull BNAIC 2012 (2012-11-25 ndash 2012-11-26) Maastricht the NetherlandsWojciech Jamroga (PC Member)

ndash Description The 24th Benelux Conference on Artificial Intelli-gence (BNAIC 2012) is organised by the Department of Knowl-edge Engineering (DKE) of Maastricht University (UM) BNAIC2012 is organised under the auspices of the Benelux Associa-tion for Artificial Intelligence (BNVKI) and the Dutch ResearchSchool for Information and Knowledge Systems (SIKS)

bull CLIMA XIII (2012-08-27 ndash 2012-08-28) Montpellier France WojciechJamroga (PC Member)

ndash Description 13th International Workshop on Computational Logicin Multi-Agent Systems The purpose of the CLIMA workshops isto provide a forum for discussing techniques based on computa-tional logic for representing programming and reasoning aboutagents and multi-agent systems in a formal way More informa-tion about the series os CLIMA workshops including its previouseditions and publications can be found here

The 13th edition of CLIMA will be affiliated with ECAIrsquo12 andwill take place in Montpellier France between the 27th and 28thof August 2012

bull ECAI 2012 (2012-08-27 ndash 2012-08-31) Montpellier France WojciechJamroga PC Member()

ndash Description ECAI the biennial European Conference on Artifi-cial Intelligence is the leading conference on Artificial Intelligencein Europe

ECAI 2012 the 20th conference in this series will be jointly or-ganized by the European Coordination Committee for ArtificialIntelligence (ECCAI) the French Association for Artificial In-telligence (AFIA) and Montpellier Laboratory for InformaticsRobotics and Microelectronics (LIRMM)

LIRMM is a research laboratory supervised by both MontpellierUniversity (Universite Montpellier 2) and the French NationalCenter for Scientific Research (CNRS)

ECAI 2012 will give researchers from all over the world the possi-bility to identify important new trends and challenges in all sub-fields of Artificial Intelligence and it will provide a major forumfor potential users of innovative AI techniques

bull EUMASrsquo12 (2012-12-18 ndash 2012-12-19) Dublin Ireland Wojciech Jam-roga (PC Member)

176 CSC Representation

ndash Description Research on multi-agent systems has shed light ontoand provided solutions to many real life problems As the fieldmatures academics and industrialists benefit from European-based forums where state-of-the-art and state-of-the-practice arepresented and discussed The EUMAS series of events have servedthis purpose and in this 10th edition (following Maastricht TheNetherlands 2011 Paris France 2010 Aiya Napa Cyprus 2009Bath England 2008 Hammamet Tunisia 2007 Lisbon Portu-gal 2006 Brussels Belgium 2005 Barcelona Spain 2004 Ox-ford England 2003) we shall carry on in this tradition The EU-MAS series of workshops is primarily intended as a European fo-rum at which researchers and those interested in activities relat-ing to research in the area of autonomous agents and multi-agentsystems can meet present (potentially preliminary) research re-sults problems and issues in an open and informal but academicenvironment

bull ICAART 2012 (2012-02-06 ndash 2012-02-08) Vilamoura Portugal Woj-ciech Jamroga (PC Member)

ndash Description The purpose of the 5th International Conference onAgents and Artificial Intelligence (ICAART) is to bring togetherresearchers engineers and practitioners interested in the theoryand applications in these areas Two simultaneous but stronglyrelated tracks will be held covering both applications and currentresearch work within the area of Agents Multi-Agent Systemsand Software Platforms Distributed Problem Solving and Dis-tributed AI in general including web applications on one handand within the area of non-distributed AI including the moretraditional areas such as Knowledge Representation PlanningLearning Scheduling Perception and also not so traditional ar-eas such as Reactive AI Systems Evolutionary Computing andother aspects of Computational Intelligence and many other areasrelated to intelligent systems on the other hand

53 Doctoral board

bull Cynthia Wagner University of Luxembourg Luxembourg Luxem-bourg March 2012 2012 Thomas Engel

bull Shaonan Wang University of Luxembourg Luxembourg LuxembourgApril 2012 Thomas Engel

54 Guests 177

bull Sheila Becker University of Luxembourg Luxembourg LuxembourgOctober 2012 2012 Thomas Engel

bull Sheila Becker UL Luxembourg Luxembourg October 2012 2012Yves Le Traon

bull Frederic Garcia Becerro University of Luxembourg Luxembourg Lux-embourg March 2012 2012 Bjorn Ottersten Thomas Engel

bull Thorsten Ries University of Luxembourg Luxembourg LuxembourgOctober 2012 2012 Thomas Engel

54 Guests

Invited Researchers

bull Prof Dr Andreas Albers (Goethe University of Frankfurt) October2012 Hugo Jonker Reason Research collaboration and presentation

bull Dr Dragos Horvath (Louis Pasteur University Strasbourg) October2012 Alexandru-Adrian Tantar Reason collaboration on samplingalgorithms

bull Dr Marek Bednarczyk (Polish Academy of Sciences Gdansk) May2012 Wojciech Jamroga Reason Research collaboration and pre-sentation

bull Dr Fei Gao (Norwegian University of Science and Technology (NTNU))October 1-12 2012 Pascal Bouvry Reason Collaboration on parallelevolutionary computing

bull Prof Dr Joanna Kolodziej (Cracow University of Technology) June2012 Pascal Bouvry Reason Collaboration on green computing re-search activities

bull Prof Dr Pierre Manneback (University of Mons) April 2012 PascalBouvry Reason Parallel computing research collaboration

bull Prof Dr Malgorzata Sterna (Poznan University of Technology) Jan-uary 2012 Pascal Bouvry Reason Collaboration on scheduling re-search activities

bull Dr Alexey Vinel (Tampere University of Technology Finland) august2012 Pascal Bouvry Reason Collaboration on wireless networksactivities

178 CSC Representation

bull Dr Nils Bulling (Clausthal University of Technology ) April 2012Wojciech Jamroga Reason Research collaboration and presentation

bull Dr Kostas Chatzikokolakis (LIX Ecole Polytechnique amp INRIASaclay) April 2012 Jun Pang Xihui Chen Reason Research col-laboration and presentation

bull Prof Dr Jason Crampton (Royal Holloway University of London)JUly 2012 Barbara Kordy Reason Research collaboration and pre-sentation

bull Dr Cas Cremers (ETH Zurich) August 2012 Sjouke Mauw ReasonResearch collaboration and presentation

bull Mrs Denise Demirel (TU Darmstadt) May 2012 Hugo Jonker Rea-son Research collaboration

bull Mr Andre Deuker (Goethe University of Frankfurt) October 2012Hugo Jonker Reason Research collaboration and presentation

bull Prof Dr Josep Domingo-Ferrer (Universitat Rovira i Virgili Catalunya) October 2012 Sjouke Mauw Barbara Kordy Reason Research col-laboration and presentation

bull Mr Santiago Iturriaga (Universidad de la Republica Uruguay) April1 to June 30 2012 Pascal Bouvry Reason Co-advising his workon parallel multi-objective local search heuristics for multi-objectivescheduling problems

bull Prof Dr Sergio Nesmachnow (Universidad de la Republica Uruguay)14-18 May 2012 Pascal Bouvry Reason Co-advising his work on par-allel multi-objective local search heuristics for multi-objective schedul-ing problems

bull Dr Alexandre Dulaunoy (CIRCLSMILE Luxembourg) December2012 Gabriele Lenzini Barbara Kordy Reason Research discussionand presentation

bull Prof Dr Eduardo Ferme (University of Madeira Portugal) Nov 1-22012 Reason ICR-ILIAS talk research collaboration

bull Ms Weili Fu (Free University of Bolzano and Technical University ofDresden ) July 2012 Sjouke Mauw Barbara Kordy Reason Researchpresentation

bull Dr Flavio Garcia (Radboud University Nijmegen) April 2012 SjoukeMauw Reason Research discussion

54 Guests 179

bull Prof Dr Valentin Goranko (Technical University of Denmark) June2012 Wojciech Jamroga Reason Research collaboration and presen-tation

bull Mr Mohammad Hassan Habibi (ISSL Lab EE Department SharifUniversity of Technology) April 2012 Sjouke Mauw Barbara Kordy Reason Research presentation

bull Prof Dr Lynda Hardman (CWI Amsterdam) December 2012 SjoukeMauw Reason discussion

bull Prof Dr Iyad Rahwan ( Masdar Institute of Science and Technology)May 17-19 2012 ICR-ILIAS Reason attending the defence ceremonyof Yining Wu

bull Mr Oljira Dejene Boru (University of Trento Italy) March - June2012 Dzmitry Kliazovich Reason Master internship

bull Mr Sisay Tadesse (University of Trento Italy) March - June 2012Dzmitry Kliazovich Reason Master internship

bull Prof Dr Tomasz Lipniacki (Institute of Fundamental Technologi-cal Research Polish Academy of Sciences) December 2012 AndrzejMizera Jun Pang Reason CSC-Bio research presentation

bull Dr Yang Liu (National University of Singapore) June 2012 Jun Pang Reason Research collaboration and presentation

bull Dr Madalina Croitoru (University of Montpellier 2) November 26-302012 Reason ICR-ILIASresearch collaboration

bull Mr Artur Meski (Polish Academy of Sciences Warsaw) April 2012Wojciech Jamroga Reason Research presentation

bull Prof Dr Marko Bertogna (University of Modena Italy) June 2012Nicolas Navet Reason Real-time Dependable Systems seminar atLASSY

bull Dr Liliana Cucu-Grosjean (INRIA France) June 2012 Nicolas NavetReason Real-time Dependable Systems seminar at LASSY

bull Dr Rob Davis (University of York UK) June 2012 Nicolas NavetReason Real-time Dependable Systems seminar at LASSY

bull Mr Stephan Neumann (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration and presentation

bull Dr Evangelos Evangelos (University of the Aegean) January 2012Sasa Radomirovic Reason Research collaboration and presentation

180 CSC Representation

bull Mrs Maina Olembo (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration

bull Prof Dr Andrei Tchernykh (CICESE research center EnsenadaMexico) October 2012 Pascal Bouvry Reason Collaboration andcontribution to FNR CORE GreenIT project

bull Prof Dr Pierre-Etienne Moreau (INRIA-Nancy France) Yves LeTraon Reason Collaboration

bull Prof Dr Selwyn Piramuthu (University of Florida) June-July 2012SaToSS group Reason visiting professor at SnT and SaToSS group

bull Prof Dr Henry Prakken (Utrecht University) May 2012 Leon vander Torre Reason Attending the defence ceremony of Yining Wu

bull Dr Hongyang Qu (Oxford University) November 2012 Jun Pang Reason Research collaboration and presentation

bull Dr Sasa Radomirovic (ETH Zurich) November 2012 Sjouke MauwBarbara Kordy Reason Research collaboration and presentation

bull Dr Rolando Trujillo Rasua (Universitat Rovira i Virgili Catalunya) October 2012 Sjouke Mauw Barbara Kordy Reason Researchcollaboration and presentation

bull Dr MohammadReza Mousavi (Eindhoven University) January 2012Jun Pang Reason Research collaboration and presentation

bull Prof Dr Olivier Roux (Ecole Centrale de Nantes) April 2012 SjoukeMauw Jun Pang Reason Research collaboration and presentation

bull Prof Dr Samir Chopra (Brooklyn College of the City University ofNew York USA) Nov 12-16 2012 Reason talk research collabora-tion

bull Dr Samy Passos (Universidade Federal do Ceara) Jul 10 - Aug 122012 Reason ICR-SnT talk research collaboration

bull Mr Maciej Szreter (Polish Academy of Sciences Warsaw) April 2012Wojciech Jamroga Reason Research collaboration

bull Ms Iuliia Tkachenko (University Bordeaux 1) July 2012 Sjouke MauwBarbara Kordy Reason Research presentation

bull Dr Devrim Unal (TUBITAK-BILGEM UEKAE Turkey ) November2012 Sjouke Mauw Barbara Kordy Reason Research presentationand discussion

55 Visits and other representation activities 181

bull Dr Matthias Thimm (Universitat Koblenz) June 18-19 2012 ICR-ILIAS Reason talk research collaboration

bull Dr Harm van Beek (Netherlands Forensic Institute) June 2012 SjoukeMauw Reason Research collaboration and presentation

bull Mr Andre van Cleeff (University of Twente) March 2012 SjoukeMauw Reason Research collaboration and presentation

bull Dr Melanie Volkamer (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration

bull Dr Melanie Volkamer (TU Darmstad CASED) October 2012 HugoJonker Reason invited lecture

bull Mr Pim Vullers (Radboud University Nijmegen) February 2012 SjoukeMauw Sasa Radomirovic Reason Research collaboration and pre-sentation

bull Dr Roland Wen (University of New South Wales Australia ) Septem-ber 2012 Hugo Jonker Reason Research collaboration

bull Dr Jan Willemson (Cybernetica Estonia) May 2012 Barbara KordyPatrick Schweitzer Sjouke Mauw Reason Research collaborationand presentation

bull Dr Zhenchang Xing (National University of Singapore) June 2012Jun Pang Reason Research collaboration and presentation

55 Visits and other representation activities

bull Richard Booth Visited organization Katholieke Universiteit Leuven(Oct 18-23 2012) Reason Research collaboration

bull Martin Caminada Visited organization (June 1-2 2012) Reasonparticipation in COST AT coordination network on behalf of ICR

bull Wojciech Jamroga Visited organization (6-8062012) Reasonconference participation contributed talk poster presentation

bull Wojciech Jamroga Visited organization Polish Academy of Sciences(2minus 4042012) Reason work on a joint paper

bull Wojciech Jamroga Visited organization Technical University of Den-mark (19minus 21042012) Reason Research collaboration and presen-tation

182 CSC Representation

bull Wojciech Jamroga Visited organization Clausthal University ofTechnology (20minus 25022012) Reason Research collaboration

bull Wojciech Jamroga Visited organization Polish-Japanese IT Institute(31012012) Reason Research collaboration

bull Wojciech Jamroga Visited organization International PhD Programme(29 minus 30012012) Reason Meeting of the International PhD Pro-gramme project overview talk

bull Wojciech Jamroga Visited organization Polish Academy of Sciences(25minus 26062012 ) Reason supervision of a PhD student

bull Wojciech Jamroga Visited organization LAMAS 2012 (4minus5062012)Reason workshop organization

bull Wojciech Jamroga Visited organization Dagstuhl seminar on Nor-mative Multi-Agent Systems (14032012) Reason seminar visit

bull Wojciech Jamroga Visited organization Trento University (28 minus29052012) Reason Research collaboration and presentation

bull Hugo Jonker Visited organization Cyberwarfare thinktank (09112012)Reason Founding meeting Cyberwarfare thinktank

bull Hugo Jonker Visited organization Privacy Lab (03042012) Rea-son Privacy Lab opening

bull Hugo Jonker Visited organization Digital Enlightenment Forum(18minus 19062012) Reason networking event

bull Hugo Jonker Visited organization TDL Consortium (05102012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization TDL Consortium (23012012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization TDL Consortium (12062012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization Thales Research amp Technology(29112012) Reason Attack Trees workshop research collaboration

bull Hugo Jonker Visited organization VeriMag (11minus 13112012) Rea-son Research collaboration

bull Dzmitry Kliazovich Visited organization GREENET project meet-ing (19-09-2012 - 21-09-2012) Reason Initial Training Network onGreen Wireless Networks - Seminar presentation

55 Visits and other representation activities 183

bull Dzmitry Kliazovich Visited organization Koc Universtiy - COSTIC0804 Meeting (05-10-2012 - 07-10-2012) Reason Presentation -GreenCloud A Packet-level Simulator of Energy-aware Cloud Com-puting Data Centers

bull Dzmitry Kliazovich Visited organization University of Trento (17-11-2012) Reason Seminar presentaiton - Energy-Efficient Design inCloud Computing Communication Systems

bull Barbara Kordy Visited organization University of Twente (05 minus06112012) Reason FP7 TREsPASS project kick off meeting

bull Barbara Kordy Visited organization LORIA (15052012) ReasonResearch collaboration and presentation

bull Barbara Kordy Visited organization Royal Holloway University ofLondon (01032012) Reason Research collaboration and presenta-tion

bull Barbara Kordy Visited organization SINTEF (16 minus 19042012)Reason Research collaboration

bull Barbara Kordy Visited organization NTNU (16minus19042012) Rea-son Invited talk

bull Barbara Kordy Visited organization Thales Research amp Technol-ogy (29112012) Reason Keynote presentation at the Attack Treesworkshop and collaboration

bull Simon Kramer Visited organization Institute of Mathematical Sci-ences (0101minus 28022012) Reason invited research visit

bull Juan Luis Jimenez Laredo Visited organization University of Inns-bruck (01-03-2012 to 05-05-2012) Reason Research visit in the con-text of the AM2c FNR11AM2c32Building the Skeleton of a SOscheduler

bull Yves Le Traon Visited organization 7th International Workshopon Automation of Software Test (AST 2012) (June 2012) ReasonKeynote on Security testing and software engineering challenges

bull Yves Le Traon Visited organization 8th International Summer Schoolon Training And Research On Testing (TAROT 2012) (July 2012)Reason Invited Keynote on Security Testing

bull Yves Le Traon Visited organization LCIS-ESISAR INPG (23-25August 2012) Reason Attract PhD students build collaboration onsensor networks and testing

184 CSC Representation

bull Yves Le Traon Visited organization INRIA-IRISA (August Novem-ber ) Reason Continuous collaboration Project writing seminarsrecruitment of research associates

bull Yves Le Traon Visited organization Microsoft Luxembourg (March2012) Reason Presentation of my group research activities to MS

bull Yves Le Traon Visited organization KIT Karlsruhe (several meetingsper year) Reason Collaboration (EU project PhD co-supervision)

bull Yves Le Traon Visited organization Lip6 - Univ Paris VI (July2012) Reason Collaboration on SPL reverse engineering and testing

bull Yves Le Traon Visited organization Telecom Bretagne (April andJuly 2012) Reason PhD supervision Project proposals writing

bull Llio Humphreys Visited organization Delft University of Technology(18-21 November2012) Reason research visit

bull Llio Humphreys Visited organization Kings College London (28 June2012) Reason research visit

bull Sjouke Mauw Visited organization COST DC ICT (13minus16062012)Reason project meeting

bull Sjouke Mauw Visited organization COST IC1205 (30112012)Reason project meeting

bull Sjouke Mauw Visited organization COST DC ICT (10minus11092012)Reason project meeting

bull Sjouke Mauw Visited organization Digital Enlightenment Forum(18minus 19062012) Reason networking event

bull Sjouke Mauw Visited organization University of Twente (05minus06112012)Reason FP7 TREsPASS project kick off meeting

bull Sjouke Mauw Visited organization Nationaal Instituut voor Crim-inalistiek en Criminologie (NICC) (23012012) Reason Researchcollaboration and presentation

bull Sjouke Mauw Visited organization IFIP WG 112 seminar (04072012)Reason presentation

bull Sjouke Mauw Visited organization STM 2012 (12 minus 14092012)Reason conference visit and presentation

bull Sjouke Mauw Visited organization Thales Research amp Technology(29112012) Reason Attack Trees workshop research collaboration

55 Visits and other representation activities 185

bull Nicolas Navet Visited organization University of Nantes (June 82012) Reason Lecture rdquoIndustrial practices of real-time schedulingrdquoat the colloquium rdquo1972-2012 40 years of research in real-time schedul-ingrdquo scientific days of the University of Nantes June 8 2012

bull Jun Pang Visited organization Nanjing University (08minus12102012)Reason Research collaboration

bull Xavier Parent Visited organization Imperial College and Kingrsquos Col-lege London (29 April - 4 march 2012) Reason Presentation at sym-posium and research collaboration

bull Johnatan E Pecero Visited organization National Electronics andComputer Technology Center (NECTEC) (6-12-2012) Reason En-ergy efficient solutions for cloud and HPC green scheduling and nextgeneration hardware

bull Sasa Radomirovic Visited organization Nationaal Instituut voorCriminalistiek en Criminologie (NICC) (23012012) Reason Re-search collaboration and presentation

bull Tjitze Rienstra Visited organization Twente University (February27 - March 2 2012) Reason talk research collaboration

bull Patrick Schweitzer Visited organization KTH (24042012) ReasonResearch presentation

bull Patrick Schweitzer Visited organization NTNU (16 minus 19042012)Reason Research collaboration

bull Patrick Schweitzer Visited organization SINTEF (16minus 19042012)Reason Research collaboration and presentation

bull Alexandru-Adrian Tantar Visited organization 2012 IEEE WorldCongress on Computational Intelligence (WCCI) (June 10-15 2012)Reason Green Evolutionary Computing for Sustainable Environments(tutorial)

bull Silvano Tosatto Visited organization Sophia Antipolis (February 8-11 2012) Reason Research collaboration

bull Silvano Tosatto Visited organization University of Queensland (May15- June 1 2012) Reason Research collaboration

bull Paolo Turrini Visited organization Technical University of Denmark(May 1-8 2012) Reason Research collaboration

186 CSC Representation

56 Research meeting

bull 13th International Workshop on Computational Logic in Multi-AgentSystems (2012-08-27 ndash 2012-08-28)

ndash Description Montpellier France

bull Joint UR-Math and UR-CSC Discrete Mathematics Colloquium (2010-05-10 ndash 2012-04-03) Number of presentations 15

ndash Description The Decision Aid Systems group within the Com-puter Science and Communication Research Unit (CSC) and theDiscrete Mathematics group within the Mathematics ResearchUnit (MATH) of the University of Luxembourg organize period-ically a common research seminar Regular Members

lowast R Bisdorff (responsible co-organiser CSC)

lowast M Couceiro (ass researcher postdoc MATH)

lowast E Lehtonen (ass researcher postdoc CSC)

lowast J-L Marichal(responsible co-organiser MATH)

lowast P Mathoney (ass researcher postdoc MATH)

lowast A Olteanu (assistantPhd studentCSC)

lowast Th Veneziano (assistantPhd studentCSC)

lowast T Walhauser (ass researcher postdoc MATH)

bull ICR Seminars

ndash Description Typically weekly (Monday 4pm) Seminar with guestresearchersInternal seminar

bull MINE Research Meeting (2012-01-09 ndash 2012-12-04) Number of presen-tations 24

ndash Description Research meetings

lowast Prof Dr Stephan Busemann German Research Centre forArtificial Intelligence 5 CET meetings (official and unofficialmeetings)

lowast Dr Urich Schaefer German Research Centre for ArtificialIntelligence 2 CET meetings (official and unofficial meet-ings)

lowast Prof Dr Theoharry Grammatikos Dept of Finance (LSF)15 meetings FNR CORE Project ESCAPE

lowast Dr Georges Krier SES 2 CET meetings (official and unoffi-cial meetings)

56 Research meeting 187

lowast Prof Dr Susanne Jekat University of Winterthur Dept ofLinguistics 1 inofficial CET meeting

bull ILIAS - TeamBouvry Seminars

ndash Description Research team meetings and one yearly team meet-ing with 25 presentations organized in November

bull Lassy Seminar

ndash Description This seminar is given several times a year by invitedspeakers on topics related to software construction

bull MAO - Multi-Agent Organisation (2011-12-19 ndash 2011-12-23)

ndash Description Leiden The Netherlands

bull Norm group research meeting

ndash Description weekly (Friday 2pm) presentations by guest re-searchers and internal members

bull Normative Multi-Agent Systems (2012-03-11 ndash 2012-03-16)

ndash Description Dagstuhl Germany

bull SaToSS Research Meeting

ndash Description On Tuesdays from 1030 to 1130 the SaToSS groupand the APSIA group led by Prof Peter YA Ryan hold theirweekly Security Research Meeting (SRM) The purpose of theSRM is to present and discuss research problems that are interest-ing for the members of both groups In 2012 Sasa RadomirovicBarbara Kordy and Jean Lancrenon were responsible for the or-ganization of the SRM The meeting featured 50 presentations in2012 Notable speakers in 2012 include Prof Luca Vigano ProfJason Crampton and Prof Josep Domingo-Ferrer The completelist of speakers as well as our seminar rules can be found at theseminar webpage httpsatossuniluseminarssrm

188 CSC Representation

Chapter 6

CSC Software

bull ACL-Lean Licence Free

ndash Description Developers Daniele Rispoli and Valerio Genovese

ACL-Lean is a decidable theorem prover (written in PROLOG)for propositional access control logics with says operator ACL-Lean implements an analytic labelled sequent calculus for condi-tional access control logics presented in V Genovese L GiordanoV Gliozzi and G L Pozzato ldquoA Conditional Constructive Logicfor Access Control and its Sequent Calculusrdquo 20th InternationalConference on Automated Reasoning with Analytic Tableaux andRelated Methods

bull ADTool Licence free use

ndash Description The attackndashdefense tree language formalizes andextends the attack tree formalism It is a methodology to graph-ically analyze security aspects of scenarios With the help ofattributes on attackndashdefense trees also quantitative analysis canbe performed As attackndashdefense tree models grow they soonbecome intractable to be analyzed by hand Hence computersupport is desirable Software toll called the ADTool has beenimplemented as a part of the ATREES project to support theattackndashdefense tree methodology for security modeling The mainfeatures of the ADTool are easy creation efficient editing andquantitative analysis of attackndashdefense trees The tool is avail-able at httpsatossunilusoftwareadtool The tool was

190 CSC Software

realized by Piotr Kordy and its manual was written by PatrickSchweitzer

bull ARGULAB Licence GPL v3

ndash Description Developers Mikolaj Podlaszewski

We present an implementation of the recently developed per-suasion dialogue game for formal argumentation theory undergrounded semantics The idea is to apply Mackenzie-style dia-logue to convince the user that an argument is or is not in thegrounded extension Hence to provide a (semi-)natural user in-terface to formal argumentation theory

bull bagit Licence non-redistributable for internal use only

ndash Description An internal web-based tool that provides assistanceto research groups by storing pooling tagging and indexing pa-pers and other publications Developed by Christian Glodt In2012 minor bugfixes have been applied to Bagit

bull Canephora Licence free use

ndash Description Trust opinions can be represented as probability dis-tributions over an (unknown) integrity parameter Simple trustopinions (that are based only on personal observations) can berepresented as a class of distributions known as Beta distribu-tions Trust opinions that are based on recommendations do not(necessarily) have such a simple representation Canephora nu-merically approximates the trust opinion that can be inferredfrom a recommendation Precision and coarseness of the resultcan be selected The result may depend on the strategy of therecommender Canephora allows implementations of such pos-sible strategies to be added on the fly The tool was createdby Tim Muller and can be accessed at httpsatossunilu

softwarecanephora

bull mCarve and cCarve Licence free use

ndash Description mCarve and cCarve are software tools for carvingattributed dump sets These dump sets can for instance beobtained by dumping the memory of a number of smart cards orby regularly dumping the memory of a single smart card duringits lifetime The tools help in determining at which location inthe dumps certain attributes are stored mCarve is written inPython and is available from httpsatossunilusoftware

191

mcarve More information about mCarve can be obtained fromour paper [259] cCarve is written in C++ It implements alinear algorithm for carving attributed dump sets which improvesits run time with respect to mCarve cCarve is available fromhttpsatossunilusoftwareccarve

bull delegation2spass Licence Free

ndash Description Developers Daniele Rispoli and Valerio Genovese

delegstion2spass is a parser (written in SCHEME) which imple-ments a set of complete reduction axioms and translates dynamicformulas for a delegationrevocation logic into propositional logicexpressed in DFG syntax

bull Democles Licence Freely redistributable see details athttpdemocleslassyunilulicensehtml

ndash Description Democles is a modeling tool that supports the EPlanguage developed by LASSYs MDE group It is mainly devel-oped by Christian Glodt In 2012 the following improvementswere made to Democles Nuno Amalio started work on imple-menting an EP-to-Alloy transformation for EP systems in Demo-cles Christian Glodt created a branch of Democles implement-ing model bridging interfaces as described in Sam Schmitrsquos MasterThesis rdquoA Bridging Mechanism for Adapting Abstract Models toPlatformsrdquo

bull Discrete Particle Method (DPM) Licence Internal use only

ndash Description The Discrete Particle Method (DPM) itself is anadvanced numerical simulation tool which deals with both mo-tion and chemical conversion of particulate material such as coalor biomass in furnaces However predictions of solely motion orconversion in a de-coupled mode are also applicable The DiscreteParticle Method uses object oriented techniques that support ob-jects representing three-dimensional particles of various shapessuch as cylinders discs or tetrahedrons for example size and ma-terial properties This makes it a highly versatile tool dealingwith a large variety of different industrial applications of granu-lar matter A user interface allows easily extending the softwarefurther by adding user-defined models or material properties toan already available selection of materials properties and reac-tion systems describing conversion Thus the user is relievedof underlying mathematics or software design and therefore is

192 CSC Software

able to direct his focus entirely on the application The DiscreteParticle Method is organised in a hierarchical structure of C++classes and works both in Linux and XP environments also onmulti-processor machines

This software is developed by the XDEM research team from theResearch Unit in Engineering Science (RUES) in collaborationwith the Computer Science and Communications (CSC) researchunit

bull GreenCloud Licence Open source

ndash Description Greencloud is a sophisticated packet-level simulatorfor energy-aware cloud computing data centers with a focus oncloud communications It offers a detailed fine-grained modelingof the energy consumed by the data center IT equipment such ascomputing servers network switches and communication links

bull JShadObf

ndash Description A JavaScript Obfuscation Framework based on evo-lutionary algorithms

bull LuxTraffic

ndash Description LuxTraffic is a project aiming to provide real timetraffic information by using smartphones as mobile traffic sensorsLuxembourg is an ideal location to validate the suggested systembecause of several factors The country has a well developed roadinfrastructure with 282 km of highways in total on its territorywhich permits to have a country- scoped instead of city-scopedapproach Also the recent high penetration rate of smartphonesin combination with the data flat rates create a favorable envi-ronment for community based traffic sensing using mobile phonesTaking these factors into account we designed LuxTraffic a trafficinformation system which is in essence an online repository aim-ing at centralizing all information related to individual mobilityin Luxembourg

The system has two main goals The first is to create and main-tain a community of users that will actively participate in col-lecting relevant traffic information using smartphone devices inan anonymous and autonomous manner To accomplish this ap-plications (APPs) for the two dominant mobile platforms iOSand Android have been developed In return the users benefitfrom a variety of traffic information services available online In

193

the first phase the system provides detailed information abouttraffic fluidity on Luxembourg highways In the second phasethe system will be extended to cover the entire road network

The second purpose of the LuxTraffic platform is to gather archiveand analyze the collected traffic data centrally in order to identifytraffic bottlenecks and propose solutions To provide additionalinformation we interface with the local highway traffic controlsystem called CITA which among others provides a 24 hoursaccess to highway cameras

bull MaM Multidimensional Aggregation Monitoring Licence Open Source

ndash Description MaM Multidimensional Aggregation MonitoringMaM performs multidimensional aggregation over various typesof data The targegeted use is the storage visualisation and anal-ysis of big data For example network operators may capturelarge quantities of flow based data which includes source and des-tination IP addresses and ports number of packets etc Aggre-gation allows to leverage global view and so is particularly helpfulfor anomaly tracking as the most powerful like spam campaignsbotnets distributed denial of service are distributed phenomenaand can only be observed assuming a global point of view How-ever defining the aggregation granularity is quite difficult andshould not fixed over all the space For example some IP net-works may require a small granularity while others need only ahigh level overview Hence MaM automatically selects the gran-ularity by creating irregular dimension splits which are so betterfitted to the underlying distribution In addition if a user doesnot know exactly what is looking for when he is monitoring hisnetwork it does not know which dimension is the most importantFor example there is no reason to aggregate first on source IPaddresses and then destination ports or vice-versa Thus MaMwill automatically optimizes that by selecting the proper order ofdimensions and even on multiple levels involving twice or morethe same dimension with different granularity levels

To achieve a good scalability MaM uses an underneath tree struc-ture A MaM tree is updated online with a limited complexityusing a Least Recently Used strategy to keep the tree size com-pact and so to save resources

MaM is a generic tool and can be extended to any hierarchicaltypes of data by implementing very few functions which describethe hierarchy

To summarize the advantages of MaM are - support of het-erogeneous types of data simultaneously - high scalability - easy

194 CSC Software

to extend - user friendly outputs and graphical user interface -open-source (available at httpsgithubcomjfrancoismam)

The practicability of MaM have been highlighted in [252] and apresentation is available at (demonstration at 1415)

httpswwwusenixorgconferencelisa12efficient-multidimensional-aggregation-large-scale-monitoring

bull MiCS Management System Licence non-redistributable for internaluse only

ndash Description An internal web-based tool developed for the man-agement of modules courses and profiles of the Master in Infor-mation and Computer Sciences Developed by Christian GlodtNumerous improvements have been made to the MiCS Manage-ment System in 2012

bull Model Decomposer Licence free to use binary redistribution per-mitted

ndash Description An Eclipse plugin that implements a generic modeldecomposition technique which is applicable to Ecore instancesand EP models and is described in a paper published in the pro-ceedings of the FASE 2011 conference Developed by ChristianGlodt

bull MSC Macro Package for LATEX Licence free use

ndash Description The message sequence chart (MSC) language is avisual language for the description of the interaction between dif-ferent components of a system This language is standardizedby the ITU (International Telecommunication Union) in Recom-mendation Z120 MSCs have a wide application domain rang-ing from requirements specification to testing and documenta-tion In order to support easy drawing of MSCs in LATEX doc-uments Sjouke Mauw and coworkers have developed the MSCmacro package Currently Piotr Kordy is responsible for main-tenance of the package Version 117 is currently available fromhttpsatossunilumscpackage In 2012 work started onrecoding the package as to make it compatible with pdflatex

bull OVNIS

ndash Description For online vehicular wireless and traffic simulationAn integration of traffic simulator SUMO with network simulatorns-3

195

bull ROS face recognition package Licence Attribution-NonCommercial30

ndash Description Developers Pouyan Ziafati Provides a ROS simpleactionlib server interface for performing different face recognitionfunctionalities in video stream

bull Seq-ACL+ Licence Free

ndash Description Developers Daniele Rispoli Valerio Genovese andDeepak Garg

Seq-ACL+ is a decidable theorem prover (written in PROLOG)for the modal access control logic ACL+ presented in V Genoveseand D Garg rdquoNew Modalities for Access Control Logics Permis-sion Control and Ratificationrdquo 7th International Workshop onSecurity and Trust Management - STM 2011

bull SHARC Licence GPL v3

ndash Description Source code and benchmarking framework for theSHARC (Sharper Heuristic for Assignment of Robust Communi-ties) protocol

bull VehILux

ndash Description Large set of realistic vehicular traces over the areaof Luxembourg country (110000 trips) than can be used by trafficsimulators like SUMO and in other simulations of traffic informa-tion systems

bull Visual Contract Builder Licence free to use binary redistributionpermitted

ndash Description A suite of Eclipse plugins that provide supportfor graphically editing and typechecking VCL (Visual ContractLanguage) diagrams Developed by Christian Glodt and NunoAmalio

196 CSC Software

Chapter 7

CSC Publications in 2012

The publications listed in this chapter have been generated from the officialpublication record repository of the university

httppublicationsunilu

An overview of the publication quantity (per category) is provided in thetable below

Publication category Quantity Section

Books 1 sect71 page 197Book Chapters 7 sect72 page 198

International journals 69 sect73 page 198Conferences Articles 165 sect74 page 204

Internal Reports 6 sect75 page 223Proceedings 3 sect76 page 224

Total 251

Table 71 Overview of CSC publications in 2012

71 Books

[1] Cas Cremers and Sjouke Mauw Operational semantics and verificationof security protocols Springer-Verlag 2012

198 BIBLIOGRAPHY

72 Book Chapters

[2] Paolo Turrini Xavier Parent Leendert van der Torre and SilvanoColombo Tosatto Contrary-To-Duties in Games pages 329ndash348Springer 2012

[3] Johnatan E Pecero Bernabe Dorronsoro Mateusz Guzek and Pas-cal Bouvry Memetic Algorithms for Energy-Aware Computation andCommunications Optimization in Computing Clusters pages 443 ndash473 Chapman and HallCRC Press 2012

[4] Xavier Parent Why Be Afraid of Identity volume 7360 of LectureNotes in Computer Science pages 295ndash307 Springer 2012

[5] Hugo Jonker Sjouke Mauw and Jun Pang Location-Based ServicesPrivacy Security and Assurance pages 235ndash244 IOS Press 2012

[6] Moussa Amrani A Formal Semantics of Kermeta pages 274 ndash 315IGI Global Hershey PA USA 2012

[7] Marcin Seredynski and Pascal Bouvry The Application of Evolution-ary Heuristics for Solving Soft Security Issues in MANETs pages 97ndash114 Springer 2012

[8] Jianguo Ding Ilangko Balasingham and Pascal Bouvry ManagementChallenges for Emerging Wireless Networks pages 3ndash34 CRC Press2012

73 International journals

[9] Raymond Bisdorff On polarizing outranking relations with large per-formance differences Journal of Multi-Criteria Decision AnalysisDOI 101002mcda14721ndash20 2012

[10] Christoph Benzmuller Dov Gabbay Valerio Genovese and DanieleRispoli Embedding and automating conditional logics in classicalhigher-order logic Ann Math Artif Intell 66(1-4)257ndash271 2012

[11] Benoıt Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee Technique et science informa-tiques 31(8-9-10)1121ndash1152 2012

[12] Alex Biryukov and Johann Grosschadl Cryptanalysis of the full aesusing gpu-like special-purpose hardware Fundamenta Informaticae114(3-4)221ndash237 2012

BIBLIOGRAPHY 199

[13] Alexander Bochman and Dov Gabbay Causal dynamic inference AnnMath Artif Intell 66(1-4)231ndash256 2012

[14] Davide Falessi Mehrdad Sabetzadeh Lionel Briand EmanueleTurella Thierry Coq and Rajwinder Kaur Panesar-Walawege Plan-ning for safety standards compliance A model-based tool-supportedapproach IEEE Software 29(3)64ndash70 2012

[15] Dov Gabbay Overview on the connection between reactive kripkemodels and argumentation networks Ann Math Artif Intell 66(1-4)1ndash5 2012

[16] Dov Gabbay Introducing reactive kripke semantics and arc accessi-bility Ann Math Artif Intell 66(1-4)7ndash53 2012

[17] Dov Gabbay Introducing reactive modal tableaux Ann Math ArtifIntell 66(1-4)55ndash79 2012

[18] Dov Gabbay Completeness theorems for reactive modal logics AnnMath Artif Intell 66(1-4)81ndash129 2012

[19] Dov Gabbay and Sergio Marcelino Global view on reactivity switchgraphs and their logics Ann Math Artif Intell 66(1-4)131ndash1622012

[20] Philipp Grabher Johann Grosschadl Simon Hoerder Kimmo Jarvi-nen Dan Page Stefan Tillich and Marcin Wojcik An explorationof mechanisms for dynamic cryptographic instruction set extensionJournal of Cryptographic Engineering 2(1)1ndash18 2012

[21] Laurent Kirsch Jean Botev and Steffen Rothkugel Snippets andcomponent-based authoring tools for reusing and connecting docu-ments Journal of Digital Information Management 10(6)399ndash4092012

[22] Tom Mens and Jacques Klein Evolving software - introduction to thespecial theme Ercim News 888ndash9 2012

[23] Gilles Perrouin Sebastian Oster Sagar Sen Jacques Klein BenoitBaudry and Yves Le Traon Pairwise testing for software prod-uct lines Comparison of two approaches Software Quality Journal20(3)605ndash643 2012

[24] Selwyn Piramuthu Gaurav Kapoor Wei Zhou and Sjouke MauwInput online review data and related bias in recommender systemsDecision Support Systems 53(3)418ndash424 2012

200 BIBLIOGRAPHY

[25] Qiang Tang Public key encryption schemes supporting equality testwith authorization of different granularity International Journal ofApplied Cryptography pages 304ndash321 2012

[26] Qiang Tang Public key encryption supporting plaintext equality testand user specified authorization Security and Communication Net-works pages 1351ndash1362 2012

[27] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre Modelling defeasible and prioritized support in bipolar argu-mentation Ann Math Artif Intell 66(1-4)163ndash197 2012

[28] Serena Villata Guido Boella Dov Gabbay Leendert van der Torreand Joris Hulstijn A logic of argumentation for specification andverification of abstract argumentation frameworks Ann Math ArtifIntell 66(1-4)199ndash230 2012

[29] Ying Zhang Chenyi Zhang Jun Pang and Sjouke Mauw Game-based verification of contract signing protocols with minimal messagesInnovations in Systems and Software Engineering 8111ndash124 2012

[30] Qixia Yuan Panuwat Trairatphisan Jun Pang Sjouke MauwMonique Wiesinger and Thomas Sauter Probabilistic model check-ing of the pdgf signaling pathway Transactions on ComputationalSystems Biology XIV151ndash180 2012

[31] Emil Weydert Conditional ranking revision - iterated revision withsets of conditionals Journal of Philosophical Logic 41(1)237ndash2712012

[32] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre Modelling defeasible and prioritized support in bipolar argu-mentation Ann Math Artif Intell 66(1-4)163ndash197 2012

[33] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre A logic of argumentation for specification and verification ofabstract argumentation frameworks Ann Math Artif Intell 66(1-4)199ndash230 2012

[34] Paolo Turrini Jan Broersen Rosja Mastrop and John-Jules ChMeyer Regulating competing coalitions a logic for socially optimalgroup choices Journal of Applied Non-Classical Logics 22(1-2)181ndash202 2012

[35] Yanjie Sun Chenyi Zhang Jun Pang Baptiste Alcalde and SjoukeMauw A trust-augmented voting scheme for collaborative privacymanagement Journal of Computer Security 20(4)437ndash459 2012

BIBLIOGRAPHY 201

[36] Hanna Scholzel Hartmut Ehrig Maria Maximova Karsten Gabrieland Frank Hermann Satisfaction restriction and amalgamation ofconstraints in the framework of m-adhesive categories Electronic Pro-ceedings in Theoretical Computer Science (EPTCS) 9383ndash104 2012

[37] Ayda Saidane and Nicolas Guelfi Seter Towards architecture-modelbased security engineering International Journal of secure softwareengineering to appear 0920120ndash0 2012

[38] Frederic Pinel Bernabe Dorronsoro Johnatan E Pecero Pascal Bou-vry and Samee U Khan A two-phase heuristic for the energy-efficientscheduling of independent tasks on computational grids Cluster Com-puting 2012

[39] Frederic Pinel Bernabe Dorronsoro and Pascal Bouvry Solving verylarge instances of the scheduling of independent tasks problem on thegpu Journal of Parallel and Distributed Computing 2012

[40] Jakub Muszynski Sebastien Varrettte Pascal Bouvry FranciszekSeredynski and Samee U Khan Convergence analysis of evolutionaryalgorithms in the presence of crash-faults and cheaters InternationalJournal of Computers amp Mathematics with Applications 64(12)3809ndash 3819 2012

[41] Roman Ledyayev Benoıt Ries and Anatoliy Gorbenko React anarchitectural framework for the development of a software productline for dependable crisis management systems Radioelectronic andComputer Systems 59(7)284ndash288 2012

[42] Simon Kramer Rajeev Gore and Eiji Okamoto Computer-aideddecision-making with trust relations and trust domains (cryptographicapplications) Journal of Logic and Computation pages 0 ndash 0 2012page numbers not yet known

[43] Dzmitry Kliazovich Simone Redana and Fabrizio Granelli Arqproxy Cross-layer error recovery in wireless access networks Inter-national Journal of Communication Systems 25(4)461 ndash 477 2012

[44] You Ilsun Lenzini Gabriele Ogiela Marek R and Bertino Elisa De-fending against insider threats and internal data leakage (guest edito-rial) Security and Communication Networks 5(8)831 ndash 833 2012

[45] Frank Hermann and Janis Voigtlander First international work-shop on bidirectional transformations (bx 2012) Preface ElectronicCommunications of the European Association of Software Science andTechnology (ECEASST) 491ndash4 2012

202 BIBLIOGRAPHY

[46] Davide Grossi and Paolo Turrini Dependence in games and de-pendence games Autonomous Agents and Multi-Agent Systems25(2)284ndash312 2012

[47] Valentin Goranko Wojciech Jamroga and Paolo Turrini Strategicgames and truly playable effectivity functions Autonomous Agentsand Multi-Agent Systems 2012

[48] David Galindo Rodrigo Roman and Javier Lopez On the energy costof authenticated key agreement in wireless sensor networks WirelessCommunications and Mobile Computing 12(1)133 ndash 143 2012

[49] Claudia Ermel Frank Hermann Jurgen Gall and Daniel BinanzerVisual modeling and analysis of emf model transformations based ontriple graph grammars Electronic Communications European Associ-ation of Software Science and Technology (EC-EASST) pages 1ndash122012

[50] Vasileios Efthymiou Maria Koutraki and Grigoris Antoniou Real-time activity recognition and assistance in smart classrooms Advancesin Distributed Computing and Artificial Intelligence Journal 15367ndash74 2012

[51] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry New state-of-the-art results for cassini2 global trajectory optimization problemThe Journal of the Advanced Concepts Team 556 ndash 72 2012

[52] Miguel Couceiro and Erkko Lehtonen Galois theory for sets of op-erations closed under permutation cylindrification and compositionAlgebra Universalis 67(3)273ndash297 2012

[53] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser The aritygap of order-preserving functions and extensions of pseudo-booleanfunctions Discrete Applied Mathematics 160(4-5)383ndash390 2012

[54] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser Decom-positions of functions based on arity gap Discrete Mathematics312(2)238ndash247 2012

[55] Martin Caminada Walter Carnielli and Paul Dunne Semi-stablesemantics J Log Comput 22(5)1207ndash1254 2012

[56] Richard Booth Thomas Meyer and Chattrakul Sombattheera A gen-eral family of preferential belief removal operators Journal of Philo-sophical Logic 41(4)711ndash733 2012

[57] Mike Behrisch Miguel Couceiro Keith A Kearnes Erkko Lehtonenand Agnes Szendrei Commuting polynomial operations of distributivelattices Order 29(2)245ndash269 2012

BIBLIOGRAPHY 203

[58] Alessandra Bagnato Barbara Kordy Per H Meland and PatrickSchweitzer Attribute decoration of attack-defense trees InternationalJournal of Secure Software Engineering 3(2)1ndash35 2012

[59] Peter Ryan and Thea Peacock Verifiable voting Recent advances andfuture challenges Voting What Has Changed What Hasnrsquot amp WhatNeeds Improvement 1(1)1ndash84 2012

[60] Le-Nam Tran Mats Bengtsson and Bjorn Ottersten Iterative pre-coder design and user scheduling for block-diagonalized systems IEEETransactions on Signal Processing 60(7)3726ndash3739 2012

[61] Yongming Huang Gan Zheng Mats Bengtsson Kai-Kit Wong LuxiYang and Bjorn Ottersten Distributed multicell beamforming designapproaching pareto boundary with max-min fairness IEEE Transac-tions on Wireless Communications 11(8)2921ndash2933 2012

[62] Bhavani Shankar Daniel Arapoglou Pantelis and Bjorn OtterstenSpace-frequency coding for dual polarized hybrid mobile satellite sys-tems IEEE Transactions on Wireless Communications 11(8)2806ndash2814 2012

[63] Emil Bjornson Mats Bengtsson and Bjorn Ottersten Pareto char-acterization of the multicell mimo performance region with simple re-ceivers IEEE Transactions on Signal Processing 60(8)4464ndash44692012

[64] Symeon Chatzinotas Gan Zheng and Bjorn Ottersten Generic op-timization of linear precoding in multibeam satellite systems IEEETransactions on Wireless Communications 11(6)2308ndash2320 2012

[65] Bhavani Shankar M R Pantelis-Daniel Arapoglou and Bjorn Otter-sten Space-frequency coding for dual polarized hybrid mobile satellitesystems IEEE Transactions on Wireless Communications 11(8)2806ndash 2814 2012

[66] Frederic Garcia Djamila Aouada Bruno Mirbach and Bjorn Otter-sten Real-time distance-dependent mapping for a hybrid tof multi-camera rig IEEE Journal of Selected Topics in Signal Procesing(JSTSP) 6(5)1ndash12 2012

[67] Dimitrios Christopoulos Symeon Chatzinotas Gan Zheng Joel Grotzand Bjorn Ottersten Multibeam joint processing in satellite communi-cations Eurasip Journal on Wireless Communications and Network-ing 2012(1) 2012

204 BIBLIOGRAPHY

[68] Emil Bjornson Gan Zheng Mats Bengtsson and Bjorn OtterstenRobust monotonic optimization framework for multicell miso systemsIEEE Transactions on Signal Processing 60(5)2508ndash2523 2012

[69] David Fotue Houda Labiod and Thomas Engel Performance eval-uation of mini-sinks mobility using multiple paths in wireless sensornetworks International Journal of Computer Science and Security(IJCSS) 6(3)150ndash167 2012

[70] Marcin Seredynski and Pascal Bouvry Analysing the development ofcooperation in manets The Journal of Supercomputing pages 1ndash172012

[71] Marcin Seredynski and Pascal Bouvry Direct reciprocity-based coop-eration in mobile ad hoc networks International Journal of Founda-tions of Computer Science 23(2)501ndash521 2012

[72] Dzmitry Kliazovich Pascal Bouvry and Samee U Khan Greenclouda packet-level simulator of energy-aware cloud computing data centersThe Journal of Supercomputing 62(3)pp 1263ndash1283 2012

[73] Patricia Ruiz Bernabe Dorronsoro Pascal Bouvry and Lorenzo JTardon Information dissemination in vanets based upon a tree topol-ogy Journal of Ad hoc Networks 10(1)111ndash127 2012

[74] Patricia Ruiz Bernabe Dorronsoro Giorgio Valentini Frederic Pineland Pascal Bouvry Optimisation of the enhanced distance basedbroadcasting protocol for manets J of Supercomputing Special Is-sue on Green networks 62(3)1213ndash1240 2012

[75] Shaukat Ali Tao Yue and Lionel Briand Does aspect-oriented mod-eling help improve the readability of uml state machines Softwareand Systems Modeling 2012

[76] Andrea Arcuri and Lionel Briand A hitchhikerrsquos guide to statisti-cal tests for assessing randomized algorithms in software engineeringSoftware Testing Verification and Reliability 2012

[77] Andrea Arcuri and Lionel Briand Formal analysis of the probability ofinteraction fault detection using random testing IEEE Transactionson Software Engineering 38(5)1088ndash1099 2012

74 Conferences Articles

[78] Apostolos Stathakis Gregoire Danoy Thomas Veneziano Pascal Bou-vry and Gianluigi Morelli Bi-objective optimisation of satellite pay-load configuration In Proceedings of the 13e congres annuel de la

BIBLIOGRAPHY 205

Societe francaise de Recherche Operationnelle et drsquoAide a la Decision(ROADEF) pages 1ndash2 2012

[79] Apostolos Stathakis Gregoire Danoy Thomas Veneziano JulienSchleich and Pascal Bouvry Optimising satellite payload reconfig-uration An ilp approach for minimising channel interruptions In 2ndESA Workshop on Advanced Flexible Telecom Payloads pages 1ndash8ESA 2012

[80] Guido Boella Joris Hulstijn Llio Humphreys Livio Robaldo andLeendert Van der Torre Legal knowledge management systems forregulatory compliance In IX Conference of the Italian Chapter ofAIS pages 1ndash8 2012

[81] Guido Boella Joris Hulstijn Llio Humphreys Marijn Janssen andLeendert van der Torre Towards legal knowledge management systemsfor regulatory compliance In IX Conference of the Italian Chapter ofAIS pages 1ndash8 2012

[82] Guido Boella Luigi di Caro Llio Humphreys Livio Robaldo andLeendert van der Torre Nlp challenges for eunomos a tool to build andmanage legal knowledge In Proceedings of the Eighth InternationalConference on Language Resources and Evaluation (LREC rsquo12) pages3672ndash3678 European Language Resources Association (ELRA) 2012

[83] Guido Boella Llio Humphreys Marco Martin Piercarlo Rossi andLeendert van der Torre Eunomos a legal document and knowledgemanagement system to build legal services In Monica (Editor) Palmi-rani Ugo (Editor) Pagallo Pompeu (Editor) Casanovas and Gio-vanni (Editor) Sartor editors AI Approaches to the Complexity ofLegal Systems Models and Ethical Challenges for Legal Systems LegalLanguage and Legal Ontologies Argumentation and Software Agentsvolume 7639 of Lecture Notes in Computer Science pages 131ndash146Berlin Heidelberg 2012 Springer

[84] Pouyan Ziafati Mehdi Dastani John-Jules Meyer and Leon VanDer Torre Agent programming languages requirements for program-ming cognitive robots (extended abstract) In Proceedings of the 24thBenelux Conference on Artificial Intelligence pages 337ndash338 2012

[85] Eric Tobias Eric Ras and Nuno Amalio Suitability of visual mod-elling languages for modelling tangible user interface applicationsIn Symposium on Visual Languages and Human-Centric Computing(VLHCC) pages 269 ndash270 IEEE 2012

206 BIBLIOGRAPHY

[86] Jerome Leemans and Nuno Amalio Modelling a cardiac pacemakervisually and formally In Symposium on Visual Languages and Human-Centric Computing (VLHCC) pages 257 ndash258 IEEE 2012

[87] Mike Papadakis and Yves Le Traon Using mutants to locate ldquoun-knownrdquo faults In Fifth International Conference on Software TestingVerification and Validation (ICST) pages 691ndash700 2012

[88] Silvano Colombo Tosatto Guido Boella Leendert van der Torre andSerena Villata Abstract normative systems Semantics and prooftheory In Proceedings of the Thirteenth International Conference onPrinciples of Knowledge Representation and Reasoning pages 358ndash368 2012

[89] Silvano Colombo Tosatto Guido Boella Leon van der Torre and Ser-ena Villata Visualizing normative systems an abstract approach InDeontic Logic in Computer Science - 11th International ConferenceDEON 2012 pages 16ndash30 2012

[90] Silvano Colombo Tosatto Marwane El Kharbili Guido GovernatoriPierre Kelsen Qin Ma and Leender van der Torre Algorithms forbasic compliance problems In Benelux conference on Artificial Intel-ligence (BNAIC) 2012

[91] Jayanta Poray and Christoph Schommer Operations on conver-sational mind-graphs In The 4th International Conference onAgents and Artificial Intelligence (ICAART - 2012) pages 511ndash514SciTePress 2012

[92] Christoph Bosch Qiang Tang Peter Hartel and Willem Jonker Selec-tive document retrieval from encrypted database In Information Se-curity - 15th International Conference ISC 2012 volume 7483 pages224ndash241 Springer 2012

[93] Xiaofeng Chen Jin Li Jianfeng Ma Qiang Tang and Wenjing LouNew algorithms for secure outsourcing of modular exponentiations InComputer Security - ESORICS 2012 - 17th European Symposium onResearch in Computer Security volume 7459 pages 541ndash556 Springer2012

[94] Johann Grosschadl Dan Page and Stefan Tillich Efficient java im-plementation of elliptic curve cryptography for j2me-enabled mobiledevices In Information Security Theory and Practice mdash WISTP 2012volume LNCS 7322 pages 189ndash207 Springer Verlag 2012

[95] Arjan Jeckmans Qiang Tang and Pieter Hartel Privacy-preservingcollaborative filtering based on horizontally partitioned dataset In

BIBLIOGRAPHY 207

International Symposium on Security in Collaboration Technologiesand Systems pages 439ndash446 2012

[96] Max E Kramer Jacques Klein and Jim R H Stell Building specifica-tions as a domain-specific aspect language In Proceedings of the Sev-enth Workshop on Domain-Specific Aspect Languages at the Aspect-Oriented Software Development Conference pages 29ndash32 ACM 2012

[97] Daniel Marnach Sjouke Mauw Miguel Martins and Carlo HarpesDetecting meaconing attacks by analysing the clock bias of gnss re-ceivers In European Navigation Conference (ENC 2012) pages 1ndash192012

[98] Jorge Augusto Meira Eduardo Cunha Almeida Yves Le Traon andGerson Sunye Peer-to-peer load testing In ICST - 2012 IEEE FifthInternational Conference on Software Testing Verification and Vali-dation pages 642ndash647 IEEE 2012

[99] Gilles Perrouin Brice Morin Franck Chauvel Franck Fleurey JacquesKlein Yves Le Traon Olivier Barais and Jean-Marc Jezequel To-wards flexible evolution of dynamically adaptive systems in the newideas amp emerging results track of the international conference ofsoftware engineering (niericse) In New Ideas amp Emerging Re-sults Track of the International Conference of Software Engineering(NIERICSE) Zurich Switzerland 2012 pages 1353ndash1356 IEEEPress 2012

[100] Qiang Tang Cryptographic framework for analyzing the privacy ofrecommender algorithms In International Conference on Collabora-tion Technologies and Systems pages 455ndash462 IEEE 2012

[101] Ton van Deursen and Sasa Radomirovic Insider attacks and privacy ofrfid protocols In Public Key Infrastructures Services and Applications-8th European Workshop EuroPKI 2011 volume 7163 pages 91ndash105Springer 2012

[102] Erich Wenger and Johann Grosschadl An 8-bit avr-based elliptic curvecryptographic risc processor for the internet of things In Proceedingsof the 1st Workshop on Hardware and Architectural Support for Secu-rity and Privacy (HASP 2012) pages 37ndash45 IEEE Computer Society2012

[103] Reiko Heckel Hartmut Ehrig Ulrike Golas and Frank Hermann Par-allelism and concurrency of stochastic graph transformations In GraphTransformations volume 7562 of Lecture Notes in Computer Sciencepages 96ndash110 Springer Berlin Heidelberg 2012

208 BIBLIOGRAPHY

[104] Jan Broersen Dov Gabbay and Leendert van der Torre Discussionpaper Changing norms is changing obligation change In DeonticLogic in Computer Science volume 7393 of Lecture notes in ComputerScience pages 199ndash214 Springer 2012

[105] Chenyi Zhang and Jun Pang An algorithm for probabilistic alternat-ing simulation In Proc the 38th International Conference on CurrentTrends in Theory and Practice of Computer Science pages 431ndash4422012

[106] Emil Weydert On arguments and conditionals In ECAI WS WeightedLogics for AI (WL4AI) pages 69ndash78 IRIT 2012

[107] Srdjan Vesic Mykhailo Ianchuk and Andrii Rubtsov The synergy Aplatform for argumentation-based group decision making In Proceed-ings of the 4th International Conference on Computational Models ofArgument COMMA 2012 pages 501ndash502 2012

[108] Srdjan Vesic and Leendert van der Torre Beyond maxi-consistent ar-gumentation operators In Proceedings of the 13th European Confer-ence on Logics in Artificial Intelligence JELIA 2012 pages 424ndash4362012

[109] Srdjan Vesic Maxi-consistent operators in argumentation In Proceed-ings of the 20th European Conference on Artificial Intelligence ECAI2012 pages 810ndash815 2012

[110] Leendert van der Torre and Guido Boella Reasoning for agreementtechnologies In Proceedings of the 20th European Conference on Ar-tificial Intelligence (ECAI) pages 895ndash896 2012

[111] Leendert van der Torre Logics for security and privacy In Data andApplications Security and Privacy XXVI pages 1ndash7 Springer 2012

[112] Paolo Turrini Agreements as norms In Deontic Logic in ComputerScience pages 31ndash45 2012

[113] Marija Slavkovik and Wojciech Jamroga Distance-based rules forweighted judgment aggregation (extended abstract) In Proceedings ofthe 11th International Conference on Autonomous Agents and Multi-agent Systems AAMAS2012 pages 1405ndash1406 2012

[114] Francois Schwarzentruber Srdjan Vesic and Tjitze Rienstra Build-ing an epistemic logic for argumentation In Proceedings of the 13thEuropean Conference on Logics in Artificial Intelligence JELIA 2012pages 359ndash371 2012

BIBLIOGRAPHY 209

[115] Tjitze Rienstra Towards a probabilistic dung-style argumentationsystem In AT 2012 Agreement Technologies Proceedings of the FirstInternational Conference on Agreement Technologies pages 138ndash152CEUR 2012

[116] Sandro Reis Denis Shirnin and Denis Zampunieris Design ofproactive scenarios and rules for enhanced e-learning In Proceed-ings CSEDU 2012 4th International Conference on Computer Sup-ported Education Porto (Portugal) 2012 volume 1 pages 253 ndash 258SciTePress ndash Science and Technology Publications 2012

[117] Raghunath Rajachandrasekar Xavier Besseron and Dhabaleswar KPanda Monitoring and predicting hardware failures in hpc clusterswith ftb-ipmi In 2012 IEEE 26th International Parallel and Dis-tributed Processing Symposium Workshops amp PhD Forum pages 1136ndash1443 IEEE Computer Society 2012

[118] Johnatan E Pecero Hector Joaquin Fraire Huacuja Pascal BouvryAurelio Alejandro Santiago Pineda Mario Cesar Lopez Loces andJuan Javier Gonzalez Barbosa On the energy optimization for prece-dence constrained applications using local search algorithms In Pro-ceedings of the 2012 International Conference on High PerformanceComputing amp Simulation (HPCS 2012) pages 133 ndash 139 2012

[119] Patrick Meyer and Alexandru-Liviu Olteanu Preferentially orderedclustering In Modelling Decisions for Artificial Intelligence pages87ndash98 2012

[120] Juan Julian Merelo Antonio M Mora Carlos Fernandes Anna IEsparcia-Alcazar and Juan Luis Jimenez Laredo Pool vs island basedevolutionary algorithms an initial exploration In 2012 Seventh In-ternational Conference on P2P Parallel Grid Cloud and InternetComputing pages 19ndash24 IEEE Computer Society 2012

[121] Sergio Marques Dias Sandro Reis and Denis Zampunieris Proac-tive computing based implementation of personalized and adaptivetechnology enhanced learning over moodle(tm) In Proceedings ofICALT 2012 IEEE 12th International Conference on Advanced Learn-ing Technologies pages 674 ndash 675 IEEE Computer Society Publica-tions 2012

[122] Diana Marosin Alex Handrik Proper and Leendert van der TorreChanging agreements Intention reconsideration based on assumptionsand reasons In Proceedings of the First International Conference onAgreement Technologies AT 2012 pages 296ndash297 2012

210 BIBLIOGRAPHY

[123] Qian Li Peter Schaffer Jun Pang and Sjouke Mauw Comparativeanalysis of clustering protocols with probabilistic model checking InProceedings of the 6th IEEE Symposium on Theoretical Aspects of Soft-ware Engineering pages 249ndash252 IEEE Computer Society 2012

[124] Erkko Lehtonen and Agnes Szendrei Partial orders induced by quasi-linear clones In Contributions to General Algebra volume 20 pages51ndash84 Verlag Johannes Heyn 2012

[125] Barbara Kordy Marc Pouly and Patrick Schweitzer Computationalaspects of attack-defense trees In Security amp Intelligent InformationSystems volume LNCS 7053 pages 103ndash116 Springer 2012

[126] Laurent Kirsch Jean Botev and Steffen Rothkugel The snippet sys-tem - reusing and connecting documents In Proceedings of the 7thInternational Conference on Digital Information Management pages138ndash144 2012

[127] Laurent Kirsch Jean Botev and Steffen Rothkugel An extensible toolset for creating and connecting reusable documents In Proceedings ofWorld Conference in Educational Media Hypermedia and Telecommu-nications pages 1434ndash1442 2012

[128] Coron Jean-Sebastien Giraud Christophe Prouff Emmanuel Ren-ner Soline Rivain Matthieu and Vadnala Praveen Kumar Conver-sion of security proofs from one leakage model to another A newissue In Constructive Side-Channel Analysis and Secure Design vol-ume 72752012 pages 69ndash81 Springer Lecture Notes in ComputerScience 2012 2012

[129] Gallais Jean-Francois Roy Arnab and Vadnala Praveen Kumar Fullkey recovery attacks on modular addition An application to threefishIn Workshop on Embedded Systems Security 2012 pages 1ndash9 ACM2012

[130] Wojciech Jamroga Concepts agents and coalitions in alternatingtime In Proceedings of the 20th European Conference on ArtificialIntelligence ECAI 2012 pages 438ndash443 2012

[131] Santiago Iturriaga Sergio Nesmachnow and Bernabe Dorronsoro Amultithreading local search for multiobjective energy-aware schedulingin heterogeneous computing systems In 26th European Conference onModelling and Simulation (ECMS) pages 1 ndash 7 2012

[132] Frank Hermann Hartmut Ehrig and Claudia Ermel Concurrentmodel synchronization with conflict resolution based on triple graphgrammars In Fundamental Approaches to Software Engineering vol-ume 7212 pages 178ndash193 Springer 2012

BIBLIOGRAPHY 211

[133] Davide Grossi and Paolo Turrini Short sight in extensive gamesIn Proceedings of the 11th International Conference on AutonomousAgents and Multiagent Systems (AAMAS 2012) pages 805ndash812 2012

[134] Valentin Goranko and Wojciech Jamroga State and path effectivitymodels for logics of multi-player games In Proceedings of the 11thInternational Conference on Autonomous Agents and Multiagent Sys-tems AAMAS 2012 pages 1123ndash1130 Springer 2012

[135] Eugenio Giordano Lara Codeca Brian Geffon Giulio Grassi Gio-vanni Pau and Mario Gerla Movit The mobile network virtual-ized testbed In Proceedings of the ninth ACM international workshopon Vehicular inter-networking systems and applications pages 3ndash12ACM New York NY USA ccopy2012 2012

[136] Nicolas Genon Patrice Caire Hubert Toussaint Patrick Heymansand Daniel Moody Towards a more semantically transparent i visualsyntax In Requirements Engineering Foundation for Software Qual-ity - 18th International Working Conference REFSQ 2012 EssenGermany March 19-22 2012 Proceedings Lecture Notes in Com-puter Science 7195 Springer 2012 volume 7195 of Lecture Notes inComputer Science pages 140ndash146 Springer Berlin Heidelberg 2012

[137] Vijayalakshmi Ganesan Sergio Sousa Marija Slavkovik and Leendertvan der Torre Selecting judgment aggregation rules for nao robotsan experimental approach In Proceedings of the 11th InternationalConference on Autonomous Agents and Multiagent Systems (AAMAS2012) pages 1403ndash1404 International Foundation for AutonomousAgents and Multiagent Systems 2012

[138] Francois Fouquet Gregory Nain Brice Morin Erwan Daubert OlivierBarais Noel Plouzeau and Jean-Marc Jezequel An eclipse modellingframework alternative to meet the modelsruntime requirements InMODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMSvolume 7590 pages 87ndash101 Springer Berlin Heidelberg 2012

[139] Vasileios Efthymiou and Patrice Caire Privacy challenges in ambientintelligent systems A critical discussion In Proceedings of the 3rdPrivacy Protection Symposium - Atelier protection de la vie privee(APVP) 2012

[140] Vasileios Efthymiou Patrice Caire and Antonis Bikakis Modeling andevaluating cooperation in multi-context systems using conviviality InProceedings of BNAIC 2012 The 24th Benelux Conference on ArtificialIntelligence pages 83ndash90 2012

212 BIBLIOGRAPHY

[141] Naipeng Dong Hugo Jonker and Jun Pang Formal analysis of privacyin an ehealth protocol In Proceedings of the 17th European Symposiumon Research in Computer Security volume 7459 of Lecture Notes inComputer Science pages 325ndash342 Springer-Verlag 2012

[142] Naipeng Dong Hugo Jonker and Jun Pang Challenges in ehealthfrom enabling to enforcing privacy In Proceedings of the First inter-national conference on Foundations of Health Informatics Engineeringand Systems (FHIESrsquo11) volume 7151 of Lecture Notes in ComputerScience pages 195ndash206 Springer-Verlag 2012

[143] Sergio Dias Marques Sandro Reis and Denis Zampunieris Personal-ized adaptive and intelligent support for online assignments based onproactive computing In Proceedings of ICALT 2012 IEEE 12th In-ternational Conference on Advanced Learning Technologies pages 668ndash 669 IEEE Computer Society Conference Publishing Services 2012

[144] Denise Demirel Hugo Jonker and Melanie Volkamer Random blockverification Improving the norwegian electoral mix net In Proceed-ings of the 5th International Conference on Electronic Voting (EVOTE2012) volume 205 pages 65ndash78 Gesellschaft fur Informatik eV 2012

[145] Mehdi Dastani Leendert van der Torre and Neil Yorke-Smith A pro-gramming approach to monitoring communication in an organisationalenvironment In AAMAS rsquo12 Proceedings of the 11th InternationalConference on Autonomous Agents and Multiagent Systems - Volume3 pages 1373ndash1374 2012

[146] Sviatlana Danilava Stephan Busemann and Christoph SchommerArtificial conversational companions In Proceedings of the 4th Inter-national Conference on Agents and Artificial Intelligence volume 2pages 282ndash289 SciTePress 2012 2012

[147] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser Gap vspag In 42nd IEEE International Symposium on Multiple-Valued Logic(ISMVL 2012) pages 268ndash273 IEEE Computer Society 2012

[148] Xihui Chen and Jun Pang Measuring query privacy in location-basedservices In Proceeding of 2nd ACM Conference on Data and Applica-tion Security and Privacy pages 49 ndash 61 ACM 2012

[149] Martin Caminada and Podlaszewski Mikolaj Grounded semantics aspersuasion dialogue In Computational Models of Argument - Proceed-ings of COMMA 2012 volume 245 pages 478ndash485 IOS Press 2012

[150] Martin Caminada and Mikolaj Podlaszewski User-computer persua-sion dialogue for grounded semantics In Proceedings of the 24th

BIBLIOGRAPHY 213

Benelux Conference on Artificial Intelligence (BNAIC 2012) pages343ndash344 2012

[151] Martin Caminada and Mikolaj Podlaszewski Grounded semantics aspersuasion dialogue In Proceedings of the 4th International Confer-ence on Computational Models of Argument (COMMA 2012) volume245 pages 478ndash485 IOS Press 2012

[152] Patrice Caire Antonis Bikakis and Vasileios Efthymiou Convivialityby design In Social computing Social cognition social networks Ac-quisition representation and reasoning with contextualized knowledge(ARCOE 2012) 2012

[153] M Majid Butt and Eduard A Jorsweick Energy efficient multiuserscheduling Exploiting the loss tolerance of the application In IEEEGlobecom - Symposium on Selected Areas in Communications pages3555ndash3560 IEEE 2012

[154] M Majid Butt Benjamin Schubert Martin Kurras Kai BornerThomas Haustein and Lars Thiele On the energy-bandwidth trade-off in green wireless networks System level results In Workshop onSmart and Green Communications amp Networks (SGCNet) at Interna-tional conference on communication in China (ICCC) pages 91ndash95IEEE 2012

[155] M Majid Butt Deadline delay constrained multiuser multicell sys-tems Energy efficient scheduling In 13th IEEE International Work-shop on Signal Processing Advances in Wireless Communications(SPAWC) pages 309ndash313 IEEE 2012

[156] Richard Booth Martin Caminada Mikolaj Podlaszewski and IyadRahwan Quantifying disagreement in argument-based reasoningIn Proceedings of the 11th International Conference on AutonomousAgents and Multiagent Systems (AAMAS 2012) pages 493ndash500 Inter-national Foundation for Autonomous Agents and Multiagent Systems2012

[157] Richard Booth Eduardo Ferme Sebastien Konieczny and RamonPino Perez Credibility-limited revision operators in propositionallogicrsquo In Proceedings of the 24th Benelux Conference on ArtificialIntelligence (BNAIC 2012) pages 277ndash278 2012

[158] Richard Booth Eduardo Ferme Sebastien Konieczny and RamonPino Perez Credibility-limited revision operators in propositionallogic In Proceedings of the 13th International Conference on Prin-ciples of Knowledge Representation and Reasoning (KR 2012) pages116ndash125 AAAI 2012

214 BIBLIOGRAPHY

[159] Richard Booth Souhila Kaci Tjitze Rienstra and Leon van der TorreConditional acceptance functions In Proceedings of the 4th Interna-tional Conference on Computational Models of Argument (COMMA2012) volume 245 pages 470ndash477 IOS Press 2012

[160] Richard Booth Thomas Meyer and Ivan Vazinczak Ptl A proposi-tional typicality logic In 13th Conference on Logics in Artificial In-telligence (JELIA 2012) volume 7519 pages 107ndash119 Springer BerlinHeidelberg 2012

[161] Nicolas Bernard and Franck Leprevost Beyond tor The truenymsprotocol In Security and Intelligent Information Systems volume7053 of Lecture Notes in Computer Science pages 68ndash84 Springer2012

[162] Aritz Barrondo Andrei Tchernykh Elisa Shaeffer and JohnatanPecero Energy efficiency of knowledge-free scheduling in peer-to-peerdesktop grids In Proceedings of the 2012 International Conferenceon High Performance Computing amp Simulation (HPCS 2012) pages105ndash111 IEEE 2012

[163] Pietro Baroni Guido Boella Federico Cerutti Massimiliano Gia-comin Leendert van der Torre and Serena Villata On inputoutputargumentation frameworks In Computational Models of Argument(Proceedings of COMMA 2012) pages 358ndash365 IOS Press 2012

[164] Arash Atashpendar Laurent Kirsch Jean Botev and SteffenRothkugel A native approach to semantics and inference in fine-grained documents In Proceedings of the 2nd Joint International Se-mantic Technology Conference 2012

[165] Ofer Arieli and Martin Caminada A general qbf-based formalization ofabstract argumentation theory In Computational Models of Argument- Proceedings of COMMA 2012 volume 245 pages 105ndash116 IOS Press2012

[166] Giulia Andrighetto Guido Governatori Pablo Noriega and Leendertvan der Torre Normative multi-agent systems In Dagstuhl Reportsvolume 2 pages 23ndash49 2012

[167] Maha Alodeh Qoe for spatial cognitive systems In IEEE Interna-tional Conference on Communications 2012

[168] Dzmitry Kliazovich Pascal Bouvry and Samee Ullah Khan Sim-ulating communication processes in energy-efficient cloud computingsystems In IEEE 1st International Conference on Cloud Networkingpages 2015ndash2017 2012

BIBLIOGRAPHY 215

[169] Juan Luis Jimenez Laredo Bernabe Dorronsoro Johnatan PeceroPascal Bouvry Juan Jose Durillo and Carlos Fernandes Designing aself-organized approach for scheduling bag-of-tasks In Proceedings ofthe 7th International Conference on P2P Parallel Grid Cloud andInternet Computing (3PGCIC) pages 315ndash320 IEEE 2012

[170] Mateusz Guzek Cesar O Diaz Johnatan E Pecero Pascal Bouvryand Albert Y Zomaya Impact of voltage levels number for energy-aware bi-objective dag scheduling for multi-processors systems InCommunications in Computer and Information Science volume 344pages 70ndash80 Springer 2012

[171] Bernabe Dorronsoro and Pascal Bouvry Study of different small-worldtopology generation mechanisms for genetic algorithms In Proceedingsof the IEEE Congress on Evolutionary Computation (CEC) part ofWorld Conference in Computational Intelligence (WCCI) pages 1580ndash 1587 IEEE 2012

[172] Sune S Nielsen Bernabe Dorronsoro Gregoire Danoy and PascalBouvry Novel efficient asynchronous cooperative co-evolutionarymulti-objective algorithms In Congress on Evolutionary Computa-tion pages 1ndash7 IEEE 2012

[173] Apostolos Stathakis Gregoire Danoy Pascal Bouvry and GianluigiMorelli Satellite payload reconfiguration optimisation An ilp modelIn INTELLIGENT INFORMATION AND DATABASE SYSTEMSvolume 7197 pages 311ndash320 Springer 2012

[174] Marcin Seredynski Gregoire Danoy Masoud Tabatabaei Pascal Bou-vry and Yoann Pignie Generation of realistic mobility for vanetsusing genetic algorithms In Proceedings of the IEEE Congress onEvolutionary Computation pages 1ndash8 IEEE 2012

[175] Marcin Seredynski and Pascal Bouvry The necessity for strong re-ciprocators in mobile ad hoc networks In Proceedings of the 2012IEEE International Symposium on Parallel and Distributed Process-ing Workshops and PhD Forum pages 609ndash616 IEEE 2012

[176] Juan Luis Jimenez Laredo Pascal Bouvry Sanaz Mostaghim andJuan Julian Merelo Guervos Validating a peer-to-peer evolutionaryalgorithm In European Conference on the Applications of Evolution-ary Computation volume 7248 pages 436ndash445 Springer Berlin Hei-delberg 2012

[177] Marcin Seredynski and Pascal Bouvry Solving soft security prob-lem in manets using an evolutionary approach In Security and In-telligent Information Systems International Joint Confererence SIIS

216 BIBLIOGRAPHY

2011 Warsaw Poland June 13-14 2011 Revised Selected Papersvolume 7053 pages 33ndash44 Springer LNCS 2012

[178] Muhammad Zohaib Iqbal Andrea Arcuri and Lionel Briand Empir-ical investigation of search algorithms for environment model-basedtesting of real-time embedded software In Proceedings of the Inter-national Symposium on Software Testing and Analysis (ISSTArsquo12)pages 199ndash209 ACM 2012

[179] Muhammad Zohaib Iqbal Andrea Arcuri and Lionel Briand Com-bining search-based and adaptive random testing strategies for envi-ronment model-based testing of real-time embedded systems In Pro-ceedings of the 4th Symposium on Search Based Software Engineering(SSBSErsquo12) pages 136ndash151 Springer-Verlag 2012

[180] Muhammad Zohaib Iqbal Shaukat Ali Tao Yue and Lionel BriandExperiences of applying umlmarte on three industrial projects InProceedings of ACMIEEE 15th International Conference on ModelDriven Engineering Languages amp Systems (MODELSrsquo12) pages 642ndash658 Springer-Verlag 2012

[181] Razieh Behjati Tao Yue and Lionel Briand A modeling approach tosupport the similarity-based reuse of configuration data In Proceed-ings of ACMIEEE 15th International Conference on Model DrivenEngineering Languages amp Systems (MODELSrsquo12) pages 497ndash513Springer-Verlag 2012

[182] Shaukat Ali Tao Yue Lionel Briand and Suneth Walawege A prod-uct line modeling and configuration methodology to support model-based testing An industrial case study In Proceedings of ACMIEEE15th International Conference on Model Driven Engineering Lan-guages amp Systems (MODELSrsquo12) pages 726ndash742 Springer-Verlag2012

[183] Nina Elisabeth Holt Richard Torkar Lionel Briand and Kai HansenState-based testing Industrial evaluation of the cost-effectiveness ofround-trip path and sneak-path strategies In Proceedings of the 23rdIEEE International Symposium on Software Reliability Engineering(ISSRE 2012) IEEE Computer Society 2012

[184] Stefano Di Alesio Arnaud Gotlieb Shiva Nejati and Lionel BriandTesting deadline misses for real-time systems using constraint opti-mization techniques In Workshop on Constraints in Software Test-ing Verification and Analysis (CSTVA 2012) pages 764ndash769 IEEE2012

BIBLIOGRAPHY 217

[185] Lionel Briand Davide Falessi Shiva Nejati Mehrdad Sabetzadeh andTao Yue Research-based innovation A tale of three projects in model-driven engineering In 15th International Conference Model DrivenEngineering Languages and Systems - volume 7590 pages 759ndash775Springer Berlin Heidelberg 2012

[186] Razieh Behjati Shiva Nejati Tao Yue Arnaud Gotlieb and LionelBriand Model-based automated and guided configuration of embed-ded software systems In Modelling Foundations and Applications -8th European Conference volume 7349 of Lecture Notes in ComputerScience pages 226ndash243 Springer Berlin Heidelberg 2012

[187] Shiva Nejati Stefano Di Alesio Mehrdad Sabetzadeh and LionelBriand Modeling and analysis of cpu usage in safety-critical embeddedsystems to support stress testing In Proceedings of ACMIEEE 15thInternational Conference on Model Driven Engineering Languages ampSystems (MODELSrsquo12) pages 759ndash775 2012

[188] Markus Forster Raphael Frank Mario Gerla and Thomas Engel Im-proving highway traffic through partial velocity synchronization In2012 IEEE Global Communications Conference (GLOBECOM) 3-7December 2012 Anaheim CA USA pages 5795ndash5800 2012

[189] Foued Melakessou and Thomas Engel Narval scilab toolbox Networkanalysis and routing evaluation In 2012 International Workshop onScilab amp OW2 (IWSO) pages 1ndash18 2012

[190] Andriy Panchenko Fabian Lanze and Thomas Engel Improvingperformance and anonymity in the tor network In 31st IEEE In-ternational Performance Computing and Communications Conference(IEEE IPCCC 2012) IEEE Press 2012

[191] Samuel Marchal Jerome Francois Radu State and Thomas EngelSemantic based dns forensics In Proceedings of the IEEE InternationalWorkshop on Information Forensics and Security - WIFSrsquo12 IEEE2012

[192] Raphael Frank Maximilien Mouton and Thomas Engel Towardscollaborative traffic sensing using mobile phones In IEEE VehicularNetworking Conference 2012 pages 15ndash20 IEEE 2012

[193] Thorsten Ries Radu State and Thomas Engel Instant degradationof anonymity in low-latency anonymisation systems In DependableNetworks and Services pages 98ndash108 Springer Berlin Heidelberg2012

218 BIBLIOGRAPHY

[194] David Fotue Houda Labiod and Thomas Engel Performance evalua-tion of hybrid channel assignment for wireless sensor networks In The8th International Conference on Mobile Ad-hoc and Sensor Networks(MSN) pages 1ndash8 IEEE 2012

[195] David Fotue Houda Labiod and Thomas Engel An arbitrary mobil-ity model of mini-sinks using controlled data collection for reducingcongestion appearance in wireless sensor networks In 31st IEEE In-ternational Performance Computing and Communications Conference(IPCCC) pages 1ndash9 IEEE 2012

[196] David Fotue Houda Labiod and Thomas Engel Controlled data col-lection of mini-sinks for maximizing packet delivery ratio and through-put using multiple paths in wireless sensor networks In Proceedings ofthe 23rd IEEE International Symposium on Personal Indoor Mobileand Radio Communications (PIMRC) pages 758 ndash764 IEEE 2012

[197] Samuel Marchal Jerome Francois Radu State and Thomas EngelProactive discovery of phishing related domain names In The 15thInternational Symposium on Research in Attacks Intrusions and De-fenses volume 7462 pages 190ndash209 Springer-Verlag Berlin Heidel-berg 2012

[198] Samuel Marchal and Thomas Engel Large scale dns analysis In6th IFIP WG 66 International Conference on Autonomous Infras-tructure Management and Security volume 7279 pages 151ndash154Springer Berlin Heidelberg 2012

[199] Stefan Hommes Radu State and Thomas Engel Detecting stealthybackdoors with association rule mining In Lecture Notes in ComputerScience volume 7290 pages 161ndash171 Springer 2012

[200] Stefan Hommes Radu State and Thomas Engel A distance-basedmethod to detect anomalous attributes in log files In IEEE NetworkOperations and Management Symposium pages 498ndash501 2012

[201] Cynthia Wagner and Thomas Engel Detecting anomalies in netflowrecord time series by using a kernel function In IFIPLNCS De-pendable Network and Services 6th International Conference on Au-tonomous Infrastructure Management and Security (AIMS2012) vol-ume 7279 pages 122ndash125 Springer Verlag 2012

[202] Samuel Marchal Jerome Francois Cynthia Wagner and Thomas En-gel Semantic exploration of dns In 11th Networking Conference 2012pages 370ndash384 Springer Berlin Heidelberg 2012

BIBLIOGRAPHY 219

[203] Samuel Marchal Jerome Francois Cynthia Wagner Radu StateAlexandre Dulaunoy Thomas Engel and Olivier Festor Dnssm Alarge-scale passive dns security monitoring framework In IEEEIFIPNetwork Operations and Management Symposium pages 988 ndash 993IEEE 2012

[204] Jerome Francois Cynthia Wagner Radu State and Thomas EngelSafem Scalable analysis of flows with entropic measures and svm InProceedings of the Network Operations and Management Symposium2012 pages 510 ndash513 IEEE 2012

[205] Cynthia Wagner Jerome Francois Radu State Alexandre DulaunoyGerard Wagener and Thomas Engel Sdbf Smart dns brute-forcer In IEEEIFIP Network Operations and Management Sympo-sium (NOMSrsquo12) pages 1001ndash1007 IEEE 2012 to appear

[206] Jeehyun Hwang Tao Xie Donia Elkateb Tejeddine Mouelhi and YvesLe Traon Selection of regression system tests for security policy evolu-tion In Proceedings of the 27th IEEEACM International Conferenceon Automated Software Engineering pages 266ndash269 ACM 2012

[207] Assaad Moawad Vasileios Efthymiou Patrice Caire Gregory Nainand Yves Le Traon Introducing conviviality as a new paradigm forinteractions among it objects In Proceedings of the Workshop on AIProblems and Approaches for Intelligent Environments volume 907pages 3ndash8 CEUR-WSorg 2012

[208] Alexandre Bartel Jacques Klein Martin Monperrus and YvesLe Traon Automatically securing permission-based software by re-ducing the attack surface An application to android In IEEEACMInternational Conference on Automated Software Engineering pages1ndash4 2012

[209] Assaad Moawad Vasileios Efthymiou Patrice Caire Gregory Nainand Yves Le Traon Introducing conviviality as a new paradigmfor interactions among it objects In Workshop on AI Problems andApproaches for Intelligent Environments (AIIE 2012) volume 907pages 3ndash8 CEUR-WSorg 2012

[210] Antonis Bikakis Vasileios Efthymiou Patrice Caire and YvesLe Traon Introducing conviviality as a property of multi-context sys-tems In Acquisition Representation and Reasoning with Contextual-ized Knowledge (ARCOE 2012) pages 19ndash31 2012

[211] Alexandre Bartel Jacques Klein Martin Monperrus and YvesLe Traon Dexpler Converting android dalvik bytecode to jimple

220 BIBLIOGRAPHY

for static analysis with soot In ACM SIGPLAN International Work-shop on the State Of the Art in Java Program Analysis (SOAP 2012)pages 1ndash12 2012

[212] Donia Elkateb Tejeddine Mouelhi Yves Le Traon Jeehyun Hwangand Tao Xie Refactoring access control policies for performance im-provement In Proceedings of the third joint WOSPSIPEW interna-tional conference on Performance Engineering pages 323ndash334 ACM2012

[213] Yehia Elrakaiby Tejeddine Mouelhi and Yves Le Traon Testing obli-gation policy enforcement using mutation analysis In Proceedings ofthe fourth International Conference on Software Testing Verificationand Validation ICST 2012 pages 673 ndash680 IEEE 2012

[214] Dianxiang Xu Lijo Thomas Michael Kent Tejeddine Mouelhi andYves Le Traon A model-based approach to automated testing ofaccess control policies In Proceedings of the 17th ACM Symposium onAccess Control Models and Technologies pages 209ndash218 2012

[215] Xihui Chen Carlo Harpes Gabriele Lenzini Miguel Martins SjoukeMauw and Jun Pang Implementation and validation of a localisationassurance service provider In Proc of the 6th ESA Workshop onSatellite Navigation Technologies and European Workshop on GNSSSignals and Signal Processing (NAVITEC 2012) pages 1ndash7 IEEE2012

[216] Xihui Chen Gabriele Lenzini Sjouke Mauw and Jun Pang A groupsignature based electronic toll pricing system In Proceedings of the7th International Conference on Availability Reliability and Securitypages 85ndash93 IEEE Computer Society 2012

[217] Gan Zheng Symeon Chatzinotas and Bjorn Ottersten Multi-gatewaycooperation in multibeam satellite systems In IEEE 23rd Interna-tional Symposium on Personal Indoor and Mobile Radio Communica-tions (PIMRC) pages 1360ndash1364 2012

[218] Qingmin Meng Wei Feng Gan Zheng Symeon Chatzinotas andBjorn Ottersten Fixed full duplex relaying for wireless broadbandcommunication In International Conference on Wireless Communi-cations and Signal Processing WCSP 2012 2012

[219] Gan Zheng Li Jiangyuan Kai-Kit Wong Athina P Petropulu andBjorn Ottersten Using simple relays to improve physical-layer secu-rity In 1st IEEE International Conference on Communications inChina (ICCC2012) pages 329ndash333 2012

BIBLIOGRAPHY 221

[220] Sabrina Gerbracht Eduard A Jorswieck Gan Zheng and Bjorn Ot-tersten Non-regenerative two-hop wiretap channels using interferenceneutralization In Proceedings of the International Workshop on In-formation Forensics and Security pages 1ndash1 IEEE 2012

[221] Bhavani Shankar M R Saikat Chatterjee and Bjorn Ottersten De-tection of sparse random signals using compressive measurements InProceedings of IEEE International Conference on Acoustics Speechand Signal Processing pages 3257 ndash 3260 2012

[222] Bjorn Ottersten Signal processing challenges in satellite networks In2012 International Conference on Wireless Communications and Sig-nal Processing(WCSP 2012) pages 1ndash1 WCSP 2012 2012 KeynoteSpeaker

[223] Efthymios Tsakonas Joakim Jalden Nicolas D Sidiropoulos andBjorn Ottersten Maximum likelihood based sparse and distributedconjoint analysis In Statistical Signal Processing Workshop (SSP)2012 IEEE pages 33ndash36 IEEE 2012

[224] Symeon Chatzinotas and Bjorn Ottersten Capacity analysis of dual-hop amplify-and-forward mimo multiple-access channels In Interna-tional Conference on Wireless Communications and Signal ProcessingWCSP 2012 IEEE 2012

[225] Symeon Chatzinotas and Bjorn Ottersten Cognitive interferencealignment between small cells and a macrocell In 19th InternationalConference on Telecommunications (ICT) 2012 volume 1-6 IEEE2012

[226] Alexis Aravanis Bhavani Shankar M R Gregoire Danoy Pantelis-Daniel Arapoglou Panayotis Cottis and Bjorn Ottersten Multi-objective optimization approach to power allocation in multibeam sys-tems In 30th AIAA International Communications Satellite SystemsConference pages 1ndash6 2012

[227] Alexis Aravanis Bhavani Shankar M R Gregoire Danoy Pantelis-Daniel Arapoglou Panayotis Cottis and Bjorn Ottersten Power allo-cation in multibeam satellites - a hybrid-genetic algorithm approachIn 2nd ESA Workshop on Advanced Flexible Telecom Payloads pages1ndash5 European Space Agency 2012

[228] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenSpectrum sensing in dual polarized fading channels for cognitive sat-coms In accepted for publication in the proceedings of the IEEE Globe-com 2012 conference IEEE 2012

222 BIBLIOGRAPHY

[229] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenSatellite cognitive communications Interference modeling and tech-niques selection In 6th Advanced Satellite Multimedia Systems Con-ference (ASMS) and 12th Signal Processing for Space CommunicationsWorkshop (SPSC) pages 111ndash118 2012

[230] Frederic Garcia Djamila Aouada Hashim Kemal Abdella ThomasSolignac Bruno Mirbach and Bjorn Ottersten Depth enhancement byfusion for passive and active sensing In 12th European Conference onComputer Vision (ECCV) volume 7585 of Lecture Notes in ComputerScience pages 506ndash515 Springer Berlin Heidelberg 2012

[231] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenExploiting polarization for spectrum sensing in cognitive satcoms In7th International Conference on Cognitive Radio Oriented WirelessNetworks pages 36ndash41 2012

[232] Kassem Al Ismaeil Djamila Aouada Bruno Mirbach and Bjorn Ot-tersten Bilateral filter evaluation based on exponential kernels In21st International Conference on Pattern Recognition IEEE Xplore2012

[233] Frederic Garcia Djamila Aouada Bruno Mirbach and Bjorn Otter-sten Spatio-temporal tof data enhancement by fusion In IEEE Inter-national Conference on Image Processing (ICIP) pages 1 ndash 4 IEEE2012

[234] Symeon Chatzinotas and Bjorn Ottersten Coordinated multipointuplink capacity over a mimo composite fading channel In Interna-tional Conference on Computing Networking and Communicationspages 1061 ndash1065 IEEE 2012

[235] Jiaheng Wang Mats Bengtsson Bjorn Ottersten and Daniel P Palo-mar Robust maximin mimo precoding for arbitrary convex uncer-tainty sets In Proceedings IEEE International Conference on Acous-ticsSpeechand Signal Processing (ICASSP) pages 3045ndash3048 IEEE2012

[236] Dalia Khader Ben Smyth Peter Y A Ryan and Feng Hao A fairand robust voting system by broadcast In International Conferenceon Electronic Voting volume 205 pages 285ndash299 Lecture Notes inInformatics 2012

[237] Craig Burton Burton Chris Culnane James Heather Thea PeacockPeter Ryan Steve Schneider Vanessa Teague Roland Wen Zhe Xiaand Sriramkrishnan Srinivasan A supervised verifiable voting protocolfor the victorian electoral commission In 5th International Conference

75 Internal Reports 223

on Electronic Voting 2012 5th International Conference on ElectronicVoting (EVOTE 2012) LNI pages 81ndash94 GI 2012

[238] Craig Burton Chris Culnane James Heather Thea Peacock PeterRyan Steve Schneider Sriramkrishnan Srinivasan Vanessa TeagueRoland Wen and Zhe Xia A supervised verifiable voting protocol forthe victorian electoral commission In 2012 Electronic Voting Tech-nology WorkshopWorkshop on Trustworthy Elections pages 1ndash100USENIX 2012

[239] Markus Jostock and Jurgen Sachau Compound model of inverterdriven grids In 5th International Conference on Integration of Re-newable and Distributed Energy Resources pages 194ndash195 OTTI -Ostbayerisches Technologie-Transfer-Institut eV 2012

[240] Markus Jostock and Jurgen Sachau Frequency coupling in invertergrids In 5th International Conference on Integration of RenewableEnergy and Distributed Energy Resources pages 192ndash193 OTTI - Os-tbayerisches Technologie-Transfer-Institut eV 2012

[241] Guido Boella Patrice Caire Leendert van der Torre and Ser-ena Villata Dependence networks for agreement technologies InAT2012 Agreement Technologies Proceedings of the First Interna-tional Conference on Agreement Technologies volume 918 pages 109ndash110 CEUR 2012

[242] Alan Perotti Guido Boella Silvano Colombo Tosatto Artur S drsquoAvilaGarcez Valerio Genovese and Leendert van der Torre Learning andreasoning about norms using neural-symbolic systems In Proceed-ings of the 11th International Conference on Autonomous Agents andMultiagent Systems - Volume 2 volume 2 pages 1023ndash1030 2012

75 Internal Reports

[243] Mihail Minev Christoph Schommer and Theoharry GrammatikosNews and stock markets A survey on abnormal returns and predictionmodels Technical Report - 2012

[244] Alexandre Bartel Jacques Klein Martin Monperrus Kevin Allix andYves Le Traon Improving privacy on android smartphones throughin-vivo bytecode instrumentation Technical report SnT TechnicalReport 2012

[245] Vasileios Efthymiou and Patrice Caire Diagram analysis report Usecases for conviviality and privacy in ambient intelligent systems Tech-nical report SnT Luxembourg 2012

224 BIBLIOGRAPHY

[246] Markus Forster Raphael Frank and Thomas Engel Evaluation ofsensors in modern smartphones for vehicular traffic monitoring Tech-nical report SnT 2012

[247] Raphael Frank Markus Forster Gerla Mario and Thomas EngelA survey on the performance of commercial mobile access networksTechnical report 2012

[248] Christopher Henard Mike Papadakis Gilles Perrouin Jacques KleinPatrick Heymans and Yves Le Traon Bypassing the combinatorialexplosion Using similarity to generate and prioritize t-wise test suitesfor large software product lines Technical report 2012 TechnicalReport

76 Proceedings

[249] Valentin Goranko and Wojciech Jamroga editors Proceedings of the5th Workshop on Logical Aspects of Multi-Agent Systems (LAMAS2012) IFAAMAS 2012

[250] STAST 2012 IEEE 2012

[251] Security and Intelligent Information Systems volume 7053 of LNCSSpringer 2012

Appendix A

Additional References

[252] Lauaro Dolberg Jampaposerome Francois and Thomas Engel EfficientMultidimensional Aggregation for Large Scale Monitoring In LargeInstallation System Administration Conference (LISA) San DiegoUSA 2012 USENIX

[253] Guido Boella Luigi di Caro Livio Robaldo and Llio Humphreys Us-ing legal ontology to improve classification in the eunomos legal docu-ment and knowledge management system In Semantic Processing ofLegal Texts (SPLeT-2012) Workshop Proceedings of the Eighth Inter-national Conference on Language Resources and Evaluation (LRECrsquo12) pages 13ndash20 2012

[254] Alessandra Bagnato Barbara Kordy Per H Meland and PatrickSchweitzer Attribute decoration of attack-defense trees InternationalJournal of Secure Software Engineering 3(2)1ndash35 2012

[255] Xihui Chen David Fonkwe and Jun Pang Post-hoc analysis of usertraceability in electronic toll collection systems In Proc 7th Work-shop on Data Privacy Management (DPMrsquo12) LNCS pages 19ndash42Springer 2013

[256] Xihui Chen Jun Pang and Ran Xue Constructing and comparinguser mobility profiles for location-based services In Proc 28th ACMSymposium on Applied Computing (SACrsquo13) ACM Press 2013

[257] Xihui Chen and Jun Pang Exploring dependency for query privacyprotection in location-based services In Proc 3rd ACM Conference

226 BIBLIOGRAPHY

on Data and Application Security and Privacy (CODASPYrsquo13) ACMPress 2013

[258] Barbara Kordy Sjouke Mauw Sasa Radomirovic and PatrickSchweitzer AttackndashDefense Trees Journal of Logic and Computa-tion 2013 Preprint available at httpsatossunilumembers

barbarapapersADT12pdf

[259] T van Deursen S Mauw and S Radomirovic mCarve Carvingattributed dump sets In 20th USENIX Security Symposium pages107ndash121 USENIX Association August 2011

[260] Simon Kramer Rajeev Gore and Eiji Okamoto Computer-aideddecision-making with trust relations and trust domains (cryptographicapplications) Journal of Logic and Computation 2012

[261] Simon Kramer A logic of interactive proofs Technical report Uni-versity of Luxembourg 2012 Available at httparxivorgabs

12013667

[262] Simon Kramer Logic of negation-complete interactive proofs (formaltheory of epistemic deciders) Technical report University of Luxem-bourg 2012 Available at httparxivorgabs12085913

[263] Simon Kramer Logic of non-monotonic interactive proofs (formaltheory of temporary knowledge transfer) Technical report Universityof Luxembourg 2012 Available at httparxivorgabs1208

1842

[264] Simon Kramer and Joshua Sack Parametric constructive kripke-semantics for standard multi-agent belief and knowledge (knowledgeas unbiased belief) Technical report University of Luxembourg 2012Available at httparxivorgabs12091885

[265] Jerome Francois Shaonan Wang Walter Bronzi Radu State andThomas Engel Botcloud Detecting botnets using mapreduce InProceddings of International Workshop on Information Forensics andSecurity (WIFSrsquo11) pages 1ndash6 IEEE 2011

[266] Andreas Zinnen and Thomas Engel Towards economic energy tradingin cloud environments In IEEE International Conference on CloudComputing Technology and Science pages 477ndash481 2011

[267] Andreas Zinnen and Thomas Engel Deadline constrained schedulingin hybrid clouds with gaussian processes In High Performance Com-puting and Simulation Conference (HPCS) pages 294 ndash 300 2011

BIBLIOGRAPHY 227

[268] Jerome Francois Radu State Thomas Engel and Olivier Festor En-forcing security with behavioral fingerprinting In International Con-ference on Network and Service Management (CNSM) pages 1 ndash92011

[269] Andriy Panchenko Lukas Niessen Andreas Zinnen and Thomas En-gel Website fingerprinting in onion routing based anonymization net-works In Proceedings of the 10th ACM Computer and Communica-tions Security (ACM CCS) Workshop on Privacy in the ElectronicSociety (WPES) pages 103ndash114 ACM Press 2011

[270] Andriy Panchenko Otto Spaniol Andre Egners and Thomas EngelLightweight hidden services In Proceedings of the 10th IEEE Interna-tional Conference on Trust Security and Privacy in Computing andCommunications (IEEE TrustCom 2011) Changsha China Novem-ber 2011 IEEE Computer Society 2011

[271] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Breaking tor anonymity with game theory anddata mining CONCURRENCY AND COMPUTATION PRACTICEAND EXPERIENCE pages 1ndash14 2011

[272] Raphael Frank Eugenio Giordano Mario Gerla and Thomas EngelPerformance bound for routing in urban scenarios In Proceedings ofthe 7th Asian Internet Engineering Conference (AINTEC) pages 38ndash45 2011

[273] Thorsten Ries Volker Fusenig Christian Vilbois and Thomas EngelVerification of data location in cloud networking In 2011 Fourth IEEEInternational Conference on Utility and Cloud Computing pages 439ndash444 2011

[274] Thorsten Ries Radu State and Thomas Engel Measuring anonymityusing network coordinate systems In 11th International Symposiumon Communications and Information Technologies (ISCIT) 2011pages 366ndash371 2011

[275] Stefan Hommes Radu State and Thomas Engel Detection of abnor-mal behaviour in a surveillance environment using control charts InIEEE International Conference on Advanced Video and Signal basedSurveillance (AVSS) pages 113ndash118 2011

[276] David Fotue Foued Melakessou Houda Labiod and Thomas EngelMini-sink mobility with diversity-based routing in wireless sensor net-works In Proceedings of the 8th ACM Symposium on Performanceevaluation of wireless ad hoc sensor and ubiquitous networks (PE-WASUN) pages 9ndash16 ACM 2011

228 BIBLIOGRAPHY

[277] David Fotue Foued Melakessou Houda Labiod and Thomas EngelA distributed hybrid channel selection and routing technique for wire-less sensor networks In IEEE 74th Vehicular Technology ConferenceVTC-Fall pages 1ndash6 IEEE 2011

[278] Cynthia Wagner Gerard Wagener Radu State and Thomas EngelPeeking into ip flow records using a visual kernel method In IWANN2011 workshops Part II CISIS 2011 volume 6694 pages 41ndash49LNCS Springer Verlag 2011

[279] Cynthia Wagner Jerome Francois Radu State and Thomas EngelMachine learning approach for ip-flow record anomaly detection InProceedings of the 10th international IFIP TC 6 conference on Net-working (NETWORKING) volume 6640 pages 28ndash39 Springer Ver-lag 2011

[280] Thorsten Ries Andriy Panchenko Radu State and Thomas EngelComparison of low-latency anonymous communication systems - prac-tical usage and performance In Australasian Information SecurityConference (AISC 2011) volume 116 pages 77ndash86 ACS 2011

[281] David Fotue Foued Melakessou Houda Labiod and Thomas EngelEffect of sink location on aggregation based on degree of connectivityfor wireless sensor networks In First International Workshop on Ad-vanced Communication Technologies and Applications to Intelligenttransportation systems Cognitive radios and Sensor Networks (AC-TICS) pages 271 ndash 276 2011

[282] Pascal Bouvry Horacio Gonzalez-Velez and Joanna Kolodziej In-telligent Decision Systems in Large-Scale Distributed Environmentsvolume 362 of Studies in Computational Intelligence Springer 2011

[283] Bernabe Dorronsoro and Pascal Bouvry Adaptive neighborhoods forcellular genetic algorithms In Nature Inspired Distributed Computing(NIDISC) sessions of the International Parallel and Distributed Pro-cessing Symposium (IPDPS) 2011 Workshop pages 383ndash389 IEEE2011

[284] Patricia Ruiz Bernabe Dorronsoro and Pascal Bouvry Optimiza-tion and performance analysis of the aedb broadcasting algorithmIn IEEE International Workshop on Wireless Mesh and Ad Hoc Net-works pages 1ndash6 IEEE 2011

[285] Mateusz Guzek Johnatan E Pecero Bernabe Dorronsoro and PascalBouvry Energy-aware scheduling of parallel applications with multi-objective evolutionary algorithm In A Bridge between Probability SetOriented Numerics and Evolutionary Computation pages 1ndash4 2011

BIBLIOGRAPHY 229

[286] Bernabe Dorronsoro and Pascal Bouvry On the use of small-world population topologies for genetic algorithms In Proceedingsof EVOLVE 2011 2011

[287] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry Multi-objective cooperative coevolutionary algorithms for robust schedulingIn Proceedings of EVOLVE 2011 2011

[288] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee In Proceedings des 20eme ren-contres francophones du parallelisme (RenParrsquo20) pages 1ndash10 2011

[289] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certiclouda novel tpm-based approach to ensure cloud iaas security In Proceed-ings of the 4th IEEE Intl Conf on Cloud Computing (CLOUD 2011)pages 121 ndash 130 IEEE Computer Society 2011

[290] Julien Schleich Guillaume-Jean Herbiet Patricia Ruiz Pascal Bou-vry Jerome Wagener Paul Bicheler Frederic Guinand and SergeChaumette Enhancing the broadcast process in mobile ad hoc net-works using community knowledge In Proceedings of the first ACMinternational symposium on Design and analysis of intelligent vehicu-lar networks and applications pages 23ndash30 2011

[291] V Goranko W Jamroga and P Turrini Strategic games and trulyplayable effectivity functions In Proceedings of AAMAS2011 pages727ndash734 2011

[292] M de Boer D Gabbay X Parent and M Slavkovik Two dimensionalstandard deontic logic [including a detailed analysis of the 1985 jonesndashporn deontic logic system] Synthese pages 1ndash38 2011

[293] Harold Castro German Sotelo Cesar O Diaz and Pascal BouvryGreen flexible opportunistic computing with virtualization In Pro-ceedings of the 11th IEEE International Conference on Computer andInformation Technology pages 629ndash634 2011

[294] Cesar O Diaz Mateusz Guzek Johnatan E Pecero Pascal Bouvryand Samee U Khan Scalable and energy-efficient scheduling tech-niques for large-scale systems In Proceedings of the 11th IEEE Inter-national Conference on Computer and Information Technology pages641ndash647 2011

[295] Cesar O Diaz Mateusz Guzek Johnatan E Pecero Gregoire DanoyPascal Bouvry and Samee U Khan Energy-aware fast schedulingheuristics in heterogeneous computing systems In Proceedings of the2011 International Conference on High Performance Computing ampSimulation (HPCS 2011) pages 478ndash484 2011

230 BIBLIOGRAPHY

[296] Jean Botev and Marco Milanesio Code - an application-layer frame-work for confidentiality in distributed environments In Proceedingsof the 3rd International Workshop on Collaborative Social Computing(SocialComp 2011) 2011

[297] Jean Botev Wei Tsang Ooi and Ingo Scholtes Getting real - self-organized resource allocation on second life avatar traces In Proceed-ings of the 4th International Workshop on Massively Multiuser VirtualEnvironments (MMVE 2011) pages 170 ndash 175 IEEE 2011

[298] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry New state-of-the-art results for cassini2 global trajectory optimization problemIn International Joint Conference on Artificial Intelligence (IJCAI)Workshop on AI in Space Intelligence beyond planet Earth pages1ndash6 2011

[299] Bernabe Dorronsoro and Pascal Bouvry The explorationexploitationtradeoff in dynamic cellular evolutionary algorithms IEEE Transac-tions on Evolutionary Computation 15(1)67ndash98 2011

[300] Bernabe Dorronsoro Gregoire Danoy Pascal Bouvry and Antonio JNebro Multi-objective Cooperative Coevolutionary Evolutionary Algo-rithms for Continuous and Combinatorial Optimization volume 362of Studies in Computational Intelligence series pages 49ndash74 Springer2011

[301] Alexandru-Adrian Tantar Emilia Tantar and Pascal Bouvry Loadbalancing for sustainable ict In 13th Annual Genetic and Evolution-ary Computation Conference (GECCO 2011) Companion MaterialProceedings pages 733ndash738 ACM 2011

[302] Alexandru-Adrian Tantar Emilia Tantar and Pascal Bouvry A clas-sification of dynamic multi-objective optimization problems In 13thAnnual Genetic and Evolutionary Computation Conference (GECCO2011) Companion Material Proceedings pages 105ndash106 ACM 2011

[303] Emilia Tantar Alexandru-Adrian Tantar and Pascal Bouvry On dy-namic multi- objective optimization - classification and performancemeasures In Proceedings of the IEEE Congress on Evolutionary Com-putation pages 2759ndash2766 2011

[304] Eugenio Giordano Raphael Frank Giovanni Pau and Mario GerlaCorner A radio propagation model for vanets in urban scenariosProceedings of the IEEE 99(7)1280 ndash 1294 2011

[305] Johnatan Pecero Frederic Pinel Bernabe Dorronsoro GregoireDanoy Pascal Bouvry and Albert Zomaya Efficient Hierarchical

BIBLIOGRAPHY 231

Task Scheduling on GRIDS Accounting for Computation and Commu-nications volume 362 of Studies in Computational Intelligence pages25ndash48 Springer 2011

[306] Cynthia Wagner Jerome Francois Radu State and Thomas EngelDanakfinding the odd In Proceedings of the 5th International Con-ference on Network and System Security 2011 (NSS2011) pages 161ndash168 IEEE 2011

[307] Patricia Ruiz Bernabe Dorronsoro Giorgio Valentini Frederic Pineland Pascal Bouvry Optimisation of the enhanced distance basedbroadcasting protocol for manets J of Supercomputing Special Is-sue on Green networks pages 1ndash28 2011

[308] Jean Botev and Steffen Rothkugel Flora - flock-based resource alloca-tion for decentralized distributed virtual environments In Proceedingsof the 2nd International Workshop on Distributed Simulation and On-line Gaming (DISIO 2011) 2011

[309] Sebastien Varrette Emilia Tantar and Pascal Bouvry On the re-silience of [distributed] eas against cheaters in global computing plat-forms In IPDPS Workshops pages 409ndash417 IEEE 2011

[310] Alexandru-Adrian Tantar Gregoire Danoy Pascal Bouvry and SameeKhan Energy-Efficient Computing using Agent-Based Multi-ObjectiveDynamic Optimization pages 267ndash287 Springer New York NY USA2011

[311] Bernabe Dorronsoro and Pascal Bouvry Differential evolution algo-rithms with cellular populations Parallel Problem Solving from Nature(PPSN) Lecture Notes in Computer Science 6239320ndash330 2011

[312] Alexandre Bartel Benoit Baudry Freddy Munoz Jacques KleinTejeddine Mouelhi and Yves Le Model driven mutation applied toadaptative systems testing In Proceedings of the 2011 IEEE FourthInternational Conference on Software Testing Verification and Vali-dation Workshops ICSTW rsquo11 pages 408ndash413 IEEE Computer Soci-ety 2011

[313] Marwane El Kharbili Qin Ma Pierre Kelsen and Elke PulvermuellerEnterprise regulatory compliance modeling using corel An illustra-tive example In 13th IEEE Conference on Commerce and EnterpriseComputing pages 185ndash190 IEEE Computer Society Press 2011

[314] Marwane El Kharbili Qin Ma Pierre Kelsen and Elke PulvermuellerCorel Policy-based and model-driven regulatory compliance manage-ment In Proceedings of the 15th IEEE International Enterprise Dis-

232 BIBLIOGRAPHY

tributed Object Computing Conference pages 247ndash256 IEEE Com-puter Society Press 2011

[315] Wojciech Jamroga Sjouke Mauw and Matthijs Melissen Fairness innon-repudiation protocols In Security and Trust Management LectureNotes in Computer Science volume 7170 pages 122ndash139 Springer2012

[316] Agata Grzybek Gregoire Danoy and Pascal Bouvry Generation ofrealistic traces for vehicular mobility simulations In Proceedings ofthe second ACM international symposium on Design and analysis ofintelligent vehicular networks and applications DIVANet rsquo12 pages131ndash138 New York NY USA 2012 ACM

[317] Clark Thomborson Christian Collberg and Douglas Low A taxonomyof obfuscating transformations 1997

[318] Boaz Barak Oded Goldreich Russel Impagliazzo Steven RudichAmit Sahai Salil Vadhan and Ke Yang On the (im)possibility ofobfuscating programs 2001

[319] Christian Collberg and Jasvir Nagra Surreptitious Software Obfus-cation Watermarking and Tamperproofing for Software ProtectionAddison-Wesley Professional 2009

[320] M H Halstead Elements of software science 1977

[321] E I Oviedo Control flow data flow and program complexity Pro-ceedings of IEEE COMPSAC pages 146ndash152 1980

[322] Terence J Parr T J Parr and R W Quong Antlr A predicated-ll(k)parser generator 1995

[323] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee Technique et science informa-tiques 31(8-9-10)1121ndash1152 2012

[324] Jshadobf A javascript obfuscator based on evolutionary algorithmshttpjshadobfunilu 2013

[325] Apostolos Stathakis Gregoire Danoy El-Ghazali Talbi and PascalBouvry A local search algorithm for telecommunication satellite pay-load configuration In International Conference on Metaheuristics andNature Inspired Computing 2012

[326] Levi Lucio and Nicolas Guelfi A precise definition of operationalresilience Technical Report TR-LASSY-11-02 University of Luxem-bourg 2011

BIBLIOGRAPHY 233

[327] Nicolas Guelfi A formal framework for dependability and resiliencefrom a software engineering perspective Technical Report TR-LASSY-10-01 University of Luxembourg 2010

[328] Guido Boella Gabriella Pigozzi Marija Slavkovik and Leendertvan der Torre Group intentions are social choice with commitmentIn Procs of the 8th European Workshop on Multi-agent Systems (EU-MASrsquo10) 2010

[329] Patricia Ruiz and Pascal Bouvry On the improvement of the enhanceddistance based broadcasting algorithm Int J of Communication Net-works and Distributed Systems in Press

[330] Patricia Ruiz Bernabe Dorronsoro Pascal Bouvry and Lorenzo JTardon Information dissemination in vanets based upon a tree topol-ogy Journal of Ad hoc Networks 10(1)111ndash127 2012

[331] State R Ries T and A Panchenko Comparison of low-latency anony-mous communication systems - practical usage and performance InColin Boyd and Josef Pieprzyk editors Australasian Information Se-curity Conference (AISC 2011) volume 116 of CRPIT pages 77ndash86Perth Australia 2011 ACS

[332] Michael Kirley and Robert Stewart An analysis of the effects of pop-ulation structure on scalable multiobjective optimization problems InProceedings of the 9th annual conference on Genetic and evolutionarycomputation GECCO rsquo07 pages 845ndash852 New York NY USA 2007ACM

[333] Matthijs T J Spaan and Nikos A Vlassis Perseus Randomizedpoint-based value iteration for pomdps J Artif Intell Res (JAIR)24195ndash220 2005

[334] Pierre Del Moral Feynman-Kac formulae genealogical and interact-ing particle systems with applications Springer series in statisticsProbability and its applications Springer 2004

[335] Pierre Del Moral Arnaud Doucet and Ajay Jasra Sequential montecarlo samplers Journal of the Royal Statistical Society Series B (Sta-tistical Methodology) 68(3)411ndash436 2006

[336] Juan Luis Jimenez Laredo Pascal Bouvry Sanaz Mostaghim andJuan Julian Merelo Guervos Validating a peer-to-peer evolutionaryalgorithm In European Conference on the Applications of Evolution-ary Computation Accepted for publication in 2012

234 BIBLIOGRAPHY

[337] Daniel Lombra na Gonzalez Juan Luis Jimenez Laredo Francisco Fer-nandez de Vega and Juan Julian Merelo Guervos CharacterizingFault-tolerance in Evolutionary Algorithms Springer Verlag Acceptedfor publication in 2012

[338] F Caldeira T Schaberreiter E Monteiro J Aubert P Simoes andD Khadraoui Trust based interdependency weighting for on-line riskmonitoring in interdependent critical infrastructures In Risk and Se-curity of Internet and Systems (CRiSIS) 2011 6th International Con-ference on pages 1 ndash7 sept 2011

[339] T Schaberreiter J Aubert and D Khadraoui Critical infrastructuresecurity modelling and resci-monitor A risk based critical infrastruc-ture model In IST-Africa Conference Proceedings 2011 pages 1 ndash8may 2011

[340] Thomas Schaberreiter Filipe Caldeira Jocelyn Aubert EdmundoMonteiro Djamel Khadraoui and Paulo Simones Assurance and trustindicators to evaluate accuracy of on-line risk in critical infrastruc-tures In CRITIS2011 conference proceedings September 2011

[341] Thomas Schaberreiter Kati Kittila Kimmo Halunen Juha Roningand Djamel Khadraoui Risk assessment in critical infrastructuresecurity modelling based on dependency analysis (short paper) InCRITIS2011 conference proceedings September 2011

[342] Andriy Panchenko Privacy in communications on the internet Prac-tice of Information Processing and Communication Praxis der In-formationsverarbeitung und Kommunikation (PIK) 34(2) 2011

[343] Andriy Panchenko Anonymous communication in the digitalworld In 17th Conference on Communication in Distributed Systems(KiVSrsquo11) Kiel Germany march 2011 OASIcs ndash OpenAccess Seriesin Informatics

[344] Andriy Panchenko Otto Spaniol Andre Egners and Thomas EngelLightweight hidden services In 10th IEEE International Conferenceon Trust Security and Privacy in Computing and Communications(IEEE TrustCom 2011) Changsha China nov 2011 IEEE ComputerSociety Press

[345] Jerome Francois Shaonan Wang Walter Bronzi Radu State andThomas Engel Botcloud Detecting botnets using mapreduce InProceddings of International Workshop on Information Forensics andSecurity (WIFSrsquo11) pages 0ndash0 IEEE 2011

BIBLIOGRAPHY 235

[346] Jerome Francois Radu State Thomas Engel and Olivier Festor En-forcing security with behavioral fingerprinting In International Con-ference on Network and Service Management (CNSM) 2011

[347] AJ Nebro JJ Durillo F Luna B Dorronsoro and E Alba MocellA cellular genetic algorithm for multiobjective optimization Interna-tional Journal of Intelligent System Special Issue on Nature InspiredCooperative Strategies 24(7)726ndash746 2009

[348] Gabriella Pigozzi Marija Slavkovik and Leendert van der Torre Acomplete conclusion-based procedure for judgment aggregation InProceedings of the First International Conference on Algorithmic De-cision Theory (ADT) volume 5783 5783 of Lecture Notes in ArtificialIntelligence pages 1ndash13 Springer Verlag 2009

[349] Davide Grossi Gabriella Pigozzi and Marija Slavkovik White ma-nipulation in judgment aggregation In Proceedings of BNAIC 2009- The 21st Benelux Conference on Artificial Intelligence (to appear)2009

[350] Laurent Kirsch Markus Esch and Steffen Rothkugel The SnippetSystem - Fine-Granular Management of Documents and Their Re-lationships In Proceedings of the 6th International Conference onHuman-Computer Interaction (HCI 2011) Washington DC USA2011 IASTED

[351] Bernd Klasen Efficient Content Distribution in Social-Aware HybridNetworks Journal of Computational Science 2011

[352] Jean Botev Sociality and Self-Organization in Next-Generation Dis-tributed Environments PhD thesis University of Luxembourg 2011

[353] Peter Ryan James Heather and Vanessa Teague Pretty good democ-racy for more expressive voting schemes In Computer Security ndash ES-ORICS 2010 15th European Symposium on Research in Computer Se-curity Athens Greece September 20-22 2010 Proceedings pages 405ndash 423 2010

[354] Zhe Xia Chris Culnane James Heather Hugo Jonker Peter RyanSteve Schneider and Sriramkrishnan Srinivasan Versatile pret a voterHandling multiple election methods with a unified interface In Pro-ceedings of the 11th International Conference on Cryptology in India(Indocryptrsquo10) pages 98ndash114 2010

[355] Barbara Kordy Marc Pouly and Patrick Schweitzer Computationalaspects of attack-defense trees In Security and Intelligent InformationSystems volume LNCS 7053 pages 103ndash116 Springer 2012

236 BIBLIOGRAPHY

[356] Gerard Wagener Radu State Alexandre Dulaunoy and Thomas En-gel Heliza talking dirty to the attackers Journal in Computer Vi-rology pages 1ndash12 2010

[357] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Breaking tor anonymity with game theory anddata mining In Proceedings of 4th International Conference on Net-work and System Security NSS2010 pages 47ndash54 IEEE 2010 BestPaper Award of NSS 2010

[358] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Game theory driven monitoring of spatial-aggregated ip flow records In Proceedings of the 6th InternationalConference on Network and Services Management (CNSM) pages 0ndash0 IEEE 2010

[359] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Peekkernelflows Peeking into ip flows In Pro-ceedings of the Seventh International Symposium on Visualization forCyber Security pages 52ndash57 ACM International Conference Proceed-ings Series ACM New York NY USA 2010

[360] Cynthia Wagner Gerard Wagener Radu State and Thomas EngelMonitoring of spatial-aggregated ip-flow records In Advances in SoftComputing Series - CISISrsquo10 volume 85 pages 117ndash124 Springer2010

[361] Bernd Klasen Social fast efficient Content distribution in hybridnetworks In Computers and Communications (ISCC) 2011 IEEESymposium on pages 61ndash67 Kerkyra June 2011 IEEE

[362] Samuel Marchal Jerome Francois Cynthia Wagner and Thomas En-gel Semantic exploration of dns In 11th Networking Conference 2012pages 1ndash8 2012

[363] Samuel Marchal Jerome Francois Cynthia Wagner Radu StateAlexandre Dulaunoy Thomas Engel and Olivier Festor Dnssm Alarge-scale passive dns security monitoring framework In IEEEIFIPNetwork Operations and Management Symposium pages 1ndash8 IEEE2012

[364] David Fotue Foued Melakessou Thomas Engel and Houda LabiodDesign of new aggregation techniques for wireless sensor networks InThe 18th Annual Meeting of the IEEEACM International Symposiumon Modeling Analysis and Simulation of Computer and Telecommu-nication Systems pages 1ndash1 MASCOTS 2010

BIBLIOGRAPHY 237

[365] David Fotue Foued Melakessou Houda Labiod and Thomas EngelDesign of an enhanced energy conserving routing protocol based onroute diversity in wireless sensor networks In The 9th IEEEIFIPAnnual Mediterranean Ad Hoc Networking Worshop pages 1ndash6 IEEEXplore 2010

[366] Guillaume Aucher Guido Boella and Leendert van der Torre Adynamic logic for privacy compliance Artif Intell Law 19(2-3)187ndash231 2011

[367] Jerome Leemans and Nuno Amalio Modelling a cardiac pacemakervisually and formally In VLHCC 2012 pages 257ndash258 IEEE 2012

[368] Mauricio Alferez Nuno Amalio Selim Ciraci et al Aspect-orientedmodel development at different levels of abstraction In ECMFA 2011LNCS pages 361ndash376 Springer 2011

[369] Eric Tobias Eric Ras and Nuno Amalio Suitability of visual mod-elling languages for modelling tangible user interface applications InVLHCC 2012 IEEE 2012

[370] Eric Tobias Eric Ras and Nuno Amalio VML Usability for ModellingTUI Scenarios - A Comparative Study Technical Report TR-LASSY-12-06 University of Luxembourg LASSY 2012 available at http

vclgforgeuniludocVMLCaseStudypdf

[371] Nuno Amalio The VCL model of the barbados crisis managementsystem Technical Report TR-LASSY-12-09 Univ of Luxembourg2012

[372] Jerome Leemans and Nuno Amalio A VCL model of a cardiac pace-maker Technical Report TR-LASSY-12-04 University of Luxem-bourg 2012

238 BIBLIOGRAPHY

Appendix B

CSC Statistics for 2012

B1 CSC publications

For more details see chapter 7 page 197

B2 CSC budget

See also sect23 page 6

Lab structural funding 761070e

UL Research Projects 896775e

Total 1657845 e

Table B1 CSC Internal Budget

240 CSC Statistics for 2012

B3 CSC staff per category

Category Number

Professors 16Associate Professors 7

Scientific Supp Staff Members 12Post-Docs 7

Post-Docs on projects 8PhD Students 40

Technical Support Staff Members 4Technician on project 1Administrative Staff 5Research Facilitator 1

Total 101

Professors Associated Professors Post Docs Scientific support staff PhD Students Post Docs on Project Technical support staff Technicians on projects Administrative staff Research facilitator

Figure B1 CSC HR Repartition

B3 CSC staff per category 241

Professors - Associate Professors

Lastname Firstname Position

BIRYUKOV Alexei Associate-Professor

BISDORFF Raymond Joseph Professor

BOUVRY Pascal Professor

BRIAND Lionel Professor

CORON Jean-Sebastien Associate-Professor

DUHAUTPAS Theo Professor

ENGEL Thomas Professor

GUELFI Nicolas Professor

KELSEN Pierre Professor

LE TRAON Yves Professor

LEPREVOST Frank Professor

MAUW Sjouke Professor

OTTERSTEN Bjorn Professor

MULLER Volker Associate-Professor

NAVET Nicolas Associate-Professor

ROTHKUGEL Steffen Associate-Professor

RYAN Peter Professor

SACHAU Juergen Professor

SCHOMMER Christoph Associate-Professor

SORGER Ulrich Professor

STEENIS Bernard Associate-Professor

VAN DER TORRE Leon Professor

ZAMPUNIERIS Denis Professor

Total 23

242 CSC Statistics for 2012

Research Assistants - PostDocs

Lastname Firstname PositionAMALIO Nuno Scientific Coll on ProjectBERNARD Nicolas Scientific Supp Staff MemberBOTEV Jean Post-DocCAPOZUCCA Alfredo Scientific Supp Staff MemberDANOY Gregoire Scientific Supp Staff MemberGLODT Christian Scientific Supp Staff MemberGROSZSCHADL Johann Scientific Supp Staff MemberJONKER Hugo Scientific Coll on projectKHOVRATOVICH Dmitry PostDocKLEIN Jacques Scientific Supp Staff MemberLEHTONEN Erkko Post-DocMIZERA Andrzej PostDocPANG Jun Scientific Supp Staff MemberPARENT Xavier Post-DocPECERO SANCHEZ Johnatan Post-DocRIES Benoit Scientific Supp Staff MemberRISOLDI Matteo Scientific Coll on ProjectSCHLEICH Julien Scientific Coll on ProjectSTATE Radu Scientific Supp Staff MemberSUCHANECKI Zdzislaw Scientific Supp Staff MemberTANG Qiang Post-DocTEUCHERT Andrea Scientific Coll on ProjectTURRINI Paolo Post-DocVARRETTE Sebastien Scientific Supp Staff MemberVESIC Srdjan Post-DocWEYDERT Emil Scientific Supp Staff Member

Total 27 (AFR Total 1)

B3 CSC staff per category 243

PhD Students

Lastname Firstname PositionALLIX Kevin PhD StudentAMRANI Moussa PhD StudentBERSAN Roxana-Dolores PhD StudentDANILAVA Sviatlana PhD StudentDIAZ Cesar PhD StudentDOBRICAN Remus PhD StudentDONG Naipeng PhD StudentEL KATEB Donia PhD StudentEL KHARBILI Marwane PhD StudentFRANCK Christian PhD StudentGALLAIS Jean-Francois PhD StudentGIUSTOLISI Rosario PhD StudentGOERGEN David PhD StudentKAMPAS Dimitrios PhD StudentKHAN Yasir Imtiaz PhD StudentKIRSCH Laurent PhD StudentLI Yu PhD StudentLIU Zhe PhD StudentMARQUES DIAS Sergio Scientific Coll on ProjectMELISSEN Matthijs PhD StudentMINEV Mihail PhD StudentMULLER Tim PhD StudentMUSZYNSKI Jakub PhD StudentNIELSEN Sune PhD StudentOLTEANU Alexandru-Liviu PhD StudentPEREZ URQUIDI Jose Miguel PhD StudentPINEL Frederic PhD StudentPORAY Jayanta PhD StudentPUSTOGAROV Ivan PhD StudentRIENSTRA Tjitze PhD StudentROY Arnab PhD StudentRUBAB Irman PhD StudentRUIZ Patricia PhD StudentSHIRNIN Denis PhD StudentSIMIONOVICI Ana-Maria PhD StudentSKROBOT Marjan PhD StudentSUN Xin PhD StudentVADNALA Praveen Kumar PhD StudentVENKATESH Srivinas Vivek PhD StudentZHANG Yang PhD Student

Total 40 (AFR Total 8)

244 CSC Statistics for 2012

Technical Support

Lastname Firstname PositionCARTIAUX Hyacinthe Technician on ProjectDUNLOP Dominic Technical Support Staff MemberLE CORRE Yann Technical Support Staff MemberSTEMPER Andre Technical Support Staff MemberREIS Sandro Technician on Project

Total 5

Administrativ Aid

Lastname Firstname PositionDESSART Bertrand Research facilitator

EYJOLFSDOTTIR Ragnhildur Edda SecretaryFLAMMANG Daniele SecretarySCHMITZ Fabienne SecretarySCHROEDER Isabelle SecretaryVIOLET Catherine Secretary

Total 6

Appendix C

Acronyms used

ComSys Communicative Systems Laboratory

CSC Computer Science amp Communications

HPC High Performance Computing

ILIAS Interdisciplinary Laboratory for Intelligent and Adaptive Systems

LACS Laboratory of Algorithmics Cryptology and Security

LASSY Laboratory for Advanced Software Systems

SnT Interdisciplinary Centre for Security Reliability and Trust

UL University of Luxembourg

246 Acronyms used

httpcscunilu

Computer Science amp Communication (CSC) Research UnitUniversity of LuxembourgFaculty of Science Technology and Communication6 rue Richard Coudenhove-KalergiL-1359 LuxembourgLuxembourg

Administrative ContactIsabelle Glemot-Schroeder and Fabienne Schmitz

Email cscunilu

  • 1 The Computer Science amp Communications (CSC) Research Unit
  • 2 Executive Summary
    • 21 Academic Staff Overview
    • 22 Main activities in 2012
    • 23 CSC Budget in 2012
      • 3 CSC Laboratories
        • 31 Laboratory for Advanced Software Systems
        • 32 Laboratory of Algorithmics Cryptology and Security
        • 33 Communicative Systems Laboratory
        • 34 Interdisciplinary Laboratory for Intelligent and Adaptive Systems
          • 4 Projects and Grants in 2012
            • 41 Research projects
              • 411 European funding projects
              • 412 FNR COREINTER Projects
              • 413 UL Projects
              • 414 UL PhD PostDoc
              • 415 Other miscellaneous projects
                • 42 Grants
                  • 421 AFR
                  • 422 Workshop amp Conferences (FNR Accompanying Measures)
                      • 5 CSC Representation
                        • 51 Conferences
                        • 52 PC and other memberships
                        • 53 Doctoral board
                        • 54 Guests
                        • 55 Visits and other representation activities
                        • 56 Research meeting
                          • 6 CSC Software
                          • 7 CSC Publications in 2012
                            • 71 Books
                            • 72 Book Chapters
                            • 73 International journals
                            • 74 Conferences Articles
                            • 75 Internal Reports
                            • 76 Proceedings
                              • Appendix
                              • A Additional References
                              • B CSC Statistics for 2012
                                • B1 CSC publications
                                • B2 CSC budget
                                • B3 CSC staff per category
                                  • C Acronyms used
Page 4: Computer Science and Communications Research Unit

Preface

You will find in this report the progress and activities made by the ComputerScience amp Communications (Computer Science amp Communications (CSC))research unit in 2012

Let me please summarize

In 2012 CSC features 116 positions including 24 Professors and Associate-Professors 32 Post-doc researchers 47 PhD students and 12 Administrativeand Technical staff

Nicolas Navet formerly at INRIA-Nancy has joined the lab as an associateprofessor specializing in real-time and embedded systems

Prof Denis Zampunieris has been appointed as vice-dean of the Faculty ofScience Technology and Communication and Nicolas Navet succeeds DenisZampunieris as course director of the bachelor in Informatics

Prof Lionel Briand is the recipient of a FNR PEARL grant that officiallystarted in January 2012 His group at the SnT is now composed of 12scientists and PhD students

The renowned logician Dov Gabbay started his second 3-year term (2012-2014) as an invited professor of UL attached to CSC

CSC hosted in Luxembourg several successful workshops

bull ldquoJudgment Aggregationrdquo (Feb 1) an important topic in the emergingarea of computational social choice

bull ldquoDynamics Of Argumentation Rules and Conditionals (DARC)rdquo(April2-3) another one on the Several other events were co-organized locallyand abroad

bull ldquoeVoting PhD Workshoprdquo (15-16 October)

ii

Dmitry Khovratovich obtained the Best PhD thesis award of the Universityof Luxembourg for his research on ldquoNew Approaches to the Cryptanalysisof Symmetric Primitivesrdquo

Dr Foued Melakessou received the first prize in the 2012 Scilab Contest atthe Workshop on Scilab amp OW2 (IWSO) in Nanjing China for his NARVAL(Network Analysis and Routing eVALuation) toolbox NARVAL is builton the Scilab environment and focuses on the analysis of network proto-cols (httpsecan-labuniluindexphpnews161-narval-toolbox-wins-first-prize-in-2012-scilab-contest)

Prof Lionel Briand received the IEEE Computer Society Harlan Mills awardfor his contributions to model-based verification and testing

Prof Bjorn Ottersten and Prof Lionel Briand were appointed members ofthe IEEE Fellow Review Committee

Prof Bjorn Ottersten was appointed ldquoDigital Champion of Luxembourgrdquoby Francois Biltgen Minister for Higher Education and Research

The hackbraten team headed by Piotr Kordy represented the SaToSS groupat the Capture the Flag Competition (http2012hackluindexphpCaptureTheFlag) co-located with the Hacklu conference (http2012hacklu) The team was ranked 24th amongst 575 teams registered forthe event

In 2012 ULCSC was involved in the launch of LAST-JD a new interdisci-plinary ERASMUS MUNDUS PhD program in Law Science and Technologyinvolving several partner universities in Europe and beyond

Dr Jun Pang and Prof Sjouke Mauw initiated a new strand of researchfocusing on formal models for biological systems An expert in the field DrAndrzej Mizera was hired to contribute and further extend this initiative

Prof Dr Pascal BouvryLuxembourg January 17 2013

Contents

1 The Computer Science amp Communications (CSC) ResearchUnit 1

2 Executive Summary 3

21 Academic Staff Overview 4

22 Main activities in 2012 5

23 CSC Budget in 2012 6

3 CSC Laboratories 7

31 Laboratory for Advanced Software Systems 7

32 Laboratory of Algorithmics Cryptology and Security 9

33 Communicative Systems Laboratory 10

34 Interdisciplinary Laboratory for Intelligent and Adaptive Sys-tems 12

4 Projects and Grants in 2012 15

41 Research projects 27

411 European funding projects 27

412 FNR COREINTER Projects 49

413 UL Projects 78

414 UL PhD PostDoc 91

iv CONTENTS

415 Other miscellaneous projects 115

42 Grants 123

421 AFR 123

422 Workshop amp Conferences (FNR Accompanying Mea-sures) 165

5 CSC Representation 167

51 Conferences 167

52 PC and other memberships 170

53 Doctoral board 176

54 Guests 177

55 Visits and other representation activities 181

56 Research meeting 186

6 CSC Software 189

7 CSC Publications in 2012 197

71 Books 197

72 Book Chapters 198

73 International journals 198

74 Conferences Articles 204

75 Internal Reports 223

76 Proceedings 224

Appendix 225

A Additional References 225

B CSC Statistics for 2012 239

B1 CSC publications 239

B2 CSC budget 239

B3 CSC staff per category 240

CONTENTS v

C Acronyms used 245

vi CONTENTS

Chapter 1

The Computer Science ampCommunications (CSC)

Research Unit

The Computer Science amp Communications (CSC) research unit is part ofthe University of Luxembourg with the primary mission to conduct funda-mental and applied research in the area of computer communication andinformation sciences

The goal is to push forward the scientific frontiers of these fields Addition-ally CSC provide support for the educational tasks at the academic andprofessional Bachelor and Master levels as well as for the PhD program

The CSC Research Unit is divided into four laboratories

1 Communicative Systems Laboratory (ComSys)

2 Interdisciplinary Laboratory for Intelligent and Adaptive Systems (ILIAS)

3 Laboratory of Algorithmics Cryptology and Security (LACS)

4 Laboratory for Advanced Software Systems (LASSY)

Three laboratories of the interdisciplinary centre in security reliability andtrust (SnT) are also headed by CSC professors

2 The Computer Science amp Communications (CSC) Research Unit

CSC works intensively towards the University priorities in Security Relia-bility and Trust as well as Systems Biomedicine By providing a strong dis-ciplinary knowledge in computer science telecommunications and appliedmathematics CSC will serve as one of the fundamental bricks to enableinterdisciplinary research through the University of Luxembourgrsquos interdis-ciplinary centres

CSC is currently the largest research unit of the University with a staff ofmore than 100 persons including 22 professors and associate-professors 11scientific support staff members 25 post-doc researchers and scientific col-laborators 40 PhD students 3 technician on project 1 research facilitator3 technical support staff members 3 technicians on project 475 full-time-equivalent administrative support positions

Their research fields range from the investigation of the theoretical founda-tions to the development of interdisciplinary applications

CSC decisions are taken by the chorum of professors As described in Figure11 the head of the research unit is helped by a quality manager a facilitymanager (handled by the scientific facilitator) and the heads of labs in orderto prepare the decision options and the reporting of the CSC Each lab hasits own budget line and a set of support resources

Prof BouvryHead of CSC

Prof ZampunierisDirector of Studies Representative

Prof MauwQuality Manager

Prof SchommerHead of ILIAS

Prof EngelHead of ComSys

Prof GuelfiHead of LASSY

Prof BiryukovHead of LACS

Profs Profs Profs Profs

CSC Steering Board

Bertrand DessartResearch Facilitator

Figure 11 CSC Organisation

Chapter 2

Executive Summary

The Computer Science and Communication research unit aka ComputerScience amp Communications (CSC) includes a staff of over 100 persons Twohundred students at Bachelor and Master levels are registered to CSC bach-elor and master degrees Close supervision and advice is ensured by opendoor policy and project based lecturing

CSC is also involved in life-long learning by organising a master degreein Information Systems Security Management in collaboration with CRPTudor

With regard to the professional branches the main aim consists of reducingthe gap between theory and practice whereas for the academic branchesthe focus is set on a problem-oriented understanding of the theoretical foun-dations of computer science CSC works intensively towards the Universitypriorities in Security Reliability and Trust as well as System BiomedicineBy providing a strong disciplinary knowledge in computer science telecom-munications and applied mathematics CSC will serve as one of the fun-damental bricks to enable interdisciplinary research through the Universityof Luxembourgrsquos interdisciplinary centres CSC is currently the largest re-search unit of the University and is cooperating in a large set of internationalas well as regional projects

In parallel CSC is more and more active in the field of distributed gridcomputing with the aim to propose andor join attractive academic projectsin this area In this context CSC manages the UL HPC (High PerformanceComputing) facility of the UL and inaugurated the new cluster hosted inthe LCSB premises in Belval The current solution includes 151 nodes 1556

4 Executive Summary

cores 14245 TFlops 265 TB NFS storage and 240 TB Lustre storage

21 Academic Staff Overview

bull Jean-Claude Asselborndagger emeritus professor

bull Alex Biryukov associate professor head of LACS

bull Raymond Bisdorff professor

bull Pascal Bouvry professor head of CSC and ILIAS

bull Lionel Briand professor

bull Jean-Sebastien Coron associate professor

bull Dov Gabbay guest professor

bull Theo Duhautpas senior lecturer

bull Thomas Engel professor head of ComSys

bull Nicolas Guelfi professor head of LASSY

bull Pierre Kelsen professor

bull Franck Leprevost professor vice rector

bull Yves Le Traon professor

bull Sjouke Mauw professor

bull Volker Muller associate professor

bull Nicolas Navet professor

bull Bjorn Ottersten professor

bull Steffen Rothkugel associate professor

bull Peter Ryan professor

bull Jurgen Sachau professor

bull Christoph Schommer associate professor

bull Ulrich Sorger professor

bull Bernard Steenis associate professor

bull Leon van der Torre professor

bull Denis Zampunieris professor

22 Main activities in 2012 5

22 Main activities in 2012

The following local events have been organized during 2012

bull IFIP AIMS 2012

bull Capture The Flag competition 2012

bull Workshop on Dynamics of Argumentation Rules and Conditionals

bull Interdisciplinary PhD Workshop on Security in eVoting (eVote PhDDays 2012)

CSC also participates at the organisation of many international conferencesand workshops

CSC is having strong partnerships with the other Luxembourgian researchcentres through the co-supervision of PhD students co-organised projectsand teaching activities

In 2012 13 PhD students successfully defended their PhD thesis at the CSC

CSC members are taking active part in various boards country-wide ex-ecutive direction of ERCIM direction of RESTENA chairman of Luxcloudboard vice-rectorate for international affairs and special projects of the Uni-versity of Luxembourg chairman of Luxconnect SA member of LUXTRUSTadministration board members of the SnT interim steering board and SnTfaculty boards representative of Luxembourg in the COST ICT DG expertsfor EU and national projects

CSC is active in various networks and projects International EU (FPEureka COST) regional (UGR) and local (FNR) networks and projects

CSC participates to various ERCIM workgroups - the European ResearchConsortium for Informatics and Mathematics through the FNR

CSC also participated to the open source community by several contribu-tions

bull ADTool

bull ARGULAB

bull Canephora

bull Democles

bull Face recognition

6 Executive Summary

bull JShadObf

bull MaM Multidimensional Aggregation Monitoring

bull MSC Macro Package for LATEX

bull Visual Contract Builder

CSC in 2012 produced 1 book 7 book chapters edited 3 proceedings andin terms of international peer-reviewed publications 69 journal articles and165 conference and workshop proceedings (see chapter 7 page 197 for moredetails) The full list of CSC publications is available here

23 CSC Budget in 2012

The following table describes the marginal expenses of CSC in terms of struc-tural funding and UL projects The main cost corresponds to the salaries ofthe structural positions (professors research assistants assistants admin-istrative and support staff) expenses related to the buildings and some ofthe operating expenses (eg phone bills electricity etc) are covered by thestructural UL budget

Lab structural funding 761070e

UL Research Projects 896775e

Total 1657845 e

Table 21 CSC Internal Budget

Chapter 3

CSC Laboratories

31 Laboratory for Advanced Software Systems

Laboratory of Advanced Software SystemsAcronym LASSYReference F1R-CSC-LAB-05LASSHead Prof Dr Pierre Kelsen

Scientific Board Nicolas Guelfi Pierre Kelsen Yves Le Traon NicolasNavet Denis Zampunieris

Domain(s)

bull dependability

bull e-learning

bull hardwaresoftware co-design

bull model driven engineering

bull proactive computing

bull real-time and embedded systems

bull security

8 CSC Laboratories

bull software engineering

bull software product lines

bull testing

bull verification

Objectives The LASSY laboratory considers advanced software systemsas objects which are complex (business- or safety-) critical and possiblycontaining both software and hardware From the LASSY perspective thefour main dimensions underpinning the science of engineering these advancedsoftware systems are modeling methodology dependability (including secu-rity) and realization infrastructures LASSY conducts research in modelingand more specifically on model driven engineering which aims at allowing theengineering of such systems by creating and transforming models method-ologies which aim at defining engineering processes (focusing on analysisdesign and verification) and rules allowing for an efficient engineering of suchsystems conceptual frameworks and development platforms for enhancingdependability (focusing on concurrent transactions and fault tolerance) Inour research we promote the early consideration of realization infrastruc-tures (ie the hardware execution platform which integrates acquisitioncomputation communications and presentation hardware devices) Finallywe target specific application domains such as e-business systems auto-motive systems crisis management systems or proactive e-learning systemswhich are used either for experimental validation or for research problemelicitation

The current research objectives are the following ones

bull To develop new engineering processes

bull To investigate modeling languages

bull To use mathematical theories in the definition and verification of newsoftware engineering artifacts

bull To address dependability attributes (availability reliability safety con-fidentiality integrity and maintainability) throughout all the develop-ment life cycle

bull To assist in the development and in the use of e-learning tools

bull To study verification and validation techniques

Skills

32 Laboratory of Algorithmics Cryptology and Security 9

bull Nicolas Guelfi dependability verification software engineering modeldriven engineering

bull Pierre Kelsen model driven engineering software engineering formalmethods

bull Yves Le Traon verification testing software security model drivenengineering

bull Nicolas Navet real-time and embedded systems

bull Denis Zampunieris E-learning Proactive Computing

32 Laboratory of Algorithmics Cryptology andSecurity

Laboratory of Algorithmics Cryptology and SecurityAcronym LACSReference F1R-CSC-LAB-F01L0204Head Prof Dr Alex Biryukov

Scientific Board Jean-Sebastien Coron Franck Leprevost Sjouke MauwVolker Muller Peter Ryan

Domain(s)

bull Cryptography Information and Network Security

bull Information Security Management

bull Embedded Systems Security

bull Side-Channel Analysis and Security of Implementations

bull Algorithmic Number Theory

bull Security protocols

bull Security and trust assessment and modelling

bull Socio-technical security

10 CSC Laboratories

Objectives In recent years information technology has expanded to en-compass most facets of our daily livesmdashat work at school at home forleisure or learning and on the movemdashand it is reaching ever-widening seg-ments of our society The Internet e-mail mobile phones etc are alreadystandard channels for the information society to communicate gain accessto new multimedia services do business or learn new skills The recentldquodigital revolutionrdquo and widespread access to telecommunication networkshave enabled the emergence of e-commerce and e-government This pro-liferation of digital communication and the transition of social interactionsinto the cyberspace have raised new concerns in terms of security and trustlike confidentiality privacy and anonymity data integrity protection ofintellectual property and digital rights management threats of corporateespionage and surveillance systems (such as Echelon) etc These issues areinterdisciplinary in their essence drawing from several fields algorithmicnumber theory cryptography network security signal processing securityof protocols side-channel analysis software engineering legal issues andmany more

Skills NA

33 Communicative Systems Laboratory

Communicative Systems LaboratoryAcronym ComSysReference F1R-CSC-LAB-05COMSHead Prof Dr Thomas Engel

Scientific Board Pascal Bouvry Thomas Engel Steffen Rothkugel SjoukeMauw Theo Duhautpas Yves Le Traon Lionel Briand Bjorn OtterstenPeter Ryan Jurgen Sachau

Domain(s)

bull Information Transmission

bull Wireless Communication Systems

bull Security Protocols

bull Trust Models

33 Communicative Systems Laboratory 11

bull Middleware

bull Parallel and Distributed Systems

bull Cloud Grid and Peer-to-Peer Computing

Objectives The Communicative Systems Laboratory (ComSys) is part ofthe Computer Science and Communication Research Unit and focuses onstate of the art research in digital communications Embracing the end-to-end arguments in system design ComSys focuses on integrated research inthe areas of Information Transfer and Communicating Systems Informa-tion Transfer is concerned with information transmission over potentiallycomplex channels and networks Communicating Systems in turn are thecomposition of multiple distributed entities employing communication net-works to collaboratively achieve a common goal ComSys has strong tech-nical and personal facilities to improve existing and develop new solutionsin the following research topics The ComSys research fields will have astrong impact on the 21st century The rapidly growing demand for infor-mation exchange in peoplersquos daily lives requires technologies like ubiquitousand pervasive computing to meet the expectations of the information so-ciety and novel adaptive concepts tackling the continuing data challengesThe resulting problems have already been a key enabler for some industrialand governmental founded projects at national and European level Currentresearch projects propagate technologies for

bull Hybrid Wireless Networks

bull Green Cloud Computing

bull Information Dissemination in Ad-Hoc Networks

bull Mobile Communication

bull Mobile Learning

bull Network Traffic Analysis and Protection

bull Network Traffic Management and Coordination

bull Secure Satellite Communication

bull Secure Wireless MANETs

Skills

bull Research in networks and service security

12 CSC Laboratories

bull Mobile and vehicular networks

bull Protocol Security and Secure System Design

bull Data Mining for Network Security Monitoring

bull Adaptive and self managed security systems and honeypots

bull VoIP Security

bull Privacy preserving infrastructures

bull Cloud security and cluster based data mining

bull Distributed and P2P based computing

34 Interdisciplinary Laboratory for Intelligent andAdaptive Systems

Interdisciplinary Lab on Intelligent and Adaptative SystemsAcronym ILIASReference F1R-CSC-LAB-05ILIAHead Prof Dr Christoph Schommer

Scientific Board Pascal Bouvry Raymond Bisdorff Christoph SchommerUlrich Sorger Leon van der TorreGuest professor Dov Gabbay

Domain(s)

bull Algorithmic decision theory

bull Bio-inspired computing

bull Cognitive agentsrobotics

bull Data mining and knowledge discovery

bull Information theory and uncertain inference

bull Knowledge representation and applied logic (eg for security)

34 Interdisciplinary Laboratory for Intelligent and Adaptive Systems 13

bull Normative multi-agent systems

bull Optimization

bull Parallel computing

Objectives ILIAS is a cross-disciplinary research group combining exper-tise from computer science operations research information theory ana-lytic philosophy probability theory discrete math and logic The overar-ching topic in research and teaching is information processing in complexand dynamic environments given limited resources and incomplete or un-certain knowledge The ILIAS research teams investigate the theoreticalfoundations and the algorithmic realization of systems performing complexproblem solving with a high degree of autonomy ie intelligent systems andexploiting learning to deal with opaque and dynamic contexts ie adaptivesystems

Skills

bull Raymond Bisdorff (Decision aid systems)

bull Pascal Bouvry (Optimization and parallel computing)

bull Christoph Schommer (Adaptive data mining and information manage-ment)

bull Ulrich Sorger (Information theory and stochastic inference)

bull Leon van der Torre (Knowledge representation and multi-agent sys-tems)

bull Dov Gabbay (Applied logic and knowledge representation)

14 CSC Laboratories

Chapter 4

Projects and Grants in 2012

This chapter lists the research projects running during 2012together withthe grants obtained (typically to organize scientific conferences via the FNRaccompanying measures AM3) This chapter is structured to summarize

1 European funding project (FP7 ERCIM etc) ndash see sect411

2 FNR CORE projects ndash see sect412

3 UL projects ndash see sect413

4 UL PhD and Postdocs ndash see sect414

5 Other miscellaneous projects (French ANR Grant agreement for re-search development and innovation etc) ndash see sect415

6 Grants obtained (AFR FNR AM3 etc) ndash see sect42

The following tables summarize the projects operated in CSC for the year2012

16 Projects and Grants in 2012

European projectsLab Acronym Title PI Funding Duration

CO

MSY

S

InSatNetRef p27

Investigation of Radio ResourceAllocation and Multiple AccessSchemes for Satellite Networks

NA FNR-ERCIM-Alain Bensous-san(46Ke)

2012-06-01 ndash2013-05-31

BUTLERRef p33

uBiquitous secUre inTernet-of-things with Location and contEx-awaReness

Prof DrThomas Engel

FP7 Euro-pean Commis-sion(456Ke)

2011-10-01 ndash2014-09-30

ceFIMSRef p34

SceFIMS-Coordination of theEuropean Future Internet forumof Member States

Prof DrThomas Engel

EC - FP7UL bud-get(35Ke)

2010-09-01 ndash2013-02-28

IoT6Ref p36

Universal Itegration of the Inter-net of Things through an IPv6-Based Service-oriented Architec-ture enabling heterogeneous com-ponents interoperability

Prof DrThomas Engel

EC-FP7(266Ke)

2012-01-01 ndash2014-12-31

OUTSMARTRef p37

Provisioning of urbanregionalsmart services and business mod-els enabled by the Future Internet

Prof DrThomas Engel

FP7 Euro-pean Commis-sion(257Ke)

2011-04-01 ndash2013-03-31

SECRICOMRef p40

Seamless Communication for Cri-sis Management

Prof DrThomas Engel

EC - FP7 Eu-ropean Commis-sionUL(12469Ke)

2008-09-01 ndash2012-04-30

LA

CS TREsPASS

Ref p46

Technology-supported Risk Esti-mation by Predictive Assessmentof Socio-technical Security

Prof DrSjouke Mauw

EUFP7(9999824e)

2012-11-01 ndash2016-10-31

ILIA

S

ALBRRef p42

Argumentation-Based and Logic-Based Reasoning in Multi-AgentSystems

Dr SrdjanVesic

ERCIM 2011-10-01 ndash2012-09-30

TrustGamesRef p43

Trust Games Achieving Cooper-ation in Multi-Agent Systems

Dr Paolo Tur-rini

FNR-FP7 Co-fund

2011-09-01 ndash2013-08-31

WiSafeCarRef p44

Wireless traffic Safety networkbetween Cars

Prof Dr Pas-cal Bouvry

EUREKA -CELTIC(300000e)

2009-07-01 ndash2012-03-31

17

FNR projectsLab Acronym Title PI Funding Duration

CO

MSY

S

MoveRef p52

Mobility Optimization Using VE-hicular Network Technologies

Prof DrThomas Engel

FNRProject(1127ke)

2011-04-01 ndash2013-03-31

LA

CS

STASTRef p63

Socio-Technical Analysis of Secu-rity and Trust

Prof Dr Pe-ter YA Ryan

FNRCORE(765864e)

2012-05-01 ndash2015-04-30

ATREESRef p64

Attack Trees Prof DrSjouke Mauw

FNR-CORE(299000e)

2009-04-01 ndash2012-03-31

CRYPTOSECRef p66

Cryptography and InformationSecurity in the Real World

Dr Jean-SebastienCoron

FNR-CORE(272000e)

2010-10-01 ndash2013-09-30

SeRTVSRef p67

Secure Reliable and TrustworthyVoting Systems

Prof Dr Pe-ter Ryan

FNR-Core333000e FNR-AFR 216216eIMT Luca130000e Uni-versity of Mel-bourne 60000eUL 268596e

2010-02-01 ndash2013-02-01

LA

SSY

E-TEACCHRef p70

e-Training Education Assess-ment and Communication Centerfor Headache Disorders

Prof DrDenis Zam-punieris

FNR-CORE 2011-05-01 ndash2014-04-30

MaRCoRef p71

Managing Regulatory Compli-ance a Business-Centred Ap-proach

Prof DrPierre Kelsen

FNR-CORE(749Ke)

2010-05-01 ndash2013-04-30

MITERRef p73

Modeling Composing and Test-ing of Security Concerns

Dr JacquesKlein

FNR NA

MOVERERef p75

Model-Driven Validation andVerification of Resilient SoftwareSystems

Prof DrNicolas Guelfi

FNR-CORE(265000e)

2010-05-01 ndash2013-04-30

SETERRef p77

Security TEsting for Resilientsystems

Prof DrNicolas Guelfi

FNR-CORE(43830000e)

2009-05-01 ndash2012-04-30

18 Projects and Grants in 2012

FNR projects (cont)Lab Acronym Title PI Funding Duration

ILIA

S

SndashGAMESRef p54

Security Games Prof DrLeon van derTorre

FNR-CORE(314000e)

2009-04-01 ndash2012-03-31

DYNARGRef p56

The Dynamics of Argumentation Prof DrLeon van derTorre

FNR-INTERCNRS

2009-10-01 ndash2012-09-31

MaRCoRef p58

Management Regulatory Compli-ance

Prof DrPierre Kelsen

FNR-CORE 2010-05-01 ndash2013-04-30

GreenCloudRef p59

Multi-Objective Metaheuristicsfor Energy-Aware Scheduling inCloud Computing Systems

Prof Dr Pas-cal Bouvry

FNR Univer-sity of Luxem-bourg(1088440)

2012-07-01 ndash2015-06-30

GreenITRef p60

EnerGy-efficient REsourcE Al-locatioN in AutonomIc CloudCompuTing

Prof Dr Pas-cal Bouvry

FNR-CORE(432000e)

2010-01-01 ndash2012-12-31

19

AFR projectsLab Acronym Title PI Funding Duration

CO

MSY

S RELGRID2009Ref p128

Investigation of boundary condi-tions for a reliable and efficientcontrol of energy systems formedby highly parallelized off-grid in-verters

Prof DrJuergenSachau

FNR-AFR-PhD 2010-04-01 ndash2013-03-31

SCoPeMeterRef p129

Methods for Measuring and Pre-dicting the Security PerformanceReputation of Public Networks

Prof DrThomas Engel

FNR-AFR RedDog

2011-03-22 ndash2015-03-21

WiNSEOMRef p130

Energy Optimization and Moni-toring in Wireless Mesh SensorNetworks

Prof DrThomas Engel

FNR - AFRPhD(37KeYear)

2010-04-08 ndash2013-04-07

LA

CS

ANTI-MALWARE

Ref p154

A Computational Framework forApprehending Evolving Malwareand Malware Engineers

Dr SimonKramer

FNRndashAFR PostDoc(103 236 e)

2011-01-01 ndash2012-12-31

EPRIV-MAARef p155

A Formal Approach to EnforcedPrivacy Modelling Analysis andApplications

Prof DrSjouke Mauw

FNRndashAFR(105222e)

2009-12-01 ndash2013-11-30

GMASecRef p156

Games for Modelling and Analy-sis of Security

Prof DrSjouke Mauw

FNRndashAFR(140000e)

2009-11-01 ndash2013-10-31

SADTRef p157

Security Analysis ThroughAttackndashDefense Trees

Prof DrSjouke Mauw

FNR-AFRPhD(141968e)

2010-01-01 ndash2013-12-31

SECLOCRef p158

Secure and Private LocationProofs Architecture and Designfor Location-Based Services

Prof DrSjouke Mauw

FNR-AFRPhD(109137e)

2010-08-01 ndash2013-07-31

SHARCRef p160

Analysis of the SHA-3 RemainingCandidates

Prof Dr AlexBiryukov

FNR-AFR Post-doc(102620e)

2010-10-15 ndash2012-10-14

20 Projects and Grants in 2012

AFR projects (cont)Lab Acronym Title PI Funding Duration

LA

SSY

DYNOSTRef p161

Dynamic and Composite Service-Oriented Architecture SecurityTesting

Prof DrYves Le Traon

NA 2010-10-01 ndash2013-09-30

PeerunitRef p162

A Testing Framework for Large-Scale Applications

Prof DrYves Le Traon

NA 2011-01-15 ndash2014-01-15

SPEMRef p163

Selected Problems in ExecutableModeling

Prof DrPierre Kelsen

FNR-AFR PhD 2009-11-15 ndash2012-11-15

21

AFR projects (cont)Lab Acronym Title PI Funding Duration

ILIA

S

IELTRef p132

Information Extraction fromLegislative Texts

Prof DrLeon van derTorre

FNR AFR PHD 2012-03-01

LOSECRef p133

Security Logics Prof DrLeon van derTorre

FNR-AFR 2009-09-01 ndash2012-09-01

ProCRobRef p134

Programming Cognitive Robots Prof DrLeon van derTorre

FNR-AFR 2011-05-20 ndash2014-05-20

TABNRef p135

Trust in argumentation-based ne-gotiation

Dr SrdjanVesic

FNR-AFR-Postdoc

2012-10-01 ndash2013-01-14

LAAMIRef p136

Logical Approaches for Analyz-ing Market Irrationality compu-tational aspects

Prof DrLeon van derTorre

FNR-AFR(117840e)

2011-04-01 ndash2013-03-31

Green EECRef p138

Green Energy-Efficient Comput-ing

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2010-04-01 ndash2012-03-31

CIDCRef p139

Confidentiality Integrity issuesin distributed computations

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2010-01-01 ndash2013-12-31

REMORef p141

Reliability of Multi-ObjectiveOptimization techniques

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2010-10-01 ndash2012-09-30

LUXCommTISRef p143

Community-based Vehicular Net-work for Traffic Information inLuxembourg

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2011-09-01 ndash2014-08-31

HERARef p144

Holistic autonomic Energy andthermal aware Resource Alloca-tion in cloud computing

Prof Dr Pas-cal Bouvry

FNR - AFRPhD(37288e)

2011-09-15 ndash2014-09-14

INTERCOMRef p146

Energy-Efficient Networking inAutonomic Cloud Computing

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2011-06-01 ndash2013-05-31

DeTeMOCGAsRef p147

Decision-theoretic fine tuning ofmulti-objective co-evolutionaryalgorithms

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2011-09-15 ndash2014-09-14

EPOCRef p149

Energy-Performance Optimiza-tion of the Cloud

Prof Dr Pas-cal Bouvry

FNR - AFRPhD(10812558e)

2010-09-01 ndash2013-08-31

TIGRISRef p150

Risk Prediction Framework forInterdependent Systems usingGraph Theory

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2009-10-15 ndash2012-10-14

DYMORef p151

Dynamic MixVoip Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2012-11-01 ndash2015-10-31

SaPRORef p152

Satellite Payload ReconfigurationOptimization

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2010-11-15 ndash2013-11-14

22 Projects and Grants in 2012

University of Luxembourg Internal projectLab Acronym Title PI Funding Duration

LA

CS

DEFAULT-PRIV

Ref p85

Privacy by Default Prof DrSjouke Mauw

UL(192853e) 2012-09-01 ndash2014-08-31

EPRIVRef p87

A Formal Approach to EnforcedPrivacy in e-Services

Prof DrSjouke Mauw

UL(254955e) 2009-05-01 ndash2012-04-30

LA

SSY

BLASTRef p88

Better e-Learning AssignmentsSystem Technology

Prof DrDenis Zam-punieris

UL(165000e) 2010-09-01 ndash2012-08-31

COMPEXRef p89

Model Composition for Exe-cutable Modeling

Prof DrPierre Kelsen

UL(173Ke) 2011-10-01 ndash2013-09-30

DYNOSOARRef p90

Dynamic and Composite Service-Oriented Architecture SecurityTesting

Prof DrYves Le Traon

UL NA

ILIA

S

AASTMRef p82

Advanced Argumentation Tech-niques for Trust Management

Prof DrLeon van derTorre

UL 2008-05-01 ndash2012-04-30

LINMASRef p80

Logics Integrated for NormativeMulti-Agent Systems

Prof DrLeon van derTorre

UL 2011-03-01 ndash2013-02-28

DPMHPCRef p83

A discrete approach to modelprocessing of hard metal includ-ing high performance computing

Prof DrBernhardPeters

UL NA

EvoPerfRef p84

Evolutionary Computing andPerformance Guarantees

Prof Dr Pas-cal Bouvry

UL(370ke) 2011-09-01 ndash2013-12-31

23

UL PhD PostDocLab Acronym Title PI Funding Duration

CO

MSY

S

MOVERef p99

Mobility Optimization usingVehicular network technologies(MOVE)

Prof DrThomas Engel

CORE-MOVE(37KYear)

2011-11-15 ndash2014-11-14

Honeypotand MalwareAnalysis

Ref p96

Honeypot and Malware Analysis Prof DrThomas Engel

AFR-PPP(37Kyear)

2011-10-15 ndash2014-10-14

NARef p97

Routing and mobility manage-ment in vehicular networks

Prof DrThomas Engel

FNR - COREMOVE(37Kyear)

2011-09-01 ndash2014-08-31

SMO-MLSRef p98

Securing Mission Operations us-ing Multi-Level Security

Prof DrThomas Engel

European SpaceAgency(48800eUL - 37077 e)

2010-11-01 ndash2014-10-30

NARef p100

Service Dependency andAnomaly Detection

Prof DrThomas Engel

Funded on FP7EFIPSANSproject until31122010 -NetLab

2008-11-01 ndash2012-10-31

LA

SSY

NARef p113

Smartphone Malware detectionand mitigation with Static codeAnalysis

Prof DrYves Le Traon

NA(NA) 2011-10-15 ndash2014-09-30

ACARef p114

Access Control ArchitecturesFrom Multi-objective Require-ments to Deployment

Prof DrYves Le Traon

UL 2011-02-01 ndash2014-01-31

24 Projects and Grants in 2012

UL PhD PostDoc (cont)Lab Acronym Title PI Funding Duration

ILIA

S

ICRRef p100

Individual and Collective Rea-soning

Prof DrLeon van derTorre

UL-PHD 2008-03-12 ndash2012-03-12

NARef p102

Understanding Financial Topicsand their Lifetime in TextualNews by the Content Aging The-ory

Prof DrChristophSchommer

FNRCORE(500000)

2012-06-01 ndash2015-05-31

SPACERef p103

Smart Predictive Algorithms forSpacecraft Anomalies

NA SnT 2011-07-09 ndash2017-07-08

INACSRef p104

An Incremental System to man-age Conversational Streams

Prof DrChristophSchommer

UL 2009-02-01 ndash2013-01-14

FERESRef p105

Feature Extraction and Repre-sentation for Economic Surveys

Prof DrChristophSchommer

Internal Doc-toral Posi-tion(InternalDoctoral Posi-tion)

2011-04-01 ndash2014-03-31

NARef p106

Sentiment Classification in Fi-nancial Texts

Prof DrChristophSchommer

FNRCORE(500000)

2012-06-01 ndash2015-05-31

SPARCRef p108

Artificial Conversational Com-panions

Prof DrChristophSchommer

NA 2011-04-01 ndash2014-03-31

ERACCRef p109

Energy-efficient resource alloca-tion in autonomic cloud comput-ing

Prof Dr Pas-cal Bouvry

UL 2010-10-01 ndash2013-09-30

IICRef p110

Integrity Issues on the Cloud Prof Dr Pas-cal Bouvry

UL 2011-01-16 ndash2013-01-15

NARef p112

Energy-Efficient InformationDissemination in MANETs

Prof Dr Pas-cal Bouvry

UL 2009-09-15 ndash2012-09-14

25

Other misc projectsLab Acronym Title PI Funding Duration

CO

MSY

S BCEERef p115

Enterprise security for the bank-ing and financial sector

Prof DrThomas Engel

BCEE(204Ke) 2011-04-01 ndash2012-03-31

EPTVRef p117

EPT Vehicular Networks Prof DrThomas Engel

EPT(2 298 Ke) 2010-01-01 ndash2014-12-31

Pil to SPELLRef p118

PIL to SPELL conversion Prof DrThomas Engel

SES-ASTRA(Notapplicable)

2011-01-28 ndash2015-01-27

LA

CS LASP

Ref p120

Developing a Prototype of Loca-tion Assurance Service Provider

Prof DrSjouke Mauw

ESA -SnT(160000e(ESA) )

2010-12-08 ndash2012-12-07

LA

SSY

SPLITRef p121

Combine Software Product Lineand Aspect-Oriented SoftwareDevelopment

Prof DrNicolas Guelfi

ULFNR(41000e)

2009-10-01 ndash2012-09-30

ILIA

S AlgoDecRef p119

INTERCNRSGDRI1102 Al-gorithmic Decision Theory

Prof Dr Ray-mond Bisdorff

FNR UL(11 000e)

2011-01-01 ndash2014-12-31

26 Projects and Grants in 2012

Accompanying measures (AM)Lab Acronym Title PI Funding Duration

ILIA

S SandpileRef p165

Building the Skeleton of a SOscheduler

Prof Dr Pas-cal Bouvry

FNR -AM2c(634900)

2012-03-01 ndash2012-05-01

41 Research projects 27

41 Research projects

411 European funding projects

Investigation of Radio Resource Allocation and Multiple AccessSchemes for Satellite NetworksAcronym InSatNetReference NAPI NAFunding FNR-ERCIM-Alain BensoussanBudget 46KeBudget UL NADuration 2012-06-01 ndash 2013-05-31

Members M Butt B Ottersten

Domain(s) NA

Partner(s) NA

Description The demands for data rate are increasing with the emergenceof new applications On the other hand radio resources are becoming scarcedue to dedicated frequency allocation of the spectrum to the operators Itis becoming increasingly challenging to meet the rate and coverage require-ments for the users Satellite systems have the potential to provide largescale coverage and meet throughput requirements for broadband access Inthis project we plan to study the radio resource allocation and multipleaccess schemes for satellite networks We investigate the radio resource al-location problems specifically for the cognitive architecture of satellite net-works and evaluate energy-performance trade-offs for different performanceparameters like delay and loss requirements for the primary and secondaryusers in a cognitive satellite network

Results NA

Publications NA

28 Projects and Grants in 2012

Cognitive Radio and Networking for Cooperative Coexistenceof Heterogeneous wireless NetworksAcronym Cognitive RadioReference NAPI Prof Dr Bjorn OtterstenFunding COST Action IC0902Budget NABudget UL NADuration 2009-07-30 ndash 2013-12-10

Members B Ottersten

Domain(s) Cognitive Radio

Partner(s) Belgium Bosnia and Herzegovinia Croatia Cyprus Czech Re-public Denmark Finland Former Yugoslav Republic of Macedonia FranceGermany Greece Ireland Israel Italy Latvia Luxembourg Norway PolandPortugal Romania Serbia Slovenia Spain Sweden Turkey United King-dom USA China Canada Australia ISPRA (It)

Description NA

Results NA

Publications NA

Cooperative Radio Communications for Green Smart Environ-mentsAcronym Cooperative RadioReference NAPI Prof Dr Bjorn OtterstenFunding Cost Action IC2004Budget NABudget UL NADuration 2011-05-24 ndash 2015-05-18

Members B Ottersten

Domain(s) NA

Partner(s) Austria Belgium Bulgaria Cyprus Czech Republic Den-mark Finland Former Yugoslav Republic of Macedonia France GermanyGreece Ireland Israel Italy Netherlands Norway Poland Portugal Ro-mania Serbia Slovakia Spain Sweden Switzerland UK

41 Research projects 29

Description NA

Results NA

Publications NA

MIMO Hardware DemonstratorAcronym MIMO-HardwareReference 12R-DIR-PAU-10MIMOPI NAFunding ESA -ESTEC-ITTA01-609909NLJKBudget 1199KeBudget UL NADuration 2011-01-01 ndash 2012-03-30

Members B Ottersten D Arapoglou B Shankar S Chatzinotas

Domain(s) Satellite Based Alarm System

Partner(s)

bull Elektrobit Wireless Communications Ltb (Finland)

bull SES Astra Techcom (Luxembourg)

bull Univ of Oulu (Finland)

bull VTT (Finland)

bull Univ of Turku (Finland)

Description development of practical methods utilizing MIMO techniquesfor DVB-SH AB scenarios to improve the air interface performance com-pared to current standard The practical aim of the proposal is to specifyand develop a MIMO HW demonstrator that will be used to carry out prac-tical performance evaluation and demonstrations The project is dividedinto 2 phases The 1st phase provides an overview of state-ofthe- art MIMOtechniques and defines a set of MIMO scenarios based on DVB-SH includingapplicable radio channel models In addition a computer simulation modelwill be developed to evaluate the defined scenarios and the system architec-ture design for implementation of the developed MIMO-DVB-SH waveformwill be carried out During the 2nd phase the specified system will be im-plemented utilizing an existing HW test-bed the RACE-SDR The test-bedwill be used to perform demonstrations and detailed performance evaluationin laboratory environment As a conclusion improvements to the existing

30 Projects and Grants in 2012

standard andor implementation guidelines will be proposed to DVB-forumand ETSI standardization (EB is a member in both organizations)

Results NA

Publications NA

Propagation tools and data for integrate TelecommunicationNavigation and earth Observation systemsAcronym Propagation toolsReference NAPI Prof Dr Bjorn OtterstenFunding COST Action IC0802Budget NABudget UL NADuration 2009-03-03 ndash 2012-11-18

Members B Ottersten

Domain(s) NA

Partner(s) Austria Belgium Bulgaria Cyprus Czech Republic Den-mark Finland France Germany Greece Hungary Israel Italy NorwayPoland Portugal Serbia Slovakia Spain Sweden Switzerland UK BrazilCanada Netherlands India Pakistan USA

Description NA

Results NA

Publications NA

SATellite Network of EXperts - Call off-Order COO2Acronym SatNEx IIIReference NAPI Prof Dr Bjorn OtterstenFunding ESA - gtTRP ARTES1 ARTES5Budget NABudget UL NADuration 2011-03-23

Members B Ottersten

41 Research projects 31

Domain(s) NA

Partner(s) DLR (Germany) Univ of Surrey (UK) Univ of Bologna (It)Aristotle Univ of Thessaloniki (Greece) Univ of Bradford (UK) ConsorzoNazionale Interuniv Per le Telecomunicazioni (It) Italian National Re-search Council (It) Centre Tecnologic de Telecomunicacions de Catalunya(Spain) National Observatory of Athens (Greece) Office National drsquoEtudeset de Recherches Aerospatiales (Fr) Univ of Salzburg (Austria) TeSA As-sociation (Fr) Graz Univ of Technology (Austria) Univ Autonoma deBarcelona (Spain) The Univ Court of the Univ of Aberdeen (UK) UnivDegli Studi di Roma rsquoTor Vergatarsquo (It) Univ de Vigo (Spain) Fraunhofer-Gesellschaft Munchen (Germany) Institute of Computer and Communica-tions Systems (Greece)

Description NA

Results NA

Publications NA

Potential business for an advanced spread spectrum measure-ment system for satellite testingAcronym Spread spectrum satellite commReference I2R-DIR-PAU-11LLV8PI Prof Dr Bjorn OtterstenFunding ESABudget 97KeBudget UL NADuration 2010-12-08 ndash 2011-12-07

Members B Ottersten S Chatzinotas

Domain(s) Satellite spectrum

Partner(s)

bull SES Astra TechCom SA

bull EmTroniX Sarl

Description The study aims at establishing the requirements and anal-yse the market situation to evaluate the business perspectives for a spreadspectrum measurement system or service together with potential customerssuch as satellite operators and satellite manufactures The detailed under-standing of the customers requirements and the kind of drivers for them for

32 Projects and Grants in 2012

buying such a measurement product or service is a key indicator for subse-quent activities Based on these outcomes business scenarios and a businesscases are elaborated and a roadmap for a sustainable Luxembourg exploita-tion in for instance service provisioning and test equipment manufacturingis prepared In addition study activities will lead to an outline proposalready to be submitted to a funding agency In detail the following pointswill be investigated

bull Analyse and quantify the market for spread spectrum measurementsystems and services

bull Identify potential customers capture their requirements

bull Elaborate system concepts and develop and validate system and ser-vice design with potential customers

bull Identify and critically assess competing solutions

bull Establish a business model understand the value chain identify andquantify the opportunity for Luxembourg industry

bull Prepare an outline proposal and identify opportunities for funding

bull Identify state-of-the art in this and similar domains and evaluate tech-niques subject to patent filling

As this study is conducted preliminary to learn about market situation andcustomer needs there are also some Non-objectives

bull Provision of detailed technical solution

bull Development or technical validation activities

bull Definition of the solution prior to the understanding of the market

Results NA

Publications NA

41 Research projects 33

uBiquitous secUre inTernet-of-things with Location andcontEx-awaRenessAcronym BUTLERReference I2R-NET-PEU-11BTLRPI Prof Dr Thomas EngelFunding FP7 European CommissionBudget 456KeBudget UL NADuration 2011-10-01 ndash 2014-09-30

Members T Engel R State T Cholez F Melakessou

Domain(s) internet of things context aware services smart devices net-work security integrated architecture and platform

Partner(s)

bull Inno AG Germany

bull Ericsson Spain

bull Telecom Italia Italy

bull Gemalto SA France

bull CEA France

bull Oulun Yliopisto Finland

bull FBConsulting SARL Luxembourg

bull ISMB Italy

bull Hochschule Luzern Switzerland

bull Swisscom Switzerland

bull SMTMicroelectronics Italy

bull Utrema France

bull University of Luxembourg

bull Universiteit Leuven Belgium

bull Cascard OY Finland

bull TST Spain

bull Alcatel Lucent Bell Labs France

34 Projects and Grants in 2012

bull Jacobs University Germany

Description Recent ICT advances are bringing to reality a world wheresensors actuators and smart portable devices are interconnected into anInternet-of-Things (IoT) ecosystem reaching 50 Billion devices by 2015

The IoT major challenges are from a systemic viewpoint smart resourcemanagement and digital security and from a userservice perspective thepervasiveness (uniformity of performance anytime and anywhere) and aware-ness (inversely proportional to the degree of knowledge required from users)BUTLER will be the first European project to emphasise pervasivenesscontext-awareness and security for IoT Through a consortium of leadingIndustrial Corporate RD and Academic partners with extensive and com-plementary know-how BUTLER will integrate current and develop newtechnologies to form a bundle of applications platform features and servicesthat will bring IoT to life

Results UL already contributed to the definition of the use cases thatpresent our vision of smart-life in the topics of smart city and smart trans-portation We also contributed to the definition of the requirements for theBUTLER platform (WP1- D11)

Publications None yet

SceFIMS-Coordination of the European Future Internet forumof Member StatesAcronym ceFIMSReference IR-DIR-PEU-10CEFIPI Prof Dr Thomas EngelFunding EC - FP7

UL budgetBudget 35KeBudget UL NADuration 2010-09-01 ndash 2013-02-28

Members T Engel L Ladid

Domain(s) IPv6 networking support action

Partner(s)

bull Waterford Institute of Technology Ireland

bull Nederlandse Organisatie voor Wetenschappelijk Onderzoek Nether-lands

41 Research projects 35

bull Nemzeti Kutatasi Es Technologiai Hivatal Hungary

bull UMIC - Agencia Para A Sociedade Do Conhecimento Portugal

bull Asociacion De Empresas De Electronica Tecnologias De La Informa-cion Y Telecomunicaciones De Espana Spain

Description The ceFIMS project addresses the problem of the fragmenta-tion of ICT research between European Member States (MS) ceFIMS willleverage its knowledge of Member State-funded research to gain consensusabout problems and approaches at the Member State level ceFIMS willbuild on that consensus to promote alignment both across Member Statesand also between Member State and EC-funded ICT research This willconsequently unite better the European ICT research community and placeEuropean Future Internet (FI) research in a stronger position

ceFIMS will produce a research roadmap to maximise synergies between EUand MS investments in FI research establishing the basis for an ERA-NET+on the Future Internet An ERA-NET+ will provide the means to developthe EUrsquos strong research position Allied to this a Public-Private Partner-ship (PPP) will provide the means to transfer new knowledge into innovativeproducts with economic and social benefits for EU citizens ceFIMS willincrease awareness among Member States of the role that they can play ina Europe-wide FI PPP and how Member State initiatives and the PPP canbe aligned to the maximum extent possible

ceFIMS-Coordination of the European Future Internet forum of MemberStates-responds to Call 5 from the European Commission for European ex-cellence in Trustworthy ICT In particular the Science and Technology ob-jectives of ceFIMS are highly relevant to Objective ICT-200711 The Net-work of the Future

Results NA

Publications NA

36 Projects and Grants in 2012

Universal Itegration of the Internet of Things through an IPv6-Based Service-oriented Architecture enabling heterogeneouscomponents interoperabilityAcronym IoT6Reference I2R-NET-PEU-11IOT6PI Prof Dr Thomas EngelFunding EC- FP7Budget 266KeBudget UL NADuration 2012-01-01 ndash 2014-12-31

Members T Engel L Ladid

Domain(s) ICT

Partner(s)

bull Mandat international alias fondation pour la cooperation internationale(mi) rdquothe coordinator of the research project iot6

bull Ericsson doo for telecommunications

bull Runmyprocess sas

bull University College London

bull Universidad de murcia

bull Technische Universitaet Wien

bull Haute Ecole Specialisee de Suisse Occidentale

bull Korea Advanced Institute of Science and Technology

Description The UIoT6 project aims at exploiting the potential of IPv6and related standards (6LoWPAN CORE COAP etc) to leverage cur-rent shortcomings of the Internet of Things so that a universally integratedInternet of Things can evolve Its main challenges and objectives are to re-search design and develop an IPv6-based Service Oriented Architecture toachieve multi-protocol integration of heterogenous rdquocommunication thingsrdquoand to research and realize intelligence distribution and smart routing fea-tures within Furthermore transparent and borderless interactions withcloud computing services and applications EPC information service envi-ronments and mobile networks are of main interest The main outcomeof UIoT6 is a well-defined open and distributed IPv6-based Service Ori-ented Architecture that enables interoperability mobility cloud computing

41 Research projects 37

and intelligence distribution among heterogeneous smart things componentsapplications and services

Results NA

Publications NA

Provisioning of urbanregional smart services and businessmodels enabled by the Future InternetAcronym OUTSMARTReference I2R-NET-PEU-11OSMTPI Prof Dr Thomas EngelFunding FP7 European CommissionBudget 257KeBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members T Engel J Francois A Panchenko L Ladid

Domain(s) Internet of Things (IoT) utilities environment ecosystems

Partner(s) Name of the organisations participating in the project (not thepersons) Use small letters list using bullet points specify the country ifnot Luxembourg based

bull France Telecom FR

bull Telefonica Investigacion y Desarrollo SA Unipersonal SP

bull Alcatel-Lucent IT

bull Ericsson RS

bull Engineering Ingegneria Informatica SpA IT

bull ATOS Origin SP

bull Coronis SAS an ELSTER Group Company FR

bull Worldsensing ES

bull CEA-LETI FR

bull University of Luxembourg LU

bull Alexandra Institute DK

bull AMPLEX DK

38 Projects and Grants in 2012

bull Aarhus VAND DK

bull University of Surrey GB

bull AMEY PLC GB

bull FERROVIAL Centro de Innovacion de Infraestructuras InteligentesES

bull Create-NET (Trento RISE) IT

bull Azienda Consorziale Servizi Municipalizzati SpA IT

bull Dolomiti Energia IT

bull Universidad de Cantabria ES

bull Banco de Santander ES

bull Municipality of Santander ES

bull EMCANTA ES

bull EON ESPANA ES

bull TTI Norte ES

bull Fraunhofer-Gesellschaft zur Foerderung der Angewandten Forschungev DE

bull Berliner Stadtreinigungsbetriebe DE

Description The goal of OUTSMART is to contribute to the Future In-ternet (FI) by aiming at the development of five innovation eco-systemsThese eco-systems facilitate the creation of a large variety of pilot servicesand technologies that contribute to optimised supply and access to servicesand resources in urban areas This will contribute to more sustainable utilityprovision and through increased efficiency lower strain on resources and onthe environment Reaching this goal requires the whole value chain namelycity authorities utilities operators ICT companies as well as knowledge in-stitutions in order to have an industry driven approach when developingadvanced services and technologies OUTSMART services and technolo-gies will be based on an open and standardised infrastructure as envisionedby the FI Private Public Partnership (FI PPP) and provided by a serviceframework designed to facilitate provisioning development and access Tothis extend OUTSMART will (1) deliver a set of detailed functional andnon-functional requirements for an FI enabler platform and correspondingbusiness framework able to support the above described eco-systems based

41 Research projects 39

on a deep analysis of the different domain specific use cases in the utility andenvironment application domain (2) provide a specification of the domainspecific enabler functionality with corresponding service interfaces compat-ible and aligned with Core Platform components to be specified alongsidethis project effort (3) provide a realisation of prototypes of domain specificfunctionality for the envisioned eco-system according to the previous spec-ification and a validation thereof in early field trials in the envisioned usecases (4) deliver a business framework specification which serves as blueprint for the foreseen local eco-systems able to provide their sustainabilitybeyond the PPP funding lifetime by creating favourable conditions for localinvestment and innovation and (5) deliver a detailed plan for pilot servicesin the envisioned local eco-systems which act as initial light house showcases for Europe in the utility and environment applications domain

Results The key results of our activity in OUTSMART are

bull Definition and refinement of requirements in particular in terms ofsecurity and privacy

bull Large scale security in distributed environments by developing newmethods for autonomic authentication as well as cloud-computing basedsolutions for attack detection

bull Privacy protection in large scale networks by proposing a novel ap-proach to guarantee the privacy of a service provider and by evaluatingthe degree of protection over encrypted communication

bull Traffic analysis in encrypted network streams We showed that undercertain circumstances cryptography alone is not enough to hide thecontent of communication We also studied countermeasures how tomitigate this attack

bull New methods of path selection that allow performance-improved onionrouting We evaluate the proposed methods in the public networksand present a practical approach to empirically analyze the strengthof anonymity certain methods of path selection provide in comparisonto each other

The 2nd and 3rd items bring the first solutions to the requirements ap-pearing during the first stage These solutions are designed for the FutureInternet context where OUTSMART fits ie with large distributed andheterogeneous environments

This is a long list that enumerates the results obtained until now in LATEXformat

40 Projects and Grants in 2012

bull Fuzzing approaches for IPv6 protocols

bull Game theoretical modeling for fuzzing

bull Flow based monitoring and data mining approaches for large scale flowmonitoring

The key resukts from this project are related to the definition of a threatmodel for autonomic IPv6 networks and its instantiation in the specific caseof GANA architectural paradigm

The major outcomes from this project included a new paradigm for adaptivehoneypots that leverage game theory and reinforcement learning as underly-ing conceptual building blocks for smarter honeypots We have implementedand operated such honeypot and the major publications from this projectare one journal publications accepted for 2011 and another one for [356]

Publications [268 265 270 269] Deliverables D22

[357 359 358 360]

Seamless Communication for Crisis ManagementAcronym SECRICOMReference F1R-CSC-PEU-08SECRPI Prof Dr Thomas EngelFunding EC - FP7 European Commission

ULBudget 12469KeBudget UL NADuration 2008-09-01 ndash 2012-04-30

Members Thomas Engel Aurel Machalek

Domain(s) Emergency services critical infrastructure

Partner(s)

bull QinetiQ Ltd United Kingdom

bull Ardaco as Slovakia

bull Bumar Ltd Poland

bull NEXTEL SA Spain

bull Infineon Technologies AG Germany

41 Research projects 41

bull Institute of Informatics Slovak Academy of Sciences Slovakia

bull Graz University of Technology Austria

bull Smartrends sro Slovakia

bull ITTI Sp z oo Poland

bull British Association of Public Safety Communication Officers UnitedKingdom

bull CEA LETI France

bull Hitachi Europe SAS France

Description SECRICOM is proposed as a collaborative research projectaiming at development of a reference security platform for EU crisis manage-ment operations with two essential ambitions (A) Solve or mitigate prob-lems of contemporary crisis communication infrastructures (Tetra GSMCitizen Band IP) such as poor interoperability of specialized communica-tion means vulnerability against tapping and misuse lack of possibilitiesto recover from failures inability to use alternative data carrier and highdeployment and operational costs (B) Add new smart functions to existingservices which will make the communication more effective and helpful forusers Smart functions will be provided by distributed IT systems based onan agentsrsquo infrastructure Achieving these two project ambitions will allowcreating a pervasive and trusted communication infrastructure fulfilling re-quirements of crisis management users and ready for immediate application

More information httpwwwsecricomeu

Results University of Luxembourg successfully organised and presenteddeveloped crises communication technology of SECRICOM project duringthe NATO CPC seminar and demonstration in Slovakia We did the demon-stration together with Ciwil Protection of Luxembourg The project SE-CRICOM is after first review period marked as rdquoExcellent progress (theproject has fully achieved its objectives and technical goals for the periodor has even exceeded expectations)rdquo

Publications NA

42 Projects and Grants in 2012

Argumentation-Based and Logic-Based Reasoning in Multi-Agent SystemsAcronym ALBRReference F1R-CSC-LAB-05ILIAPI Dr Srdjan VesicFunding ERCIMBudget NABudget UL NADuration 2011-10-01 ndash 2012-09-30

Members Srdjan Vesic

Domain(s) Argumentation Reasoning Logic Multi-Agent Systems

Partner(s) NA

Description The goal of the fellowship is to obtain a better understand-ing of defeasible reasoning about information items in multi-agent contextsand to propose and evaluate specific logic-based approaches for this pur-pose First the link between existing logic-based and argumentation-basedreasoning formalisms is to be studied Then we will develop logics able tosupport deep reasoning about information quality and information handlingbased on incomplete and uncertain background knowledge This is relevantfor modelling information gathering and aggregation eg in e-science or inlegal procedures

Results My main research results during the ERCIM fellowship (Oct 2011to Sept 2012) can be resumed as follows

I studied the link between argumentation-based and non argumentation-based reasoning By argumentation-based approach we refer to a reasoningframework based on construction and evaluation of arguments This line ofresearch is important since it helps to better understand the result obtainedby an argumentation-based approach and to explore its expressive power[109 108]

I participated in the development of an on-line tool for argumentation-baseddecision making The software is still in the beta-testing phase but it canbe accessed online at thesynergyorg [107]

I also worked on a logical language to describe and reason about the beliefsof agents in a multi-agent system where agents have different knowledgemore particularly where every agent is aware of a different set of arguments[114]

Publications [107] [114] [108] [109]

41 Research projects 43

Trust Games Achieving Cooperation in Multi-Agent SystemsAcronym TrustGamesReference 1196394PI Dr Paolo TurriniFunding FNR-FP7 CofundBudget NABudget UL NADuration 2011-09-01 ndash 2013-08-31

Members Paolo Turrini

Domain(s) Game Theory Trust Theory Cooperative Behaviour

Partner(s) NA

Description TrustGames starts from the hypothesis that trust is a socialphenomenon that takes place among decision makers endowed with beliefsand goals and it is seen as a prerequisite for collaborative work (Hardin2004) (Gambetta 2008) (Castelfranchi-Falcone 2010) Up to now the treat-ment of trust in MAS is limited to specific accounts stemming from cog-nitive science (Castelfranchi-Falcone 2010) or from the normative systemsapproach (van der Torre 2010) with no unified formal theory TrustGamesis devoted to an integration of the cognitive and normative accounts of trustwithin the theory of games the discipline that formally models interactivedecision making In particular the fundamental connection between trustand related notions such as dependence and agreements between the stake-holders is intuitively clear but formally not well understood Recent contri-butions (Grossi-Turrini 2010) have shown that dependence and agreementscan be fully incorporated within the theory of games but it abstracts awayfrom cognitive and normative ingredients of trust Concretely TrustGameswill extend the model in (Grossi-Turrini 2010) with the cognitive features of(Castelfranchi-Falcone 2010) and the normative features in (van der Torre2010) in order to model trust in games Thanks to this integration formaltools such as logics to reason about games can be adopted to check whetherdesirable properties are achievable (or undesirable properties are avoidable)in classes of games with trust

Results

The study of cooperation in games The TrustGames project is centeredof the idea of using trust to achieving cooperation in multi-agentsytems Thereby understanding how cooperation is obtained from non-cooperative interaction is of fundamental importance The study has

44 Projects and Grants in 2012

extended and generalized work already carried out during my PhDstudies characterizing the cooperative structures that can arise fromnon-cooperative games

Evaluation in games The TrustGames project is based on a notion oftrust as evaluation of selection of fellow players in interaction TherebyI have directed part of our research effort to the study what it meansfor players to have an evaluation of what it can happen Normallyin games players are assumed to have knowledge of the game thatthey are playing and of the preferences and the possibilities of theiropponents Instead I have shown that when players have a boundedrationality the role of evaluation is crucial

Agreements and norms in games The TrustGames project is also meantto lay a connection between the theory of reciprocity and normativemulti-agent systems in other words to study the normative aspectsof reciprocating someone else trust The last part of this year re-search effort has been devoted to this Building up on the notionof dependence relations studied by Grossi and Turrini on which theTrustGames is based I have constructed a deontic language that couldexpress standard deontic notions (such as obligations prohibitions andpermissions) interpreted in terms of reciprocity

The project results have fully met the original proposal expectations How-ever several novelties have already crop up such as the importance of playersbounded rationality (what I have called ldquoshort sightrdquo) as a precondition fortrust in games

Publications [133] [47] [46] [112]

Wireless traffic Safety network between CarsAcronym WiSafeCarReference NAPI Prof Dr Pascal BouvryFunding EUREKA - CELTICBudget 300000eBudget UL NADuration 2009-07-01 ndash 2012-03-31

Members Pascal Bouvry Gregoire Danoy Yoann Pigne Guillaume-JeanHerbiet Patricia Ruiz

41 Research projects 45

Domain(s) Vehicular Ad Hoc Networks Secure Communications TrafficManagement Accident Warning

Partner(s)

bull Mobisoft Finland

bull Finnish Meteorological Institute Finland

bull VTT Finland

bull Taipale Telematics Finland

bull Sunit Finland

bull Ubridge South Korea

bull CRP Henri Tudor

bull Ubistream Luxembourg

Description WiSafeCar aims to develop an effective service platform andadvanced intelligent wireless traffic safety network between cars and infras-tructure with possibility to exploit vehicle based sensor and observationdata in order to generate secure and reliable intelligent real-time servicesand service platform for vehicles

Results Several works have been pursued in the frame of the developmentof a realistic mobility model of vehicles in Luxembourg VehILux Theparameters of VehILux have been optimized using different metaheuristicsin order to further improve its accuracy and results have been published in[174] In [316] a complementary optimization of VehILux has been proposedin which an iterative algorithm is used ie Gawronrsquos algortihm to betterspread the traffic flow in the road network

The WiSafeCar has ended in March 2012 The final project review has beenheld in Tampere Finland Demonstration of all projects achievements in-cluding the Luxembourgian simulator has been conducted by the consor-tium during a large event covered by Finnish press (newspaper TV)

Publications NA

46 Projects and Grants in 2012

Technology-supported Risk Estimation by Predictive Assess-ment of Socio-technical SecurityAcronym TREsPASSReference FP7 Grant Agreement No 318003PI Prof Dr Sjouke MauwFunding EU FP7Budget 9999824eBudget UL 561320eDuration 2012-11-01 ndash 2016-10-31

Members Sjouke Mauw Barbara Kordy Peter YA Ryan Gabriele Lenzini

Domain(s) Trustworthy ICT

Partner(s) UT the Netherlands DTU Denmark CYB Estonia GMVPPortugal GMVS Spain RHUL UK itrust Luxembourg GUF GermanyIBM Switzerland TUD the Netherlands TUHH Germany AAU DenmarkCHYP UK BD the Netherlands Deloite the Netherlands LUST the Nether-lands

Description Information security threats to organizations have changedcompletely over the last decade due to the complexity and dynamic natureof infrastructures and attacks Successful attacks cost society billions ayear impacting vital services and the economy Examples include StuxNetusing infected USB sticks to sabotage nuclear plants and the DigiNotarattack using fake certificates to spy on website traffic New attacks cleverlyexploit multiple organizational vulnerabilities involving physical securityand human behavior Defenders need to make rapid decisions regardingwhich attacks to block as both infrastructure and attacker knowledge areconstantly evolving Current risk management methods provide descriptivetools for assessing threats by systematic brainstorming In todayrsquos dynamicattack landscape however this process is too slow and exceeds the limits ofhuman imaginative capability Emerging security risks demand an extensionof established methods with an analytical approach to predict prioritizeand prevent complex attacks The TREsPASS project develops quantitativeand organization- specific means to achieve this in complex socio-technicalenvironments The iterative tool-supported framework

bull Represents the structure of complex organizations as socio-technicalsecurity models integrating social and technical viewpoints

bull Predicts socio-technical attacks prioritizes them based on their riskand assesses the aggregated effect of preventive measures

bull Presents results to enable quick understanding and updating of the

41 Research projects 47

current security posture

By integrating European expertise on socio-technical security into a widelyapplicable and standardized framework TREsPASS will reduce security in-cidents in Europe and allow organizations and their customers to makeinformed decisions about security investments This increased resilience ofEuropean businesses both large and small is vital to safeguarding the socialand economic prospects of Europe

All public information about the project can be found at httpwww

trespass-projecteu

TREsPASS is executed jointly by members of SnT and CSC

Results The SaToSS group is contributing to five work packages of theTREsPASS project Socio-technical security model specification (WP1)Quantitative analysis tools (WP3) Visualization process and tools (WP4)Process integration (WP5) and Standardization Dissemination and Ex-ploitation (WP9) Work on all those WPs has been initiated in November2012 at the kick off meeting of TREsPASS which took place at the Univer-sity of Twente in the Netherlands which coordinates the project

A number of initiatives and meetings has been led by BK to contributeto the first phase of the project which concerns identification of necessaryrequirements for model tools ad processes within TREsPASS

bull An initial BYOD case study has been initiated by Barbara Kordy andPatrick Schweitzer (WP1)

bull A survey paper on the state of the art of graphical modeling of at-tack and defenses have been written by Dr Barbara Kordy PatrickSchweitzer and Dr Pietre-Cambacedes from EDF France (WP1) Thepaper will be submitted in early 2013

bull A list of tools for quantitative analysis of security models has beengenerated (WP3)

bull Three meetings have been performed to discuss visualization issues insecurity modeling (WP4)

bull Two interviews concerning auditing methodologies have been carriedout by Barbara Kordy (WP5)

bull A dissemination plan proposed by the leader of WP9 has been ap-proved by UL

Publications NA

48 Projects and Grants in 2012

NESSoS FP7 ProjectNetwork of Excellence on Engineering Se-cure Future Internet Software Services and SystemsAcronym NESSoSReference no budget - participation to the Network of Excel-

lencePI Prof Dr Yves Le TraonFunding noBudget noBudget UL NADuration NA

Members NA

Domain(s) Security Future internet services and system software engi-neering

Partner(s) Core partners Atos SAE Consiglio Nazionale delle RicercheEidgenossische Technische Hochschule Zurich Fundacion IMDEA SoftwareInstitut National de Recherche en Informatique et en Automatique KatholiekeUniversiteit Leuven Ludwig-Maximilians-Universitat Munchen SiemensAG Stiftelsen Sintef University Duisburg-Essen Universidad de MalagaUniversita degli studi di Trento

University of Luxemboug is an associated partner

Description The Network of Excellence on Engineering Secure Future In-ternet Software Services and Systems (NESSoS) aims at constituting and in-tegrating a long lasting research community on engineering secure software-based services and systems

The NESSoS engineering of secure software services is based on the principleof addressing security concerns from the very beginning in system analy-sis and design thus contributing to reduce the amount of system and ser-vice vulnerabilities and enabling the systematic treatment of security needsthrough the engineering process In light of the unique security requirementsthe Future Internet will expose new results will be achieved by means ofan integrated research as to improve the necessary assurance level and toaddress risk and cost during the software development cycle in order to pri-oritize and manage investments NESSoS will integrate the research labs in-volved NESSoS will re-address integrate harmonize and foster the researchactivities in the necessary areas and will increase and spread the researchexcellence NESSoS will also impact training and education activities inEurope to grow a new generation of skilled researchers and practitioners inthe area NESSoS will collaborate with industrial stakeholders to improve

41 Research projects 49

the industry best practices and support a rapid growth of software-basedservice systems in the Future Internet

The research excellence of NESSoS will contribute to increase the trustwor-thiness of the Future Internet by improving the overall security of softwareservices and systems This will support European competitiveness in thisvital area

Results Meetings organisation of the ESSoS 2013 Doctoral Symposium

Publications NA

412 FNR COREINTER Projects

COoperative and COgnitive Architectures for SATellite Net-worksAcronym CO2SATReference 12R-DIR-PFN-10CO2SPI Prof Dr Bjorn OtterstenFunding FNR COREBudget 877KeyearBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members B Ottersten G Zheng S Chatzinotas D Aarapoglou C Xing

Domain(s) Cognitive communication

Partner(s) SES-ASTRA

Description During the last decades the demand for broadband accesshas been ever increasing with various applications in business education andentertainment In this direction satellite systems have the ability to accom-modate this demand providing large-scale coverage even in remote areasHowever in order to compete against other emerging technologies (such asfiber optic and wireless broadband networks) new high-performance satellitearchitectures have to be investigated To this end cooperative and cogni-tive satellite systems can improve both spectral and energy efficiency byexploiting advanced wireless communication techniques Regarding cooper-ative systems the joint processing of beam signals can mitigate inter-beaminterference and lead to better spectrum and power utilization Regardingcognitive systems satellite and terrestrial networks can be employed in par-

50 Projects and Grants in 2012

allel over the same frequency bands in order to provide ubiquitous indoorsand outdoors coverage and at the same time minimize the power consump-tion of the satellite payload The outcome of this investigation will be aninvaluable input to the strateQic planninQ of satellite operators and manu-facturers Based on the derived performance results the key players in thesatellite industry will be able to make informed decisions about the deploy-ment of cooperative and cognitive satellite systems Furthermore satelliteengineers will be able to use the derived insights as guidelines while desiQn-inQ future satellite systems

Results NA

Publications NA

Multi-Sensor Fusion in Mono-View Vision systems Aquisitionand Modeling (FAVE)Acronym CORE FAVEReference 12R-DIR-PFN-11FAVEPI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2011-10-01 ndash 2014-09-31

Members B Ottersten D Aouada K Al Ismaeil

Domain(s) P1 Security Reliability and Trust

Partner(s)

bull IEE

bull Univ de Bourgogne France

Description Video surveillance has become necessary to ensure publicsafety and to secure and protect critical physical infrastructures such asbanks airports and retail stores Current surveillance systems are usuallyrestricted to the deployment of 20 camerasThe effectiveness of these systemsis limited due to 20 cameras sensitivity to illumination and to occlusionswhich inescapably leads to segmentation and tracking failures With the lat-est developments in 30 sensing technologies It is now possible to considercomplementing 20 videos with 3D information in near real time This addi-tion of a third dimension ie depth information ensures a more accuratesensing of the scene We therefore propose to explore fusion approaches to

41 Research projects 51

address the shortfalls of current 20 video surveillance systems Our first ob-jective is to exploit fused data from different sources of visual informationThese include different modalities eg 20 cameras Time-of-Flight rangecameras 30 laser scanners and infrared cameras andor different levels ofabstraction Second after the data acquisition phase we propose to modelthe fused data for an intelligent sensing tailored for real-world security sce-narios In the context of high-level security systems that require a full con-trol over the surveyed area we investigate multi-view 2030 fusion methodsFurthermore for an accurate feature extraction for automatic scene un-derstanding we aim at achieving high resolution space-time depth mapsPrivacy enforcement in digital imaging systems is another important designcomponent that is today impossible to ignore in view of the boiling debateabout privacy violation An interdisciplinary effort will hence be undertakenfor the definition and design of privacy-aware imaging systems

Results NA

Publications NA

Logical Approaches for Analyising Market IrrationalityAcronym LAAMIReference 12R-DIR-PFN-10LAAMPI Prof Dr Bjorn OtterstenFunding FNRBudget 284KeBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members B Ottersten T Neugebauer M Caminada

Domain(s) P1 Security Reliability and Trust

Partner(s) NA

Description The aim of the LAAMI project is to apply techniques de-veloped in the field of Artificial Intelligence to help explaining apparentirrational forms of market behavior as is evidenced by for instance bubblesand crashes The aim is to explain these using formal theories of individualand collective reasoning as they for instance have been developed in the fieldof computational argumentation The aim is not so much to solve irrationalmarket behavior but first and foremost to understand it Our research isaimed at constructing a formal model that is sufficiently rich in order to beaccepted as a realistic model yet sufficiently formal in order to be examinedfor its formal properties and implemented in a software simulator Using

52 Projects and Grants in 2012

the results of the theory development we aim to be able to shed light on theconditions under which irrational forms of market behavior are most likelyto occur

Results NA

Publications NA

Mobility Optimization Using VEhicular Network TechnologiesAcronym MoveReference I2R-DIR-PFN-10MOVEPI Prof Dr Thomas EngelFunding FNR ProjectBudget 1127keBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members Thomas Engel Raphael Frank Andriy Panchenko JeromeFrancois Markus Forster Maximilien Mouton Lautaro Dolberg

Domain(s) vehicluar networks network security vehicular flow optimiza-tion

Partner(s)

bull University of California Los Angeles (UCLA) USA

Description The world is urbanizing rapidly As a consequence trafficcongestion in metropolitan areas has significantly increased over the lasttwo decades Although there has been significant innovation in cars safetysystems and fuel efficiency traffic congestion remains one of the modern illsof our society In most cases existing road infrastructure cannot easily be ex-tended to meet increasing traffic demand As a consequence commuters areoften stuck for hours in traffic chaos causing significant economic damageNew intelligent transportation systems (ITS) are currently being developedto increase traffic efficiency The main idea is to maximize the use of theexisting road infrastructure using smart navigation systems that are awareof the current traffic conditions Communication technologies will play animportant role in the design of such systems In the near future vehicleswill be equipped with communications devices that allow data exchange be-tween cars and Road Side Units (RSUs) Such a vehicular ad hoc network(VANET) can be used to collect and distribute traffic metrics among nearbycars and RSUs and provide advanced navigation services The aim of thisproject is to study and understand vehicular flow characteristics and propose

41 Research projects 53

new schemes using wireless communications technologies to reduce vehicu-lar traffic congestion enhance safety and at the same time reduce emissionsIn this relatively new research area there are multiple challenges As afirst step we will investigate how and where traffic information (eg speeddestination and local traffic density) can efficiently be retrieved from vehi-cles Network planning and management need to be carefully studied inorder to provide the required quality of service Adapted routing and dis-semination protocols that are able to cope with the changing dynamics ofvehicular traffic need to be specified Traffic Coordination Points (TCPs)will be responsible for collecting and evaluating traffic metrics for a givenarea This information will help to predict how the traffic will evolve in thenear future In this way the TCPs can suggest via the vehicular networkindividual routes avoiding traffic jams and thus shorten the travel time Inaddition to advanced route planning services this information can be usedto dynamically adapt the timings of local traffic lights to maximize vehicu-lar throughput A realistic simulation environment will be implemented in afirst phase to evaluate the performance of the proposed system under a va-riety of traffic scenarios A practical prototype will be validated under realtraffic conditions in Luxembourg City using the existing rsquoHot Cityrsquo meshas its infrastructure network Additional tests are foreseen at the UCLAcampus which provides a flexible testbed (up to 200 cars) to validate andtest new communication protocols

Results

bull Development of an analysis tool to evalute communications routes inVANET

bull Implementation of a traffic sensing application for mobile devices

bull Publication of new simulation and emulation tools for high fidelityVANET evaluation

bull Specification of a vehicle coordination scheme to increase vehiculartroughput on highways

bull Lightweight methods for confidentiality in data communication

bull Path selection metrics for performance improved onion routing

bull Lightweight hidden services

bull Traffic analysis in encrypted connections

bull Countermeasures against traffic analysis in encrypted connections

54 Projects and Grants in 2012

We proposed and evaluated a novel approach how to provide network serviceswhile protecting privacy and identity of the service provider [344] Thetechnology can be directly applied in the scope of the MOVE project asprivacy protection is an important fact for the acceptance of the results of theproject by the public We also studied the possibilities of traffic analysis inencrypted network streams It was shown that under certain circumstancescryptography alone is not enough to hide the content of communication Wealso studied countermeasures how to mitigate this attack Our findings areof vital importance as communication in MOVE should protect the data intransit and respect privacy of the involved individuals

Practical usage of methods for confidential communication often leads todelays that are not tolerated by the average end-user which in return dis-courages many of them from using the system In [342 343] we propose newmethods of path selection that allow performance-improved onion routingThese are based on actively measured latencies and estimations of availablelink-wise capacities using passive observations of throughput [331] We eval-uate the proposed methods in the public networks and present a practicalapproach to empirically analyze the strength of anonymity certain methodsof path selection provide in comparison to each other

Regarding the distributed and large scale context of vehicular networks theinvestigation of huge volume of captured network traffic data has been pro-posed by leveraging cloud computing and in particular in the context ofsecurity monitoring [345] As a node in a vehicular network may act as au-tonomous entity and so be easily in contact with malicious ones automaticfingerprinting methods have been proposed in [346] to enhance authentica-tion and to monitor bad behaviors

Publications Publications in 2011 6 peer-reviewed conferences [304 272265 268 270 269]

Security GamesAcronym SndashGAMESReference C08IS03PI Prof Dr Leon van der TorreFunding FNR-COREBudget 314000eBudget UL 314000eDuration 2009-04-01 ndash 2012-03-31

Members L van der Torre S Mauw W Jamroga M Melissen

41 Research projects 55

Domain(s) Game theory Security protocols Non-zero sum games Imper-fect information games Attackndashdefense analysis

Partner(s)

bull GAMES Network

Description Information security is not a static black-and-white systemfeature Rather it is a dynamic balance between a service provider tryingto keep his system secure and an adversary trying to penetrate or abusethe service Such interplay can be considered as a game between the adver-sary and the service provider and the field of game theory provides methodsand tools to analyse such interactions Games for verification and designhave been studied in computer science for the last ten years This funda-mental research into extending and complementing traditional verificationapproaches from formal methods with game theoretic reasoning is pavingthe way for more effective verification tools These developments are ofparticular interest to the field of security in which formal verification hasalways played an important role The purpose of the project is to study howthese new developments can be used to strengthen current analysis and ver-ification techniques in information security The project has two main linesof research 1) A study of the use of game-theoretic methods in the field ofsecurity resulting in requirements on game-theoretic methods for security2) The development of novel verification methods based on the combineduse of formal verification techniques and a game theoretic approach and itsapplication to the field of security For the first line two areas in securityare selected for which the application of these techniques seems particularlypromising fair exchange protocols and attackndashdefense analysis The secondline focuses on the interplay of finite and infinite games mathematical logicand automata theory in particular on analysis techniques for infinite-statesystems linear-time model checking and game models for protocols TheSndashGAMES project is a joint project of the SaToSS group and the ICR groupof Prof Dr Leon van der Torre

Results The S-GAMES project ended in 2012 Most project goals havebeen achieved The project produced a number of important results thatcan be used to analyze information security in game-like scenarios Someof the results have already been significantly cited by other researchers InLuxembourg the effectivity functions methodology is being currently usedin the AFR TrustGames project Moreover effectivity models as well aslogic-based techniques for incomplete information games developed withinthe project are also prominently featured in the FNRDGFndashINTER GaLoTproject (accepted to begin 1022013) Last but not least our results havegenerated interest among more practically-oriented research groups in par-ticular the team behind the VERICS model checker at the Polish Academy

56 Projects and Grants in 2012

of Sciences in Warsaw

The main results obtained in 2012 are as follows

bull We showed how the semantics of strategic logic ATL can be defined interms of abstract models so called coalitional effectivity functions [134]

bull Continuing studies on logic-based specification we developed a com-bination of alternating-time temporal logic ATL and description logicALCO and showed how the resulting language can be used to writelong-term security specifications [130] We showed that while thesatisfiability problem appears to be undecidable model checking istractable We also defined a variant of realizability that combinesmodel checking of the temporal frame with satisfiability of the termi-nological interpretation and showed that the new problem is decidable

bull We used strategic logics like ATL to study fairness in non-repudiationprotocols [315] We showed that existing specifications of fairness forma natural taxonomy of weaker and stronger variants We also arguedthat none of the specifications works correctly in the context of imper-fect information and we proposed our own notion as a remedy

bull We continued our studies on the relationship between models of coali-tional power coming from cooperative game theory and standard gamemodels from non-cooperative game theory In a follow-up to our pre-vious work [291] we showed how the concept and characterization canbe extended to games over infinite time horizon typical in modelingof computational systems [134]

Publications The project resulted in the following publications in 2012[134] [130] [315] [291]

The Dynamics of ArgumentationAcronym DYNARGReference F1R-CSC-PFN-09DYNARPI Prof Dr Leon van der TorreFunding FNR-INTERCNRSBudget NABudget UL NADuration 2009-10-01 ndash 2012-09-31

Members Richard Booth Tjitze Rienstra Martin Caminada Emil Wey-dert

41 Research projects 57

Domain(s) Argumentation theory Belief dynamics Multi-agent systems

Partner(s) Universite drsquoArtois Lens France (Dr Souhila Kaci)

Description Artificial Intelligence is a science that aims to implementhuman intelligence For this purpose it studies the behaviour of rationalagents Pertinent information may however be insufficient or there may betoo much relevant but partially incoherent information Different theorieshave been proposed for decision-making in these contexts In particular thegrowing development of multi-agent systems requires the handling of collec-tive decisions and of information coming from different sources Moreoverin multi-agent systems agents need to interact in order to inform convinceand negotiate with other agents Argumentation theory is a suitable theoryto support such interactions In this project we will create an abstract the-ory of dynamic argumentation in which argumentsconflict relations can beaddedremoved We will also investigate the aggregation of argumentationframeworks to model the interaction among arguing agents To this end wewill eg develop new notions of distance between argument graph labelingsin order to define when an agent position can be said to beldquoclose tordquoorldquofarrdquofrom that of another Finally we plan to apply the dynamic argumentationtheory to dialogue between agents We want to study these problems bothfrom within abstract argumentation frameworks in which the focus is onhow arguments interact with each other without specifying the actual formof the arguments as well as using more concrete representations of what anargument consists of (eg a number of explicit possibly defeasible ldquorulesrdquosupporting a ldquoconclusionrdquo)

Results

bull In [156] we proposed a number of intuitive measures of distance be-tween two sets of evaluations over a set of arguments and showed thatthey fail to satisfy basic desirable postulates Then we proposed ameasure that satisfies them all Our results inform the design of pro-cedures for revising onersquos position in order to reach agreement withothers or to conduct minimal revision to incorporate new evidence

bull Dung-style abstract argumentation assumes full awareness of the ar-guments relevant to the evaluation However this is generally not arealistic assumption Moreover argumentation frameworks have ex-planatory power which allows us to reason abductively or counter-factually but this is lost under the usual semantics To recover thisaspect in [159] we generalised conventional acceptance and presentedthe concept of a conditional acceptance function We also provided amodal-logical framework for reasoning about argument awareness in[114]

58 Projects and Grants in 2012

bull In [31] we introduced a new model for belief dynamics where beliefstates are ranking measures and informational inputs are finite setsof parametrized conditionals interpreted by ranking constraints Theapproach generalises ranking construction strategies developed for de-fault reasoning

bull In [115] we generalised the ASPIC argumentation system so that eachinference rule can be associated with a probability that expresses un-certainty about whether the rule is active The uncertainty about rulescarries over to uncertainty about whether or not a particular argumentis active The usual Dung-style abstract argumentation semantics wasgeneralised in order to deal with this uncertainty

Publications [156] [159] [114] [31] Weydert9861

Management Regulatory ComplianceAcronym MaRCoReference I2R-DIR-BPI-11KELSPI Prof Dr Pierre KelsenFunding FNR-COREBudget NABudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Pierre Kelsen Leon van der Torre Qin Ma Marwane ElKhar-bili Silvano Colombo Tosatto

Domain(s) Business process compliance

Partner(s) Guido Governatori NICTA Queensland Research Laboratory

Description The processes that underpin the businesses of our everydaylives are governed by regulations of ever growing complexity In this contextit is important

ndash to be able to describe these complex regulations rigorously precisely andunambiguouslyndash that business practitioners are actually able to specify both regulationsand business processesndash to be able to check in an automated way that business processes complywith their underlying regulations

MaRCo proposes to tackle these three issues On one hand MaRCo improves

41 Research projects 59

existing approaches to formally describe (or model) norms On the otherhand MaRCo makes this practical and usable by practitioners in such away that the mathematical based formalisms involved in norm specificationdo not constitute a barrier to practitioners that know the business domainbut not the underlying mathematical formalism being used and so MaRCoproposes a visual-based approach to norm specification Finally MaRCochecks the compliance of business processes against the norms that governthem in order to be able to detect in an automated way business processesthat violate their underlying regulations

MaRCo aims at creating added value for service-related industries (eg inthe banking sector) by making the specification of business processes andnorms rigorous and precise yet accessible to domain experts and enablingan automated approach to compliance checking This should provide meansto ensure that services are aligned with their underlying local and interna-tional regulations With the growing need for regulatory compliance thiswill strengthen the expertise in service science in Luxembourg

See also httpmarcogforgeunilu

Results CoReL Policy-Based and Model-Driven Regulatory ComplianceManagement Marwane El Kharbili Qin Ma Pierre Kelsen and Elke Pul-vermueller In Proc of the 15th IEEE International Enterprise DistributedObject Computing Conference (EDOC 2011) IEEE Computer Society 2011

Publications 1 conference publication [314]

Multi-Objective Metaheuristics for Energy-Aware Scheduling inCloud Computing SystemsAcronym GreenCloudReference NAPI Prof Dr Pascal BouvryFunding FNR University of LuxembourgBudget 1088440Budget UL NADuration 2012-07-01 ndash 2015-06-30

Members Alexandru-Adrian Tantar Sebastien Varrette Gregoire Danoy

Domain(s) NA

Partner(s) University of Lille

Description The project GreenCloud aims at developing an energy-aware scheduling framework able to reduce the energy needed for high-

60 Projects and Grants in 2012

performance computing and networking operations in large-scale distributedsystems (data centers clouds grids) With the advent of new petaflopsdata centers and the next-generation Internet (rdquoInternet of Thingsrdquo rdquoHigh-Performance Internetrdquo) energy consumption is becoming a major challengefor the IT world To build up this new energy-aware scheduling frameworkthe project GreenCloud will first develop multi-criteria mathematical op-timization models (eg makespan energy robustness) and then designmulti-objective optimization methods to solve the problem These tech-niques along with statistical and machine learning components will be usedto provide autonomous fault-tolerant and robust scheduling paradigms forvirtual machines running inside a dynamic environment A series of time-varying deterministic and stochastic factors will be considered as part of theenvironment eg renewable energy supply computational demand or activ-ity of users Experimentation and validation will be carried on a real test bedusing large-scale equipments (eg Gridrsquo5000) while relying on distributedscenarios

Results Accepted project with a start date in November 2012 A firstmeeting of the involved members was held in December

Publications NA

EnerGy-efficient REsourcE AllocatioN in AutonomIc CloudCompuTingAcronym GreenITReference F1R-CSC-PFN-08IS21PI Prof Dr Pascal BouvryFunding FNR-COREBudget 432000eBudget UL NADuration 2010-01-01 ndash 2012-12-31

Members Pascal Bouvry Samee U Khan Thomas Engel Zdislaw Zucha-necki Johnatan Pecero Beranbe Dorronsoro Marcin Seredynski GregoireDanoy Sebastien Varrette Alexandru-Adrian Tantar Dzmitry KliazovichRadha Thanga Raj Frederic Pinel Cesar Diaz

Domain(s) Energy-efficiency resource management heterogeneous com-puting multi-objective optimization multi-agent systems parallel and dis-tributed computing telecommunication networks cloud computing

Partner(s)

41 Research projects 61

bull North Dakota University USA

bull LuxConnect

Description The project GreenIT aims to provide a holistic autonomicenergy-efficient solution to manage provision and administer the variousresources of Cloud-Computing (CC) dataHPC centers

The main research challenges that will be tackled to achieve the holisticapproach are

bull Development of a multi-objective mathematical meta-model CC is acomplex system of numerous pervasive devices that request servicesover heterogeneous network infrastructures from a data center that isenergy gobbler Because each computing entityrsquos performance is de-fined uniquely we must develop a multi-objective meta-model that canadequately define a unified and performance metric of the whole sys-tem The multiple constraints and objectives dealing with the qualityof service (QoS) cost and environment impact must be formulated andtheir relationship analyzed

bull Develop resource management and optimization methodologies Withseveral possible objectives and constraints the meta-models must re-sult in multi-objective multi-constraint optimization problems (MOP)Green-ICT will develop refine and evolve solutions for MOP that willprimarily be based on metaheuristics (eg multi-objective evolution-ary algorithms multi-objective local search hybrid metaheuristics)

bull Develop autonomic resource management The anytime anywhere slo-gan only will be effective when an autonomic management of resourcescan be achieved The resource allocation methodologies developedmust go further refinement such that the system at hand is self- heal-ing repairing and optimizing In particular it is our intention toutilize multi-agent systems (MAS) that can learn to adapt (machinelearning methodologies) and gracefully evolve to adapt (evolutionarygame theoretical methodologies)

Results For the computational aspects (WP1) contributions in the fol-lowing domains have been proposed in 2011

bull Energy-aware scheduling algorithms Different problems related to theschedule of tasks on Grids targeting energy efficient solutions in differ-ent aspects are defined In [285] we solve the problem of energy-awarescheduling for dependent tasks on Grids Then we consider a simi-lar problem but minimizing the energy required for communicationsin [305]

62 Projects and Grants in 2012

bull Robust-aware scheduling algorithms The problem analyzed here is tofind highly efficient schedules for allocating tasks on Grids but withthe additional characteristic that they are as robust as possible againstchanges in the predicted time to accomplish the scheduled tasks Themore robust the schedule is the less important will be the influenceof these changes on the final makespan (ie time when the latest jobis finished) Different highly efficient and accurate parallel coevolu-tionary multi-objective algorithms (with highly super-linear speed-up)have been proposed for this project [287 300]

bull Development of new efficient general-purpose optimization algorithmsIn addition to the previously described problems some work target-ing the design of new efficient algorithms was done In particular weare interested on enhancing well-known algorithms and reducing theirparameters [283] proposes the use of new adaptive neighborhoodsfor cellular genetic algorithms (cGAs) improving their performanceand reducing the neighborhood to use a very important parameter ofcGAs In [286] the use of a new class of algorithms with small worldtopologies for the population is proposed showing highly accurate re-sults and high efficiency compared to a canonical cGA with the sameparameters Later we compare many different topologies for differ-ential evolution algorithms in [299] and we propose a new efficientoperator for this kind of algorithms too In [311] we propose the useof cellular populations for differential evolution algorithms showingthat it enhances the behavior of the several state of the art algorithmstested

bull Validation of the algorithms on other complex real-world problems asthe optimization of energy-aware broadcasting algorithms for mobilead-hoc networks [307 284] or the configuration of the Cassini space-craft trajectory [298] outperforming in this latter case the state of theart

Volunteer-based systems have also been studied in the second semester of2011 We have been developing an optimization tool based on such sys-tems and evolutionary algorithms metaheuristics The following enumera-tion points out the main results obtained until now

bull Validation of a Peer-to-Peer Evolutionary Algorithm [336] Acceptedfor publication in Evostar 2012

bull Characterizing Fault-tolerance in Evolutionary Algorithms [337] Ac-cepted for publication during 2012

41 Research projects 63

For the communication aspects (WP3) the GreenCloud network simulatordevelopment has been continued

Several works of editorship and organization of new events have been also un-dertaken that will ensure additional impact in the following years includingeditorship of the book entitled rdquoIntelligent Decision Systems in Large-ScaleDistributed Environments [282] published by Springer)

Two websites contain the project informationhttpgreenitgforgeunilu and httpsgforgeuniluprojectsgreencloudto provide access to the energy efficiency simulator for distributed data cen-ters developed in the framework of the GreenIT project

Publications NA

Socio-Technical Analysis of Security and TrustAcronym STASTReference C11IS1183245PI Prof Dr Peter YA RyanFunding FNR COREBudget 765864eBudget UL 765864eDuration 2012-05-01 ndash 2015-04-30

Members Peter YA Ryan Sjouke Mauw Gabriele Lenzini VincentKoenig Ana Ferreira Jean-Louis Huynen

Domain(s) security analysis human factor security protocols

Partner(s) University of Catania Royal Holloway University LondonNewcastle University University College London Norwegian University ofScience and Technology

Description Over the last 20-30 years the security community has mademajor strides in the design and (semi-automated) analysis of security pro-tocols Nevertheless security critical systems continue to be successfullyattacked There appear to be two main explanations of this situation (1)the implementation of the protocol designs introduce flaws that are notpresent at the design level and (2) attackers target and exploit the usuallymore vulnerable non- technical aspects of the system

Information security systems are typically complex socio-technical systemsand the role of humans in either maintaining or undermining security is cru-

64 Projects and Grants in 2012

cial Often system designers fail to take proper account of human charac-teristics resulting in vulnerabilities at the interface between the humans andthe purely technical components Attackers often target such vulnerabilitiesrather than attempt to break the technical security mechanisms Despitethis the socio-technical aspects of security have been largely neglected bythe information security community

Addressing these socio-technical aspects is very challenging and highly inter-disciplinary This project focuses on this most urgent and critical aspect ofsecurity It will build on the existing knowledge expertise and tools for theanalysis of security protocols but extend and enrich it to capture the humanand social dimension

Key elements of our approach are

bull To enrich existing models to encompass the role of the users and en-hanced attacker models

bull To develop tools and methodologies to analyze system designs againstthese enriched models

STAST is executed jointly by members of SnT and CSC

Results Selection of the PhD candidate who will be working on theSTAST project within the SaToSS group has started in 2012 We haveinterviewed a number of candidates and we hope to fill the position in early2013

Publications NA

Attack TreesAcronym ATREESReference C08IS26PI Prof Dr Sjouke MauwFunding FNR-COREBudget 299000eBudget UL 299000eDuration 2009-04-01 ndash 2012-03-31

Members Sjouke Mauw Barbara Kordy Patrick Schweitzer Sasa Radomirovic

Domain(s) security attackndashdefense trees security assessment formal meth-ods

Partner(s)

41 Research projects 65

bull Telindus Luxembourg

bull Sintef Norway

bull TXT e-solutions Italy

bull Cybernetica Estonia

bull EDF France

bull Lucerne University of Applied Sciences and Arts Switzerland

bull THALES Research amp Technology France

Description Security assessment of systems is a standard but subopti-mal procedure due to its informal nature While a formal approach wouldbe desirable but out of reach a systematic approach would be beneficialand feasible Attack trees are a wellndashknown methodology to describe thepossible security weaknesses of a system An attack tree basically consistsof a description of an attackerrsquos goals and their refinement into sub-goalsWe believe that attack trees provide an ideal systematic approach for se-curity assessment The objective of this project is to extend attack treeswith defensive measures Consequently the attackndashdefense tree method-ology will be developed and formalized in order to provide a systematicfullyndashfledged and practical security assessment tool The project benefitsfrom our contacts with several industrial and academic partners with whomwe conduct case studies More information can be found on the project webpage httpsatossuniluprojectsatrees

Results In 2012 the ATREES project resulted in following output

bull An article published in the Journal of Logic and Computation de-scribing the attackndashdefense tree methodology developed within theATREES project [258]

bull A presentation and publication of an article describing how to quan-titatively analyze attackndashdefense trees in practice

bull A publication of a journal article describing the case study performedin 2011 [254]

bull A publication of the conference article [355] about computational as-pects of attackndashdefense trees

bull Development of the ADTool a software tool supporting creation andquantitative analysis of attackndashdefense trees The ADTool is availableat httpsatossuniluprojectsatreesadtool

66 Projects and Grants in 2012

The results of the project were presented in six research talks and invitedlectures given at NTNU in Norway Sintef in Norway RHUL in UK LORIAin France THALES in France and ICISCrsquo12 conference in Korea as well asin one internal SRM presentation

The collaboration with related projects have also been initiated Currentlywe perform two case studies using the attackndashdefense tree methodology oneabout an analysis of an e-voting system (in collaboration with the CORESeRTVS project lead by Prof Ryan) and one on BYOD issues (in collabo-ration with the CORE CoPAINS project led by Prof Le Traon) We haveinitiated a collaboration on attack trees between the University of Luxem-bourg and THALES Research amp Technology in France

The methodologies developed and results obtained within the ATREESproject will serve as input for the FP7 EU project TREsPASS and theCORE project STAST

Publications The project resulted in following publications in 2012 [258][254] [355]

Cryptography and Information Security in the Real WorldAcronym CRYPTOSECReference F1R-CSC-PFN-09IS04PI Dr Jean-Sebastien CoronFunding FNR-COREBudget 272000eBudget UL NADuration 2010-10-01 ndash 2013-09-30

Members NA

Domain(s) Cryptography Information Security Side-Channel Attacks

Partner(s) NA

Description Cryptography is only one component of information securitybut it is a crucial component Without cryptography it would be impossi-ble to establish secure communications between users over insecure networkslike the internet In particular public-key cryptography (invented by Diffieand Hellmann in 1974) enables to establish secure communications betweenusers who have never met physically before One can argue that compa-nies like E-Bay or Amazon could not exist without public-key cryptographySince 30 years the theory of cryptography has developed considerably How-ever cryptography is not only a theoretical science namely at some point

41 Research projects 67

the cryptographic algorithms must be implemented on physical devices likePCs smart-cards or RFIDs Then problems arise in general smart-cardsand RFIDs have limited computing power and leak information throughpower consumption and electro-magnetic radiations A cryptographic al-gorithm which is perfectly secure in theory can be completely insecure inpractice if improperly implemented Therefore the aim of this proposal isto take into account every aspect of the implementation of secure systemsin the real world from the mathematical algorithms to the cryptographicprotocols and from the cryptographic protocols to their implementation inthe real world This allows creating a bridge between theoretical research incryptography on the one side and its applications and the end users of thenew technology on the other side When dealing with cryptographic pro-tocols we will work in the framework of provable security every securitygoal will be clearly defined and every new cryptographic scheme or protocolshould have a proof that the corresponding security goal is achieved basedon some well defined computational hardness assumption When dealingwith cryptographic implementations we will try to cover all known side-channel attacks timing attacks power attacks cache attack etc

Results Due to administrative reasons the actual start of the project ispostponed to the first half of 2011

Publications NA

Secure Reliable and Trustworthy Voting SystemsAcronym SeRTVSReference I2R-DIR-PFN-09IS06PI Prof Dr Peter RyanFunding FNR-Core 333000e FNR-AFR 216216e IMT

Luca 130000e University of Melbourne 60000eUL 268596e

Budget NABudget UL NADuration 2010-02-01 ndash 2013-02-01

Members NA

Domain(s) Electronic voting

Partner(s) University of Surrey (UK) University of Birmingham (UK)IMT - Institute for Advanced Studies Lucca (Italy) University of Melbourne(Australia)

Description Ensuring that the outcome of an election is demonstrably

68 Projects and Grants in 2012

correct while maintaining ballot privacy and minimising the dependence onelection officials has been a challenge since the dawn of democracy For overa century the US has experimented with various technologies to try to makevoting easier and more secure All of these have proved problematic mostnotably the more recent use of touch screen machines The danger here isthat the outcome is critically dependent on the correct execution of the coderunning on the voting devices

Recent research has explored the use of modern cryptography to address thischallenge Significant advances have been made in particular advancing thenotion of ldquovoter-verifiabilityrdquo allowing voters to confirm that their voteis accurately counted while avoiding threats of vote buying or coercionNotable amongst such schemes is the Pret a Voter system proposed bythe PI in 2004 and subsequently developed to make it more usable secureand flexible The Pret a Voter approach is widely regarded as one of themost secure and useable of such schemes and is arguably the most promisingin terms of providing a practical scheme for real-world use

Despite the successes achieved in this field the issues of robustness andtrustworthiness remain open Verification procedures are a part of mostproposed systems intended to offer trust However systems universallylack procedures in case the verification finds errors and the complexity ofthe verification procedures often undermines trust instead of bolstering it

The aim of the SeRTVS project is to develop and evaluate designs for prac-tical secure and trustworthy voting systems Such schemes should yielda demonstrably correct outcome of the election while guaranteeing ballotprivacy Furthermore such systems must be sufficiently simple to use andunderstandable as to gain widespread acceptance by voters and other stake-holders The starting point will be the existing Pret a Voter and PrettyGood Democracy schemes Vulnerability or deficiencies identified duringthe evaluation will be addressed by enhancements to the scheme

To date very little has been done to investigate robust recovery mechanismsfor voting systems The project will develop effective recovery mechanismsand strategies The project will also investigate the issues of public percep-tion and trust of verifiable systems It is not enough for the system to betrustworthy it must also be universally perceived as trustworthy A goaltherefore is to measure and advance public understanding and trust in suchschemes

Results In the course of the project Dr Gabriele Lenzini was recruited asa post-doctoral researcher to start in February 2011 The project staged theInternational Summer School on Secure Voting (SECVOTE 2010) in Berti-noro (Italy) jointly with the TVS project Research results were publishedin the proceedings of ESORICS 2010 [353] and INDOCRYPT 2010 [354]

41 Research projects 69

Publications NA

Conviviality and Privacy in Ambient Intelligence SystemsAcronym CoPainsReference NAPI Prof Dr Yves Le TraonFunding FNRBudget 4Budget UL 486000Duration 2012-01-01 ndash 2013-12-31

Members Patrice Caire Yehia El Rakaiby Assaad Moawad

Domain(s) Security and Privacy defeasible logic AAL conviviality soft-ware engineering

Partner(s) Hot City

Description Ambient Intelligence constitutes a new paradigm for the in-teractions among intelligent devices and smart objects acting on behalf ofhumans The ultimate goal of Ambient Intelligence systems is to transformour living and working environments into intelligent spaces able to adapt tochanges in context and to users social needs Such systems must have thecapability of interpreting their contexts Moreover the open nature of Ambi-ent Intelligence systems and the unnoticeable ways in which various sensorsmay access users personal data make two seemingly antagonistic require-ments preserve users privacy and facilitate convivial interactions amonghumans and devices The concept of conviviality has recently been intro-duced as a social science concept for Ambient Intelligence to highlight softqualitative requirements like user friendliness of systems To make AmbientIntelligent systems desirable for humans they must be convivial and privateie fulfil both their need for social interactions making communication andcooperation among participants easier while also preserving the privacy ofeach individual Hence the need for trade-offs between being private andconvivial intuitively the former keeping information to a small circle of in-siders while the later shares it with all The aims are to enable knowledgesharing for the collective achievement of common objectives among enti-ties through coalition formation while at the same time respecting eachentityrsquos privacy needs Hence the CoPAInS project is about designing anddeveloping models of interaction among intelligent devices it is also abouttheir corresponding methods The main goal of CoPAInS is to facilitateprivacy and conviviality in Ambient Intelligence and to provide tools forit To achieve our objective first we develop a formal framework for con-

70 Projects and Grants in 2012

text representation privacy and conviviality using methods of KnowledgeRepresentation and Reasoning Second we validate and verif y privacy andconviviality properties of Ambient Intelligence systems using model-checkingtechniques We then simulate and test use cases from the field of AmbientAssisted Living Third to demonstrate the feasibility of our approach andits usefulness to support Luxembourg citizens everyday activities we applythe gained expertise to use cases provided by Hotcity Finally we produceguidelines to assist system designers in the development of privacyaware andconvivial assistive systems

Results Development of the IoT lab in SnT

Publications [210 209 140 245 152 139]

e-Training Education Assessment and Communication Centerfor Headache DisordersAcronym E-TEACCHReference F1R-CSC-PFN-10ETEAPI Prof Dr Denis ZampunierisFunding FNR-COREBudget NABudget UL NADuration 2011-05-01 ndash 2014-04-30

Members Sergio Dias Andrea Teuchert Denis Zampunieris

Domain(s) public health disease-management headache e-learning mu-timedia

Partner(s) CRP Sante

Description Headache including migraine is a common and disablingneurobiological disorder which is under-recognized under-treated commonlymismanaged and it imposes a substantial health burden with a major im-pact on both quality of life and the economy Migraine alone the mostprevalent neurological brain disorder is more prevalent than asthma di-abetes and epilepsy combined According to WHO the burden weight ofmigraine is higher than that of epilepsy multiple sclerosis and ParkinsonasdiseaseEffective treatments exist but general practitionersrsquo misdiagnosisand mismanagement of headache disorders easy access to various over thecounter drugs have led to a high rate of self-medication Long-term sideeffects increase of secondary headaches and dependency are the major prob-lems Health care failure has its roots in education failure at every level inEurope and in the resulting and widespread lack of understanding With

41 Research projects 71

E-TEACCH the CRP-Sante and the University of Luxembourg will buildan innovative demonstrational electronic multilingual Training EducationAssessment and Communication Center on Headache with easy-to-use in-teractive modular and extensible content for different target groups (pa-tients doctors pharmacists) The two Luxembourg centers represent anideal combination technical professionals experienced pedagogic e-learningand Headache teams with established support of international and Euro-pean scientific and lay organizations international interdisciplinary expertsas well as the WHO campaign aLifting the burdena E-TEACCH will im-prove headache disorder screening diagnosis disease-management preven-tion treatment adherence and in doing so allow headache sufferers a betterquality of life reduce socio-economic costs chronification and comorbidityE-TEACCH will offer latest headache disorder scientific news webinarsscreening tools diagnostic aids treatment control and communication sup-port disability measurements disease-management guidelines video basedcase studies and accredited knowledge assessment tests

Results NA

Publications NA

Managing Regulatory Compliance a Business-Centred Ap-proachAcronym MaRCoReference I2R-DIR-PFN-09IS01PI Prof Dr Pierre KelsenFunding FNR-COREBudget 749K eBudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Pierre Kelsen Qin Ma Marwane El Kharbili Christian GlodtLeon van der Torre Silvano Colombo Tosatto

Domain(s) Compliance Management Business Process Management Pol-icy Management Normative Systems Enterprise Models Model-Driven En-gineering (MDE) Visual Languages Formal Methods

Partner(s)

bull NICTA Queensland Research Laboratory Australia

bull University of Osnabrueck Germany

72 Projects and Grants in 2012

Description The processes that underpin the businesses of our everydaylives are governed by regulations of ever growing complexity In this con-text it is important (a) to be able to describe these complex regulationsrigorously precisely and unambiguously (b) that business practitioners areactually able to specify both regulations and business processes and (c) tobe able to check in an automated way that business processes comply withtheir underlying regulations This project proposes to tackle these threeissues On one hand we want to improve existing approaches to formallydescribe (or model) norms On the other hand we would like to make thispractical and usable by practitioners in such a way that the mathematicalbased formalisms involved in norm specification do not constitute a bar-rier to practitioners that know the business domain but not the underlyingmathematical formalism being used and so we propose a visual-based ap-proach to norm specification Finally we intend to check the compliance ofbusiness processes against the norms that govern them in order to be able todetect in an automated way business processes that violate their underlyingregulations The proposed research project aims at creating added value forservice-related industries (eg in the banking sector) by making the specifi-cation of business processes and norms rigorous and precise yet accessible todomain experts and enabling an automated approach to compliance check-ing This should provide means to ensure that services are aligned with theirunderlying local and international regulations With the growing need forregulatory compliance this will strengthen the expertise in service science inLuxembourg

Results - We have carried out a systematic literature survey of regulatorycompliance management in business process management elicited a set ofsuccess requirements and performed a comparative analysis of literature so-lutions against the requirements The result has been reported in a LASSYtechnical report (TR-LASSY-11-07) and an excerpt of the technical reportis accepted by the 8th Asia-Pacific Conferences on Conceptual Modelling(APCCM) for publication in 2012 - We have designed E3PC (EnterpriseExtended Event-driven Process Chains) E3PC is a formal model-driven en-terprise modeling language that extend EPC (Event-driven Process Chains)The formal semantics of E3PC is defined in terms of a translation fromE3PC models to Algebraic Petri-Nets (APN) We have reported the resultin a LASSY technical report (TR-LASSY-11-12) - We have designed CoReL(Compliance Requirement Language) CoReL is domain-specific modelinglanguage for representing compliance requirements that has a user-friendlygraphical concrete syntax Two papers have been published reporting re-sults on CoReL one[314]describes the language itself and the other[313]reports an illustrative example of using this language - We have developedan editor for E3PC and an editor for CoReL both implemented as Eclipseplug-ins We have also implemented the formal semantics of E3PC by de-

41 Research projects 73

veloping model transformations from E3PC to APN in both DSLTrans andATL - We have identified a sub-set of business processes called structuredbusiness processes in which only XOR and AND connectors are allowed andsplits and joins are always paired up properly Based on these structuredbusiness processes we have already derived efficient algorithms for certainsimple compliance requirements providing thus some evidence that theserestrictions on business process help to reduce complexity of compliancecheckingWe report the results in [90] and and a paper to be published atESSS 2013 - We have started the work on norm dynamics by investigatingthe use of an argumentation framework to determine the priorities betweenthe norms This approach can also be used within business processes todynamically determine to which policies the business process should complydepending from the context of the execution -We have started to work onan abstract framework to define compliance We propose an abstract frame-work to define business process compliance and its elements First we definethe elements that constitute a business process and its functioning Secondwe define the policies governing the processes and their obligations takingalso into account the temporal constraints that can exist between differentobligations

Publications [314 313 90 2 88 89 242 366]

Modeling Composing and Testing of Security ConcernsAcronym MITERReference NAPI Dr Jacques KleinFunding FNRBudget NABudget UL NADuration NA

Members Jacques Klein Yves Le Traon Phu Nguyen Qin Zhang MaxKramer

Domain(s) software engineering Model Composition Model-Driven Se-curity Model-Based Testing

Partner(s) KIT Karlruhe Germany

Description Security is not only a keyword it is currently a critical issuethat has to be embraced by modern software engineering (SE) techniquesFrom this SE point of view ensuring confidence in the implemented securitymechanisms is the key objective when deploying a security concern This

74 Projects and Grants in 2012

objective can be reached by improving the design and implementation pro-cess via modeling and automation such as security code generation frommodels and by systematic testing and verification

As stated in the FNR programme description ldquoInformation Security andTrust Managementrdquo is one of the cornerstones of the Information Societya ldquotransversalrdquo research domain of central and ever-growing importance notonly for the banking industry but for nearly all other ICT applicationsand e-services Thus security concerns impact many ICT domains in manydifferent ways

Secure programming techniques are now better understood and guidelinesteach programmers how to avoid buffer overflows when to validate inputsand how to apply cryptography The key problem is that security should notbe under the sole responsibility of the programmer (hopefully competent)Dealing with security at a programming level is risky often not sufficient andis not the most productive Indeed to face large classes of attacks securityexperts must express the security policy which is the result of a risks andthreats analysis This security policy cannot be deployed without taking intoaccount the software development lifecycle in a whole In other words itis necessary to consider the requirements analysis and design developmentsphases and the links between these phases to be able to represent (with mod-els) and analyze (with model analysis security methods) security concernsin order to detect or prevent from attacks Second the fact that securityconcerns impact ma ny ICT domains in many different ways amplified bythe fact that economic pressure reduces development time and increases thefrequency modifications are made constantly imposes more productive andflexible development methods To sum up for agile modeling there is anurgent need for modeling tools which allows composing functional architec-tural and - in MITER project - security expert viewpoints into an integratedproductive model

In this context the MITER project aims at developing new modeling tech-niques to 1) represent security concerns (eg access control and usage con-trol policies) 2) compose them with the business logic model (called tar-get model) and 3) test the security model composition against security re-quirements These three objectives converge to an integrated model-drivensecurity process which allows a business model to embed various securityconcerns and makes these security properties testable by construction

Results We have worked on an extension of one of our papers on dynamicaccess control Our goal being to perform performance analysis on the meth-ods that we propose We have also worked on Delegation management Morespecifically among the variety of models that have been studied in a MDEperspective one can mention Access Control policy that specifies the accessrights These work mainly focus on a static definition of a policy without

41 Research projects 75

taking into account the more complex but essential delegation of rightsmechanism User delegation is a meta-level mechanism for administratingaccess rights by specifying who can delegate access rights from one user toanother including his own rights We analyse the main hardpoints for intro-ducing various delegation semantics in model-driven security and proposesa model-driven framework for enforcing access control policies taking intoaccount all delegation requirements

We worked on the second main goal of the MITER project the compositionof security concerns As a result first we have proposed a new version of theGeKo weaver (available at httpcodegooglecomaeclipselabsorgpgeko-model-weaver) a generic and practical aspect-oriented modelling weaverA paper describing GeKo is currently under submission at the Model con-ference Second we applied GeKo to weave building specifications in thecontext of construction industry A workshop paper has been accepted in2012 This paper and this work have been done in collaboration with theUniversity of Queensland

Publications none in 2011

Model-Driven Validation and Verification of Resilient SoftwareSystemsAcronym MOVEREReference F1R-CSC-PFN-09IS02PI Prof Dr Nicolas GuelfiFunding FNR-COREBudget 265 000eBudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Levi Lucio Yasir Khan Qin Zhang

Domain(s) Software Engineering Security Dependability Resilience ModelChecking Model Driven Engineering

Partner(s) University of Geneva Switzerland

Description Verification and Validation of software have nowadays clearmeanings in the context of Model- Driven Development With test basedverification we worry about producing a set of test cases that will on theone hand find faults in an implementation - also called in the test literatureSystem Under Test (SUT) - and on the other hand increase trust in thefinal product With validation we worry about understanding if the modelwe are using as reference for implementation and for extracting test cases

76 Projects and Grants in 2012

from is sound Formal validation is often achieved by mechanically provingproperties the model should satisfy For example dynamic properties couldbe expressed in a temporal logic and static properties on the system statecould be expressed using logical invariants and then verified on the systemrsquosmodel In this project we will focus our attention on the application of val-idation and verification techniques to the Model Driven Engineering of sys-tems where resilience mechanisms are explicitly modelled and implementedaccording to that model Resilience corresponds to the fact that a systemhas the capability to adapt to harmful events and recover to a stable state orat least continue operation in a degraded mode without failing completelyThese harmful events might cause the fundamental security properties (con-fidentiality integrity and availability) to be violated With this project weaim at improving the state of the art of the construction of reliable resilientsystems by using verification and validation techniques within the context ofModel Driven Development (MDD) The current trend of Software Engineer-ing is to increasingly reason about the system being built at the model levelby using appropriate Domain Specific Languages (DSL) for each conceptualdomain In this project we will concentrate on resilience and materializeit as a DSL Model composition techniques can then be used in order tocompose resilience features expressed in the resilience DSL with other do-mains equally defined as DSLs When the composed model is validatedverification techniques can then be used to insure the resilience propertiesare well implemented We will tackle this problem both at a theoretical anda practical level

Results Since the beginning of the project in May 2010 we have hadtwo main results The first one is an abstract definition of resilience froma software engineering perspective This work is accessible as a technicalreport in [327] It has also been submitted to the journal rdquoTransactions onSoftware Engineering and Methodologyrdquo and for which approval is pendingThe second result is an operational definition of resilience using a modeldriven approach and model checking tools The work is based on [327]and is accessible also as a technical report in [326] A paper based on thistechnical report has been submitted to TOOLS 2011 Both these papersconcern work packages 1 and 2 of project MOVERE

Two PhD students Yasir Khan and Qin Zhang have been hired for workingfor MOVERE funded by the FNR AFR program Qin Zhang has startedat the University of Geneva in November 2010 and is currently familiarizinghimself with the project and the tools he will be using Yasir Khan has fileda visa demand at the Belgium embassy in his home country and is expectedat the Luxembourg in a few months

Publications NA

41 Research projects 77

Security TEsting for Resilient systemsAcronym SETERReference F1R-CSC-PFN-08IS01PI Prof Dr Nicolas GuelfiFunding FNR-COREBudget 43830000 eBudget UL NADuration 2009-05-01 ndash 2012-04-30

Members Nicolas Guelfi Yves Le Traon Ayda Saidane Iram Rubab

Domain(s) Security Resilience Model based Testing Requirement engi-neering Software architecture AADL

Partner(s) Telecom Bretagne France

Description Resilient systems can be viewed as open distributed systemsthat have capabilities to dynamically adapt in a predictable way to unex-pected and harmful events including faults and errors Engineering suchsystems is a challenging issue which implies reasoning explicitly and in aconsistent way about functional and non-functional characteristics of sys-tems The difficulty to build resilient systems and the economic pressureto produce high quality software with constraints on costs quality securityreliability etc enforce the use of practical solutions founded on scientificknowledge One of these solutions is to propose an innovative testing pro-cess Testing is an activity that aims at both demonstrating discrepanciesbetween a systems actual and intended behaviours and increasing the con-fidence that there is no such discrepancy One of the main features of asystem to test is the security of the system especially for those which aresafety or business critical The security of a system classically relates tothe confidentiality and integrity of data as well as the availability of sys-tems and the non-repudiation of transactions Testing security propertiesis a real challenge especially for resilient systems which have the capabilityto dynamically evolve to improve the security attributes The aim of theSETER project is to define a new testing approach that will ease the ver-ification of resilient programs that implement this security property Thisapproach must be aware that confidentiality and integrity can be compro-mised in many different ways (and consequently the resilient system canevolve in many different ways too) that availability and non-repudiationguarantees are difficult to ensure and that it must be compliant with theother tests addressing the core functionalities of the system Current trendsadvocate the idea that resilience should become an integral part of all stepsof software development Moreover testing is important for detecting errors

78 Projects and Grants in 2012

early in the development life cycle The earlier an error is detected theeasier and cheaper it is to resolve Therefore the objective of the SETERproject fits with these ideas by proposing new security testing approachesfor resilient systems the earlier possible during the software developmentlifecycle to propose more secure and more reliable system

Results

bull result 1 A Formal Framework for Dependability and Resilience (WP3 - Resilient System Specification and Security Requirements)

bull result 2 model based security testing approach (WP 4 - Test CaseSpecification and Selection)

bull result 3 AADL adaptation for expressing resilience requirements (WP3 - Resilient System Specification and Security Requirements)

Publications NA

413 UL Projects

Techniques and Technologies for multi-spot beam Ku-bandSatellite NetworksAcronym Multibeam KuReference 12R-DIR-PAU-11MSBKPI NAFunding ESA ITTBudget NABudget UL NADuration 2010-12-01 ndash 2012-02-28

Members B Ottersten B Shankar

Domain(s) NA

Partner(s)

bull SES-ASTRA (Luxembourg)

bull EADS Astrium (Fr)

41 Research projects 79

Description The objective of the study is to assess the advantages broughtby the introduction of multi-bearms and associated flexibility on Ku bandpayloads in particular for the present consortium the objective of the studyis to define assess and consolidate the benefits that a multi-beam architec-ture and flexibility could bring to follow-on satellites to NSS-6 satellite

Results NA

Publications NA

Guest professor Dov GabbayAcronym NAReference F1R-CSC-LAB-05ILIAPI Prof Dr Dov GabbayFunding ULBudget NABudget UL NADuration 2011-09-01 ndash 2014-08-31

Members NA

Domain(s) Logic Networks Argumentation

Partner(s) NA

Description

bull Further development of a unifying equational approach to logic andnetworks in particular argumentation

bull Interdisiplinary perspective on Security and trust bridging the gapbetween the areas of logic philosophy and security

bull Development of the foundation and applicability of input output logicespecially concerning its geometrical point of view which seems promis-ingly applicable to many non-classical logics

Results Progress was made in 3 related areas

bull Reactive Kripke modelsThese are Kripke models with additional accessibility relations whichcan change the model in the course of evaluations Several importantresults about the logical properties of such models were provided andpublished

80 Projects and Grants in 2012

bull Deontic logic and contrary to duty obligationsThe reactive semantics was used to build coherent models for intriguingpuzzles of permission and obligation

bull Meta-logical investigations in argumentation theoryA new point of view on argumentation was developed and connectedto other areas

Publications 21 publications in 2012 among them 14 journal publications

The Springer journal ANNALS OF MATHEMATICS IN ARTIFICIAL IN-TELLIGENCE (AMAI) devoted a special volume (4 issues) in 2012 to pub-lish these results

AMAI Volume 66 Numbers 1-4 December 2012

The journal ARGUMENT AND COMPUTATION also published a specialdouble issue

Argument and Computation Volume 3 issues 2-3 2012

Logics Integrated for Normative Multi-Agent SystemsAcronym LINMASReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding ULBudget NABudget UL NADuration 2011-03-01 ndash 2013-02-28

Members Xavier Parent Dov Gabbay Xin Sun Paolo Turrini

Domain(s) Normative multi-agent systems Deontic logic Knowledge rep-resentation Intelligent Systems

Partner(s) NA

Description The project aims at providing an advanced model for reason-ing about norms with both a formal semantics and a proof theory Two keycomponents that will be brought together are conflict resolution and normenforcement which are for instance relevant for the design of e-institutions

41 Research projects 81

The goal is to establish rigorous theoretical foundations for the design ofNormative Multi-Agent systems that is both amenable to computer scien-tists and understandable by stakeholders

A PhD student Xin Sun has been hired in July 2012 The topic is deonticlogic from a game-theoretic perspective The idea is to look in a new way atfamiliar problems in normative reasoning which promises a novel approachfor handling norms in intelligent systems The fields of deontic logic andgame theory have developed independently from each other with few in-teractions between the two The PhD thesis will aim at lling this gap byinvestigating how techniques developed in game theory may shed light onlong-standing issues in the study of normative reasoning like norm emer-gence and (vice-versa) how the use of norms may shed light on problemsthat have beset game theory

Results ur results are related to the notion of rsquonorm enforcementrsquo

[4] we look at the theoretical foundations of one of the existing standards fornormative reasoning so-called dyadic deontic logic We discuss the prob-lem of the import or non-import of the identity principle for conditionalobligation

Based on this insight in [292] we develop a new model for reasoning aboutnorm violation In a multi-agent setting norm enforcement is facilitatedthrough the use of sanctions Thus so-called contrary-to-duty (CTD) obliga-tions (they say what should be done if some other obligation is violated) area key component of the system The problem of how to model such a com-ponent is one of the main problems of deontic logic There is a widespreadagreement in the literature that such a problem calls for the need to distin-guish between different senses of rsquooughtrsquo ideal vs actual rsquooughtrsquo Our keyidea is to capture the distinction using tools from two-dimentional modallogic

[2] goes one step further and brings the notion of contrary-to-duty to therealm of game theory so far not investigated in relation to optimality ofstrategic decisions We show that under a game-theoretical semanticsCTDs are well-suited to treat sub-ideal decisionsWe also argue that ina wide class of interactions CTDs can used as a compact representation ofcoalitional choices leading to the achievement of optimal outcomes Finallywe investigate the properties of the proposed operators

Publications NA

82 Projects and Grants in 2012

Advanced Argumentation Techniques for Trust ManagementAcronym AASTMReference F1R-CSC-PUL-08AASTMPI Prof Dr Leon van der TorreFunding ULBudget NABudget UL NADuration 2008-05-01 ndash 2012-04-30

Members Leon van der Torre Martin Caminada Yining Wu

Domain(s) Computational argumentation Trust

Partner(s) NA

Description The overall aim of AASTM is to enhance todayrsquos genera-tion of argumentation formalisms and implementations in order to becomesuitable for a wider variety of real-life applications such as reasoning abouttrust This requires a unified theory that integrates the various forms of ar-gumentation related functionality as well as efficient proof procedures andsound and scalable software components

Results

bull A dialectical discussion game for stable semantics

bull A more refined notion of the overall status of arguments based on thenotion of a complete labelling and give the procedure to determine anddefend the justification status This refinement has put the notion ofargument labelings into good use and raises interesting new questionsabout the psychological plausibility of such labelings

bull The equivalence between complete semantics in argumentation and3-valued stable model semantics in logic programming opens up thepossibility of reusing algorithms and results from logic programmingin argumentation theory

bull We define the postulates of closure direct consistency indirect con-sistency non-interference and crash resistance in the specific case ofthe ASPIC Lite formalism Then we identity a set of conditions underwhich the ASPIC Lite system satisfies all the mentioned rationalitypostulates under complete semantics

Publications Yning Wu Between Argument and Conclusion PhD thesisUniversity of Luxembourg 2012

41 Research projects 83

A discrete approach to model processing of hard metal includinghigh performance computingAcronym DPMHPCReference NAPI Prof Dr Bernhard PetersFunding ULBudget NABudget UL NADuration NA

Members Pascal Bouvry (2nd PI) Xavier Besseron

Domain(s) Process Engineering Parallelisation

Partner(s) NA

Description Conversion of pulverised tungsten oxide to metallic tungstenin a packed bed for production of hard metal is investigated by numericalmodelling The manufacturing process is a very important tool for ma-chining various materials The chemical process is described by a reactionscheme that reduces tungsten oxide stepwise to tungsten in a hydrogen at-mosphere Hydrogen is introduced as a reducing agent that streams overa packed bed of tungsten oxide particles in an oven The flow over andpenetration of hydrogen into the bed of tungsten particles is represented byadvanced two-phase CFD-tools for a porous media Evolution of particletemperature and its reaction progress is described by the Discrete ParticleMethod (DPM) Thus very detailed results are obtained by this approachand will be compared to experimental data Therefore this effort will com-plement experimental investigations and provide a deeper insight into theprocess in particular since particle temperatures and interaction of par-ticles with the fluid are inaccessible in a packed bed during experimentsAs these predictions of the particulate phase of tungsten oxide require sig-nificant amounts of CPU-time parallelisation of the conversion module ofthe Discrete Particle Method is approached by an interdisciplinary conceptas collaboration between engineering and computer science disciplines Theworkload for each processor is determined by the Orthogonal Recursive Bi-section (ORB) algorithm that distributes the particles uniformly onto theprocessors available The well-established Message Passing Interface (MPI)is employed to describe thermal conversion of an arbitrary number of tung-sten oxide particles It has additionally the advantage that MPI is supportedby Windows and Linux operating systems which apply equally to the soft-ware package of the Discrete Particle Method Additionally the scalability

84 Projects and Grants in 2012

of the approach on massively parallel machines will be investigated and theapplication of GPUs will be promoted

Results On the CSC side the work on this project focuses on providing anew design of the DPM software in order to execute coupled simulation inparallel The new enhanced design relies on the following aspects

bull A simulation module interface is designed to reflect the two majorsteps of the simulation workflow interactions and the integration

bull A simulation driver that builds an unified timebase to schedule andexecute all the modules involved according to their own timesteps

bull A parallel simulation driver that implements domain decompositionapproach using the Message Passing Interface (MPI) in order to lever-age distributed execution platforms like High Performance Computing(HPC) clusters It relies on the concepts of domain cells and partitionand can use different partitioners (eg ORB or METIS)

The enhanced design has been validated and it has been verified that itsatisfies the constraints of the numerical methods used by the process engi-neering The implementation of the new design is in progress in the DPMsoftware

Publications NA

Evolutionary Computing and Performance GuaranteesAcronym EvoPerfReference F1R-CSC-PUL-11EVOPPI Prof Dr Pascal BouvryFunding ULBudget 370keBudget UL NADuration 2011-09-01 ndash 2013-12-31

Members Xavier Besseron Sebastien Varrette Gregoire Danoy Sune SNielsen Emilia Tantar Yves Le Traon Antonio del Sol Nikos Vlassis

Domain(s) Meta Heuristics Evolutionary Computation OptimisationPerformance evaluation Bioinformatics

Partner(s) NA

Description Evoperf aims at providing the bases for robust and perfor-mance guaranteed evolutionary computations Such methods have a large

41 Research projects 85

spectrum of applications By choosing a system biomedicine applicationEvoperf aims at performing interdisciplinary research Many of the realworld problems are intractable (NP-Hard) whereas different approaches ex-ist including problem relaxation or local approaches However most tech-niques rely on stochastics to explore different starting points (iterated gradi-ent) or diversify the search (meta-heuristics) More than 15 years ago proofof convergences of stochastic based approaches were provided eg in [332]for simulated annealing and [333] for genetic algorithms But most of the re-search on genetic type particle algorithms evolutionary computation andorMonte Carlo literature seems to be developed with no visible connectionsto the physical or the mathematical sides of this field We mention thatthe design and the mathematical analysis of genetic type and branchingparticle interpretations of Feynman-Kac semigroups and vice versa (cf forinstance [347]) has been started by Prof Del Moral and his collaboratorsand acknowledged important advances [334 335] These nice theoreticalresults are however under-exploited In the current project we intend to ex-tend the approach to cutting edge parallel and robust multi-objective parti-cle algorithms (differential evolution cellular genetic algorithms) both at atheoretical and implementation level Validation will be carried on cuttingedge system biomedicine issues providing new modelstools for genepro-tein interaction networks Where appropriate a set of solvers will be usedas part of a multi player game Based on non-cooperative game theory itwas proved that these games converge to Nash equilibrium We will alsoinclude a decision-theory based approach that will regulate when and howthe different players exchange information and share the global cost functionby decomposition as to make Nash equilibrium correspond to global optima

Results The EvoPerf Project kickoff has taken place in 2011

The following human resources have been hired in 2011 Dr Xavier Besseronas Postdoc and Sune S Nielsen as PhD student

Publications NA

Privacy by DefaultAcronym DEFAULT-PRIVReference F1R-CSC-PUL-12DEPRPI Prof Dr Sjouke MauwFunding ULBudget 192853eBudget UL 192853eDuration 2012-09-01 ndash 2014-08-31

86 Projects and Grants in 2012

Members Sjouke Mauw Hugo Jonker

Domain(s) privacy verification formal analysis social networks mobilenetworks

Partner(s) Goethe University Frankfurt Germany

Description With the online proliferation of user-generated content (egblogs Youtube) and social media (eg Twitter Facebook) a new phe-nomenon has occurred people nowadays have a digital online rdquoliferdquo Rela-tions to others photos attended events opinions on current events all ofthis and more may be found online

As in real life privacy of the individual concerned must be safeguardedHowever the experience of privacy in the real world does not translate di-rectly to privacy in the digital life Privacy-sensitive aspects of the digitallife can leak out as in the real world but unlike the real world they are notbound to their context An angry letter in a newspaper will be used the nextday to wrap the fish but an angry letter online can still be found for yearsto come Whereas printed photos are by default stored in one album thedefault for digital photos is copying - website to browser camera to harddisk hard disk to email etc

The goal of this project is to connect user experience of privacy in real lifewith privacy offered in digital life and so overcome the divorce betweenthem As such the project investigates the effects of this divorce in andexplores possible resolutions for several aspects of digital life

bull Protecting user-generated contents

bull Keeping digital life fragmented

bull Mobile privacy

The project does not aim to enforce privacy ndash as in real life an individualrsquosprivacy may be breached by others (eg gossip) Instead the goal is toensure rdquoprivacy by defaultrdquo it may be possible to violate privacy to do soan individual needs to take conscious steps

Results The project started in September 2012 and so far has led to acollaboration with Verimag laboratory (Grenoble France) on verifiability ofonline auctions which has been submitted to ASIA-CCSrsquo13

Publications NA

41 Research projects 87

A Formal Approach to Enforced Privacy in e-ServicesAcronym EPRIVReference PUL-09EPRIPI Prof Dr Sjouke MauwFunding ULBudget 254955eBudget UL 254955eDuration 2009-05-01 ndash 2012-04-30

Members Sjouke Mauw Jun Pang Hugo Jonker Naipeng Dong

Domain(s) enforced privacy verification formal modelling e-services

Partner(s) ENS Cachan Paris France

Description Privacy has been a fundamental property for distributed sys-tems which provide e-services to users In these systems users become moreand more concerned about their anonymity and how their personal infor-mation has been used For example in voting systems a voter wants tokeep her vote secret Recently strong privacy properties in voting suchas receipt-freeness and coercion-resistance were proposed and have receivedconsiderable attention These notions seek to prevent vote buying (where avoter chooses to renounce her vote) These strong notions of privacy whichwe will call enforced privacy actually capture the essential idea that pri-vacy must be enforced by a system upon its users instead of users desiringprivacy The first aim of this project is to extend enforced privacy fromvoting to other domains such as online auctions anonymous communica-tions healthcare and digital rights management where enforced privacy isa paramount requirement For example in healthcare a patientrsquos healthrecord is private information However a patient contracting a serious dis-ease is at risk of discrimination by parties aware of her illness The inabilityto unveil (specific parts of) the health record of a patient is a minimal re-quirement for her privacy The second aim of the project is to develop adomain-independent formal framework in which enforced privacy proper-ties in different domains can be captured in a natural uniform and preciseway Typically enforced privacy properties will be formalized as equivalencerelations on traces which take into account both the knowledge of the in-truder and the users Within the framework algorithms can be designed tosupport analysis of e-service systems which claim to have enforced privacyproperties In the end the formalization and techniques will be applied toverify existing real-life systems and to help the design of new systems withenforced privacy properties

Results The project finished in 2012 In that year the project resultedin 3 conference papers [141] at ESORICSrsquo12 [144] at EVOTErsquo12 [141] at

88 Projects and Grants in 2012

FHIESrsquo11 and one book chapter [5] in Digital Enlightenment Yearbook 2012The projectrsquos EVOTErsquo12 paper Random Block Verification Improving theNorwegian Electoral Mix Net [144] won the best paper award of the confer-ence In the context of the project the Second International Summer Schoolon Secure Voting was organized in Schloszlig Dagstuhl Germany

Publications The following publications resulted from the project in2012 [141] [144] [141] [5]

Better e-Learning Assignments System TechnologyAcronym BLASTReference F1R-CSC-PUL-10BLASPI Prof Dr Denis ZampunierisFunding ULBudget 165000eBudget UL NADuration 2010-09-01 ndash 2012-08-31

Members Sandro Reis Denis Shirnin Denis Zampunieris

Domain(s) Proactive computing E-learning Online assignments manage-ment system

Partner(s) NA

Description The project aims at the design and implementation of aproactive online assignments system for blended teachings at the Univer-sity of Luxembourg which will actively support students as well as teachersin a collaborative way The main output product of this research and devel-opment project will be an online assignments system with advanced featureswhile remaining easily usable by every user beginner or expert that is usefulfor our teachings and which will be based on software currently in use at theUL The design will rely on the innovative concept of proactive computingapplied to the e-learning technologies field Indeed instead of waiting foruser interaction like in existing reactive learning management systems ourproactive assignments system (embedded into a standard e-learning plat-form) will allow us to define analysis and management rules that will beapplied autonomously by the system to support and drive the workflowwhen a teacher online assigned tasks to students The possible rules willrange from simple reminders and notifications to both parties to the mostelaborated automatic detection of potential problems based on successivedetection of (non-) events over a period of time

Results NA

41 Research projects 89

Publications NA

Model Composition for Executable ModelingAcronym COMPEXReference F1R-CSC-PUL-10MCEMPI Prof Dr Pierre KelsenFunding ULBudget 173KeBudget UL NADuration 2011-10-01 ndash 2013-09-30

Members Pierre Kelsen Nuno Amalio

Domain(s) Model-Driven Software Development Model Composition Ex-ecutable Modeling Software Engineering

Partner(s) NA

Description In model-driven software development models are the pri-mary artifacts for constructing software Model composition helps in master-ing the complexity of model-driven development Most of the current modelcomposition techniques can be viewed naturally as model transformationstaking two input models and producing one output model In our workwe have introduced a new composition technique for building executablemodels It has several properties that traditional composition techniques donot have it is additive rather than transformational it can be applied toany meta-model and it has a formal semantics The present project willinvestigate the power of our composition technique In particular we willcompare our technique with approaches from aspect-oriented modeling thatare typically used to express crosscutting concerns The project will inves-tigate whether our approach can be extended to match the power of thesetechniques andor how it can complement the existing approaches in mod-eling systems in a more straightforward elegant and light-weight mannerThe main goal is to enhance our current modeling framework and tool forexecutable modeling with new model composition techniques so that theycan handle not only the academic examples studied so far but can be usedeffectively on larger systems

Results The following results have been achieved on this project

bull A paper comparing different aspect-oriented modelling approaches in-cluding VCL [368]

bull A paper [369] a master thesis (of Eric Tobias 2012) and a techni-

90 Projects and Grants in 2012

cal report [370] with a comparative study that compares VCL againstother Visual Modelling Languages (VMLs) Part of the criteria forthis comparison is precisely VCL mechanisms of composition and de-composition

bull VCL has been applied to a case study from the modelling and aspect-oriented communities A technical reporting presenting a VCL modelof this case study [371] was presented at a workshop on comparingModelling Approaches of conference Models 2012

bull VCL has been applied to an industrial case study coming from theresearch community of formal methods This resulted in a paper [367]a technical report [372] and a masters thesis (Jerome Leemans 2011)

bull VCL and its composition mechanisms have been applied to a largecase study coming from the research efforts of CRP Henri Tudor onuser interfaces This work is part of Eric Tobias Master Thesis (2012)We intend to work towards a publication regarding this piece of workin close collaboration with the CRP in 2013

Publications NA

Dynamic and Composite Service-Oriented Architecture Secu-rity TestingAcronym DYNOSOARReference NAPI Prof Dr Yves Le TraonFunding ULBudget NABudget UL NADuration NA

Members Tejeddine Mouelhi Jacques Klein

Domain(s) Model-driven engineering Security testing SOA

Partner(s) NA

Description In Dynosoar project we aim at proposing reconfigurationcapabilities to Service-Oriented Architecture (SOA) targeting user-definedsecurity policies which can be trusted through innovative security testingmethods and tools SOA aims at decreasing the level of coupling betweenservices and at increasing the reuse evolution and adaptation of the sys-tem A SOA consists of an orchestration that models the services and the

41 Research projects 91

control flow of events between services A service integrator composes thesedifferent services (maybe dynamically discovered on the web) to propose anew composite service From this perspective SOA offers a very excitingsolution for building composite distributed systems Services are dynamicand highly reconfigurable a service integrator can compose different ser-vices in many different ways each service proposing different variants Itrapidly leads to the combinatorial explosion of possible composite servicesAmong reconfiguration criteria one aspect is becoming crucial for trustinga configured orchestration its capacity to embed a reconfigurable securitypolicy In Dynosoar we consider security policies dedicated to SOA whichallow each user expressing how her data can be manipulated into an or-chestration The problem is thus (1) to select valid orchestrations amongthe huge number of possible reconfigurations and (2) to test the robustnessof security mechanisms of the selected orchestrations Dynosoar addressestwo crucial dimensions the generation of valid orchestrations embedding asecurity policy from the set of possible reconfigurations and the final secu-rity testing of orchestrations The hard points we focus on are 1) choosingamong a possibly infinite number of services (re)configurations the smallestand more relevant subset which have to be tested This subset of serviceconfigurations must satisfy the security policy as well as sequential executionconstraints 2) testing one specific configuration in isolation ie withoutreal external service providers We specifically target the security policieswith testing

Results NA

Publications NA

414 UL PhD PostDoc

Seamless Communication for Crisis ManagementAcronym SECRICOMReference NAPI Prof Dr Thomas EngelFunding FullbrightBudget NABudget UL NADuration 2008-09-01 ndash 2012-04-30

Members Thomas Engel Sheila Becker

92 Projects and Grants in 2012

Domain(s) Security

Partner(s)

bull QinetiQ Ltd

bull Ardaco as

bull Bumar Ltd

bull NEXTEL SA

bull Infineon Technologies AG

bull Institute of Informatics Slovak Academy of Sciences

bull Graz University of Technology

bull Smartrends sro

bull ITTI Sp z oo

bull British Association of Public Safety Communication Officers

bull CEA LETI

bull Hitachi Europe SAS

Description Peer-to-peer real-time communication and media streamingapplications optimize their performance by using application-level topologyestimation services such as virtual coordinate systems Virtual coordinatesystems allow nodes in a peer-to-peer network to accurately predict latencybetween arbitrary nodes without the need of performing extensive measure-ments However systems that leverage virtual coordinates as supportingbuilding blocks are prone to attacks conducted by compromised nodes thataim at disrupting eavesdropping or mangling with the underlying commu-nications

Recent research proposed techniques to mitigate basic attacks ( inflationdeflation oscillation) considering a single attack strategy model where at-tackers perform only one type of attack In this work we define and usea game theory framework in order to identify the best attack and defensestrategies assuming that the attacker is aware of the defense mechanismsOur approach leverages concepts derived from the Nash equilibrium to modelmore powerful adversaries We apply the game theory framework to demon-strate the impact and efficiency of these attack and defense strategies usinga well-known virtual coordinate system and real-life Internet data sets

41 Research projects 93

Thereafter we explore supervised machine learning techniques to mitigatemore subtle yet highly effective attacks ( frog-boiling network-partition)that are able to bypass existing defenses We evaluate our techniques onthe Vivaldi system against a more complex attack strategy model whereattackers perform sequences of all known attacks against virtual coordinatesystems using both simulations and Internet deployments

Results The exploitation of existing publicly available communication net-work infrastructure with interface towards emerging SDR systems Interop-erability between heterogeneous secure communication systems A paralleldistributed mobile agent-based transaction system for effective procurementInfrastructure based on custom chip-level security

Publications NA

The Snippet System - A Fine-Granular Semantic-Aware DataStoreAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding ULBudget NABudget UL NADuration 2010-11-01 ndash 2013-10-31

Members Laurent Kirsch (PhD candidate) Steffen Rothkugel (supervi-sor)

Domain(s) compound documents file systems semantic desktop

Partner(s) NA

Description The Snippet System represents a novel data storage approachtackling several problems and shortcomings inherent to traditional file sys-tem based document management One of the main targets of the SnippetSystem is to improve human computer interaction by introducing new datamanagement facilities which enable a more intuitive way of working withdata and information By developing these file system level data manage-ment concepts with the usability of the system in mind it is possible toconsider usability aspects already in the design of the data storage architec-ture This in turn allows the realization of concepts like so-called Relationsand vFolders which contribute to a better user interface and interactionscheme

94 Projects and Grants in 2012

Results NA

Publications 1 conference publication [350]

Analysis of low-latency anonymisation networksAcronym NAReference I2R-NET-COM-110000PI Prof Dr Thomas EngelFunding funded on Fp7 EFIPSANS until 31122010 - Net-

LabBudget 37KyearBudget UL NADuration 2008-11-15 ndash 2012-11-14

Members Thomas Engel Thorsten Ries

Domain(s) Anonymity privacy low-latency anonymisation networks anonymi-sation network performance

Partner(s) NA

Description For various reasons low-latency anonymisation systems likeTor I2P JonDonym or proxy based solutions are widely used nowadaysoffering a certain performance and protection against adversaries Howeverit is very difficult for users to evaluate these systems especially when itcomes to the degree of anonymity Therefore the goal of this work is toprovide measures for users in order to evaluate the systems in regard toanonymity and performance

Basis of the work are performance evaluations of typical anonymisation sys-tems in regard to throughput round trip time and packet variation In orderto describe the degree of anonymity an attack using virtual network coordi-nate systems will be defined that allows an instant degradation of anonymityby positioning users geographically which aim to stay anonymous Classifi-cation algorithms like Support Vector Machines and Instance Based learningalgorithms will be used to allow the calculation of the degree of anonymityFinally a comparison to existing approaches will be provided

A second emphasis is on anonymisation performance particularly on Torthe most prevalent anonymisaton system nowadays Existing performancemetrics will be reviewed and evaluated aiming to improve the overall per-formance in terms of throughput and round trip time by an optimised relaynode selection for instance

Results The major outcome of this project is expected to be a quantifi-

41 Research projects 95

cation of anonymity in anonymisation networks by making use of virtualnetwork coordinate systems in order to identify node locations and by thisto provide an anonymity measure for users Another result will be perfor-mance improvements of the Tor anonymisation network

Publications [273 274 280]

Sociality and Self-Organization in Next-Generation DistributedEnvironmentsAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding AFRBudget NABudget UL NADuration 2009-02-01 ndash 2012-01-31

Members Jean Botev (Post Doc) Steffen Rothkugel (supervisor)

Domain(s) large-scale distributed environments sociality self-organization

Partner(s)

bull National University of Singapore

bull George Mason University USA

bull Universitat Trier

Description The proliferation of computationally powerful interconnecteddevices entails a new generation of networked applications and social utilitiescharacterized by a strong growth in scale and dynamics Distributed virtualenvironments constitute a privileged example involving a high degree of in-teractivity as well as tightened constraints and requirements As a responseto these issues this dissertation explores and substantiates sociality as a fun-damental principle both in and for the design of such systems A specializeddual peer-to-peer architecture is introduced combining a highly-structuredbackbone overlay with a loosely-structured geometric client overlay synergis-tically complementing each other To enable a global-scale single-instancedenvironment it is imperative to include as many client-side resources as pos-sible and unburden the backbone The focus of this dissertation thereforelies upon the latter geometric overlay By taking an interdisciplinary per-spective and leveraging different aspects of sociality a series of self-organizedapproaches addressing major problem areas are proposed a collaborative

96 Projects and Grants in 2012

filtering mechanism for the handling of information overload created fromthe soaring amounts of users and objects a confidentiality framework for theprotection of sensitive data more likely exposed due to an increased inter-activity and two resource allocation schemes for fairly distributing surpluscapacities in the face of critical regional surges Detailed evaluations showthat these decentralized algorithms operate robustly and effectively whileyielding well-converging results in comparison to optimal global-knowledgescenarios

Results NA

Publications 3 peer-reviewed conferences [297] [308][296]and one PhDthesis [352]

Honeypot and Malware AnalysisAcronym Honeypot and Malware AnalysisReference I2R-DIR-PIC-09SECPI Prof Dr Thomas EngelFunding AFR-PPPBudget 37KyearBudget UL NADuration 2011-10-15 ndash 2014-10-14

Members T Engel S Marchal

Domain(s) Is- Information and Communication Technologies Honeypotmalware analysis malware detection passive DNS network traffic analysis

Partner(s) CETREL

Description This research proposal presents the development of a newkind of honeypot Honeypots are widely used for more than ten years nowfor several purposes such as threat detection mitigation of the impact of net-work attacks malware analysis automatic generation of wormsrsquo signatureetc However honeypots are often designed to particular network applica-tions or services to offer a tailor-made threat detection and deflection Inthis proposal I exhibit potential new wider applications of honeypots lever-aging passive DNS analysis DNS probing and fast network traffic analysisin order to protect a specific network from its specific threats I highlightseveral areas for active research and provide an overview on existing ap-proaches This project is part of a public private partnership between SnTand CETREL SA and will be realized in the framework of a PhD coveringa 3 year period

41 Research projects 97

Results NA

Publications 2 peer-reviewed conferences [363 362]

Routing and mobility management in vehicular networksAcronym NAReference I2R-NET-PFN-10MOVEPI Prof Dr Thomas EngelFunding FNR - CORE MOVEBudget 37KyearBudget UL NADuration 2011-09-01 ndash 2014-08-31

Members T Engel M Mouton

Domain(s) NA

Partner(s) NA

Description research in the area of Vehicular Ad Hoc Networks (VANETs)A VANET is an emerging network technology which enables data com-munication between vehicles and the Internet The network protocols andhardware have been specifically designed for efficient data exchange in vehic-ular environments The high mobility and intermittent network connectivityraise major challenges for both security and network management tasks

The main contribution of the thesis of Maximilien Mouton consists in -The setup and maintenance up a simulationemulation platform that canbe used for large scale protocol validation and analysis (joint research withUCLA) - Integration of realistic mobility and signal propagation models -Identifying and proposing new application specific routing mechanisms formobile vehicular networks - Investigation of application specific dissemina-tion techniques (eg traffic

Results NA

Publications NA

98 Projects and Grants in 2012

Securing Mission Operations using Multi-Level SecurityAcronym SMO-MLSReference I2R-NET-PAU-11ELSKPI Prof Dr Thomas EngelFunding European Space AgencyBudget 48800e

UL - 37077 eBudget UL NADuration 2010-11-01 ndash 2014-10-30

Members Thomas Engel ESkoutaris

Domain(s) Spacecraft mission control systems MLS security

Partner(s) ESAESOC Germany

Description SMO-MLS is an ongoing research project that aims to pro-viding an enhanced security support at the spacecraft control infrastructureof ESAESOC by establishing multi-level security (MLS) solutions on itsMission Control System (MCS) Within this research activity MLS solu-tions will ensure an enforced separation of command and control data flowsof different sensitivity and classification levels between missions and also be-tween individual payload data flows of the same mission SCOS-2000 (S2K)is the ESA generic software infrastructure implementing the common fea-tures required by a spacecraft MCS Therefore a SCOS-2000 MLS prototypeis to be developed and built upon an operating system that supports multi-level security (ie Security-Enhanced Linux) The primary three objectivesof this project and that represent the direct security needs of future spacemissions are

(A) Enforcement of integrity policies between telecommand chain data flows(B) Enforcement of integrity policies between telemetry chain data flows (C)Confidentiality of third party telecommand chain data flows

This research project will advance the research on the area of MLS systemsand will provide an MLS model tailored for spacecraft command and controlsystems

Results As a result of this project a prototype MLS system based oncurrent ESA mission control system infrastructure will be developed andimplemented This may include the development of specific protocols andprocedures Such protocols may be subject to standardization

Publications NA

41 Research projects 99

Mobility Optimization using Vehicular network technologies(MOVE)Acronym MOVEReference I2R-NET-PFN-10MOVEPI Prof Dr Thomas EngelFunding CORE- MOVEBudget 37KYearBudget UL NADuration 2011-11-15 ndash 2014-11-14

Members T Engel M Forster R Frank J Francois A Panchenko MMouton L Dolberg

Domain(s) ICT

Partner(s) UCLA (non contracting)

Description The student will be working on the FNR MOVE projectThe goal of this project is to optimize vehicular traffic flows using ubiqui-tous network technologies (eg VANET 3G) The student will focus ondeveloping new traffic flow deviation paradigms that can be employed toreduce vehicular traffic congestion for urban and highway scenarios

Vehicular Ad Hoc Networks (VANETs) are mobile networks specificallysuited for vehicular environments Moreover the student will focus on spe-cific optimisation problems related to vehicular traffic flows Using VANETswill allow specifying decentralised and distributed coordinated algorithms toprovide the drivers with smart navigation services

The main contributions of the thesis of Markus Forster consist in - Iden-tifying the specificity of the vehicular traffic for the area of Luxembourg -Understanding the limitations and bottlenecks of the current Luxembour-gish road network - Modelling of the traffic in order to realistically reproducethe flow behaviour in a simulations environment - Testing existing and novelflow optimisation techniques that will allow to improve

Results NA

Publications NA

100 Projects and Grants in 2012

Service Dependency and Anomaly DetectionAcronym NAReference I2R-NET-COM-110000PI Prof Dr Thomas EngelFunding Funded on FP7 EFIPSANS project until 31122010

- NetLabBudget NABudget UL NADuration 2008-11-01 ndash 2012-10-31

Members T Engel C Wagner

Domain(s) NA

Partner(s) NA

Description NA

Results NA

Publications The following articles have been published in 2011 1 jour-nal [271] and 3 peer-reviewed conferences [306] [278] [279]

Individual and Collective ReasoningAcronym ICRReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding UL-PHDBudget NABudget UL NADuration 2008-03-12 ndash 2012-03-12

Members Gabriella Pigozzi Marija Slavkovik Leon van der Torre

Domain(s) Judgment aggregation Group-decision making Social choicetheory Normative systems

Partner(s) NA

Description Traditional decision-making is driven by the concept of a ra-tional agent who acts in his own best interest by maximizing the expectedutility Opposite to the rational agent modeled as Homo Economicus peopledo not make decisions by generating alternative options and by comparingthem on the same set of evaluation dimensions nor do they generate prob-ability and utility estimates for different courses of action They search for

41 Research projects 101

what Herbert A Simon called satisficing or ldquogood enoughrdquo decisions Wedefine a satisficing decision as one that is determined by making a yesnoestimate for each element of a given set of decision-relevant criteria Theaim of this project is to investigate how groups of artificial agents can reachsatisficing decisions The contribution of the thesis is threefold For the areaof multi-agent systems we propose a new way in which group decisions canbe reached As a show-case we apply our decision-reaching method to theroblem of determining group intentions For the field of judgment aggrega-tion our contribution is a new set of judgment aggregation operators Forthe field of belief merging our contribution is the identification of a newproblem of iterated belief merging

Results

bull In order to avoid an untenable collective outcome individuals mayprefer to declare a less preferred judgment set Thus the prospect ofan individual trying to manipulate the social outcome by submittingan insincere judgment set is turned from being an undesirable to aldquovirtuous (or white) manipulation In [349] we defined and studiedwhite manipulation as a coordinated action of the whole group

bull In [348] we presented an aggregation procedure providing completejudgment sets ie judgment sets with premises and conclusion Weshowed that our procedure satisfies the desirable properties of non-manipulability and it can be modified to preserve unanimity on thepremises

bull In order to show the practical applicability of group decision-reachingthrough judgment aggregation we studied the problem of determin-ing group intentions based on declared beliefs or acceptances of thememebers In [328] we present a formal model for deciding on collec-tive intentions and study the related group commitment and intentionrevision problems

Publications Marija Slavkovik

102 Projects and Grants in 2012

Understanding Financial Topics and their Lifetime in TextualNews by the Content Aging TheoryAcronym NAReference F2R-LSF-PFN-11ESCAPI Prof Dr Christoph SchommerFunding FNR COREBudget 500000Budget UL NADuration 2012-06-01 ndash 2015-05-31

Members Christoph Schommer Roxana Bersan Dimitrios Kampas An-dreas Chouliaras Theoharry Grammatikos Yannis Ioannidis

Domain(s) Computational Finance Topic Extraction Content AgingTheory Machine Learning Text Mining

Partner(s)

bull Dept of Finance (Luxembourg School of Finance)

bull Dept of Computer Science

bull University of Athens Dept of Computer Science

Description The project is part of the FNR CORE project ESCAPEESCAPE applies Data Mining and Machine Learning methods on publiclyavailable news sources to document in a measurable way the structure andevolution of Europersquos financial policy to address the on-going threat to theEuro-zone stability How do the important euro policy players present them-selves in the pallet of the policies map Are there subgroups with similarpositions How coherent are these groups among themselves Are theredominant players in each group How different are the different group posi-tions One expects that the euro players eventually will reach a consensuspolicy to stem the risk threatening the EURO Documenting in a measur-able way how the different policy positions converge over time should provideadditional insights into the complex process of (financial) policy evolutionFinancial policy ultimately affects capital markets but as the recent cri-sis has highlighted capital markets may force or extract policy concessionsUnderstanding the interplay of financial policy formulation and capital mar-ket ex-pectations therefore is extremely important for the effectiveness ofpolicy responses and eventually for the stability of the financial system ES-CAPE provides statistical evidence on whether capital markets lead or reactconcurrently to the financial policy evolution It is expected to shed lighton the powerful role of the ldquoinvisible handrdquo of capital markets in extractingdesired policies from politicians

41 Research projects 103

The research project concerns the identification of financial topics in Thom-son Reuters News data The extraction of this kind of information will beperformed based on machine learning and content aging theory methodsWe are currently working on the mathematical formalization of this systemThe extraction of this kind of information will be used by financial expertsto better understand the Sovereign Debt Crisis in Europe

Results

bull We were concerned with masses of financial news data from Thom-son Reuters (gt 2TB) the understanding of the data structure themanagement of the data and its preprocessing

bull We have elaborated on and worked out Topic ExtractionFinding indetail

bull Extensive Literature Review Topic Extraction and Content AgingTheory

bull Paper writing which has led to a conference paper to be presented atICAART 2013 in Barcelona

Publications to appear in 2013 at ICAART 2013

Smart Predictive Algorithms for Spacecraft AnomaliesAcronym SPACEReference I2R-DIR-BPI-11SCHOPI NAFunding SnTBudget NABudget UL NADuration 2011-07-09 ndash 2017-07-08

Members F Bouleau Prof Schommer Prof Bouvry Dr Krier

Domain(s) Keywords Fourier fit least square Kalmanrsquos filter data min-ing artificial intelligence pattern matching data stream decision helpingclassification correlation

Partner(s)

bull University of Luxembourg Dept of Computer Science and Commu-nication

bull SES Astra

104 Projects and Grants in 2012

Description Geostationary satellites are monitored from Earth to captureand react on anomalies A stream of sampled sensor information (telemetry)is downloaded by a ground control system which is processing and storing theinformation in dedicated databases which grow very large over the satellitelifetime (up to 20 years) The satellite engineers crew who is analyzing thisdata nevertheless take less than 10

Results My interest is on one hand to use the mathematical modellingcreated by the satellite engineers to optimize browsing into the telemetrydatabase and help in the pattern matching and classification that will belinked to the existing reports database On the other hand an artificialintelligence algorithm will use the classified patterns in order to correlate thereports with other events and provide analysis and decision helping elements

Publications in progress

An Incremental System to manage Conversational StreamsAcronym INACSReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding ULBudget NABudget UL F1R-CSC-LAB-05ILIADuration 2009-02-01 ndash 2013-01-14

Members Jayanta Poray Christoph Schommer Raymond Bisdorff ThomasEngel

Domain(s) Adaptive Systems Graph Theory and Modelling Chat Con-versation Computational Reputation

Partner(s)

bull Dept of Computer Science ILIAS Lab

Description The research project is inspired by the information process-ing mechanism of the human brain where every input signal is realisedprocessed and stored in a highly sophisticated manner The goal has beento develop a robust information processing system for text streams in theform of explorative and adaptive mind-graphs to use this structured infor-mation to fulfil textual conversational challenges between artificial agents

Results The thesis has been successfully submitted and defended(December 13 2012)

41 Research projects 105

Publications

1 J Poray and C Schommer Operations on Conversational Mind-Graphs In Proceedings of the 4th International Conference on Agentsand Artificial Intelligence pp 511-514 Vilamoura Algarve Portugal

Feature Extraction and Representation for Economic SurveysAcronym FERESReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding Internal Doctoral PositionBudget Internal Doctoral PositionBudget UL NADuration 2011-04-01 ndash 2014-03-31

Members Mihail Minev Christoph Schommer Theoharry GrammatikosUlrich Schaefer Philippe Karas

Domain(s) News Analytics Feature Extraction Course Volatilities EventClassification Trend Prediction

Partner(s)

bull Dept of Computer Science ILIAS Lab

bull Luxembourg School of Finance University Luxembourg

bull German Research Center for Artificial Intelligence (DFKI) GmbH

bull Thomson Reuters Finance SA

Description The study concerns the manifold news articles which re-flect the adjustments in the monetary policy during the financial crisis Inparticular we consider official decisions conducted by the Federal ReserveSystem but also information leaks in the press One goal of this work isto retrieve and quantify such information using modern pre-processing andtext mining techniques Further the implications of news on the stock mar-kets are examined by discovering and modelling composite index volatilitiesas functions of key announcements A model for the prediction of pricetrends is targeted which should reveal the economic value of informationHere an important aspect is the definition extraction and management oftopic-related features Keywords data projection feature selection newsclassification monetary policy stock markets

106 Projects and Grants in 2012

Results

bull Discovery of a strong evidence for a measurable link between eventsrelated to monetary policy and stock market volatilities

bull Proposal for a comparison framework of computer science projectswhich aim news classification and trend forecasting

bull Identification of information sources and sophisticated data character-istics

bull Design of a procedure model containing the data workflow and themilestones for the learning and the operational phase

bull Project presentation at the ldquoTrusted ICT for Financerdquo organized bythe Digital Enlightenment Forum Luxembourg

Publications

bull M Minev C Schommer T Grammatikos News and stock marketsA survey on abnormal returns and prediction models Technical Re-port August 2012

bull C Schommer and M Minev Data Mining in Finance PresentationTrusted ICT for Finance Luxembourg April 2012

Sentiment Classification in Financial TextsAcronym NAReference F2R-LSF-PFN-11ESCAPI Prof Dr Christoph SchommerFunding FNR COREBudget 500000Budget UL NADuration 2012-06-01 ndash 2015-05-31

Members Christoph Schommer Roxana Bersan Dimitrios Kampas An-dreas Chouliaras Theoharry Grammatikos Yannis Ioannidis

Domain(s) Computational Finance Sentiment Analysis Machine Learn-ing Text Mining Natural Language Processing

Partner(s)

bull Dept of Finance (Luxembourg School of Finance)

41 Research projects 107

bull Dept of Computer Science

bull University of Athens Dept of Computer Science

Description The work is part of the FNR CORE project ESCAPE ES-CAPE applies Data Mining and Machine Learning methods on publiclyavailable news sources to document in a measurable way the structure andevolution of Europersquos financial policy to address the on-going threat to theEuro-zone stability How do the important euro policy players present them-selves in the pallet of the policies map Are there subgroups with similarpositions How coherent are these groups among themselves Are theredominant players in each group How different are the different group posi-tions One expects that the euro players eventually will reach a consensuspolicy to stem the risk threatening the EURO Documenting in a measur-able way how the different policy positions converge over time should provideadditional insights into the complex process of (financial) policy evolutionFinancial policy ultimately affects capital markets but as the recent cri-sis has highlighted capital markets may force or extract policy concessionsUnderstanding the interplay of financial policy formulation and capital mar-ket ex-pectations therefore is extremely important for the effectiveness ofpolicy responses and eventually for the stability of the financial system ES-CAPE provides statistical evidence on whether capital markets lead or reactconcurrently to the financial policy evolution It is expected to shed lighton the powerful role of the ldquoinvisible handrdquo of capital markets in extractingdesired policies from politicians

The research topic that Mrs Bersan is addressing is sentiment analysisnamely identifying subjective information in the financial news We analyzea specific topic and assign this subjective information to a mathematicalindex in order to reflex its polarity orientation The techniques used are fromthe research fields of machine learning text analytics and natural languageprocessing

Results

bull We were concerned with masses of financial news data from Thom-son Reuters (gt 2TB) the understanding of the data structure themanagement of the data and its preprocessing

bull We have elaborated on and worked out Sentiment Classification indetail

bull Extensive Literature Review Sentiment Analysis (vs Opinion Min-ing Polarity Classification)

bull Paper writing which has led to a conference paper to be presented atICAART 2013 in Barcelona

108 Projects and Grants in 2012

Publications A first scientific paper will be published at ICAART 2013in Barcelona

Artificial Conversational CompanionsAcronym SPARCReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding NABudget NABudget UL NADuration 2011-04-01 ndash 2014-03-31

Members Sviatlana Danilava Christoph Schommer Gudrun Ziegler StephanBusemann

Domain(s) Artificial Companions Conversational Agents Models of In-teraction Interaction Profiles Long-Term interaction between human users

Partner(s)

bull University Luxembourg Dept of Computer Science and Communica-tion

bull University Luxembourg Dica Lab

bull German Research Centre for Artificial Intelligence Saarbruecken

Description The goal of the project is design and implementation of anArtificial Conversational Companion (ACC) which helps foreign languagelearners to improve their conversation skills In order to model a long-terminteraction with an ACC via instant messaging dialogue for conversationtraining it is necessary to understand how natural long-term IM interactionbetween human language experts (usually native speakers) and languagelearners works Data from chat dialogues between advanced learners of alanguage L as a second language(L2) and native speakers of L who rdquojust chatrdquofor a longer period of time were collected A data-driven model of long-term interaction is in focus in particular modelling of usersrsquo interactionprofiles including usersrsquo responsiveness behaviour and learnersrsquo languageWe use methods of conversation analysis (qualitative research) to developcomputational models of long-term human-machine interaction

Results

1 Data collection We initiated long IM dialogues (ca 30-90 minutes)

41 Research projects 109

between advanced learners of German as L2 and German native speak-ers for a prolonged period of time (4-8 weeks) The participants pro-duced in total 72 dialogues which correspond to ca 2500 minutes ofIM interaction ca 4800 messages with ca 52000 tokens in total andca 6100 unique tokens The average message length is 10 tokens

2 Data analysis We obtained the initial model of responsiveness profilesfor the learners We developed an initial annotation scheme for thelearners language We annotate the corpus according to the scheme

Other Activities

1 International Conference on Agents and Artificial Intelligence (Vilam-oura Portugal) presentation on ldquoArtificial Conversational Compan-ions - A Requirements Analysisrdquo

2 DICA-Lab PhD Day 2012 presentation on rdquoComputational Models ofInteraction Based on Empirical Data from Chat Dialoguesrdquo

3 Seminar with the participants of the data collection Vitebsk Belarus

4 Participation in intervention ldquoChercheurs a lrsquoecole 2012rsquorsquo

5 Participation in Foire de lrsquoEtudiant 2012 (Invited by Ministere delrsquoEgalite des Chances)

Publications

1 S Danilava Ch Schommer and G Ziegler (2012) Long-term Human-machine Interaction Organisation and Adaptability of Talk-in-interactionPoster presentation CHIST-ERA Conference Edinburgh Scotland

2 S Danilava S Busemann and Ch Schommer (2012) Artificial Con-versational Companions - A Requirements Analysis In Proceedings ofthe 4th International Conference on Agents and Artificial Intelligence282-289 Vilamoura Algarve Portugal

Energy-efficient resource allocation in autonomic cloud comput-ingAcronym ERACCReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2010-10-01 ndash 2013-09-30

110 Projects and Grants in 2012

Members Cesar Diaz

Domain(s) Computer Science Information Science Cloud ComputingGreen Computing Resource Allocation Optimization

Partner(s) NA

Description In the new era of Information Technologies (IT) and glob-alization massive computing power is desired to generate business insightsand competitive advantage for enterprises Traditionally enterprises processtheir data using the computing power provided by their own in-house datacentres However maintaining and operating a private data centre to keepup with the rapid growing data processing request can be costly and com-plicated Cloud Computing (CC) offers an alternative It is a concept thathas emerged out of the conception of heterogenous distributed computinggrid computing utility computing and autonomic computing It promisesto provided on-demand computing power with little maintenance quick im-plementation and low cost Nevertheless electrical power consumption hasbecome a major concern in CC systems

Results Models and algorithms are developed for the energy-efficient man-agement of processing elements that comprises a CC Based on the state ofthe art we have designed low complexity green scheduling heuristics thatexploit the heterogeneity of computing resources published in [295] Theseheuristics were designed to take into account scalability issues of the system[294]

In parallel research on opportunistic Desktop Grid Computing is conductedin conjunction with researchers from University of los Andes ColombiaSome techniques like DVFS ACPI DPM and virtualization are also consid-ered Moreover we are also investigating resource allocation and schedulingmodels [293]

Publications NA

Integrity Issues on the CloudAcronym IICReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2011-01-16 ndash 2013-01-15

41 Research projects 111

Members Jakub Muszynski

Domain(s) cloud computing distributed computing security integrityfault-tolerance

Partner(s) NA

Description A simple concept that has emerged out of the conceptionsof heterogeneous distributed computing is that of Cloud Computing (CC)where customers do not own or rent any part of the infrastructure Theysimply use the available services and pay for what they use This approachis often viewed as the next IT revolution similar to the birth of the Webor the e-commerce CC naturally extends grid computing Even if thislast domain attracted academic interest for several years it hardly caughtindustrial attention On the contrary CC arouse enthusiasm and interestfrom the same actors probably because it formalizes a concept that reducescomputing cost at a time where computing power is primordial to reachcompetitiveness Additionally the technology to interface such platforms isnow mature enough to make this concept a reality as initiated by some ofthe biggest vendors worldwide (Google Amazon etc)

To transform the current euphoria on CC into concrete investments andwide acceptance several security issues still need to be fixed In this con-text this PhD proposal focus on integrity and fault-tolerance aspects inthe CC paradigm in order to provide guarantees on programs and data ei-ther before during or after a run on the CC platform More generally theidea is to provide qualified and quantified measures of the confidence overthe resources used the execution conducted and the results returned to theuser This involves the design of novel protocols based on TPM (TrustedPlatform Modules) so as to provide trusted executions and migration pathfor the virtual environment deployed on the CC platform It also requirenew contributions in result-checking techniques middleware hardening andgame-theory based trust management

Results The general robustness analysis of distributed Evolutionary Al-gorithms (dEAs) against cheating faults and crash-faults (subject startedduring previous year) was finished with publication in Computers amp Math-ematics with Applications journal As a result conditions of convergenceor non-convergence of dEAs executed in malicious environment were givenHaving promising results from previous work currently it is being extendedby the experimental and theoretical analysis of running times of dEAs Theaim of the work is to quantify the overhead introduced by malicious acts onthe execution time Influence of underlying connection network between theworking nodes is also explored with the main focus on the P2P networks

112 Projects and Grants in 2012

Additionally a subject of generating hash functions by means of Gene Ex-pression Programming (GEP) was studied Journal paper as an extensionof conference paper (presented at the rdquoCryptography and Security Systems2013rdquo) is currently in preparation

Publications [40]

Energy-Efficient Information Dissemination in MANETsAcronym NAReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2009-09-15 ndash 2012-09-14

Members Patricia Ruiz

Domain(s) Communication Protocols Mobile Ad Hoc Networks Energy-Efficiency Optimisation

Partner(s) NA

Description Patricia Ruiz is working on broadcasting algorithms over adhoc networks indeed over both mobile ad hoc networks (MANETs) and ve-hicular ad hoc networks (VANETs) During the first year she developed anenergy aware dissemination protocol based on the state of the art distancebased broadcasting algorithm for MANETs For that she did a cross-layerdesign that informs the upper layers about the reception energy at the phys-ical layer Thus upper layers can use this information to take decisions inorder to outperform the performance of the protocol

During the second year she improved the previous version of her work butalso made several extensions including new features and optimizations tothe protocol originally proposed The candidate has been using multiobjec-tive metaheuristics approaches to optimize the parameters of the differentvariants of the protocol

Results We are developing communication algorithms for ad hoc networksMore precisely dissemination algorithms for both MANETs and VANETsIn [330] an study of the performance of a tree topology over a VANETwas presented and also a comparison of different broadcasting algorithmsover different topologies for both MANETs and VANETs Considering theintrinsic energy constrain of MANETs an energy aware broadcasting algo-

41 Research projects 113

rithm (EDB hereinafter) was proposed in [329] This protocol is configuredby a set of different parameters that must be tuned for obtaining a goodperformance In order to optimize EDB we are using some multiobjectivealgorithm cellDE for finding the best possible configuration in [307] Thisalgorithm gives a set of feasible solutions that optimize the performance ofthe protocol in terms of some predefined objectives In [284] a new ver-sion of EDB the Adaptive Enhaced Distance Based broadcasting protocol(AEDB hereinafter) was optimized in terms of the energy used the coverageachieved and the broadcasting time The solutions were analyzed and somehints were given to the designer for choosing the parameters for promotingone objective or another Moreover in [290] the Enhanced Distanced BasedBroadcasting algorithm (EDB) was improved by using some social knowl-edge of the network A community detection technique was used in orderto improve the coverage achieved by EDB in sparse networks Additionallythe parameters of the new protocol were also optimized in terms of the samethree objectives we mentioned before

Publications NA

Smartphone Malware detection and mitigation with Static codeAnalysisAcronym NAReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2011-10-15 ndash 2014-09-30

Members Kevin Allix (PhD)

Domain(s) Security code static analysis android malware detection soft-ware engineering techniques

Partner(s) NA

Description By leveraging Static code analysis methods our researcheffort aims at improving our ability to detect known and unknown malwareusing heuristics-based detection technichs and similarity computation withnew fingerprinting schemes

Results This a starting PhD No results yet but a state of the art

Publications NA

114 Projects and Grants in 2012

Access Control Architectures From Multi-objective Require-ments to DeploymentAcronym ACAReference NAPI Prof Dr Yves Le TraonFunding ULBudget NABudget UL NADuration 2011-02-01 ndash 2014-01-31

Members Donia El Kateb (PhD)

Domain(s) NA

Partner(s) NA

Description The subject of the PhD thesis is ldquoAccess Control Architec-tures From Multi-objective Requirements to Deploymentrdquo Todayrsquos infor-mation systems are becoming more and more heterogeneous and distributedthis has impacted software systems which become more and more complexAdditionally software systems are a target to many changes that occur atthe environment level requirement level or at the system level This raisesthe necessity to consider multi-level requirements at their design of softwarearchitecture like functional requirements performance requirements secu-rity requirements etc Among the security requirements access control isthe most deployed one An access control architecture implements the re-quirements and enforces a policy that satisfies the requirements This thesisconsiders policy-based access control architectures and aims to build a gen-eral framework that defines an access control architecture that is supposedto comply to multi-level requirements and to respect multiple competingquality attributes security performance and so forth These attributes in-teract and improving one often comes at the price of worsening one or moreof the others In this thesis we reason about architectural decisions thataffect those quality attribute interactions

bull RQ1 How to ensure the tradeoff between security and performancewhen designing an access control architecture

bull RQ2 How to automate policy specification to assist policy writers toavoid policies errors so that the policy is compliant with the require-ments

bull RQ3 How to test the secure deployment of the access control ar-

41 Research projects 115

chitecture its compliance with the policies and how to do that in anoptimized fashion

Results More specifically during this first year the student did a stateof the art on access control and on security requirement engineering Shestudied one of the issues related the standard access control architecturenamely the performance issue caused by bottlenecks She successfully pro-posed a new solution for solving this issue and developed an automated toolthat implements this approach and enables improving current access con-trol architecture In addition during her first years she did an interestingwork on policy enforcement points (PEP) localization In fact it is impor-tant to locate the PEP in order to understand how security mechanism areimplemented and provide a way to improve the performance This workwas actually complementary to the work that she did on performance im-provement She implemented this approach and applied it successfully tothree case studies This work is under submission and will be submittedsoon She conducted this work in collaboration with Prof Tao Xie team(from North Carolina State University USA) who helped by providing casestudies used in the experiments The results were very promising since theperformance was improved up to 10 times This work has been submittedto ICPE conference and will appear in 2012

Publications NA

415 Other miscellaneous projects

Enterprise security for the banking and financial sectorAcronym BCEEReference I2R-Net-Pau-11PS2CPI Prof Dr Thomas EngelFunding BCEEBudget 204KeBudget UL NADuration 2011-04-01 ndash 2012-03-31

Members T Engel A Zinnen

Domain(s) security for the banking and financial sector

Partner(s) BCEE

116 Projects and Grants in 2012

Description Although many companies seem to approach the cloud com-puting paradigm at a faster pace the financial sector still remains an excep-tion Selling cloud computing to financial services companies seems prob-lematic The sector is known for its reluctance to give up control overoperations Additionally this area is characterized by a high number oflaws and regulations In Luxembourg banks are for example constrainedby law to store data within the country This fact contradicts the conceptof cloud computing in its current development The biggest challenge andkey success point in the implementation of cloud computing in the financialsector will be the assurance of safety policies

In Luxembourg this topic is a subject of special interest Resource poolingamong companies with similar interests would save administrative costs Onthe basis of a cloud environment banks could completely put their focus ontheir core competence However an open question is what steps will benecessary in order to achieve this goal In any case it will be important tofurther invest in research to fulfill the seven introduced security challengesA pilot project in cooperation with the Interdisciplinary Centre for SecurityReliability and Trust (SnT) provides preliminary work and an analysis of aframework to migrate financial services to cloud computing This work isdiverse and addresses both the identification of necessary research topics andthe exploration of services that might run in the cloud This evaluation isbased on a comparison of benefits versus riskschallenges for specific servicesA dialogue with legal and audit institutions as well as a discussion withsoftware providers will be a first step towards a framework for the financialcloud in Luxembourg

Results So far we have evaluated the protection of state-of-the art anonymiza-tion networks Anonymization networks such as Tor and JAP claim tohide the recipient and the content of communications from a local observerie an entity that can eavesdrop the traffic between the user and the firstanonymization node Especially users in totalitarian regimes strongly de-pend on such networks to freely communicate For these people anonymityis particularly important and an analysis of the anonymization methodsagainst various attacks is necessary to ensure adequate protection Weshowed that anonymity in Tor and JAP is not as strong as expected so farand cannot resist website fingerprinting attacks under certain circumstancesWe defined features for website fingerprinting solely based on volume timeand direction of the traffic As a result the subsequent classification be-came much easier We applied support vector machines with the introducedfeatures We were able to improve recognition results of existing works on agiven state-of-the-art dataset in Tor from 3 to 55 and in JAP from 20to 80

The datasets assume a closed-world with 775 websites only In a next step

41 Research projects 117

we transferred our findings to a more complex and realistic open-world sce-nario ie recognition of several websites in a set of thousands of randomunknown websites To the best of our knowledge this work is the first suc-cessful attack in the open-world scenario We achieve a surprisingly hightrue positive rate of up to 73 for a false positive rate of 005 Finally weshowed preliminary results of a proof-of-concept implementation that ap-plies camouflage as a countermeasure to hamper the fingerprinting attackFor JAP the detection rate decreases from 80 to 4 and for Tor it dropsfrom 55 to about 3

Publications Two conference publications [267] [266]

EPT Vehicular NetworksAcronym EPTVReference I2R-DIR-PAU-09EPTVPI Prof Dr Thomas EngelFunding EPTBudget 2 298 KeBudget UL NADuration 2010-01-01 ndash 2014-12-31

Members Thomas Engel Raphael Frank Marcin Seredynski

Domain(s) Vehicular Ad Hoc Networks

Partner(s) Entreprise des Postes et Telecommunications Luxembourg -EPT

Description A standard for vehicular ad hoc networks is expected during2011 In 2025 0 of the vehicle fleet within Europe is predicted to ap-ply to the standards enabling new services and application A main goalwill be to increase traffic safety and reduce the environmental impact ofthe vehicular transportation system The vision of the proposed researchproject is to develop efficient secure and reliable communication networksto enable the transformation of the vehicular transport system of today toa greener smarter and safer system Recent advances in sensor technologylow power electronics radio-frequency devices wireless communications se-curity and networking have enabled the engineering of intelligent vehiclesandintelligent transport infrastructure which have the potential to drasticallyincrease road safety decrease cost of transportation and contribute to a sus-tainable environment This research will address 3 main areas of vehicularnetworks 1) Sensor and Mobile Ad Hoc Networks 2) Embedded Systemsand 3) Applications and Services

118 Projects and Grants in 2012

Results NA

Publications NA

PIL to SPELL conversionAcronym Pil to SPELLReference I2R-NET-PAU-11PS2CPI Prof Dr Thomas EngelFunding SES-ASTRABudget Not applicableBudget UL NADuration 2011-01-28 ndash 2015-01-27

Members Thomas Engel Frank Hermann b Braatz

Domain(s) Satellite control language

Partner(s) SES-ASTRA

Description Until now satellite vendors operate their satellites in theirown satellite control languages which are restrictive proprietary dependenton 3rd party software and very heterogeneous As a consequence SES de-veloped SPELL (Satellite Procedure Execution Language and Library) as aunified and open-source satellite control language usable for each satellitevendor In order to migrate the existing procedures delivered by the man-ufacturer Astrium SES requested for an automated translation that takesAstrium PIL procedures as input and generates equivalent SPELL proce-dures This translation has to guarantee a very high standard regardingcorrectness and reliability in order to minimize the need for revalidation ofthe generated SPELL procedures

Results Fully automated translator from PIL to SPELL (project P1)

a SES and Astrium engineers successfully tested the generated SPELLprocedures - more than 15 man month of testing from 2011-12 till 2012-05

b First planned operational use for a satellite to be launched in 2nd halfof 2012

Publications 8 Related Publications 5 Journal papers 2 conferencepapers 3 technical reports

41 Research projects 119

INTERCNRSGDRI1102 Algorithmic Decision TheoryAcronym AlgoDecReference F1R-CSC-PFN-11ADECPI Prof Dr Raymond BisdorffFunding FNR ULBudget 11 000 eBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members P Bouvry Ch Schommer U Sorger L van der Torre

Domain(s) Algorithmic Decision Theory is a research area developed atthe edge of several disciplines including Operational Research Decision the-ory Computer Science Mathematics Cognitive and the Social Sciences

Partner(s)

bull CNRS France

bull Universite Paris-Dauphine France

bull Universite Pierre Marie-Curie France

bull Universite drsquoArtois France

bull Universite de Mons Belgique

bull FNRS Belgique

bull ULB Belgique

bull FNR Luxembourg

bull Uniersidad Rey Juan Carlos Spain

bull DIMACS USA

Description Its aim is at developing formal and analytical methods andtools in order to improve decision making in and for complex organiza-tions in presence of hard algorithmic challenges It also aims at establishinga comprehensive methodology aiding real decision makers within the realworld to better understand the problem situations where they are involvedshape analyze an explore the possible actions that can be undertaken andultimately help to make better decisions The founding partners of the AL-GODEC Network established by the present Agreement have more than 20years of joint research activities resulting in joint PhDs papers books andresearch projects (both client and knowledge driven) Today they represent

120 Projects and Grants in 2012

a leading force worldwide in the area of Decision Sciences and TechnologiesThe ALGODEC Network is expected to create synergy in order to organizejoint doctoral courses promote the co-tutoring of PhD students promotemobility of early stage and experienced researchers promote the joint impli-cation of cross-members teams to client-driven research contracts organizejoint seminars act as a unique reference in fund raising

Results NA

Publications NA

Developing a Prototype of Location Assurance Service ProviderAcronym LASPReference ESA Bidder Code 52056PI Prof Dr Sjouke MauwFunding ESA - SnTBudget 160000e (ESA)Budget UL 80000e (SnT)Duration 2010-12-08 ndash 2012-12-07

Members Sjouke Mauw Jun Pang Xihui Chen Gabriele Lenzini

Domain(s) location assurance privacy of location assurance locationbased services GNSS network security

Partner(s) itrust Luxembourg

Description The objective of this project is to develop a prototype toprovide a high quality level of assurance in the location information thatoriginates from the GNSS network while protecting location owners fromintrusions into their privacy We approach these objectives from five per-spectives Analysis The objective is to precisely describe the requirementsthe execution and threat models the trust relations and the assumptionson the environment Design The objective is to design an architecture forlocation information assurance and to develop data protection algorithmsand decision logic to find out the appropriate assurance level of the loca-tion information The protocols devoted to security and privacy are alsodeveloped and integrated in a service architecture Verification The objec-tive is to analyse the result of decision logic in presence of an attacker andevaluate the quality of the output of the designed algorithms Moreoverbased on existing formal verification approaches a verification methodologywhich considers trustworthiness of the service together with user privacy willalso be studied Validation The objective is to set up the LAP prototypeand perform a set of laboratorial tests in order to assess the overall perfor-

41 Research projects 121

mance The robustness and performance is optimized through parametertuning Exploitation The objective is to define risk management principlesand prepare a strategy that should apply to assure the requirements in alargest deployment of the solution

Results The project was accomplished in this December 2012 and theevaluation meeting will be carried out in February 2013 So far the projectteam has submitted all the reports required by ESA and these documentshave been approved and accepted by the agency A Luxembourgish PatentApplication which describes the design of the localization assurance providerhas been successfully filed

Publications NA

Combine Software Product Line and Aspect-Oriented SoftwareDevelopmentAcronym SPLITReference F1R-CSC-PFN-09SPLIPI Prof Dr Nicolas GuelfiFunding ULFNRBudget 41 000eBudget UL NADuration 2009-10-01 ndash 2012-09-30

Members Nicolas Guelfi Alfredo Capozucca Jean-Marc Jezequel OlivierBarais Benoit Baudry Benoit Ries Vasco Sousa

Domain(s) Software Engineering Model Driven Engineering SoftwareProduct Line Aspect Oriented Modeling Model Composition UML

Partner(s)

bull CNRSINRIA University of Rennes France

bull Public Research Center Gabriel Lippmann

Description Software engineering proposes practical solutions founded onscientific knowledge to produce and maintain software with constraints oncosts quality and deadlines The complexity of software increases dramati-cally with its size A challenging trade-off for software engineering exists ina reality where the amount of software in existence is on average multipliedby ten every ten years as against the economic pressure to reduce devel-opment time and increase the rate at which modifications are made Toface these problems many of todayrsquos mainstream approaches are built on

122 Projects and Grants in 2012

the concepts of Model-Driven Engineering (MDE) Software Product Line(SPL) or Aspect-Oriented Software Development (AOSD) to foster softwarereuse In an emerging MDE context SPL and AOSD share the common ob-jectives to reduce the cost and the risk of adapting software systems to wideranges of new contexts On the one hand SPL techniques allow the model-ing of product variability and commonalities A SPL development approachstrongly depend on a composition mechanism supporting product deriva-tion from the SPL definition at any level of abstraction (analysis designimplementation ) On the other hand AOSD proposes new techniquesto compose and weave separate concerns which can represent features butAOSD does not propose mechanism to manage the variability of softwareThus both approaches complement each other and the combination of SPLand AOSD paradigms provides an exciting challenge allowing the use of ef-ficient product lines through the whole software development lifecycle Thiscollaboration aims at investigating further the complementarities betweenSPL and AOSD approaches in a MDE context This should make it possi-ble to discover entirely new ways of formally decomposing and recomposingsoftware systems at a much higher level of abstraction than anything thatis available today (notion of modularity based on classes and components)In order to do so several main technical areas must be addressed

bull Identify the common concepts and the difference between SPL andAOSD to combine the both approaches

bull Study the special activity of horizontal model transformation in thecontext of SPL and AOSD methodologies and to propose a transfor-mation language to support them

bull Provide rigorous and generic means to guaranties the consistency be-tween models through aspect weaving and product derivation

bull Build a generic AOM weaver with built-in variability mechanism todrive runtime adaptation

The problems inherent to this research project are in the heart of the soft-ware engineering problems such as model composition model transforma-tion model evolution model reusability model consistency etc

Results

bull Analysis of tools and procedings for the development of the genericAOM approach toolnamely analysing and testing the requirements forintegration as eclipse plug-in for tool deployment compatability of thiscompatibility requirements with the test projects already developed inKermeta and Drools

42 Grants 123

bull Development and specification of the Aspect metamodel composedof Pointcut information and Advice including specification alterna-tives to be tested during tool development for acersion of the best andclearest specification approach

bull Development and specification of a meta-model for internal informa-tion exchange within the several steps of the AOM tools execution

Publications NA

42 Grants

421 AFR

Multimedia Sensor NetworksAcronym AFR Grant PhD-09-188Reference I2R-DIR-AFR-090000PI Prof Dr Thomas EngelFunding FNR-AFRBudget 37KeBudget UL NADuration 2010-04-01 ndash 2013-03-31

Members Thomas Engel Radu State Alexander Clemm Stefan Hommes

Domain(s) anomaly detection network security rare event detection

Partner(s)

bull PampT Luxembourg

bull CISCO USA

Description Security officers monitoring security cameras face problemswith boredom and subsequent inattentiveness Critical events such as in-trusions can be missed While traditional surveillance systems store thedata recorded by cameras on hard disks examining the videos after a crimehas been committed is too late Together with PampT Luxembourg SnT de-velops in this project techniques for automated video surveillance with IP

124 Projects and Grants in 2012

network cameras The advantage Security officers can be alerted immedi-ately at critical moments and defensive actions can be initiated Automatedvideo surveillance techniques will be designed to detect and track objects in ascene to recognise normal activities in a scene and to differentiate anomalousfrom normal activity patterns Supervised and unsupervised learning usingthe video data will be applied to classify scenes as normal and suspiciousSpecial algorithms will be adopted or developed to detect the patterns ofobjects in the image control charts will raise an alarm when certain param-eters are out of the normal range Finally the spatial-temporal behaviourof an object in a scene will be analysed to gain more information aboutan activity Combining such analytical techniques will result in improvedintrusion detection and better support for security personnel The projectwill also address privacy issues at a high level to assure personal rights inpublic space Background of this project is that PampT Luxembourg wantsto replace its currently installed security network with IP network camerasin its main buildings and at other sites in Luxembourg The collaborationwith SnT guarantees the combination of an economically relevant highlyinteresting scientific question with cutting edge basic research

Results

bull Online-detection of a scene with self-tuning of all system parameters

bull Control charts for classifying a sequence of correlated images

bull Development of an open-source prototyp for an automated video surveil-lance solution

Publications 1 peer-reviewed conference [275]

Mashups in Clouds combined with Sematically enriched Infor-mation SetsAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding AFR-PHD-09-029Budget NABudget UL NADuration 2009-07-01 ndash 2013-06-30

Members Bernd Klasen (PhD candidate) Steffen Rothkugel (supervisor)

Domain(s) mashups cloud computing satellite communication

42 Grants 125

Partner(s)

bull SES Astra

bull Universitat Trier

Description This project implements and analyzes mashups - new ser-vices based on seamless composition of existing ones - running and beingcreated inside computing clouds The latter provides soft- and hardware asan abstract service which offers a high computational power that can beaccessed via specified interfaces while the internal - possibly heterogeneous -infrastructure is hidden This approach is supposed to overcome limitationsof existing (clientserver-based) solutions which suffer from performancedegradation Furthermore it will be investigated how users can be assistedduring the mashup creation process by automatic suggestions based on col-laborative filtering approaches and ontologies The result will be a platformprototype that enhances possibilities for end users as well as for enterprisessince it eases the service-creation process thus reduces time-to-market andwill liberate a multitude of new services Running this system on a scalableinfrastructure - a cloud - ensures availability and short response-times evenon unexpected peak loads

Results NA

Publications 2 publications in 2011 one journal [351] and one peer-reviewed conference [361]

Trusted Location Services for Managed Community NetworksAcronym UL TelindusReference I2R-DIR-PAU-10TSCNPI Prof Dr Thomas EngelFunding AFR-PPPBudget 574KyearBudget UL NADuration 2010-04-01 ndash 2014-03-31

Members T Engel Y Nesius

Domain(s) Computer Science and Informatics

Partner(s) Telindus

Description The Objective of this work will be the integration of pri-vately owned access points into a managed wireless outdoor mesh network

126 Projects and Grants in 2012

Community features like incentive schemes shall be added to the network toallow an extension of the network in terms of coverage by reusing existinginfrastructure The managed outdoor network supports passive localisationThat is the wireless mesh access points are able to locate the position ofa signal emitting device This location is assumed as trustworthy as thewireless infrastructure is controlled and managed by a single trustworthyentity This can not be assumed anymore if privately owned access pointsare added to the network as then private peoplersquos access points are involvedinto the location determination process They may manipulate the signallingor just try to replace their node The contribution of this work will be tore-establish the trustworthiness of this localization service while supportingthe integration of 3rd party access points The project will build upon anexisting mesh network Real world estimates are done to measure a privateuserrsquos potential impact on the localization process and how this can be de-tected and to what extend it can be detected and potentially masqueradedeg by using information from nearby nodes or by involving other sourcesfor location information

Results NA

Publications NA

Spectrum sensing- Resource re-allocation and Spectrum man-agement strategies for satellite cognitive RadioAcronym SaCoRadReference 12R-DIR-AFR-090000PI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2011-10-15 ndash 2014-10-14

Members Shree Krishna Sharma Bjorn Ottersten

Domain(s) Security Reliability and Trust in Information Technology

Partner(s) SES

Description In this project the problem of enhancing the efficiency ofspectrum usage rather than exploring new spectrum bands for new serviceshas been considered Satellite cognitive radio has been proposed as mainresearch domain The problem of finding out innovative spectrum sens-ing resource re-allocation and resource management strategies for satellitecognitive radio is the main research topic of this proposal This research

42 Grants 127

work will mainly focus on investigating advanced techniques to improve theperformance of satellite users in different wireless environments as well asincreasing the resource usage efficiency in hybridintegrated Platform

Results NA

Publications NA

Sensor Fusion-Combining 3D and 2D sensor data for safety andsecurity applicationAcronym Sensor FusionReference 12R-DIR-AFR-090000PI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2008-07-08 ndash 2012-07-07

Members Frederic Garcia Bjorn Ottersten

Domain(s) Sensor fusion

Partner(s) IEE

Description Recently 3D-cameras based on the lime-of-flight principlehave been developed to allow capturing range images of a scene The ben-efit of such a 3D-camera is that it enables the robust segmentation andlocalization of objects in 3D-space Objects can be classified based on theircontour thus independently on the light condition and the texture of theobject which IS crucial for safety critical applications

A general drawback of time-of-flight 3D-cameras IS however their low res-olution being approximately a factor 100 below the resolution of standard2D-imager and limited in frame rate compared to video rate These draw-backs limit the field of applications for 3D-cameras An approach to over-come the limitations of the low resolution is to combine a 3D-camera with ahigh resolution imager and to perform a fusion of the data on software level

The core of the project will be the development and elaboration of methodsfor image fusion targeting on increasing the spatial resolution of the 3Dimage and at the same improve the depth precision of the range informationThe elaboration of these methods will be done based on real data acquiredby a first prototype camera to be building up using an existing 3D cameraThe project both comprises the elaboration and development of entirelynew mathematical concepts as well as the implementation of the methods

128 Projects and Grants in 2012

for real-time applications Mathematical modelling of the camera behaviouris addressed and the development of tools for calibration

Results Best student paper award at the IEEE7th international Sympo-sium on Image and Signal Processing and Analysis (ISPA 2011) in Dubrovnik(Croatia) PhD Thesis March 2012

Publications NA

Investigation of boundary conditions for a reliable and efficientcontrol of energy systems formed by highly parallelized off-gridinvertersAcronym RELGRID2009Reference NAPI Prof Dr Juergen SachauFunding FNR-AFR-PhDBudget NABudget UL NADuration 2010-04-01 ndash 2013-03-31

Members Markus Jostock

Domain(s) NA

Partner(s)

bull CREOS

bull U Kaiserslautern

Description The work aims at providing a model which will allow pre-diction of stability for highly dynamic grids From the control perspectiveconnecting several stable components will no necessarily result in a stableoverall structure particularly when each of the components has a highlydynamic behaviour To avid hazardous interdependencies of coupled dy-namics control specifications for the single inverter controls are sought thatguarantee reliable cooperation

Results NA

Publications NA

42 Grants 129

Methods for Measuring and Predicting the Security Perfor-mance Reputation of Public NetworksAcronym SCoPeMeterReference 12R-NET-PAU-11MSRPPI Prof Dr Thomas EngelFunding FNR-AFR RedDogBudget NABudget UL NADuration 2011-03-22 ndash 2015-03-21

Members Thomas Engel Fabian Lanze Andriy Panchenko Jerome Fran-cois

Domain(s) Security Performance Wireless Networks Fingerprinting Hotspots

Partner(s)

bull Interdisciplinary Centre for Security Reliability and Trust UL

bull Red Dog Communications sa

Description In recent years the usage of Internet based services shiftedfrom fixed workplaces to mobile environments Wireless access points areavailable almost everywhere and users tend more and more to carry outonline activities on mobile devices such as smart phones or tablets This at-tracts potential attackers since most users neglect the risk of eavesdroppingdata manipulation or the possibility of an access point being controlledby a malicious entity Besides the performance of hotspots can differ sig-nificantly making it difficult for users to chose an intermediary fulfillinghisher particular requirements The goal of this project is to build a secu-rity and performance barometer system that provides long-term judgmentof hotspots regarding their performance and security reputation Informa-tion will be contributed to this system by data automatically collected andderived from a userrsquos mobile device application and userrsquos experiences Sev-eral research challenges arise from this A technique for uniquely identifyingwireless devices without trusting any third party is essential to make surethat connection is established to an authentic device Metrics for measur-ing performance and trustworthiness have to be defined in order to analyzequality of service and reputation of public networks This will be done in away that protects privacy of the clients reporting the values and at the sametime guards from malicious clients trying to subvert the system Finally wewill study the possibility to offer privacy-preserving location based servicesusing the available data In the proposal we describe the methodology howwe plan to reach our research objectives and to develop a practically usablesecurity and performance barometer for public wireless networks

130 Projects and Grants in 2012

Results The major result of this project so far is a large-scale evaluation ofunique device fingerprinting based on the unavoidable physical phenomenoncalled clock skew The method is fully implemented and can be performed onarbitrary out-of-the-box UNIX based systems It was evaluated using morethan 350 different wireless access points The resulting paper ldquoClock SkewBased Remote Device Fingerprinting - Demystifiedrdquo(FLanze APanchenkoBBraatz AZinnen) is currently under review for ACM Conference on Se-curity and Privacy in Wireless and Mobile Networks (ACM WiSec rsquo12)

Publications Three conference publications in 2011 [277] [276] [281]

Energy Optimization and Monitoring in Wireless Mesh SensorNetworksAcronym WiNSEOMReference I2R-DIR-AFR-090000PI Prof Dr Thomas EngelFunding FNR - AFR PhDBudget 37KeYearBudget UL NADuration 2010-04-08 ndash 2013-04-07

Members David Fotue Thomas Engel Houda Labiod Foued MelakessouSunil Kumar and Prasant Mohapatra

Domain(s) Wireless Sensor Networks

Partner(s) - Telecom ParisTech France- University of San Diego USA- University of California Davis USA- Ville du Luxembourg- Service de Coordination Hotcity

Description Air pollution is now considered as an important issue thatneeds to be treated as a critical phenomenon It belongs to a set of crucialphysical factors that drastically decrease peoplersquos health of human beingsIn this proposal we aim to deploy an efficient monitoring architecture ded-icated to Air Pollution in Luxembourg based on Wireless Sensor Networks(WSNs) WSNs have been the subject of much recent study and are a po-tential solution for the deploymentof measurement architectures at low costThey allow the measurement of data and their transmission towards a cen-tral workstation often called the sink in an efficient manner Currentlyair pollution monitoring is done locally over a small area The deployment

42 Grants 131

of a large set of sensors enables better mapping of pollution occurrencesat a higher measurement frequency Optimal communication in WSNs iscurrently a hot research topic For instance during the last ten years re-searchers have suggested many routing protocols in order to optimize datatransfer between network nodes We propose new routing protocols and for-warding mechanisms that increase network lifetime through the set of routediversity and efficient energy management schemes A set of maximally dis-joint paths between each sensor and the sink can partially or completelyavoid the appearance of congestion in the network The residual energy ofsensors is also taking into account our model Consequently data packetswill be forwarded towards candidates that present the widestcapabilities andhave the greatest residual energy Consequently global traffic will be spreadalong non-overlapping paths in order to increase the global WSN lifetimeThe PhD work consists of the analysis of this energy routing protocol in thecase of a real scenario that will be deployed in Luxembourg for air pollutionanalysis

Results After a study of the state of the art in the area of WSNs forenergy optimization we proposed A new Energy Conserving Routing Pro-tocol that aims to optimize the transmission cost over a path from a sourceto a defined destination in a Wireless Sensor Network The results appearsin proceedings of the 9th IEEEIFIP Annual Mediterranean Ad Hoc Net-working Worshop France 2010 New Aggregation Techniques for WirelessSensor Networks have been proposed the results appears in proceddindsof the 18th Annual Meeting of the IEEEACM International Symposiumon Modeling Analysis and Simulation of Computer and TelecommunicationSystems(MASCOTS) USA 2010 3 We study the effect of Sink Locationon Aggregation based on Degree of connectivity for Wireless Sensor Net-works The results are under reviews at the First International Workshopon Advanced Communication Technologies and Applications to Intelligenttransportation systems Cognitive radios and Sensor networks(ACTIS) Ko-rea 2011 4 We proposed a new Hybrid method to assign the channelfor Wireless Sensor Networks The results are under reviews at the 9th In-ternational Symposiumon Modeling and Optimization in Mobile Ad Hocand Wireless Networks(WiOpt) USA 2011 5 Finally we concluded allinvestigations done this year by submitting a journal paper at EURASIPJournal on Wireless Communications and Networking in the special issuerdquoLocalization in Mobile Wirelessand Sensor Networksrdquo

Publications Four related publications [276 277 364 365]

132 Projects and Grants in 2012

Information Extraction from Legislative TextsAcronym IELTReference NAPI Prof Dr Leon van der TorreFunding FNR AFR PHDBudget NABudget UL NADuration 2012-03-01

Members Llio Humphreys

Domain(s) Legal informatics Ontologies Information extraction Norms

Partner(s) Guido Boella University of Turin

Description With the growth of the internet laws can now be easilyaccessed by most citizens but with normative production increasing at Eu-ropean national and regional levels citizens and organisations need moreadvanced tools to understand the law within their domain of interest Legalinformatics is a growing field of research Legislative XML legal ontolo-gies and reasoning for normative systems have reached a point of maturityHowever building such resources beyond narrow applications involves a pro-hibitively expensive level of manual effort Advances in natural languageprocessing tools such as part-of-speech taggers and parsers the growingusage of statistical algorithms for handling uncertainty and the availabil-ity of semantic resources such as WordNet and FrameNet has resulted inrobust information extraction tools Information extraction for law is anunder-researched area Legal text particularly legislative text has partic-ular features that pose significant challenges - long sentences with severalclause dependencies lists where each item are usually not standalone sen-tences and references to other articles the content of which is not quotedwithin the referring article This research investigates the transformation oflegislative text into normalized sentences representation in formal logic andinformation extraction for ontologies

Results My first year in the doctoral programme has mainly involved for-mal and informal study of relevant topics at the Universities of LuxembourgTurin and Delft as well as publications on legal informatics and complianceCourses in transferable skills have been omitted in this account

bull study of propositional logic belief revision and dynamic epistemiclogic information extraction and data mining in Luxembourg andof the Pi-calculus in Turin

bull essay on Theory Change and Law

42 Grants 133

bull research visit to Joris Hulstijn University of Delft for the study ofcompliance monitoring systems

Publications

bull Conference papers

ndash [81][82][253]

bull Book chapter

ndash [83]

Security LogicsAcronym LOSECReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding FNR-AFRBudget NABudget UL NADuration 2009-09-01 ndash 2012-09-01

Members Valerio Genovese

Domain(s) Authorization Access Control Modal Logic

Partner(s) NA

Description Access Control Authorization and Authentication are main-stream topics in computer science security that can be grouped under thenotion of rdquotrust managementrdquo In an increasingly interconnected world secu-rity policies are evolving from a static disconnected environment to a highlydynamic and distributed one (eg Internet Social Networks)

The main aim of this project is to create a formal and expressive logicthrough which computers can reason to grant access to external entitiesand users can model and specify in a clear and explicit way what are thepolicies which govern their systems The new logic we plan to develop deeplyextends and enrich existing approaches appeared in the literature We alsoplan to create a calculus for this logic in order to define an efficient algorithmto automatize the reasoning process for large scale applications From themodelling point of view we aim to define a model checking methodology toassist ICT security officers in crafting secure and stable systems

Results

134 Projects and Grants in 2012

bull Seq-ACL+ (software)

bull ACL-Lean (software)

bull delegation2spass (software)

bull macl2spass (software)

bull secommunity (software) available at httpwwwdiunitoit~genovesetoolssecommunitysecommunityhtml

Publications [10][242]

Valerio Genovese Modalities for Access Control Logics Proof-Theory andApplications University of Luxembourg 2012

Programming Cognitive RobotsAcronym ProCRobReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding FNR-AFRBudget NABudget UL NADuration 2011-05-20 ndash 2014-05-20

Members Pouyan Ziafati

Domain(s) Agent Programming Languages Robotics

Partner(s) Mehdi Dastani Utrecht University

Description The ProcRob project aims at extending existing agent pro-gramming languages with sensory and action components to support theirapplication in autonomous robot programming

Results

bull The requirements of agent programming languages for autonomousrobot programming have been identified and presented in the ProMASworkshop of the AAMAS 2012 conference and published in the BNIAC2012 conference [84]

bull An environment software library for 2APL agent programming lan-guage has been developed which facilitates its integration with ROSthe current de facto standard robotic framework

42 Grants 135

bull A face recognition software package for ROS has been developed andreleased publicly

bull A demo application of NAO robot using 2APL and ROS has beendeveloped In this demo NAO can recognize faces and be controlledby voice A more complex demo application for NAO is under thedevelopment including path planning while avoiding obstacles

bull A more detailed analysis of the agent programming languages require-ments for event processing in autonomous robot programming has beenperformed and a software library for addressing such requirements iscurrently under the development The result has been submitted toAAMAS 2013 In this work an extension of ETALIS event process-ing language has been proposed to develop sensory components for anautonomous robot

Publications [84]

Trust in argumentation-based negotiationAcronym TABNReference F1R-CSC-LAB-05ILIAPI Dr Srdjan VesicFunding FNR-AFR-PostdocBudget NABudget UL NADuration 2012-10-01 ndash 2013-01-14

Members Srdjan Vesic

Domain(s) Argumentation Negotiation Trust

Partner(s) NA

Description he goal of the project was to study the notion of trust inargumentation-based negotiation in particular to study the notion of n-aryattack relations

Results Due to the early termination of the contract only its first partwas finalised It was to study the notion of n-ary attack relations Thischallenge was selected as the first research objective since existing argu-mentation systems rely on binary attack relations and I believe that a moregeneral framework allowing for ternary (or more) attack relation is necessaryin argument-based negotiation I worked on this problem with Dr MartinCaminada We plan to finish the work and submit it to an international

136 Projects and Grants in 2012

journal

I also worked with Dr Madalina Croitoru (University of Montpellier II) oncreating an argumentation framework for reasoning in the scenario whereseveral agents have individually consistent ontologies but the union of allthe ontologies is inconsistent This argumentation formalism can be used byagents to negotiate ie to send only some data from their ontology in form ofarguments (compared to the existing approach where the union of ontologiesis created in a centralised place) This is a step forward considering theprivacy and the notion of trust in this type of negotiation is to be carefullystudied

Publications Some papers were submitted

Logical Approaches for Analyzing Market Irrationality compu-tational aspectsAcronym LAAMIReference I2R-DIR-AFR-090000PI Prof Dr Leon van der TorreFunding FNR-AFRBudget 117 840eBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members Mikoaj Podlaszewski Martin Caminada Tibor Neugebauer

Domain(s) market efficiency finance epistemic reasoning

Partner(s) Luxembourg School of Finance

Description The proposed PhD project is to be carried out in closecooperation with the recently approved LAAMI (CORE) project (LogicalApproaches for Analyzing Market Irrationality) which aims to apply theparadigm of agent-based computational economics (Tesfatsion and Judd2006) to model complex reasoning processes in a market setting Basicallywe assume a market in which the main product is information and com-plex analysis on an issue that does not provide immediate feedback fromthe objective world We are interested in examining under which conditionsthe information providers (consultants) have sufficient incentives to providegood quality analysis to their clients The preliminary results of a prototypesoftware simulator (Staab and Caminada 2010) as well as other research(Mathis et al 2009) indicate that these incentives are not always strongenough to rule out providing low quality information If such becomes thepervasive strategy of the consultants there are consequences regarding the

42 Grants 137

informedness not only of individual information consumers (clients) but alsofor the system as a whole since unfounded collective beliefs can easily leadto various forms of market imperfections In essence we would like to ex-plain these market imperfections by examining how markets can becomeill-informed For this we use the technique of agent-based simulation Thespecific role of the PhD student will be to focus on implementation aspectsas well as on aspects of computability and bounded rationality of individualagents

Results

bull In [55] we examined an argument-based semantics called semi-stablesemantics which is quite close to traditional stable semantics in thesense that every stable extension is also a semi-stable extension Oneadvantages of semi-stable semantics is that for finite argumentationframeworks there always exists at least one semi-stable extension Fur-thermore if there exists at least one stable extension then the semi-stable and the stable extensions coincide Semi-stable semantics canbe seen as a general approach that can be applied to abstract ar-gumentation default logic and answer set programming yielding aninterpretation with properties similar to those of paraconsistent logic

bull In [165] we introduced a unified logical approach based on QuantifiedBoolean Formulas (QBFs) that can be used for representing and rea-soning with various argumentation-based decision problems By thiswe were able to represent a wide range of extension-based semantics forargumentation theory including complete grounded preferred semi-stable stage ideal and eager semantics Furthermore our approachinvolved only propositional languages and quantifications over propo-sitional variables making decision problems like skeptical and cred-ulous acceptance of arguments simply a matter of logical entailmentand satisfiability which can be verified by existing QBF-solvers

bull One of the differences between the fields of dialogue theory and thefield of (Dung-style) argumentation is that the former is mainly con-cerned with procedural aspects of discussion whereas the latter ismainly concerned with the results of a nonmonotonic reasoning pro-cess Nevertheless one can use dialogue theory as a conceptual basisfor Dung-style argumentation semantics The idea is that an argu-ment is accepted if and only if it can be defended in formal dialogueMoreover different argumentation semantics can be shown to coincidewith different types of dialogue In [151] we showed that groundedsemantics can be described in terms of persuasion dialogue providingan implementation of this dialogue in [150]

138 Projects and Grants in 2012

Publications [55] [165] [151] [150]

Green Energy-Efficient ComputingAcronym Green EECReference PDR-09-067PI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2010-04-01 ndash 2012-03-31

Members Alexandru-Adrian Tantar

Domain(s) decentralized algorithms global optimization dynamic envi-ronments with uncertainties

Partner(s) NA

Description Large scale computing environments like data centers can befunctionally defined by several dynamic factors At the same time depend-ing on for example availability constraints nature of the energy sourcesor computational load distribution different stochastic factors need to beconsidered as well Energy-efficient computing therefore requires not only tocomply with contradictory objectives eg provide full computational powerwhile minimizing energy consumption but also demands anticipating theimpact of current decisions dealing with uncertainties like low power andemergency operation or provide fault tolerance all in an autonomic mannerFrom a multi-objective optimization perspective there is a need to under-stand and deal with the concepts that define a dynamic environment in thepresence of stochastic factors and provide corresponding models

Results As part of the existing framework a system is defined as a col-lection of interacting autonomous nodes [310] described by overall and localsystem load performance and energy consumption balance operating price(off) load rate task acceptance etc Energy vs performance trade-off re-quirements can be expressed as a resultant of operating costs emergencylevel or thermal readings At node level transitions are conducted by ex-pert systems (decentralized approach) that dynamically control frequencyand voltage task (off) load rate and type (communication or computationintensive) or power states A strategyscenario driven anticipation model isused to determine the outcomes and consequences of current decisions

As a continuation of the practical study and in order to provide the requiredformal support an analysis of the nature of dynamic and stochastic factors

42 Grants 139

that are considered in optimization problems was conducted This led to theidentification and modeling of four classes along with different performancemeasures [302 303] as follows (a) first order dynamic transform of the in-put parameters (b) second order evolution of the objective function(s) (c)third order parameter or function state time-dependency (d) fourth ordertime-dependent environment Also in addition to the previous design thecurrent model is defined to provide support (as part of the dynamic opti-mization process) for priority and expected due date based local schedulingpolicies transitions between active and shutdown states or the managementof volatile environments In parallel a dynamic preemptive load balancingmodel with stochastic execution times in heterogeneous environments wasdeveloped [301] This model considers different node constraints eg stor-age and computational load while being able to deal with a series of powerstates for minimizing energy consumption Defined objectives include mem-ory and computational load balancing energy number of active physicalmachines and passive tasks or virtual machines Last a study on land-scape approximation using generalized quadratic forms is currently beingcarried for characterizing and tracking local optima describing robustnessconfidence radius and sensitivity analysis

Publications NA

Confidentiality Integrity issues in distributed computationsAcronym CIDCReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2010-01-01 ndash 2013-12-31

Members Benoit Bertholon

Domain(s) Confidentiality of execution Integrity of execution CloudComputing IaaS Trusted Platform Modules Parallel and Distributed Com-puting

Partner(s) NA

Description Computing grids as defined in [Fos97] are distributed infras-tructures that gather thousands of computers geographically scattered andinterconnected through the Internet A simple concept that has emerged outof such an architecture is that of cloud computing (CC) where customers do

140 Projects and Grants in 2012

not own or rent any part of the infrastructure They simply use the availableservices and pay for what they use

The CC paradigm currently arouse enthusiasm and interest from the privatesector because it allows to reduce computing cost at a time where computingpower is primordial to reach competitiveness Despite the initiative of severalvendors to propose CC services (Amazon Google etc) several researchquestions remain open especially as regards security aspect from the userpoint of view CC highlights strong needs in integrity certifications andexecution confidentiality the latter focusing few academic interest until nowThe current policy at this level is to blindly trust the vendor providing theCC service This doesnrsquot hold for critical applications that eventually use orgenerate sensitive data especially when physical machines are distributedin different administrative domains and shared with other users that maybe business competitors

In the framework of the CC paradigm the purpose of this PhD is thereforeto investigate and design novel mechanisms to cover the following domains

- confidentiality of both application code and user data- integrity and fault-tolerance to provide guarantees on programs anddata either before during or after a run on the CC platform

To make this study more concrete the developed solutions must be validatedon a CC platform build on top of the University of Luxembourgrsquos computingclusters and the Grid5000 platform

By addressing those issues this PhD opens the perspective of intellectualpatents in a key area able to address industrial needs in an emerging tech-nology

Results In the preliminary work I studied the TPM I read the documentsissued by the Trusted Computing Group (TCG) regarding the specificationof the TPM as well as other papers using the TPM for different purposesThis has been done in order to develop what has been the main contributionof the first year CertiCloud

CertiCloud is a framework developed to verify the integrity of a runningVirtual Machine in a Cloud environment The creation of this first versionis based on a network communication protocol which has been developedand studied specifically for CertiCloud The resulted implementation is inpython for simplicity and fast prototyping The CertiCloud frameworkconsist as well in patches to adapt the Cloud scheduler to take into accountthe protocols developed This framework has been integrated in Nimbus bycreating some small patches specifically for this platform and can be easily

42 Grants 141

modified to use other Cloud platforms This lead to publications [323] [288]and [289]

The second part of the PhD is on obfuscation techniques and how to applythem to decrease the readability of a source code The software JShadObf[324] has been developed to validate the approach and to develop new tech-niques and metrics allowing better code obfuscation The literature [317][318] [319] [320] [321] has been studied to implement the state of the artin JShadObf

After the study compiler techniques and parsing softwares such as BisonANTLR [322] or bnfc ANTLR has been selected to parse JavaScript codeand a grammar has been developed ANTLR has many advantages such asbeing an active project generating parser in different languages (includingpython) and allowing the generation of the Abstract Syntax Tree Many codetransformations has been implemented such as the insertion of dead code theinsertion of predicates the generation of dummy expressions the outliningof code and the modification of the control and data flow Combined withevolutionary algorithms the transformations and the metrics are used tomutate and rate the generations creating multiple obfuscated versions ofthe same source code

This lead to publications under review to NSS2013 and NIDISC2013 (ac-cepted)

Publications [323]

Reliability of Multi-Objective Optimization techniquesAcronym REMOReference TR-PHD BFR07-105PI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2010-10-01 ndash 2012-09-30

Members Emilia Tantar

Domain(s) evolutionary techniques dynamic multi-objective optimiza-tion performance guarantee factors particle methods robustness

Partner(s) NA

Description The real-world optimization problems arising from disci-plines as various as Green IT or systems biology all have in common the

142 Projects and Grants in 2012

growing complexity of the problems to be optimized due to the need of scala-bility to larger environments or the number and type of factors needed in de-scribing the system and these are by far the only aspects to consider Otherdifficulties coming from the sensitivity of problems to dynamical changesoccurring in the environment or the need of handling several objectives si-multaneously should also be considered Evolutionary algorithms which area class of stochastic optimization methods constitue one of the commonlyused alternative in finding a good approximate solution for these problemsNevertheless their efficiency is mainly proved through experimentally at-tained performances Given the consequences of applying non-reliable solu-tions in the safety and security of complex systems (ex with applicationsin medicine) performance guarantee factors that overpass the experimentalboundary should be considered Therefore a framework allowing to quantifythe expected performances of the used techniques represents the main goalof this research

Results The aim of this project is the study of evolutionary algorithmsthat scale performances from theory to practice The focus is set on provid-ing performance guarantee factors for the study of multi-objective complexsystems including factors such as dynamism distributed behavior or the oc-currence of stochastic factors The first step consists in constructing a solidframework through the identification and design of the different classes ofproblems that can occur This has been done for the dynamic multi-objectivecontext towards a classification which allowed us to identify classes that lacka common ground for study [302 303]

As the faced real problems have different characteristics in order to compareand analyze the performances of various approximation techniques com-mon testbeds are required Synthetic or randomly generated problems areneeded in providing different fitness landscape structures or correlations be-tween objective functions or variables over time By understanding how dif-ferent techniques react to modifications occurring in the problem structurethe extent of their generality can be quantified To this end we proposedseveral variants of MNK-landscapes in order to fill the lack of syntheticproblems for online dynamic multi-objective problems Furthermore webuilt a new metric that tracks the set of best approximate solutions in time[303]These results were scaled to real-life problems arising from sustainableICT as the load balancing of resources [301]

In the context of dynamic environments we studied the stability of evo-lutionary algorithms for which the value of the objective functions changesdynamically subject to stochastic factors One of the application that I usedin order to illustrate the advantages and simplicity of this generic frameworkis by the convergence results that I provided in the case of distributed evo-lutionary algorithms subject to cheating [309]

42 Grants 143

Publications NA

Community-based Vehicular Network for Traffic Information inLuxembourgAcronym LUXCommTISReference PHD 2011-1ISPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2011-09-01 ndash 2014-08-31

Members Agata Grzybek

Domain(s) vehicular ad hoc networks coperative traffic information sys-tems trust management optimisation

Partner(s) NA

Description The near future will see a rapid proliferation of wireless com-munication technologies to vehicles allowing creation of wireless VehicularAd Hoc Networks (VANETs) The main motivation for this research is ve-hicular traffic efficiency in Luxembourg The objective of this PhD projectis to propose a cooperative traffic information system based on VANETs Itsmain goal is to capture evaluate and disseminate information about trafficsituation in Luxembourg received from vehicles connected by VANETs Thesystem is envisioned as an extension of the current solutions coordinated bycentralised traffic information agency These solutions are based on fixed in-frastructure like cameras and infrared sensors The information they provideis primarily limited to highways The VANET-based extension will allow areal-time trip planning based on up-to-date traffic information for all typesof roads The role of VANET-based part will be to collect traffic data ex-change it within the network and share it with the agency The role of theagency will be to collect the date from VANETs evaluate its quality inte-grate and disseminate to vehicles The use of the of vehicular-community andtrust management techniques will be used to ensure high quality of informa-tion The research will focus on the analysis modeling and implementationof novel mechanisms for (i) distributed VANET-based traffic data collec-tion (ii) efficient traffic data dissemination (within VANETs and betweenVANETs and traffic information agency) (iii) trust and user managementtechniques enabling to evaluate traffic data quality and trustworthiness ofsystem users To evaluate the system the project will also develop a gener-ator of realistic vehicular traffic for Luxembourg

144 Projects and Grants in 2012

Results The aim of this project is to propose Traffic Information System(TIS) using architecture based on Vehicular Ad Hoc Networks

bull Initial research requires a comprehensive literature survey in areas con-nected with VANETs (a) Network standards DSCR IEEE 80111pWAVE WiMax LTE (b) Routing protocols broadcast multicast(topology location based) unicast (c ) Traffic engineering (d) Trafficassignment (e) Game theory (f) Social networks

bull The first objective is to provide a framework for VANETs simulationwhich joins the latest versions of the most advanced Network Simu-lator (NS-3) with Traffic Simulator (SUMO) in a bidirectionaly wayThe aim of the developed simulation platform is to reproduce realistictraffic behavior in Luxembourg and then analyse and asses benefitsthat can be obtained by implementation of VANETs application Thepart of the project is to extend and optimise the realistic mobilitytraces generator (VehlLux)

bull After developing simulation platform TIS will be proposed Algorithmfor the evaluation of the quality of traffic information and new dissem-ination protocol will be tested and evaluated

Publications NA

Holistic autonomic Energy and thermal aware Resource Alloca-tion in cloud computingAcronym HERAReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget 37288eBudget UL NADuration 2011-09-15 ndash 2014-09-14

Members Mateusz Guzek

Domain(s) Cloud Computing Holistic Model Resource Allocation Multi-Objective Optimization Multi-Agent System Energy-Aware

Partner(s) Tri-ICT

Description Cloud Computing (CC) is a concept that has emerged outof the conception of heterogeneous distributed computing grid computingutility computing and autonomic computing Based on a pay-as-you-go

42 Grants 145

model it enables hosting pervasive applications from consumer scientificand business domains However data centers hosting Cloud applicationsconsume huge amounts of energy contributing to high operational costs andcarbon footprints to the environment Therefore Green Cloud computingsolutions are needed they should not only save energy for the environmentbut also reduce operational costs

Although Green computing in Cloud data centers has brought a tremen-dous interest many of the current green activities represent isolated op-timizations focusing on processing units memory networking or coolingIn order to efficiently manage Cloud data centersrsquo energy consumption wemust tackle the problem in a holistic manner which considers the variousresources and thermal aspects within the cloud computing as a whole Inthis context the aim of this PhD project is to design and develop a newholistic and autonomic energy-efficient approach to efficiently manage theresources of a CC The main milestones of this project are

bull creation of a novel holistic model In order to efficiently manage data-centersrsquo energy consumption we must tackle the problem in a holisticmanner

bull centralized optimization of the CC processing by multi-objective light-weight meta-heuristics using created holistic model to the least ensurethat a proper working of the CC system is established

bull proposition of a decentralized autonomic system which will dynami-cally optimize the CC system

The results of the centralized and decentralized system will be benchmarkedand then compared Final system will be tested using realistic assumptionsusing the field expertise supported by Tri ICT company

Results During the preparatory part of the project in the period 01012011-14092011 a number of publications were produced They investigate theprocessing (CPU) and its energy aspects of resource allocation

bull rdquoEnergy-Aware Scheduling of Parallel Applications with Multi-ObjectiveEvolutionary Algorithmrdquo EVOLVE 2011 [285]

bull rdquoScalable and Energy-Efficient Scheduling Techniques for Large-ScaleSystemsrdquo SCALSOL 2011 [294]

bull rdquoEnergy-Aware Fast Scheduling Heuristics in Heterogeneous Comput-ing Systemsrdquo OPTIM 2011 [295]

The first year of the project was devoted to holistic model creation andcentralized approaches exlporation and refinement which resulted in one

146 Projects and Grants in 2012

published conference paper [170] and one journal submission still under re-vision Additionally the multi-agent track of the project was tackled result-ing in one accepted conference submission to appear in 2013 The currentwork includes holistic model verification and development of Green Cloudsimulator

Publications NA

Energy-Efficient Networking in Autonomic Cloud ComputingAcronym INTERCOMReference PDR 2010-2ISPI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2011-06-01 ndash 2013-05-31

Members Dzmitry Kliazovich

Domain(s) Energy efficiency Cloud Computing Data center communica-tions

Partner(s) NA

Description The proposed INTERCOM project aims to provide a holisticenergy-efficient solution to autonomous management of interconnection net-works in a cloud computing environment It is a part of the currently ongoingFNR-COREGreen-IT project funded by Fonds National de la Recherche(FNR) Luxembourg The INTERCOM project aims to develop novel tech-niques and deliver efficient solutions in the form of prototype software mod-ules for energy-efficient performance optimization of (a) networking com-ponents (links transceivers switches etc) (b) data center communicationsystem as a whole and (c) communication protocols Most of current energyefficient solutions for data centers focus solely on either computing fabricoptimization or thermal management and only a few solutions account fornetworking aspects Therefore providing a holistic energy-efficient solutionfor a communication network at both hardware components and systemlevels of hierarchy constitutes the main innovative point of the project

Results One of the main results achieved in the project is related tothe release of GreenCloud simulation platform capable of fine-grained sim-ulation of cloud computing environments focusing on communication andenergy efficiency The GreenCloud platform is available for download athttpgreencloudgforgeunilu The detailed description of GreenCloud

42 Grants 147

and its components was published in Journal of Supercomputing specialissue on Green Networks citeKliazovich7483 Furthermore the Green-Cloud platform formed the basis for developing energy-efficient network-aware scheduling approaches published in Cluster Computing special issueon Green Networks in 2011 and in the IEEE International Conference onCloud Networking (CLOUDNET) citeKliazovich9732

Publications NA

Decision-theoretic fine tuning of multi-objective co-evolutionaryalgorithmsAcronym DeTeMOCGAsReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2011-09-15 ndash 2014-09-14

Members Sune Steinbjoern Nielsen

Domain(s) Coevolutionary Genetic Algorithms Multi-Objective Opti-mization Decision theory Algorithm Fine-Tuning Systems Biology

Partner(s) LCSB

Description Most real world problems are extremely hard and approxi-mated approaches are used to solve them As a solution meta-heuristicsare nowadays used in many places from cutting steel bars to logistics toportfolio management on stock exchange But these parameter-based algo-rithms are either using some default value or hand tuning which might leadto very suboptimal results This PhD project aims at providing an analysisdesign and experimentation of Adaptive Multi-objective Competitive Co-evolutionary Genetic Algorithms a term that combines several state-of-the-art concepts from various fields We aim at reaching the following researchobjectives

bull Design and implement a novel competitive multi-objective coevolu-tionary genetic algorithm based on a game-theoretical model

bull Develop a decision-theoretic approach based on Markov decision pro-cesses game theory and fuzzy logic which will allow the adaptation(offline or online) of the local operators and parameters of the devel-oped algorithm so as to optimize its performance in practical prob-

148 Projects and Grants in 2012

lems

bull Carry out a detailed analysis of the special case of adaptive multi-objective competitive evolutionary algorithms which - to the best ofour knowledge - has not been addressed so far in the literature

bull Validate experimentally the new algorithms on cutting-edge problemsfrom Systems Biology in collaboration with the Luxembourg Centrefor Systems Biomedicine (LCSB) providing new tools for the analysisof biochemical (geneprotein) interaction networks

In addition to the novelty of using decision theory and machine learningto help steeringcontrolling game-theoretic models for global optimizationand the uniqueness of its meta-model representation this PhD project willalso provide a scientific bridge between the Luxembourg Centre of SystemBiomedicine (LCSB) and the Computer Science and Communications re-search unit (CSC)

Results Below is a list that enumerates the results obtained until now

bull Implemented cooperative co-evolutionary in jCell and adapted andoptimised the VehILux model The model was extended to supportmore fine-grained tuning as well as decomposed to specifically suit thecooperative coevolutionary algorithm The intelligent model decom-position was shown to help the coevolutionary algorithm find betterresults than both random decomposition and single population ap-proaches (article submitted to Genetic and Evolutionary ComputationConference - GECCO 2013)

bull Started collaboration with LCSB on a cutting edge protein-structureoptimisation problem

Publications

bull Improved a state-of-the-art cooperative co-evolutionary multi-objectiveevolutionary algorithm [300] by an alternative asynchronous imple-mentation in the jMetal(java) framework The modification imple-mented produced an additional speedup of 14 times on average andup to 19 times in best test cases (article submitted to Congress onEvolutionary Computation - CEC 2012)

bull Novel Efficient Asynchronous Cooperative Co-evolutionary Multi-ObjectiveAlgorithms [300]

42 Grants 149

Energy-Performance Optimization of the CloudAcronym EPOCReference AFR MARP C09IS05PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget 10812558 eBudget UL NADuration 2010-09-01 ndash 2013-08-31

Members Frederic Pinel

Domain(s) energy-efficiency cloud computing optimisation

Partner(s) North Dakota State University USA

Description This MARP PhD project as part of the overall FNR COREproject Green-IT will contribute to the solution of the energy efficiency inthe following ways

bull Model the computing clouds so that new methods can be designedto tackle the challenge This involves mathematical analysis of thevarious parts of the cloud

bull Based on the models defined previously design new algorithms (forexample from the fields of meta-heuristics and game theory) to energy-efficiently allocate resources of the cloud to client requests

bull Design methods for autonomic management of the cloud Distributedagents will cooperate to allow the cloud to self-recover from any inci-dent

bull Validate the implemented algorithms on large scale real-world infras-tructures Both Grid 5000 and North Dakota State Data Centers areavailable for this step

In addition to the theoretical contributions this project will develop realsoftware solutions

Results In order to find new algorithms to solve a scheduling problemwe used a statistical method to assist in the design of algorithms [38] Thisalgorithm was then applied to the energy-efficient mapping of tasks on a dis-tributed platform including recent low-power clusters operating the ARMprocessors

A new metaheuristic was designed specifically for the GPU [39] This al-gorithm was applied to the problem of scheduling tasks to a distributed

150 Projects and Grants in 2012

system such as a cloud or cluster This algorithm introduces a new sourceof concurrency that enables larger problem sizes to be solved on the GPUparallel computing platform

Publications See results

Risk Prediction Framework for Interdependent Systems usingGraph TheoryAcronym TIGRISReference PHD-09-103PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2009-10-15 ndash 2012-10-14

Members Thomas Schaberreiter

Domain(s) critical infrastructures security modelling graph modelling

Partner(s) NA

Description Critical infrastructure protection is an up-to-date topic Crit-ical infrastructure is usually composed of interdependent systems that relyon each other in order to function correctly or provide adequate securityThe interdependencies of the systems are usually quite complex to under-stand and therefore modelling of the infrastructure and its interdependenciescan be helpful in determining the security requirements During this worka model of interdependent systems based on graph theory will be proposedthat aims to model the security attributes of interdependent systems Ade-quate ways to model the security properties of infrastructure as well as of theinterdependencies will have to be found in order to achieve a close-to-realitymodel Furthermore machine learning tools will have to be developed inorder to process the graph and allow real-time simulations

Results

bull A method for critical infrastructure dependency analysis for criticalinfrastructure security modelling was investigated and published atCRITIS2011 conference (rdquoRisk assessment in critical infrastructure se-curity modelling based on dependency analysis (short paper)rdquo [341])

bull For the IST-Africa conference a publication about the critical infras-tructure security modelling approach and RESCI-MONITOR a crit-

42 Grants 151

ical infrastructure service risk monitoring tool were described andpresented (rdquoCritical Infrastructure Security Modelling and RESCI-MONITOR A Risk Based Critical Infrastructure Modelrdquo [339])

bull A trust-based method to evaluate the impact of a dependent critical in-frastructure service to a critical infrastructure service was investigatedand published CRISIS2011 conference (rdquoTrust based interdependencyweighting for on-line risk monitoring in interdependent critical infras-tructuresrdquo [338])

bull A set of assurance indicators that can evaluate correctness of calculatedcritical infrastructure service risk was investigated and published atCRITIS2011 conference (rdquoAssurance and trust indicators to evaluateaccuracy of on-line risk in critical infrastructuresrdquo [340])

Publications NA

Dynamic MixVoipAcronym DYMOReference 4105139PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2012-11-01 ndash 2015-10-31

Members Ana-Maria Simionovici

Domain(s) Optimization Learning and Anticipation Load BalancingVirtualization Evolutionary Computing Particle Algorithms

Partner(s) MixVoIP

Description The aims and context of this research project are built ona collaboration between the Computer Science and Communications (CSC)Research Unit University of Luxembourg and MixVoIP a Luxembourgbased company specialized in VoIP services The solutions currently de-ployed by MixVoIP while executed inside clouds are monolithic and notnatively designed for such environments As such the nature of the opera-tions carried by MixVoIP is deeply static and does not allow coping with thehighly dynamic evolution of requests load or other stochastic events There-fore in an effort of addressing those problems several axes of research will beinvestigated including dynamic optimization based on incoming load analy-sis and prediction resource allocation load balancing or energy-efficient op-

152 Projects and Grants in 2012

timization and management The study will hence investigate and proposenovel solutions that effectively combine evolutionary computing algorithmsexact methods learning and anticipation techniques (expert systems neuralnetworks and auto-regressive models) as well as resource allocation and loadbalancing methods All proposed approaches will be first tested on syn-thetic data benchmarks designed out of MixVoIP logs for the cloud-basedenvironment currently in use and last inside the real-life actual platformExpected outcomes and implications consider a significant extension of hestate of the art (with respect to dynamic predictive driven optimization)and our knowledge on how dynamic systems can be modeled and dealt within the presence of high magnitude stochastic factors At a practical levelas a direct application of those paradigms it is expected to attain an im-provement in voice quality and energy efficiency with a direct connection toinfrastructure management costs and performance

Results NA

Publications NA

Satellite Payload Reconfiguration OptimizationAcronym SaPROReference 1094873PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2010-11-15 ndash 2013-11-14

Members Apostolos Stathakis

Domain(s) Satellite Payload Reconfiguration Exact algorithms Combi-natorial Optimization

Partner(s) SES Betzdorf Luxembourg

Description In order to answer the modern requirements for flexibilityand efficiency in communication satellites services the complexity and thesize of satellite payloads increases significantly As a consequence the man-ual management of the payload reconfiguration process is getting difficultand error prone for the engineers The problem of optimally configure andreconfigure the satellite payload is a multi-objective problem that comprisesobjectives like different path losses outage time to customers or threat tothe onboard equipment during the sequence of changes that would need tobe made to the switch matrix difficulty on restoring service for any single

42 Grants 153

amplifier failure etc This PhD work aims at addressing those issues withcontributions in the following domains

bull Payload architecture modeling propose a modular and scalable satel-lite payload architecture mathematical model describing all technicalconstraints and operational objectives

bull Multi-objective optimization provide payload configurations with op-timal or near optimal solutions for the whole set of objectives andrespecting all the satellite technical constraints

In addition to the theoretical contributions this project will develop a soft-ware framework that will help payload engineers to optimally reconfigurethe payloads efficiently

Results An Integer Linear Programming (ILP) model has been proposedfor the satellite payload reconfiguration problem that has been validatedwith success on realistic payloads The model describes the main opera-tional objectives It is extendable to new ones that may be of interest forthe satellite operator Additionally apart from its flexibility that allows theengineers to use the model for any payload system it interacts efficientlywith the internal software tools used by the engineers [173] [79] Theprocess of payload reconfiguration is a time critical operation It could bedemonstrated by the experimental results that many single and bi-objectiveproblem instances could be solved exactly within an acceptable time limitdefined by the engineers [78] However this is not the case for larger andmore complex instances where the required computational time for optimalsolutions may exceed the acceptable time constraints [79] We thus investi-gate metaheuristic methods to generate optimal or near optimal solutionsA first method that applies a local search algorithm was proposed and im-plemented providing promising results [325] A software framework thatintegrates the current theoritical results has been developped and is used bythe satelltie operator

Publications NA

154 Projects and Grants in 2012

A Computational Framework for Apprehending Evolving Mal-ware and Malware EngineersAcronym ANTI-MALWAREReference NAPI Dr Simon KramerFunding FNRndashAFR Post DocBudget 103 236 eBudget UL NADuration 2011-01-01 ndash 2012-12-31

Members Simon Kramer Sjouke Mauw

Domain(s) applied modal logic malware

Partner(s) NA

Description Simon Kramer carries out an AFR-FNR project that willdeliver a computational framework for apprehending evolving malware andmalware engineers In recent years the problem of malware (so-called ma-licious soft- and hardware and even entire computer networks) has becomea security-critical issue of national and even international importance withthe typical accompanying phenomenon which is the one of an arms raceThe proposed framework will address the multiple dimensions of the mal-ware problem in a unified way These dimensions are of spatial temporaleconomic legal and psychological nature The proposed framework willempower the multiple stake holders of computer systems which are theirdesigners and users the detectives and judges of malware engineers and thenational policy makers with computer assistance in their respective tasksThese tasks are the design of correct computer systems the safe use of com-puter systems the catching and conviction of malware engineers and thetaking of informed decisions and effective counter-measures against theserecent perpetrators of societal security

Results NA

Publications In 2012 the project resulted in the following publications [260261 262 263 264]

42 Grants 155

A Formal Approach to Enforced Privacy Modelling Analysisand ApplicationsAcronym EPRIV-MAAReference PHD-09-027PI Prof Dr Sjouke MauwFunding FNRndashAFRBudget 105222eBudget UL 105222eDuration 2009-12-01 ndash 2013-11-30

Members Sjouke Mauw Jun Pang Hugo Jonker Naipeng Dong

Domain(s) formal methods verification model checking security privacye-services

Partner(s) ENS Cachan Paris France

Description The project is part of a peerndashreviewed UL research projectEPRIV mdash lsquoA Formal Approach to Enforced Privacy in e-Servicesrsquo Theoverall goal of this project is to develop a domainndashindependent formal frame-work to express the proposed concept of enforced privacy We extend thenotion of enforced privacy outside the domain of voting Our formalizationwill take into account coalitionndashforming and defensive options Moreoverwithin this framework algorithms to verify these requirements will be de-veloped to facilitate verification with tool support This generic goal iscomposed of the following sub-goals

bull Lifting the notion of enforced privacy to other e-service domains suchas online auctions anonymous communications and healthcare andformalizing the resulting notions

bull Establishing per-domain formal notions to verify enforced privacy

bull Capturing these notions in a domain-independent formal framework

bull Investigating enhancements to the formal framework to verify privacy

Results The paper lsquoFormal Analysis of Privacy in an eHealth Protocolrsquo wasaccepted and presented at at the 17th European Symposium on Research inComputer Security ndash ESORICSrsquo12 [141]

Given the nature of health data privacy of eHealth systems is of prime im-portance An eHealth system must enforce that users remain private evenif they are bribed or coerced to reveal themselves or others Consider ega pharmaceutical company that bribes a pharmacist to reveal information

156 Projects and Grants in 2012

which breaks a doctorrsquos privacy In this paper we identify and formal-ize several new but important privacy notions on enforcing doctor privacyThen we analyze privacy of a complicated and practical eHealth protocolOur analysis shows to what extent these properties as well as propertiessuch as anonymity and untraceability are satisfied by the protocol Finallywe address the found ambiguities resulting in privacy flaws and proposesuggestions for fixing them

Publications The project resulted in the following publication in 2012[141]

Games for Modelling and Analysis of SecurityAcronym GMASecReference FNRndashAFR PHD-09-082PI Prof Dr Sjouke MauwFunding FNRndashAFRBudget 140000eBudget UL 140000eDuration 2009-11-01 ndash 2013-10-31

Members Sjouke Mauw Matthijs Melissen Wojciech Jamroga Leon vander Torre

Domain(s) formal methods game theory security imperfect informationgames verification model checking

Partner(s)

bull Universite Libre de Bruxelles Belgium

bull Colorado State University USA

bull GAMES Network

Description Game theory models the strategic interaction among vari-ous agents assuming each of the agents strives to increase his own pay-offSuch an interaction frequently occurs in security problems Examples arethe interaction between the attacker of a system and its defender or the in-teraction between two possibly dishonest participants in a security protocolTherefore game theory is a particularly relevant tool in the field of security

The GMASec project is executed in the context of the SndashGAMES projectand is a joint project of the SaToSS group headed by Prof Sjouke Mauwand the ICR group headed by Prof Leon van der Torre

42 Grants 157

Results A paper lsquoFairness in Non-Repudiation Protocolsrsquo [315] was pub-lished in the Proceedings of the 7th International Workshop on Security andTrust Management (STM) In this paper we indicate two problems withthe specifications of fairness that are currently used for the verification ofnon-repudiation and other fair-exchange protocols The first of these prob-lems is the implicit assumption of perfect information The second problemis the possible lack of effectiveness We solve both problems in isolation bygiving new definitions of fairness but leave the combined solution for furtherwork Moreover we establish a hierarchy of various definitions of fairnessand indicate the consequences for existing work

Publications The project resulted in the following publication in 2012[315]

Security Analysis Through AttackndashDefense TreesAcronym SADTReference PHD-09-167PI Prof Dr Sjouke MauwFunding FNR-AFR PhDBudget 141968eBudget UL 141968eDuration 2010-01-01 ndash 2013-12-31

Members Sjouke Mauw Patrick Schweitzer Barbara Kordy Sasa Radomirovic

Domain(s) security formal methods attack trees defense trees attack-defense trees security assessment

Partner(s)

bull Telindus Luxembourg

bull Sintef Norway

bull TXT e-solutions Italy

bull Cybernetica Estonia

bull EDF France

bull Lucerne University of Applied Sciences and Arts

Description The project Security Analysis Through AttackndashDefense Trees(SADT) is part of the ATREES project It aims to extend and unify at-tack trees introduced by Bruce Schneier in 1999 The extension of attack

158 Projects and Grants in 2012

trees will be achieved by adding defensive measures to attack trees to createAttackndashDefense Trees (ADTrees) This will allow security analysts to in-clude countermeasures into their analysis The unification will be achievedby developing one coherent formal framework for ADTrees This unificationwill facilitate the development of a software tool This tool will encompassmost existing attack tree approaches using only a single formalism

More concretely we will define a unified language for ADTrees introduceseveral semantics arising from different mathematical disciplines and alreadyexisting attack tree approaches and create a software tool that supportsthe work of security analysts With the help of case studies provided bythe several industry partners different use cases will be examined This willallow us to tailor and refine the language and semantics It will also help usto improve the usability of the software tool

The SADT project is a joint research project of the Interdisciplinary Centrefor Security Reliability and Trust (SnT) and SaToSS

Results In 2012 we published two journal articles and presented our workat one international conference The first journal article [258] lays the foun-dation of the ADTrees presents the results of the previous years The secondone [254] is an extended case study on how to apply the methodology AtICISCrsquo12 we presented our research on an informal and a correspondingformal way of how to use ADTrees for quantitative analysis

Publications The project resulted in following publications in 2012 [258][254]

Secure and Private Location Proofs Architecture and Designfor Location-Based ServicesAcronym SECLOCReference 794361PI Prof Dr Sjouke MauwFunding FNR-AFR PhDBudget 109137eBudget UL 109137eDuration 2010-08-01 ndash 2013-07-31

Members Sjouke Mauw Xihui Chen Jun Pang Gabriele Lenzini

Domain(s) security and privacy location based services location proofsformal verification trustworthy services security protocols

Partner(s) itrust Consulting Luxembourg

42 Grants 159

Description Location-based services are rapidly growing as mobile net-works become increasingly pervasive and the use of mobile devices is gettingmore popular Location-based applications make use of the physical loca-tion of the mobile device to provide services that are customized to thatlocation To be effective location-based services need trustworthy (secureand private) positioning data this depends upon the technology the com-ponents and the communication protocols employed for service compositionand provision For this reason researcher effort has been devoted to ad-dressing the problem of how to certify a physical location and of how toensure that location information is secure eg in term of data integritynon-transferability unforgeability and non-repudiation Meanwhile usershave their privacy concerns about how their location proofs are used egthey want to control when and to whom they need to present such proofs(anonymity) or they do not want a service provider to trace them

Both security and privacy are essential in the development of location proofsfor location-based services While in the literature most researchers onlyconsider security or privacy in isolation we will address the problem ofhow to securely provide a userrsquos location while adhering to the need-to-know principle for all other involved parties thereby satisfying also privacyrequirements of the users

We approach this challenge by analyzing the concepts and requirements forsecurity and privacy in a location proof management system We aim at anarchitecture addressing both security and privacy requirements We will de-sign securitycryptographic protocols which can be used as building blocksin implementing such architecture for a concrete application domain Thecorrectness of the developed protocols is guaranteed through formal verifi-cation At last an experimental system based on the proposed architectureand protocols will be built to validate our solutions wrt the security andprivacy requirements identified

Results In 2012 we have four international conference papers accepted andone journal paper submitted

bull we design a new electronic toll pricing system based on group signa-tures This paper has been published and presented in ARESrsquo12 [216]

bull we propose a post-hoc analysis on location privacy in electronic pricingsystems [255] This paper is co-authored with David Fonkwe and hasbeen presented in DPMrsquo12

bull we propose a new method to construct and compare usersrsquo mobilityprofiles [256] This paper is co-authored by Ran Xue and has beenaccepted by SACrsquo13

160 Projects and Grants in 2012

bull we measure usersrsquo query privacy when query dependency is taken intoaccount and propose a new anonymization algorithm to protect usersrsquoquery privacy [257] This paper has been accepted by CODASPYrsquo13

bull we perform a formal analysis on our electronic toll pricing systemndash GroupETP using ProVerif This paper has been submitted to thejournal JOWUA

Publications The project resulted in the following publications in 2012[216] [255] [256] [257]

Analysis of the SHA-3 Remaining CandidatesAcronym SHARCReference F1R-CSC-AFR-080000PI Prof Dr Alex BiryukovFunding FNR-AFR PostdocBudget 102620eBudget UL NADuration 2010-10-15 ndash 2012-10-14

Members Gaetan Leurent

Domain(s) Cryptography Secret Key Hash Functions CryptanalysisSHA-3

Partner(s) NA

Description This project is about the analysis of hash functions andwill be closely related to the SHA-3 competition currently run by NISTIn cryptography a hash function is a public function with no structuralproperties It is an essential primitive in modern cryptography used inmany protocols and standards including signatures schemes authenticationcodes and key derivation

Following devastating attacks against many widely used hash functions (in-cluding MD4 MD5 and SHA-1) NIST organized the SHA-3 competition toselect and standardize a new hash function This competition is similar tothe AES competition held in 1998-2000 and attracts worldwide attentionwith a large effort underway to assess the security of the candidates Duringthis project we will study the application of known cryptanalysis techniquesto the new designs submitted for the SHA-3 competition and try to developnew dedicated techniques tailored to some of the SHA-3 candidates

Results The paper ldquoPractical Partial-Collisions on the Compression Func-

42 Grants 161

tion of BMWrdquo is accepted for presentation at the 18th IACR Workshop onFast Software Encryption (FSE 2011)

Publications NA

Dynamic and Composite Service-Oriented Architecture Secu-rity TestingAcronym DYNOSTReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2010-10-01 ndash 2013-09-30

Members Alexandre Bartel PhD

Domain(s) Dynamic adaptive systems andoid security access-control pol-cies permission-based architecture Model-driven engineering

Partner(s) NA

Description Initially DYNOST dealt with rdquoDynamic and Composite Service-Oriented Architecture Security Testingrdquo

Dynamically Adaptive Systems modify their behavior and structure in re-sponse to changes in their surrounding environment and according to anadaptation logic Critical systems increasingly incorporate dynamic adap-tation capabilities examples include disaster relief and space explorationsystems One of the main questions to adress is rdquoHow can we test the secu-rity of such a system which is often seen as a black boxrdquo

As a first step we propose a fault model for adaptation logics which classifiesfaults into environmental completeness and adaptation correctness [1] Sincethere are several adaptation logic languages relying on the same underlyingconcepts the fault model is expressed independently from specific adapta-tion languages Taking benefit from model-driven engineering technologywe express these common concepts in a metamodel and define the opera-tional semantics of mutation operators at this level Mutation is appliedon model elements and model transformations are used to propagate thesechanges to a given adaptation policy in the chosen formalism Preliminaryresults on an adaptive web server highlight the difficulty of killing mutantsfor adaptive systems and thus the difficulty of generating efficient tests

Shift to Android

162 Projects and Grants in 2012

With FNR agreement the project evolved and now focuses much more on thesecurity of the Android software stack still keeping the dynamic adaptationaspect in mind Android is a permission based system on top of which runapplication developed by programmers and downloaded from markets byend-users Every application comes with a Manifest file containing a list ofthe permissions the application requires to run

Results We developed a static analysis tools which computes the appro-priate permission set for an application by analyzing its bytecode By com-paring the permission list generated by our tool to the original permissionlist we noticed that a non-negligible part of Android applications are over-privileged they do not respect the principle of least privilege

Publications One publication in 2011 [312]

A Testing Framework for Large-Scale ApplicationsAcronym PeerunitReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2011-01-15 ndash 2014-01-15

Members Jorge Meira (PhD)

Domain(s) NA

Partner(s) Federal University of Parana Brazil

Description The aim of this project is to develop a highly scalable testingarchitecture for large-scale systems This project has three main objectives

bull To design a scalable testing synchronization algorithm to execute large-scale tests This algorithm will be incorporated to the PeerUnit archi-tecture to test any kind of large-scale application besides P2P

bull To design a highly scalable and automatic oracle approach to vali-date large-scale tests This approach will be also incorporated to thePeerUnit architecture

bull To test popular large-scale systems (eg Hadoop Hive FreePastry)and to validate our algorithm and oracle approach Tests can be exe-cuted in an incremental schedule from a less complex scenario to a morecomplex one First we start testing simple applications in small-scale

42 Grants 163

(eg distributed word count) Then we test the same application inlarge-scale Finally we test a complex large-scale application (egHive data warehouse architecture)

Results The student has started his PhD this year (January 2011) and isfinishing his basic formation that is part of the Brazilian regulations to getthe degree This is predicted in the co-joint agreement In this formationthe student must fulfil thirty six (36) credits in taught courses which ingeneral takes 12-18 months The student will finish by December 2011 Inresearch the student is finishing his first paper and is already mastering thelarge-scale environment (ie Grid5000) that is going to be used throughoutthe project His findings are interesting and it is expected at least twoconference paper in the following couple of months

Publications NA

Selected Problems in Executable ModelingAcronym SPEMReference PHD-09-084PI Prof Dr Pierre KelsenFunding FNR-AFR PhDBudget NABudget UL NADuration 2009-11-15 ndash 2012-11-15

Members Moussa Amrani and Nuno Amalio

Domain(s) Model-Driven Engineering Domain-Specific Modeling Lan-guages Structural and Behavioural Specification Structural and BehavioralSemantics Executability

Partner(s) NA

Description Model-Driven Engineering considers models as first-class en-tity in the development process In this way developers deal only withmodels which are used at the required level of abstraction for each taskthey need to perform to finally generate actual code on a given platform

Transformations can also be modeled Transformations are the Model-Driven Engineering tool that allow one to make models change evolve to fi-nally compute something Transformation Languages can be classified in twotrends object-oriented languages and rule-based languages Each of thempresent some strengths but comes with some complications when dealingwith huge models and or huge transformations

164 Projects and Grants in 2012

The Model-Driven Engineering approach gained maturity over the yearsand started to be used for safety-critical and embedded softwares whereformal verification plays a key role in the validation of applications Formalverification could be performed either by model-checking exhaustively theexecution state space or by theorem-proving assertions and properties aboutthe execution states But to be able to use such techniques formal semanticsof transformation languages must be precisely specified

This PhD has three goals

1 Define the semantics of a transformation language

2 Equip a transformation language with the ability to define contractswhich are an abstract and adequate way of defining behavior withoutgoing into implementation details

3 Apply theorem-proving techniques to formally verify models and trans-formations against dynamic properties

Results Since the PhD started the last year the results are just comingThe results basically follows the first workpackages defined in the Afr pro-posal It is also important to mention participation in conferences and paperreview for a PhD

State of the Art in Model-Driven Engineering This year was largelydedicated to study the existing techniques and tools for structural andbehavioral modeling A Technical Report will be soon published onbehalf of the LassyCsc adressing these points and completed withthe graph- based tools

Semantics Specification of an Object-Oriented Transformation LanguageAn important result regarding the development of formal verificationtechniques over Domain-Specific Modeling Languages is the formalspecification of the semantics of such languages It is known to bea hard task but it is a necessary step towards formal and trustableverification In the next few months an article paper will be publishedsoon

Conference Summer School Participation The candidate participatedto one important conference in the domain namely the European Con-ference on Modeling Foundations and Applications (Ecmfa 2010) andthe First Summer School on Domain-Specific Modeling Theory andPractice (Dsm- Tp 2010)

Publications NA

42 Grants 165

422 Workshop amp Conferences (FNR Accompanying Mea-sures)

Building the Skeleton of a SO schedulerAcronym SandpileReference FNR11AM2c32PI Prof Dr Pascal BouvryFunding FNR - AM2cBudget 634900Budget UL NADuration 2012-03-01 ndash 2012-05-01

Members Juan Luis Jimenez Laredo

Domain(s) Optimization GridCloud Computing Load balancing schedul-ing

Partner(s) NA

Description This project aims at designing and implementing the skele-ton of an organic scheduler for GridCloud Computing so that it acquiresautonomic properties such as self-organization of tasks or self-healing underresource failures To cope with these goals the working hypothesis relieson the Self-Organizing Criticality theory (SOC) that describes a property ofcomplex systems and consists in a critical state formed by self-organizationat the border of order and chaos More specifically we will extend a SOCsystem so-called sandpile The sandpile is a nature-inspired cellular automa-ton where piles of sand are accumulated and balanced in a self-organized wayalong the lattice The metaphore here is that tasks can be seen as grainsof sand and resources as cells in the lattice Given the decentralized natureof resources in GridCloud Computing systems we propose a Peer-to-Peeragent-based system as the underlying infrastructure to construct the cel-lular automaton (ie agents represent cells with a neighbourhood definedby the Peer-to-Peer overlay network) In order to study the viability ofthe approach the initial objective of the project is to reduce the schedulelength (or makespan) of scientific directed acyclic graph (DAG) in whichthe destination group in Innsbruck has an extensive expertise and after-wards compare results against state-of-the-art approaches Here it has tobe noted that there are two divergent trends in the literature when ap-proaching DAG scheduling On the one hand the fittest approaches assume

166 Projects and Grants in 2012

an unrealistic accurate knowledge on the problem structure On the otherhand real middleware frameworks use much simpler heuristics such as justin-time planning or round robin Our approach aims to bridge this gap andproposes the skeleton of a scheduler for a do-as-you-like scheduling ie bymodifing simple rules the approach can be tuned from a non-clairvoyant to aperfectly-informed scheduler Not only this we aim to take advantage of thepotentials of the approach and redefine the optimization objective to meetthe energy-aware criteria described in the FNR Core GreenIT project forwhich the candidate Dr Jimenez Laredo is working As can be graspedfrom this summary the ambitious nature of the project will require of amulti-disciplinary set of experts We find that both organizations Inns-bruck and Luxembourg account with complementary people to bring theproject to success with Luxembourg having a stronger focus on energy op-timization and green computing and Innsbruck on middleware developmentand scientific workflows analysis The candidate Juan Luis Jimenez Laredofits especially well in this project given his expertise on the aforementionedareas that can be assessed by referring to some of his publications either inSOC or agent-based decentralized optimization

Results In this project we have designed and developed an on-line anddecentralized scheduler based on a Self-Organized Criticallity Model calledsandpile in which every computing resource executes a sandpile agent Thesource-code with the simulator has been released as open-source and is avail-able at httpssandpile-schedulergooglecodecom published under GPL v3public license Additionally a first publication has been already publishedin the Workshop of Soft-Computing Techniques in Cluster and Grid Com-puting Systems (httpalturlcom33vo3) from which an extended version isexpected to be published in Cluster Computing (2010 Impact Factor 0679)(httpalturlcomxkzuh) The whole text of the publication is available forchecking at httpalturlcomcypi6 This report presents the problem def-inition the main points of the followed methodology and a summary of theachieved results

Publications NA

Chapter 5

CSC Representation

51 Conferences

The following local events have been organized during 2012

bull IFIP AIMS 2012 Luxembourg Luxembourg Radu State

ndash Description 6th International Conference on Autonomous In-frastructure Management and Security (AIMS 2012) June 04-08 2012 University of Luxembourg Luxembourg

bull 13th International Workshop on Computational Logic in Multi-AgentSystems (2012-08-27 ndash 2012-08-28) Montpellier France Leon van derTorre

bull Capture The Flag competition 2012 (2012-10-23 ndash 2012-10-25) Lux-embourg Luxembourg Piotr Kordy Matthijs Melissen Sasa RadomirovicPatrick Schweitzer Hugo Jonker Andrzej Mizera Yann Le Corre aswell as a former member of the SaToSS group Dr Ton van Deursen

ndash Description In 2012 the hackbraten team headed by Piotr Ko-rdy represented the SaToSS group at the Capture the Flag Com-petition co-located with the Hacklu conference Capture TheFlag is a competition where registered teams solve computer chal-lenges within limited time It is part of the Hacklu conferenceTopics of the challenges include (among others) web security

168 CSC Representation

cryptography reverse engineering and forensic Example chal-lenges include finding vulnerabilities in the servers exploitingbuffer overflows in binary files or reverse engineering javascriptcode embedded in a pdf file The hackbraten team was ranked24th amongst 575 teams registered for the event

bull Workshop on Dynamics of Argumentation Rules and Conditionals(2012-04-02 ndash 2012-04-03) Luxembourg Luxembourg Richard BoothEmil Weydert Tjitze Rienstra (organisers)

bull European Conference on Artificial Intelligence (2012-08-27 ndash 2012-08-31) Montpellier France Tjitze Rienstra

bull EVOLVE 2012 International Conference Mexico City Mexico Alexandru-Adrian Tantar Emilia Tantar Pascal BOUVRY (General Chairs)

ndash Description A Bridge between Probability Set Oriented Numer-ics and Evolutionary Computing

bull Interdisciplinary PhD Workshop on Security in eVoting (eVote PhDDays 2012) (2012-10-14 ndash 2012-10-15) Luxembourg Luxembourg HugoJonker (main organizer)

ndash Description In 2012 the University of Luxembourg hosted the5th installment of the Interdisciplinary PhD Workshop on Se-curity in eVoting The goal of this workshop series is to fosterunderstanding and collaboration between the various disciplinesworking on e-voting as well as to provide an informal platformfor young researchers to present results discuss research ideasand research directions with their peers and expand their net-works There were 14 participants from 10 institutes across Eu-rope What makes this workshop series special is that it is trulyinterdisciplinary where PhD students from legal backgroundsare joined by PhD students with computer science and cryptog-raphy backgrounds and by social scientists

bull GreenGEC Workshop Genetic and Evolutionary Computation Con-ference Philadelphia USA Pascal Bouvry Alexandru-Adrian TantarEmilia Tantar Bernabe Dorronsoro Gregoire Danoy

ndash Description Green and Efficient Energy Applications of Geneticand Evolutionary Computation

bull The 5th Workshop on Logical Aspects of Multi-Agent Systems (LAMASrsquo2012)(2012-06-05 ndash 2012-06-05) Valencia Spain Wojciech Jamroga (co-organizer) Matthijs Melissen (co-organizer)

51 Conferences 169

ndash Description LAMAS is a scientific network spanning an inter-disciplinary community of researchers working on logical aspectsof MAS from the perspectives of logic artificial intelligence com-puter science game theory etc The LAMAS workshop is thepivotal event of the network and it provides a platform for pre-sentation exchange and publication of ideas in all these areasincluding

lowast Logical systems for specification analysis and reasoning aboutMAS

lowast Modeling MAS with logic-based models

lowast Deductive systems and decision procedures for logics for MAS

lowast Development complexity analysis and implementation of al-gorithmic methods for formal verification of MAS

lowast Logic-based tools for MAS

lowast Applications of logics in MAS

bull Normative Multi-Agent Systems (2012-03-12 ndash 2012-03-16) DagstuhlGermany Leon van der Torre

bull OPTIM 2012 (2012-07-02 ndash 2012-07-06) Madrid Spain Pascal Bou-vry Gregoire Danoy Bernabe Dorronsoro Sebastien Varrette (Work-shop Organisers)

ndash Description Workshop on Optimization Issues in Energy Effi-cient Distributed Systems

bull 20th International Conference on Real-Time and Network Systems(2012-11-08 ndash 2012-11-09) Pont-a-mousson France Nicolas Navet(General Chair)

ndash Description The purpose of the conference is to share ideas ex-periences and informations among academic researchers devel-opers and service providers in the field of real-time systems andnetworks

bull SCCG 2012 Victoria Canada Bernabe Dorronsoro (Workshop Or-ganisers)

ndash Description First International Workshop on Soft ComputingTechniques in Cluster and Grid Computing Systems

bull Summer School on Secure Voting (SecVotersquo2012) (2012-07-16 ndash 2012-07-20) Dagstuhl Germany Hugo Jonker (general chair)

170 CSC Representation

ndash Description The SecVote 2012 summer school covered the foun-dations of secure voting as well as examine recent developmentsin the field of e-voting The school provided a good overview ofwork in voting including design of voting systems social choicecryptography practical experiences practical deployment andauditing There were 27 participants coming from AustraliaBrazil the USA Israel Estonia Poland the UK the Nether-lands Luxembourg Italy and Germany

bull VTP 2012 San Francisco USA Pascal Bouvry Gregoire Danoy Patri-cia Ruiz Julien Schleich Marcin Seredynski (Workshop Organisers)

ndash Description Workshop on VANETs From Theory to Practice

bull Summer School on Verification Technology Systems amp Applications(VTSArsquo2012) (2012-09-03 ndash 2012-09-07) Saarbrucken Germany JunPang (coordinator)

ndash Description The fourth summer school on verification technol-ogy systems amp applications takes place at Max Planck Institutefor Informatics at Saarbrucken Germany from September 03rdto 7th 2012 All three aspects verification technology systems ampapplications strongly depend on each other and that progress inthe area of formal analysis and verification can only be madeif all three aspects are considered as a whole Five speakersArmin Biere Ahmed Bouajjani Jurgen Giesl David Monniauxand Carsten Schurmann stand for this view in that they repre-sent and will present a particular verification technology and itsimplementation in a system in order to successfully apply theapproach to real world verification problems There were about30 participants for the summer school More information can befound at httpwwwmpi-infmpgdeVTSA12

52 PC and other memberships

bull 26th AAAI Conference on Artificial Intelligence (2012-07-22 ndash 2012-07-26) Toronto Canada Richard Booth (PC member)

bull 25th Australasian Joint Conference on Artificial Intelligence Dec 4-72012 Sydney Australia Richard Booth (PC member)

bull 24th Benelux Conference on Artificial Intelligence Oct 25-26 2012Maastricht Netherlands Richard Booth (PC member)

52 PC and other memberships 171

bull Workshop on Belief Change Nonmonotonic Reasoning and ConflictResolution (2012-08-27 Montpellier France Richard Booth (PC mem-ber)

bull 3rd IIAI International Conference on e-Services and Knowledge Man-agement (2012-09-20 ndash 2012-09-22) Fukuoka Japan Richard Booth(PC member)

bull 13th European Conference on Logics in Artificial Intelligence (2012-09-26 ndash 2012-09-28) Toulouse Franch Richard Booth (PC member)

bull 6th Multi-Disciplinary International Workshop on Artificial Intelli-gence (2012-12-26 ndash 2012-12-28) Ho Chi Minh City Vietnam RichardBooth (PC member)

bull NMR 2012 - 14th International Workshop on Non-Monotonic Rea-soning (2012-06-08 ndash 2012-06-10) Rome Italy Richard Booth (PCmember)

bull NIDISC 2012 (2012-05-21 ndash 2012-05-25) Shanghai China PascalBouvry (Program Chair)

ndash Description 15th International Workshop on Nature InspiredDistributed Computing held in conjunction with the 26th IEEEACMInternational Parallel and Distributed Processing (IPDPS 2012)

bull VTP 2012 (2012-06-25 ndash 2012-06-25) San Francisco USA PAscalBouvry (General Chair)

ndash Description VANETs from Theory to Practice

bull BNAIC 2012 (2012-10-25 ndash 2012-10-26) Maastricht Netherlands Gre-goire Danoy (PC Member)

ndash Description 24th Benelux Conference on Artificial Intelligence

bull ICUMT 2012 (2012-10-03 ndash 2012-10-05) St Petersburg Russia Gre-goire Danoy (PC Member)

bull IEEE MENS 2012 (2012-12-03 ndash 2012-12-07) Anaheim USA GregoireDanoy (PC Member)

ndash Description 4th IEEE International Workshop on Managementof Emerging Networks and Services

bull NIDISC 12 (2012-05-21 ndash 2012-05-25) Shanghai China GregoireDanoy (Publicity Chair)

172 CSC Representation

ndash Description 15th International Workshop on Nature InspiredDistributed Computing held in conjunction with the 26th IEEEACMInternational Parallel and Distributed Processing (IPDPS 2012)

bull SCALSOL 2012 (2012-12-18 ndash 2012-12-18) Changzhou China Gre-goire Danoy (PC Member)

ndash Description The International Workshop on Scalable Solutionsfor GreenIT (SCALSOL) as part of The 12th IEEE InternationalConference on Scalable Computing and Communications (SCAL-COM 2012)

bull SCCG-2012 (2012-11-12 ndash 2012-11-14) Victoria Canada GregoireDanoy (PC Member)

ndash Description Workshop 1st International Workshop on Soft Com-puting Techniques in Cluster and Grid Computing Systems

bull VTP 2012 (2012-06-25 ndash 2012-06-25) San Francisco USA GregoireDanoy (PC Chair)

ndash Description VANETs from Theory to Practice

bull EVOLVE 2012 (2012-08-07 ndash 2012-08-09) Mexico City Mexico Bern-abe Dorronsoto (Program Committee)

ndash Description VOLVE 2012 A bridge between Probability SetOriented Numerics and Evolutionary Computation

bull GECCO 2012 (2012-07-07 ndash 2012-07-11) Philadelphia USA BernabeDorronsoto (Program Committee)

ndash Description ACM International Genetic and Evolutionary Op-timization Conference

bull GreenCom 2012 (2012-11-20 ndash 2012-11-23) Besancon France Bern-abe Dorronsoto (Program Committee)

ndash Description IEEE GreenCom 2012

bull HPMS-ECMS 2012 (2012-05-29 ndash 2012-06-01) Koblenz GermanyBernabe Dorronsoto (Program Committee)

ndash Description 26th European Conference on Modelling and Simu-lation (ECMS 2012) Track on High Perfomance Modelling andSimulation

52 PC and other memberships 173

bull IC3 2012 (2012-08-06 ndash 2012-08-08) Noida India Bernabe Dorronsoto(Program Committee)

ndash Description The Fifth International Conference on Contempo-rary Computing

bull MAEB 2012 (2012-02-08 ndash 2012-02-10) Albacete Spain BernabeDorronsoro (Program Committee)

ndash Description VIII Congreso Espanol sobre Metaheurısticas Al-goritmos Evolutivos y Bioinspirados

bull MENS-GLOBECOM 2012 Anaheim California USA Bernabe Dor-ronsoto (Program Committee)

ndash Description The 4th IEEE International Workshop on Manage-ment of Emerging Networks and Services (IEEE MENS 2012) inconjunction with IEEE GLOBECOM 2012

bull MICAI 2012 (2012-10-27 San Luis Potosı Mexico Bernabe Dor-ronsoto (Program Committee)

ndash Description The 11th Mexican International Conference on Ar-tificial Intelligence

bull NostraDamus 2012 Ostrava Czech Republic Bernabe Dorronsoto(Program Committee)

ndash Description The NostraDamus conference

bull P2PAMN track at 3PGCIC 2012 (2012-11-12 ndash 2012-11-14) VictoriaCanada Bernabe Dorronsoto (Program Committee)

ndash Description The 7th International Conference on P2P ParallelGrid Cloud and Internet Computing (3PGCIC-2012) track onP2P Ad-hoc and Mobile Networking

bull SCALSOL-SCALCOM 2012 (2012-12-18 ndash 2012-12-18) ChangzhouChina Bernabe Dorronsoro (Program Committee)

ndash Description The International Workshop on Scalable Solutionsfor GreenIT (SCALSOL) as part of The 12th IEEE InternationalConference on Scalable Computing and Communications (SCAL-COM 2012)

174 CSC Representation

bull WASI-CACIC 2012 ndash 2012-10-12) Bahıa Blanca Argentina BernabeDorronsoto (Program Committee)

ndash Description Workshop de Agentes y Sistemas Inteligentes (WASI)- XVIII Congreso Argentino de Ciencias de la Computacion (CACIC)

bull LAMAS 2012 (2012-06-05 ndash 2012-06-05) Valencia Spain WojciechJamroga (PC Co-chair)

ndash Description 5th Workshop on Logical Aspects of Multi-AgentSystems

bull The Twenty-Sixth Conference on Artificial Intelligence (AAAI-12) (2012-07-22 ndash 2012-07-26) Toronto Canada Wojciech Jamroga (PC Mem-ber)

ndash Description The purpose of the AAAI-12 conference is to pro-mote research in AI and scientific exchange among AI researcherspractitioners scientists and engineers in related disciplines

bull AAMAS 2012 (2012-06-04 ndash 2012-06-08) Valencia Spain WojciechJamroga (PC Member)

ndash Description The AAMAS conference series was initiated in 2002in Bologna Italy as a joint event comprising the 6th Interna-tional Conference on Autonomous Agents (AA) the 5th Interna-tional Conference on Multiagent Systems (ICMAS) and the 9thInternational Workshop on Agent Theories Architectures andLanguages (ATAL)

Subsequent AAMAS conferences have been held in MelbourneAustralia (July 2003) New York City NY USA (July 2004)Utrecht The Netherlands (July 2005) Hakodate Japan (May2006) Honolulu Hawaii USA (May 2007) Estoril Portugal(May 2008) Budapest Hungary (May 2009) Toronto Canada(May 2010) Taipei Taiwan (May 2011) AAMAS 2012 will beheld in June in Valencia Spain AAMAS is the largest and mostinfluential conference in the area of agents and multiagent sys-tems the aim of the conference is to bring together researchersand practitioners in all areas of agent technology and to providea single high-profile internationally renowned forum for researchin the theory and practice of autonomous agents and multiagentsystems

AAMAS is the flagship conference of the non-profit InternationalFoundation for Autonomous Agents and Multiagent Systems (IFAA-MAS)

52 PC and other memberships 175

bull BNAIC 2012 (2012-11-25 ndash 2012-11-26) Maastricht the NetherlandsWojciech Jamroga (PC Member)

ndash Description The 24th Benelux Conference on Artificial Intelli-gence (BNAIC 2012) is organised by the Department of Knowl-edge Engineering (DKE) of Maastricht University (UM) BNAIC2012 is organised under the auspices of the Benelux Associa-tion for Artificial Intelligence (BNVKI) and the Dutch ResearchSchool for Information and Knowledge Systems (SIKS)

bull CLIMA XIII (2012-08-27 ndash 2012-08-28) Montpellier France WojciechJamroga (PC Member)

ndash Description 13th International Workshop on Computational Logicin Multi-Agent Systems The purpose of the CLIMA workshops isto provide a forum for discussing techniques based on computa-tional logic for representing programming and reasoning aboutagents and multi-agent systems in a formal way More informa-tion about the series os CLIMA workshops including its previouseditions and publications can be found here

The 13th edition of CLIMA will be affiliated with ECAIrsquo12 andwill take place in Montpellier France between the 27th and 28thof August 2012

bull ECAI 2012 (2012-08-27 ndash 2012-08-31) Montpellier France WojciechJamroga PC Member()

ndash Description ECAI the biennial European Conference on Artifi-cial Intelligence is the leading conference on Artificial Intelligencein Europe

ECAI 2012 the 20th conference in this series will be jointly or-ganized by the European Coordination Committee for ArtificialIntelligence (ECCAI) the French Association for Artificial In-telligence (AFIA) and Montpellier Laboratory for InformaticsRobotics and Microelectronics (LIRMM)

LIRMM is a research laboratory supervised by both MontpellierUniversity (Universite Montpellier 2) and the French NationalCenter for Scientific Research (CNRS)

ECAI 2012 will give researchers from all over the world the possi-bility to identify important new trends and challenges in all sub-fields of Artificial Intelligence and it will provide a major forumfor potential users of innovative AI techniques

bull EUMASrsquo12 (2012-12-18 ndash 2012-12-19) Dublin Ireland Wojciech Jam-roga (PC Member)

176 CSC Representation

ndash Description Research on multi-agent systems has shed light ontoand provided solutions to many real life problems As the fieldmatures academics and industrialists benefit from European-based forums where state-of-the-art and state-of-the-practice arepresented and discussed The EUMAS series of events have servedthis purpose and in this 10th edition (following Maastricht TheNetherlands 2011 Paris France 2010 Aiya Napa Cyprus 2009Bath England 2008 Hammamet Tunisia 2007 Lisbon Portu-gal 2006 Brussels Belgium 2005 Barcelona Spain 2004 Ox-ford England 2003) we shall carry on in this tradition The EU-MAS series of workshops is primarily intended as a European fo-rum at which researchers and those interested in activities relat-ing to research in the area of autonomous agents and multi-agentsystems can meet present (potentially preliminary) research re-sults problems and issues in an open and informal but academicenvironment

bull ICAART 2012 (2012-02-06 ndash 2012-02-08) Vilamoura Portugal Woj-ciech Jamroga (PC Member)

ndash Description The purpose of the 5th International Conference onAgents and Artificial Intelligence (ICAART) is to bring togetherresearchers engineers and practitioners interested in the theoryand applications in these areas Two simultaneous but stronglyrelated tracks will be held covering both applications and currentresearch work within the area of Agents Multi-Agent Systemsand Software Platforms Distributed Problem Solving and Dis-tributed AI in general including web applications on one handand within the area of non-distributed AI including the moretraditional areas such as Knowledge Representation PlanningLearning Scheduling Perception and also not so traditional ar-eas such as Reactive AI Systems Evolutionary Computing andother aspects of Computational Intelligence and many other areasrelated to intelligent systems on the other hand

53 Doctoral board

bull Cynthia Wagner University of Luxembourg Luxembourg Luxem-bourg March 2012 2012 Thomas Engel

bull Shaonan Wang University of Luxembourg Luxembourg LuxembourgApril 2012 Thomas Engel

54 Guests 177

bull Sheila Becker University of Luxembourg Luxembourg LuxembourgOctober 2012 2012 Thomas Engel

bull Sheila Becker UL Luxembourg Luxembourg October 2012 2012Yves Le Traon

bull Frederic Garcia Becerro University of Luxembourg Luxembourg Lux-embourg March 2012 2012 Bjorn Ottersten Thomas Engel

bull Thorsten Ries University of Luxembourg Luxembourg LuxembourgOctober 2012 2012 Thomas Engel

54 Guests

Invited Researchers

bull Prof Dr Andreas Albers (Goethe University of Frankfurt) October2012 Hugo Jonker Reason Research collaboration and presentation

bull Dr Dragos Horvath (Louis Pasteur University Strasbourg) October2012 Alexandru-Adrian Tantar Reason collaboration on samplingalgorithms

bull Dr Marek Bednarczyk (Polish Academy of Sciences Gdansk) May2012 Wojciech Jamroga Reason Research collaboration and pre-sentation

bull Dr Fei Gao (Norwegian University of Science and Technology (NTNU))October 1-12 2012 Pascal Bouvry Reason Collaboration on parallelevolutionary computing

bull Prof Dr Joanna Kolodziej (Cracow University of Technology) June2012 Pascal Bouvry Reason Collaboration on green computing re-search activities

bull Prof Dr Pierre Manneback (University of Mons) April 2012 PascalBouvry Reason Parallel computing research collaboration

bull Prof Dr Malgorzata Sterna (Poznan University of Technology) Jan-uary 2012 Pascal Bouvry Reason Collaboration on scheduling re-search activities

bull Dr Alexey Vinel (Tampere University of Technology Finland) august2012 Pascal Bouvry Reason Collaboration on wireless networksactivities

178 CSC Representation

bull Dr Nils Bulling (Clausthal University of Technology ) April 2012Wojciech Jamroga Reason Research collaboration and presentation

bull Dr Kostas Chatzikokolakis (LIX Ecole Polytechnique amp INRIASaclay) April 2012 Jun Pang Xihui Chen Reason Research col-laboration and presentation

bull Prof Dr Jason Crampton (Royal Holloway University of London)JUly 2012 Barbara Kordy Reason Research collaboration and pre-sentation

bull Dr Cas Cremers (ETH Zurich) August 2012 Sjouke Mauw ReasonResearch collaboration and presentation

bull Mrs Denise Demirel (TU Darmstadt) May 2012 Hugo Jonker Rea-son Research collaboration

bull Mr Andre Deuker (Goethe University of Frankfurt) October 2012Hugo Jonker Reason Research collaboration and presentation

bull Prof Dr Josep Domingo-Ferrer (Universitat Rovira i Virgili Catalunya) October 2012 Sjouke Mauw Barbara Kordy Reason Research col-laboration and presentation

bull Mr Santiago Iturriaga (Universidad de la Republica Uruguay) April1 to June 30 2012 Pascal Bouvry Reason Co-advising his workon parallel multi-objective local search heuristics for multi-objectivescheduling problems

bull Prof Dr Sergio Nesmachnow (Universidad de la Republica Uruguay)14-18 May 2012 Pascal Bouvry Reason Co-advising his work on par-allel multi-objective local search heuristics for multi-objective schedul-ing problems

bull Dr Alexandre Dulaunoy (CIRCLSMILE Luxembourg) December2012 Gabriele Lenzini Barbara Kordy Reason Research discussionand presentation

bull Prof Dr Eduardo Ferme (University of Madeira Portugal) Nov 1-22012 Reason ICR-ILIAS talk research collaboration

bull Ms Weili Fu (Free University of Bolzano and Technical University ofDresden ) July 2012 Sjouke Mauw Barbara Kordy Reason Researchpresentation

bull Dr Flavio Garcia (Radboud University Nijmegen) April 2012 SjoukeMauw Reason Research discussion

54 Guests 179

bull Prof Dr Valentin Goranko (Technical University of Denmark) June2012 Wojciech Jamroga Reason Research collaboration and presen-tation

bull Mr Mohammad Hassan Habibi (ISSL Lab EE Department SharifUniversity of Technology) April 2012 Sjouke Mauw Barbara Kordy Reason Research presentation

bull Prof Dr Lynda Hardman (CWI Amsterdam) December 2012 SjoukeMauw Reason discussion

bull Prof Dr Iyad Rahwan ( Masdar Institute of Science and Technology)May 17-19 2012 ICR-ILIAS Reason attending the defence ceremonyof Yining Wu

bull Mr Oljira Dejene Boru (University of Trento Italy) March - June2012 Dzmitry Kliazovich Reason Master internship

bull Mr Sisay Tadesse (University of Trento Italy) March - June 2012Dzmitry Kliazovich Reason Master internship

bull Prof Dr Tomasz Lipniacki (Institute of Fundamental Technologi-cal Research Polish Academy of Sciences) December 2012 AndrzejMizera Jun Pang Reason CSC-Bio research presentation

bull Dr Yang Liu (National University of Singapore) June 2012 Jun Pang Reason Research collaboration and presentation

bull Dr Madalina Croitoru (University of Montpellier 2) November 26-302012 Reason ICR-ILIASresearch collaboration

bull Mr Artur Meski (Polish Academy of Sciences Warsaw) April 2012Wojciech Jamroga Reason Research presentation

bull Prof Dr Marko Bertogna (University of Modena Italy) June 2012Nicolas Navet Reason Real-time Dependable Systems seminar atLASSY

bull Dr Liliana Cucu-Grosjean (INRIA France) June 2012 Nicolas NavetReason Real-time Dependable Systems seminar at LASSY

bull Dr Rob Davis (University of York UK) June 2012 Nicolas NavetReason Real-time Dependable Systems seminar at LASSY

bull Mr Stephan Neumann (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration and presentation

bull Dr Evangelos Evangelos (University of the Aegean) January 2012Sasa Radomirovic Reason Research collaboration and presentation

180 CSC Representation

bull Mrs Maina Olembo (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration

bull Prof Dr Andrei Tchernykh (CICESE research center EnsenadaMexico) October 2012 Pascal Bouvry Reason Collaboration andcontribution to FNR CORE GreenIT project

bull Prof Dr Pierre-Etienne Moreau (INRIA-Nancy France) Yves LeTraon Reason Collaboration

bull Prof Dr Selwyn Piramuthu (University of Florida) June-July 2012SaToSS group Reason visiting professor at SnT and SaToSS group

bull Prof Dr Henry Prakken (Utrecht University) May 2012 Leon vander Torre Reason Attending the defence ceremony of Yining Wu

bull Dr Hongyang Qu (Oxford University) November 2012 Jun Pang Reason Research collaboration and presentation

bull Dr Sasa Radomirovic (ETH Zurich) November 2012 Sjouke MauwBarbara Kordy Reason Research collaboration and presentation

bull Dr Rolando Trujillo Rasua (Universitat Rovira i Virgili Catalunya) October 2012 Sjouke Mauw Barbara Kordy Reason Researchcollaboration and presentation

bull Dr MohammadReza Mousavi (Eindhoven University) January 2012Jun Pang Reason Research collaboration and presentation

bull Prof Dr Olivier Roux (Ecole Centrale de Nantes) April 2012 SjoukeMauw Jun Pang Reason Research collaboration and presentation

bull Prof Dr Samir Chopra (Brooklyn College of the City University ofNew York USA) Nov 12-16 2012 Reason talk research collabora-tion

bull Dr Samy Passos (Universidade Federal do Ceara) Jul 10 - Aug 122012 Reason ICR-SnT talk research collaboration

bull Mr Maciej Szreter (Polish Academy of Sciences Warsaw) April 2012Wojciech Jamroga Reason Research collaboration

bull Ms Iuliia Tkachenko (University Bordeaux 1) July 2012 Sjouke MauwBarbara Kordy Reason Research presentation

bull Dr Devrim Unal (TUBITAK-BILGEM UEKAE Turkey ) November2012 Sjouke Mauw Barbara Kordy Reason Research presentationand discussion

55 Visits and other representation activities 181

bull Dr Matthias Thimm (Universitat Koblenz) June 18-19 2012 ICR-ILIAS Reason talk research collaboration

bull Dr Harm van Beek (Netherlands Forensic Institute) June 2012 SjoukeMauw Reason Research collaboration and presentation

bull Mr Andre van Cleeff (University of Twente) March 2012 SjoukeMauw Reason Research collaboration and presentation

bull Dr Melanie Volkamer (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration

bull Dr Melanie Volkamer (TU Darmstad CASED) October 2012 HugoJonker Reason invited lecture

bull Mr Pim Vullers (Radboud University Nijmegen) February 2012 SjoukeMauw Sasa Radomirovic Reason Research collaboration and pre-sentation

bull Dr Roland Wen (University of New South Wales Australia ) Septem-ber 2012 Hugo Jonker Reason Research collaboration

bull Dr Jan Willemson (Cybernetica Estonia) May 2012 Barbara KordyPatrick Schweitzer Sjouke Mauw Reason Research collaborationand presentation

bull Dr Zhenchang Xing (National University of Singapore) June 2012Jun Pang Reason Research collaboration and presentation

55 Visits and other representation activities

bull Richard Booth Visited organization Katholieke Universiteit Leuven(Oct 18-23 2012) Reason Research collaboration

bull Martin Caminada Visited organization (June 1-2 2012) Reasonparticipation in COST AT coordination network on behalf of ICR

bull Wojciech Jamroga Visited organization (6-8062012) Reasonconference participation contributed talk poster presentation

bull Wojciech Jamroga Visited organization Polish Academy of Sciences(2minus 4042012) Reason work on a joint paper

bull Wojciech Jamroga Visited organization Technical University of Den-mark (19minus 21042012) Reason Research collaboration and presen-tation

182 CSC Representation

bull Wojciech Jamroga Visited organization Clausthal University ofTechnology (20minus 25022012) Reason Research collaboration

bull Wojciech Jamroga Visited organization Polish-Japanese IT Institute(31012012) Reason Research collaboration

bull Wojciech Jamroga Visited organization International PhD Programme(29 minus 30012012) Reason Meeting of the International PhD Pro-gramme project overview talk

bull Wojciech Jamroga Visited organization Polish Academy of Sciences(25minus 26062012 ) Reason supervision of a PhD student

bull Wojciech Jamroga Visited organization LAMAS 2012 (4minus5062012)Reason workshop organization

bull Wojciech Jamroga Visited organization Dagstuhl seminar on Nor-mative Multi-Agent Systems (14032012) Reason seminar visit

bull Wojciech Jamroga Visited organization Trento University (28 minus29052012) Reason Research collaboration and presentation

bull Hugo Jonker Visited organization Cyberwarfare thinktank (09112012)Reason Founding meeting Cyberwarfare thinktank

bull Hugo Jonker Visited organization Privacy Lab (03042012) Rea-son Privacy Lab opening

bull Hugo Jonker Visited organization Digital Enlightenment Forum(18minus 19062012) Reason networking event

bull Hugo Jonker Visited organization TDL Consortium (05102012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization TDL Consortium (23012012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization TDL Consortium (12062012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization Thales Research amp Technology(29112012) Reason Attack Trees workshop research collaboration

bull Hugo Jonker Visited organization VeriMag (11minus 13112012) Rea-son Research collaboration

bull Dzmitry Kliazovich Visited organization GREENET project meet-ing (19-09-2012 - 21-09-2012) Reason Initial Training Network onGreen Wireless Networks - Seminar presentation

55 Visits and other representation activities 183

bull Dzmitry Kliazovich Visited organization Koc Universtiy - COSTIC0804 Meeting (05-10-2012 - 07-10-2012) Reason Presentation -GreenCloud A Packet-level Simulator of Energy-aware Cloud Com-puting Data Centers

bull Dzmitry Kliazovich Visited organization University of Trento (17-11-2012) Reason Seminar presentaiton - Energy-Efficient Design inCloud Computing Communication Systems

bull Barbara Kordy Visited organization University of Twente (05 minus06112012) Reason FP7 TREsPASS project kick off meeting

bull Barbara Kordy Visited organization LORIA (15052012) ReasonResearch collaboration and presentation

bull Barbara Kordy Visited organization Royal Holloway University ofLondon (01032012) Reason Research collaboration and presenta-tion

bull Barbara Kordy Visited organization SINTEF (16 minus 19042012)Reason Research collaboration

bull Barbara Kordy Visited organization NTNU (16minus19042012) Rea-son Invited talk

bull Barbara Kordy Visited organization Thales Research amp Technol-ogy (29112012) Reason Keynote presentation at the Attack Treesworkshop and collaboration

bull Simon Kramer Visited organization Institute of Mathematical Sci-ences (0101minus 28022012) Reason invited research visit

bull Juan Luis Jimenez Laredo Visited organization University of Inns-bruck (01-03-2012 to 05-05-2012) Reason Research visit in the con-text of the AM2c FNR11AM2c32Building the Skeleton of a SOscheduler

bull Yves Le Traon Visited organization 7th International Workshopon Automation of Software Test (AST 2012) (June 2012) ReasonKeynote on Security testing and software engineering challenges

bull Yves Le Traon Visited organization 8th International Summer Schoolon Training And Research On Testing (TAROT 2012) (July 2012)Reason Invited Keynote on Security Testing

bull Yves Le Traon Visited organization LCIS-ESISAR INPG (23-25August 2012) Reason Attract PhD students build collaboration onsensor networks and testing

184 CSC Representation

bull Yves Le Traon Visited organization INRIA-IRISA (August Novem-ber ) Reason Continuous collaboration Project writing seminarsrecruitment of research associates

bull Yves Le Traon Visited organization Microsoft Luxembourg (March2012) Reason Presentation of my group research activities to MS

bull Yves Le Traon Visited organization KIT Karlsruhe (several meetingsper year) Reason Collaboration (EU project PhD co-supervision)

bull Yves Le Traon Visited organization Lip6 - Univ Paris VI (July2012) Reason Collaboration on SPL reverse engineering and testing

bull Yves Le Traon Visited organization Telecom Bretagne (April andJuly 2012) Reason PhD supervision Project proposals writing

bull Llio Humphreys Visited organization Delft University of Technology(18-21 November2012) Reason research visit

bull Llio Humphreys Visited organization Kings College London (28 June2012) Reason research visit

bull Sjouke Mauw Visited organization COST DC ICT (13minus16062012)Reason project meeting

bull Sjouke Mauw Visited organization COST IC1205 (30112012)Reason project meeting

bull Sjouke Mauw Visited organization COST DC ICT (10minus11092012)Reason project meeting

bull Sjouke Mauw Visited organization Digital Enlightenment Forum(18minus 19062012) Reason networking event

bull Sjouke Mauw Visited organization University of Twente (05minus06112012)Reason FP7 TREsPASS project kick off meeting

bull Sjouke Mauw Visited organization Nationaal Instituut voor Crim-inalistiek en Criminologie (NICC) (23012012) Reason Researchcollaboration and presentation

bull Sjouke Mauw Visited organization IFIP WG 112 seminar (04072012)Reason presentation

bull Sjouke Mauw Visited organization STM 2012 (12 minus 14092012)Reason conference visit and presentation

bull Sjouke Mauw Visited organization Thales Research amp Technology(29112012) Reason Attack Trees workshop research collaboration

55 Visits and other representation activities 185

bull Nicolas Navet Visited organization University of Nantes (June 82012) Reason Lecture rdquoIndustrial practices of real-time schedulingrdquoat the colloquium rdquo1972-2012 40 years of research in real-time schedul-ingrdquo scientific days of the University of Nantes June 8 2012

bull Jun Pang Visited organization Nanjing University (08minus12102012)Reason Research collaboration

bull Xavier Parent Visited organization Imperial College and Kingrsquos Col-lege London (29 April - 4 march 2012) Reason Presentation at sym-posium and research collaboration

bull Johnatan E Pecero Visited organization National Electronics andComputer Technology Center (NECTEC) (6-12-2012) Reason En-ergy efficient solutions for cloud and HPC green scheduling and nextgeneration hardware

bull Sasa Radomirovic Visited organization Nationaal Instituut voorCriminalistiek en Criminologie (NICC) (23012012) Reason Re-search collaboration and presentation

bull Tjitze Rienstra Visited organization Twente University (February27 - March 2 2012) Reason talk research collaboration

bull Patrick Schweitzer Visited organization KTH (24042012) ReasonResearch presentation

bull Patrick Schweitzer Visited organization NTNU (16 minus 19042012)Reason Research collaboration

bull Patrick Schweitzer Visited organization SINTEF (16minus 19042012)Reason Research collaboration and presentation

bull Alexandru-Adrian Tantar Visited organization 2012 IEEE WorldCongress on Computational Intelligence (WCCI) (June 10-15 2012)Reason Green Evolutionary Computing for Sustainable Environments(tutorial)

bull Silvano Tosatto Visited organization Sophia Antipolis (February 8-11 2012) Reason Research collaboration

bull Silvano Tosatto Visited organization University of Queensland (May15- June 1 2012) Reason Research collaboration

bull Paolo Turrini Visited organization Technical University of Denmark(May 1-8 2012) Reason Research collaboration

186 CSC Representation

56 Research meeting

bull 13th International Workshop on Computational Logic in Multi-AgentSystems (2012-08-27 ndash 2012-08-28)

ndash Description Montpellier France

bull Joint UR-Math and UR-CSC Discrete Mathematics Colloquium (2010-05-10 ndash 2012-04-03) Number of presentations 15

ndash Description The Decision Aid Systems group within the Com-puter Science and Communication Research Unit (CSC) and theDiscrete Mathematics group within the Mathematics ResearchUnit (MATH) of the University of Luxembourg organize period-ically a common research seminar Regular Members

lowast R Bisdorff (responsible co-organiser CSC)

lowast M Couceiro (ass researcher postdoc MATH)

lowast E Lehtonen (ass researcher postdoc CSC)

lowast J-L Marichal(responsible co-organiser MATH)

lowast P Mathoney (ass researcher postdoc MATH)

lowast A Olteanu (assistantPhd studentCSC)

lowast Th Veneziano (assistantPhd studentCSC)

lowast T Walhauser (ass researcher postdoc MATH)

bull ICR Seminars

ndash Description Typically weekly (Monday 4pm) Seminar with guestresearchersInternal seminar

bull MINE Research Meeting (2012-01-09 ndash 2012-12-04) Number of presen-tations 24

ndash Description Research meetings

lowast Prof Dr Stephan Busemann German Research Centre forArtificial Intelligence 5 CET meetings (official and unofficialmeetings)

lowast Dr Urich Schaefer German Research Centre for ArtificialIntelligence 2 CET meetings (official and unofficial meet-ings)

lowast Prof Dr Theoharry Grammatikos Dept of Finance (LSF)15 meetings FNR CORE Project ESCAPE

lowast Dr Georges Krier SES 2 CET meetings (official and unoffi-cial meetings)

56 Research meeting 187

lowast Prof Dr Susanne Jekat University of Winterthur Dept ofLinguistics 1 inofficial CET meeting

bull ILIAS - TeamBouvry Seminars

ndash Description Research team meetings and one yearly team meet-ing with 25 presentations organized in November

bull Lassy Seminar

ndash Description This seminar is given several times a year by invitedspeakers on topics related to software construction

bull MAO - Multi-Agent Organisation (2011-12-19 ndash 2011-12-23)

ndash Description Leiden The Netherlands

bull Norm group research meeting

ndash Description weekly (Friday 2pm) presentations by guest re-searchers and internal members

bull Normative Multi-Agent Systems (2012-03-11 ndash 2012-03-16)

ndash Description Dagstuhl Germany

bull SaToSS Research Meeting

ndash Description On Tuesdays from 1030 to 1130 the SaToSS groupand the APSIA group led by Prof Peter YA Ryan hold theirweekly Security Research Meeting (SRM) The purpose of theSRM is to present and discuss research problems that are interest-ing for the members of both groups In 2012 Sasa RadomirovicBarbara Kordy and Jean Lancrenon were responsible for the or-ganization of the SRM The meeting featured 50 presentations in2012 Notable speakers in 2012 include Prof Luca Vigano ProfJason Crampton and Prof Josep Domingo-Ferrer The completelist of speakers as well as our seminar rules can be found at theseminar webpage httpsatossuniluseminarssrm

188 CSC Representation

Chapter 6

CSC Software

bull ACL-Lean Licence Free

ndash Description Developers Daniele Rispoli and Valerio Genovese

ACL-Lean is a decidable theorem prover (written in PROLOG)for propositional access control logics with says operator ACL-Lean implements an analytic labelled sequent calculus for condi-tional access control logics presented in V Genovese L GiordanoV Gliozzi and G L Pozzato ldquoA Conditional Constructive Logicfor Access Control and its Sequent Calculusrdquo 20th InternationalConference on Automated Reasoning with Analytic Tableaux andRelated Methods

bull ADTool Licence free use

ndash Description The attackndashdefense tree language formalizes andextends the attack tree formalism It is a methodology to graph-ically analyze security aspects of scenarios With the help ofattributes on attackndashdefense trees also quantitative analysis canbe performed As attackndashdefense tree models grow they soonbecome intractable to be analyzed by hand Hence computersupport is desirable Software toll called the ADTool has beenimplemented as a part of the ATREES project to support theattackndashdefense tree methodology for security modeling The mainfeatures of the ADTool are easy creation efficient editing andquantitative analysis of attackndashdefense trees The tool is avail-able at httpsatossunilusoftwareadtool The tool was

190 CSC Software

realized by Piotr Kordy and its manual was written by PatrickSchweitzer

bull ARGULAB Licence GPL v3

ndash Description Developers Mikolaj Podlaszewski

We present an implementation of the recently developed per-suasion dialogue game for formal argumentation theory undergrounded semantics The idea is to apply Mackenzie-style dia-logue to convince the user that an argument is or is not in thegrounded extension Hence to provide a (semi-)natural user in-terface to formal argumentation theory

bull bagit Licence non-redistributable for internal use only

ndash Description An internal web-based tool that provides assistanceto research groups by storing pooling tagging and indexing pa-pers and other publications Developed by Christian Glodt In2012 minor bugfixes have been applied to Bagit

bull Canephora Licence free use

ndash Description Trust opinions can be represented as probability dis-tributions over an (unknown) integrity parameter Simple trustopinions (that are based only on personal observations) can berepresented as a class of distributions known as Beta distribu-tions Trust opinions that are based on recommendations do not(necessarily) have such a simple representation Canephora nu-merically approximates the trust opinion that can be inferredfrom a recommendation Precision and coarseness of the resultcan be selected The result may depend on the strategy of therecommender Canephora allows implementations of such pos-sible strategies to be added on the fly The tool was createdby Tim Muller and can be accessed at httpsatossunilu

softwarecanephora

bull mCarve and cCarve Licence free use

ndash Description mCarve and cCarve are software tools for carvingattributed dump sets These dump sets can for instance beobtained by dumping the memory of a number of smart cards orby regularly dumping the memory of a single smart card duringits lifetime The tools help in determining at which location inthe dumps certain attributes are stored mCarve is written inPython and is available from httpsatossunilusoftware

191

mcarve More information about mCarve can be obtained fromour paper [259] cCarve is written in C++ It implements alinear algorithm for carving attributed dump sets which improvesits run time with respect to mCarve cCarve is available fromhttpsatossunilusoftwareccarve

bull delegation2spass Licence Free

ndash Description Developers Daniele Rispoli and Valerio Genovese

delegstion2spass is a parser (written in SCHEME) which imple-ments a set of complete reduction axioms and translates dynamicformulas for a delegationrevocation logic into propositional logicexpressed in DFG syntax

bull Democles Licence Freely redistributable see details athttpdemocleslassyunilulicensehtml

ndash Description Democles is a modeling tool that supports the EPlanguage developed by LASSYs MDE group It is mainly devel-oped by Christian Glodt In 2012 the following improvementswere made to Democles Nuno Amalio started work on imple-menting an EP-to-Alloy transformation for EP systems in Demo-cles Christian Glodt created a branch of Democles implement-ing model bridging interfaces as described in Sam Schmitrsquos MasterThesis rdquoA Bridging Mechanism for Adapting Abstract Models toPlatformsrdquo

bull Discrete Particle Method (DPM) Licence Internal use only

ndash Description The Discrete Particle Method (DPM) itself is anadvanced numerical simulation tool which deals with both mo-tion and chemical conversion of particulate material such as coalor biomass in furnaces However predictions of solely motion orconversion in a de-coupled mode are also applicable The DiscreteParticle Method uses object oriented techniques that support ob-jects representing three-dimensional particles of various shapessuch as cylinders discs or tetrahedrons for example size and ma-terial properties This makes it a highly versatile tool dealingwith a large variety of different industrial applications of granu-lar matter A user interface allows easily extending the softwarefurther by adding user-defined models or material properties toan already available selection of materials properties and reac-tion systems describing conversion Thus the user is relievedof underlying mathematics or software design and therefore is

192 CSC Software

able to direct his focus entirely on the application The DiscreteParticle Method is organised in a hierarchical structure of C++classes and works both in Linux and XP environments also onmulti-processor machines

This software is developed by the XDEM research team from theResearch Unit in Engineering Science (RUES) in collaborationwith the Computer Science and Communications (CSC) researchunit

bull GreenCloud Licence Open source

ndash Description Greencloud is a sophisticated packet-level simulatorfor energy-aware cloud computing data centers with a focus oncloud communications It offers a detailed fine-grained modelingof the energy consumed by the data center IT equipment such ascomputing servers network switches and communication links

bull JShadObf

ndash Description A JavaScript Obfuscation Framework based on evo-lutionary algorithms

bull LuxTraffic

ndash Description LuxTraffic is a project aiming to provide real timetraffic information by using smartphones as mobile traffic sensorsLuxembourg is an ideal location to validate the suggested systembecause of several factors The country has a well developed roadinfrastructure with 282 km of highways in total on its territorywhich permits to have a country- scoped instead of city-scopedapproach Also the recent high penetration rate of smartphonesin combination with the data flat rates create a favorable envi-ronment for community based traffic sensing using mobile phonesTaking these factors into account we designed LuxTraffic a trafficinformation system which is in essence an online repository aim-ing at centralizing all information related to individual mobilityin Luxembourg

The system has two main goals The first is to create and main-tain a community of users that will actively participate in col-lecting relevant traffic information using smartphone devices inan anonymous and autonomous manner To accomplish this ap-plications (APPs) for the two dominant mobile platforms iOSand Android have been developed In return the users benefitfrom a variety of traffic information services available online In

193

the first phase the system provides detailed information abouttraffic fluidity on Luxembourg highways In the second phasethe system will be extended to cover the entire road network

The second purpose of the LuxTraffic platform is to gather archiveand analyze the collected traffic data centrally in order to identifytraffic bottlenecks and propose solutions To provide additionalinformation we interface with the local highway traffic controlsystem called CITA which among others provides a 24 hoursaccess to highway cameras

bull MaM Multidimensional Aggregation Monitoring Licence Open Source

ndash Description MaM Multidimensional Aggregation MonitoringMaM performs multidimensional aggregation over various typesof data The targegeted use is the storage visualisation and anal-ysis of big data For example network operators may capturelarge quantities of flow based data which includes source and des-tination IP addresses and ports number of packets etc Aggre-gation allows to leverage global view and so is particularly helpfulfor anomaly tracking as the most powerful like spam campaignsbotnets distributed denial of service are distributed phenomenaand can only be observed assuming a global point of view How-ever defining the aggregation granularity is quite difficult andshould not fixed over all the space For example some IP net-works may require a small granularity while others need only ahigh level overview Hence MaM automatically selects the gran-ularity by creating irregular dimension splits which are so betterfitted to the underlying distribution In addition if a user doesnot know exactly what is looking for when he is monitoring hisnetwork it does not know which dimension is the most importantFor example there is no reason to aggregate first on source IPaddresses and then destination ports or vice-versa Thus MaMwill automatically optimizes that by selecting the proper order ofdimensions and even on multiple levels involving twice or morethe same dimension with different granularity levels

To achieve a good scalability MaM uses an underneath tree struc-ture A MaM tree is updated online with a limited complexityusing a Least Recently Used strategy to keep the tree size com-pact and so to save resources

MaM is a generic tool and can be extended to any hierarchicaltypes of data by implementing very few functions which describethe hierarchy

To summarize the advantages of MaM are - support of het-erogeneous types of data simultaneously - high scalability - easy

194 CSC Software

to extend - user friendly outputs and graphical user interface -open-source (available at httpsgithubcomjfrancoismam)

The practicability of MaM have been highlighted in [252] and apresentation is available at (demonstration at 1415)

httpswwwusenixorgconferencelisa12efficient-multidimensional-aggregation-large-scale-monitoring

bull MiCS Management System Licence non-redistributable for internaluse only

ndash Description An internal web-based tool developed for the man-agement of modules courses and profiles of the Master in Infor-mation and Computer Sciences Developed by Christian GlodtNumerous improvements have been made to the MiCS Manage-ment System in 2012

bull Model Decomposer Licence free to use binary redistribution per-mitted

ndash Description An Eclipse plugin that implements a generic modeldecomposition technique which is applicable to Ecore instancesand EP models and is described in a paper published in the pro-ceedings of the FASE 2011 conference Developed by ChristianGlodt

bull MSC Macro Package for LATEX Licence free use

ndash Description The message sequence chart (MSC) language is avisual language for the description of the interaction between dif-ferent components of a system This language is standardizedby the ITU (International Telecommunication Union) in Recom-mendation Z120 MSCs have a wide application domain rang-ing from requirements specification to testing and documenta-tion In order to support easy drawing of MSCs in LATEX doc-uments Sjouke Mauw and coworkers have developed the MSCmacro package Currently Piotr Kordy is responsible for main-tenance of the package Version 117 is currently available fromhttpsatossunilumscpackage In 2012 work started onrecoding the package as to make it compatible with pdflatex

bull OVNIS

ndash Description For online vehicular wireless and traffic simulationAn integration of traffic simulator SUMO with network simulatorns-3

195

bull ROS face recognition package Licence Attribution-NonCommercial30

ndash Description Developers Pouyan Ziafati Provides a ROS simpleactionlib server interface for performing different face recognitionfunctionalities in video stream

bull Seq-ACL+ Licence Free

ndash Description Developers Daniele Rispoli Valerio Genovese andDeepak Garg

Seq-ACL+ is a decidable theorem prover (written in PROLOG)for the modal access control logic ACL+ presented in V Genoveseand D Garg rdquoNew Modalities for Access Control Logics Permis-sion Control and Ratificationrdquo 7th International Workshop onSecurity and Trust Management - STM 2011

bull SHARC Licence GPL v3

ndash Description Source code and benchmarking framework for theSHARC (Sharper Heuristic for Assignment of Robust Communi-ties) protocol

bull VehILux

ndash Description Large set of realistic vehicular traces over the areaof Luxembourg country (110000 trips) than can be used by trafficsimulators like SUMO and in other simulations of traffic informa-tion systems

bull Visual Contract Builder Licence free to use binary redistributionpermitted

ndash Description A suite of Eclipse plugins that provide supportfor graphically editing and typechecking VCL (Visual ContractLanguage) diagrams Developed by Christian Glodt and NunoAmalio

196 CSC Software

Chapter 7

CSC Publications in 2012

The publications listed in this chapter have been generated from the officialpublication record repository of the university

httppublicationsunilu

An overview of the publication quantity (per category) is provided in thetable below

Publication category Quantity Section

Books 1 sect71 page 197Book Chapters 7 sect72 page 198

International journals 69 sect73 page 198Conferences Articles 165 sect74 page 204

Internal Reports 6 sect75 page 223Proceedings 3 sect76 page 224

Total 251

Table 71 Overview of CSC publications in 2012

71 Books

[1] Cas Cremers and Sjouke Mauw Operational semantics and verificationof security protocols Springer-Verlag 2012

198 BIBLIOGRAPHY

72 Book Chapters

[2] Paolo Turrini Xavier Parent Leendert van der Torre and SilvanoColombo Tosatto Contrary-To-Duties in Games pages 329ndash348Springer 2012

[3] Johnatan E Pecero Bernabe Dorronsoro Mateusz Guzek and Pas-cal Bouvry Memetic Algorithms for Energy-Aware Computation andCommunications Optimization in Computing Clusters pages 443 ndash473 Chapman and HallCRC Press 2012

[4] Xavier Parent Why Be Afraid of Identity volume 7360 of LectureNotes in Computer Science pages 295ndash307 Springer 2012

[5] Hugo Jonker Sjouke Mauw and Jun Pang Location-Based ServicesPrivacy Security and Assurance pages 235ndash244 IOS Press 2012

[6] Moussa Amrani A Formal Semantics of Kermeta pages 274 ndash 315IGI Global Hershey PA USA 2012

[7] Marcin Seredynski and Pascal Bouvry The Application of Evolution-ary Heuristics for Solving Soft Security Issues in MANETs pages 97ndash114 Springer 2012

[8] Jianguo Ding Ilangko Balasingham and Pascal Bouvry ManagementChallenges for Emerging Wireless Networks pages 3ndash34 CRC Press2012

73 International journals

[9] Raymond Bisdorff On polarizing outranking relations with large per-formance differences Journal of Multi-Criteria Decision AnalysisDOI 101002mcda14721ndash20 2012

[10] Christoph Benzmuller Dov Gabbay Valerio Genovese and DanieleRispoli Embedding and automating conditional logics in classicalhigher-order logic Ann Math Artif Intell 66(1-4)257ndash271 2012

[11] Benoıt Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee Technique et science informa-tiques 31(8-9-10)1121ndash1152 2012

[12] Alex Biryukov and Johann Grosschadl Cryptanalysis of the full aesusing gpu-like special-purpose hardware Fundamenta Informaticae114(3-4)221ndash237 2012

BIBLIOGRAPHY 199

[13] Alexander Bochman and Dov Gabbay Causal dynamic inference AnnMath Artif Intell 66(1-4)231ndash256 2012

[14] Davide Falessi Mehrdad Sabetzadeh Lionel Briand EmanueleTurella Thierry Coq and Rajwinder Kaur Panesar-Walawege Plan-ning for safety standards compliance A model-based tool-supportedapproach IEEE Software 29(3)64ndash70 2012

[15] Dov Gabbay Overview on the connection between reactive kripkemodels and argumentation networks Ann Math Artif Intell 66(1-4)1ndash5 2012

[16] Dov Gabbay Introducing reactive kripke semantics and arc accessi-bility Ann Math Artif Intell 66(1-4)7ndash53 2012

[17] Dov Gabbay Introducing reactive modal tableaux Ann Math ArtifIntell 66(1-4)55ndash79 2012

[18] Dov Gabbay Completeness theorems for reactive modal logics AnnMath Artif Intell 66(1-4)81ndash129 2012

[19] Dov Gabbay and Sergio Marcelino Global view on reactivity switchgraphs and their logics Ann Math Artif Intell 66(1-4)131ndash1622012

[20] Philipp Grabher Johann Grosschadl Simon Hoerder Kimmo Jarvi-nen Dan Page Stefan Tillich and Marcin Wojcik An explorationof mechanisms for dynamic cryptographic instruction set extensionJournal of Cryptographic Engineering 2(1)1ndash18 2012

[21] Laurent Kirsch Jean Botev and Steffen Rothkugel Snippets andcomponent-based authoring tools for reusing and connecting docu-ments Journal of Digital Information Management 10(6)399ndash4092012

[22] Tom Mens and Jacques Klein Evolving software - introduction to thespecial theme Ercim News 888ndash9 2012

[23] Gilles Perrouin Sebastian Oster Sagar Sen Jacques Klein BenoitBaudry and Yves Le Traon Pairwise testing for software prod-uct lines Comparison of two approaches Software Quality Journal20(3)605ndash643 2012

[24] Selwyn Piramuthu Gaurav Kapoor Wei Zhou and Sjouke MauwInput online review data and related bias in recommender systemsDecision Support Systems 53(3)418ndash424 2012

200 BIBLIOGRAPHY

[25] Qiang Tang Public key encryption schemes supporting equality testwith authorization of different granularity International Journal ofApplied Cryptography pages 304ndash321 2012

[26] Qiang Tang Public key encryption supporting plaintext equality testand user specified authorization Security and Communication Net-works pages 1351ndash1362 2012

[27] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre Modelling defeasible and prioritized support in bipolar argu-mentation Ann Math Artif Intell 66(1-4)163ndash197 2012

[28] Serena Villata Guido Boella Dov Gabbay Leendert van der Torreand Joris Hulstijn A logic of argumentation for specification andverification of abstract argumentation frameworks Ann Math ArtifIntell 66(1-4)199ndash230 2012

[29] Ying Zhang Chenyi Zhang Jun Pang and Sjouke Mauw Game-based verification of contract signing protocols with minimal messagesInnovations in Systems and Software Engineering 8111ndash124 2012

[30] Qixia Yuan Panuwat Trairatphisan Jun Pang Sjouke MauwMonique Wiesinger and Thomas Sauter Probabilistic model check-ing of the pdgf signaling pathway Transactions on ComputationalSystems Biology XIV151ndash180 2012

[31] Emil Weydert Conditional ranking revision - iterated revision withsets of conditionals Journal of Philosophical Logic 41(1)237ndash2712012

[32] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre Modelling defeasible and prioritized support in bipolar argu-mentation Ann Math Artif Intell 66(1-4)163ndash197 2012

[33] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre A logic of argumentation for specification and verification ofabstract argumentation frameworks Ann Math Artif Intell 66(1-4)199ndash230 2012

[34] Paolo Turrini Jan Broersen Rosja Mastrop and John-Jules ChMeyer Regulating competing coalitions a logic for socially optimalgroup choices Journal of Applied Non-Classical Logics 22(1-2)181ndash202 2012

[35] Yanjie Sun Chenyi Zhang Jun Pang Baptiste Alcalde and SjoukeMauw A trust-augmented voting scheme for collaborative privacymanagement Journal of Computer Security 20(4)437ndash459 2012

BIBLIOGRAPHY 201

[36] Hanna Scholzel Hartmut Ehrig Maria Maximova Karsten Gabrieland Frank Hermann Satisfaction restriction and amalgamation ofconstraints in the framework of m-adhesive categories Electronic Pro-ceedings in Theoretical Computer Science (EPTCS) 9383ndash104 2012

[37] Ayda Saidane and Nicolas Guelfi Seter Towards architecture-modelbased security engineering International Journal of secure softwareengineering to appear 0920120ndash0 2012

[38] Frederic Pinel Bernabe Dorronsoro Johnatan E Pecero Pascal Bou-vry and Samee U Khan A two-phase heuristic for the energy-efficientscheduling of independent tasks on computational grids Cluster Com-puting 2012

[39] Frederic Pinel Bernabe Dorronsoro and Pascal Bouvry Solving verylarge instances of the scheduling of independent tasks problem on thegpu Journal of Parallel and Distributed Computing 2012

[40] Jakub Muszynski Sebastien Varrettte Pascal Bouvry FranciszekSeredynski and Samee U Khan Convergence analysis of evolutionaryalgorithms in the presence of crash-faults and cheaters InternationalJournal of Computers amp Mathematics with Applications 64(12)3809ndash 3819 2012

[41] Roman Ledyayev Benoıt Ries and Anatoliy Gorbenko React anarchitectural framework for the development of a software productline for dependable crisis management systems Radioelectronic andComputer Systems 59(7)284ndash288 2012

[42] Simon Kramer Rajeev Gore and Eiji Okamoto Computer-aideddecision-making with trust relations and trust domains (cryptographicapplications) Journal of Logic and Computation pages 0 ndash 0 2012page numbers not yet known

[43] Dzmitry Kliazovich Simone Redana and Fabrizio Granelli Arqproxy Cross-layer error recovery in wireless access networks Inter-national Journal of Communication Systems 25(4)461 ndash 477 2012

[44] You Ilsun Lenzini Gabriele Ogiela Marek R and Bertino Elisa De-fending against insider threats and internal data leakage (guest edito-rial) Security and Communication Networks 5(8)831 ndash 833 2012

[45] Frank Hermann and Janis Voigtlander First international work-shop on bidirectional transformations (bx 2012) Preface ElectronicCommunications of the European Association of Software Science andTechnology (ECEASST) 491ndash4 2012

202 BIBLIOGRAPHY

[46] Davide Grossi and Paolo Turrini Dependence in games and de-pendence games Autonomous Agents and Multi-Agent Systems25(2)284ndash312 2012

[47] Valentin Goranko Wojciech Jamroga and Paolo Turrini Strategicgames and truly playable effectivity functions Autonomous Agentsand Multi-Agent Systems 2012

[48] David Galindo Rodrigo Roman and Javier Lopez On the energy costof authenticated key agreement in wireless sensor networks WirelessCommunications and Mobile Computing 12(1)133 ndash 143 2012

[49] Claudia Ermel Frank Hermann Jurgen Gall and Daniel BinanzerVisual modeling and analysis of emf model transformations based ontriple graph grammars Electronic Communications European Associ-ation of Software Science and Technology (EC-EASST) pages 1ndash122012

[50] Vasileios Efthymiou Maria Koutraki and Grigoris Antoniou Real-time activity recognition and assistance in smart classrooms Advancesin Distributed Computing and Artificial Intelligence Journal 15367ndash74 2012

[51] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry New state-of-the-art results for cassini2 global trajectory optimization problemThe Journal of the Advanced Concepts Team 556 ndash 72 2012

[52] Miguel Couceiro and Erkko Lehtonen Galois theory for sets of op-erations closed under permutation cylindrification and compositionAlgebra Universalis 67(3)273ndash297 2012

[53] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser The aritygap of order-preserving functions and extensions of pseudo-booleanfunctions Discrete Applied Mathematics 160(4-5)383ndash390 2012

[54] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser Decom-positions of functions based on arity gap Discrete Mathematics312(2)238ndash247 2012

[55] Martin Caminada Walter Carnielli and Paul Dunne Semi-stablesemantics J Log Comput 22(5)1207ndash1254 2012

[56] Richard Booth Thomas Meyer and Chattrakul Sombattheera A gen-eral family of preferential belief removal operators Journal of Philo-sophical Logic 41(4)711ndash733 2012

[57] Mike Behrisch Miguel Couceiro Keith A Kearnes Erkko Lehtonenand Agnes Szendrei Commuting polynomial operations of distributivelattices Order 29(2)245ndash269 2012

BIBLIOGRAPHY 203

[58] Alessandra Bagnato Barbara Kordy Per H Meland and PatrickSchweitzer Attribute decoration of attack-defense trees InternationalJournal of Secure Software Engineering 3(2)1ndash35 2012

[59] Peter Ryan and Thea Peacock Verifiable voting Recent advances andfuture challenges Voting What Has Changed What Hasnrsquot amp WhatNeeds Improvement 1(1)1ndash84 2012

[60] Le-Nam Tran Mats Bengtsson and Bjorn Ottersten Iterative pre-coder design and user scheduling for block-diagonalized systems IEEETransactions on Signal Processing 60(7)3726ndash3739 2012

[61] Yongming Huang Gan Zheng Mats Bengtsson Kai-Kit Wong LuxiYang and Bjorn Ottersten Distributed multicell beamforming designapproaching pareto boundary with max-min fairness IEEE Transac-tions on Wireless Communications 11(8)2921ndash2933 2012

[62] Bhavani Shankar Daniel Arapoglou Pantelis and Bjorn OtterstenSpace-frequency coding for dual polarized hybrid mobile satellite sys-tems IEEE Transactions on Wireless Communications 11(8)2806ndash2814 2012

[63] Emil Bjornson Mats Bengtsson and Bjorn Ottersten Pareto char-acterization of the multicell mimo performance region with simple re-ceivers IEEE Transactions on Signal Processing 60(8)4464ndash44692012

[64] Symeon Chatzinotas Gan Zheng and Bjorn Ottersten Generic op-timization of linear precoding in multibeam satellite systems IEEETransactions on Wireless Communications 11(6)2308ndash2320 2012

[65] Bhavani Shankar M R Pantelis-Daniel Arapoglou and Bjorn Otter-sten Space-frequency coding for dual polarized hybrid mobile satellitesystems IEEE Transactions on Wireless Communications 11(8)2806ndash 2814 2012

[66] Frederic Garcia Djamila Aouada Bruno Mirbach and Bjorn Otter-sten Real-time distance-dependent mapping for a hybrid tof multi-camera rig IEEE Journal of Selected Topics in Signal Procesing(JSTSP) 6(5)1ndash12 2012

[67] Dimitrios Christopoulos Symeon Chatzinotas Gan Zheng Joel Grotzand Bjorn Ottersten Multibeam joint processing in satellite communi-cations Eurasip Journal on Wireless Communications and Network-ing 2012(1) 2012

204 BIBLIOGRAPHY

[68] Emil Bjornson Gan Zheng Mats Bengtsson and Bjorn OtterstenRobust monotonic optimization framework for multicell miso systemsIEEE Transactions on Signal Processing 60(5)2508ndash2523 2012

[69] David Fotue Houda Labiod and Thomas Engel Performance eval-uation of mini-sinks mobility using multiple paths in wireless sensornetworks International Journal of Computer Science and Security(IJCSS) 6(3)150ndash167 2012

[70] Marcin Seredynski and Pascal Bouvry Analysing the development ofcooperation in manets The Journal of Supercomputing pages 1ndash172012

[71] Marcin Seredynski and Pascal Bouvry Direct reciprocity-based coop-eration in mobile ad hoc networks International Journal of Founda-tions of Computer Science 23(2)501ndash521 2012

[72] Dzmitry Kliazovich Pascal Bouvry and Samee U Khan Greenclouda packet-level simulator of energy-aware cloud computing data centersThe Journal of Supercomputing 62(3)pp 1263ndash1283 2012

[73] Patricia Ruiz Bernabe Dorronsoro Pascal Bouvry and Lorenzo JTardon Information dissemination in vanets based upon a tree topol-ogy Journal of Ad hoc Networks 10(1)111ndash127 2012

[74] Patricia Ruiz Bernabe Dorronsoro Giorgio Valentini Frederic Pineland Pascal Bouvry Optimisation of the enhanced distance basedbroadcasting protocol for manets J of Supercomputing Special Is-sue on Green networks 62(3)1213ndash1240 2012

[75] Shaukat Ali Tao Yue and Lionel Briand Does aspect-oriented mod-eling help improve the readability of uml state machines Softwareand Systems Modeling 2012

[76] Andrea Arcuri and Lionel Briand A hitchhikerrsquos guide to statisti-cal tests for assessing randomized algorithms in software engineeringSoftware Testing Verification and Reliability 2012

[77] Andrea Arcuri and Lionel Briand Formal analysis of the probability ofinteraction fault detection using random testing IEEE Transactionson Software Engineering 38(5)1088ndash1099 2012

74 Conferences Articles

[78] Apostolos Stathakis Gregoire Danoy Thomas Veneziano Pascal Bou-vry and Gianluigi Morelli Bi-objective optimisation of satellite pay-load configuration In Proceedings of the 13e congres annuel de la

BIBLIOGRAPHY 205

Societe francaise de Recherche Operationnelle et drsquoAide a la Decision(ROADEF) pages 1ndash2 2012

[79] Apostolos Stathakis Gregoire Danoy Thomas Veneziano JulienSchleich and Pascal Bouvry Optimising satellite payload reconfig-uration An ilp approach for minimising channel interruptions In 2ndESA Workshop on Advanced Flexible Telecom Payloads pages 1ndash8ESA 2012

[80] Guido Boella Joris Hulstijn Llio Humphreys Livio Robaldo andLeendert Van der Torre Legal knowledge management systems forregulatory compliance In IX Conference of the Italian Chapter ofAIS pages 1ndash8 2012

[81] Guido Boella Joris Hulstijn Llio Humphreys Marijn Janssen andLeendert van der Torre Towards legal knowledge management systemsfor regulatory compliance In IX Conference of the Italian Chapter ofAIS pages 1ndash8 2012

[82] Guido Boella Luigi di Caro Llio Humphreys Livio Robaldo andLeendert van der Torre Nlp challenges for eunomos a tool to build andmanage legal knowledge In Proceedings of the Eighth InternationalConference on Language Resources and Evaluation (LREC rsquo12) pages3672ndash3678 European Language Resources Association (ELRA) 2012

[83] Guido Boella Llio Humphreys Marco Martin Piercarlo Rossi andLeendert van der Torre Eunomos a legal document and knowledgemanagement system to build legal services In Monica (Editor) Palmi-rani Ugo (Editor) Pagallo Pompeu (Editor) Casanovas and Gio-vanni (Editor) Sartor editors AI Approaches to the Complexity ofLegal Systems Models and Ethical Challenges for Legal Systems LegalLanguage and Legal Ontologies Argumentation and Software Agentsvolume 7639 of Lecture Notes in Computer Science pages 131ndash146Berlin Heidelberg 2012 Springer

[84] Pouyan Ziafati Mehdi Dastani John-Jules Meyer and Leon VanDer Torre Agent programming languages requirements for program-ming cognitive robots (extended abstract) In Proceedings of the 24thBenelux Conference on Artificial Intelligence pages 337ndash338 2012

[85] Eric Tobias Eric Ras and Nuno Amalio Suitability of visual mod-elling languages for modelling tangible user interface applicationsIn Symposium on Visual Languages and Human-Centric Computing(VLHCC) pages 269 ndash270 IEEE 2012

206 BIBLIOGRAPHY

[86] Jerome Leemans and Nuno Amalio Modelling a cardiac pacemakervisually and formally In Symposium on Visual Languages and Human-Centric Computing (VLHCC) pages 257 ndash258 IEEE 2012

[87] Mike Papadakis and Yves Le Traon Using mutants to locate ldquoun-knownrdquo faults In Fifth International Conference on Software TestingVerification and Validation (ICST) pages 691ndash700 2012

[88] Silvano Colombo Tosatto Guido Boella Leendert van der Torre andSerena Villata Abstract normative systems Semantics and prooftheory In Proceedings of the Thirteenth International Conference onPrinciples of Knowledge Representation and Reasoning pages 358ndash368 2012

[89] Silvano Colombo Tosatto Guido Boella Leon van der Torre and Ser-ena Villata Visualizing normative systems an abstract approach InDeontic Logic in Computer Science - 11th International ConferenceDEON 2012 pages 16ndash30 2012

[90] Silvano Colombo Tosatto Marwane El Kharbili Guido GovernatoriPierre Kelsen Qin Ma and Leender van der Torre Algorithms forbasic compliance problems In Benelux conference on Artificial Intel-ligence (BNAIC) 2012

[91] Jayanta Poray and Christoph Schommer Operations on conver-sational mind-graphs In The 4th International Conference onAgents and Artificial Intelligence (ICAART - 2012) pages 511ndash514SciTePress 2012

[92] Christoph Bosch Qiang Tang Peter Hartel and Willem Jonker Selec-tive document retrieval from encrypted database In Information Se-curity - 15th International Conference ISC 2012 volume 7483 pages224ndash241 Springer 2012

[93] Xiaofeng Chen Jin Li Jianfeng Ma Qiang Tang and Wenjing LouNew algorithms for secure outsourcing of modular exponentiations InComputer Security - ESORICS 2012 - 17th European Symposium onResearch in Computer Security volume 7459 pages 541ndash556 Springer2012

[94] Johann Grosschadl Dan Page and Stefan Tillich Efficient java im-plementation of elliptic curve cryptography for j2me-enabled mobiledevices In Information Security Theory and Practice mdash WISTP 2012volume LNCS 7322 pages 189ndash207 Springer Verlag 2012

[95] Arjan Jeckmans Qiang Tang and Pieter Hartel Privacy-preservingcollaborative filtering based on horizontally partitioned dataset In

BIBLIOGRAPHY 207

International Symposium on Security in Collaboration Technologiesand Systems pages 439ndash446 2012

[96] Max E Kramer Jacques Klein and Jim R H Stell Building specifica-tions as a domain-specific aspect language In Proceedings of the Sev-enth Workshop on Domain-Specific Aspect Languages at the Aspect-Oriented Software Development Conference pages 29ndash32 ACM 2012

[97] Daniel Marnach Sjouke Mauw Miguel Martins and Carlo HarpesDetecting meaconing attacks by analysing the clock bias of gnss re-ceivers In European Navigation Conference (ENC 2012) pages 1ndash192012

[98] Jorge Augusto Meira Eduardo Cunha Almeida Yves Le Traon andGerson Sunye Peer-to-peer load testing In ICST - 2012 IEEE FifthInternational Conference on Software Testing Verification and Vali-dation pages 642ndash647 IEEE 2012

[99] Gilles Perrouin Brice Morin Franck Chauvel Franck Fleurey JacquesKlein Yves Le Traon Olivier Barais and Jean-Marc Jezequel To-wards flexible evolution of dynamically adaptive systems in the newideas amp emerging results track of the international conference ofsoftware engineering (niericse) In New Ideas amp Emerging Re-sults Track of the International Conference of Software Engineering(NIERICSE) Zurich Switzerland 2012 pages 1353ndash1356 IEEEPress 2012

[100] Qiang Tang Cryptographic framework for analyzing the privacy ofrecommender algorithms In International Conference on Collabora-tion Technologies and Systems pages 455ndash462 IEEE 2012

[101] Ton van Deursen and Sasa Radomirovic Insider attacks and privacy ofrfid protocols In Public Key Infrastructures Services and Applications-8th European Workshop EuroPKI 2011 volume 7163 pages 91ndash105Springer 2012

[102] Erich Wenger and Johann Grosschadl An 8-bit avr-based elliptic curvecryptographic risc processor for the internet of things In Proceedingsof the 1st Workshop on Hardware and Architectural Support for Secu-rity and Privacy (HASP 2012) pages 37ndash45 IEEE Computer Society2012

[103] Reiko Heckel Hartmut Ehrig Ulrike Golas and Frank Hermann Par-allelism and concurrency of stochastic graph transformations In GraphTransformations volume 7562 of Lecture Notes in Computer Sciencepages 96ndash110 Springer Berlin Heidelberg 2012

208 BIBLIOGRAPHY

[104] Jan Broersen Dov Gabbay and Leendert van der Torre Discussionpaper Changing norms is changing obligation change In DeonticLogic in Computer Science volume 7393 of Lecture notes in ComputerScience pages 199ndash214 Springer 2012

[105] Chenyi Zhang and Jun Pang An algorithm for probabilistic alternat-ing simulation In Proc the 38th International Conference on CurrentTrends in Theory and Practice of Computer Science pages 431ndash4422012

[106] Emil Weydert On arguments and conditionals In ECAI WS WeightedLogics for AI (WL4AI) pages 69ndash78 IRIT 2012

[107] Srdjan Vesic Mykhailo Ianchuk and Andrii Rubtsov The synergy Aplatform for argumentation-based group decision making In Proceed-ings of the 4th International Conference on Computational Models ofArgument COMMA 2012 pages 501ndash502 2012

[108] Srdjan Vesic and Leendert van der Torre Beyond maxi-consistent ar-gumentation operators In Proceedings of the 13th European Confer-ence on Logics in Artificial Intelligence JELIA 2012 pages 424ndash4362012

[109] Srdjan Vesic Maxi-consistent operators in argumentation In Proceed-ings of the 20th European Conference on Artificial Intelligence ECAI2012 pages 810ndash815 2012

[110] Leendert van der Torre and Guido Boella Reasoning for agreementtechnologies In Proceedings of the 20th European Conference on Ar-tificial Intelligence (ECAI) pages 895ndash896 2012

[111] Leendert van der Torre Logics for security and privacy In Data andApplications Security and Privacy XXVI pages 1ndash7 Springer 2012

[112] Paolo Turrini Agreements as norms In Deontic Logic in ComputerScience pages 31ndash45 2012

[113] Marija Slavkovik and Wojciech Jamroga Distance-based rules forweighted judgment aggregation (extended abstract) In Proceedings ofthe 11th International Conference on Autonomous Agents and Multi-agent Systems AAMAS2012 pages 1405ndash1406 2012

[114] Francois Schwarzentruber Srdjan Vesic and Tjitze Rienstra Build-ing an epistemic logic for argumentation In Proceedings of the 13thEuropean Conference on Logics in Artificial Intelligence JELIA 2012pages 359ndash371 2012

BIBLIOGRAPHY 209

[115] Tjitze Rienstra Towards a probabilistic dung-style argumentationsystem In AT 2012 Agreement Technologies Proceedings of the FirstInternational Conference on Agreement Technologies pages 138ndash152CEUR 2012

[116] Sandro Reis Denis Shirnin and Denis Zampunieris Design ofproactive scenarios and rules for enhanced e-learning In Proceed-ings CSEDU 2012 4th International Conference on Computer Sup-ported Education Porto (Portugal) 2012 volume 1 pages 253 ndash 258SciTePress ndash Science and Technology Publications 2012

[117] Raghunath Rajachandrasekar Xavier Besseron and Dhabaleswar KPanda Monitoring and predicting hardware failures in hpc clusterswith ftb-ipmi In 2012 IEEE 26th International Parallel and Dis-tributed Processing Symposium Workshops amp PhD Forum pages 1136ndash1443 IEEE Computer Society 2012

[118] Johnatan E Pecero Hector Joaquin Fraire Huacuja Pascal BouvryAurelio Alejandro Santiago Pineda Mario Cesar Lopez Loces andJuan Javier Gonzalez Barbosa On the energy optimization for prece-dence constrained applications using local search algorithms In Pro-ceedings of the 2012 International Conference on High PerformanceComputing amp Simulation (HPCS 2012) pages 133 ndash 139 2012

[119] Patrick Meyer and Alexandru-Liviu Olteanu Preferentially orderedclustering In Modelling Decisions for Artificial Intelligence pages87ndash98 2012

[120] Juan Julian Merelo Antonio M Mora Carlos Fernandes Anna IEsparcia-Alcazar and Juan Luis Jimenez Laredo Pool vs island basedevolutionary algorithms an initial exploration In 2012 Seventh In-ternational Conference on P2P Parallel Grid Cloud and InternetComputing pages 19ndash24 IEEE Computer Society 2012

[121] Sergio Marques Dias Sandro Reis and Denis Zampunieris Proac-tive computing based implementation of personalized and adaptivetechnology enhanced learning over moodle(tm) In Proceedings ofICALT 2012 IEEE 12th International Conference on Advanced Learn-ing Technologies pages 674 ndash 675 IEEE Computer Society Publica-tions 2012

[122] Diana Marosin Alex Handrik Proper and Leendert van der TorreChanging agreements Intention reconsideration based on assumptionsand reasons In Proceedings of the First International Conference onAgreement Technologies AT 2012 pages 296ndash297 2012

210 BIBLIOGRAPHY

[123] Qian Li Peter Schaffer Jun Pang and Sjouke Mauw Comparativeanalysis of clustering protocols with probabilistic model checking InProceedings of the 6th IEEE Symposium on Theoretical Aspects of Soft-ware Engineering pages 249ndash252 IEEE Computer Society 2012

[124] Erkko Lehtonen and Agnes Szendrei Partial orders induced by quasi-linear clones In Contributions to General Algebra volume 20 pages51ndash84 Verlag Johannes Heyn 2012

[125] Barbara Kordy Marc Pouly and Patrick Schweitzer Computationalaspects of attack-defense trees In Security amp Intelligent InformationSystems volume LNCS 7053 pages 103ndash116 Springer 2012

[126] Laurent Kirsch Jean Botev and Steffen Rothkugel The snippet sys-tem - reusing and connecting documents In Proceedings of the 7thInternational Conference on Digital Information Management pages138ndash144 2012

[127] Laurent Kirsch Jean Botev and Steffen Rothkugel An extensible toolset for creating and connecting reusable documents In Proceedings ofWorld Conference in Educational Media Hypermedia and Telecommu-nications pages 1434ndash1442 2012

[128] Coron Jean-Sebastien Giraud Christophe Prouff Emmanuel Ren-ner Soline Rivain Matthieu and Vadnala Praveen Kumar Conver-sion of security proofs from one leakage model to another A newissue In Constructive Side-Channel Analysis and Secure Design vol-ume 72752012 pages 69ndash81 Springer Lecture Notes in ComputerScience 2012 2012

[129] Gallais Jean-Francois Roy Arnab and Vadnala Praveen Kumar Fullkey recovery attacks on modular addition An application to threefishIn Workshop on Embedded Systems Security 2012 pages 1ndash9 ACM2012

[130] Wojciech Jamroga Concepts agents and coalitions in alternatingtime In Proceedings of the 20th European Conference on ArtificialIntelligence ECAI 2012 pages 438ndash443 2012

[131] Santiago Iturriaga Sergio Nesmachnow and Bernabe Dorronsoro Amultithreading local search for multiobjective energy-aware schedulingin heterogeneous computing systems In 26th European Conference onModelling and Simulation (ECMS) pages 1 ndash 7 2012

[132] Frank Hermann Hartmut Ehrig and Claudia Ermel Concurrentmodel synchronization with conflict resolution based on triple graphgrammars In Fundamental Approaches to Software Engineering vol-ume 7212 pages 178ndash193 Springer 2012

BIBLIOGRAPHY 211

[133] Davide Grossi and Paolo Turrini Short sight in extensive gamesIn Proceedings of the 11th International Conference on AutonomousAgents and Multiagent Systems (AAMAS 2012) pages 805ndash812 2012

[134] Valentin Goranko and Wojciech Jamroga State and path effectivitymodels for logics of multi-player games In Proceedings of the 11thInternational Conference on Autonomous Agents and Multiagent Sys-tems AAMAS 2012 pages 1123ndash1130 Springer 2012

[135] Eugenio Giordano Lara Codeca Brian Geffon Giulio Grassi Gio-vanni Pau and Mario Gerla Movit The mobile network virtual-ized testbed In Proceedings of the ninth ACM international workshopon Vehicular inter-networking systems and applications pages 3ndash12ACM New York NY USA ccopy2012 2012

[136] Nicolas Genon Patrice Caire Hubert Toussaint Patrick Heymansand Daniel Moody Towards a more semantically transparent i visualsyntax In Requirements Engineering Foundation for Software Qual-ity - 18th International Working Conference REFSQ 2012 EssenGermany March 19-22 2012 Proceedings Lecture Notes in Com-puter Science 7195 Springer 2012 volume 7195 of Lecture Notes inComputer Science pages 140ndash146 Springer Berlin Heidelberg 2012

[137] Vijayalakshmi Ganesan Sergio Sousa Marija Slavkovik and Leendertvan der Torre Selecting judgment aggregation rules for nao robotsan experimental approach In Proceedings of the 11th InternationalConference on Autonomous Agents and Multiagent Systems (AAMAS2012) pages 1403ndash1404 International Foundation for AutonomousAgents and Multiagent Systems 2012

[138] Francois Fouquet Gregory Nain Brice Morin Erwan Daubert OlivierBarais Noel Plouzeau and Jean-Marc Jezequel An eclipse modellingframework alternative to meet the modelsruntime requirements InMODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMSvolume 7590 pages 87ndash101 Springer Berlin Heidelberg 2012

[139] Vasileios Efthymiou and Patrice Caire Privacy challenges in ambientintelligent systems A critical discussion In Proceedings of the 3rdPrivacy Protection Symposium - Atelier protection de la vie privee(APVP) 2012

[140] Vasileios Efthymiou Patrice Caire and Antonis Bikakis Modeling andevaluating cooperation in multi-context systems using conviviality InProceedings of BNAIC 2012 The 24th Benelux Conference on ArtificialIntelligence pages 83ndash90 2012

212 BIBLIOGRAPHY

[141] Naipeng Dong Hugo Jonker and Jun Pang Formal analysis of privacyin an ehealth protocol In Proceedings of the 17th European Symposiumon Research in Computer Security volume 7459 of Lecture Notes inComputer Science pages 325ndash342 Springer-Verlag 2012

[142] Naipeng Dong Hugo Jonker and Jun Pang Challenges in ehealthfrom enabling to enforcing privacy In Proceedings of the First inter-national conference on Foundations of Health Informatics Engineeringand Systems (FHIESrsquo11) volume 7151 of Lecture Notes in ComputerScience pages 195ndash206 Springer-Verlag 2012

[143] Sergio Dias Marques Sandro Reis and Denis Zampunieris Personal-ized adaptive and intelligent support for online assignments based onproactive computing In Proceedings of ICALT 2012 IEEE 12th In-ternational Conference on Advanced Learning Technologies pages 668ndash 669 IEEE Computer Society Conference Publishing Services 2012

[144] Denise Demirel Hugo Jonker and Melanie Volkamer Random blockverification Improving the norwegian electoral mix net In Proceed-ings of the 5th International Conference on Electronic Voting (EVOTE2012) volume 205 pages 65ndash78 Gesellschaft fur Informatik eV 2012

[145] Mehdi Dastani Leendert van der Torre and Neil Yorke-Smith A pro-gramming approach to monitoring communication in an organisationalenvironment In AAMAS rsquo12 Proceedings of the 11th InternationalConference on Autonomous Agents and Multiagent Systems - Volume3 pages 1373ndash1374 2012

[146] Sviatlana Danilava Stephan Busemann and Christoph SchommerArtificial conversational companions In Proceedings of the 4th Inter-national Conference on Agents and Artificial Intelligence volume 2pages 282ndash289 SciTePress 2012 2012

[147] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser Gap vspag In 42nd IEEE International Symposium on Multiple-Valued Logic(ISMVL 2012) pages 268ndash273 IEEE Computer Society 2012

[148] Xihui Chen and Jun Pang Measuring query privacy in location-basedservices In Proceeding of 2nd ACM Conference on Data and Applica-tion Security and Privacy pages 49 ndash 61 ACM 2012

[149] Martin Caminada and Podlaszewski Mikolaj Grounded semantics aspersuasion dialogue In Computational Models of Argument - Proceed-ings of COMMA 2012 volume 245 pages 478ndash485 IOS Press 2012

[150] Martin Caminada and Mikolaj Podlaszewski User-computer persua-sion dialogue for grounded semantics In Proceedings of the 24th

BIBLIOGRAPHY 213

Benelux Conference on Artificial Intelligence (BNAIC 2012) pages343ndash344 2012

[151] Martin Caminada and Mikolaj Podlaszewski Grounded semantics aspersuasion dialogue In Proceedings of the 4th International Confer-ence on Computational Models of Argument (COMMA 2012) volume245 pages 478ndash485 IOS Press 2012

[152] Patrice Caire Antonis Bikakis and Vasileios Efthymiou Convivialityby design In Social computing Social cognition social networks Ac-quisition representation and reasoning with contextualized knowledge(ARCOE 2012) 2012

[153] M Majid Butt and Eduard A Jorsweick Energy efficient multiuserscheduling Exploiting the loss tolerance of the application In IEEEGlobecom - Symposium on Selected Areas in Communications pages3555ndash3560 IEEE 2012

[154] M Majid Butt Benjamin Schubert Martin Kurras Kai BornerThomas Haustein and Lars Thiele On the energy-bandwidth trade-off in green wireless networks System level results In Workshop onSmart and Green Communications amp Networks (SGCNet) at Interna-tional conference on communication in China (ICCC) pages 91ndash95IEEE 2012

[155] M Majid Butt Deadline delay constrained multiuser multicell sys-tems Energy efficient scheduling In 13th IEEE International Work-shop on Signal Processing Advances in Wireless Communications(SPAWC) pages 309ndash313 IEEE 2012

[156] Richard Booth Martin Caminada Mikolaj Podlaszewski and IyadRahwan Quantifying disagreement in argument-based reasoningIn Proceedings of the 11th International Conference on AutonomousAgents and Multiagent Systems (AAMAS 2012) pages 493ndash500 Inter-national Foundation for Autonomous Agents and Multiagent Systems2012

[157] Richard Booth Eduardo Ferme Sebastien Konieczny and RamonPino Perez Credibility-limited revision operators in propositionallogicrsquo In Proceedings of the 24th Benelux Conference on ArtificialIntelligence (BNAIC 2012) pages 277ndash278 2012

[158] Richard Booth Eduardo Ferme Sebastien Konieczny and RamonPino Perez Credibility-limited revision operators in propositionallogic In Proceedings of the 13th International Conference on Prin-ciples of Knowledge Representation and Reasoning (KR 2012) pages116ndash125 AAAI 2012

214 BIBLIOGRAPHY

[159] Richard Booth Souhila Kaci Tjitze Rienstra and Leon van der TorreConditional acceptance functions In Proceedings of the 4th Interna-tional Conference on Computational Models of Argument (COMMA2012) volume 245 pages 470ndash477 IOS Press 2012

[160] Richard Booth Thomas Meyer and Ivan Vazinczak Ptl A proposi-tional typicality logic In 13th Conference on Logics in Artificial In-telligence (JELIA 2012) volume 7519 pages 107ndash119 Springer BerlinHeidelberg 2012

[161] Nicolas Bernard and Franck Leprevost Beyond tor The truenymsprotocol In Security and Intelligent Information Systems volume7053 of Lecture Notes in Computer Science pages 68ndash84 Springer2012

[162] Aritz Barrondo Andrei Tchernykh Elisa Shaeffer and JohnatanPecero Energy efficiency of knowledge-free scheduling in peer-to-peerdesktop grids In Proceedings of the 2012 International Conferenceon High Performance Computing amp Simulation (HPCS 2012) pages105ndash111 IEEE 2012

[163] Pietro Baroni Guido Boella Federico Cerutti Massimiliano Gia-comin Leendert van der Torre and Serena Villata On inputoutputargumentation frameworks In Computational Models of Argument(Proceedings of COMMA 2012) pages 358ndash365 IOS Press 2012

[164] Arash Atashpendar Laurent Kirsch Jean Botev and SteffenRothkugel A native approach to semantics and inference in fine-grained documents In Proceedings of the 2nd Joint International Se-mantic Technology Conference 2012

[165] Ofer Arieli and Martin Caminada A general qbf-based formalization ofabstract argumentation theory In Computational Models of Argument- Proceedings of COMMA 2012 volume 245 pages 105ndash116 IOS Press2012

[166] Giulia Andrighetto Guido Governatori Pablo Noriega and Leendertvan der Torre Normative multi-agent systems In Dagstuhl Reportsvolume 2 pages 23ndash49 2012

[167] Maha Alodeh Qoe for spatial cognitive systems In IEEE Interna-tional Conference on Communications 2012

[168] Dzmitry Kliazovich Pascal Bouvry and Samee Ullah Khan Sim-ulating communication processes in energy-efficient cloud computingsystems In IEEE 1st International Conference on Cloud Networkingpages 2015ndash2017 2012

BIBLIOGRAPHY 215

[169] Juan Luis Jimenez Laredo Bernabe Dorronsoro Johnatan PeceroPascal Bouvry Juan Jose Durillo and Carlos Fernandes Designing aself-organized approach for scheduling bag-of-tasks In Proceedings ofthe 7th International Conference on P2P Parallel Grid Cloud andInternet Computing (3PGCIC) pages 315ndash320 IEEE 2012

[170] Mateusz Guzek Cesar O Diaz Johnatan E Pecero Pascal Bouvryand Albert Y Zomaya Impact of voltage levels number for energy-aware bi-objective dag scheduling for multi-processors systems InCommunications in Computer and Information Science volume 344pages 70ndash80 Springer 2012

[171] Bernabe Dorronsoro and Pascal Bouvry Study of different small-worldtopology generation mechanisms for genetic algorithms In Proceedingsof the IEEE Congress on Evolutionary Computation (CEC) part ofWorld Conference in Computational Intelligence (WCCI) pages 1580ndash 1587 IEEE 2012

[172] Sune S Nielsen Bernabe Dorronsoro Gregoire Danoy and PascalBouvry Novel efficient asynchronous cooperative co-evolutionarymulti-objective algorithms In Congress on Evolutionary Computa-tion pages 1ndash7 IEEE 2012

[173] Apostolos Stathakis Gregoire Danoy Pascal Bouvry and GianluigiMorelli Satellite payload reconfiguration optimisation An ilp modelIn INTELLIGENT INFORMATION AND DATABASE SYSTEMSvolume 7197 pages 311ndash320 Springer 2012

[174] Marcin Seredynski Gregoire Danoy Masoud Tabatabaei Pascal Bou-vry and Yoann Pignie Generation of realistic mobility for vanetsusing genetic algorithms In Proceedings of the IEEE Congress onEvolutionary Computation pages 1ndash8 IEEE 2012

[175] Marcin Seredynski and Pascal Bouvry The necessity for strong re-ciprocators in mobile ad hoc networks In Proceedings of the 2012IEEE International Symposium on Parallel and Distributed Process-ing Workshops and PhD Forum pages 609ndash616 IEEE 2012

[176] Juan Luis Jimenez Laredo Pascal Bouvry Sanaz Mostaghim andJuan Julian Merelo Guervos Validating a peer-to-peer evolutionaryalgorithm In European Conference on the Applications of Evolution-ary Computation volume 7248 pages 436ndash445 Springer Berlin Hei-delberg 2012

[177] Marcin Seredynski and Pascal Bouvry Solving soft security prob-lem in manets using an evolutionary approach In Security and In-telligent Information Systems International Joint Confererence SIIS

216 BIBLIOGRAPHY

2011 Warsaw Poland June 13-14 2011 Revised Selected Papersvolume 7053 pages 33ndash44 Springer LNCS 2012

[178] Muhammad Zohaib Iqbal Andrea Arcuri and Lionel Briand Empir-ical investigation of search algorithms for environment model-basedtesting of real-time embedded software In Proceedings of the Inter-national Symposium on Software Testing and Analysis (ISSTArsquo12)pages 199ndash209 ACM 2012

[179] Muhammad Zohaib Iqbal Andrea Arcuri and Lionel Briand Com-bining search-based and adaptive random testing strategies for envi-ronment model-based testing of real-time embedded systems In Pro-ceedings of the 4th Symposium on Search Based Software Engineering(SSBSErsquo12) pages 136ndash151 Springer-Verlag 2012

[180] Muhammad Zohaib Iqbal Shaukat Ali Tao Yue and Lionel BriandExperiences of applying umlmarte on three industrial projects InProceedings of ACMIEEE 15th International Conference on ModelDriven Engineering Languages amp Systems (MODELSrsquo12) pages 642ndash658 Springer-Verlag 2012

[181] Razieh Behjati Tao Yue and Lionel Briand A modeling approach tosupport the similarity-based reuse of configuration data In Proceed-ings of ACMIEEE 15th International Conference on Model DrivenEngineering Languages amp Systems (MODELSrsquo12) pages 497ndash513Springer-Verlag 2012

[182] Shaukat Ali Tao Yue Lionel Briand and Suneth Walawege A prod-uct line modeling and configuration methodology to support model-based testing An industrial case study In Proceedings of ACMIEEE15th International Conference on Model Driven Engineering Lan-guages amp Systems (MODELSrsquo12) pages 726ndash742 Springer-Verlag2012

[183] Nina Elisabeth Holt Richard Torkar Lionel Briand and Kai HansenState-based testing Industrial evaluation of the cost-effectiveness ofround-trip path and sneak-path strategies In Proceedings of the 23rdIEEE International Symposium on Software Reliability Engineering(ISSRE 2012) IEEE Computer Society 2012

[184] Stefano Di Alesio Arnaud Gotlieb Shiva Nejati and Lionel BriandTesting deadline misses for real-time systems using constraint opti-mization techniques In Workshop on Constraints in Software Test-ing Verification and Analysis (CSTVA 2012) pages 764ndash769 IEEE2012

BIBLIOGRAPHY 217

[185] Lionel Briand Davide Falessi Shiva Nejati Mehrdad Sabetzadeh andTao Yue Research-based innovation A tale of three projects in model-driven engineering In 15th International Conference Model DrivenEngineering Languages and Systems - volume 7590 pages 759ndash775Springer Berlin Heidelberg 2012

[186] Razieh Behjati Shiva Nejati Tao Yue Arnaud Gotlieb and LionelBriand Model-based automated and guided configuration of embed-ded software systems In Modelling Foundations and Applications -8th European Conference volume 7349 of Lecture Notes in ComputerScience pages 226ndash243 Springer Berlin Heidelberg 2012

[187] Shiva Nejati Stefano Di Alesio Mehrdad Sabetzadeh and LionelBriand Modeling and analysis of cpu usage in safety-critical embeddedsystems to support stress testing In Proceedings of ACMIEEE 15thInternational Conference on Model Driven Engineering Languages ampSystems (MODELSrsquo12) pages 759ndash775 2012

[188] Markus Forster Raphael Frank Mario Gerla and Thomas Engel Im-proving highway traffic through partial velocity synchronization In2012 IEEE Global Communications Conference (GLOBECOM) 3-7December 2012 Anaheim CA USA pages 5795ndash5800 2012

[189] Foued Melakessou and Thomas Engel Narval scilab toolbox Networkanalysis and routing evaluation In 2012 International Workshop onScilab amp OW2 (IWSO) pages 1ndash18 2012

[190] Andriy Panchenko Fabian Lanze and Thomas Engel Improvingperformance and anonymity in the tor network In 31st IEEE In-ternational Performance Computing and Communications Conference(IEEE IPCCC 2012) IEEE Press 2012

[191] Samuel Marchal Jerome Francois Radu State and Thomas EngelSemantic based dns forensics In Proceedings of the IEEE InternationalWorkshop on Information Forensics and Security - WIFSrsquo12 IEEE2012

[192] Raphael Frank Maximilien Mouton and Thomas Engel Towardscollaborative traffic sensing using mobile phones In IEEE VehicularNetworking Conference 2012 pages 15ndash20 IEEE 2012

[193] Thorsten Ries Radu State and Thomas Engel Instant degradationof anonymity in low-latency anonymisation systems In DependableNetworks and Services pages 98ndash108 Springer Berlin Heidelberg2012

218 BIBLIOGRAPHY

[194] David Fotue Houda Labiod and Thomas Engel Performance evalua-tion of hybrid channel assignment for wireless sensor networks In The8th International Conference on Mobile Ad-hoc and Sensor Networks(MSN) pages 1ndash8 IEEE 2012

[195] David Fotue Houda Labiod and Thomas Engel An arbitrary mobil-ity model of mini-sinks using controlled data collection for reducingcongestion appearance in wireless sensor networks In 31st IEEE In-ternational Performance Computing and Communications Conference(IPCCC) pages 1ndash9 IEEE 2012

[196] David Fotue Houda Labiod and Thomas Engel Controlled data col-lection of mini-sinks for maximizing packet delivery ratio and through-put using multiple paths in wireless sensor networks In Proceedings ofthe 23rd IEEE International Symposium on Personal Indoor Mobileand Radio Communications (PIMRC) pages 758 ndash764 IEEE 2012

[197] Samuel Marchal Jerome Francois Radu State and Thomas EngelProactive discovery of phishing related domain names In The 15thInternational Symposium on Research in Attacks Intrusions and De-fenses volume 7462 pages 190ndash209 Springer-Verlag Berlin Heidel-berg 2012

[198] Samuel Marchal and Thomas Engel Large scale dns analysis In6th IFIP WG 66 International Conference on Autonomous Infras-tructure Management and Security volume 7279 pages 151ndash154Springer Berlin Heidelberg 2012

[199] Stefan Hommes Radu State and Thomas Engel Detecting stealthybackdoors with association rule mining In Lecture Notes in ComputerScience volume 7290 pages 161ndash171 Springer 2012

[200] Stefan Hommes Radu State and Thomas Engel A distance-basedmethod to detect anomalous attributes in log files In IEEE NetworkOperations and Management Symposium pages 498ndash501 2012

[201] Cynthia Wagner and Thomas Engel Detecting anomalies in netflowrecord time series by using a kernel function In IFIPLNCS De-pendable Network and Services 6th International Conference on Au-tonomous Infrastructure Management and Security (AIMS2012) vol-ume 7279 pages 122ndash125 Springer Verlag 2012

[202] Samuel Marchal Jerome Francois Cynthia Wagner and Thomas En-gel Semantic exploration of dns In 11th Networking Conference 2012pages 370ndash384 Springer Berlin Heidelberg 2012

BIBLIOGRAPHY 219

[203] Samuel Marchal Jerome Francois Cynthia Wagner Radu StateAlexandre Dulaunoy Thomas Engel and Olivier Festor Dnssm Alarge-scale passive dns security monitoring framework In IEEEIFIPNetwork Operations and Management Symposium pages 988 ndash 993IEEE 2012

[204] Jerome Francois Cynthia Wagner Radu State and Thomas EngelSafem Scalable analysis of flows with entropic measures and svm InProceedings of the Network Operations and Management Symposium2012 pages 510 ndash513 IEEE 2012

[205] Cynthia Wagner Jerome Francois Radu State Alexandre DulaunoyGerard Wagener and Thomas Engel Sdbf Smart dns brute-forcer In IEEEIFIP Network Operations and Management Sympo-sium (NOMSrsquo12) pages 1001ndash1007 IEEE 2012 to appear

[206] Jeehyun Hwang Tao Xie Donia Elkateb Tejeddine Mouelhi and YvesLe Traon Selection of regression system tests for security policy evolu-tion In Proceedings of the 27th IEEEACM International Conferenceon Automated Software Engineering pages 266ndash269 ACM 2012

[207] Assaad Moawad Vasileios Efthymiou Patrice Caire Gregory Nainand Yves Le Traon Introducing conviviality as a new paradigm forinteractions among it objects In Proceedings of the Workshop on AIProblems and Approaches for Intelligent Environments volume 907pages 3ndash8 CEUR-WSorg 2012

[208] Alexandre Bartel Jacques Klein Martin Monperrus and YvesLe Traon Automatically securing permission-based software by re-ducing the attack surface An application to android In IEEEACMInternational Conference on Automated Software Engineering pages1ndash4 2012

[209] Assaad Moawad Vasileios Efthymiou Patrice Caire Gregory Nainand Yves Le Traon Introducing conviviality as a new paradigmfor interactions among it objects In Workshop on AI Problems andApproaches for Intelligent Environments (AIIE 2012) volume 907pages 3ndash8 CEUR-WSorg 2012

[210] Antonis Bikakis Vasileios Efthymiou Patrice Caire and YvesLe Traon Introducing conviviality as a property of multi-context sys-tems In Acquisition Representation and Reasoning with Contextual-ized Knowledge (ARCOE 2012) pages 19ndash31 2012

[211] Alexandre Bartel Jacques Klein Martin Monperrus and YvesLe Traon Dexpler Converting android dalvik bytecode to jimple

220 BIBLIOGRAPHY

for static analysis with soot In ACM SIGPLAN International Work-shop on the State Of the Art in Java Program Analysis (SOAP 2012)pages 1ndash12 2012

[212] Donia Elkateb Tejeddine Mouelhi Yves Le Traon Jeehyun Hwangand Tao Xie Refactoring access control policies for performance im-provement In Proceedings of the third joint WOSPSIPEW interna-tional conference on Performance Engineering pages 323ndash334 ACM2012

[213] Yehia Elrakaiby Tejeddine Mouelhi and Yves Le Traon Testing obli-gation policy enforcement using mutation analysis In Proceedings ofthe fourth International Conference on Software Testing Verificationand Validation ICST 2012 pages 673 ndash680 IEEE 2012

[214] Dianxiang Xu Lijo Thomas Michael Kent Tejeddine Mouelhi andYves Le Traon A model-based approach to automated testing ofaccess control policies In Proceedings of the 17th ACM Symposium onAccess Control Models and Technologies pages 209ndash218 2012

[215] Xihui Chen Carlo Harpes Gabriele Lenzini Miguel Martins SjoukeMauw and Jun Pang Implementation and validation of a localisationassurance service provider In Proc of the 6th ESA Workshop onSatellite Navigation Technologies and European Workshop on GNSSSignals and Signal Processing (NAVITEC 2012) pages 1ndash7 IEEE2012

[216] Xihui Chen Gabriele Lenzini Sjouke Mauw and Jun Pang A groupsignature based electronic toll pricing system In Proceedings of the7th International Conference on Availability Reliability and Securitypages 85ndash93 IEEE Computer Society 2012

[217] Gan Zheng Symeon Chatzinotas and Bjorn Ottersten Multi-gatewaycooperation in multibeam satellite systems In IEEE 23rd Interna-tional Symposium on Personal Indoor and Mobile Radio Communica-tions (PIMRC) pages 1360ndash1364 2012

[218] Qingmin Meng Wei Feng Gan Zheng Symeon Chatzinotas andBjorn Ottersten Fixed full duplex relaying for wireless broadbandcommunication In International Conference on Wireless Communi-cations and Signal Processing WCSP 2012 2012

[219] Gan Zheng Li Jiangyuan Kai-Kit Wong Athina P Petropulu andBjorn Ottersten Using simple relays to improve physical-layer secu-rity In 1st IEEE International Conference on Communications inChina (ICCC2012) pages 329ndash333 2012

BIBLIOGRAPHY 221

[220] Sabrina Gerbracht Eduard A Jorswieck Gan Zheng and Bjorn Ot-tersten Non-regenerative two-hop wiretap channels using interferenceneutralization In Proceedings of the International Workshop on In-formation Forensics and Security pages 1ndash1 IEEE 2012

[221] Bhavani Shankar M R Saikat Chatterjee and Bjorn Ottersten De-tection of sparse random signals using compressive measurements InProceedings of IEEE International Conference on Acoustics Speechand Signal Processing pages 3257 ndash 3260 2012

[222] Bjorn Ottersten Signal processing challenges in satellite networks In2012 International Conference on Wireless Communications and Sig-nal Processing(WCSP 2012) pages 1ndash1 WCSP 2012 2012 KeynoteSpeaker

[223] Efthymios Tsakonas Joakim Jalden Nicolas D Sidiropoulos andBjorn Ottersten Maximum likelihood based sparse and distributedconjoint analysis In Statistical Signal Processing Workshop (SSP)2012 IEEE pages 33ndash36 IEEE 2012

[224] Symeon Chatzinotas and Bjorn Ottersten Capacity analysis of dual-hop amplify-and-forward mimo multiple-access channels In Interna-tional Conference on Wireless Communications and Signal ProcessingWCSP 2012 IEEE 2012

[225] Symeon Chatzinotas and Bjorn Ottersten Cognitive interferencealignment between small cells and a macrocell In 19th InternationalConference on Telecommunications (ICT) 2012 volume 1-6 IEEE2012

[226] Alexis Aravanis Bhavani Shankar M R Gregoire Danoy Pantelis-Daniel Arapoglou Panayotis Cottis and Bjorn Ottersten Multi-objective optimization approach to power allocation in multibeam sys-tems In 30th AIAA International Communications Satellite SystemsConference pages 1ndash6 2012

[227] Alexis Aravanis Bhavani Shankar M R Gregoire Danoy Pantelis-Daniel Arapoglou Panayotis Cottis and Bjorn Ottersten Power allo-cation in multibeam satellites - a hybrid-genetic algorithm approachIn 2nd ESA Workshop on Advanced Flexible Telecom Payloads pages1ndash5 European Space Agency 2012

[228] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenSpectrum sensing in dual polarized fading channels for cognitive sat-coms In accepted for publication in the proceedings of the IEEE Globe-com 2012 conference IEEE 2012

222 BIBLIOGRAPHY

[229] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenSatellite cognitive communications Interference modeling and tech-niques selection In 6th Advanced Satellite Multimedia Systems Con-ference (ASMS) and 12th Signal Processing for Space CommunicationsWorkshop (SPSC) pages 111ndash118 2012

[230] Frederic Garcia Djamila Aouada Hashim Kemal Abdella ThomasSolignac Bruno Mirbach and Bjorn Ottersten Depth enhancement byfusion for passive and active sensing In 12th European Conference onComputer Vision (ECCV) volume 7585 of Lecture Notes in ComputerScience pages 506ndash515 Springer Berlin Heidelberg 2012

[231] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenExploiting polarization for spectrum sensing in cognitive satcoms In7th International Conference on Cognitive Radio Oriented WirelessNetworks pages 36ndash41 2012

[232] Kassem Al Ismaeil Djamila Aouada Bruno Mirbach and Bjorn Ot-tersten Bilateral filter evaluation based on exponential kernels In21st International Conference on Pattern Recognition IEEE Xplore2012

[233] Frederic Garcia Djamila Aouada Bruno Mirbach and Bjorn Otter-sten Spatio-temporal tof data enhancement by fusion In IEEE Inter-national Conference on Image Processing (ICIP) pages 1 ndash 4 IEEE2012

[234] Symeon Chatzinotas and Bjorn Ottersten Coordinated multipointuplink capacity over a mimo composite fading channel In Interna-tional Conference on Computing Networking and Communicationspages 1061 ndash1065 IEEE 2012

[235] Jiaheng Wang Mats Bengtsson Bjorn Ottersten and Daniel P Palo-mar Robust maximin mimo precoding for arbitrary convex uncer-tainty sets In Proceedings IEEE International Conference on Acous-ticsSpeechand Signal Processing (ICASSP) pages 3045ndash3048 IEEE2012

[236] Dalia Khader Ben Smyth Peter Y A Ryan and Feng Hao A fairand robust voting system by broadcast In International Conferenceon Electronic Voting volume 205 pages 285ndash299 Lecture Notes inInformatics 2012

[237] Craig Burton Burton Chris Culnane James Heather Thea PeacockPeter Ryan Steve Schneider Vanessa Teague Roland Wen Zhe Xiaand Sriramkrishnan Srinivasan A supervised verifiable voting protocolfor the victorian electoral commission In 5th International Conference

75 Internal Reports 223

on Electronic Voting 2012 5th International Conference on ElectronicVoting (EVOTE 2012) LNI pages 81ndash94 GI 2012

[238] Craig Burton Chris Culnane James Heather Thea Peacock PeterRyan Steve Schneider Sriramkrishnan Srinivasan Vanessa TeagueRoland Wen and Zhe Xia A supervised verifiable voting protocol forthe victorian electoral commission In 2012 Electronic Voting Tech-nology WorkshopWorkshop on Trustworthy Elections pages 1ndash100USENIX 2012

[239] Markus Jostock and Jurgen Sachau Compound model of inverterdriven grids In 5th International Conference on Integration of Re-newable and Distributed Energy Resources pages 194ndash195 OTTI -Ostbayerisches Technologie-Transfer-Institut eV 2012

[240] Markus Jostock and Jurgen Sachau Frequency coupling in invertergrids In 5th International Conference on Integration of RenewableEnergy and Distributed Energy Resources pages 192ndash193 OTTI - Os-tbayerisches Technologie-Transfer-Institut eV 2012

[241] Guido Boella Patrice Caire Leendert van der Torre and Ser-ena Villata Dependence networks for agreement technologies InAT2012 Agreement Technologies Proceedings of the First Interna-tional Conference on Agreement Technologies volume 918 pages 109ndash110 CEUR 2012

[242] Alan Perotti Guido Boella Silvano Colombo Tosatto Artur S drsquoAvilaGarcez Valerio Genovese and Leendert van der Torre Learning andreasoning about norms using neural-symbolic systems In Proceed-ings of the 11th International Conference on Autonomous Agents andMultiagent Systems - Volume 2 volume 2 pages 1023ndash1030 2012

75 Internal Reports

[243] Mihail Minev Christoph Schommer and Theoharry GrammatikosNews and stock markets A survey on abnormal returns and predictionmodels Technical Report - 2012

[244] Alexandre Bartel Jacques Klein Martin Monperrus Kevin Allix andYves Le Traon Improving privacy on android smartphones throughin-vivo bytecode instrumentation Technical report SnT TechnicalReport 2012

[245] Vasileios Efthymiou and Patrice Caire Diagram analysis report Usecases for conviviality and privacy in ambient intelligent systems Tech-nical report SnT Luxembourg 2012

224 BIBLIOGRAPHY

[246] Markus Forster Raphael Frank and Thomas Engel Evaluation ofsensors in modern smartphones for vehicular traffic monitoring Tech-nical report SnT 2012

[247] Raphael Frank Markus Forster Gerla Mario and Thomas EngelA survey on the performance of commercial mobile access networksTechnical report 2012

[248] Christopher Henard Mike Papadakis Gilles Perrouin Jacques KleinPatrick Heymans and Yves Le Traon Bypassing the combinatorialexplosion Using similarity to generate and prioritize t-wise test suitesfor large software product lines Technical report 2012 TechnicalReport

76 Proceedings

[249] Valentin Goranko and Wojciech Jamroga editors Proceedings of the5th Workshop on Logical Aspects of Multi-Agent Systems (LAMAS2012) IFAAMAS 2012

[250] STAST 2012 IEEE 2012

[251] Security and Intelligent Information Systems volume 7053 of LNCSSpringer 2012

Appendix A

Additional References

[252] Lauaro Dolberg Jampaposerome Francois and Thomas Engel EfficientMultidimensional Aggregation for Large Scale Monitoring In LargeInstallation System Administration Conference (LISA) San DiegoUSA 2012 USENIX

[253] Guido Boella Luigi di Caro Livio Robaldo and Llio Humphreys Us-ing legal ontology to improve classification in the eunomos legal docu-ment and knowledge management system In Semantic Processing ofLegal Texts (SPLeT-2012) Workshop Proceedings of the Eighth Inter-national Conference on Language Resources and Evaluation (LRECrsquo12) pages 13ndash20 2012

[254] Alessandra Bagnato Barbara Kordy Per H Meland and PatrickSchweitzer Attribute decoration of attack-defense trees InternationalJournal of Secure Software Engineering 3(2)1ndash35 2012

[255] Xihui Chen David Fonkwe and Jun Pang Post-hoc analysis of usertraceability in electronic toll collection systems In Proc 7th Work-shop on Data Privacy Management (DPMrsquo12) LNCS pages 19ndash42Springer 2013

[256] Xihui Chen Jun Pang and Ran Xue Constructing and comparinguser mobility profiles for location-based services In Proc 28th ACMSymposium on Applied Computing (SACrsquo13) ACM Press 2013

[257] Xihui Chen and Jun Pang Exploring dependency for query privacyprotection in location-based services In Proc 3rd ACM Conference

226 BIBLIOGRAPHY

on Data and Application Security and Privacy (CODASPYrsquo13) ACMPress 2013

[258] Barbara Kordy Sjouke Mauw Sasa Radomirovic and PatrickSchweitzer AttackndashDefense Trees Journal of Logic and Computa-tion 2013 Preprint available at httpsatossunilumembers

barbarapapersADT12pdf

[259] T van Deursen S Mauw and S Radomirovic mCarve Carvingattributed dump sets In 20th USENIX Security Symposium pages107ndash121 USENIX Association August 2011

[260] Simon Kramer Rajeev Gore and Eiji Okamoto Computer-aideddecision-making with trust relations and trust domains (cryptographicapplications) Journal of Logic and Computation 2012

[261] Simon Kramer A logic of interactive proofs Technical report Uni-versity of Luxembourg 2012 Available at httparxivorgabs

12013667

[262] Simon Kramer Logic of negation-complete interactive proofs (formaltheory of epistemic deciders) Technical report University of Luxem-bourg 2012 Available at httparxivorgabs12085913

[263] Simon Kramer Logic of non-monotonic interactive proofs (formaltheory of temporary knowledge transfer) Technical report Universityof Luxembourg 2012 Available at httparxivorgabs1208

1842

[264] Simon Kramer and Joshua Sack Parametric constructive kripke-semantics for standard multi-agent belief and knowledge (knowledgeas unbiased belief) Technical report University of Luxembourg 2012Available at httparxivorgabs12091885

[265] Jerome Francois Shaonan Wang Walter Bronzi Radu State andThomas Engel Botcloud Detecting botnets using mapreduce InProceddings of International Workshop on Information Forensics andSecurity (WIFSrsquo11) pages 1ndash6 IEEE 2011

[266] Andreas Zinnen and Thomas Engel Towards economic energy tradingin cloud environments In IEEE International Conference on CloudComputing Technology and Science pages 477ndash481 2011

[267] Andreas Zinnen and Thomas Engel Deadline constrained schedulingin hybrid clouds with gaussian processes In High Performance Com-puting and Simulation Conference (HPCS) pages 294 ndash 300 2011

BIBLIOGRAPHY 227

[268] Jerome Francois Radu State Thomas Engel and Olivier Festor En-forcing security with behavioral fingerprinting In International Con-ference on Network and Service Management (CNSM) pages 1 ndash92011

[269] Andriy Panchenko Lukas Niessen Andreas Zinnen and Thomas En-gel Website fingerprinting in onion routing based anonymization net-works In Proceedings of the 10th ACM Computer and Communica-tions Security (ACM CCS) Workshop on Privacy in the ElectronicSociety (WPES) pages 103ndash114 ACM Press 2011

[270] Andriy Panchenko Otto Spaniol Andre Egners and Thomas EngelLightweight hidden services In Proceedings of the 10th IEEE Interna-tional Conference on Trust Security and Privacy in Computing andCommunications (IEEE TrustCom 2011) Changsha China Novem-ber 2011 IEEE Computer Society 2011

[271] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Breaking tor anonymity with game theory anddata mining CONCURRENCY AND COMPUTATION PRACTICEAND EXPERIENCE pages 1ndash14 2011

[272] Raphael Frank Eugenio Giordano Mario Gerla and Thomas EngelPerformance bound for routing in urban scenarios In Proceedings ofthe 7th Asian Internet Engineering Conference (AINTEC) pages 38ndash45 2011

[273] Thorsten Ries Volker Fusenig Christian Vilbois and Thomas EngelVerification of data location in cloud networking In 2011 Fourth IEEEInternational Conference on Utility and Cloud Computing pages 439ndash444 2011

[274] Thorsten Ries Radu State and Thomas Engel Measuring anonymityusing network coordinate systems In 11th International Symposiumon Communications and Information Technologies (ISCIT) 2011pages 366ndash371 2011

[275] Stefan Hommes Radu State and Thomas Engel Detection of abnor-mal behaviour in a surveillance environment using control charts InIEEE International Conference on Advanced Video and Signal basedSurveillance (AVSS) pages 113ndash118 2011

[276] David Fotue Foued Melakessou Houda Labiod and Thomas EngelMini-sink mobility with diversity-based routing in wireless sensor net-works In Proceedings of the 8th ACM Symposium on Performanceevaluation of wireless ad hoc sensor and ubiquitous networks (PE-WASUN) pages 9ndash16 ACM 2011

228 BIBLIOGRAPHY

[277] David Fotue Foued Melakessou Houda Labiod and Thomas EngelA distributed hybrid channel selection and routing technique for wire-less sensor networks In IEEE 74th Vehicular Technology ConferenceVTC-Fall pages 1ndash6 IEEE 2011

[278] Cynthia Wagner Gerard Wagener Radu State and Thomas EngelPeeking into ip flow records using a visual kernel method In IWANN2011 workshops Part II CISIS 2011 volume 6694 pages 41ndash49LNCS Springer Verlag 2011

[279] Cynthia Wagner Jerome Francois Radu State and Thomas EngelMachine learning approach for ip-flow record anomaly detection InProceedings of the 10th international IFIP TC 6 conference on Net-working (NETWORKING) volume 6640 pages 28ndash39 Springer Ver-lag 2011

[280] Thorsten Ries Andriy Panchenko Radu State and Thomas EngelComparison of low-latency anonymous communication systems - prac-tical usage and performance In Australasian Information SecurityConference (AISC 2011) volume 116 pages 77ndash86 ACS 2011

[281] David Fotue Foued Melakessou Houda Labiod and Thomas EngelEffect of sink location on aggregation based on degree of connectivityfor wireless sensor networks In First International Workshop on Ad-vanced Communication Technologies and Applications to Intelligenttransportation systems Cognitive radios and Sensor Networks (AC-TICS) pages 271 ndash 276 2011

[282] Pascal Bouvry Horacio Gonzalez-Velez and Joanna Kolodziej In-telligent Decision Systems in Large-Scale Distributed Environmentsvolume 362 of Studies in Computational Intelligence Springer 2011

[283] Bernabe Dorronsoro and Pascal Bouvry Adaptive neighborhoods forcellular genetic algorithms In Nature Inspired Distributed Computing(NIDISC) sessions of the International Parallel and Distributed Pro-cessing Symposium (IPDPS) 2011 Workshop pages 383ndash389 IEEE2011

[284] Patricia Ruiz Bernabe Dorronsoro and Pascal Bouvry Optimiza-tion and performance analysis of the aedb broadcasting algorithmIn IEEE International Workshop on Wireless Mesh and Ad Hoc Net-works pages 1ndash6 IEEE 2011

[285] Mateusz Guzek Johnatan E Pecero Bernabe Dorronsoro and PascalBouvry Energy-aware scheduling of parallel applications with multi-objective evolutionary algorithm In A Bridge between Probability SetOriented Numerics and Evolutionary Computation pages 1ndash4 2011

BIBLIOGRAPHY 229

[286] Bernabe Dorronsoro and Pascal Bouvry On the use of small-world population topologies for genetic algorithms In Proceedingsof EVOLVE 2011 2011

[287] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry Multi-objective cooperative coevolutionary algorithms for robust schedulingIn Proceedings of EVOLVE 2011 2011

[288] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee In Proceedings des 20eme ren-contres francophones du parallelisme (RenParrsquo20) pages 1ndash10 2011

[289] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certiclouda novel tpm-based approach to ensure cloud iaas security In Proceed-ings of the 4th IEEE Intl Conf on Cloud Computing (CLOUD 2011)pages 121 ndash 130 IEEE Computer Society 2011

[290] Julien Schleich Guillaume-Jean Herbiet Patricia Ruiz Pascal Bou-vry Jerome Wagener Paul Bicheler Frederic Guinand and SergeChaumette Enhancing the broadcast process in mobile ad hoc net-works using community knowledge In Proceedings of the first ACMinternational symposium on Design and analysis of intelligent vehicu-lar networks and applications pages 23ndash30 2011

[291] V Goranko W Jamroga and P Turrini Strategic games and trulyplayable effectivity functions In Proceedings of AAMAS2011 pages727ndash734 2011

[292] M de Boer D Gabbay X Parent and M Slavkovik Two dimensionalstandard deontic logic [including a detailed analysis of the 1985 jonesndashporn deontic logic system] Synthese pages 1ndash38 2011

[293] Harold Castro German Sotelo Cesar O Diaz and Pascal BouvryGreen flexible opportunistic computing with virtualization In Pro-ceedings of the 11th IEEE International Conference on Computer andInformation Technology pages 629ndash634 2011

[294] Cesar O Diaz Mateusz Guzek Johnatan E Pecero Pascal Bouvryand Samee U Khan Scalable and energy-efficient scheduling tech-niques for large-scale systems In Proceedings of the 11th IEEE Inter-national Conference on Computer and Information Technology pages641ndash647 2011

[295] Cesar O Diaz Mateusz Guzek Johnatan E Pecero Gregoire DanoyPascal Bouvry and Samee U Khan Energy-aware fast schedulingheuristics in heterogeneous computing systems In Proceedings of the2011 International Conference on High Performance Computing ampSimulation (HPCS 2011) pages 478ndash484 2011

230 BIBLIOGRAPHY

[296] Jean Botev and Marco Milanesio Code - an application-layer frame-work for confidentiality in distributed environments In Proceedingsof the 3rd International Workshop on Collaborative Social Computing(SocialComp 2011) 2011

[297] Jean Botev Wei Tsang Ooi and Ingo Scholtes Getting real - self-organized resource allocation on second life avatar traces In Proceed-ings of the 4th International Workshop on Massively Multiuser VirtualEnvironments (MMVE 2011) pages 170 ndash 175 IEEE 2011

[298] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry New state-of-the-art results for cassini2 global trajectory optimization problemIn International Joint Conference on Artificial Intelligence (IJCAI)Workshop on AI in Space Intelligence beyond planet Earth pages1ndash6 2011

[299] Bernabe Dorronsoro and Pascal Bouvry The explorationexploitationtradeoff in dynamic cellular evolutionary algorithms IEEE Transac-tions on Evolutionary Computation 15(1)67ndash98 2011

[300] Bernabe Dorronsoro Gregoire Danoy Pascal Bouvry and Antonio JNebro Multi-objective Cooperative Coevolutionary Evolutionary Algo-rithms for Continuous and Combinatorial Optimization volume 362of Studies in Computational Intelligence series pages 49ndash74 Springer2011

[301] Alexandru-Adrian Tantar Emilia Tantar and Pascal Bouvry Loadbalancing for sustainable ict In 13th Annual Genetic and Evolution-ary Computation Conference (GECCO 2011) Companion MaterialProceedings pages 733ndash738 ACM 2011

[302] Alexandru-Adrian Tantar Emilia Tantar and Pascal Bouvry A clas-sification of dynamic multi-objective optimization problems In 13thAnnual Genetic and Evolutionary Computation Conference (GECCO2011) Companion Material Proceedings pages 105ndash106 ACM 2011

[303] Emilia Tantar Alexandru-Adrian Tantar and Pascal Bouvry On dy-namic multi- objective optimization - classification and performancemeasures In Proceedings of the IEEE Congress on Evolutionary Com-putation pages 2759ndash2766 2011

[304] Eugenio Giordano Raphael Frank Giovanni Pau and Mario GerlaCorner A radio propagation model for vanets in urban scenariosProceedings of the IEEE 99(7)1280 ndash 1294 2011

[305] Johnatan Pecero Frederic Pinel Bernabe Dorronsoro GregoireDanoy Pascal Bouvry and Albert Zomaya Efficient Hierarchical

BIBLIOGRAPHY 231

Task Scheduling on GRIDS Accounting for Computation and Commu-nications volume 362 of Studies in Computational Intelligence pages25ndash48 Springer 2011

[306] Cynthia Wagner Jerome Francois Radu State and Thomas EngelDanakfinding the odd In Proceedings of the 5th International Con-ference on Network and System Security 2011 (NSS2011) pages 161ndash168 IEEE 2011

[307] Patricia Ruiz Bernabe Dorronsoro Giorgio Valentini Frederic Pineland Pascal Bouvry Optimisation of the enhanced distance basedbroadcasting protocol for manets J of Supercomputing Special Is-sue on Green networks pages 1ndash28 2011

[308] Jean Botev and Steffen Rothkugel Flora - flock-based resource alloca-tion for decentralized distributed virtual environments In Proceedingsof the 2nd International Workshop on Distributed Simulation and On-line Gaming (DISIO 2011) 2011

[309] Sebastien Varrette Emilia Tantar and Pascal Bouvry On the re-silience of [distributed] eas against cheaters in global computing plat-forms In IPDPS Workshops pages 409ndash417 IEEE 2011

[310] Alexandru-Adrian Tantar Gregoire Danoy Pascal Bouvry and SameeKhan Energy-Efficient Computing using Agent-Based Multi-ObjectiveDynamic Optimization pages 267ndash287 Springer New York NY USA2011

[311] Bernabe Dorronsoro and Pascal Bouvry Differential evolution algo-rithms with cellular populations Parallel Problem Solving from Nature(PPSN) Lecture Notes in Computer Science 6239320ndash330 2011

[312] Alexandre Bartel Benoit Baudry Freddy Munoz Jacques KleinTejeddine Mouelhi and Yves Le Model driven mutation applied toadaptative systems testing In Proceedings of the 2011 IEEE FourthInternational Conference on Software Testing Verification and Vali-dation Workshops ICSTW rsquo11 pages 408ndash413 IEEE Computer Soci-ety 2011

[313] Marwane El Kharbili Qin Ma Pierre Kelsen and Elke PulvermuellerEnterprise regulatory compliance modeling using corel An illustra-tive example In 13th IEEE Conference on Commerce and EnterpriseComputing pages 185ndash190 IEEE Computer Society Press 2011

[314] Marwane El Kharbili Qin Ma Pierre Kelsen and Elke PulvermuellerCorel Policy-based and model-driven regulatory compliance manage-ment In Proceedings of the 15th IEEE International Enterprise Dis-

232 BIBLIOGRAPHY

tributed Object Computing Conference pages 247ndash256 IEEE Com-puter Society Press 2011

[315] Wojciech Jamroga Sjouke Mauw and Matthijs Melissen Fairness innon-repudiation protocols In Security and Trust Management LectureNotes in Computer Science volume 7170 pages 122ndash139 Springer2012

[316] Agata Grzybek Gregoire Danoy and Pascal Bouvry Generation ofrealistic traces for vehicular mobility simulations In Proceedings ofthe second ACM international symposium on Design and analysis ofintelligent vehicular networks and applications DIVANet rsquo12 pages131ndash138 New York NY USA 2012 ACM

[317] Clark Thomborson Christian Collberg and Douglas Low A taxonomyof obfuscating transformations 1997

[318] Boaz Barak Oded Goldreich Russel Impagliazzo Steven RudichAmit Sahai Salil Vadhan and Ke Yang On the (im)possibility ofobfuscating programs 2001

[319] Christian Collberg and Jasvir Nagra Surreptitious Software Obfus-cation Watermarking and Tamperproofing for Software ProtectionAddison-Wesley Professional 2009

[320] M H Halstead Elements of software science 1977

[321] E I Oviedo Control flow data flow and program complexity Pro-ceedings of IEEE COMPSAC pages 146ndash152 1980

[322] Terence J Parr T J Parr and R W Quong Antlr A predicated-ll(k)parser generator 1995

[323] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee Technique et science informa-tiques 31(8-9-10)1121ndash1152 2012

[324] Jshadobf A javascript obfuscator based on evolutionary algorithmshttpjshadobfunilu 2013

[325] Apostolos Stathakis Gregoire Danoy El-Ghazali Talbi and PascalBouvry A local search algorithm for telecommunication satellite pay-load configuration In International Conference on Metaheuristics andNature Inspired Computing 2012

[326] Levi Lucio and Nicolas Guelfi A precise definition of operationalresilience Technical Report TR-LASSY-11-02 University of Luxem-bourg 2011

BIBLIOGRAPHY 233

[327] Nicolas Guelfi A formal framework for dependability and resiliencefrom a software engineering perspective Technical Report TR-LASSY-10-01 University of Luxembourg 2010

[328] Guido Boella Gabriella Pigozzi Marija Slavkovik and Leendertvan der Torre Group intentions are social choice with commitmentIn Procs of the 8th European Workshop on Multi-agent Systems (EU-MASrsquo10) 2010

[329] Patricia Ruiz and Pascal Bouvry On the improvement of the enhanceddistance based broadcasting algorithm Int J of Communication Net-works and Distributed Systems in Press

[330] Patricia Ruiz Bernabe Dorronsoro Pascal Bouvry and Lorenzo JTardon Information dissemination in vanets based upon a tree topol-ogy Journal of Ad hoc Networks 10(1)111ndash127 2012

[331] State R Ries T and A Panchenko Comparison of low-latency anony-mous communication systems - practical usage and performance InColin Boyd and Josef Pieprzyk editors Australasian Information Se-curity Conference (AISC 2011) volume 116 of CRPIT pages 77ndash86Perth Australia 2011 ACS

[332] Michael Kirley and Robert Stewart An analysis of the effects of pop-ulation structure on scalable multiobjective optimization problems InProceedings of the 9th annual conference on Genetic and evolutionarycomputation GECCO rsquo07 pages 845ndash852 New York NY USA 2007ACM

[333] Matthijs T J Spaan and Nikos A Vlassis Perseus Randomizedpoint-based value iteration for pomdps J Artif Intell Res (JAIR)24195ndash220 2005

[334] Pierre Del Moral Feynman-Kac formulae genealogical and interact-ing particle systems with applications Springer series in statisticsProbability and its applications Springer 2004

[335] Pierre Del Moral Arnaud Doucet and Ajay Jasra Sequential montecarlo samplers Journal of the Royal Statistical Society Series B (Sta-tistical Methodology) 68(3)411ndash436 2006

[336] Juan Luis Jimenez Laredo Pascal Bouvry Sanaz Mostaghim andJuan Julian Merelo Guervos Validating a peer-to-peer evolutionaryalgorithm In European Conference on the Applications of Evolution-ary Computation Accepted for publication in 2012

234 BIBLIOGRAPHY

[337] Daniel Lombra na Gonzalez Juan Luis Jimenez Laredo Francisco Fer-nandez de Vega and Juan Julian Merelo Guervos CharacterizingFault-tolerance in Evolutionary Algorithms Springer Verlag Acceptedfor publication in 2012

[338] F Caldeira T Schaberreiter E Monteiro J Aubert P Simoes andD Khadraoui Trust based interdependency weighting for on-line riskmonitoring in interdependent critical infrastructures In Risk and Se-curity of Internet and Systems (CRiSIS) 2011 6th International Con-ference on pages 1 ndash7 sept 2011

[339] T Schaberreiter J Aubert and D Khadraoui Critical infrastructuresecurity modelling and resci-monitor A risk based critical infrastruc-ture model In IST-Africa Conference Proceedings 2011 pages 1 ndash8may 2011

[340] Thomas Schaberreiter Filipe Caldeira Jocelyn Aubert EdmundoMonteiro Djamel Khadraoui and Paulo Simones Assurance and trustindicators to evaluate accuracy of on-line risk in critical infrastruc-tures In CRITIS2011 conference proceedings September 2011

[341] Thomas Schaberreiter Kati Kittila Kimmo Halunen Juha Roningand Djamel Khadraoui Risk assessment in critical infrastructuresecurity modelling based on dependency analysis (short paper) InCRITIS2011 conference proceedings September 2011

[342] Andriy Panchenko Privacy in communications on the internet Prac-tice of Information Processing and Communication Praxis der In-formationsverarbeitung und Kommunikation (PIK) 34(2) 2011

[343] Andriy Panchenko Anonymous communication in the digitalworld In 17th Conference on Communication in Distributed Systems(KiVSrsquo11) Kiel Germany march 2011 OASIcs ndash OpenAccess Seriesin Informatics

[344] Andriy Panchenko Otto Spaniol Andre Egners and Thomas EngelLightweight hidden services In 10th IEEE International Conferenceon Trust Security and Privacy in Computing and Communications(IEEE TrustCom 2011) Changsha China nov 2011 IEEE ComputerSociety Press

[345] Jerome Francois Shaonan Wang Walter Bronzi Radu State andThomas Engel Botcloud Detecting botnets using mapreduce InProceddings of International Workshop on Information Forensics andSecurity (WIFSrsquo11) pages 0ndash0 IEEE 2011

BIBLIOGRAPHY 235

[346] Jerome Francois Radu State Thomas Engel and Olivier Festor En-forcing security with behavioral fingerprinting In International Con-ference on Network and Service Management (CNSM) 2011

[347] AJ Nebro JJ Durillo F Luna B Dorronsoro and E Alba MocellA cellular genetic algorithm for multiobjective optimization Interna-tional Journal of Intelligent System Special Issue on Nature InspiredCooperative Strategies 24(7)726ndash746 2009

[348] Gabriella Pigozzi Marija Slavkovik and Leendert van der Torre Acomplete conclusion-based procedure for judgment aggregation InProceedings of the First International Conference on Algorithmic De-cision Theory (ADT) volume 5783 5783 of Lecture Notes in ArtificialIntelligence pages 1ndash13 Springer Verlag 2009

[349] Davide Grossi Gabriella Pigozzi and Marija Slavkovik White ma-nipulation in judgment aggregation In Proceedings of BNAIC 2009- The 21st Benelux Conference on Artificial Intelligence (to appear)2009

[350] Laurent Kirsch Markus Esch and Steffen Rothkugel The SnippetSystem - Fine-Granular Management of Documents and Their Re-lationships In Proceedings of the 6th International Conference onHuman-Computer Interaction (HCI 2011) Washington DC USA2011 IASTED

[351] Bernd Klasen Efficient Content Distribution in Social-Aware HybridNetworks Journal of Computational Science 2011

[352] Jean Botev Sociality and Self-Organization in Next-Generation Dis-tributed Environments PhD thesis University of Luxembourg 2011

[353] Peter Ryan James Heather and Vanessa Teague Pretty good democ-racy for more expressive voting schemes In Computer Security ndash ES-ORICS 2010 15th European Symposium on Research in Computer Se-curity Athens Greece September 20-22 2010 Proceedings pages 405ndash 423 2010

[354] Zhe Xia Chris Culnane James Heather Hugo Jonker Peter RyanSteve Schneider and Sriramkrishnan Srinivasan Versatile pret a voterHandling multiple election methods with a unified interface In Pro-ceedings of the 11th International Conference on Cryptology in India(Indocryptrsquo10) pages 98ndash114 2010

[355] Barbara Kordy Marc Pouly and Patrick Schweitzer Computationalaspects of attack-defense trees In Security and Intelligent InformationSystems volume LNCS 7053 pages 103ndash116 Springer 2012

236 BIBLIOGRAPHY

[356] Gerard Wagener Radu State Alexandre Dulaunoy and Thomas En-gel Heliza talking dirty to the attackers Journal in Computer Vi-rology pages 1ndash12 2010

[357] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Breaking tor anonymity with game theory anddata mining In Proceedings of 4th International Conference on Net-work and System Security NSS2010 pages 47ndash54 IEEE 2010 BestPaper Award of NSS 2010

[358] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Game theory driven monitoring of spatial-aggregated ip flow records In Proceedings of the 6th InternationalConference on Network and Services Management (CNSM) pages 0ndash0 IEEE 2010

[359] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Peekkernelflows Peeking into ip flows In Pro-ceedings of the Seventh International Symposium on Visualization forCyber Security pages 52ndash57 ACM International Conference Proceed-ings Series ACM New York NY USA 2010

[360] Cynthia Wagner Gerard Wagener Radu State and Thomas EngelMonitoring of spatial-aggregated ip-flow records In Advances in SoftComputing Series - CISISrsquo10 volume 85 pages 117ndash124 Springer2010

[361] Bernd Klasen Social fast efficient Content distribution in hybridnetworks In Computers and Communications (ISCC) 2011 IEEESymposium on pages 61ndash67 Kerkyra June 2011 IEEE

[362] Samuel Marchal Jerome Francois Cynthia Wagner and Thomas En-gel Semantic exploration of dns In 11th Networking Conference 2012pages 1ndash8 2012

[363] Samuel Marchal Jerome Francois Cynthia Wagner Radu StateAlexandre Dulaunoy Thomas Engel and Olivier Festor Dnssm Alarge-scale passive dns security monitoring framework In IEEEIFIPNetwork Operations and Management Symposium pages 1ndash8 IEEE2012

[364] David Fotue Foued Melakessou Thomas Engel and Houda LabiodDesign of new aggregation techniques for wireless sensor networks InThe 18th Annual Meeting of the IEEEACM International Symposiumon Modeling Analysis and Simulation of Computer and Telecommu-nication Systems pages 1ndash1 MASCOTS 2010

BIBLIOGRAPHY 237

[365] David Fotue Foued Melakessou Houda Labiod and Thomas EngelDesign of an enhanced energy conserving routing protocol based onroute diversity in wireless sensor networks In The 9th IEEEIFIPAnnual Mediterranean Ad Hoc Networking Worshop pages 1ndash6 IEEEXplore 2010

[366] Guillaume Aucher Guido Boella and Leendert van der Torre Adynamic logic for privacy compliance Artif Intell Law 19(2-3)187ndash231 2011

[367] Jerome Leemans and Nuno Amalio Modelling a cardiac pacemakervisually and formally In VLHCC 2012 pages 257ndash258 IEEE 2012

[368] Mauricio Alferez Nuno Amalio Selim Ciraci et al Aspect-orientedmodel development at different levels of abstraction In ECMFA 2011LNCS pages 361ndash376 Springer 2011

[369] Eric Tobias Eric Ras and Nuno Amalio Suitability of visual mod-elling languages for modelling tangible user interface applications InVLHCC 2012 IEEE 2012

[370] Eric Tobias Eric Ras and Nuno Amalio VML Usability for ModellingTUI Scenarios - A Comparative Study Technical Report TR-LASSY-12-06 University of Luxembourg LASSY 2012 available at http

vclgforgeuniludocVMLCaseStudypdf

[371] Nuno Amalio The VCL model of the barbados crisis managementsystem Technical Report TR-LASSY-12-09 Univ of Luxembourg2012

[372] Jerome Leemans and Nuno Amalio A VCL model of a cardiac pace-maker Technical Report TR-LASSY-12-04 University of Luxem-bourg 2012

238 BIBLIOGRAPHY

Appendix B

CSC Statistics for 2012

B1 CSC publications

For more details see chapter 7 page 197

B2 CSC budget

See also sect23 page 6

Lab structural funding 761070e

UL Research Projects 896775e

Total 1657845 e

Table B1 CSC Internal Budget

240 CSC Statistics for 2012

B3 CSC staff per category

Category Number

Professors 16Associate Professors 7

Scientific Supp Staff Members 12Post-Docs 7

Post-Docs on projects 8PhD Students 40

Technical Support Staff Members 4Technician on project 1Administrative Staff 5Research Facilitator 1

Total 101

Professors Associated Professors Post Docs Scientific support staff PhD Students Post Docs on Project Technical support staff Technicians on projects Administrative staff Research facilitator

Figure B1 CSC HR Repartition

B3 CSC staff per category 241

Professors - Associate Professors

Lastname Firstname Position

BIRYUKOV Alexei Associate-Professor

BISDORFF Raymond Joseph Professor

BOUVRY Pascal Professor

BRIAND Lionel Professor

CORON Jean-Sebastien Associate-Professor

DUHAUTPAS Theo Professor

ENGEL Thomas Professor

GUELFI Nicolas Professor

KELSEN Pierre Professor

LE TRAON Yves Professor

LEPREVOST Frank Professor

MAUW Sjouke Professor

OTTERSTEN Bjorn Professor

MULLER Volker Associate-Professor

NAVET Nicolas Associate-Professor

ROTHKUGEL Steffen Associate-Professor

RYAN Peter Professor

SACHAU Juergen Professor

SCHOMMER Christoph Associate-Professor

SORGER Ulrich Professor

STEENIS Bernard Associate-Professor

VAN DER TORRE Leon Professor

ZAMPUNIERIS Denis Professor

Total 23

242 CSC Statistics for 2012

Research Assistants - PostDocs

Lastname Firstname PositionAMALIO Nuno Scientific Coll on ProjectBERNARD Nicolas Scientific Supp Staff MemberBOTEV Jean Post-DocCAPOZUCCA Alfredo Scientific Supp Staff MemberDANOY Gregoire Scientific Supp Staff MemberGLODT Christian Scientific Supp Staff MemberGROSZSCHADL Johann Scientific Supp Staff MemberJONKER Hugo Scientific Coll on projectKHOVRATOVICH Dmitry PostDocKLEIN Jacques Scientific Supp Staff MemberLEHTONEN Erkko Post-DocMIZERA Andrzej PostDocPANG Jun Scientific Supp Staff MemberPARENT Xavier Post-DocPECERO SANCHEZ Johnatan Post-DocRIES Benoit Scientific Supp Staff MemberRISOLDI Matteo Scientific Coll on ProjectSCHLEICH Julien Scientific Coll on ProjectSTATE Radu Scientific Supp Staff MemberSUCHANECKI Zdzislaw Scientific Supp Staff MemberTANG Qiang Post-DocTEUCHERT Andrea Scientific Coll on ProjectTURRINI Paolo Post-DocVARRETTE Sebastien Scientific Supp Staff MemberVESIC Srdjan Post-DocWEYDERT Emil Scientific Supp Staff Member

Total 27 (AFR Total 1)

B3 CSC staff per category 243

PhD Students

Lastname Firstname PositionALLIX Kevin PhD StudentAMRANI Moussa PhD StudentBERSAN Roxana-Dolores PhD StudentDANILAVA Sviatlana PhD StudentDIAZ Cesar PhD StudentDOBRICAN Remus PhD StudentDONG Naipeng PhD StudentEL KATEB Donia PhD StudentEL KHARBILI Marwane PhD StudentFRANCK Christian PhD StudentGALLAIS Jean-Francois PhD StudentGIUSTOLISI Rosario PhD StudentGOERGEN David PhD StudentKAMPAS Dimitrios PhD StudentKHAN Yasir Imtiaz PhD StudentKIRSCH Laurent PhD StudentLI Yu PhD StudentLIU Zhe PhD StudentMARQUES DIAS Sergio Scientific Coll on ProjectMELISSEN Matthijs PhD StudentMINEV Mihail PhD StudentMULLER Tim PhD StudentMUSZYNSKI Jakub PhD StudentNIELSEN Sune PhD StudentOLTEANU Alexandru-Liviu PhD StudentPEREZ URQUIDI Jose Miguel PhD StudentPINEL Frederic PhD StudentPORAY Jayanta PhD StudentPUSTOGAROV Ivan PhD StudentRIENSTRA Tjitze PhD StudentROY Arnab PhD StudentRUBAB Irman PhD StudentRUIZ Patricia PhD StudentSHIRNIN Denis PhD StudentSIMIONOVICI Ana-Maria PhD StudentSKROBOT Marjan PhD StudentSUN Xin PhD StudentVADNALA Praveen Kumar PhD StudentVENKATESH Srivinas Vivek PhD StudentZHANG Yang PhD Student

Total 40 (AFR Total 8)

244 CSC Statistics for 2012

Technical Support

Lastname Firstname PositionCARTIAUX Hyacinthe Technician on ProjectDUNLOP Dominic Technical Support Staff MemberLE CORRE Yann Technical Support Staff MemberSTEMPER Andre Technical Support Staff MemberREIS Sandro Technician on Project

Total 5

Administrativ Aid

Lastname Firstname PositionDESSART Bertrand Research facilitator

EYJOLFSDOTTIR Ragnhildur Edda SecretaryFLAMMANG Daniele SecretarySCHMITZ Fabienne SecretarySCHROEDER Isabelle SecretaryVIOLET Catherine Secretary

Total 6

Appendix C

Acronyms used

ComSys Communicative Systems Laboratory

CSC Computer Science amp Communications

HPC High Performance Computing

ILIAS Interdisciplinary Laboratory for Intelligent and Adaptive Systems

LACS Laboratory of Algorithmics Cryptology and Security

LASSY Laboratory for Advanced Software Systems

SnT Interdisciplinary Centre for Security Reliability and Trust

UL University of Luxembourg

246 Acronyms used

httpcscunilu

Computer Science amp Communication (CSC) Research UnitUniversity of LuxembourgFaculty of Science Technology and Communication6 rue Richard Coudenhove-KalergiL-1359 LuxembourgLuxembourg

Administrative ContactIsabelle Glemot-Schroeder and Fabienne Schmitz

Email cscunilu

  • 1 The Computer Science amp Communications (CSC) Research Unit
  • 2 Executive Summary
    • 21 Academic Staff Overview
    • 22 Main activities in 2012
    • 23 CSC Budget in 2012
      • 3 CSC Laboratories
        • 31 Laboratory for Advanced Software Systems
        • 32 Laboratory of Algorithmics Cryptology and Security
        • 33 Communicative Systems Laboratory
        • 34 Interdisciplinary Laboratory for Intelligent and Adaptive Systems
          • 4 Projects and Grants in 2012
            • 41 Research projects
              • 411 European funding projects
              • 412 FNR COREINTER Projects
              • 413 UL Projects
              • 414 UL PhD PostDoc
              • 415 Other miscellaneous projects
                • 42 Grants
                  • 421 AFR
                  • 422 Workshop amp Conferences (FNR Accompanying Measures)
                      • 5 CSC Representation
                        • 51 Conferences
                        • 52 PC and other memberships
                        • 53 Doctoral board
                        • 54 Guests
                        • 55 Visits and other representation activities
                        • 56 Research meeting
                          • 6 CSC Software
                          • 7 CSC Publications in 2012
                            • 71 Books
                            • 72 Book Chapters
                            • 73 International journals
                            • 74 Conferences Articles
                            • 75 Internal Reports
                            • 76 Proceedings
                              • Appendix
                              • A Additional References
                              • B CSC Statistics for 2012
                                • B1 CSC publications
                                • B2 CSC budget
                                • B3 CSC staff per category
                                  • C Acronyms used
Page 5: Computer Science and Communications Research Unit

ii

Dmitry Khovratovich obtained the Best PhD thesis award of the Universityof Luxembourg for his research on ldquoNew Approaches to the Cryptanalysisof Symmetric Primitivesrdquo

Dr Foued Melakessou received the first prize in the 2012 Scilab Contest atthe Workshop on Scilab amp OW2 (IWSO) in Nanjing China for his NARVAL(Network Analysis and Routing eVALuation) toolbox NARVAL is builton the Scilab environment and focuses on the analysis of network proto-cols (httpsecan-labuniluindexphpnews161-narval-toolbox-wins-first-prize-in-2012-scilab-contest)

Prof Lionel Briand received the IEEE Computer Society Harlan Mills awardfor his contributions to model-based verification and testing

Prof Bjorn Ottersten and Prof Lionel Briand were appointed members ofthe IEEE Fellow Review Committee

Prof Bjorn Ottersten was appointed ldquoDigital Champion of Luxembourgrdquoby Francois Biltgen Minister for Higher Education and Research

The hackbraten team headed by Piotr Kordy represented the SaToSS groupat the Capture the Flag Competition (http2012hackluindexphpCaptureTheFlag) co-located with the Hacklu conference (http2012hacklu) The team was ranked 24th amongst 575 teams registered forthe event

In 2012 ULCSC was involved in the launch of LAST-JD a new interdisci-plinary ERASMUS MUNDUS PhD program in Law Science and Technologyinvolving several partner universities in Europe and beyond

Dr Jun Pang and Prof Sjouke Mauw initiated a new strand of researchfocusing on formal models for biological systems An expert in the field DrAndrzej Mizera was hired to contribute and further extend this initiative

Prof Dr Pascal BouvryLuxembourg January 17 2013

Contents

1 The Computer Science amp Communications (CSC) ResearchUnit 1

2 Executive Summary 3

21 Academic Staff Overview 4

22 Main activities in 2012 5

23 CSC Budget in 2012 6

3 CSC Laboratories 7

31 Laboratory for Advanced Software Systems 7

32 Laboratory of Algorithmics Cryptology and Security 9

33 Communicative Systems Laboratory 10

34 Interdisciplinary Laboratory for Intelligent and Adaptive Sys-tems 12

4 Projects and Grants in 2012 15

41 Research projects 27

411 European funding projects 27

412 FNR COREINTER Projects 49

413 UL Projects 78

414 UL PhD PostDoc 91

iv CONTENTS

415 Other miscellaneous projects 115

42 Grants 123

421 AFR 123

422 Workshop amp Conferences (FNR Accompanying Mea-sures) 165

5 CSC Representation 167

51 Conferences 167

52 PC and other memberships 170

53 Doctoral board 176

54 Guests 177

55 Visits and other representation activities 181

56 Research meeting 186

6 CSC Software 189

7 CSC Publications in 2012 197

71 Books 197

72 Book Chapters 198

73 International journals 198

74 Conferences Articles 204

75 Internal Reports 223

76 Proceedings 224

Appendix 225

A Additional References 225

B CSC Statistics for 2012 239

B1 CSC publications 239

B2 CSC budget 239

B3 CSC staff per category 240

CONTENTS v

C Acronyms used 245

vi CONTENTS

Chapter 1

The Computer Science ampCommunications (CSC)

Research Unit

The Computer Science amp Communications (CSC) research unit is part ofthe University of Luxembourg with the primary mission to conduct funda-mental and applied research in the area of computer communication andinformation sciences

The goal is to push forward the scientific frontiers of these fields Addition-ally CSC provide support for the educational tasks at the academic andprofessional Bachelor and Master levels as well as for the PhD program

The CSC Research Unit is divided into four laboratories

1 Communicative Systems Laboratory (ComSys)

2 Interdisciplinary Laboratory for Intelligent and Adaptive Systems (ILIAS)

3 Laboratory of Algorithmics Cryptology and Security (LACS)

4 Laboratory for Advanced Software Systems (LASSY)

Three laboratories of the interdisciplinary centre in security reliability andtrust (SnT) are also headed by CSC professors

2 The Computer Science amp Communications (CSC) Research Unit

CSC works intensively towards the University priorities in Security Relia-bility and Trust as well as Systems Biomedicine By providing a strong dis-ciplinary knowledge in computer science telecommunications and appliedmathematics CSC will serve as one of the fundamental bricks to enableinterdisciplinary research through the University of Luxembourgrsquos interdis-ciplinary centres

CSC is currently the largest research unit of the University with a staff ofmore than 100 persons including 22 professors and associate-professors 11scientific support staff members 25 post-doc researchers and scientific col-laborators 40 PhD students 3 technician on project 1 research facilitator3 technical support staff members 3 technicians on project 475 full-time-equivalent administrative support positions

Their research fields range from the investigation of the theoretical founda-tions to the development of interdisciplinary applications

CSC decisions are taken by the chorum of professors As described in Figure11 the head of the research unit is helped by a quality manager a facilitymanager (handled by the scientific facilitator) and the heads of labs in orderto prepare the decision options and the reporting of the CSC Each lab hasits own budget line and a set of support resources

Prof BouvryHead of CSC

Prof ZampunierisDirector of Studies Representative

Prof MauwQuality Manager

Prof SchommerHead of ILIAS

Prof EngelHead of ComSys

Prof GuelfiHead of LASSY

Prof BiryukovHead of LACS

Profs Profs Profs Profs

CSC Steering Board

Bertrand DessartResearch Facilitator

Figure 11 CSC Organisation

Chapter 2

Executive Summary

The Computer Science and Communication research unit aka ComputerScience amp Communications (CSC) includes a staff of over 100 persons Twohundred students at Bachelor and Master levels are registered to CSC bach-elor and master degrees Close supervision and advice is ensured by opendoor policy and project based lecturing

CSC is also involved in life-long learning by organising a master degreein Information Systems Security Management in collaboration with CRPTudor

With regard to the professional branches the main aim consists of reducingthe gap between theory and practice whereas for the academic branchesthe focus is set on a problem-oriented understanding of the theoretical foun-dations of computer science CSC works intensively towards the Universitypriorities in Security Reliability and Trust as well as System BiomedicineBy providing a strong disciplinary knowledge in computer science telecom-munications and applied mathematics CSC will serve as one of the fun-damental bricks to enable interdisciplinary research through the Universityof Luxembourgrsquos interdisciplinary centres CSC is currently the largest re-search unit of the University and is cooperating in a large set of internationalas well as regional projects

In parallel CSC is more and more active in the field of distributed gridcomputing with the aim to propose andor join attractive academic projectsin this area In this context CSC manages the UL HPC (High PerformanceComputing) facility of the UL and inaugurated the new cluster hosted inthe LCSB premises in Belval The current solution includes 151 nodes 1556

4 Executive Summary

cores 14245 TFlops 265 TB NFS storage and 240 TB Lustre storage

21 Academic Staff Overview

bull Jean-Claude Asselborndagger emeritus professor

bull Alex Biryukov associate professor head of LACS

bull Raymond Bisdorff professor

bull Pascal Bouvry professor head of CSC and ILIAS

bull Lionel Briand professor

bull Jean-Sebastien Coron associate professor

bull Dov Gabbay guest professor

bull Theo Duhautpas senior lecturer

bull Thomas Engel professor head of ComSys

bull Nicolas Guelfi professor head of LASSY

bull Pierre Kelsen professor

bull Franck Leprevost professor vice rector

bull Yves Le Traon professor

bull Sjouke Mauw professor

bull Volker Muller associate professor

bull Nicolas Navet professor

bull Bjorn Ottersten professor

bull Steffen Rothkugel associate professor

bull Peter Ryan professor

bull Jurgen Sachau professor

bull Christoph Schommer associate professor

bull Ulrich Sorger professor

bull Bernard Steenis associate professor

bull Leon van der Torre professor

bull Denis Zampunieris professor

22 Main activities in 2012 5

22 Main activities in 2012

The following local events have been organized during 2012

bull IFIP AIMS 2012

bull Capture The Flag competition 2012

bull Workshop on Dynamics of Argumentation Rules and Conditionals

bull Interdisciplinary PhD Workshop on Security in eVoting (eVote PhDDays 2012)

CSC also participates at the organisation of many international conferencesand workshops

CSC is having strong partnerships with the other Luxembourgian researchcentres through the co-supervision of PhD students co-organised projectsand teaching activities

In 2012 13 PhD students successfully defended their PhD thesis at the CSC

CSC members are taking active part in various boards country-wide ex-ecutive direction of ERCIM direction of RESTENA chairman of Luxcloudboard vice-rectorate for international affairs and special projects of the Uni-versity of Luxembourg chairman of Luxconnect SA member of LUXTRUSTadministration board members of the SnT interim steering board and SnTfaculty boards representative of Luxembourg in the COST ICT DG expertsfor EU and national projects

CSC is active in various networks and projects International EU (FPEureka COST) regional (UGR) and local (FNR) networks and projects

CSC participates to various ERCIM workgroups - the European ResearchConsortium for Informatics and Mathematics through the FNR

CSC also participated to the open source community by several contribu-tions

bull ADTool

bull ARGULAB

bull Canephora

bull Democles

bull Face recognition

6 Executive Summary

bull JShadObf

bull MaM Multidimensional Aggregation Monitoring

bull MSC Macro Package for LATEX

bull Visual Contract Builder

CSC in 2012 produced 1 book 7 book chapters edited 3 proceedings andin terms of international peer-reviewed publications 69 journal articles and165 conference and workshop proceedings (see chapter 7 page 197 for moredetails) The full list of CSC publications is available here

23 CSC Budget in 2012

The following table describes the marginal expenses of CSC in terms of struc-tural funding and UL projects The main cost corresponds to the salaries ofthe structural positions (professors research assistants assistants admin-istrative and support staff) expenses related to the buildings and some ofthe operating expenses (eg phone bills electricity etc) are covered by thestructural UL budget

Lab structural funding 761070e

UL Research Projects 896775e

Total 1657845 e

Table 21 CSC Internal Budget

Chapter 3

CSC Laboratories

31 Laboratory for Advanced Software Systems

Laboratory of Advanced Software SystemsAcronym LASSYReference F1R-CSC-LAB-05LASSHead Prof Dr Pierre Kelsen

Scientific Board Nicolas Guelfi Pierre Kelsen Yves Le Traon NicolasNavet Denis Zampunieris

Domain(s)

bull dependability

bull e-learning

bull hardwaresoftware co-design

bull model driven engineering

bull proactive computing

bull real-time and embedded systems

bull security

8 CSC Laboratories

bull software engineering

bull software product lines

bull testing

bull verification

Objectives The LASSY laboratory considers advanced software systemsas objects which are complex (business- or safety-) critical and possiblycontaining both software and hardware From the LASSY perspective thefour main dimensions underpinning the science of engineering these advancedsoftware systems are modeling methodology dependability (including secu-rity) and realization infrastructures LASSY conducts research in modelingand more specifically on model driven engineering which aims at allowing theengineering of such systems by creating and transforming models method-ologies which aim at defining engineering processes (focusing on analysisdesign and verification) and rules allowing for an efficient engineering of suchsystems conceptual frameworks and development platforms for enhancingdependability (focusing on concurrent transactions and fault tolerance) Inour research we promote the early consideration of realization infrastruc-tures (ie the hardware execution platform which integrates acquisitioncomputation communications and presentation hardware devices) Finallywe target specific application domains such as e-business systems auto-motive systems crisis management systems or proactive e-learning systemswhich are used either for experimental validation or for research problemelicitation

The current research objectives are the following ones

bull To develop new engineering processes

bull To investigate modeling languages

bull To use mathematical theories in the definition and verification of newsoftware engineering artifacts

bull To address dependability attributes (availability reliability safety con-fidentiality integrity and maintainability) throughout all the develop-ment life cycle

bull To assist in the development and in the use of e-learning tools

bull To study verification and validation techniques

Skills

32 Laboratory of Algorithmics Cryptology and Security 9

bull Nicolas Guelfi dependability verification software engineering modeldriven engineering

bull Pierre Kelsen model driven engineering software engineering formalmethods

bull Yves Le Traon verification testing software security model drivenengineering

bull Nicolas Navet real-time and embedded systems

bull Denis Zampunieris E-learning Proactive Computing

32 Laboratory of Algorithmics Cryptology andSecurity

Laboratory of Algorithmics Cryptology and SecurityAcronym LACSReference F1R-CSC-LAB-F01L0204Head Prof Dr Alex Biryukov

Scientific Board Jean-Sebastien Coron Franck Leprevost Sjouke MauwVolker Muller Peter Ryan

Domain(s)

bull Cryptography Information and Network Security

bull Information Security Management

bull Embedded Systems Security

bull Side-Channel Analysis and Security of Implementations

bull Algorithmic Number Theory

bull Security protocols

bull Security and trust assessment and modelling

bull Socio-technical security

10 CSC Laboratories

Objectives In recent years information technology has expanded to en-compass most facets of our daily livesmdashat work at school at home forleisure or learning and on the movemdashand it is reaching ever-widening seg-ments of our society The Internet e-mail mobile phones etc are alreadystandard channels for the information society to communicate gain accessto new multimedia services do business or learn new skills The recentldquodigital revolutionrdquo and widespread access to telecommunication networkshave enabled the emergence of e-commerce and e-government This pro-liferation of digital communication and the transition of social interactionsinto the cyberspace have raised new concerns in terms of security and trustlike confidentiality privacy and anonymity data integrity protection ofintellectual property and digital rights management threats of corporateespionage and surveillance systems (such as Echelon) etc These issues areinterdisciplinary in their essence drawing from several fields algorithmicnumber theory cryptography network security signal processing securityof protocols side-channel analysis software engineering legal issues andmany more

Skills NA

33 Communicative Systems Laboratory

Communicative Systems LaboratoryAcronym ComSysReference F1R-CSC-LAB-05COMSHead Prof Dr Thomas Engel

Scientific Board Pascal Bouvry Thomas Engel Steffen Rothkugel SjoukeMauw Theo Duhautpas Yves Le Traon Lionel Briand Bjorn OtterstenPeter Ryan Jurgen Sachau

Domain(s)

bull Information Transmission

bull Wireless Communication Systems

bull Security Protocols

bull Trust Models

33 Communicative Systems Laboratory 11

bull Middleware

bull Parallel and Distributed Systems

bull Cloud Grid and Peer-to-Peer Computing

Objectives The Communicative Systems Laboratory (ComSys) is part ofthe Computer Science and Communication Research Unit and focuses onstate of the art research in digital communications Embracing the end-to-end arguments in system design ComSys focuses on integrated research inthe areas of Information Transfer and Communicating Systems Informa-tion Transfer is concerned with information transmission over potentiallycomplex channels and networks Communicating Systems in turn are thecomposition of multiple distributed entities employing communication net-works to collaboratively achieve a common goal ComSys has strong tech-nical and personal facilities to improve existing and develop new solutionsin the following research topics The ComSys research fields will have astrong impact on the 21st century The rapidly growing demand for infor-mation exchange in peoplersquos daily lives requires technologies like ubiquitousand pervasive computing to meet the expectations of the information so-ciety and novel adaptive concepts tackling the continuing data challengesThe resulting problems have already been a key enabler for some industrialand governmental founded projects at national and European level Currentresearch projects propagate technologies for

bull Hybrid Wireless Networks

bull Green Cloud Computing

bull Information Dissemination in Ad-Hoc Networks

bull Mobile Communication

bull Mobile Learning

bull Network Traffic Analysis and Protection

bull Network Traffic Management and Coordination

bull Secure Satellite Communication

bull Secure Wireless MANETs

Skills

bull Research in networks and service security

12 CSC Laboratories

bull Mobile and vehicular networks

bull Protocol Security and Secure System Design

bull Data Mining for Network Security Monitoring

bull Adaptive and self managed security systems and honeypots

bull VoIP Security

bull Privacy preserving infrastructures

bull Cloud security and cluster based data mining

bull Distributed and P2P based computing

34 Interdisciplinary Laboratory for Intelligent andAdaptive Systems

Interdisciplinary Lab on Intelligent and Adaptative SystemsAcronym ILIASReference F1R-CSC-LAB-05ILIAHead Prof Dr Christoph Schommer

Scientific Board Pascal Bouvry Raymond Bisdorff Christoph SchommerUlrich Sorger Leon van der TorreGuest professor Dov Gabbay

Domain(s)

bull Algorithmic decision theory

bull Bio-inspired computing

bull Cognitive agentsrobotics

bull Data mining and knowledge discovery

bull Information theory and uncertain inference

bull Knowledge representation and applied logic (eg for security)

34 Interdisciplinary Laboratory for Intelligent and Adaptive Systems 13

bull Normative multi-agent systems

bull Optimization

bull Parallel computing

Objectives ILIAS is a cross-disciplinary research group combining exper-tise from computer science operations research information theory ana-lytic philosophy probability theory discrete math and logic The overar-ching topic in research and teaching is information processing in complexand dynamic environments given limited resources and incomplete or un-certain knowledge The ILIAS research teams investigate the theoreticalfoundations and the algorithmic realization of systems performing complexproblem solving with a high degree of autonomy ie intelligent systems andexploiting learning to deal with opaque and dynamic contexts ie adaptivesystems

Skills

bull Raymond Bisdorff (Decision aid systems)

bull Pascal Bouvry (Optimization and parallel computing)

bull Christoph Schommer (Adaptive data mining and information manage-ment)

bull Ulrich Sorger (Information theory and stochastic inference)

bull Leon van der Torre (Knowledge representation and multi-agent sys-tems)

bull Dov Gabbay (Applied logic and knowledge representation)

14 CSC Laboratories

Chapter 4

Projects and Grants in 2012

This chapter lists the research projects running during 2012together withthe grants obtained (typically to organize scientific conferences via the FNRaccompanying measures AM3) This chapter is structured to summarize

1 European funding project (FP7 ERCIM etc) ndash see sect411

2 FNR CORE projects ndash see sect412

3 UL projects ndash see sect413

4 UL PhD and Postdocs ndash see sect414

5 Other miscellaneous projects (French ANR Grant agreement for re-search development and innovation etc) ndash see sect415

6 Grants obtained (AFR FNR AM3 etc) ndash see sect42

The following tables summarize the projects operated in CSC for the year2012

16 Projects and Grants in 2012

European projectsLab Acronym Title PI Funding Duration

CO

MSY

S

InSatNetRef p27

Investigation of Radio ResourceAllocation and Multiple AccessSchemes for Satellite Networks

NA FNR-ERCIM-Alain Bensous-san(46Ke)

2012-06-01 ndash2013-05-31

BUTLERRef p33

uBiquitous secUre inTernet-of-things with Location and contEx-awaReness

Prof DrThomas Engel

FP7 Euro-pean Commis-sion(456Ke)

2011-10-01 ndash2014-09-30

ceFIMSRef p34

SceFIMS-Coordination of theEuropean Future Internet forumof Member States

Prof DrThomas Engel

EC - FP7UL bud-get(35Ke)

2010-09-01 ndash2013-02-28

IoT6Ref p36

Universal Itegration of the Inter-net of Things through an IPv6-Based Service-oriented Architec-ture enabling heterogeneous com-ponents interoperability

Prof DrThomas Engel

EC-FP7(266Ke)

2012-01-01 ndash2014-12-31

OUTSMARTRef p37

Provisioning of urbanregionalsmart services and business mod-els enabled by the Future Internet

Prof DrThomas Engel

FP7 Euro-pean Commis-sion(257Ke)

2011-04-01 ndash2013-03-31

SECRICOMRef p40

Seamless Communication for Cri-sis Management

Prof DrThomas Engel

EC - FP7 Eu-ropean Commis-sionUL(12469Ke)

2008-09-01 ndash2012-04-30

LA

CS TREsPASS

Ref p46

Technology-supported Risk Esti-mation by Predictive Assessmentof Socio-technical Security

Prof DrSjouke Mauw

EUFP7(9999824e)

2012-11-01 ndash2016-10-31

ILIA

S

ALBRRef p42

Argumentation-Based and Logic-Based Reasoning in Multi-AgentSystems

Dr SrdjanVesic

ERCIM 2011-10-01 ndash2012-09-30

TrustGamesRef p43

Trust Games Achieving Cooper-ation in Multi-Agent Systems

Dr Paolo Tur-rini

FNR-FP7 Co-fund

2011-09-01 ndash2013-08-31

WiSafeCarRef p44

Wireless traffic Safety networkbetween Cars

Prof Dr Pas-cal Bouvry

EUREKA -CELTIC(300000e)

2009-07-01 ndash2012-03-31

17

FNR projectsLab Acronym Title PI Funding Duration

CO

MSY

S

MoveRef p52

Mobility Optimization Using VE-hicular Network Technologies

Prof DrThomas Engel

FNRProject(1127ke)

2011-04-01 ndash2013-03-31

LA

CS

STASTRef p63

Socio-Technical Analysis of Secu-rity and Trust

Prof Dr Pe-ter YA Ryan

FNRCORE(765864e)

2012-05-01 ndash2015-04-30

ATREESRef p64

Attack Trees Prof DrSjouke Mauw

FNR-CORE(299000e)

2009-04-01 ndash2012-03-31

CRYPTOSECRef p66

Cryptography and InformationSecurity in the Real World

Dr Jean-SebastienCoron

FNR-CORE(272000e)

2010-10-01 ndash2013-09-30

SeRTVSRef p67

Secure Reliable and TrustworthyVoting Systems

Prof Dr Pe-ter Ryan

FNR-Core333000e FNR-AFR 216216eIMT Luca130000e Uni-versity of Mel-bourne 60000eUL 268596e

2010-02-01 ndash2013-02-01

LA

SSY

E-TEACCHRef p70

e-Training Education Assess-ment and Communication Centerfor Headache Disorders

Prof DrDenis Zam-punieris

FNR-CORE 2011-05-01 ndash2014-04-30

MaRCoRef p71

Managing Regulatory Compli-ance a Business-Centred Ap-proach

Prof DrPierre Kelsen

FNR-CORE(749Ke)

2010-05-01 ndash2013-04-30

MITERRef p73

Modeling Composing and Test-ing of Security Concerns

Dr JacquesKlein

FNR NA

MOVERERef p75

Model-Driven Validation andVerification of Resilient SoftwareSystems

Prof DrNicolas Guelfi

FNR-CORE(265000e)

2010-05-01 ndash2013-04-30

SETERRef p77

Security TEsting for Resilientsystems

Prof DrNicolas Guelfi

FNR-CORE(43830000e)

2009-05-01 ndash2012-04-30

18 Projects and Grants in 2012

FNR projects (cont)Lab Acronym Title PI Funding Duration

ILIA

S

SndashGAMESRef p54

Security Games Prof DrLeon van derTorre

FNR-CORE(314000e)

2009-04-01 ndash2012-03-31

DYNARGRef p56

The Dynamics of Argumentation Prof DrLeon van derTorre

FNR-INTERCNRS

2009-10-01 ndash2012-09-31

MaRCoRef p58

Management Regulatory Compli-ance

Prof DrPierre Kelsen

FNR-CORE 2010-05-01 ndash2013-04-30

GreenCloudRef p59

Multi-Objective Metaheuristicsfor Energy-Aware Scheduling inCloud Computing Systems

Prof Dr Pas-cal Bouvry

FNR Univer-sity of Luxem-bourg(1088440)

2012-07-01 ndash2015-06-30

GreenITRef p60

EnerGy-efficient REsourcE Al-locatioN in AutonomIc CloudCompuTing

Prof Dr Pas-cal Bouvry

FNR-CORE(432000e)

2010-01-01 ndash2012-12-31

19

AFR projectsLab Acronym Title PI Funding Duration

CO

MSY

S RELGRID2009Ref p128

Investigation of boundary condi-tions for a reliable and efficientcontrol of energy systems formedby highly parallelized off-grid in-verters

Prof DrJuergenSachau

FNR-AFR-PhD 2010-04-01 ndash2013-03-31

SCoPeMeterRef p129

Methods for Measuring and Pre-dicting the Security PerformanceReputation of Public Networks

Prof DrThomas Engel

FNR-AFR RedDog

2011-03-22 ndash2015-03-21

WiNSEOMRef p130

Energy Optimization and Moni-toring in Wireless Mesh SensorNetworks

Prof DrThomas Engel

FNR - AFRPhD(37KeYear)

2010-04-08 ndash2013-04-07

LA

CS

ANTI-MALWARE

Ref p154

A Computational Framework forApprehending Evolving Malwareand Malware Engineers

Dr SimonKramer

FNRndashAFR PostDoc(103 236 e)

2011-01-01 ndash2012-12-31

EPRIV-MAARef p155

A Formal Approach to EnforcedPrivacy Modelling Analysis andApplications

Prof DrSjouke Mauw

FNRndashAFR(105222e)

2009-12-01 ndash2013-11-30

GMASecRef p156

Games for Modelling and Analy-sis of Security

Prof DrSjouke Mauw

FNRndashAFR(140000e)

2009-11-01 ndash2013-10-31

SADTRef p157

Security Analysis ThroughAttackndashDefense Trees

Prof DrSjouke Mauw

FNR-AFRPhD(141968e)

2010-01-01 ndash2013-12-31

SECLOCRef p158

Secure and Private LocationProofs Architecture and Designfor Location-Based Services

Prof DrSjouke Mauw

FNR-AFRPhD(109137e)

2010-08-01 ndash2013-07-31

SHARCRef p160

Analysis of the SHA-3 RemainingCandidates

Prof Dr AlexBiryukov

FNR-AFR Post-doc(102620e)

2010-10-15 ndash2012-10-14

20 Projects and Grants in 2012

AFR projects (cont)Lab Acronym Title PI Funding Duration

LA

SSY

DYNOSTRef p161

Dynamic and Composite Service-Oriented Architecture SecurityTesting

Prof DrYves Le Traon

NA 2010-10-01 ndash2013-09-30

PeerunitRef p162

A Testing Framework for Large-Scale Applications

Prof DrYves Le Traon

NA 2011-01-15 ndash2014-01-15

SPEMRef p163

Selected Problems in ExecutableModeling

Prof DrPierre Kelsen

FNR-AFR PhD 2009-11-15 ndash2012-11-15

21

AFR projects (cont)Lab Acronym Title PI Funding Duration

ILIA

S

IELTRef p132

Information Extraction fromLegislative Texts

Prof DrLeon van derTorre

FNR AFR PHD 2012-03-01

LOSECRef p133

Security Logics Prof DrLeon van derTorre

FNR-AFR 2009-09-01 ndash2012-09-01

ProCRobRef p134

Programming Cognitive Robots Prof DrLeon van derTorre

FNR-AFR 2011-05-20 ndash2014-05-20

TABNRef p135

Trust in argumentation-based ne-gotiation

Dr SrdjanVesic

FNR-AFR-Postdoc

2012-10-01 ndash2013-01-14

LAAMIRef p136

Logical Approaches for Analyz-ing Market Irrationality compu-tational aspects

Prof DrLeon van derTorre

FNR-AFR(117840e)

2011-04-01 ndash2013-03-31

Green EECRef p138

Green Energy-Efficient Comput-ing

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2010-04-01 ndash2012-03-31

CIDCRef p139

Confidentiality Integrity issuesin distributed computations

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2010-01-01 ndash2013-12-31

REMORef p141

Reliability of Multi-ObjectiveOptimization techniques

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2010-10-01 ndash2012-09-30

LUXCommTISRef p143

Community-based Vehicular Net-work for Traffic Information inLuxembourg

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2011-09-01 ndash2014-08-31

HERARef p144

Holistic autonomic Energy andthermal aware Resource Alloca-tion in cloud computing

Prof Dr Pas-cal Bouvry

FNR - AFRPhD(37288e)

2011-09-15 ndash2014-09-14

INTERCOMRef p146

Energy-Efficient Networking inAutonomic Cloud Computing

Prof Dr Pas-cal Bouvry

FNR AFR Post-Doc

2011-06-01 ndash2013-05-31

DeTeMOCGAsRef p147

Decision-theoretic fine tuning ofmulti-objective co-evolutionaryalgorithms

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2011-09-15 ndash2014-09-14

EPOCRef p149

Energy-Performance Optimiza-tion of the Cloud

Prof Dr Pas-cal Bouvry

FNR - AFRPhD(10812558e)

2010-09-01 ndash2013-08-31

TIGRISRef p150

Risk Prediction Framework forInterdependent Systems usingGraph Theory

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2009-10-15 ndash2012-10-14

DYMORef p151

Dynamic MixVoip Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2012-11-01 ndash2015-10-31

SaPRORef p152

Satellite Payload ReconfigurationOptimization

Prof Dr Pas-cal Bouvry

FNR - AFRPhD

2010-11-15 ndash2013-11-14

22 Projects and Grants in 2012

University of Luxembourg Internal projectLab Acronym Title PI Funding Duration

LA

CS

DEFAULT-PRIV

Ref p85

Privacy by Default Prof DrSjouke Mauw

UL(192853e) 2012-09-01 ndash2014-08-31

EPRIVRef p87

A Formal Approach to EnforcedPrivacy in e-Services

Prof DrSjouke Mauw

UL(254955e) 2009-05-01 ndash2012-04-30

LA

SSY

BLASTRef p88

Better e-Learning AssignmentsSystem Technology

Prof DrDenis Zam-punieris

UL(165000e) 2010-09-01 ndash2012-08-31

COMPEXRef p89

Model Composition for Exe-cutable Modeling

Prof DrPierre Kelsen

UL(173Ke) 2011-10-01 ndash2013-09-30

DYNOSOARRef p90

Dynamic and Composite Service-Oriented Architecture SecurityTesting

Prof DrYves Le Traon

UL NA

ILIA

S

AASTMRef p82

Advanced Argumentation Tech-niques for Trust Management

Prof DrLeon van derTorre

UL 2008-05-01 ndash2012-04-30

LINMASRef p80

Logics Integrated for NormativeMulti-Agent Systems

Prof DrLeon van derTorre

UL 2011-03-01 ndash2013-02-28

DPMHPCRef p83

A discrete approach to modelprocessing of hard metal includ-ing high performance computing

Prof DrBernhardPeters

UL NA

EvoPerfRef p84

Evolutionary Computing andPerformance Guarantees

Prof Dr Pas-cal Bouvry

UL(370ke) 2011-09-01 ndash2013-12-31

23

UL PhD PostDocLab Acronym Title PI Funding Duration

CO

MSY

S

MOVERef p99

Mobility Optimization usingVehicular network technologies(MOVE)

Prof DrThomas Engel

CORE-MOVE(37KYear)

2011-11-15 ndash2014-11-14

Honeypotand MalwareAnalysis

Ref p96

Honeypot and Malware Analysis Prof DrThomas Engel

AFR-PPP(37Kyear)

2011-10-15 ndash2014-10-14

NARef p97

Routing and mobility manage-ment in vehicular networks

Prof DrThomas Engel

FNR - COREMOVE(37Kyear)

2011-09-01 ndash2014-08-31

SMO-MLSRef p98

Securing Mission Operations us-ing Multi-Level Security

Prof DrThomas Engel

European SpaceAgency(48800eUL - 37077 e)

2010-11-01 ndash2014-10-30

NARef p100

Service Dependency andAnomaly Detection

Prof DrThomas Engel

Funded on FP7EFIPSANSproject until31122010 -NetLab

2008-11-01 ndash2012-10-31

LA

SSY

NARef p113

Smartphone Malware detectionand mitigation with Static codeAnalysis

Prof DrYves Le Traon

NA(NA) 2011-10-15 ndash2014-09-30

ACARef p114

Access Control ArchitecturesFrom Multi-objective Require-ments to Deployment

Prof DrYves Le Traon

UL 2011-02-01 ndash2014-01-31

24 Projects and Grants in 2012

UL PhD PostDoc (cont)Lab Acronym Title PI Funding Duration

ILIA

S

ICRRef p100

Individual and Collective Rea-soning

Prof DrLeon van derTorre

UL-PHD 2008-03-12 ndash2012-03-12

NARef p102

Understanding Financial Topicsand their Lifetime in TextualNews by the Content Aging The-ory

Prof DrChristophSchommer

FNRCORE(500000)

2012-06-01 ndash2015-05-31

SPACERef p103

Smart Predictive Algorithms forSpacecraft Anomalies

NA SnT 2011-07-09 ndash2017-07-08

INACSRef p104

An Incremental System to man-age Conversational Streams

Prof DrChristophSchommer

UL 2009-02-01 ndash2013-01-14

FERESRef p105

Feature Extraction and Repre-sentation for Economic Surveys

Prof DrChristophSchommer

Internal Doc-toral Posi-tion(InternalDoctoral Posi-tion)

2011-04-01 ndash2014-03-31

NARef p106

Sentiment Classification in Fi-nancial Texts

Prof DrChristophSchommer

FNRCORE(500000)

2012-06-01 ndash2015-05-31

SPARCRef p108

Artificial Conversational Com-panions

Prof DrChristophSchommer

NA 2011-04-01 ndash2014-03-31

ERACCRef p109

Energy-efficient resource alloca-tion in autonomic cloud comput-ing

Prof Dr Pas-cal Bouvry

UL 2010-10-01 ndash2013-09-30

IICRef p110

Integrity Issues on the Cloud Prof Dr Pas-cal Bouvry

UL 2011-01-16 ndash2013-01-15

NARef p112

Energy-Efficient InformationDissemination in MANETs

Prof Dr Pas-cal Bouvry

UL 2009-09-15 ndash2012-09-14

25

Other misc projectsLab Acronym Title PI Funding Duration

CO

MSY

S BCEERef p115

Enterprise security for the bank-ing and financial sector

Prof DrThomas Engel

BCEE(204Ke) 2011-04-01 ndash2012-03-31

EPTVRef p117

EPT Vehicular Networks Prof DrThomas Engel

EPT(2 298 Ke) 2010-01-01 ndash2014-12-31

Pil to SPELLRef p118

PIL to SPELL conversion Prof DrThomas Engel

SES-ASTRA(Notapplicable)

2011-01-28 ndash2015-01-27

LA

CS LASP

Ref p120

Developing a Prototype of Loca-tion Assurance Service Provider

Prof DrSjouke Mauw

ESA -SnT(160000e(ESA) )

2010-12-08 ndash2012-12-07

LA

SSY

SPLITRef p121

Combine Software Product Lineand Aspect-Oriented SoftwareDevelopment

Prof DrNicolas Guelfi

ULFNR(41000e)

2009-10-01 ndash2012-09-30

ILIA

S AlgoDecRef p119

INTERCNRSGDRI1102 Al-gorithmic Decision Theory

Prof Dr Ray-mond Bisdorff

FNR UL(11 000e)

2011-01-01 ndash2014-12-31

26 Projects and Grants in 2012

Accompanying measures (AM)Lab Acronym Title PI Funding Duration

ILIA

S SandpileRef p165

Building the Skeleton of a SOscheduler

Prof Dr Pas-cal Bouvry

FNR -AM2c(634900)

2012-03-01 ndash2012-05-01

41 Research projects 27

41 Research projects

411 European funding projects

Investigation of Radio Resource Allocation and Multiple AccessSchemes for Satellite NetworksAcronym InSatNetReference NAPI NAFunding FNR-ERCIM-Alain BensoussanBudget 46KeBudget UL NADuration 2012-06-01 ndash 2013-05-31

Members M Butt B Ottersten

Domain(s) NA

Partner(s) NA

Description The demands for data rate are increasing with the emergenceof new applications On the other hand radio resources are becoming scarcedue to dedicated frequency allocation of the spectrum to the operators Itis becoming increasingly challenging to meet the rate and coverage require-ments for the users Satellite systems have the potential to provide largescale coverage and meet throughput requirements for broadband access Inthis project we plan to study the radio resource allocation and multipleaccess schemes for satellite networks We investigate the radio resource al-location problems specifically for the cognitive architecture of satellite net-works and evaluate energy-performance trade-offs for different performanceparameters like delay and loss requirements for the primary and secondaryusers in a cognitive satellite network

Results NA

Publications NA

28 Projects and Grants in 2012

Cognitive Radio and Networking for Cooperative Coexistenceof Heterogeneous wireless NetworksAcronym Cognitive RadioReference NAPI Prof Dr Bjorn OtterstenFunding COST Action IC0902Budget NABudget UL NADuration 2009-07-30 ndash 2013-12-10

Members B Ottersten

Domain(s) Cognitive Radio

Partner(s) Belgium Bosnia and Herzegovinia Croatia Cyprus Czech Re-public Denmark Finland Former Yugoslav Republic of Macedonia FranceGermany Greece Ireland Israel Italy Latvia Luxembourg Norway PolandPortugal Romania Serbia Slovenia Spain Sweden Turkey United King-dom USA China Canada Australia ISPRA (It)

Description NA

Results NA

Publications NA

Cooperative Radio Communications for Green Smart Environ-mentsAcronym Cooperative RadioReference NAPI Prof Dr Bjorn OtterstenFunding Cost Action IC2004Budget NABudget UL NADuration 2011-05-24 ndash 2015-05-18

Members B Ottersten

Domain(s) NA

Partner(s) Austria Belgium Bulgaria Cyprus Czech Republic Den-mark Finland Former Yugoslav Republic of Macedonia France GermanyGreece Ireland Israel Italy Netherlands Norway Poland Portugal Ro-mania Serbia Slovakia Spain Sweden Switzerland UK

41 Research projects 29

Description NA

Results NA

Publications NA

MIMO Hardware DemonstratorAcronym MIMO-HardwareReference 12R-DIR-PAU-10MIMOPI NAFunding ESA -ESTEC-ITTA01-609909NLJKBudget 1199KeBudget UL NADuration 2011-01-01 ndash 2012-03-30

Members B Ottersten D Arapoglou B Shankar S Chatzinotas

Domain(s) Satellite Based Alarm System

Partner(s)

bull Elektrobit Wireless Communications Ltb (Finland)

bull SES Astra Techcom (Luxembourg)

bull Univ of Oulu (Finland)

bull VTT (Finland)

bull Univ of Turku (Finland)

Description development of practical methods utilizing MIMO techniquesfor DVB-SH AB scenarios to improve the air interface performance com-pared to current standard The practical aim of the proposal is to specifyand develop a MIMO HW demonstrator that will be used to carry out prac-tical performance evaluation and demonstrations The project is dividedinto 2 phases The 1st phase provides an overview of state-ofthe- art MIMOtechniques and defines a set of MIMO scenarios based on DVB-SH includingapplicable radio channel models In addition a computer simulation modelwill be developed to evaluate the defined scenarios and the system architec-ture design for implementation of the developed MIMO-DVB-SH waveformwill be carried out During the 2nd phase the specified system will be im-plemented utilizing an existing HW test-bed the RACE-SDR The test-bedwill be used to perform demonstrations and detailed performance evaluationin laboratory environment As a conclusion improvements to the existing

30 Projects and Grants in 2012

standard andor implementation guidelines will be proposed to DVB-forumand ETSI standardization (EB is a member in both organizations)

Results NA

Publications NA

Propagation tools and data for integrate TelecommunicationNavigation and earth Observation systemsAcronym Propagation toolsReference NAPI Prof Dr Bjorn OtterstenFunding COST Action IC0802Budget NABudget UL NADuration 2009-03-03 ndash 2012-11-18

Members B Ottersten

Domain(s) NA

Partner(s) Austria Belgium Bulgaria Cyprus Czech Republic Den-mark Finland France Germany Greece Hungary Israel Italy NorwayPoland Portugal Serbia Slovakia Spain Sweden Switzerland UK BrazilCanada Netherlands India Pakistan USA

Description NA

Results NA

Publications NA

SATellite Network of EXperts - Call off-Order COO2Acronym SatNEx IIIReference NAPI Prof Dr Bjorn OtterstenFunding ESA - gtTRP ARTES1 ARTES5Budget NABudget UL NADuration 2011-03-23

Members B Ottersten

41 Research projects 31

Domain(s) NA

Partner(s) DLR (Germany) Univ of Surrey (UK) Univ of Bologna (It)Aristotle Univ of Thessaloniki (Greece) Univ of Bradford (UK) ConsorzoNazionale Interuniv Per le Telecomunicazioni (It) Italian National Re-search Council (It) Centre Tecnologic de Telecomunicacions de Catalunya(Spain) National Observatory of Athens (Greece) Office National drsquoEtudeset de Recherches Aerospatiales (Fr) Univ of Salzburg (Austria) TeSA As-sociation (Fr) Graz Univ of Technology (Austria) Univ Autonoma deBarcelona (Spain) The Univ Court of the Univ of Aberdeen (UK) UnivDegli Studi di Roma rsquoTor Vergatarsquo (It) Univ de Vigo (Spain) Fraunhofer-Gesellschaft Munchen (Germany) Institute of Computer and Communica-tions Systems (Greece)

Description NA

Results NA

Publications NA

Potential business for an advanced spread spectrum measure-ment system for satellite testingAcronym Spread spectrum satellite commReference I2R-DIR-PAU-11LLV8PI Prof Dr Bjorn OtterstenFunding ESABudget 97KeBudget UL NADuration 2010-12-08 ndash 2011-12-07

Members B Ottersten S Chatzinotas

Domain(s) Satellite spectrum

Partner(s)

bull SES Astra TechCom SA

bull EmTroniX Sarl

Description The study aims at establishing the requirements and anal-yse the market situation to evaluate the business perspectives for a spreadspectrum measurement system or service together with potential customerssuch as satellite operators and satellite manufactures The detailed under-standing of the customers requirements and the kind of drivers for them for

32 Projects and Grants in 2012

buying such a measurement product or service is a key indicator for subse-quent activities Based on these outcomes business scenarios and a businesscases are elaborated and a roadmap for a sustainable Luxembourg exploita-tion in for instance service provisioning and test equipment manufacturingis prepared In addition study activities will lead to an outline proposalready to be submitted to a funding agency In detail the following pointswill be investigated

bull Analyse and quantify the market for spread spectrum measurementsystems and services

bull Identify potential customers capture their requirements

bull Elaborate system concepts and develop and validate system and ser-vice design with potential customers

bull Identify and critically assess competing solutions

bull Establish a business model understand the value chain identify andquantify the opportunity for Luxembourg industry

bull Prepare an outline proposal and identify opportunities for funding

bull Identify state-of-the art in this and similar domains and evaluate tech-niques subject to patent filling

As this study is conducted preliminary to learn about market situation andcustomer needs there are also some Non-objectives

bull Provision of detailed technical solution

bull Development or technical validation activities

bull Definition of the solution prior to the understanding of the market

Results NA

Publications NA

41 Research projects 33

uBiquitous secUre inTernet-of-things with Location andcontEx-awaRenessAcronym BUTLERReference I2R-NET-PEU-11BTLRPI Prof Dr Thomas EngelFunding FP7 European CommissionBudget 456KeBudget UL NADuration 2011-10-01 ndash 2014-09-30

Members T Engel R State T Cholez F Melakessou

Domain(s) internet of things context aware services smart devices net-work security integrated architecture and platform

Partner(s)

bull Inno AG Germany

bull Ericsson Spain

bull Telecom Italia Italy

bull Gemalto SA France

bull CEA France

bull Oulun Yliopisto Finland

bull FBConsulting SARL Luxembourg

bull ISMB Italy

bull Hochschule Luzern Switzerland

bull Swisscom Switzerland

bull SMTMicroelectronics Italy

bull Utrema France

bull University of Luxembourg

bull Universiteit Leuven Belgium

bull Cascard OY Finland

bull TST Spain

bull Alcatel Lucent Bell Labs France

34 Projects and Grants in 2012

bull Jacobs University Germany

Description Recent ICT advances are bringing to reality a world wheresensors actuators and smart portable devices are interconnected into anInternet-of-Things (IoT) ecosystem reaching 50 Billion devices by 2015

The IoT major challenges are from a systemic viewpoint smart resourcemanagement and digital security and from a userservice perspective thepervasiveness (uniformity of performance anytime and anywhere) and aware-ness (inversely proportional to the degree of knowledge required from users)BUTLER will be the first European project to emphasise pervasivenesscontext-awareness and security for IoT Through a consortium of leadingIndustrial Corporate RD and Academic partners with extensive and com-plementary know-how BUTLER will integrate current and develop newtechnologies to form a bundle of applications platform features and servicesthat will bring IoT to life

Results UL already contributed to the definition of the use cases thatpresent our vision of smart-life in the topics of smart city and smart trans-portation We also contributed to the definition of the requirements for theBUTLER platform (WP1- D11)

Publications None yet

SceFIMS-Coordination of the European Future Internet forumof Member StatesAcronym ceFIMSReference IR-DIR-PEU-10CEFIPI Prof Dr Thomas EngelFunding EC - FP7

UL budgetBudget 35KeBudget UL NADuration 2010-09-01 ndash 2013-02-28

Members T Engel L Ladid

Domain(s) IPv6 networking support action

Partner(s)

bull Waterford Institute of Technology Ireland

bull Nederlandse Organisatie voor Wetenschappelijk Onderzoek Nether-lands

41 Research projects 35

bull Nemzeti Kutatasi Es Technologiai Hivatal Hungary

bull UMIC - Agencia Para A Sociedade Do Conhecimento Portugal

bull Asociacion De Empresas De Electronica Tecnologias De La Informa-cion Y Telecomunicaciones De Espana Spain

Description The ceFIMS project addresses the problem of the fragmenta-tion of ICT research between European Member States (MS) ceFIMS willleverage its knowledge of Member State-funded research to gain consensusabout problems and approaches at the Member State level ceFIMS willbuild on that consensus to promote alignment both across Member Statesand also between Member State and EC-funded ICT research This willconsequently unite better the European ICT research community and placeEuropean Future Internet (FI) research in a stronger position

ceFIMS will produce a research roadmap to maximise synergies between EUand MS investments in FI research establishing the basis for an ERA-NET+on the Future Internet An ERA-NET+ will provide the means to developthe EUrsquos strong research position Allied to this a Public-Private Partner-ship (PPP) will provide the means to transfer new knowledge into innovativeproducts with economic and social benefits for EU citizens ceFIMS willincrease awareness among Member States of the role that they can play ina Europe-wide FI PPP and how Member State initiatives and the PPP canbe aligned to the maximum extent possible

ceFIMS-Coordination of the European Future Internet forum of MemberStates-responds to Call 5 from the European Commission for European ex-cellence in Trustworthy ICT In particular the Science and Technology ob-jectives of ceFIMS are highly relevant to Objective ICT-200711 The Net-work of the Future

Results NA

Publications NA

36 Projects and Grants in 2012

Universal Itegration of the Internet of Things through an IPv6-Based Service-oriented Architecture enabling heterogeneouscomponents interoperabilityAcronym IoT6Reference I2R-NET-PEU-11IOT6PI Prof Dr Thomas EngelFunding EC- FP7Budget 266KeBudget UL NADuration 2012-01-01 ndash 2014-12-31

Members T Engel L Ladid

Domain(s) ICT

Partner(s)

bull Mandat international alias fondation pour la cooperation internationale(mi) rdquothe coordinator of the research project iot6

bull Ericsson doo for telecommunications

bull Runmyprocess sas

bull University College London

bull Universidad de murcia

bull Technische Universitaet Wien

bull Haute Ecole Specialisee de Suisse Occidentale

bull Korea Advanced Institute of Science and Technology

Description The UIoT6 project aims at exploiting the potential of IPv6and related standards (6LoWPAN CORE COAP etc) to leverage cur-rent shortcomings of the Internet of Things so that a universally integratedInternet of Things can evolve Its main challenges and objectives are to re-search design and develop an IPv6-based Service Oriented Architecture toachieve multi-protocol integration of heterogenous rdquocommunication thingsrdquoand to research and realize intelligence distribution and smart routing fea-tures within Furthermore transparent and borderless interactions withcloud computing services and applications EPC information service envi-ronments and mobile networks are of main interest The main outcomeof UIoT6 is a well-defined open and distributed IPv6-based Service Ori-ented Architecture that enables interoperability mobility cloud computing

41 Research projects 37

and intelligence distribution among heterogeneous smart things componentsapplications and services

Results NA

Publications NA

Provisioning of urbanregional smart services and businessmodels enabled by the Future InternetAcronym OUTSMARTReference I2R-NET-PEU-11OSMTPI Prof Dr Thomas EngelFunding FP7 European CommissionBudget 257KeBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members T Engel J Francois A Panchenko L Ladid

Domain(s) Internet of Things (IoT) utilities environment ecosystems

Partner(s) Name of the organisations participating in the project (not thepersons) Use small letters list using bullet points specify the country ifnot Luxembourg based

bull France Telecom FR

bull Telefonica Investigacion y Desarrollo SA Unipersonal SP

bull Alcatel-Lucent IT

bull Ericsson RS

bull Engineering Ingegneria Informatica SpA IT

bull ATOS Origin SP

bull Coronis SAS an ELSTER Group Company FR

bull Worldsensing ES

bull CEA-LETI FR

bull University of Luxembourg LU

bull Alexandra Institute DK

bull AMPLEX DK

38 Projects and Grants in 2012

bull Aarhus VAND DK

bull University of Surrey GB

bull AMEY PLC GB

bull FERROVIAL Centro de Innovacion de Infraestructuras InteligentesES

bull Create-NET (Trento RISE) IT

bull Azienda Consorziale Servizi Municipalizzati SpA IT

bull Dolomiti Energia IT

bull Universidad de Cantabria ES

bull Banco de Santander ES

bull Municipality of Santander ES

bull EMCANTA ES

bull EON ESPANA ES

bull TTI Norte ES

bull Fraunhofer-Gesellschaft zur Foerderung der Angewandten Forschungev DE

bull Berliner Stadtreinigungsbetriebe DE

Description The goal of OUTSMART is to contribute to the Future In-ternet (FI) by aiming at the development of five innovation eco-systemsThese eco-systems facilitate the creation of a large variety of pilot servicesand technologies that contribute to optimised supply and access to servicesand resources in urban areas This will contribute to more sustainable utilityprovision and through increased efficiency lower strain on resources and onthe environment Reaching this goal requires the whole value chain namelycity authorities utilities operators ICT companies as well as knowledge in-stitutions in order to have an industry driven approach when developingadvanced services and technologies OUTSMART services and technolo-gies will be based on an open and standardised infrastructure as envisionedby the FI Private Public Partnership (FI PPP) and provided by a serviceframework designed to facilitate provisioning development and access Tothis extend OUTSMART will (1) deliver a set of detailed functional andnon-functional requirements for an FI enabler platform and correspondingbusiness framework able to support the above described eco-systems based

41 Research projects 39

on a deep analysis of the different domain specific use cases in the utility andenvironment application domain (2) provide a specification of the domainspecific enabler functionality with corresponding service interfaces compat-ible and aligned with Core Platform components to be specified alongsidethis project effort (3) provide a realisation of prototypes of domain specificfunctionality for the envisioned eco-system according to the previous spec-ification and a validation thereof in early field trials in the envisioned usecases (4) deliver a business framework specification which serves as blueprint for the foreseen local eco-systems able to provide their sustainabilitybeyond the PPP funding lifetime by creating favourable conditions for localinvestment and innovation and (5) deliver a detailed plan for pilot servicesin the envisioned local eco-systems which act as initial light house showcases for Europe in the utility and environment applications domain

Results The key results of our activity in OUTSMART are

bull Definition and refinement of requirements in particular in terms ofsecurity and privacy

bull Large scale security in distributed environments by developing newmethods for autonomic authentication as well as cloud-computing basedsolutions for attack detection

bull Privacy protection in large scale networks by proposing a novel ap-proach to guarantee the privacy of a service provider and by evaluatingthe degree of protection over encrypted communication

bull Traffic analysis in encrypted network streams We showed that undercertain circumstances cryptography alone is not enough to hide thecontent of communication We also studied countermeasures how tomitigate this attack

bull New methods of path selection that allow performance-improved onionrouting We evaluate the proposed methods in the public networksand present a practical approach to empirically analyze the strengthof anonymity certain methods of path selection provide in comparisonto each other

The 2nd and 3rd items bring the first solutions to the requirements ap-pearing during the first stage These solutions are designed for the FutureInternet context where OUTSMART fits ie with large distributed andheterogeneous environments

This is a long list that enumerates the results obtained until now in LATEXformat

40 Projects and Grants in 2012

bull Fuzzing approaches for IPv6 protocols

bull Game theoretical modeling for fuzzing

bull Flow based monitoring and data mining approaches for large scale flowmonitoring

The key resukts from this project are related to the definition of a threatmodel for autonomic IPv6 networks and its instantiation in the specific caseof GANA architectural paradigm

The major outcomes from this project included a new paradigm for adaptivehoneypots that leverage game theory and reinforcement learning as underly-ing conceptual building blocks for smarter honeypots We have implementedand operated such honeypot and the major publications from this projectare one journal publications accepted for 2011 and another one for [356]

Publications [268 265 270 269] Deliverables D22

[357 359 358 360]

Seamless Communication for Crisis ManagementAcronym SECRICOMReference F1R-CSC-PEU-08SECRPI Prof Dr Thomas EngelFunding EC - FP7 European Commission

ULBudget 12469KeBudget UL NADuration 2008-09-01 ndash 2012-04-30

Members Thomas Engel Aurel Machalek

Domain(s) Emergency services critical infrastructure

Partner(s)

bull QinetiQ Ltd United Kingdom

bull Ardaco as Slovakia

bull Bumar Ltd Poland

bull NEXTEL SA Spain

bull Infineon Technologies AG Germany

41 Research projects 41

bull Institute of Informatics Slovak Academy of Sciences Slovakia

bull Graz University of Technology Austria

bull Smartrends sro Slovakia

bull ITTI Sp z oo Poland

bull British Association of Public Safety Communication Officers UnitedKingdom

bull CEA LETI France

bull Hitachi Europe SAS France

Description SECRICOM is proposed as a collaborative research projectaiming at development of a reference security platform for EU crisis manage-ment operations with two essential ambitions (A) Solve or mitigate prob-lems of contemporary crisis communication infrastructures (Tetra GSMCitizen Band IP) such as poor interoperability of specialized communica-tion means vulnerability against tapping and misuse lack of possibilitiesto recover from failures inability to use alternative data carrier and highdeployment and operational costs (B) Add new smart functions to existingservices which will make the communication more effective and helpful forusers Smart functions will be provided by distributed IT systems based onan agentsrsquo infrastructure Achieving these two project ambitions will allowcreating a pervasive and trusted communication infrastructure fulfilling re-quirements of crisis management users and ready for immediate application

More information httpwwwsecricomeu

Results University of Luxembourg successfully organised and presenteddeveloped crises communication technology of SECRICOM project duringthe NATO CPC seminar and demonstration in Slovakia We did the demon-stration together with Ciwil Protection of Luxembourg The project SE-CRICOM is after first review period marked as rdquoExcellent progress (theproject has fully achieved its objectives and technical goals for the periodor has even exceeded expectations)rdquo

Publications NA

42 Projects and Grants in 2012

Argumentation-Based and Logic-Based Reasoning in Multi-Agent SystemsAcronym ALBRReference F1R-CSC-LAB-05ILIAPI Dr Srdjan VesicFunding ERCIMBudget NABudget UL NADuration 2011-10-01 ndash 2012-09-30

Members Srdjan Vesic

Domain(s) Argumentation Reasoning Logic Multi-Agent Systems

Partner(s) NA

Description The goal of the fellowship is to obtain a better understand-ing of defeasible reasoning about information items in multi-agent contextsand to propose and evaluate specific logic-based approaches for this pur-pose First the link between existing logic-based and argumentation-basedreasoning formalisms is to be studied Then we will develop logics able tosupport deep reasoning about information quality and information handlingbased on incomplete and uncertain background knowledge This is relevantfor modelling information gathering and aggregation eg in e-science or inlegal procedures

Results My main research results during the ERCIM fellowship (Oct 2011to Sept 2012) can be resumed as follows

I studied the link between argumentation-based and non argumentation-based reasoning By argumentation-based approach we refer to a reasoningframework based on construction and evaluation of arguments This line ofresearch is important since it helps to better understand the result obtainedby an argumentation-based approach and to explore its expressive power[109 108]

I participated in the development of an on-line tool for argumentation-baseddecision making The software is still in the beta-testing phase but it canbe accessed online at thesynergyorg [107]

I also worked on a logical language to describe and reason about the beliefsof agents in a multi-agent system where agents have different knowledgemore particularly where every agent is aware of a different set of arguments[114]

Publications [107] [114] [108] [109]

41 Research projects 43

Trust Games Achieving Cooperation in Multi-Agent SystemsAcronym TrustGamesReference 1196394PI Dr Paolo TurriniFunding FNR-FP7 CofundBudget NABudget UL NADuration 2011-09-01 ndash 2013-08-31

Members Paolo Turrini

Domain(s) Game Theory Trust Theory Cooperative Behaviour

Partner(s) NA

Description TrustGames starts from the hypothesis that trust is a socialphenomenon that takes place among decision makers endowed with beliefsand goals and it is seen as a prerequisite for collaborative work (Hardin2004) (Gambetta 2008) (Castelfranchi-Falcone 2010) Up to now the treat-ment of trust in MAS is limited to specific accounts stemming from cog-nitive science (Castelfranchi-Falcone 2010) or from the normative systemsapproach (van der Torre 2010) with no unified formal theory TrustGamesis devoted to an integration of the cognitive and normative accounts of trustwithin the theory of games the discipline that formally models interactivedecision making In particular the fundamental connection between trustand related notions such as dependence and agreements between the stake-holders is intuitively clear but formally not well understood Recent contri-butions (Grossi-Turrini 2010) have shown that dependence and agreementscan be fully incorporated within the theory of games but it abstracts awayfrom cognitive and normative ingredients of trust Concretely TrustGameswill extend the model in (Grossi-Turrini 2010) with the cognitive features of(Castelfranchi-Falcone 2010) and the normative features in (van der Torre2010) in order to model trust in games Thanks to this integration formaltools such as logics to reason about games can be adopted to check whetherdesirable properties are achievable (or undesirable properties are avoidable)in classes of games with trust

Results

The study of cooperation in games The TrustGames project is centeredof the idea of using trust to achieving cooperation in multi-agentsytems Thereby understanding how cooperation is obtained from non-cooperative interaction is of fundamental importance The study has

44 Projects and Grants in 2012

extended and generalized work already carried out during my PhDstudies characterizing the cooperative structures that can arise fromnon-cooperative games

Evaluation in games The TrustGames project is based on a notion oftrust as evaluation of selection of fellow players in interaction TherebyI have directed part of our research effort to the study what it meansfor players to have an evaluation of what it can happen Normallyin games players are assumed to have knowledge of the game thatthey are playing and of the preferences and the possibilities of theiropponents Instead I have shown that when players have a boundedrationality the role of evaluation is crucial

Agreements and norms in games The TrustGames project is also meantto lay a connection between the theory of reciprocity and normativemulti-agent systems in other words to study the normative aspectsof reciprocating someone else trust The last part of this year re-search effort has been devoted to this Building up on the notionof dependence relations studied by Grossi and Turrini on which theTrustGames is based I have constructed a deontic language that couldexpress standard deontic notions (such as obligations prohibitions andpermissions) interpreted in terms of reciprocity

The project results have fully met the original proposal expectations How-ever several novelties have already crop up such as the importance of playersbounded rationality (what I have called ldquoshort sightrdquo) as a precondition fortrust in games

Publications [133] [47] [46] [112]

Wireless traffic Safety network between CarsAcronym WiSafeCarReference NAPI Prof Dr Pascal BouvryFunding EUREKA - CELTICBudget 300000eBudget UL NADuration 2009-07-01 ndash 2012-03-31

Members Pascal Bouvry Gregoire Danoy Yoann Pigne Guillaume-JeanHerbiet Patricia Ruiz

41 Research projects 45

Domain(s) Vehicular Ad Hoc Networks Secure Communications TrafficManagement Accident Warning

Partner(s)

bull Mobisoft Finland

bull Finnish Meteorological Institute Finland

bull VTT Finland

bull Taipale Telematics Finland

bull Sunit Finland

bull Ubridge South Korea

bull CRP Henri Tudor

bull Ubistream Luxembourg

Description WiSafeCar aims to develop an effective service platform andadvanced intelligent wireless traffic safety network between cars and infras-tructure with possibility to exploit vehicle based sensor and observationdata in order to generate secure and reliable intelligent real-time servicesand service platform for vehicles

Results Several works have been pursued in the frame of the developmentof a realistic mobility model of vehicles in Luxembourg VehILux Theparameters of VehILux have been optimized using different metaheuristicsin order to further improve its accuracy and results have been published in[174] In [316] a complementary optimization of VehILux has been proposedin which an iterative algorithm is used ie Gawronrsquos algortihm to betterspread the traffic flow in the road network

The WiSafeCar has ended in March 2012 The final project review has beenheld in Tampere Finland Demonstration of all projects achievements in-cluding the Luxembourgian simulator has been conducted by the consor-tium during a large event covered by Finnish press (newspaper TV)

Publications NA

46 Projects and Grants in 2012

Technology-supported Risk Estimation by Predictive Assess-ment of Socio-technical SecurityAcronym TREsPASSReference FP7 Grant Agreement No 318003PI Prof Dr Sjouke MauwFunding EU FP7Budget 9999824eBudget UL 561320eDuration 2012-11-01 ndash 2016-10-31

Members Sjouke Mauw Barbara Kordy Peter YA Ryan Gabriele Lenzini

Domain(s) Trustworthy ICT

Partner(s) UT the Netherlands DTU Denmark CYB Estonia GMVPPortugal GMVS Spain RHUL UK itrust Luxembourg GUF GermanyIBM Switzerland TUD the Netherlands TUHH Germany AAU DenmarkCHYP UK BD the Netherlands Deloite the Netherlands LUST the Nether-lands

Description Information security threats to organizations have changedcompletely over the last decade due to the complexity and dynamic natureof infrastructures and attacks Successful attacks cost society billions ayear impacting vital services and the economy Examples include StuxNetusing infected USB sticks to sabotage nuclear plants and the DigiNotarattack using fake certificates to spy on website traffic New attacks cleverlyexploit multiple organizational vulnerabilities involving physical securityand human behavior Defenders need to make rapid decisions regardingwhich attacks to block as both infrastructure and attacker knowledge areconstantly evolving Current risk management methods provide descriptivetools for assessing threats by systematic brainstorming In todayrsquos dynamicattack landscape however this process is too slow and exceeds the limits ofhuman imaginative capability Emerging security risks demand an extensionof established methods with an analytical approach to predict prioritizeand prevent complex attacks The TREsPASS project develops quantitativeand organization- specific means to achieve this in complex socio-technicalenvironments The iterative tool-supported framework

bull Represents the structure of complex organizations as socio-technicalsecurity models integrating social and technical viewpoints

bull Predicts socio-technical attacks prioritizes them based on their riskand assesses the aggregated effect of preventive measures

bull Presents results to enable quick understanding and updating of the

41 Research projects 47

current security posture

By integrating European expertise on socio-technical security into a widelyapplicable and standardized framework TREsPASS will reduce security in-cidents in Europe and allow organizations and their customers to makeinformed decisions about security investments This increased resilience ofEuropean businesses both large and small is vital to safeguarding the socialand economic prospects of Europe

All public information about the project can be found at httpwww

trespass-projecteu

TREsPASS is executed jointly by members of SnT and CSC

Results The SaToSS group is contributing to five work packages of theTREsPASS project Socio-technical security model specification (WP1)Quantitative analysis tools (WP3) Visualization process and tools (WP4)Process integration (WP5) and Standardization Dissemination and Ex-ploitation (WP9) Work on all those WPs has been initiated in November2012 at the kick off meeting of TREsPASS which took place at the Univer-sity of Twente in the Netherlands which coordinates the project

A number of initiatives and meetings has been led by BK to contributeto the first phase of the project which concerns identification of necessaryrequirements for model tools ad processes within TREsPASS

bull An initial BYOD case study has been initiated by Barbara Kordy andPatrick Schweitzer (WP1)

bull A survey paper on the state of the art of graphical modeling of at-tack and defenses have been written by Dr Barbara Kordy PatrickSchweitzer and Dr Pietre-Cambacedes from EDF France (WP1) Thepaper will be submitted in early 2013

bull A list of tools for quantitative analysis of security models has beengenerated (WP3)

bull Three meetings have been performed to discuss visualization issues insecurity modeling (WP4)

bull Two interviews concerning auditing methodologies have been carriedout by Barbara Kordy (WP5)

bull A dissemination plan proposed by the leader of WP9 has been ap-proved by UL

Publications NA

48 Projects and Grants in 2012

NESSoS FP7 ProjectNetwork of Excellence on Engineering Se-cure Future Internet Software Services and SystemsAcronym NESSoSReference no budget - participation to the Network of Excel-

lencePI Prof Dr Yves Le TraonFunding noBudget noBudget UL NADuration NA

Members NA

Domain(s) Security Future internet services and system software engi-neering

Partner(s) Core partners Atos SAE Consiglio Nazionale delle RicercheEidgenossische Technische Hochschule Zurich Fundacion IMDEA SoftwareInstitut National de Recherche en Informatique et en Automatique KatholiekeUniversiteit Leuven Ludwig-Maximilians-Universitat Munchen SiemensAG Stiftelsen Sintef University Duisburg-Essen Universidad de MalagaUniversita degli studi di Trento

University of Luxemboug is an associated partner

Description The Network of Excellence on Engineering Secure Future In-ternet Software Services and Systems (NESSoS) aims at constituting and in-tegrating a long lasting research community on engineering secure software-based services and systems

The NESSoS engineering of secure software services is based on the principleof addressing security concerns from the very beginning in system analy-sis and design thus contributing to reduce the amount of system and ser-vice vulnerabilities and enabling the systematic treatment of security needsthrough the engineering process In light of the unique security requirementsthe Future Internet will expose new results will be achieved by means ofan integrated research as to improve the necessary assurance level and toaddress risk and cost during the software development cycle in order to pri-oritize and manage investments NESSoS will integrate the research labs in-volved NESSoS will re-address integrate harmonize and foster the researchactivities in the necessary areas and will increase and spread the researchexcellence NESSoS will also impact training and education activities inEurope to grow a new generation of skilled researchers and practitioners inthe area NESSoS will collaborate with industrial stakeholders to improve

41 Research projects 49

the industry best practices and support a rapid growth of software-basedservice systems in the Future Internet

The research excellence of NESSoS will contribute to increase the trustwor-thiness of the Future Internet by improving the overall security of softwareservices and systems This will support European competitiveness in thisvital area

Results Meetings organisation of the ESSoS 2013 Doctoral Symposium

Publications NA

412 FNR COREINTER Projects

COoperative and COgnitive Architectures for SATellite Net-worksAcronym CO2SATReference 12R-DIR-PFN-10CO2SPI Prof Dr Bjorn OtterstenFunding FNR COREBudget 877KeyearBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members B Ottersten G Zheng S Chatzinotas D Aarapoglou C Xing

Domain(s) Cognitive communication

Partner(s) SES-ASTRA

Description During the last decades the demand for broadband accesshas been ever increasing with various applications in business education andentertainment In this direction satellite systems have the ability to accom-modate this demand providing large-scale coverage even in remote areasHowever in order to compete against other emerging technologies (such asfiber optic and wireless broadband networks) new high-performance satellitearchitectures have to be investigated To this end cooperative and cogni-tive satellite systems can improve both spectral and energy efficiency byexploiting advanced wireless communication techniques Regarding cooper-ative systems the joint processing of beam signals can mitigate inter-beaminterference and lead to better spectrum and power utilization Regardingcognitive systems satellite and terrestrial networks can be employed in par-

50 Projects and Grants in 2012

allel over the same frequency bands in order to provide ubiquitous indoorsand outdoors coverage and at the same time minimize the power consump-tion of the satellite payload The outcome of this investigation will be aninvaluable input to the strateQic planninQ of satellite operators and manu-facturers Based on the derived performance results the key players in thesatellite industry will be able to make informed decisions about the deploy-ment of cooperative and cognitive satellite systems Furthermore satelliteengineers will be able to use the derived insights as guidelines while desiQn-inQ future satellite systems

Results NA

Publications NA

Multi-Sensor Fusion in Mono-View Vision systems Aquisitionand Modeling (FAVE)Acronym CORE FAVEReference 12R-DIR-PFN-11FAVEPI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2011-10-01 ndash 2014-09-31

Members B Ottersten D Aouada K Al Ismaeil

Domain(s) P1 Security Reliability and Trust

Partner(s)

bull IEE

bull Univ de Bourgogne France

Description Video surveillance has become necessary to ensure publicsafety and to secure and protect critical physical infrastructures such asbanks airports and retail stores Current surveillance systems are usuallyrestricted to the deployment of 20 camerasThe effectiveness of these systemsis limited due to 20 cameras sensitivity to illumination and to occlusionswhich inescapably leads to segmentation and tracking failures With the lat-est developments in 30 sensing technologies It is now possible to considercomplementing 20 videos with 3D information in near real time This addi-tion of a third dimension ie depth information ensures a more accuratesensing of the scene We therefore propose to explore fusion approaches to

41 Research projects 51

address the shortfalls of current 20 video surveillance systems Our first ob-jective is to exploit fused data from different sources of visual informationThese include different modalities eg 20 cameras Time-of-Flight rangecameras 30 laser scanners and infrared cameras andor different levels ofabstraction Second after the data acquisition phase we propose to modelthe fused data for an intelligent sensing tailored for real-world security sce-narios In the context of high-level security systems that require a full con-trol over the surveyed area we investigate multi-view 2030 fusion methodsFurthermore for an accurate feature extraction for automatic scene un-derstanding we aim at achieving high resolution space-time depth mapsPrivacy enforcement in digital imaging systems is another important designcomponent that is today impossible to ignore in view of the boiling debateabout privacy violation An interdisciplinary effort will hence be undertakenfor the definition and design of privacy-aware imaging systems

Results NA

Publications NA

Logical Approaches for Analyising Market IrrationalityAcronym LAAMIReference 12R-DIR-PFN-10LAAMPI Prof Dr Bjorn OtterstenFunding FNRBudget 284KeBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members B Ottersten T Neugebauer M Caminada

Domain(s) P1 Security Reliability and Trust

Partner(s) NA

Description The aim of the LAAMI project is to apply techniques de-veloped in the field of Artificial Intelligence to help explaining apparentirrational forms of market behavior as is evidenced by for instance bubblesand crashes The aim is to explain these using formal theories of individualand collective reasoning as they for instance have been developed in the fieldof computational argumentation The aim is not so much to solve irrationalmarket behavior but first and foremost to understand it Our research isaimed at constructing a formal model that is sufficiently rich in order to beaccepted as a realistic model yet sufficiently formal in order to be examinedfor its formal properties and implemented in a software simulator Using

52 Projects and Grants in 2012

the results of the theory development we aim to be able to shed light on theconditions under which irrational forms of market behavior are most likelyto occur

Results NA

Publications NA

Mobility Optimization Using VEhicular Network TechnologiesAcronym MoveReference I2R-DIR-PFN-10MOVEPI Prof Dr Thomas EngelFunding FNR ProjectBudget 1127keBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members Thomas Engel Raphael Frank Andriy Panchenko JeromeFrancois Markus Forster Maximilien Mouton Lautaro Dolberg

Domain(s) vehicluar networks network security vehicular flow optimiza-tion

Partner(s)

bull University of California Los Angeles (UCLA) USA

Description The world is urbanizing rapidly As a consequence trafficcongestion in metropolitan areas has significantly increased over the lasttwo decades Although there has been significant innovation in cars safetysystems and fuel efficiency traffic congestion remains one of the modern illsof our society In most cases existing road infrastructure cannot easily be ex-tended to meet increasing traffic demand As a consequence commuters areoften stuck for hours in traffic chaos causing significant economic damageNew intelligent transportation systems (ITS) are currently being developedto increase traffic efficiency The main idea is to maximize the use of theexisting road infrastructure using smart navigation systems that are awareof the current traffic conditions Communication technologies will play animportant role in the design of such systems In the near future vehicleswill be equipped with communications devices that allow data exchange be-tween cars and Road Side Units (RSUs) Such a vehicular ad hoc network(VANET) can be used to collect and distribute traffic metrics among nearbycars and RSUs and provide advanced navigation services The aim of thisproject is to study and understand vehicular flow characteristics and propose

41 Research projects 53

new schemes using wireless communications technologies to reduce vehicu-lar traffic congestion enhance safety and at the same time reduce emissionsIn this relatively new research area there are multiple challenges As afirst step we will investigate how and where traffic information (eg speeddestination and local traffic density) can efficiently be retrieved from vehi-cles Network planning and management need to be carefully studied inorder to provide the required quality of service Adapted routing and dis-semination protocols that are able to cope with the changing dynamics ofvehicular traffic need to be specified Traffic Coordination Points (TCPs)will be responsible for collecting and evaluating traffic metrics for a givenarea This information will help to predict how the traffic will evolve in thenear future In this way the TCPs can suggest via the vehicular networkindividual routes avoiding traffic jams and thus shorten the travel time Inaddition to advanced route planning services this information can be usedto dynamically adapt the timings of local traffic lights to maximize vehicu-lar throughput A realistic simulation environment will be implemented in afirst phase to evaluate the performance of the proposed system under a va-riety of traffic scenarios A practical prototype will be validated under realtraffic conditions in Luxembourg City using the existing rsquoHot Cityrsquo meshas its infrastructure network Additional tests are foreseen at the UCLAcampus which provides a flexible testbed (up to 200 cars) to validate andtest new communication protocols

Results

bull Development of an analysis tool to evalute communications routes inVANET

bull Implementation of a traffic sensing application for mobile devices

bull Publication of new simulation and emulation tools for high fidelityVANET evaluation

bull Specification of a vehicle coordination scheme to increase vehiculartroughput on highways

bull Lightweight methods for confidentiality in data communication

bull Path selection metrics for performance improved onion routing

bull Lightweight hidden services

bull Traffic analysis in encrypted connections

bull Countermeasures against traffic analysis in encrypted connections

54 Projects and Grants in 2012

We proposed and evaluated a novel approach how to provide network serviceswhile protecting privacy and identity of the service provider [344] Thetechnology can be directly applied in the scope of the MOVE project asprivacy protection is an important fact for the acceptance of the results of theproject by the public We also studied the possibilities of traffic analysis inencrypted network streams It was shown that under certain circumstancescryptography alone is not enough to hide the content of communication Wealso studied countermeasures how to mitigate this attack Our findings areof vital importance as communication in MOVE should protect the data intransit and respect privacy of the involved individuals

Practical usage of methods for confidential communication often leads todelays that are not tolerated by the average end-user which in return dis-courages many of them from using the system In [342 343] we propose newmethods of path selection that allow performance-improved onion routingThese are based on actively measured latencies and estimations of availablelink-wise capacities using passive observations of throughput [331] We eval-uate the proposed methods in the public networks and present a practicalapproach to empirically analyze the strength of anonymity certain methodsof path selection provide in comparison to each other

Regarding the distributed and large scale context of vehicular networks theinvestigation of huge volume of captured network traffic data has been pro-posed by leveraging cloud computing and in particular in the context ofsecurity monitoring [345] As a node in a vehicular network may act as au-tonomous entity and so be easily in contact with malicious ones automaticfingerprinting methods have been proposed in [346] to enhance authentica-tion and to monitor bad behaviors

Publications Publications in 2011 6 peer-reviewed conferences [304 272265 268 270 269]

Security GamesAcronym SndashGAMESReference C08IS03PI Prof Dr Leon van der TorreFunding FNR-COREBudget 314000eBudget UL 314000eDuration 2009-04-01 ndash 2012-03-31

Members L van der Torre S Mauw W Jamroga M Melissen

41 Research projects 55

Domain(s) Game theory Security protocols Non-zero sum games Imper-fect information games Attackndashdefense analysis

Partner(s)

bull GAMES Network

Description Information security is not a static black-and-white systemfeature Rather it is a dynamic balance between a service provider tryingto keep his system secure and an adversary trying to penetrate or abusethe service Such interplay can be considered as a game between the adver-sary and the service provider and the field of game theory provides methodsand tools to analyse such interactions Games for verification and designhave been studied in computer science for the last ten years This funda-mental research into extending and complementing traditional verificationapproaches from formal methods with game theoretic reasoning is pavingthe way for more effective verification tools These developments are ofparticular interest to the field of security in which formal verification hasalways played an important role The purpose of the project is to study howthese new developments can be used to strengthen current analysis and ver-ification techniques in information security The project has two main linesof research 1) A study of the use of game-theoretic methods in the field ofsecurity resulting in requirements on game-theoretic methods for security2) The development of novel verification methods based on the combineduse of formal verification techniques and a game theoretic approach and itsapplication to the field of security For the first line two areas in securityare selected for which the application of these techniques seems particularlypromising fair exchange protocols and attackndashdefense analysis The secondline focuses on the interplay of finite and infinite games mathematical logicand automata theory in particular on analysis techniques for infinite-statesystems linear-time model checking and game models for protocols TheSndashGAMES project is a joint project of the SaToSS group and the ICR groupof Prof Dr Leon van der Torre

Results The S-GAMES project ended in 2012 Most project goals havebeen achieved The project produced a number of important results thatcan be used to analyze information security in game-like scenarios Someof the results have already been significantly cited by other researchers InLuxembourg the effectivity functions methodology is being currently usedin the AFR TrustGames project Moreover effectivity models as well aslogic-based techniques for incomplete information games developed withinthe project are also prominently featured in the FNRDGFndashINTER GaLoTproject (accepted to begin 1022013) Last but not least our results havegenerated interest among more practically-oriented research groups in par-ticular the team behind the VERICS model checker at the Polish Academy

56 Projects and Grants in 2012

of Sciences in Warsaw

The main results obtained in 2012 are as follows

bull We showed how the semantics of strategic logic ATL can be defined interms of abstract models so called coalitional effectivity functions [134]

bull Continuing studies on logic-based specification we developed a com-bination of alternating-time temporal logic ATL and description logicALCO and showed how the resulting language can be used to writelong-term security specifications [130] We showed that while thesatisfiability problem appears to be undecidable model checking istractable We also defined a variant of realizability that combinesmodel checking of the temporal frame with satisfiability of the termi-nological interpretation and showed that the new problem is decidable

bull We used strategic logics like ATL to study fairness in non-repudiationprotocols [315] We showed that existing specifications of fairness forma natural taxonomy of weaker and stronger variants We also arguedthat none of the specifications works correctly in the context of imper-fect information and we proposed our own notion as a remedy

bull We continued our studies on the relationship between models of coali-tional power coming from cooperative game theory and standard gamemodels from non-cooperative game theory In a follow-up to our pre-vious work [291] we showed how the concept and characterization canbe extended to games over infinite time horizon typical in modelingof computational systems [134]

Publications The project resulted in the following publications in 2012[134] [130] [315] [291]

The Dynamics of ArgumentationAcronym DYNARGReference F1R-CSC-PFN-09DYNARPI Prof Dr Leon van der TorreFunding FNR-INTERCNRSBudget NABudget UL NADuration 2009-10-01 ndash 2012-09-31

Members Richard Booth Tjitze Rienstra Martin Caminada Emil Wey-dert

41 Research projects 57

Domain(s) Argumentation theory Belief dynamics Multi-agent systems

Partner(s) Universite drsquoArtois Lens France (Dr Souhila Kaci)

Description Artificial Intelligence is a science that aims to implementhuman intelligence For this purpose it studies the behaviour of rationalagents Pertinent information may however be insufficient or there may betoo much relevant but partially incoherent information Different theorieshave been proposed for decision-making in these contexts In particular thegrowing development of multi-agent systems requires the handling of collec-tive decisions and of information coming from different sources Moreoverin multi-agent systems agents need to interact in order to inform convinceand negotiate with other agents Argumentation theory is a suitable theoryto support such interactions In this project we will create an abstract the-ory of dynamic argumentation in which argumentsconflict relations can beaddedremoved We will also investigate the aggregation of argumentationframeworks to model the interaction among arguing agents To this end wewill eg develop new notions of distance between argument graph labelingsin order to define when an agent position can be said to beldquoclose tordquoorldquofarrdquofrom that of another Finally we plan to apply the dynamic argumentationtheory to dialogue between agents We want to study these problems bothfrom within abstract argumentation frameworks in which the focus is onhow arguments interact with each other without specifying the actual formof the arguments as well as using more concrete representations of what anargument consists of (eg a number of explicit possibly defeasible ldquorulesrdquosupporting a ldquoconclusionrdquo)

Results

bull In [156] we proposed a number of intuitive measures of distance be-tween two sets of evaluations over a set of arguments and showed thatthey fail to satisfy basic desirable postulates Then we proposed ameasure that satisfies them all Our results inform the design of pro-cedures for revising onersquos position in order to reach agreement withothers or to conduct minimal revision to incorporate new evidence

bull Dung-style abstract argumentation assumes full awareness of the ar-guments relevant to the evaluation However this is generally not arealistic assumption Moreover argumentation frameworks have ex-planatory power which allows us to reason abductively or counter-factually but this is lost under the usual semantics To recover thisaspect in [159] we generalised conventional acceptance and presentedthe concept of a conditional acceptance function We also provided amodal-logical framework for reasoning about argument awareness in[114]

58 Projects and Grants in 2012

bull In [31] we introduced a new model for belief dynamics where beliefstates are ranking measures and informational inputs are finite setsof parametrized conditionals interpreted by ranking constraints Theapproach generalises ranking construction strategies developed for de-fault reasoning

bull In [115] we generalised the ASPIC argumentation system so that eachinference rule can be associated with a probability that expresses un-certainty about whether the rule is active The uncertainty about rulescarries over to uncertainty about whether or not a particular argumentis active The usual Dung-style abstract argumentation semantics wasgeneralised in order to deal with this uncertainty

Publications [156] [159] [114] [31] Weydert9861

Management Regulatory ComplianceAcronym MaRCoReference I2R-DIR-BPI-11KELSPI Prof Dr Pierre KelsenFunding FNR-COREBudget NABudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Pierre Kelsen Leon van der Torre Qin Ma Marwane ElKhar-bili Silvano Colombo Tosatto

Domain(s) Business process compliance

Partner(s) Guido Governatori NICTA Queensland Research Laboratory

Description The processes that underpin the businesses of our everydaylives are governed by regulations of ever growing complexity In this contextit is important

ndash to be able to describe these complex regulations rigorously precisely andunambiguouslyndash that business practitioners are actually able to specify both regulationsand business processesndash to be able to check in an automated way that business processes complywith their underlying regulations

MaRCo proposes to tackle these three issues On one hand MaRCo improves

41 Research projects 59

existing approaches to formally describe (or model) norms On the otherhand MaRCo makes this practical and usable by practitioners in such away that the mathematical based formalisms involved in norm specificationdo not constitute a barrier to practitioners that know the business domainbut not the underlying mathematical formalism being used and so MaRCoproposes a visual-based approach to norm specification Finally MaRCochecks the compliance of business processes against the norms that governthem in order to be able to detect in an automated way business processesthat violate their underlying regulations

MaRCo aims at creating added value for service-related industries (eg inthe banking sector) by making the specification of business processes andnorms rigorous and precise yet accessible to domain experts and enablingan automated approach to compliance checking This should provide meansto ensure that services are aligned with their underlying local and interna-tional regulations With the growing need for regulatory compliance thiswill strengthen the expertise in service science in Luxembourg

See also httpmarcogforgeunilu

Results CoReL Policy-Based and Model-Driven Regulatory ComplianceManagement Marwane El Kharbili Qin Ma Pierre Kelsen and Elke Pul-vermueller In Proc of the 15th IEEE International Enterprise DistributedObject Computing Conference (EDOC 2011) IEEE Computer Society 2011

Publications 1 conference publication [314]

Multi-Objective Metaheuristics for Energy-Aware Scheduling inCloud Computing SystemsAcronym GreenCloudReference NAPI Prof Dr Pascal BouvryFunding FNR University of LuxembourgBudget 1088440Budget UL NADuration 2012-07-01 ndash 2015-06-30

Members Alexandru-Adrian Tantar Sebastien Varrette Gregoire Danoy

Domain(s) NA

Partner(s) University of Lille

Description The project GreenCloud aims at developing an energy-aware scheduling framework able to reduce the energy needed for high-

60 Projects and Grants in 2012

performance computing and networking operations in large-scale distributedsystems (data centers clouds grids) With the advent of new petaflopsdata centers and the next-generation Internet (rdquoInternet of Thingsrdquo rdquoHigh-Performance Internetrdquo) energy consumption is becoming a major challengefor the IT world To build up this new energy-aware scheduling frameworkthe project GreenCloud will first develop multi-criteria mathematical op-timization models (eg makespan energy robustness) and then designmulti-objective optimization methods to solve the problem These tech-niques along with statistical and machine learning components will be usedto provide autonomous fault-tolerant and robust scheduling paradigms forvirtual machines running inside a dynamic environment A series of time-varying deterministic and stochastic factors will be considered as part of theenvironment eg renewable energy supply computational demand or activ-ity of users Experimentation and validation will be carried on a real test bedusing large-scale equipments (eg Gridrsquo5000) while relying on distributedscenarios

Results Accepted project with a start date in November 2012 A firstmeeting of the involved members was held in December

Publications NA

EnerGy-efficient REsourcE AllocatioN in AutonomIc CloudCompuTingAcronym GreenITReference F1R-CSC-PFN-08IS21PI Prof Dr Pascal BouvryFunding FNR-COREBudget 432000eBudget UL NADuration 2010-01-01 ndash 2012-12-31

Members Pascal Bouvry Samee U Khan Thomas Engel Zdislaw Zucha-necki Johnatan Pecero Beranbe Dorronsoro Marcin Seredynski GregoireDanoy Sebastien Varrette Alexandru-Adrian Tantar Dzmitry KliazovichRadha Thanga Raj Frederic Pinel Cesar Diaz

Domain(s) Energy-efficiency resource management heterogeneous com-puting multi-objective optimization multi-agent systems parallel and dis-tributed computing telecommunication networks cloud computing

Partner(s)

41 Research projects 61

bull North Dakota University USA

bull LuxConnect

Description The project GreenIT aims to provide a holistic autonomicenergy-efficient solution to manage provision and administer the variousresources of Cloud-Computing (CC) dataHPC centers

The main research challenges that will be tackled to achieve the holisticapproach are

bull Development of a multi-objective mathematical meta-model CC is acomplex system of numerous pervasive devices that request servicesover heterogeneous network infrastructures from a data center that isenergy gobbler Because each computing entityrsquos performance is de-fined uniquely we must develop a multi-objective meta-model that canadequately define a unified and performance metric of the whole sys-tem The multiple constraints and objectives dealing with the qualityof service (QoS) cost and environment impact must be formulated andtheir relationship analyzed

bull Develop resource management and optimization methodologies Withseveral possible objectives and constraints the meta-models must re-sult in multi-objective multi-constraint optimization problems (MOP)Green-ICT will develop refine and evolve solutions for MOP that willprimarily be based on metaheuristics (eg multi-objective evolution-ary algorithms multi-objective local search hybrid metaheuristics)

bull Develop autonomic resource management The anytime anywhere slo-gan only will be effective when an autonomic management of resourcescan be achieved The resource allocation methodologies developedmust go further refinement such that the system at hand is self- heal-ing repairing and optimizing In particular it is our intention toutilize multi-agent systems (MAS) that can learn to adapt (machinelearning methodologies) and gracefully evolve to adapt (evolutionarygame theoretical methodologies)

Results For the computational aspects (WP1) contributions in the fol-lowing domains have been proposed in 2011

bull Energy-aware scheduling algorithms Different problems related to theschedule of tasks on Grids targeting energy efficient solutions in differ-ent aspects are defined In [285] we solve the problem of energy-awarescheduling for dependent tasks on Grids Then we consider a simi-lar problem but minimizing the energy required for communicationsin [305]

62 Projects and Grants in 2012

bull Robust-aware scheduling algorithms The problem analyzed here is tofind highly efficient schedules for allocating tasks on Grids but withthe additional characteristic that they are as robust as possible againstchanges in the predicted time to accomplish the scheduled tasks Themore robust the schedule is the less important will be the influenceof these changes on the final makespan (ie time when the latest jobis finished) Different highly efficient and accurate parallel coevolu-tionary multi-objective algorithms (with highly super-linear speed-up)have been proposed for this project [287 300]

bull Development of new efficient general-purpose optimization algorithmsIn addition to the previously described problems some work target-ing the design of new efficient algorithms was done In particular weare interested on enhancing well-known algorithms and reducing theirparameters [283] proposes the use of new adaptive neighborhoodsfor cellular genetic algorithms (cGAs) improving their performanceand reducing the neighborhood to use a very important parameter ofcGAs In [286] the use of a new class of algorithms with small worldtopologies for the population is proposed showing highly accurate re-sults and high efficiency compared to a canonical cGA with the sameparameters Later we compare many different topologies for differ-ential evolution algorithms in [299] and we propose a new efficientoperator for this kind of algorithms too In [311] we propose the useof cellular populations for differential evolution algorithms showingthat it enhances the behavior of the several state of the art algorithmstested

bull Validation of the algorithms on other complex real-world problems asthe optimization of energy-aware broadcasting algorithms for mobilead-hoc networks [307 284] or the configuration of the Cassini space-craft trajectory [298] outperforming in this latter case the state of theart

Volunteer-based systems have also been studied in the second semester of2011 We have been developing an optimization tool based on such sys-tems and evolutionary algorithms metaheuristics The following enumera-tion points out the main results obtained until now

bull Validation of a Peer-to-Peer Evolutionary Algorithm [336] Acceptedfor publication in Evostar 2012

bull Characterizing Fault-tolerance in Evolutionary Algorithms [337] Ac-cepted for publication during 2012

41 Research projects 63

For the communication aspects (WP3) the GreenCloud network simulatordevelopment has been continued

Several works of editorship and organization of new events have been also un-dertaken that will ensure additional impact in the following years includingeditorship of the book entitled rdquoIntelligent Decision Systems in Large-ScaleDistributed Environments [282] published by Springer)

Two websites contain the project informationhttpgreenitgforgeunilu and httpsgforgeuniluprojectsgreencloudto provide access to the energy efficiency simulator for distributed data cen-ters developed in the framework of the GreenIT project

Publications NA

Socio-Technical Analysis of Security and TrustAcronym STASTReference C11IS1183245PI Prof Dr Peter YA RyanFunding FNR COREBudget 765864eBudget UL 765864eDuration 2012-05-01 ndash 2015-04-30

Members Peter YA Ryan Sjouke Mauw Gabriele Lenzini VincentKoenig Ana Ferreira Jean-Louis Huynen

Domain(s) security analysis human factor security protocols

Partner(s) University of Catania Royal Holloway University LondonNewcastle University University College London Norwegian University ofScience and Technology

Description Over the last 20-30 years the security community has mademajor strides in the design and (semi-automated) analysis of security pro-tocols Nevertheless security critical systems continue to be successfullyattacked There appear to be two main explanations of this situation (1)the implementation of the protocol designs introduce flaws that are notpresent at the design level and (2) attackers target and exploit the usuallymore vulnerable non- technical aspects of the system

Information security systems are typically complex socio-technical systemsand the role of humans in either maintaining or undermining security is cru-

64 Projects and Grants in 2012

cial Often system designers fail to take proper account of human charac-teristics resulting in vulnerabilities at the interface between the humans andthe purely technical components Attackers often target such vulnerabilitiesrather than attempt to break the technical security mechanisms Despitethis the socio-technical aspects of security have been largely neglected bythe information security community

Addressing these socio-technical aspects is very challenging and highly inter-disciplinary This project focuses on this most urgent and critical aspect ofsecurity It will build on the existing knowledge expertise and tools for theanalysis of security protocols but extend and enrich it to capture the humanand social dimension

Key elements of our approach are

bull To enrich existing models to encompass the role of the users and en-hanced attacker models

bull To develop tools and methodologies to analyze system designs againstthese enriched models

STAST is executed jointly by members of SnT and CSC

Results Selection of the PhD candidate who will be working on theSTAST project within the SaToSS group has started in 2012 We haveinterviewed a number of candidates and we hope to fill the position in early2013

Publications NA

Attack TreesAcronym ATREESReference C08IS26PI Prof Dr Sjouke MauwFunding FNR-COREBudget 299000eBudget UL 299000eDuration 2009-04-01 ndash 2012-03-31

Members Sjouke Mauw Barbara Kordy Patrick Schweitzer Sasa Radomirovic

Domain(s) security attackndashdefense trees security assessment formal meth-ods

Partner(s)

41 Research projects 65

bull Telindus Luxembourg

bull Sintef Norway

bull TXT e-solutions Italy

bull Cybernetica Estonia

bull EDF France

bull Lucerne University of Applied Sciences and Arts Switzerland

bull THALES Research amp Technology France

Description Security assessment of systems is a standard but subopti-mal procedure due to its informal nature While a formal approach wouldbe desirable but out of reach a systematic approach would be beneficialand feasible Attack trees are a wellndashknown methodology to describe thepossible security weaknesses of a system An attack tree basically consistsof a description of an attackerrsquos goals and their refinement into sub-goalsWe believe that attack trees provide an ideal systematic approach for se-curity assessment The objective of this project is to extend attack treeswith defensive measures Consequently the attackndashdefense tree method-ology will be developed and formalized in order to provide a systematicfullyndashfledged and practical security assessment tool The project benefitsfrom our contacts with several industrial and academic partners with whomwe conduct case studies More information can be found on the project webpage httpsatossuniluprojectsatrees

Results In 2012 the ATREES project resulted in following output

bull An article published in the Journal of Logic and Computation de-scribing the attackndashdefense tree methodology developed within theATREES project [258]

bull A presentation and publication of an article describing how to quan-titatively analyze attackndashdefense trees in practice

bull A publication of a journal article describing the case study performedin 2011 [254]

bull A publication of the conference article [355] about computational as-pects of attackndashdefense trees

bull Development of the ADTool a software tool supporting creation andquantitative analysis of attackndashdefense trees The ADTool is availableat httpsatossuniluprojectsatreesadtool

66 Projects and Grants in 2012

The results of the project were presented in six research talks and invitedlectures given at NTNU in Norway Sintef in Norway RHUL in UK LORIAin France THALES in France and ICISCrsquo12 conference in Korea as well asin one internal SRM presentation

The collaboration with related projects have also been initiated Currentlywe perform two case studies using the attackndashdefense tree methodology oneabout an analysis of an e-voting system (in collaboration with the CORESeRTVS project lead by Prof Ryan) and one on BYOD issues (in collabo-ration with the CORE CoPAINS project led by Prof Le Traon) We haveinitiated a collaboration on attack trees between the University of Luxem-bourg and THALES Research amp Technology in France

The methodologies developed and results obtained within the ATREESproject will serve as input for the FP7 EU project TREsPASS and theCORE project STAST

Publications The project resulted in following publications in 2012 [258][254] [355]

Cryptography and Information Security in the Real WorldAcronym CRYPTOSECReference F1R-CSC-PFN-09IS04PI Dr Jean-Sebastien CoronFunding FNR-COREBudget 272000eBudget UL NADuration 2010-10-01 ndash 2013-09-30

Members NA

Domain(s) Cryptography Information Security Side-Channel Attacks

Partner(s) NA

Description Cryptography is only one component of information securitybut it is a crucial component Without cryptography it would be impossi-ble to establish secure communications between users over insecure networkslike the internet In particular public-key cryptography (invented by Diffieand Hellmann in 1974) enables to establish secure communications betweenusers who have never met physically before One can argue that compa-nies like E-Bay or Amazon could not exist without public-key cryptographySince 30 years the theory of cryptography has developed considerably How-ever cryptography is not only a theoretical science namely at some point

41 Research projects 67

the cryptographic algorithms must be implemented on physical devices likePCs smart-cards or RFIDs Then problems arise in general smart-cardsand RFIDs have limited computing power and leak information throughpower consumption and electro-magnetic radiations A cryptographic al-gorithm which is perfectly secure in theory can be completely insecure inpractice if improperly implemented Therefore the aim of this proposal isto take into account every aspect of the implementation of secure systemsin the real world from the mathematical algorithms to the cryptographicprotocols and from the cryptographic protocols to their implementation inthe real world This allows creating a bridge between theoretical research incryptography on the one side and its applications and the end users of thenew technology on the other side When dealing with cryptographic pro-tocols we will work in the framework of provable security every securitygoal will be clearly defined and every new cryptographic scheme or protocolshould have a proof that the corresponding security goal is achieved basedon some well defined computational hardness assumption When dealingwith cryptographic implementations we will try to cover all known side-channel attacks timing attacks power attacks cache attack etc

Results Due to administrative reasons the actual start of the project ispostponed to the first half of 2011

Publications NA

Secure Reliable and Trustworthy Voting SystemsAcronym SeRTVSReference I2R-DIR-PFN-09IS06PI Prof Dr Peter RyanFunding FNR-Core 333000e FNR-AFR 216216e IMT

Luca 130000e University of Melbourne 60000eUL 268596e

Budget NABudget UL NADuration 2010-02-01 ndash 2013-02-01

Members NA

Domain(s) Electronic voting

Partner(s) University of Surrey (UK) University of Birmingham (UK)IMT - Institute for Advanced Studies Lucca (Italy) University of Melbourne(Australia)

Description Ensuring that the outcome of an election is demonstrably

68 Projects and Grants in 2012

correct while maintaining ballot privacy and minimising the dependence onelection officials has been a challenge since the dawn of democracy For overa century the US has experimented with various technologies to try to makevoting easier and more secure All of these have proved problematic mostnotably the more recent use of touch screen machines The danger here isthat the outcome is critically dependent on the correct execution of the coderunning on the voting devices

Recent research has explored the use of modern cryptography to address thischallenge Significant advances have been made in particular advancing thenotion of ldquovoter-verifiabilityrdquo allowing voters to confirm that their voteis accurately counted while avoiding threats of vote buying or coercionNotable amongst such schemes is the Pret a Voter system proposed bythe PI in 2004 and subsequently developed to make it more usable secureand flexible The Pret a Voter approach is widely regarded as one of themost secure and useable of such schemes and is arguably the most promisingin terms of providing a practical scheme for real-world use

Despite the successes achieved in this field the issues of robustness andtrustworthiness remain open Verification procedures are a part of mostproposed systems intended to offer trust However systems universallylack procedures in case the verification finds errors and the complexity ofthe verification procedures often undermines trust instead of bolstering it

The aim of the SeRTVS project is to develop and evaluate designs for prac-tical secure and trustworthy voting systems Such schemes should yielda demonstrably correct outcome of the election while guaranteeing ballotprivacy Furthermore such systems must be sufficiently simple to use andunderstandable as to gain widespread acceptance by voters and other stake-holders The starting point will be the existing Pret a Voter and PrettyGood Democracy schemes Vulnerability or deficiencies identified duringthe evaluation will be addressed by enhancements to the scheme

To date very little has been done to investigate robust recovery mechanismsfor voting systems The project will develop effective recovery mechanismsand strategies The project will also investigate the issues of public percep-tion and trust of verifiable systems It is not enough for the system to betrustworthy it must also be universally perceived as trustworthy A goaltherefore is to measure and advance public understanding and trust in suchschemes

Results In the course of the project Dr Gabriele Lenzini was recruited asa post-doctoral researcher to start in February 2011 The project staged theInternational Summer School on Secure Voting (SECVOTE 2010) in Berti-noro (Italy) jointly with the TVS project Research results were publishedin the proceedings of ESORICS 2010 [353] and INDOCRYPT 2010 [354]

41 Research projects 69

Publications NA

Conviviality and Privacy in Ambient Intelligence SystemsAcronym CoPainsReference NAPI Prof Dr Yves Le TraonFunding FNRBudget 4Budget UL 486000Duration 2012-01-01 ndash 2013-12-31

Members Patrice Caire Yehia El Rakaiby Assaad Moawad

Domain(s) Security and Privacy defeasible logic AAL conviviality soft-ware engineering

Partner(s) Hot City

Description Ambient Intelligence constitutes a new paradigm for the in-teractions among intelligent devices and smart objects acting on behalf ofhumans The ultimate goal of Ambient Intelligence systems is to transformour living and working environments into intelligent spaces able to adapt tochanges in context and to users social needs Such systems must have thecapability of interpreting their contexts Moreover the open nature of Ambi-ent Intelligence systems and the unnoticeable ways in which various sensorsmay access users personal data make two seemingly antagonistic require-ments preserve users privacy and facilitate convivial interactions amonghumans and devices The concept of conviviality has recently been intro-duced as a social science concept for Ambient Intelligence to highlight softqualitative requirements like user friendliness of systems To make AmbientIntelligent systems desirable for humans they must be convivial and privateie fulfil both their need for social interactions making communication andcooperation among participants easier while also preserving the privacy ofeach individual Hence the need for trade-offs between being private andconvivial intuitively the former keeping information to a small circle of in-siders while the later shares it with all The aims are to enable knowledgesharing for the collective achievement of common objectives among enti-ties through coalition formation while at the same time respecting eachentityrsquos privacy needs Hence the CoPAInS project is about designing anddeveloping models of interaction among intelligent devices it is also abouttheir corresponding methods The main goal of CoPAInS is to facilitateprivacy and conviviality in Ambient Intelligence and to provide tools forit To achieve our objective first we develop a formal framework for con-

70 Projects and Grants in 2012

text representation privacy and conviviality using methods of KnowledgeRepresentation and Reasoning Second we validate and verif y privacy andconviviality properties of Ambient Intelligence systems using model-checkingtechniques We then simulate and test use cases from the field of AmbientAssisted Living Third to demonstrate the feasibility of our approach andits usefulness to support Luxembourg citizens everyday activities we applythe gained expertise to use cases provided by Hotcity Finally we produceguidelines to assist system designers in the development of privacyaware andconvivial assistive systems

Results Development of the IoT lab in SnT

Publications [210 209 140 245 152 139]

e-Training Education Assessment and Communication Centerfor Headache DisordersAcronym E-TEACCHReference F1R-CSC-PFN-10ETEAPI Prof Dr Denis ZampunierisFunding FNR-COREBudget NABudget UL NADuration 2011-05-01 ndash 2014-04-30

Members Sergio Dias Andrea Teuchert Denis Zampunieris

Domain(s) public health disease-management headache e-learning mu-timedia

Partner(s) CRP Sante

Description Headache including migraine is a common and disablingneurobiological disorder which is under-recognized under-treated commonlymismanaged and it imposes a substantial health burden with a major im-pact on both quality of life and the economy Migraine alone the mostprevalent neurological brain disorder is more prevalent than asthma di-abetes and epilepsy combined According to WHO the burden weight ofmigraine is higher than that of epilepsy multiple sclerosis and ParkinsonasdiseaseEffective treatments exist but general practitionersrsquo misdiagnosisand mismanagement of headache disorders easy access to various over thecounter drugs have led to a high rate of self-medication Long-term sideeffects increase of secondary headaches and dependency are the major prob-lems Health care failure has its roots in education failure at every level inEurope and in the resulting and widespread lack of understanding With

41 Research projects 71

E-TEACCH the CRP-Sante and the University of Luxembourg will buildan innovative demonstrational electronic multilingual Training EducationAssessment and Communication Center on Headache with easy-to-use in-teractive modular and extensible content for different target groups (pa-tients doctors pharmacists) The two Luxembourg centers represent anideal combination technical professionals experienced pedagogic e-learningand Headache teams with established support of international and Euro-pean scientific and lay organizations international interdisciplinary expertsas well as the WHO campaign aLifting the burdena E-TEACCH will im-prove headache disorder screening diagnosis disease-management preven-tion treatment adherence and in doing so allow headache sufferers a betterquality of life reduce socio-economic costs chronification and comorbidityE-TEACCH will offer latest headache disorder scientific news webinarsscreening tools diagnostic aids treatment control and communication sup-port disability measurements disease-management guidelines video basedcase studies and accredited knowledge assessment tests

Results NA

Publications NA

Managing Regulatory Compliance a Business-Centred Ap-proachAcronym MaRCoReference I2R-DIR-PFN-09IS01PI Prof Dr Pierre KelsenFunding FNR-COREBudget 749K eBudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Pierre Kelsen Qin Ma Marwane El Kharbili Christian GlodtLeon van der Torre Silvano Colombo Tosatto

Domain(s) Compliance Management Business Process Management Pol-icy Management Normative Systems Enterprise Models Model-Driven En-gineering (MDE) Visual Languages Formal Methods

Partner(s)

bull NICTA Queensland Research Laboratory Australia

bull University of Osnabrueck Germany

72 Projects and Grants in 2012

Description The processes that underpin the businesses of our everydaylives are governed by regulations of ever growing complexity In this con-text it is important (a) to be able to describe these complex regulationsrigorously precisely and unambiguously (b) that business practitioners areactually able to specify both regulations and business processes and (c) tobe able to check in an automated way that business processes comply withtheir underlying regulations This project proposes to tackle these threeissues On one hand we want to improve existing approaches to formallydescribe (or model) norms On the other hand we would like to make thispractical and usable by practitioners in such a way that the mathematicalbased formalisms involved in norm specification do not constitute a bar-rier to practitioners that know the business domain but not the underlyingmathematical formalism being used and so we propose a visual-based ap-proach to norm specification Finally we intend to check the compliance ofbusiness processes against the norms that govern them in order to be able todetect in an automated way business processes that violate their underlyingregulations The proposed research project aims at creating added value forservice-related industries (eg in the banking sector) by making the specifi-cation of business processes and norms rigorous and precise yet accessible todomain experts and enabling an automated approach to compliance check-ing This should provide means to ensure that services are aligned with theirunderlying local and international regulations With the growing need forregulatory compliance this will strengthen the expertise in service science inLuxembourg

Results - We have carried out a systematic literature survey of regulatorycompliance management in business process management elicited a set ofsuccess requirements and performed a comparative analysis of literature so-lutions against the requirements The result has been reported in a LASSYtechnical report (TR-LASSY-11-07) and an excerpt of the technical reportis accepted by the 8th Asia-Pacific Conferences on Conceptual Modelling(APCCM) for publication in 2012 - We have designed E3PC (EnterpriseExtended Event-driven Process Chains) E3PC is a formal model-driven en-terprise modeling language that extend EPC (Event-driven Process Chains)The formal semantics of E3PC is defined in terms of a translation fromE3PC models to Algebraic Petri-Nets (APN) We have reported the resultin a LASSY technical report (TR-LASSY-11-12) - We have designed CoReL(Compliance Requirement Language) CoReL is domain-specific modelinglanguage for representing compliance requirements that has a user-friendlygraphical concrete syntax Two papers have been published reporting re-sults on CoReL one[314]describes the language itself and the other[313]reports an illustrative example of using this language - We have developedan editor for E3PC and an editor for CoReL both implemented as Eclipseplug-ins We have also implemented the formal semantics of E3PC by de-

41 Research projects 73

veloping model transformations from E3PC to APN in both DSLTrans andATL - We have identified a sub-set of business processes called structuredbusiness processes in which only XOR and AND connectors are allowed andsplits and joins are always paired up properly Based on these structuredbusiness processes we have already derived efficient algorithms for certainsimple compliance requirements providing thus some evidence that theserestrictions on business process help to reduce complexity of compliancecheckingWe report the results in [90] and and a paper to be published atESSS 2013 - We have started the work on norm dynamics by investigatingthe use of an argumentation framework to determine the priorities betweenthe norms This approach can also be used within business processes todynamically determine to which policies the business process should complydepending from the context of the execution -We have started to work onan abstract framework to define compliance We propose an abstract frame-work to define business process compliance and its elements First we definethe elements that constitute a business process and its functioning Secondwe define the policies governing the processes and their obligations takingalso into account the temporal constraints that can exist between differentobligations

Publications [314 313 90 2 88 89 242 366]

Modeling Composing and Testing of Security ConcernsAcronym MITERReference NAPI Dr Jacques KleinFunding FNRBudget NABudget UL NADuration NA

Members Jacques Klein Yves Le Traon Phu Nguyen Qin Zhang MaxKramer

Domain(s) software engineering Model Composition Model-Driven Se-curity Model-Based Testing

Partner(s) KIT Karlruhe Germany

Description Security is not only a keyword it is currently a critical issuethat has to be embraced by modern software engineering (SE) techniquesFrom this SE point of view ensuring confidence in the implemented securitymechanisms is the key objective when deploying a security concern This

74 Projects and Grants in 2012

objective can be reached by improving the design and implementation pro-cess via modeling and automation such as security code generation frommodels and by systematic testing and verification

As stated in the FNR programme description ldquoInformation Security andTrust Managementrdquo is one of the cornerstones of the Information Societya ldquotransversalrdquo research domain of central and ever-growing importance notonly for the banking industry but for nearly all other ICT applicationsand e-services Thus security concerns impact many ICT domains in manydifferent ways

Secure programming techniques are now better understood and guidelinesteach programmers how to avoid buffer overflows when to validate inputsand how to apply cryptography The key problem is that security should notbe under the sole responsibility of the programmer (hopefully competent)Dealing with security at a programming level is risky often not sufficient andis not the most productive Indeed to face large classes of attacks securityexperts must express the security policy which is the result of a risks andthreats analysis This security policy cannot be deployed without taking intoaccount the software development lifecycle in a whole In other words itis necessary to consider the requirements analysis and design developmentsphases and the links between these phases to be able to represent (with mod-els) and analyze (with model analysis security methods) security concernsin order to detect or prevent from attacks Second the fact that securityconcerns impact ma ny ICT domains in many different ways amplified bythe fact that economic pressure reduces development time and increases thefrequency modifications are made constantly imposes more productive andflexible development methods To sum up for agile modeling there is anurgent need for modeling tools which allows composing functional architec-tural and - in MITER project - security expert viewpoints into an integratedproductive model

In this context the MITER project aims at developing new modeling tech-niques to 1) represent security concerns (eg access control and usage con-trol policies) 2) compose them with the business logic model (called tar-get model) and 3) test the security model composition against security re-quirements These three objectives converge to an integrated model-drivensecurity process which allows a business model to embed various securityconcerns and makes these security properties testable by construction

Results We have worked on an extension of one of our papers on dynamicaccess control Our goal being to perform performance analysis on the meth-ods that we propose We have also worked on Delegation management Morespecifically among the variety of models that have been studied in a MDEperspective one can mention Access Control policy that specifies the accessrights These work mainly focus on a static definition of a policy without

41 Research projects 75

taking into account the more complex but essential delegation of rightsmechanism User delegation is a meta-level mechanism for administratingaccess rights by specifying who can delegate access rights from one user toanother including his own rights We analyse the main hardpoints for intro-ducing various delegation semantics in model-driven security and proposesa model-driven framework for enforcing access control policies taking intoaccount all delegation requirements

We worked on the second main goal of the MITER project the compositionof security concerns As a result first we have proposed a new version of theGeKo weaver (available at httpcodegooglecomaeclipselabsorgpgeko-model-weaver) a generic and practical aspect-oriented modelling weaverA paper describing GeKo is currently under submission at the Model con-ference Second we applied GeKo to weave building specifications in thecontext of construction industry A workshop paper has been accepted in2012 This paper and this work have been done in collaboration with theUniversity of Queensland

Publications none in 2011

Model-Driven Validation and Verification of Resilient SoftwareSystemsAcronym MOVEREReference F1R-CSC-PFN-09IS02PI Prof Dr Nicolas GuelfiFunding FNR-COREBudget 265 000eBudget UL NADuration 2010-05-01 ndash 2013-04-30

Members Levi Lucio Yasir Khan Qin Zhang

Domain(s) Software Engineering Security Dependability Resilience ModelChecking Model Driven Engineering

Partner(s) University of Geneva Switzerland

Description Verification and Validation of software have nowadays clearmeanings in the context of Model- Driven Development With test basedverification we worry about producing a set of test cases that will on theone hand find faults in an implementation - also called in the test literatureSystem Under Test (SUT) - and on the other hand increase trust in thefinal product With validation we worry about understanding if the modelwe are using as reference for implementation and for extracting test cases

76 Projects and Grants in 2012

from is sound Formal validation is often achieved by mechanically provingproperties the model should satisfy For example dynamic properties couldbe expressed in a temporal logic and static properties on the system statecould be expressed using logical invariants and then verified on the systemrsquosmodel In this project we will focus our attention on the application of val-idation and verification techniques to the Model Driven Engineering of sys-tems where resilience mechanisms are explicitly modelled and implementedaccording to that model Resilience corresponds to the fact that a systemhas the capability to adapt to harmful events and recover to a stable state orat least continue operation in a degraded mode without failing completelyThese harmful events might cause the fundamental security properties (con-fidentiality integrity and availability) to be violated With this project weaim at improving the state of the art of the construction of reliable resilientsystems by using verification and validation techniques within the context ofModel Driven Development (MDD) The current trend of Software Engineer-ing is to increasingly reason about the system being built at the model levelby using appropriate Domain Specific Languages (DSL) for each conceptualdomain In this project we will concentrate on resilience and materializeit as a DSL Model composition techniques can then be used in order tocompose resilience features expressed in the resilience DSL with other do-mains equally defined as DSLs When the composed model is validatedverification techniques can then be used to insure the resilience propertiesare well implemented We will tackle this problem both at a theoretical anda practical level

Results Since the beginning of the project in May 2010 we have hadtwo main results The first one is an abstract definition of resilience froma software engineering perspective This work is accessible as a technicalreport in [327] It has also been submitted to the journal rdquoTransactions onSoftware Engineering and Methodologyrdquo and for which approval is pendingThe second result is an operational definition of resilience using a modeldriven approach and model checking tools The work is based on [327]and is accessible also as a technical report in [326] A paper based on thistechnical report has been submitted to TOOLS 2011 Both these papersconcern work packages 1 and 2 of project MOVERE

Two PhD students Yasir Khan and Qin Zhang have been hired for workingfor MOVERE funded by the FNR AFR program Qin Zhang has startedat the University of Geneva in November 2010 and is currently familiarizinghimself with the project and the tools he will be using Yasir Khan has fileda visa demand at the Belgium embassy in his home country and is expectedat the Luxembourg in a few months

Publications NA

41 Research projects 77

Security TEsting for Resilient systemsAcronym SETERReference F1R-CSC-PFN-08IS01PI Prof Dr Nicolas GuelfiFunding FNR-COREBudget 43830000 eBudget UL NADuration 2009-05-01 ndash 2012-04-30

Members Nicolas Guelfi Yves Le Traon Ayda Saidane Iram Rubab

Domain(s) Security Resilience Model based Testing Requirement engi-neering Software architecture AADL

Partner(s) Telecom Bretagne France

Description Resilient systems can be viewed as open distributed systemsthat have capabilities to dynamically adapt in a predictable way to unex-pected and harmful events including faults and errors Engineering suchsystems is a challenging issue which implies reasoning explicitly and in aconsistent way about functional and non-functional characteristics of sys-tems The difficulty to build resilient systems and the economic pressureto produce high quality software with constraints on costs quality securityreliability etc enforce the use of practical solutions founded on scientificknowledge One of these solutions is to propose an innovative testing pro-cess Testing is an activity that aims at both demonstrating discrepanciesbetween a systems actual and intended behaviours and increasing the con-fidence that there is no such discrepancy One of the main features of asystem to test is the security of the system especially for those which aresafety or business critical The security of a system classically relates tothe confidentiality and integrity of data as well as the availability of sys-tems and the non-repudiation of transactions Testing security propertiesis a real challenge especially for resilient systems which have the capabilityto dynamically evolve to improve the security attributes The aim of theSETER project is to define a new testing approach that will ease the ver-ification of resilient programs that implement this security property Thisapproach must be aware that confidentiality and integrity can be compro-mised in many different ways (and consequently the resilient system canevolve in many different ways too) that availability and non-repudiationguarantees are difficult to ensure and that it must be compliant with theother tests addressing the core functionalities of the system Current trendsadvocate the idea that resilience should become an integral part of all stepsof software development Moreover testing is important for detecting errors

78 Projects and Grants in 2012

early in the development life cycle The earlier an error is detected theeasier and cheaper it is to resolve Therefore the objective of the SETERproject fits with these ideas by proposing new security testing approachesfor resilient systems the earlier possible during the software developmentlifecycle to propose more secure and more reliable system

Results

bull result 1 A Formal Framework for Dependability and Resilience (WP3 - Resilient System Specification and Security Requirements)

bull result 2 model based security testing approach (WP 4 - Test CaseSpecification and Selection)

bull result 3 AADL adaptation for expressing resilience requirements (WP3 - Resilient System Specification and Security Requirements)

Publications NA

413 UL Projects

Techniques and Technologies for multi-spot beam Ku-bandSatellite NetworksAcronym Multibeam KuReference 12R-DIR-PAU-11MSBKPI NAFunding ESA ITTBudget NABudget UL NADuration 2010-12-01 ndash 2012-02-28

Members B Ottersten B Shankar

Domain(s) NA

Partner(s)

bull SES-ASTRA (Luxembourg)

bull EADS Astrium (Fr)

41 Research projects 79

Description The objective of the study is to assess the advantages broughtby the introduction of multi-bearms and associated flexibility on Ku bandpayloads in particular for the present consortium the objective of the studyis to define assess and consolidate the benefits that a multi-beam architec-ture and flexibility could bring to follow-on satellites to NSS-6 satellite

Results NA

Publications NA

Guest professor Dov GabbayAcronym NAReference F1R-CSC-LAB-05ILIAPI Prof Dr Dov GabbayFunding ULBudget NABudget UL NADuration 2011-09-01 ndash 2014-08-31

Members NA

Domain(s) Logic Networks Argumentation

Partner(s) NA

Description

bull Further development of a unifying equational approach to logic andnetworks in particular argumentation

bull Interdisiplinary perspective on Security and trust bridging the gapbetween the areas of logic philosophy and security

bull Development of the foundation and applicability of input output logicespecially concerning its geometrical point of view which seems promis-ingly applicable to many non-classical logics

Results Progress was made in 3 related areas

bull Reactive Kripke modelsThese are Kripke models with additional accessibility relations whichcan change the model in the course of evaluations Several importantresults about the logical properties of such models were provided andpublished

80 Projects and Grants in 2012

bull Deontic logic and contrary to duty obligationsThe reactive semantics was used to build coherent models for intriguingpuzzles of permission and obligation

bull Meta-logical investigations in argumentation theoryA new point of view on argumentation was developed and connectedto other areas

Publications 21 publications in 2012 among them 14 journal publications

The Springer journal ANNALS OF MATHEMATICS IN ARTIFICIAL IN-TELLIGENCE (AMAI) devoted a special volume (4 issues) in 2012 to pub-lish these results

AMAI Volume 66 Numbers 1-4 December 2012

The journal ARGUMENT AND COMPUTATION also published a specialdouble issue

Argument and Computation Volume 3 issues 2-3 2012

Logics Integrated for Normative Multi-Agent SystemsAcronym LINMASReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding ULBudget NABudget UL NADuration 2011-03-01 ndash 2013-02-28

Members Xavier Parent Dov Gabbay Xin Sun Paolo Turrini

Domain(s) Normative multi-agent systems Deontic logic Knowledge rep-resentation Intelligent Systems

Partner(s) NA

Description The project aims at providing an advanced model for reason-ing about norms with both a formal semantics and a proof theory Two keycomponents that will be brought together are conflict resolution and normenforcement which are for instance relevant for the design of e-institutions

41 Research projects 81

The goal is to establish rigorous theoretical foundations for the design ofNormative Multi-Agent systems that is both amenable to computer scien-tists and understandable by stakeholders

A PhD student Xin Sun has been hired in July 2012 The topic is deonticlogic from a game-theoretic perspective The idea is to look in a new way atfamiliar problems in normative reasoning which promises a novel approachfor handling norms in intelligent systems The fields of deontic logic andgame theory have developed independently from each other with few in-teractions between the two The PhD thesis will aim at lling this gap byinvestigating how techniques developed in game theory may shed light onlong-standing issues in the study of normative reasoning like norm emer-gence and (vice-versa) how the use of norms may shed light on problemsthat have beset game theory

Results ur results are related to the notion of rsquonorm enforcementrsquo

[4] we look at the theoretical foundations of one of the existing standards fornormative reasoning so-called dyadic deontic logic We discuss the prob-lem of the import or non-import of the identity principle for conditionalobligation

Based on this insight in [292] we develop a new model for reasoning aboutnorm violation In a multi-agent setting norm enforcement is facilitatedthrough the use of sanctions Thus so-called contrary-to-duty (CTD) obliga-tions (they say what should be done if some other obligation is violated) area key component of the system The problem of how to model such a com-ponent is one of the main problems of deontic logic There is a widespreadagreement in the literature that such a problem calls for the need to distin-guish between different senses of rsquooughtrsquo ideal vs actual rsquooughtrsquo Our keyidea is to capture the distinction using tools from two-dimentional modallogic

[2] goes one step further and brings the notion of contrary-to-duty to therealm of game theory so far not investigated in relation to optimality ofstrategic decisions We show that under a game-theoretical semanticsCTDs are well-suited to treat sub-ideal decisionsWe also argue that ina wide class of interactions CTDs can used as a compact representation ofcoalitional choices leading to the achievement of optimal outcomes Finallywe investigate the properties of the proposed operators

Publications NA

82 Projects and Grants in 2012

Advanced Argumentation Techniques for Trust ManagementAcronym AASTMReference F1R-CSC-PUL-08AASTMPI Prof Dr Leon van der TorreFunding ULBudget NABudget UL NADuration 2008-05-01 ndash 2012-04-30

Members Leon van der Torre Martin Caminada Yining Wu

Domain(s) Computational argumentation Trust

Partner(s) NA

Description The overall aim of AASTM is to enhance todayrsquos genera-tion of argumentation formalisms and implementations in order to becomesuitable for a wider variety of real-life applications such as reasoning abouttrust This requires a unified theory that integrates the various forms of ar-gumentation related functionality as well as efficient proof procedures andsound and scalable software components

Results

bull A dialectical discussion game for stable semantics

bull A more refined notion of the overall status of arguments based on thenotion of a complete labelling and give the procedure to determine anddefend the justification status This refinement has put the notion ofargument labelings into good use and raises interesting new questionsabout the psychological plausibility of such labelings

bull The equivalence between complete semantics in argumentation and3-valued stable model semantics in logic programming opens up thepossibility of reusing algorithms and results from logic programmingin argumentation theory

bull We define the postulates of closure direct consistency indirect con-sistency non-interference and crash resistance in the specific case ofthe ASPIC Lite formalism Then we identity a set of conditions underwhich the ASPIC Lite system satisfies all the mentioned rationalitypostulates under complete semantics

Publications Yning Wu Between Argument and Conclusion PhD thesisUniversity of Luxembourg 2012

41 Research projects 83

A discrete approach to model processing of hard metal includinghigh performance computingAcronym DPMHPCReference NAPI Prof Dr Bernhard PetersFunding ULBudget NABudget UL NADuration NA

Members Pascal Bouvry (2nd PI) Xavier Besseron

Domain(s) Process Engineering Parallelisation

Partner(s) NA

Description Conversion of pulverised tungsten oxide to metallic tungstenin a packed bed for production of hard metal is investigated by numericalmodelling The manufacturing process is a very important tool for ma-chining various materials The chemical process is described by a reactionscheme that reduces tungsten oxide stepwise to tungsten in a hydrogen at-mosphere Hydrogen is introduced as a reducing agent that streams overa packed bed of tungsten oxide particles in an oven The flow over andpenetration of hydrogen into the bed of tungsten particles is represented byadvanced two-phase CFD-tools for a porous media Evolution of particletemperature and its reaction progress is described by the Discrete ParticleMethod (DPM) Thus very detailed results are obtained by this approachand will be compared to experimental data Therefore this effort will com-plement experimental investigations and provide a deeper insight into theprocess in particular since particle temperatures and interaction of par-ticles with the fluid are inaccessible in a packed bed during experimentsAs these predictions of the particulate phase of tungsten oxide require sig-nificant amounts of CPU-time parallelisation of the conversion module ofthe Discrete Particle Method is approached by an interdisciplinary conceptas collaboration between engineering and computer science disciplines Theworkload for each processor is determined by the Orthogonal Recursive Bi-section (ORB) algorithm that distributes the particles uniformly onto theprocessors available The well-established Message Passing Interface (MPI)is employed to describe thermal conversion of an arbitrary number of tung-sten oxide particles It has additionally the advantage that MPI is supportedby Windows and Linux operating systems which apply equally to the soft-ware package of the Discrete Particle Method Additionally the scalability

84 Projects and Grants in 2012

of the approach on massively parallel machines will be investigated and theapplication of GPUs will be promoted

Results On the CSC side the work on this project focuses on providing anew design of the DPM software in order to execute coupled simulation inparallel The new enhanced design relies on the following aspects

bull A simulation module interface is designed to reflect the two majorsteps of the simulation workflow interactions and the integration

bull A simulation driver that builds an unified timebase to schedule andexecute all the modules involved according to their own timesteps

bull A parallel simulation driver that implements domain decompositionapproach using the Message Passing Interface (MPI) in order to lever-age distributed execution platforms like High Performance Computing(HPC) clusters It relies on the concepts of domain cells and partitionand can use different partitioners (eg ORB or METIS)

The enhanced design has been validated and it has been verified that itsatisfies the constraints of the numerical methods used by the process engi-neering The implementation of the new design is in progress in the DPMsoftware

Publications NA

Evolutionary Computing and Performance GuaranteesAcronym EvoPerfReference F1R-CSC-PUL-11EVOPPI Prof Dr Pascal BouvryFunding ULBudget 370keBudget UL NADuration 2011-09-01 ndash 2013-12-31

Members Xavier Besseron Sebastien Varrette Gregoire Danoy Sune SNielsen Emilia Tantar Yves Le Traon Antonio del Sol Nikos Vlassis

Domain(s) Meta Heuristics Evolutionary Computation OptimisationPerformance evaluation Bioinformatics

Partner(s) NA

Description Evoperf aims at providing the bases for robust and perfor-mance guaranteed evolutionary computations Such methods have a large

41 Research projects 85

spectrum of applications By choosing a system biomedicine applicationEvoperf aims at performing interdisciplinary research Many of the realworld problems are intractable (NP-Hard) whereas different approaches ex-ist including problem relaxation or local approaches However most tech-niques rely on stochastics to explore different starting points (iterated gradi-ent) or diversify the search (meta-heuristics) More than 15 years ago proofof convergences of stochastic based approaches were provided eg in [332]for simulated annealing and [333] for genetic algorithms But most of the re-search on genetic type particle algorithms evolutionary computation andorMonte Carlo literature seems to be developed with no visible connectionsto the physical or the mathematical sides of this field We mention thatthe design and the mathematical analysis of genetic type and branchingparticle interpretations of Feynman-Kac semigroups and vice versa (cf forinstance [347]) has been started by Prof Del Moral and his collaboratorsand acknowledged important advances [334 335] These nice theoreticalresults are however under-exploited In the current project we intend to ex-tend the approach to cutting edge parallel and robust multi-objective parti-cle algorithms (differential evolution cellular genetic algorithms) both at atheoretical and implementation level Validation will be carried on cuttingedge system biomedicine issues providing new modelstools for genepro-tein interaction networks Where appropriate a set of solvers will be usedas part of a multi player game Based on non-cooperative game theory itwas proved that these games converge to Nash equilibrium We will alsoinclude a decision-theory based approach that will regulate when and howthe different players exchange information and share the global cost functionby decomposition as to make Nash equilibrium correspond to global optima

Results The EvoPerf Project kickoff has taken place in 2011

The following human resources have been hired in 2011 Dr Xavier Besseronas Postdoc and Sune S Nielsen as PhD student

Publications NA

Privacy by DefaultAcronym DEFAULT-PRIVReference F1R-CSC-PUL-12DEPRPI Prof Dr Sjouke MauwFunding ULBudget 192853eBudget UL 192853eDuration 2012-09-01 ndash 2014-08-31

86 Projects and Grants in 2012

Members Sjouke Mauw Hugo Jonker

Domain(s) privacy verification formal analysis social networks mobilenetworks

Partner(s) Goethe University Frankfurt Germany

Description With the online proliferation of user-generated content (egblogs Youtube) and social media (eg Twitter Facebook) a new phe-nomenon has occurred people nowadays have a digital online rdquoliferdquo Rela-tions to others photos attended events opinions on current events all ofthis and more may be found online

As in real life privacy of the individual concerned must be safeguardedHowever the experience of privacy in the real world does not translate di-rectly to privacy in the digital life Privacy-sensitive aspects of the digitallife can leak out as in the real world but unlike the real world they are notbound to their context An angry letter in a newspaper will be used the nextday to wrap the fish but an angry letter online can still be found for yearsto come Whereas printed photos are by default stored in one album thedefault for digital photos is copying - website to browser camera to harddisk hard disk to email etc

The goal of this project is to connect user experience of privacy in real lifewith privacy offered in digital life and so overcome the divorce betweenthem As such the project investigates the effects of this divorce in andexplores possible resolutions for several aspects of digital life

bull Protecting user-generated contents

bull Keeping digital life fragmented

bull Mobile privacy

The project does not aim to enforce privacy ndash as in real life an individualrsquosprivacy may be breached by others (eg gossip) Instead the goal is toensure rdquoprivacy by defaultrdquo it may be possible to violate privacy to do soan individual needs to take conscious steps

Results The project started in September 2012 and so far has led to acollaboration with Verimag laboratory (Grenoble France) on verifiability ofonline auctions which has been submitted to ASIA-CCSrsquo13

Publications NA

41 Research projects 87

A Formal Approach to Enforced Privacy in e-ServicesAcronym EPRIVReference PUL-09EPRIPI Prof Dr Sjouke MauwFunding ULBudget 254955eBudget UL 254955eDuration 2009-05-01 ndash 2012-04-30

Members Sjouke Mauw Jun Pang Hugo Jonker Naipeng Dong

Domain(s) enforced privacy verification formal modelling e-services

Partner(s) ENS Cachan Paris France

Description Privacy has been a fundamental property for distributed sys-tems which provide e-services to users In these systems users become moreand more concerned about their anonymity and how their personal infor-mation has been used For example in voting systems a voter wants tokeep her vote secret Recently strong privacy properties in voting suchas receipt-freeness and coercion-resistance were proposed and have receivedconsiderable attention These notions seek to prevent vote buying (where avoter chooses to renounce her vote) These strong notions of privacy whichwe will call enforced privacy actually capture the essential idea that pri-vacy must be enforced by a system upon its users instead of users desiringprivacy The first aim of this project is to extend enforced privacy fromvoting to other domains such as online auctions anonymous communica-tions healthcare and digital rights management where enforced privacy isa paramount requirement For example in healthcare a patientrsquos healthrecord is private information However a patient contracting a serious dis-ease is at risk of discrimination by parties aware of her illness The inabilityto unveil (specific parts of) the health record of a patient is a minimal re-quirement for her privacy The second aim of the project is to develop adomain-independent formal framework in which enforced privacy proper-ties in different domains can be captured in a natural uniform and preciseway Typically enforced privacy properties will be formalized as equivalencerelations on traces which take into account both the knowledge of the in-truder and the users Within the framework algorithms can be designed tosupport analysis of e-service systems which claim to have enforced privacyproperties In the end the formalization and techniques will be applied toverify existing real-life systems and to help the design of new systems withenforced privacy properties

Results The project finished in 2012 In that year the project resultedin 3 conference papers [141] at ESORICSrsquo12 [144] at EVOTErsquo12 [141] at

88 Projects and Grants in 2012

FHIESrsquo11 and one book chapter [5] in Digital Enlightenment Yearbook 2012The projectrsquos EVOTErsquo12 paper Random Block Verification Improving theNorwegian Electoral Mix Net [144] won the best paper award of the confer-ence In the context of the project the Second International Summer Schoolon Secure Voting was organized in Schloszlig Dagstuhl Germany

Publications The following publications resulted from the project in2012 [141] [144] [141] [5]

Better e-Learning Assignments System TechnologyAcronym BLASTReference F1R-CSC-PUL-10BLASPI Prof Dr Denis ZampunierisFunding ULBudget 165000eBudget UL NADuration 2010-09-01 ndash 2012-08-31

Members Sandro Reis Denis Shirnin Denis Zampunieris

Domain(s) Proactive computing E-learning Online assignments manage-ment system

Partner(s) NA

Description The project aims at the design and implementation of aproactive online assignments system for blended teachings at the Univer-sity of Luxembourg which will actively support students as well as teachersin a collaborative way The main output product of this research and devel-opment project will be an online assignments system with advanced featureswhile remaining easily usable by every user beginner or expert that is usefulfor our teachings and which will be based on software currently in use at theUL The design will rely on the innovative concept of proactive computingapplied to the e-learning technologies field Indeed instead of waiting foruser interaction like in existing reactive learning management systems ourproactive assignments system (embedded into a standard e-learning plat-form) will allow us to define analysis and management rules that will beapplied autonomously by the system to support and drive the workflowwhen a teacher online assigned tasks to students The possible rules willrange from simple reminders and notifications to both parties to the mostelaborated automatic detection of potential problems based on successivedetection of (non-) events over a period of time

Results NA

41 Research projects 89

Publications NA

Model Composition for Executable ModelingAcronym COMPEXReference F1R-CSC-PUL-10MCEMPI Prof Dr Pierre KelsenFunding ULBudget 173KeBudget UL NADuration 2011-10-01 ndash 2013-09-30

Members Pierre Kelsen Nuno Amalio

Domain(s) Model-Driven Software Development Model Composition Ex-ecutable Modeling Software Engineering

Partner(s) NA

Description In model-driven software development models are the pri-mary artifacts for constructing software Model composition helps in master-ing the complexity of model-driven development Most of the current modelcomposition techniques can be viewed naturally as model transformationstaking two input models and producing one output model In our workwe have introduced a new composition technique for building executablemodels It has several properties that traditional composition techniques donot have it is additive rather than transformational it can be applied toany meta-model and it has a formal semantics The present project willinvestigate the power of our composition technique In particular we willcompare our technique with approaches from aspect-oriented modeling thatare typically used to express crosscutting concerns The project will inves-tigate whether our approach can be extended to match the power of thesetechniques andor how it can complement the existing approaches in mod-eling systems in a more straightforward elegant and light-weight mannerThe main goal is to enhance our current modeling framework and tool forexecutable modeling with new model composition techniques so that theycan handle not only the academic examples studied so far but can be usedeffectively on larger systems

Results The following results have been achieved on this project

bull A paper comparing different aspect-oriented modelling approaches in-cluding VCL [368]

bull A paper [369] a master thesis (of Eric Tobias 2012) and a techni-

90 Projects and Grants in 2012

cal report [370] with a comparative study that compares VCL againstother Visual Modelling Languages (VMLs) Part of the criteria forthis comparison is precisely VCL mechanisms of composition and de-composition

bull VCL has been applied to a case study from the modelling and aspect-oriented communities A technical reporting presenting a VCL modelof this case study [371] was presented at a workshop on comparingModelling Approaches of conference Models 2012

bull VCL has been applied to an industrial case study coming from theresearch community of formal methods This resulted in a paper [367]a technical report [372] and a masters thesis (Jerome Leemans 2011)

bull VCL and its composition mechanisms have been applied to a largecase study coming from the research efforts of CRP Henri Tudor onuser interfaces This work is part of Eric Tobias Master Thesis (2012)We intend to work towards a publication regarding this piece of workin close collaboration with the CRP in 2013

Publications NA

Dynamic and Composite Service-Oriented Architecture Secu-rity TestingAcronym DYNOSOARReference NAPI Prof Dr Yves Le TraonFunding ULBudget NABudget UL NADuration NA

Members Tejeddine Mouelhi Jacques Klein

Domain(s) Model-driven engineering Security testing SOA

Partner(s) NA

Description In Dynosoar project we aim at proposing reconfigurationcapabilities to Service-Oriented Architecture (SOA) targeting user-definedsecurity policies which can be trusted through innovative security testingmethods and tools SOA aims at decreasing the level of coupling betweenservices and at increasing the reuse evolution and adaptation of the sys-tem A SOA consists of an orchestration that models the services and the

41 Research projects 91

control flow of events between services A service integrator composes thesedifferent services (maybe dynamically discovered on the web) to propose anew composite service From this perspective SOA offers a very excitingsolution for building composite distributed systems Services are dynamicand highly reconfigurable a service integrator can compose different ser-vices in many different ways each service proposing different variants Itrapidly leads to the combinatorial explosion of possible composite servicesAmong reconfiguration criteria one aspect is becoming crucial for trustinga configured orchestration its capacity to embed a reconfigurable securitypolicy In Dynosoar we consider security policies dedicated to SOA whichallow each user expressing how her data can be manipulated into an or-chestration The problem is thus (1) to select valid orchestrations amongthe huge number of possible reconfigurations and (2) to test the robustnessof security mechanisms of the selected orchestrations Dynosoar addressestwo crucial dimensions the generation of valid orchestrations embedding asecurity policy from the set of possible reconfigurations and the final secu-rity testing of orchestrations The hard points we focus on are 1) choosingamong a possibly infinite number of services (re)configurations the smallestand more relevant subset which have to be tested This subset of serviceconfigurations must satisfy the security policy as well as sequential executionconstraints 2) testing one specific configuration in isolation ie withoutreal external service providers We specifically target the security policieswith testing

Results NA

Publications NA

414 UL PhD PostDoc

Seamless Communication for Crisis ManagementAcronym SECRICOMReference NAPI Prof Dr Thomas EngelFunding FullbrightBudget NABudget UL NADuration 2008-09-01 ndash 2012-04-30

Members Thomas Engel Sheila Becker

92 Projects and Grants in 2012

Domain(s) Security

Partner(s)

bull QinetiQ Ltd

bull Ardaco as

bull Bumar Ltd

bull NEXTEL SA

bull Infineon Technologies AG

bull Institute of Informatics Slovak Academy of Sciences

bull Graz University of Technology

bull Smartrends sro

bull ITTI Sp z oo

bull British Association of Public Safety Communication Officers

bull CEA LETI

bull Hitachi Europe SAS

Description Peer-to-peer real-time communication and media streamingapplications optimize their performance by using application-level topologyestimation services such as virtual coordinate systems Virtual coordinatesystems allow nodes in a peer-to-peer network to accurately predict latencybetween arbitrary nodes without the need of performing extensive measure-ments However systems that leverage virtual coordinates as supportingbuilding blocks are prone to attacks conducted by compromised nodes thataim at disrupting eavesdropping or mangling with the underlying commu-nications

Recent research proposed techniques to mitigate basic attacks ( inflationdeflation oscillation) considering a single attack strategy model where at-tackers perform only one type of attack In this work we define and usea game theory framework in order to identify the best attack and defensestrategies assuming that the attacker is aware of the defense mechanismsOur approach leverages concepts derived from the Nash equilibrium to modelmore powerful adversaries We apply the game theory framework to demon-strate the impact and efficiency of these attack and defense strategies usinga well-known virtual coordinate system and real-life Internet data sets

41 Research projects 93

Thereafter we explore supervised machine learning techniques to mitigatemore subtle yet highly effective attacks ( frog-boiling network-partition)that are able to bypass existing defenses We evaluate our techniques onthe Vivaldi system against a more complex attack strategy model whereattackers perform sequences of all known attacks against virtual coordinatesystems using both simulations and Internet deployments

Results The exploitation of existing publicly available communication net-work infrastructure with interface towards emerging SDR systems Interop-erability between heterogeneous secure communication systems A paralleldistributed mobile agent-based transaction system for effective procurementInfrastructure based on custom chip-level security

Publications NA

The Snippet System - A Fine-Granular Semantic-Aware DataStoreAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding ULBudget NABudget UL NADuration 2010-11-01 ndash 2013-10-31

Members Laurent Kirsch (PhD candidate) Steffen Rothkugel (supervi-sor)

Domain(s) compound documents file systems semantic desktop

Partner(s) NA

Description The Snippet System represents a novel data storage approachtackling several problems and shortcomings inherent to traditional file sys-tem based document management One of the main targets of the SnippetSystem is to improve human computer interaction by introducing new datamanagement facilities which enable a more intuitive way of working withdata and information By developing these file system level data manage-ment concepts with the usability of the system in mind it is possible toconsider usability aspects already in the design of the data storage architec-ture This in turn allows the realization of concepts like so-called Relationsand vFolders which contribute to a better user interface and interactionscheme

94 Projects and Grants in 2012

Results NA

Publications 1 conference publication [350]

Analysis of low-latency anonymisation networksAcronym NAReference I2R-NET-COM-110000PI Prof Dr Thomas EngelFunding funded on Fp7 EFIPSANS until 31122010 - Net-

LabBudget 37KyearBudget UL NADuration 2008-11-15 ndash 2012-11-14

Members Thomas Engel Thorsten Ries

Domain(s) Anonymity privacy low-latency anonymisation networks anonymi-sation network performance

Partner(s) NA

Description For various reasons low-latency anonymisation systems likeTor I2P JonDonym or proxy based solutions are widely used nowadaysoffering a certain performance and protection against adversaries Howeverit is very difficult for users to evaluate these systems especially when itcomes to the degree of anonymity Therefore the goal of this work is toprovide measures for users in order to evaluate the systems in regard toanonymity and performance

Basis of the work are performance evaluations of typical anonymisation sys-tems in regard to throughput round trip time and packet variation In orderto describe the degree of anonymity an attack using virtual network coordi-nate systems will be defined that allows an instant degradation of anonymityby positioning users geographically which aim to stay anonymous Classifi-cation algorithms like Support Vector Machines and Instance Based learningalgorithms will be used to allow the calculation of the degree of anonymityFinally a comparison to existing approaches will be provided

A second emphasis is on anonymisation performance particularly on Torthe most prevalent anonymisaton system nowadays Existing performancemetrics will be reviewed and evaluated aiming to improve the overall per-formance in terms of throughput and round trip time by an optimised relaynode selection for instance

Results The major outcome of this project is expected to be a quantifi-

41 Research projects 95

cation of anonymity in anonymisation networks by making use of virtualnetwork coordinate systems in order to identify node locations and by thisto provide an anonymity measure for users Another result will be perfor-mance improvements of the Tor anonymisation network

Publications [273 274 280]

Sociality and Self-Organization in Next-Generation DistributedEnvironmentsAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding AFRBudget NABudget UL NADuration 2009-02-01 ndash 2012-01-31

Members Jean Botev (Post Doc) Steffen Rothkugel (supervisor)

Domain(s) large-scale distributed environments sociality self-organization

Partner(s)

bull National University of Singapore

bull George Mason University USA

bull Universitat Trier

Description The proliferation of computationally powerful interconnecteddevices entails a new generation of networked applications and social utilitiescharacterized by a strong growth in scale and dynamics Distributed virtualenvironments constitute a privileged example involving a high degree of in-teractivity as well as tightened constraints and requirements As a responseto these issues this dissertation explores and substantiates sociality as a fun-damental principle both in and for the design of such systems A specializeddual peer-to-peer architecture is introduced combining a highly-structuredbackbone overlay with a loosely-structured geometric client overlay synergis-tically complementing each other To enable a global-scale single-instancedenvironment it is imperative to include as many client-side resources as pos-sible and unburden the backbone The focus of this dissertation thereforelies upon the latter geometric overlay By taking an interdisciplinary per-spective and leveraging different aspects of sociality a series of self-organizedapproaches addressing major problem areas are proposed a collaborative

96 Projects and Grants in 2012

filtering mechanism for the handling of information overload created fromthe soaring amounts of users and objects a confidentiality framework for theprotection of sensitive data more likely exposed due to an increased inter-activity and two resource allocation schemes for fairly distributing surpluscapacities in the face of critical regional surges Detailed evaluations showthat these decentralized algorithms operate robustly and effectively whileyielding well-converging results in comparison to optimal global-knowledgescenarios

Results NA

Publications 3 peer-reviewed conferences [297] [308][296]and one PhDthesis [352]

Honeypot and Malware AnalysisAcronym Honeypot and Malware AnalysisReference I2R-DIR-PIC-09SECPI Prof Dr Thomas EngelFunding AFR-PPPBudget 37KyearBudget UL NADuration 2011-10-15 ndash 2014-10-14

Members T Engel S Marchal

Domain(s) Is- Information and Communication Technologies Honeypotmalware analysis malware detection passive DNS network traffic analysis

Partner(s) CETREL

Description This research proposal presents the development of a newkind of honeypot Honeypots are widely used for more than ten years nowfor several purposes such as threat detection mitigation of the impact of net-work attacks malware analysis automatic generation of wormsrsquo signatureetc However honeypots are often designed to particular network applica-tions or services to offer a tailor-made threat detection and deflection Inthis proposal I exhibit potential new wider applications of honeypots lever-aging passive DNS analysis DNS probing and fast network traffic analysisin order to protect a specific network from its specific threats I highlightseveral areas for active research and provide an overview on existing ap-proaches This project is part of a public private partnership between SnTand CETREL SA and will be realized in the framework of a PhD coveringa 3 year period

41 Research projects 97

Results NA

Publications 2 peer-reviewed conferences [363 362]

Routing and mobility management in vehicular networksAcronym NAReference I2R-NET-PFN-10MOVEPI Prof Dr Thomas EngelFunding FNR - CORE MOVEBudget 37KyearBudget UL NADuration 2011-09-01 ndash 2014-08-31

Members T Engel M Mouton

Domain(s) NA

Partner(s) NA

Description research in the area of Vehicular Ad Hoc Networks (VANETs)A VANET is an emerging network technology which enables data com-munication between vehicles and the Internet The network protocols andhardware have been specifically designed for efficient data exchange in vehic-ular environments The high mobility and intermittent network connectivityraise major challenges for both security and network management tasks

The main contribution of the thesis of Maximilien Mouton consists in -The setup and maintenance up a simulationemulation platform that canbe used for large scale protocol validation and analysis (joint research withUCLA) - Integration of realistic mobility and signal propagation models -Identifying and proposing new application specific routing mechanisms formobile vehicular networks - Investigation of application specific dissemina-tion techniques (eg traffic

Results NA

Publications NA

98 Projects and Grants in 2012

Securing Mission Operations using Multi-Level SecurityAcronym SMO-MLSReference I2R-NET-PAU-11ELSKPI Prof Dr Thomas EngelFunding European Space AgencyBudget 48800e

UL - 37077 eBudget UL NADuration 2010-11-01 ndash 2014-10-30

Members Thomas Engel ESkoutaris

Domain(s) Spacecraft mission control systems MLS security

Partner(s) ESAESOC Germany

Description SMO-MLS is an ongoing research project that aims to pro-viding an enhanced security support at the spacecraft control infrastructureof ESAESOC by establishing multi-level security (MLS) solutions on itsMission Control System (MCS) Within this research activity MLS solu-tions will ensure an enforced separation of command and control data flowsof different sensitivity and classification levels between missions and also be-tween individual payload data flows of the same mission SCOS-2000 (S2K)is the ESA generic software infrastructure implementing the common fea-tures required by a spacecraft MCS Therefore a SCOS-2000 MLS prototypeis to be developed and built upon an operating system that supports multi-level security (ie Security-Enhanced Linux) The primary three objectivesof this project and that represent the direct security needs of future spacemissions are

(A) Enforcement of integrity policies between telecommand chain data flows(B) Enforcement of integrity policies between telemetry chain data flows (C)Confidentiality of third party telecommand chain data flows

This research project will advance the research on the area of MLS systemsand will provide an MLS model tailored for spacecraft command and controlsystems

Results As a result of this project a prototype MLS system based oncurrent ESA mission control system infrastructure will be developed andimplemented This may include the development of specific protocols andprocedures Such protocols may be subject to standardization

Publications NA

41 Research projects 99

Mobility Optimization using Vehicular network technologies(MOVE)Acronym MOVEReference I2R-NET-PFN-10MOVEPI Prof Dr Thomas EngelFunding CORE- MOVEBudget 37KYearBudget UL NADuration 2011-11-15 ndash 2014-11-14

Members T Engel M Forster R Frank J Francois A Panchenko MMouton L Dolberg

Domain(s) ICT

Partner(s) UCLA (non contracting)

Description The student will be working on the FNR MOVE projectThe goal of this project is to optimize vehicular traffic flows using ubiqui-tous network technologies (eg VANET 3G) The student will focus ondeveloping new traffic flow deviation paradigms that can be employed toreduce vehicular traffic congestion for urban and highway scenarios

Vehicular Ad Hoc Networks (VANETs) are mobile networks specificallysuited for vehicular environments Moreover the student will focus on spe-cific optimisation problems related to vehicular traffic flows Using VANETswill allow specifying decentralised and distributed coordinated algorithms toprovide the drivers with smart navigation services

The main contributions of the thesis of Markus Forster consist in - Iden-tifying the specificity of the vehicular traffic for the area of Luxembourg -Understanding the limitations and bottlenecks of the current Luxembour-gish road network - Modelling of the traffic in order to realistically reproducethe flow behaviour in a simulations environment - Testing existing and novelflow optimisation techniques that will allow to improve

Results NA

Publications NA

100 Projects and Grants in 2012

Service Dependency and Anomaly DetectionAcronym NAReference I2R-NET-COM-110000PI Prof Dr Thomas EngelFunding Funded on FP7 EFIPSANS project until 31122010

- NetLabBudget NABudget UL NADuration 2008-11-01 ndash 2012-10-31

Members T Engel C Wagner

Domain(s) NA

Partner(s) NA

Description NA

Results NA

Publications The following articles have been published in 2011 1 jour-nal [271] and 3 peer-reviewed conferences [306] [278] [279]

Individual and Collective ReasoningAcronym ICRReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding UL-PHDBudget NABudget UL NADuration 2008-03-12 ndash 2012-03-12

Members Gabriella Pigozzi Marija Slavkovik Leon van der Torre

Domain(s) Judgment aggregation Group-decision making Social choicetheory Normative systems

Partner(s) NA

Description Traditional decision-making is driven by the concept of a ra-tional agent who acts in his own best interest by maximizing the expectedutility Opposite to the rational agent modeled as Homo Economicus peopledo not make decisions by generating alternative options and by comparingthem on the same set of evaluation dimensions nor do they generate prob-ability and utility estimates for different courses of action They search for

41 Research projects 101

what Herbert A Simon called satisficing or ldquogood enoughrdquo decisions Wedefine a satisficing decision as one that is determined by making a yesnoestimate for each element of a given set of decision-relevant criteria Theaim of this project is to investigate how groups of artificial agents can reachsatisficing decisions The contribution of the thesis is threefold For the areaof multi-agent systems we propose a new way in which group decisions canbe reached As a show-case we apply our decision-reaching method to theroblem of determining group intentions For the field of judgment aggrega-tion our contribution is a new set of judgment aggregation operators Forthe field of belief merging our contribution is the identification of a newproblem of iterated belief merging

Results

bull In order to avoid an untenable collective outcome individuals mayprefer to declare a less preferred judgment set Thus the prospect ofan individual trying to manipulate the social outcome by submittingan insincere judgment set is turned from being an undesirable to aldquovirtuous (or white) manipulation In [349] we defined and studiedwhite manipulation as a coordinated action of the whole group

bull In [348] we presented an aggregation procedure providing completejudgment sets ie judgment sets with premises and conclusion Weshowed that our procedure satisfies the desirable properties of non-manipulability and it can be modified to preserve unanimity on thepremises

bull In order to show the practical applicability of group decision-reachingthrough judgment aggregation we studied the problem of determin-ing group intentions based on declared beliefs or acceptances of thememebers In [328] we present a formal model for deciding on collec-tive intentions and study the related group commitment and intentionrevision problems

Publications Marija Slavkovik

102 Projects and Grants in 2012

Understanding Financial Topics and their Lifetime in TextualNews by the Content Aging TheoryAcronym NAReference F2R-LSF-PFN-11ESCAPI Prof Dr Christoph SchommerFunding FNR COREBudget 500000Budget UL NADuration 2012-06-01 ndash 2015-05-31

Members Christoph Schommer Roxana Bersan Dimitrios Kampas An-dreas Chouliaras Theoharry Grammatikos Yannis Ioannidis

Domain(s) Computational Finance Topic Extraction Content AgingTheory Machine Learning Text Mining

Partner(s)

bull Dept of Finance (Luxembourg School of Finance)

bull Dept of Computer Science

bull University of Athens Dept of Computer Science

Description The project is part of the FNR CORE project ESCAPEESCAPE applies Data Mining and Machine Learning methods on publiclyavailable news sources to document in a measurable way the structure andevolution of Europersquos financial policy to address the on-going threat to theEuro-zone stability How do the important euro policy players present them-selves in the pallet of the policies map Are there subgroups with similarpositions How coherent are these groups among themselves Are theredominant players in each group How different are the different group posi-tions One expects that the euro players eventually will reach a consensuspolicy to stem the risk threatening the EURO Documenting in a measur-able way how the different policy positions converge over time should provideadditional insights into the complex process of (financial) policy evolutionFinancial policy ultimately affects capital markets but as the recent cri-sis has highlighted capital markets may force or extract policy concessionsUnderstanding the interplay of financial policy formulation and capital mar-ket ex-pectations therefore is extremely important for the effectiveness ofpolicy responses and eventually for the stability of the financial system ES-CAPE provides statistical evidence on whether capital markets lead or reactconcurrently to the financial policy evolution It is expected to shed lighton the powerful role of the ldquoinvisible handrdquo of capital markets in extractingdesired policies from politicians

41 Research projects 103

The research project concerns the identification of financial topics in Thom-son Reuters News data The extraction of this kind of information will beperformed based on machine learning and content aging theory methodsWe are currently working on the mathematical formalization of this systemThe extraction of this kind of information will be used by financial expertsto better understand the Sovereign Debt Crisis in Europe

Results

bull We were concerned with masses of financial news data from Thom-son Reuters (gt 2TB) the understanding of the data structure themanagement of the data and its preprocessing

bull We have elaborated on and worked out Topic ExtractionFinding indetail

bull Extensive Literature Review Topic Extraction and Content AgingTheory

bull Paper writing which has led to a conference paper to be presented atICAART 2013 in Barcelona

Publications to appear in 2013 at ICAART 2013

Smart Predictive Algorithms for Spacecraft AnomaliesAcronym SPACEReference I2R-DIR-BPI-11SCHOPI NAFunding SnTBudget NABudget UL NADuration 2011-07-09 ndash 2017-07-08

Members F Bouleau Prof Schommer Prof Bouvry Dr Krier

Domain(s) Keywords Fourier fit least square Kalmanrsquos filter data min-ing artificial intelligence pattern matching data stream decision helpingclassification correlation

Partner(s)

bull University of Luxembourg Dept of Computer Science and Commu-nication

bull SES Astra

104 Projects and Grants in 2012

Description Geostationary satellites are monitored from Earth to captureand react on anomalies A stream of sampled sensor information (telemetry)is downloaded by a ground control system which is processing and storing theinformation in dedicated databases which grow very large over the satellitelifetime (up to 20 years) The satellite engineers crew who is analyzing thisdata nevertheless take less than 10

Results My interest is on one hand to use the mathematical modellingcreated by the satellite engineers to optimize browsing into the telemetrydatabase and help in the pattern matching and classification that will belinked to the existing reports database On the other hand an artificialintelligence algorithm will use the classified patterns in order to correlate thereports with other events and provide analysis and decision helping elements

Publications in progress

An Incremental System to manage Conversational StreamsAcronym INACSReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding ULBudget NABudget UL F1R-CSC-LAB-05ILIADuration 2009-02-01 ndash 2013-01-14

Members Jayanta Poray Christoph Schommer Raymond Bisdorff ThomasEngel

Domain(s) Adaptive Systems Graph Theory and Modelling Chat Con-versation Computational Reputation

Partner(s)

bull Dept of Computer Science ILIAS Lab

Description The research project is inspired by the information process-ing mechanism of the human brain where every input signal is realisedprocessed and stored in a highly sophisticated manner The goal has beento develop a robust information processing system for text streams in theform of explorative and adaptive mind-graphs to use this structured infor-mation to fulfil textual conversational challenges between artificial agents

Results The thesis has been successfully submitted and defended(December 13 2012)

41 Research projects 105

Publications

1 J Poray and C Schommer Operations on Conversational Mind-Graphs In Proceedings of the 4th International Conference on Agentsand Artificial Intelligence pp 511-514 Vilamoura Algarve Portugal

Feature Extraction and Representation for Economic SurveysAcronym FERESReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding Internal Doctoral PositionBudget Internal Doctoral PositionBudget UL NADuration 2011-04-01 ndash 2014-03-31

Members Mihail Minev Christoph Schommer Theoharry GrammatikosUlrich Schaefer Philippe Karas

Domain(s) News Analytics Feature Extraction Course Volatilities EventClassification Trend Prediction

Partner(s)

bull Dept of Computer Science ILIAS Lab

bull Luxembourg School of Finance University Luxembourg

bull German Research Center for Artificial Intelligence (DFKI) GmbH

bull Thomson Reuters Finance SA

Description The study concerns the manifold news articles which re-flect the adjustments in the monetary policy during the financial crisis Inparticular we consider official decisions conducted by the Federal ReserveSystem but also information leaks in the press One goal of this work isto retrieve and quantify such information using modern pre-processing andtext mining techniques Further the implications of news on the stock mar-kets are examined by discovering and modelling composite index volatilitiesas functions of key announcements A model for the prediction of pricetrends is targeted which should reveal the economic value of informationHere an important aspect is the definition extraction and management oftopic-related features Keywords data projection feature selection newsclassification monetary policy stock markets

106 Projects and Grants in 2012

Results

bull Discovery of a strong evidence for a measurable link between eventsrelated to monetary policy and stock market volatilities

bull Proposal for a comparison framework of computer science projectswhich aim news classification and trend forecasting

bull Identification of information sources and sophisticated data character-istics

bull Design of a procedure model containing the data workflow and themilestones for the learning and the operational phase

bull Project presentation at the ldquoTrusted ICT for Financerdquo organized bythe Digital Enlightenment Forum Luxembourg

Publications

bull M Minev C Schommer T Grammatikos News and stock marketsA survey on abnormal returns and prediction models Technical Re-port August 2012

bull C Schommer and M Minev Data Mining in Finance PresentationTrusted ICT for Finance Luxembourg April 2012

Sentiment Classification in Financial TextsAcronym NAReference F2R-LSF-PFN-11ESCAPI Prof Dr Christoph SchommerFunding FNR COREBudget 500000Budget UL NADuration 2012-06-01 ndash 2015-05-31

Members Christoph Schommer Roxana Bersan Dimitrios Kampas An-dreas Chouliaras Theoharry Grammatikos Yannis Ioannidis

Domain(s) Computational Finance Sentiment Analysis Machine Learn-ing Text Mining Natural Language Processing

Partner(s)

bull Dept of Finance (Luxembourg School of Finance)

41 Research projects 107

bull Dept of Computer Science

bull University of Athens Dept of Computer Science

Description The work is part of the FNR CORE project ESCAPE ES-CAPE applies Data Mining and Machine Learning methods on publiclyavailable news sources to document in a measurable way the structure andevolution of Europersquos financial policy to address the on-going threat to theEuro-zone stability How do the important euro policy players present them-selves in the pallet of the policies map Are there subgroups with similarpositions How coherent are these groups among themselves Are theredominant players in each group How different are the different group posi-tions One expects that the euro players eventually will reach a consensuspolicy to stem the risk threatening the EURO Documenting in a measur-able way how the different policy positions converge over time should provideadditional insights into the complex process of (financial) policy evolutionFinancial policy ultimately affects capital markets but as the recent cri-sis has highlighted capital markets may force or extract policy concessionsUnderstanding the interplay of financial policy formulation and capital mar-ket ex-pectations therefore is extremely important for the effectiveness ofpolicy responses and eventually for the stability of the financial system ES-CAPE provides statistical evidence on whether capital markets lead or reactconcurrently to the financial policy evolution It is expected to shed lighton the powerful role of the ldquoinvisible handrdquo of capital markets in extractingdesired policies from politicians

The research topic that Mrs Bersan is addressing is sentiment analysisnamely identifying subjective information in the financial news We analyzea specific topic and assign this subjective information to a mathematicalindex in order to reflex its polarity orientation The techniques used are fromthe research fields of machine learning text analytics and natural languageprocessing

Results

bull We were concerned with masses of financial news data from Thom-son Reuters (gt 2TB) the understanding of the data structure themanagement of the data and its preprocessing

bull We have elaborated on and worked out Sentiment Classification indetail

bull Extensive Literature Review Sentiment Analysis (vs Opinion Min-ing Polarity Classification)

bull Paper writing which has led to a conference paper to be presented atICAART 2013 in Barcelona

108 Projects and Grants in 2012

Publications A first scientific paper will be published at ICAART 2013in Barcelona

Artificial Conversational CompanionsAcronym SPARCReference F1R-CSC-LAB-05ILIAPI Prof Dr Christoph SchommerFunding NABudget NABudget UL NADuration 2011-04-01 ndash 2014-03-31

Members Sviatlana Danilava Christoph Schommer Gudrun Ziegler StephanBusemann

Domain(s) Artificial Companions Conversational Agents Models of In-teraction Interaction Profiles Long-Term interaction between human users

Partner(s)

bull University Luxembourg Dept of Computer Science and Communica-tion

bull University Luxembourg Dica Lab

bull German Research Centre for Artificial Intelligence Saarbruecken

Description The goal of the project is design and implementation of anArtificial Conversational Companion (ACC) which helps foreign languagelearners to improve their conversation skills In order to model a long-terminteraction with an ACC via instant messaging dialogue for conversationtraining it is necessary to understand how natural long-term IM interactionbetween human language experts (usually native speakers) and languagelearners works Data from chat dialogues between advanced learners of alanguage L as a second language(L2) and native speakers of L who rdquojust chatrdquofor a longer period of time were collected A data-driven model of long-term interaction is in focus in particular modelling of usersrsquo interactionprofiles including usersrsquo responsiveness behaviour and learnersrsquo languageWe use methods of conversation analysis (qualitative research) to developcomputational models of long-term human-machine interaction

Results

1 Data collection We initiated long IM dialogues (ca 30-90 minutes)

41 Research projects 109

between advanced learners of German as L2 and German native speak-ers for a prolonged period of time (4-8 weeks) The participants pro-duced in total 72 dialogues which correspond to ca 2500 minutes ofIM interaction ca 4800 messages with ca 52000 tokens in total andca 6100 unique tokens The average message length is 10 tokens

2 Data analysis We obtained the initial model of responsiveness profilesfor the learners We developed an initial annotation scheme for thelearners language We annotate the corpus according to the scheme

Other Activities

1 International Conference on Agents and Artificial Intelligence (Vilam-oura Portugal) presentation on ldquoArtificial Conversational Compan-ions - A Requirements Analysisrdquo

2 DICA-Lab PhD Day 2012 presentation on rdquoComputational Models ofInteraction Based on Empirical Data from Chat Dialoguesrdquo

3 Seminar with the participants of the data collection Vitebsk Belarus

4 Participation in intervention ldquoChercheurs a lrsquoecole 2012rsquorsquo

5 Participation in Foire de lrsquoEtudiant 2012 (Invited by Ministere delrsquoEgalite des Chances)

Publications

1 S Danilava Ch Schommer and G Ziegler (2012) Long-term Human-machine Interaction Organisation and Adaptability of Talk-in-interactionPoster presentation CHIST-ERA Conference Edinburgh Scotland

2 S Danilava S Busemann and Ch Schommer (2012) Artificial Con-versational Companions - A Requirements Analysis In Proceedings ofthe 4th International Conference on Agents and Artificial Intelligence282-289 Vilamoura Algarve Portugal

Energy-efficient resource allocation in autonomic cloud comput-ingAcronym ERACCReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2010-10-01 ndash 2013-09-30

110 Projects and Grants in 2012

Members Cesar Diaz

Domain(s) Computer Science Information Science Cloud ComputingGreen Computing Resource Allocation Optimization

Partner(s) NA

Description In the new era of Information Technologies (IT) and glob-alization massive computing power is desired to generate business insightsand competitive advantage for enterprises Traditionally enterprises processtheir data using the computing power provided by their own in-house datacentres However maintaining and operating a private data centre to keepup with the rapid growing data processing request can be costly and com-plicated Cloud Computing (CC) offers an alternative It is a concept thathas emerged out of the conception of heterogenous distributed computinggrid computing utility computing and autonomic computing It promisesto provided on-demand computing power with little maintenance quick im-plementation and low cost Nevertheless electrical power consumption hasbecome a major concern in CC systems

Results Models and algorithms are developed for the energy-efficient man-agement of processing elements that comprises a CC Based on the state ofthe art we have designed low complexity green scheduling heuristics thatexploit the heterogeneity of computing resources published in [295] Theseheuristics were designed to take into account scalability issues of the system[294]

In parallel research on opportunistic Desktop Grid Computing is conductedin conjunction with researchers from University of los Andes ColombiaSome techniques like DVFS ACPI DPM and virtualization are also consid-ered Moreover we are also investigating resource allocation and schedulingmodels [293]

Publications NA

Integrity Issues on the CloudAcronym IICReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2011-01-16 ndash 2013-01-15

41 Research projects 111

Members Jakub Muszynski

Domain(s) cloud computing distributed computing security integrityfault-tolerance

Partner(s) NA

Description A simple concept that has emerged out of the conceptionsof heterogeneous distributed computing is that of Cloud Computing (CC)where customers do not own or rent any part of the infrastructure Theysimply use the available services and pay for what they use This approachis often viewed as the next IT revolution similar to the birth of the Webor the e-commerce CC naturally extends grid computing Even if thislast domain attracted academic interest for several years it hardly caughtindustrial attention On the contrary CC arouse enthusiasm and interestfrom the same actors probably because it formalizes a concept that reducescomputing cost at a time where computing power is primordial to reachcompetitiveness Additionally the technology to interface such platforms isnow mature enough to make this concept a reality as initiated by some ofthe biggest vendors worldwide (Google Amazon etc)

To transform the current euphoria on CC into concrete investments andwide acceptance several security issues still need to be fixed In this con-text this PhD proposal focus on integrity and fault-tolerance aspects inthe CC paradigm in order to provide guarantees on programs and data ei-ther before during or after a run on the CC platform More generally theidea is to provide qualified and quantified measures of the confidence overthe resources used the execution conducted and the results returned to theuser This involves the design of novel protocols based on TPM (TrustedPlatform Modules) so as to provide trusted executions and migration pathfor the virtual environment deployed on the CC platform It also requirenew contributions in result-checking techniques middleware hardening andgame-theory based trust management

Results The general robustness analysis of distributed Evolutionary Al-gorithms (dEAs) against cheating faults and crash-faults (subject startedduring previous year) was finished with publication in Computers amp Math-ematics with Applications journal As a result conditions of convergenceor non-convergence of dEAs executed in malicious environment were givenHaving promising results from previous work currently it is being extendedby the experimental and theoretical analysis of running times of dEAs Theaim of the work is to quantify the overhead introduced by malicious acts onthe execution time Influence of underlying connection network between theworking nodes is also explored with the main focus on the P2P networks

112 Projects and Grants in 2012

Additionally a subject of generating hash functions by means of Gene Ex-pression Programming (GEP) was studied Journal paper as an extensionof conference paper (presented at the rdquoCryptography and Security Systems2013rdquo) is currently in preparation

Publications [40]

Energy-Efficient Information Dissemination in MANETsAcronym NAReference NAPI Prof Dr Pascal BouvryFunding ULBudget NABudget UL NADuration 2009-09-15 ndash 2012-09-14

Members Patricia Ruiz

Domain(s) Communication Protocols Mobile Ad Hoc Networks Energy-Efficiency Optimisation

Partner(s) NA

Description Patricia Ruiz is working on broadcasting algorithms over adhoc networks indeed over both mobile ad hoc networks (MANETs) and ve-hicular ad hoc networks (VANETs) During the first year she developed anenergy aware dissemination protocol based on the state of the art distancebased broadcasting algorithm for MANETs For that she did a cross-layerdesign that informs the upper layers about the reception energy at the phys-ical layer Thus upper layers can use this information to take decisions inorder to outperform the performance of the protocol

During the second year she improved the previous version of her work butalso made several extensions including new features and optimizations tothe protocol originally proposed The candidate has been using multiobjec-tive metaheuristics approaches to optimize the parameters of the differentvariants of the protocol

Results We are developing communication algorithms for ad hoc networksMore precisely dissemination algorithms for both MANETs and VANETsIn [330] an study of the performance of a tree topology over a VANETwas presented and also a comparison of different broadcasting algorithmsover different topologies for both MANETs and VANETs Considering theintrinsic energy constrain of MANETs an energy aware broadcasting algo-

41 Research projects 113

rithm (EDB hereinafter) was proposed in [329] This protocol is configuredby a set of different parameters that must be tuned for obtaining a goodperformance In order to optimize EDB we are using some multiobjectivealgorithm cellDE for finding the best possible configuration in [307] Thisalgorithm gives a set of feasible solutions that optimize the performance ofthe protocol in terms of some predefined objectives In [284] a new ver-sion of EDB the Adaptive Enhaced Distance Based broadcasting protocol(AEDB hereinafter) was optimized in terms of the energy used the coverageachieved and the broadcasting time The solutions were analyzed and somehints were given to the designer for choosing the parameters for promotingone objective or another Moreover in [290] the Enhanced Distanced BasedBroadcasting algorithm (EDB) was improved by using some social knowl-edge of the network A community detection technique was used in orderto improve the coverage achieved by EDB in sparse networks Additionallythe parameters of the new protocol were also optimized in terms of the samethree objectives we mentioned before

Publications NA

Smartphone Malware detection and mitigation with Static codeAnalysisAcronym NAReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2011-10-15 ndash 2014-09-30

Members Kevin Allix (PhD)

Domain(s) Security code static analysis android malware detection soft-ware engineering techniques

Partner(s) NA

Description By leveraging Static code analysis methods our researcheffort aims at improving our ability to detect known and unknown malwareusing heuristics-based detection technichs and similarity computation withnew fingerprinting schemes

Results This a starting PhD No results yet but a state of the art

Publications NA

114 Projects and Grants in 2012

Access Control Architectures From Multi-objective Require-ments to DeploymentAcronym ACAReference NAPI Prof Dr Yves Le TraonFunding ULBudget NABudget UL NADuration 2011-02-01 ndash 2014-01-31

Members Donia El Kateb (PhD)

Domain(s) NA

Partner(s) NA

Description The subject of the PhD thesis is ldquoAccess Control Architec-tures From Multi-objective Requirements to Deploymentrdquo Todayrsquos infor-mation systems are becoming more and more heterogeneous and distributedthis has impacted software systems which become more and more complexAdditionally software systems are a target to many changes that occur atthe environment level requirement level or at the system level This raisesthe necessity to consider multi-level requirements at their design of softwarearchitecture like functional requirements performance requirements secu-rity requirements etc Among the security requirements access control isthe most deployed one An access control architecture implements the re-quirements and enforces a policy that satisfies the requirements This thesisconsiders policy-based access control architectures and aims to build a gen-eral framework that defines an access control architecture that is supposedto comply to multi-level requirements and to respect multiple competingquality attributes security performance and so forth These attributes in-teract and improving one often comes at the price of worsening one or moreof the others In this thesis we reason about architectural decisions thataffect those quality attribute interactions

bull RQ1 How to ensure the tradeoff between security and performancewhen designing an access control architecture

bull RQ2 How to automate policy specification to assist policy writers toavoid policies errors so that the policy is compliant with the require-ments

bull RQ3 How to test the secure deployment of the access control ar-

41 Research projects 115

chitecture its compliance with the policies and how to do that in anoptimized fashion

Results More specifically during this first year the student did a stateof the art on access control and on security requirement engineering Shestudied one of the issues related the standard access control architecturenamely the performance issue caused by bottlenecks She successfully pro-posed a new solution for solving this issue and developed an automated toolthat implements this approach and enables improving current access con-trol architecture In addition during her first years she did an interestingwork on policy enforcement points (PEP) localization In fact it is impor-tant to locate the PEP in order to understand how security mechanism areimplemented and provide a way to improve the performance This workwas actually complementary to the work that she did on performance im-provement She implemented this approach and applied it successfully tothree case studies This work is under submission and will be submittedsoon She conducted this work in collaboration with Prof Tao Xie team(from North Carolina State University USA) who helped by providing casestudies used in the experiments The results were very promising since theperformance was improved up to 10 times This work has been submittedto ICPE conference and will appear in 2012

Publications NA

415 Other miscellaneous projects

Enterprise security for the banking and financial sectorAcronym BCEEReference I2R-Net-Pau-11PS2CPI Prof Dr Thomas EngelFunding BCEEBudget 204KeBudget UL NADuration 2011-04-01 ndash 2012-03-31

Members T Engel A Zinnen

Domain(s) security for the banking and financial sector

Partner(s) BCEE

116 Projects and Grants in 2012

Description Although many companies seem to approach the cloud com-puting paradigm at a faster pace the financial sector still remains an excep-tion Selling cloud computing to financial services companies seems prob-lematic The sector is known for its reluctance to give up control overoperations Additionally this area is characterized by a high number oflaws and regulations In Luxembourg banks are for example constrainedby law to store data within the country This fact contradicts the conceptof cloud computing in its current development The biggest challenge andkey success point in the implementation of cloud computing in the financialsector will be the assurance of safety policies

In Luxembourg this topic is a subject of special interest Resource poolingamong companies with similar interests would save administrative costs Onthe basis of a cloud environment banks could completely put their focus ontheir core competence However an open question is what steps will benecessary in order to achieve this goal In any case it will be important tofurther invest in research to fulfill the seven introduced security challengesA pilot project in cooperation with the Interdisciplinary Centre for SecurityReliability and Trust (SnT) provides preliminary work and an analysis of aframework to migrate financial services to cloud computing This work isdiverse and addresses both the identification of necessary research topics andthe exploration of services that might run in the cloud This evaluation isbased on a comparison of benefits versus riskschallenges for specific servicesA dialogue with legal and audit institutions as well as a discussion withsoftware providers will be a first step towards a framework for the financialcloud in Luxembourg

Results So far we have evaluated the protection of state-of-the art anonymiza-tion networks Anonymization networks such as Tor and JAP claim tohide the recipient and the content of communications from a local observerie an entity that can eavesdrop the traffic between the user and the firstanonymization node Especially users in totalitarian regimes strongly de-pend on such networks to freely communicate For these people anonymityis particularly important and an analysis of the anonymization methodsagainst various attacks is necessary to ensure adequate protection Weshowed that anonymity in Tor and JAP is not as strong as expected so farand cannot resist website fingerprinting attacks under certain circumstancesWe defined features for website fingerprinting solely based on volume timeand direction of the traffic As a result the subsequent classification be-came much easier We applied support vector machines with the introducedfeatures We were able to improve recognition results of existing works on agiven state-of-the-art dataset in Tor from 3 to 55 and in JAP from 20to 80

The datasets assume a closed-world with 775 websites only In a next step

41 Research projects 117

we transferred our findings to a more complex and realistic open-world sce-nario ie recognition of several websites in a set of thousands of randomunknown websites To the best of our knowledge this work is the first suc-cessful attack in the open-world scenario We achieve a surprisingly hightrue positive rate of up to 73 for a false positive rate of 005 Finally weshowed preliminary results of a proof-of-concept implementation that ap-plies camouflage as a countermeasure to hamper the fingerprinting attackFor JAP the detection rate decreases from 80 to 4 and for Tor it dropsfrom 55 to about 3

Publications Two conference publications [267] [266]

EPT Vehicular NetworksAcronym EPTVReference I2R-DIR-PAU-09EPTVPI Prof Dr Thomas EngelFunding EPTBudget 2 298 KeBudget UL NADuration 2010-01-01 ndash 2014-12-31

Members Thomas Engel Raphael Frank Marcin Seredynski

Domain(s) Vehicular Ad Hoc Networks

Partner(s) Entreprise des Postes et Telecommunications Luxembourg -EPT

Description A standard for vehicular ad hoc networks is expected during2011 In 2025 0 of the vehicle fleet within Europe is predicted to ap-ply to the standards enabling new services and application A main goalwill be to increase traffic safety and reduce the environmental impact ofthe vehicular transportation system The vision of the proposed researchproject is to develop efficient secure and reliable communication networksto enable the transformation of the vehicular transport system of today toa greener smarter and safer system Recent advances in sensor technologylow power electronics radio-frequency devices wireless communications se-curity and networking have enabled the engineering of intelligent vehiclesandintelligent transport infrastructure which have the potential to drasticallyincrease road safety decrease cost of transportation and contribute to a sus-tainable environment This research will address 3 main areas of vehicularnetworks 1) Sensor and Mobile Ad Hoc Networks 2) Embedded Systemsand 3) Applications and Services

118 Projects and Grants in 2012

Results NA

Publications NA

PIL to SPELL conversionAcronym Pil to SPELLReference I2R-NET-PAU-11PS2CPI Prof Dr Thomas EngelFunding SES-ASTRABudget Not applicableBudget UL NADuration 2011-01-28 ndash 2015-01-27

Members Thomas Engel Frank Hermann b Braatz

Domain(s) Satellite control language

Partner(s) SES-ASTRA

Description Until now satellite vendors operate their satellites in theirown satellite control languages which are restrictive proprietary dependenton 3rd party software and very heterogeneous As a consequence SES de-veloped SPELL (Satellite Procedure Execution Language and Library) as aunified and open-source satellite control language usable for each satellitevendor In order to migrate the existing procedures delivered by the man-ufacturer Astrium SES requested for an automated translation that takesAstrium PIL procedures as input and generates equivalent SPELL proce-dures This translation has to guarantee a very high standard regardingcorrectness and reliability in order to minimize the need for revalidation ofthe generated SPELL procedures

Results Fully automated translator from PIL to SPELL (project P1)

a SES and Astrium engineers successfully tested the generated SPELLprocedures - more than 15 man month of testing from 2011-12 till 2012-05

b First planned operational use for a satellite to be launched in 2nd halfof 2012

Publications 8 Related Publications 5 Journal papers 2 conferencepapers 3 technical reports

41 Research projects 119

INTERCNRSGDRI1102 Algorithmic Decision TheoryAcronym AlgoDecReference F1R-CSC-PFN-11ADECPI Prof Dr Raymond BisdorffFunding FNR ULBudget 11 000 eBudget UL NADuration 2011-01-01 ndash 2014-12-31

Members P Bouvry Ch Schommer U Sorger L van der Torre

Domain(s) Algorithmic Decision Theory is a research area developed atthe edge of several disciplines including Operational Research Decision the-ory Computer Science Mathematics Cognitive and the Social Sciences

Partner(s)

bull CNRS France

bull Universite Paris-Dauphine France

bull Universite Pierre Marie-Curie France

bull Universite drsquoArtois France

bull Universite de Mons Belgique

bull FNRS Belgique

bull ULB Belgique

bull FNR Luxembourg

bull Uniersidad Rey Juan Carlos Spain

bull DIMACS USA

Description Its aim is at developing formal and analytical methods andtools in order to improve decision making in and for complex organiza-tions in presence of hard algorithmic challenges It also aims at establishinga comprehensive methodology aiding real decision makers within the realworld to better understand the problem situations where they are involvedshape analyze an explore the possible actions that can be undertaken andultimately help to make better decisions The founding partners of the AL-GODEC Network established by the present Agreement have more than 20years of joint research activities resulting in joint PhDs papers books andresearch projects (both client and knowledge driven) Today they represent

120 Projects and Grants in 2012

a leading force worldwide in the area of Decision Sciences and TechnologiesThe ALGODEC Network is expected to create synergy in order to organizejoint doctoral courses promote the co-tutoring of PhD students promotemobility of early stage and experienced researchers promote the joint impli-cation of cross-members teams to client-driven research contracts organizejoint seminars act as a unique reference in fund raising

Results NA

Publications NA

Developing a Prototype of Location Assurance Service ProviderAcronym LASPReference ESA Bidder Code 52056PI Prof Dr Sjouke MauwFunding ESA - SnTBudget 160000e (ESA)Budget UL 80000e (SnT)Duration 2010-12-08 ndash 2012-12-07

Members Sjouke Mauw Jun Pang Xihui Chen Gabriele Lenzini

Domain(s) location assurance privacy of location assurance locationbased services GNSS network security

Partner(s) itrust Luxembourg

Description The objective of this project is to develop a prototype toprovide a high quality level of assurance in the location information thatoriginates from the GNSS network while protecting location owners fromintrusions into their privacy We approach these objectives from five per-spectives Analysis The objective is to precisely describe the requirementsthe execution and threat models the trust relations and the assumptionson the environment Design The objective is to design an architecture forlocation information assurance and to develop data protection algorithmsand decision logic to find out the appropriate assurance level of the loca-tion information The protocols devoted to security and privacy are alsodeveloped and integrated in a service architecture Verification The objec-tive is to analyse the result of decision logic in presence of an attacker andevaluate the quality of the output of the designed algorithms Moreoverbased on existing formal verification approaches a verification methodologywhich considers trustworthiness of the service together with user privacy willalso be studied Validation The objective is to set up the LAP prototypeand perform a set of laboratorial tests in order to assess the overall perfor-

41 Research projects 121

mance The robustness and performance is optimized through parametertuning Exploitation The objective is to define risk management principlesand prepare a strategy that should apply to assure the requirements in alargest deployment of the solution

Results The project was accomplished in this December 2012 and theevaluation meeting will be carried out in February 2013 So far the projectteam has submitted all the reports required by ESA and these documentshave been approved and accepted by the agency A Luxembourgish PatentApplication which describes the design of the localization assurance providerhas been successfully filed

Publications NA

Combine Software Product Line and Aspect-Oriented SoftwareDevelopmentAcronym SPLITReference F1R-CSC-PFN-09SPLIPI Prof Dr Nicolas GuelfiFunding ULFNRBudget 41 000eBudget UL NADuration 2009-10-01 ndash 2012-09-30

Members Nicolas Guelfi Alfredo Capozucca Jean-Marc Jezequel OlivierBarais Benoit Baudry Benoit Ries Vasco Sousa

Domain(s) Software Engineering Model Driven Engineering SoftwareProduct Line Aspect Oriented Modeling Model Composition UML

Partner(s)

bull CNRSINRIA University of Rennes France

bull Public Research Center Gabriel Lippmann

Description Software engineering proposes practical solutions founded onscientific knowledge to produce and maintain software with constraints oncosts quality and deadlines The complexity of software increases dramati-cally with its size A challenging trade-off for software engineering exists ina reality where the amount of software in existence is on average multipliedby ten every ten years as against the economic pressure to reduce devel-opment time and increase the rate at which modifications are made Toface these problems many of todayrsquos mainstream approaches are built on

122 Projects and Grants in 2012

the concepts of Model-Driven Engineering (MDE) Software Product Line(SPL) or Aspect-Oriented Software Development (AOSD) to foster softwarereuse In an emerging MDE context SPL and AOSD share the common ob-jectives to reduce the cost and the risk of adapting software systems to wideranges of new contexts On the one hand SPL techniques allow the model-ing of product variability and commonalities A SPL development approachstrongly depend on a composition mechanism supporting product deriva-tion from the SPL definition at any level of abstraction (analysis designimplementation ) On the other hand AOSD proposes new techniquesto compose and weave separate concerns which can represent features butAOSD does not propose mechanism to manage the variability of softwareThus both approaches complement each other and the combination of SPLand AOSD paradigms provides an exciting challenge allowing the use of ef-ficient product lines through the whole software development lifecycle Thiscollaboration aims at investigating further the complementarities betweenSPL and AOSD approaches in a MDE context This should make it possi-ble to discover entirely new ways of formally decomposing and recomposingsoftware systems at a much higher level of abstraction than anything thatis available today (notion of modularity based on classes and components)In order to do so several main technical areas must be addressed

bull Identify the common concepts and the difference between SPL andAOSD to combine the both approaches

bull Study the special activity of horizontal model transformation in thecontext of SPL and AOSD methodologies and to propose a transfor-mation language to support them

bull Provide rigorous and generic means to guaranties the consistency be-tween models through aspect weaving and product derivation

bull Build a generic AOM weaver with built-in variability mechanism todrive runtime adaptation

The problems inherent to this research project are in the heart of the soft-ware engineering problems such as model composition model transforma-tion model evolution model reusability model consistency etc

Results

bull Analysis of tools and procedings for the development of the genericAOM approach toolnamely analysing and testing the requirements forintegration as eclipse plug-in for tool deployment compatability of thiscompatibility requirements with the test projects already developed inKermeta and Drools

42 Grants 123

bull Development and specification of the Aspect metamodel composedof Pointcut information and Advice including specification alterna-tives to be tested during tool development for acersion of the best andclearest specification approach

bull Development and specification of a meta-model for internal informa-tion exchange within the several steps of the AOM tools execution

Publications NA

42 Grants

421 AFR

Multimedia Sensor NetworksAcronym AFR Grant PhD-09-188Reference I2R-DIR-AFR-090000PI Prof Dr Thomas EngelFunding FNR-AFRBudget 37KeBudget UL NADuration 2010-04-01 ndash 2013-03-31

Members Thomas Engel Radu State Alexander Clemm Stefan Hommes

Domain(s) anomaly detection network security rare event detection

Partner(s)

bull PampT Luxembourg

bull CISCO USA

Description Security officers monitoring security cameras face problemswith boredom and subsequent inattentiveness Critical events such as in-trusions can be missed While traditional surveillance systems store thedata recorded by cameras on hard disks examining the videos after a crimehas been committed is too late Together with PampT Luxembourg SnT de-velops in this project techniques for automated video surveillance with IP

124 Projects and Grants in 2012

network cameras The advantage Security officers can be alerted immedi-ately at critical moments and defensive actions can be initiated Automatedvideo surveillance techniques will be designed to detect and track objects in ascene to recognise normal activities in a scene and to differentiate anomalousfrom normal activity patterns Supervised and unsupervised learning usingthe video data will be applied to classify scenes as normal and suspiciousSpecial algorithms will be adopted or developed to detect the patterns ofobjects in the image control charts will raise an alarm when certain param-eters are out of the normal range Finally the spatial-temporal behaviourof an object in a scene will be analysed to gain more information aboutan activity Combining such analytical techniques will result in improvedintrusion detection and better support for security personnel The projectwill also address privacy issues at a high level to assure personal rights inpublic space Background of this project is that PampT Luxembourg wantsto replace its currently installed security network with IP network camerasin its main buildings and at other sites in Luxembourg The collaborationwith SnT guarantees the combination of an economically relevant highlyinteresting scientific question with cutting edge basic research

Results

bull Online-detection of a scene with self-tuning of all system parameters

bull Control charts for classifying a sequence of correlated images

bull Development of an open-source prototyp for an automated video surveil-lance solution

Publications 1 peer-reviewed conference [275]

Mashups in Clouds combined with Sematically enriched Infor-mation SetsAcronym NAReference NAPI Prof Dr Steffen RothkugelFunding AFR-PHD-09-029Budget NABudget UL NADuration 2009-07-01 ndash 2013-06-30

Members Bernd Klasen (PhD candidate) Steffen Rothkugel (supervisor)

Domain(s) mashups cloud computing satellite communication

42 Grants 125

Partner(s)

bull SES Astra

bull Universitat Trier

Description This project implements and analyzes mashups - new ser-vices based on seamless composition of existing ones - running and beingcreated inside computing clouds The latter provides soft- and hardware asan abstract service which offers a high computational power that can beaccessed via specified interfaces while the internal - possibly heterogeneous -infrastructure is hidden This approach is supposed to overcome limitationsof existing (clientserver-based) solutions which suffer from performancedegradation Furthermore it will be investigated how users can be assistedduring the mashup creation process by automatic suggestions based on col-laborative filtering approaches and ontologies The result will be a platformprototype that enhances possibilities for end users as well as for enterprisessince it eases the service-creation process thus reduces time-to-market andwill liberate a multitude of new services Running this system on a scalableinfrastructure - a cloud - ensures availability and short response-times evenon unexpected peak loads

Results NA

Publications 2 publications in 2011 one journal [351] and one peer-reviewed conference [361]

Trusted Location Services for Managed Community NetworksAcronym UL TelindusReference I2R-DIR-PAU-10TSCNPI Prof Dr Thomas EngelFunding AFR-PPPBudget 574KyearBudget UL NADuration 2010-04-01 ndash 2014-03-31

Members T Engel Y Nesius

Domain(s) Computer Science and Informatics

Partner(s) Telindus

Description The Objective of this work will be the integration of pri-vately owned access points into a managed wireless outdoor mesh network

126 Projects and Grants in 2012

Community features like incentive schemes shall be added to the network toallow an extension of the network in terms of coverage by reusing existinginfrastructure The managed outdoor network supports passive localisationThat is the wireless mesh access points are able to locate the position ofa signal emitting device This location is assumed as trustworthy as thewireless infrastructure is controlled and managed by a single trustworthyentity This can not be assumed anymore if privately owned access pointsare added to the network as then private peoplersquos access points are involvedinto the location determination process They may manipulate the signallingor just try to replace their node The contribution of this work will be tore-establish the trustworthiness of this localization service while supportingthe integration of 3rd party access points The project will build upon anexisting mesh network Real world estimates are done to measure a privateuserrsquos potential impact on the localization process and how this can be de-tected and to what extend it can be detected and potentially masqueradedeg by using information from nearby nodes or by involving other sourcesfor location information

Results NA

Publications NA

Spectrum sensing- Resource re-allocation and Spectrum man-agement strategies for satellite cognitive RadioAcronym SaCoRadReference 12R-DIR-AFR-090000PI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2011-10-15 ndash 2014-10-14

Members Shree Krishna Sharma Bjorn Ottersten

Domain(s) Security Reliability and Trust in Information Technology

Partner(s) SES

Description In this project the problem of enhancing the efficiency ofspectrum usage rather than exploring new spectrum bands for new serviceshas been considered Satellite cognitive radio has been proposed as mainresearch domain The problem of finding out innovative spectrum sens-ing resource re-allocation and resource management strategies for satellitecognitive radio is the main research topic of this proposal This research

42 Grants 127

work will mainly focus on investigating advanced techniques to improve theperformance of satellite users in different wireless environments as well asincreasing the resource usage efficiency in hybridintegrated Platform

Results NA

Publications NA

Sensor Fusion-Combining 3D and 2D sensor data for safety andsecurity applicationAcronym Sensor FusionReference 12R-DIR-AFR-090000PI Prof Dr Bjorn OtterstenFunding FNRBudget 37KyearBudget UL NADuration 2008-07-08 ndash 2012-07-07

Members Frederic Garcia Bjorn Ottersten

Domain(s) Sensor fusion

Partner(s) IEE

Description Recently 3D-cameras based on the lime-of-flight principlehave been developed to allow capturing range images of a scene The ben-efit of such a 3D-camera is that it enables the robust segmentation andlocalization of objects in 3D-space Objects can be classified based on theircontour thus independently on the light condition and the texture of theobject which IS crucial for safety critical applications

A general drawback of time-of-flight 3D-cameras IS however their low res-olution being approximately a factor 100 below the resolution of standard2D-imager and limited in frame rate compared to video rate These draw-backs limit the field of applications for 3D-cameras An approach to over-come the limitations of the low resolution is to combine a 3D-camera with ahigh resolution imager and to perform a fusion of the data on software level

The core of the project will be the development and elaboration of methodsfor image fusion targeting on increasing the spatial resolution of the 3Dimage and at the same improve the depth precision of the range informationThe elaboration of these methods will be done based on real data acquiredby a first prototype camera to be building up using an existing 3D cameraThe project both comprises the elaboration and development of entirelynew mathematical concepts as well as the implementation of the methods

128 Projects and Grants in 2012

for real-time applications Mathematical modelling of the camera behaviouris addressed and the development of tools for calibration

Results Best student paper award at the IEEE7th international Sympo-sium on Image and Signal Processing and Analysis (ISPA 2011) in Dubrovnik(Croatia) PhD Thesis March 2012

Publications NA

Investigation of boundary conditions for a reliable and efficientcontrol of energy systems formed by highly parallelized off-gridinvertersAcronym RELGRID2009Reference NAPI Prof Dr Juergen SachauFunding FNR-AFR-PhDBudget NABudget UL NADuration 2010-04-01 ndash 2013-03-31

Members Markus Jostock

Domain(s) NA

Partner(s)

bull CREOS

bull U Kaiserslautern

Description The work aims at providing a model which will allow pre-diction of stability for highly dynamic grids From the control perspectiveconnecting several stable components will no necessarily result in a stableoverall structure particularly when each of the components has a highlydynamic behaviour To avid hazardous interdependencies of coupled dy-namics control specifications for the single inverter controls are sought thatguarantee reliable cooperation

Results NA

Publications NA

42 Grants 129

Methods for Measuring and Predicting the Security Perfor-mance Reputation of Public NetworksAcronym SCoPeMeterReference 12R-NET-PAU-11MSRPPI Prof Dr Thomas EngelFunding FNR-AFR RedDogBudget NABudget UL NADuration 2011-03-22 ndash 2015-03-21

Members Thomas Engel Fabian Lanze Andriy Panchenko Jerome Fran-cois

Domain(s) Security Performance Wireless Networks Fingerprinting Hotspots

Partner(s)

bull Interdisciplinary Centre for Security Reliability and Trust UL

bull Red Dog Communications sa

Description In recent years the usage of Internet based services shiftedfrom fixed workplaces to mobile environments Wireless access points areavailable almost everywhere and users tend more and more to carry outonline activities on mobile devices such as smart phones or tablets This at-tracts potential attackers since most users neglect the risk of eavesdroppingdata manipulation or the possibility of an access point being controlledby a malicious entity Besides the performance of hotspots can differ sig-nificantly making it difficult for users to chose an intermediary fulfillinghisher particular requirements The goal of this project is to build a secu-rity and performance barometer system that provides long-term judgmentof hotspots regarding their performance and security reputation Informa-tion will be contributed to this system by data automatically collected andderived from a userrsquos mobile device application and userrsquos experiences Sev-eral research challenges arise from this A technique for uniquely identifyingwireless devices without trusting any third party is essential to make surethat connection is established to an authentic device Metrics for measur-ing performance and trustworthiness have to be defined in order to analyzequality of service and reputation of public networks This will be done in away that protects privacy of the clients reporting the values and at the sametime guards from malicious clients trying to subvert the system Finally wewill study the possibility to offer privacy-preserving location based servicesusing the available data In the proposal we describe the methodology howwe plan to reach our research objectives and to develop a practically usablesecurity and performance barometer for public wireless networks

130 Projects and Grants in 2012

Results The major result of this project so far is a large-scale evaluation ofunique device fingerprinting based on the unavoidable physical phenomenoncalled clock skew The method is fully implemented and can be performed onarbitrary out-of-the-box UNIX based systems It was evaluated using morethan 350 different wireless access points The resulting paper ldquoClock SkewBased Remote Device Fingerprinting - Demystifiedrdquo(FLanze APanchenkoBBraatz AZinnen) is currently under review for ACM Conference on Se-curity and Privacy in Wireless and Mobile Networks (ACM WiSec rsquo12)

Publications Three conference publications in 2011 [277] [276] [281]

Energy Optimization and Monitoring in Wireless Mesh SensorNetworksAcronym WiNSEOMReference I2R-DIR-AFR-090000PI Prof Dr Thomas EngelFunding FNR - AFR PhDBudget 37KeYearBudget UL NADuration 2010-04-08 ndash 2013-04-07

Members David Fotue Thomas Engel Houda Labiod Foued MelakessouSunil Kumar and Prasant Mohapatra

Domain(s) Wireless Sensor Networks

Partner(s) - Telecom ParisTech France- University of San Diego USA- University of California Davis USA- Ville du Luxembourg- Service de Coordination Hotcity

Description Air pollution is now considered as an important issue thatneeds to be treated as a critical phenomenon It belongs to a set of crucialphysical factors that drastically decrease peoplersquos health of human beingsIn this proposal we aim to deploy an efficient monitoring architecture ded-icated to Air Pollution in Luxembourg based on Wireless Sensor Networks(WSNs) WSNs have been the subject of much recent study and are a po-tential solution for the deploymentof measurement architectures at low costThey allow the measurement of data and their transmission towards a cen-tral workstation often called the sink in an efficient manner Currentlyair pollution monitoring is done locally over a small area The deployment

42 Grants 131

of a large set of sensors enables better mapping of pollution occurrencesat a higher measurement frequency Optimal communication in WSNs iscurrently a hot research topic For instance during the last ten years re-searchers have suggested many routing protocols in order to optimize datatransfer between network nodes We propose new routing protocols and for-warding mechanisms that increase network lifetime through the set of routediversity and efficient energy management schemes A set of maximally dis-joint paths between each sensor and the sink can partially or completelyavoid the appearance of congestion in the network The residual energy ofsensors is also taking into account our model Consequently data packetswill be forwarded towards candidates that present the widestcapabilities andhave the greatest residual energy Consequently global traffic will be spreadalong non-overlapping paths in order to increase the global WSN lifetimeThe PhD work consists of the analysis of this energy routing protocol in thecase of a real scenario that will be deployed in Luxembourg for air pollutionanalysis

Results After a study of the state of the art in the area of WSNs forenergy optimization we proposed A new Energy Conserving Routing Pro-tocol that aims to optimize the transmission cost over a path from a sourceto a defined destination in a Wireless Sensor Network The results appearsin proceedings of the 9th IEEEIFIP Annual Mediterranean Ad Hoc Net-working Worshop France 2010 New Aggregation Techniques for WirelessSensor Networks have been proposed the results appears in proceddindsof the 18th Annual Meeting of the IEEEACM International Symposiumon Modeling Analysis and Simulation of Computer and TelecommunicationSystems(MASCOTS) USA 2010 3 We study the effect of Sink Locationon Aggregation based on Degree of connectivity for Wireless Sensor Net-works The results are under reviews at the First International Workshopon Advanced Communication Technologies and Applications to Intelligenttransportation systems Cognitive radios and Sensor networks(ACTIS) Ko-rea 2011 4 We proposed a new Hybrid method to assign the channelfor Wireless Sensor Networks The results are under reviews at the 9th In-ternational Symposiumon Modeling and Optimization in Mobile Ad Hocand Wireless Networks(WiOpt) USA 2011 5 Finally we concluded allinvestigations done this year by submitting a journal paper at EURASIPJournal on Wireless Communications and Networking in the special issuerdquoLocalization in Mobile Wirelessand Sensor Networksrdquo

Publications Four related publications [276 277 364 365]

132 Projects and Grants in 2012

Information Extraction from Legislative TextsAcronym IELTReference NAPI Prof Dr Leon van der TorreFunding FNR AFR PHDBudget NABudget UL NADuration 2012-03-01

Members Llio Humphreys

Domain(s) Legal informatics Ontologies Information extraction Norms

Partner(s) Guido Boella University of Turin

Description With the growth of the internet laws can now be easilyaccessed by most citizens but with normative production increasing at Eu-ropean national and regional levels citizens and organisations need moreadvanced tools to understand the law within their domain of interest Legalinformatics is a growing field of research Legislative XML legal ontolo-gies and reasoning for normative systems have reached a point of maturityHowever building such resources beyond narrow applications involves a pro-hibitively expensive level of manual effort Advances in natural languageprocessing tools such as part-of-speech taggers and parsers the growingusage of statistical algorithms for handling uncertainty and the availabil-ity of semantic resources such as WordNet and FrameNet has resulted inrobust information extraction tools Information extraction for law is anunder-researched area Legal text particularly legislative text has partic-ular features that pose significant challenges - long sentences with severalclause dependencies lists where each item are usually not standalone sen-tences and references to other articles the content of which is not quotedwithin the referring article This research investigates the transformation oflegislative text into normalized sentences representation in formal logic andinformation extraction for ontologies

Results My first year in the doctoral programme has mainly involved for-mal and informal study of relevant topics at the Universities of LuxembourgTurin and Delft as well as publications on legal informatics and complianceCourses in transferable skills have been omitted in this account

bull study of propositional logic belief revision and dynamic epistemiclogic information extraction and data mining in Luxembourg andof the Pi-calculus in Turin

bull essay on Theory Change and Law

42 Grants 133

bull research visit to Joris Hulstijn University of Delft for the study ofcompliance monitoring systems

Publications

bull Conference papers

ndash [81][82][253]

bull Book chapter

ndash [83]

Security LogicsAcronym LOSECReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding FNR-AFRBudget NABudget UL NADuration 2009-09-01 ndash 2012-09-01

Members Valerio Genovese

Domain(s) Authorization Access Control Modal Logic

Partner(s) NA

Description Access Control Authorization and Authentication are main-stream topics in computer science security that can be grouped under thenotion of rdquotrust managementrdquo In an increasingly interconnected world secu-rity policies are evolving from a static disconnected environment to a highlydynamic and distributed one (eg Internet Social Networks)

The main aim of this project is to create a formal and expressive logicthrough which computers can reason to grant access to external entitiesand users can model and specify in a clear and explicit way what are thepolicies which govern their systems The new logic we plan to develop deeplyextends and enrich existing approaches appeared in the literature We alsoplan to create a calculus for this logic in order to define an efficient algorithmto automatize the reasoning process for large scale applications From themodelling point of view we aim to define a model checking methodology toassist ICT security officers in crafting secure and stable systems

Results

134 Projects and Grants in 2012

bull Seq-ACL+ (software)

bull ACL-Lean (software)

bull delegation2spass (software)

bull macl2spass (software)

bull secommunity (software) available at httpwwwdiunitoit~genovesetoolssecommunitysecommunityhtml

Publications [10][242]

Valerio Genovese Modalities for Access Control Logics Proof-Theory andApplications University of Luxembourg 2012

Programming Cognitive RobotsAcronym ProCRobReference F1R-CSC-LAB-05ILIAPI Prof Dr Leon van der TorreFunding FNR-AFRBudget NABudget UL NADuration 2011-05-20 ndash 2014-05-20

Members Pouyan Ziafati

Domain(s) Agent Programming Languages Robotics

Partner(s) Mehdi Dastani Utrecht University

Description The ProcRob project aims at extending existing agent pro-gramming languages with sensory and action components to support theirapplication in autonomous robot programming

Results

bull The requirements of agent programming languages for autonomousrobot programming have been identified and presented in the ProMASworkshop of the AAMAS 2012 conference and published in the BNIAC2012 conference [84]

bull An environment software library for 2APL agent programming lan-guage has been developed which facilitates its integration with ROSthe current de facto standard robotic framework

42 Grants 135

bull A face recognition software package for ROS has been developed andreleased publicly

bull A demo application of NAO robot using 2APL and ROS has beendeveloped In this demo NAO can recognize faces and be controlledby voice A more complex demo application for NAO is under thedevelopment including path planning while avoiding obstacles

bull A more detailed analysis of the agent programming languages require-ments for event processing in autonomous robot programming has beenperformed and a software library for addressing such requirements iscurrently under the development The result has been submitted toAAMAS 2013 In this work an extension of ETALIS event process-ing language has been proposed to develop sensory components for anautonomous robot

Publications [84]

Trust in argumentation-based negotiationAcronym TABNReference F1R-CSC-LAB-05ILIAPI Dr Srdjan VesicFunding FNR-AFR-PostdocBudget NABudget UL NADuration 2012-10-01 ndash 2013-01-14

Members Srdjan Vesic

Domain(s) Argumentation Negotiation Trust

Partner(s) NA

Description he goal of the project was to study the notion of trust inargumentation-based negotiation in particular to study the notion of n-aryattack relations

Results Due to the early termination of the contract only its first partwas finalised It was to study the notion of n-ary attack relations Thischallenge was selected as the first research objective since existing argu-mentation systems rely on binary attack relations and I believe that a moregeneral framework allowing for ternary (or more) attack relation is necessaryin argument-based negotiation I worked on this problem with Dr MartinCaminada We plan to finish the work and submit it to an international

136 Projects and Grants in 2012

journal

I also worked with Dr Madalina Croitoru (University of Montpellier II) oncreating an argumentation framework for reasoning in the scenario whereseveral agents have individually consistent ontologies but the union of allthe ontologies is inconsistent This argumentation formalism can be used byagents to negotiate ie to send only some data from their ontology in form ofarguments (compared to the existing approach where the union of ontologiesis created in a centralised place) This is a step forward considering theprivacy and the notion of trust in this type of negotiation is to be carefullystudied

Publications Some papers were submitted

Logical Approaches for Analyzing Market Irrationality compu-tational aspectsAcronym LAAMIReference I2R-DIR-AFR-090000PI Prof Dr Leon van der TorreFunding FNR-AFRBudget 117 840eBudget UL NADuration 2011-04-01 ndash 2013-03-31

Members Mikoaj Podlaszewski Martin Caminada Tibor Neugebauer

Domain(s) market efficiency finance epistemic reasoning

Partner(s) Luxembourg School of Finance

Description The proposed PhD project is to be carried out in closecooperation with the recently approved LAAMI (CORE) project (LogicalApproaches for Analyzing Market Irrationality) which aims to apply theparadigm of agent-based computational economics (Tesfatsion and Judd2006) to model complex reasoning processes in a market setting Basicallywe assume a market in which the main product is information and com-plex analysis on an issue that does not provide immediate feedback fromthe objective world We are interested in examining under which conditionsthe information providers (consultants) have sufficient incentives to providegood quality analysis to their clients The preliminary results of a prototypesoftware simulator (Staab and Caminada 2010) as well as other research(Mathis et al 2009) indicate that these incentives are not always strongenough to rule out providing low quality information If such becomes thepervasive strategy of the consultants there are consequences regarding the

42 Grants 137

informedness not only of individual information consumers (clients) but alsofor the system as a whole since unfounded collective beliefs can easily leadto various forms of market imperfections In essence we would like to ex-plain these market imperfections by examining how markets can becomeill-informed For this we use the technique of agent-based simulation Thespecific role of the PhD student will be to focus on implementation aspectsas well as on aspects of computability and bounded rationality of individualagents

Results

bull In [55] we examined an argument-based semantics called semi-stablesemantics which is quite close to traditional stable semantics in thesense that every stable extension is also a semi-stable extension Oneadvantages of semi-stable semantics is that for finite argumentationframeworks there always exists at least one semi-stable extension Fur-thermore if there exists at least one stable extension then the semi-stable and the stable extensions coincide Semi-stable semantics canbe seen as a general approach that can be applied to abstract ar-gumentation default logic and answer set programming yielding aninterpretation with properties similar to those of paraconsistent logic

bull In [165] we introduced a unified logical approach based on QuantifiedBoolean Formulas (QBFs) that can be used for representing and rea-soning with various argumentation-based decision problems By thiswe were able to represent a wide range of extension-based semantics forargumentation theory including complete grounded preferred semi-stable stage ideal and eager semantics Furthermore our approachinvolved only propositional languages and quantifications over propo-sitional variables making decision problems like skeptical and cred-ulous acceptance of arguments simply a matter of logical entailmentand satisfiability which can be verified by existing QBF-solvers

bull One of the differences between the fields of dialogue theory and thefield of (Dung-style) argumentation is that the former is mainly con-cerned with procedural aspects of discussion whereas the latter ismainly concerned with the results of a nonmonotonic reasoning pro-cess Nevertheless one can use dialogue theory as a conceptual basisfor Dung-style argumentation semantics The idea is that an argu-ment is accepted if and only if it can be defended in formal dialogueMoreover different argumentation semantics can be shown to coincidewith different types of dialogue In [151] we showed that groundedsemantics can be described in terms of persuasion dialogue providingan implementation of this dialogue in [150]

138 Projects and Grants in 2012

Publications [55] [165] [151] [150]

Green Energy-Efficient ComputingAcronym Green EECReference PDR-09-067PI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2010-04-01 ndash 2012-03-31

Members Alexandru-Adrian Tantar

Domain(s) decentralized algorithms global optimization dynamic envi-ronments with uncertainties

Partner(s) NA

Description Large scale computing environments like data centers can befunctionally defined by several dynamic factors At the same time depend-ing on for example availability constraints nature of the energy sourcesor computational load distribution different stochastic factors need to beconsidered as well Energy-efficient computing therefore requires not only tocomply with contradictory objectives eg provide full computational powerwhile minimizing energy consumption but also demands anticipating theimpact of current decisions dealing with uncertainties like low power andemergency operation or provide fault tolerance all in an autonomic mannerFrom a multi-objective optimization perspective there is a need to under-stand and deal with the concepts that define a dynamic environment in thepresence of stochastic factors and provide corresponding models

Results As part of the existing framework a system is defined as a col-lection of interacting autonomous nodes [310] described by overall and localsystem load performance and energy consumption balance operating price(off) load rate task acceptance etc Energy vs performance trade-off re-quirements can be expressed as a resultant of operating costs emergencylevel or thermal readings At node level transitions are conducted by ex-pert systems (decentralized approach) that dynamically control frequencyand voltage task (off) load rate and type (communication or computationintensive) or power states A strategyscenario driven anticipation model isused to determine the outcomes and consequences of current decisions

As a continuation of the practical study and in order to provide the requiredformal support an analysis of the nature of dynamic and stochastic factors

42 Grants 139

that are considered in optimization problems was conducted This led to theidentification and modeling of four classes along with different performancemeasures [302 303] as follows (a) first order dynamic transform of the in-put parameters (b) second order evolution of the objective function(s) (c)third order parameter or function state time-dependency (d) fourth ordertime-dependent environment Also in addition to the previous design thecurrent model is defined to provide support (as part of the dynamic opti-mization process) for priority and expected due date based local schedulingpolicies transitions between active and shutdown states or the managementof volatile environments In parallel a dynamic preemptive load balancingmodel with stochastic execution times in heterogeneous environments wasdeveloped [301] This model considers different node constraints eg stor-age and computational load while being able to deal with a series of powerstates for minimizing energy consumption Defined objectives include mem-ory and computational load balancing energy number of active physicalmachines and passive tasks or virtual machines Last a study on land-scape approximation using generalized quadratic forms is currently beingcarried for characterizing and tracking local optima describing robustnessconfidence radius and sensitivity analysis

Publications NA

Confidentiality Integrity issues in distributed computationsAcronym CIDCReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2010-01-01 ndash 2013-12-31

Members Benoit Bertholon

Domain(s) Confidentiality of execution Integrity of execution CloudComputing IaaS Trusted Platform Modules Parallel and Distributed Com-puting

Partner(s) NA

Description Computing grids as defined in [Fos97] are distributed infras-tructures that gather thousands of computers geographically scattered andinterconnected through the Internet A simple concept that has emerged outof such an architecture is that of cloud computing (CC) where customers do

140 Projects and Grants in 2012

not own or rent any part of the infrastructure They simply use the availableservices and pay for what they use

The CC paradigm currently arouse enthusiasm and interest from the privatesector because it allows to reduce computing cost at a time where computingpower is primordial to reach competitiveness Despite the initiative of severalvendors to propose CC services (Amazon Google etc) several researchquestions remain open especially as regards security aspect from the userpoint of view CC highlights strong needs in integrity certifications andexecution confidentiality the latter focusing few academic interest until nowThe current policy at this level is to blindly trust the vendor providing theCC service This doesnrsquot hold for critical applications that eventually use orgenerate sensitive data especially when physical machines are distributedin different administrative domains and shared with other users that maybe business competitors

In the framework of the CC paradigm the purpose of this PhD is thereforeto investigate and design novel mechanisms to cover the following domains

- confidentiality of both application code and user data- integrity and fault-tolerance to provide guarantees on programs anddata either before during or after a run on the CC platform

To make this study more concrete the developed solutions must be validatedon a CC platform build on top of the University of Luxembourgrsquos computingclusters and the Grid5000 platform

By addressing those issues this PhD opens the perspective of intellectualpatents in a key area able to address industrial needs in an emerging tech-nology

Results In the preliminary work I studied the TPM I read the documentsissued by the Trusted Computing Group (TCG) regarding the specificationof the TPM as well as other papers using the TPM for different purposesThis has been done in order to develop what has been the main contributionof the first year CertiCloud

CertiCloud is a framework developed to verify the integrity of a runningVirtual Machine in a Cloud environment The creation of this first versionis based on a network communication protocol which has been developedand studied specifically for CertiCloud The resulted implementation is inpython for simplicity and fast prototyping The CertiCloud frameworkconsist as well in patches to adapt the Cloud scheduler to take into accountthe protocols developed This framework has been integrated in Nimbus bycreating some small patches specifically for this platform and can be easily

42 Grants 141

modified to use other Cloud platforms This lead to publications [323] [288]and [289]

The second part of the PhD is on obfuscation techniques and how to applythem to decrease the readability of a source code The software JShadObf[324] has been developed to validate the approach and to develop new tech-niques and metrics allowing better code obfuscation The literature [317][318] [319] [320] [321] has been studied to implement the state of the artin JShadObf

After the study compiler techniques and parsing softwares such as BisonANTLR [322] or bnfc ANTLR has been selected to parse JavaScript codeand a grammar has been developed ANTLR has many advantages such asbeing an active project generating parser in different languages (includingpython) and allowing the generation of the Abstract Syntax Tree Many codetransformations has been implemented such as the insertion of dead code theinsertion of predicates the generation of dummy expressions the outliningof code and the modification of the control and data flow Combined withevolutionary algorithms the transformations and the metrics are used tomutate and rate the generations creating multiple obfuscated versions ofthe same source code

This lead to publications under review to NSS2013 and NIDISC2013 (ac-cepted)

Publications [323]

Reliability of Multi-Objective Optimization techniquesAcronym REMOReference TR-PHD BFR07-105PI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2010-10-01 ndash 2012-09-30

Members Emilia Tantar

Domain(s) evolutionary techniques dynamic multi-objective optimiza-tion performance guarantee factors particle methods robustness

Partner(s) NA

Description The real-world optimization problems arising from disci-plines as various as Green IT or systems biology all have in common the

142 Projects and Grants in 2012

growing complexity of the problems to be optimized due to the need of scala-bility to larger environments or the number and type of factors needed in de-scribing the system and these are by far the only aspects to consider Otherdifficulties coming from the sensitivity of problems to dynamical changesoccurring in the environment or the need of handling several objectives si-multaneously should also be considered Evolutionary algorithms which area class of stochastic optimization methods constitue one of the commonlyused alternative in finding a good approximate solution for these problemsNevertheless their efficiency is mainly proved through experimentally at-tained performances Given the consequences of applying non-reliable solu-tions in the safety and security of complex systems (ex with applicationsin medicine) performance guarantee factors that overpass the experimentalboundary should be considered Therefore a framework allowing to quantifythe expected performances of the used techniques represents the main goalof this research

Results The aim of this project is the study of evolutionary algorithmsthat scale performances from theory to practice The focus is set on provid-ing performance guarantee factors for the study of multi-objective complexsystems including factors such as dynamism distributed behavior or the oc-currence of stochastic factors The first step consists in constructing a solidframework through the identification and design of the different classes ofproblems that can occur This has been done for the dynamic multi-objectivecontext towards a classification which allowed us to identify classes that lacka common ground for study [302 303]

As the faced real problems have different characteristics in order to compareand analyze the performances of various approximation techniques com-mon testbeds are required Synthetic or randomly generated problems areneeded in providing different fitness landscape structures or correlations be-tween objective functions or variables over time By understanding how dif-ferent techniques react to modifications occurring in the problem structurethe extent of their generality can be quantified To this end we proposedseveral variants of MNK-landscapes in order to fill the lack of syntheticproblems for online dynamic multi-objective problems Furthermore webuilt a new metric that tracks the set of best approximate solutions in time[303]These results were scaled to real-life problems arising from sustainableICT as the load balancing of resources [301]

In the context of dynamic environments we studied the stability of evo-lutionary algorithms for which the value of the objective functions changesdynamically subject to stochastic factors One of the application that I usedin order to illustrate the advantages and simplicity of this generic frameworkis by the convergence results that I provided in the case of distributed evo-lutionary algorithms subject to cheating [309]

42 Grants 143

Publications NA

Community-based Vehicular Network for Traffic Information inLuxembourgAcronym LUXCommTISReference PHD 2011-1ISPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2011-09-01 ndash 2014-08-31

Members Agata Grzybek

Domain(s) vehicular ad hoc networks coperative traffic information sys-tems trust management optimisation

Partner(s) NA

Description The near future will see a rapid proliferation of wireless com-munication technologies to vehicles allowing creation of wireless VehicularAd Hoc Networks (VANETs) The main motivation for this research is ve-hicular traffic efficiency in Luxembourg The objective of this PhD projectis to propose a cooperative traffic information system based on VANETs Itsmain goal is to capture evaluate and disseminate information about trafficsituation in Luxembourg received from vehicles connected by VANETs Thesystem is envisioned as an extension of the current solutions coordinated bycentralised traffic information agency These solutions are based on fixed in-frastructure like cameras and infrared sensors The information they provideis primarily limited to highways The VANET-based extension will allow areal-time trip planning based on up-to-date traffic information for all typesof roads The role of VANET-based part will be to collect traffic data ex-change it within the network and share it with the agency The role of theagency will be to collect the date from VANETs evaluate its quality inte-grate and disseminate to vehicles The use of the of vehicular-community andtrust management techniques will be used to ensure high quality of informa-tion The research will focus on the analysis modeling and implementationof novel mechanisms for (i) distributed VANET-based traffic data collec-tion (ii) efficient traffic data dissemination (within VANETs and betweenVANETs and traffic information agency) (iii) trust and user managementtechniques enabling to evaluate traffic data quality and trustworthiness ofsystem users To evaluate the system the project will also develop a gener-ator of realistic vehicular traffic for Luxembourg

144 Projects and Grants in 2012

Results The aim of this project is to propose Traffic Information System(TIS) using architecture based on Vehicular Ad Hoc Networks

bull Initial research requires a comprehensive literature survey in areas con-nected with VANETs (a) Network standards DSCR IEEE 80111pWAVE WiMax LTE (b) Routing protocols broadcast multicast(topology location based) unicast (c ) Traffic engineering (d) Trafficassignment (e) Game theory (f) Social networks

bull The first objective is to provide a framework for VANETs simulationwhich joins the latest versions of the most advanced Network Simu-lator (NS-3) with Traffic Simulator (SUMO) in a bidirectionaly wayThe aim of the developed simulation platform is to reproduce realistictraffic behavior in Luxembourg and then analyse and asses benefitsthat can be obtained by implementation of VANETs application Thepart of the project is to extend and optimise the realistic mobilitytraces generator (VehlLux)

bull After developing simulation platform TIS will be proposed Algorithmfor the evaluation of the quality of traffic information and new dissem-ination protocol will be tested and evaluated

Publications NA

Holistic autonomic Energy and thermal aware Resource Alloca-tion in cloud computingAcronym HERAReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget 37288eBudget UL NADuration 2011-09-15 ndash 2014-09-14

Members Mateusz Guzek

Domain(s) Cloud Computing Holistic Model Resource Allocation Multi-Objective Optimization Multi-Agent System Energy-Aware

Partner(s) Tri-ICT

Description Cloud Computing (CC) is a concept that has emerged outof the conception of heterogeneous distributed computing grid computingutility computing and autonomic computing Based on a pay-as-you-go

42 Grants 145

model it enables hosting pervasive applications from consumer scientificand business domains However data centers hosting Cloud applicationsconsume huge amounts of energy contributing to high operational costs andcarbon footprints to the environment Therefore Green Cloud computingsolutions are needed they should not only save energy for the environmentbut also reduce operational costs

Although Green computing in Cloud data centers has brought a tremen-dous interest many of the current green activities represent isolated op-timizations focusing on processing units memory networking or coolingIn order to efficiently manage Cloud data centersrsquo energy consumption wemust tackle the problem in a holistic manner which considers the variousresources and thermal aspects within the cloud computing as a whole Inthis context the aim of this PhD project is to design and develop a newholistic and autonomic energy-efficient approach to efficiently manage theresources of a CC The main milestones of this project are

bull creation of a novel holistic model In order to efficiently manage data-centersrsquo energy consumption we must tackle the problem in a holisticmanner

bull centralized optimization of the CC processing by multi-objective light-weight meta-heuristics using created holistic model to the least ensurethat a proper working of the CC system is established

bull proposition of a decentralized autonomic system which will dynami-cally optimize the CC system

The results of the centralized and decentralized system will be benchmarkedand then compared Final system will be tested using realistic assumptionsusing the field expertise supported by Tri ICT company

Results During the preparatory part of the project in the period 01012011-14092011 a number of publications were produced They investigate theprocessing (CPU) and its energy aspects of resource allocation

bull rdquoEnergy-Aware Scheduling of Parallel Applications with Multi-ObjectiveEvolutionary Algorithmrdquo EVOLVE 2011 [285]

bull rdquoScalable and Energy-Efficient Scheduling Techniques for Large-ScaleSystemsrdquo SCALSOL 2011 [294]

bull rdquoEnergy-Aware Fast Scheduling Heuristics in Heterogeneous Comput-ing Systemsrdquo OPTIM 2011 [295]

The first year of the project was devoted to holistic model creation andcentralized approaches exlporation and refinement which resulted in one

146 Projects and Grants in 2012

published conference paper [170] and one journal submission still under re-vision Additionally the multi-agent track of the project was tackled result-ing in one accepted conference submission to appear in 2013 The currentwork includes holistic model verification and development of Green Cloudsimulator

Publications NA

Energy-Efficient Networking in Autonomic Cloud ComputingAcronym INTERCOMReference PDR 2010-2ISPI Prof Dr Pascal BouvryFunding FNR AFR PostDocBudget NABudget UL NADuration 2011-06-01 ndash 2013-05-31

Members Dzmitry Kliazovich

Domain(s) Energy efficiency Cloud Computing Data center communica-tions

Partner(s) NA

Description The proposed INTERCOM project aims to provide a holisticenergy-efficient solution to autonomous management of interconnection net-works in a cloud computing environment It is a part of the currently ongoingFNR-COREGreen-IT project funded by Fonds National de la Recherche(FNR) Luxembourg The INTERCOM project aims to develop novel tech-niques and deliver efficient solutions in the form of prototype software mod-ules for energy-efficient performance optimization of (a) networking com-ponents (links transceivers switches etc) (b) data center communicationsystem as a whole and (c) communication protocols Most of current energyefficient solutions for data centers focus solely on either computing fabricoptimization or thermal management and only a few solutions account fornetworking aspects Therefore providing a holistic energy-efficient solutionfor a communication network at both hardware components and systemlevels of hierarchy constitutes the main innovative point of the project

Results One of the main results achieved in the project is related tothe release of GreenCloud simulation platform capable of fine-grained sim-ulation of cloud computing environments focusing on communication andenergy efficiency The GreenCloud platform is available for download athttpgreencloudgforgeunilu The detailed description of GreenCloud

42 Grants 147

and its components was published in Journal of Supercomputing specialissue on Green Networks citeKliazovich7483 Furthermore the Green-Cloud platform formed the basis for developing energy-efficient network-aware scheduling approaches published in Cluster Computing special issueon Green Networks in 2011 and in the IEEE International Conference onCloud Networking (CLOUDNET) citeKliazovich9732

Publications NA

Decision-theoretic fine tuning of multi-objective co-evolutionaryalgorithmsAcronym DeTeMOCGAsReference NAPI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2011-09-15 ndash 2014-09-14

Members Sune Steinbjoern Nielsen

Domain(s) Coevolutionary Genetic Algorithms Multi-Objective Opti-mization Decision theory Algorithm Fine-Tuning Systems Biology

Partner(s) LCSB

Description Most real world problems are extremely hard and approxi-mated approaches are used to solve them As a solution meta-heuristicsare nowadays used in many places from cutting steel bars to logistics toportfolio management on stock exchange But these parameter-based algo-rithms are either using some default value or hand tuning which might leadto very suboptimal results This PhD project aims at providing an analysisdesign and experimentation of Adaptive Multi-objective Competitive Co-evolutionary Genetic Algorithms a term that combines several state-of-the-art concepts from various fields We aim at reaching the following researchobjectives

bull Design and implement a novel competitive multi-objective coevolu-tionary genetic algorithm based on a game-theoretical model

bull Develop a decision-theoretic approach based on Markov decision pro-cesses game theory and fuzzy logic which will allow the adaptation(offline or online) of the local operators and parameters of the devel-oped algorithm so as to optimize its performance in practical prob-

148 Projects and Grants in 2012

lems

bull Carry out a detailed analysis of the special case of adaptive multi-objective competitive evolutionary algorithms which - to the best ofour knowledge - has not been addressed so far in the literature

bull Validate experimentally the new algorithms on cutting-edge problemsfrom Systems Biology in collaboration with the Luxembourg Centrefor Systems Biomedicine (LCSB) providing new tools for the analysisof biochemical (geneprotein) interaction networks

In addition to the novelty of using decision theory and machine learningto help steeringcontrolling game-theoretic models for global optimizationand the uniqueness of its meta-model representation this PhD project willalso provide a scientific bridge between the Luxembourg Centre of SystemBiomedicine (LCSB) and the Computer Science and Communications re-search unit (CSC)

Results Below is a list that enumerates the results obtained until now

bull Implemented cooperative co-evolutionary in jCell and adapted andoptimised the VehILux model The model was extended to supportmore fine-grained tuning as well as decomposed to specifically suit thecooperative coevolutionary algorithm The intelligent model decom-position was shown to help the coevolutionary algorithm find betterresults than both random decomposition and single population ap-proaches (article submitted to Genetic and Evolutionary ComputationConference - GECCO 2013)

bull Started collaboration with LCSB on a cutting edge protein-structureoptimisation problem

Publications

bull Improved a state-of-the-art cooperative co-evolutionary multi-objectiveevolutionary algorithm [300] by an alternative asynchronous imple-mentation in the jMetal(java) framework The modification imple-mented produced an additional speedup of 14 times on average andup to 19 times in best test cases (article submitted to Congress onEvolutionary Computation - CEC 2012)

bull Novel Efficient Asynchronous Cooperative Co-evolutionary Multi-ObjectiveAlgorithms [300]

42 Grants 149

Energy-Performance Optimization of the CloudAcronym EPOCReference AFR MARP C09IS05PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget 10812558 eBudget UL NADuration 2010-09-01 ndash 2013-08-31

Members Frederic Pinel

Domain(s) energy-efficiency cloud computing optimisation

Partner(s) North Dakota State University USA

Description This MARP PhD project as part of the overall FNR COREproject Green-IT will contribute to the solution of the energy efficiency inthe following ways

bull Model the computing clouds so that new methods can be designedto tackle the challenge This involves mathematical analysis of thevarious parts of the cloud

bull Based on the models defined previously design new algorithms (forexample from the fields of meta-heuristics and game theory) to energy-efficiently allocate resources of the cloud to client requests

bull Design methods for autonomic management of the cloud Distributedagents will cooperate to allow the cloud to self-recover from any inci-dent

bull Validate the implemented algorithms on large scale real-world infras-tructures Both Grid 5000 and North Dakota State Data Centers areavailable for this step

In addition to the theoretical contributions this project will develop realsoftware solutions

Results In order to find new algorithms to solve a scheduling problemwe used a statistical method to assist in the design of algorithms [38] Thisalgorithm was then applied to the energy-efficient mapping of tasks on a dis-tributed platform including recent low-power clusters operating the ARMprocessors

A new metaheuristic was designed specifically for the GPU [39] This al-gorithm was applied to the problem of scheduling tasks to a distributed

150 Projects and Grants in 2012

system such as a cloud or cluster This algorithm introduces a new sourceof concurrency that enables larger problem sizes to be solved on the GPUparallel computing platform

Publications See results

Risk Prediction Framework for Interdependent Systems usingGraph TheoryAcronym TIGRISReference PHD-09-103PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2009-10-15 ndash 2012-10-14

Members Thomas Schaberreiter

Domain(s) critical infrastructures security modelling graph modelling

Partner(s) NA

Description Critical infrastructure protection is an up-to-date topic Crit-ical infrastructure is usually composed of interdependent systems that relyon each other in order to function correctly or provide adequate securityThe interdependencies of the systems are usually quite complex to under-stand and therefore modelling of the infrastructure and its interdependenciescan be helpful in determining the security requirements During this worka model of interdependent systems based on graph theory will be proposedthat aims to model the security attributes of interdependent systems Ade-quate ways to model the security properties of infrastructure as well as of theinterdependencies will have to be found in order to achieve a close-to-realitymodel Furthermore machine learning tools will have to be developed inorder to process the graph and allow real-time simulations

Results

bull A method for critical infrastructure dependency analysis for criticalinfrastructure security modelling was investigated and published atCRITIS2011 conference (rdquoRisk assessment in critical infrastructure se-curity modelling based on dependency analysis (short paper)rdquo [341])

bull For the IST-Africa conference a publication about the critical infras-tructure security modelling approach and RESCI-MONITOR a crit-

42 Grants 151

ical infrastructure service risk monitoring tool were described andpresented (rdquoCritical Infrastructure Security Modelling and RESCI-MONITOR A Risk Based Critical Infrastructure Modelrdquo [339])

bull A trust-based method to evaluate the impact of a dependent critical in-frastructure service to a critical infrastructure service was investigatedand published CRISIS2011 conference (rdquoTrust based interdependencyweighting for on-line risk monitoring in interdependent critical infras-tructuresrdquo [338])

bull A set of assurance indicators that can evaluate correctness of calculatedcritical infrastructure service risk was investigated and published atCRITIS2011 conference (rdquoAssurance and trust indicators to evaluateaccuracy of on-line risk in critical infrastructuresrdquo [340])

Publications NA

Dynamic MixVoipAcronym DYMOReference 4105139PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2012-11-01 ndash 2015-10-31

Members Ana-Maria Simionovici

Domain(s) Optimization Learning and Anticipation Load BalancingVirtualization Evolutionary Computing Particle Algorithms

Partner(s) MixVoIP

Description The aims and context of this research project are built ona collaboration between the Computer Science and Communications (CSC)Research Unit University of Luxembourg and MixVoIP a Luxembourgbased company specialized in VoIP services The solutions currently de-ployed by MixVoIP while executed inside clouds are monolithic and notnatively designed for such environments As such the nature of the opera-tions carried by MixVoIP is deeply static and does not allow coping with thehighly dynamic evolution of requests load or other stochastic events There-fore in an effort of addressing those problems several axes of research will beinvestigated including dynamic optimization based on incoming load analy-sis and prediction resource allocation load balancing or energy-efficient op-

152 Projects and Grants in 2012

timization and management The study will hence investigate and proposenovel solutions that effectively combine evolutionary computing algorithmsexact methods learning and anticipation techniques (expert systems neuralnetworks and auto-regressive models) as well as resource allocation and loadbalancing methods All proposed approaches will be first tested on syn-thetic data benchmarks designed out of MixVoIP logs for the cloud-basedenvironment currently in use and last inside the real-life actual platformExpected outcomes and implications consider a significant extension of hestate of the art (with respect to dynamic predictive driven optimization)and our knowledge on how dynamic systems can be modeled and dealt within the presence of high magnitude stochastic factors At a practical levelas a direct application of those paradigms it is expected to attain an im-provement in voice quality and energy efficiency with a direct connection toinfrastructure management costs and performance

Results NA

Publications NA

Satellite Payload Reconfiguration OptimizationAcronym SaPROReference 1094873PI Prof Dr Pascal BouvryFunding FNR - AFR PhDBudget NABudget UL NADuration 2010-11-15 ndash 2013-11-14

Members Apostolos Stathakis

Domain(s) Satellite Payload Reconfiguration Exact algorithms Combi-natorial Optimization

Partner(s) SES Betzdorf Luxembourg

Description In order to answer the modern requirements for flexibilityand efficiency in communication satellites services the complexity and thesize of satellite payloads increases significantly As a consequence the man-ual management of the payload reconfiguration process is getting difficultand error prone for the engineers The problem of optimally configure andreconfigure the satellite payload is a multi-objective problem that comprisesobjectives like different path losses outage time to customers or threat tothe onboard equipment during the sequence of changes that would need tobe made to the switch matrix difficulty on restoring service for any single

42 Grants 153

amplifier failure etc This PhD work aims at addressing those issues withcontributions in the following domains

bull Payload architecture modeling propose a modular and scalable satel-lite payload architecture mathematical model describing all technicalconstraints and operational objectives

bull Multi-objective optimization provide payload configurations with op-timal or near optimal solutions for the whole set of objectives andrespecting all the satellite technical constraints

In addition to the theoretical contributions this project will develop a soft-ware framework that will help payload engineers to optimally reconfigurethe payloads efficiently

Results An Integer Linear Programming (ILP) model has been proposedfor the satellite payload reconfiguration problem that has been validatedwith success on realistic payloads The model describes the main opera-tional objectives It is extendable to new ones that may be of interest forthe satellite operator Additionally apart from its flexibility that allows theengineers to use the model for any payload system it interacts efficientlywith the internal software tools used by the engineers [173] [79] Theprocess of payload reconfiguration is a time critical operation It could bedemonstrated by the experimental results that many single and bi-objectiveproblem instances could be solved exactly within an acceptable time limitdefined by the engineers [78] However this is not the case for larger andmore complex instances where the required computational time for optimalsolutions may exceed the acceptable time constraints [79] We thus investi-gate metaheuristic methods to generate optimal or near optimal solutionsA first method that applies a local search algorithm was proposed and im-plemented providing promising results [325] A software framework thatintegrates the current theoritical results has been developped and is used bythe satelltie operator

Publications NA

154 Projects and Grants in 2012

A Computational Framework for Apprehending Evolving Mal-ware and Malware EngineersAcronym ANTI-MALWAREReference NAPI Dr Simon KramerFunding FNRndashAFR Post DocBudget 103 236 eBudget UL NADuration 2011-01-01 ndash 2012-12-31

Members Simon Kramer Sjouke Mauw

Domain(s) applied modal logic malware

Partner(s) NA

Description Simon Kramer carries out an AFR-FNR project that willdeliver a computational framework for apprehending evolving malware andmalware engineers In recent years the problem of malware (so-called ma-licious soft- and hardware and even entire computer networks) has becomea security-critical issue of national and even international importance withthe typical accompanying phenomenon which is the one of an arms raceThe proposed framework will address the multiple dimensions of the mal-ware problem in a unified way These dimensions are of spatial temporaleconomic legal and psychological nature The proposed framework willempower the multiple stake holders of computer systems which are theirdesigners and users the detectives and judges of malware engineers and thenational policy makers with computer assistance in their respective tasksThese tasks are the design of correct computer systems the safe use of com-puter systems the catching and conviction of malware engineers and thetaking of informed decisions and effective counter-measures against theserecent perpetrators of societal security

Results NA

Publications In 2012 the project resulted in the following publications [260261 262 263 264]

42 Grants 155

A Formal Approach to Enforced Privacy Modelling Analysisand ApplicationsAcronym EPRIV-MAAReference PHD-09-027PI Prof Dr Sjouke MauwFunding FNRndashAFRBudget 105222eBudget UL 105222eDuration 2009-12-01 ndash 2013-11-30

Members Sjouke Mauw Jun Pang Hugo Jonker Naipeng Dong

Domain(s) formal methods verification model checking security privacye-services

Partner(s) ENS Cachan Paris France

Description The project is part of a peerndashreviewed UL research projectEPRIV mdash lsquoA Formal Approach to Enforced Privacy in e-Servicesrsquo Theoverall goal of this project is to develop a domainndashindependent formal frame-work to express the proposed concept of enforced privacy We extend thenotion of enforced privacy outside the domain of voting Our formalizationwill take into account coalitionndashforming and defensive options Moreoverwithin this framework algorithms to verify these requirements will be de-veloped to facilitate verification with tool support This generic goal iscomposed of the following sub-goals

bull Lifting the notion of enforced privacy to other e-service domains suchas online auctions anonymous communications and healthcare andformalizing the resulting notions

bull Establishing per-domain formal notions to verify enforced privacy

bull Capturing these notions in a domain-independent formal framework

bull Investigating enhancements to the formal framework to verify privacy

Results The paper lsquoFormal Analysis of Privacy in an eHealth Protocolrsquo wasaccepted and presented at at the 17th European Symposium on Research inComputer Security ndash ESORICSrsquo12 [141]

Given the nature of health data privacy of eHealth systems is of prime im-portance An eHealth system must enforce that users remain private evenif they are bribed or coerced to reveal themselves or others Consider ega pharmaceutical company that bribes a pharmacist to reveal information

156 Projects and Grants in 2012

which breaks a doctorrsquos privacy In this paper we identify and formal-ize several new but important privacy notions on enforcing doctor privacyThen we analyze privacy of a complicated and practical eHealth protocolOur analysis shows to what extent these properties as well as propertiessuch as anonymity and untraceability are satisfied by the protocol Finallywe address the found ambiguities resulting in privacy flaws and proposesuggestions for fixing them

Publications The project resulted in the following publication in 2012[141]

Games for Modelling and Analysis of SecurityAcronym GMASecReference FNRndashAFR PHD-09-082PI Prof Dr Sjouke MauwFunding FNRndashAFRBudget 140000eBudget UL 140000eDuration 2009-11-01 ndash 2013-10-31

Members Sjouke Mauw Matthijs Melissen Wojciech Jamroga Leon vander Torre

Domain(s) formal methods game theory security imperfect informationgames verification model checking

Partner(s)

bull Universite Libre de Bruxelles Belgium

bull Colorado State University USA

bull GAMES Network

Description Game theory models the strategic interaction among vari-ous agents assuming each of the agents strives to increase his own pay-offSuch an interaction frequently occurs in security problems Examples arethe interaction between the attacker of a system and its defender or the in-teraction between two possibly dishonest participants in a security protocolTherefore game theory is a particularly relevant tool in the field of security

The GMASec project is executed in the context of the SndashGAMES projectand is a joint project of the SaToSS group headed by Prof Sjouke Mauwand the ICR group headed by Prof Leon van der Torre

42 Grants 157

Results A paper lsquoFairness in Non-Repudiation Protocolsrsquo [315] was pub-lished in the Proceedings of the 7th International Workshop on Security andTrust Management (STM) In this paper we indicate two problems withthe specifications of fairness that are currently used for the verification ofnon-repudiation and other fair-exchange protocols The first of these prob-lems is the implicit assumption of perfect information The second problemis the possible lack of effectiveness We solve both problems in isolation bygiving new definitions of fairness but leave the combined solution for furtherwork Moreover we establish a hierarchy of various definitions of fairnessand indicate the consequences for existing work

Publications The project resulted in the following publication in 2012[315]

Security Analysis Through AttackndashDefense TreesAcronym SADTReference PHD-09-167PI Prof Dr Sjouke MauwFunding FNR-AFR PhDBudget 141968eBudget UL 141968eDuration 2010-01-01 ndash 2013-12-31

Members Sjouke Mauw Patrick Schweitzer Barbara Kordy Sasa Radomirovic

Domain(s) security formal methods attack trees defense trees attack-defense trees security assessment

Partner(s)

bull Telindus Luxembourg

bull Sintef Norway

bull TXT e-solutions Italy

bull Cybernetica Estonia

bull EDF France

bull Lucerne University of Applied Sciences and Arts

Description The project Security Analysis Through AttackndashDefense Trees(SADT) is part of the ATREES project It aims to extend and unify at-tack trees introduced by Bruce Schneier in 1999 The extension of attack

158 Projects and Grants in 2012

trees will be achieved by adding defensive measures to attack trees to createAttackndashDefense Trees (ADTrees) This will allow security analysts to in-clude countermeasures into their analysis The unification will be achievedby developing one coherent formal framework for ADTrees This unificationwill facilitate the development of a software tool This tool will encompassmost existing attack tree approaches using only a single formalism

More concretely we will define a unified language for ADTrees introduceseveral semantics arising from different mathematical disciplines and alreadyexisting attack tree approaches and create a software tool that supportsthe work of security analysts With the help of case studies provided bythe several industry partners different use cases will be examined This willallow us to tailor and refine the language and semantics It will also help usto improve the usability of the software tool

The SADT project is a joint research project of the Interdisciplinary Centrefor Security Reliability and Trust (SnT) and SaToSS

Results In 2012 we published two journal articles and presented our workat one international conference The first journal article [258] lays the foun-dation of the ADTrees presents the results of the previous years The secondone [254] is an extended case study on how to apply the methodology AtICISCrsquo12 we presented our research on an informal and a correspondingformal way of how to use ADTrees for quantitative analysis

Publications The project resulted in following publications in 2012 [258][254]

Secure and Private Location Proofs Architecture and Designfor Location-Based ServicesAcronym SECLOCReference 794361PI Prof Dr Sjouke MauwFunding FNR-AFR PhDBudget 109137eBudget UL 109137eDuration 2010-08-01 ndash 2013-07-31

Members Sjouke Mauw Xihui Chen Jun Pang Gabriele Lenzini

Domain(s) security and privacy location based services location proofsformal verification trustworthy services security protocols

Partner(s) itrust Consulting Luxembourg

42 Grants 159

Description Location-based services are rapidly growing as mobile net-works become increasingly pervasive and the use of mobile devices is gettingmore popular Location-based applications make use of the physical loca-tion of the mobile device to provide services that are customized to thatlocation To be effective location-based services need trustworthy (secureand private) positioning data this depends upon the technology the com-ponents and the communication protocols employed for service compositionand provision For this reason researcher effort has been devoted to ad-dressing the problem of how to certify a physical location and of how toensure that location information is secure eg in term of data integritynon-transferability unforgeability and non-repudiation Meanwhile usershave their privacy concerns about how their location proofs are used egthey want to control when and to whom they need to present such proofs(anonymity) or they do not want a service provider to trace them

Both security and privacy are essential in the development of location proofsfor location-based services While in the literature most researchers onlyconsider security or privacy in isolation we will address the problem ofhow to securely provide a userrsquos location while adhering to the need-to-know principle for all other involved parties thereby satisfying also privacyrequirements of the users

We approach this challenge by analyzing the concepts and requirements forsecurity and privacy in a location proof management system We aim at anarchitecture addressing both security and privacy requirements We will de-sign securitycryptographic protocols which can be used as building blocksin implementing such architecture for a concrete application domain Thecorrectness of the developed protocols is guaranteed through formal verifi-cation At last an experimental system based on the proposed architectureand protocols will be built to validate our solutions wrt the security andprivacy requirements identified

Results In 2012 we have four international conference papers accepted andone journal paper submitted

bull we design a new electronic toll pricing system based on group signa-tures This paper has been published and presented in ARESrsquo12 [216]

bull we propose a post-hoc analysis on location privacy in electronic pricingsystems [255] This paper is co-authored with David Fonkwe and hasbeen presented in DPMrsquo12

bull we propose a new method to construct and compare usersrsquo mobilityprofiles [256] This paper is co-authored by Ran Xue and has beenaccepted by SACrsquo13

160 Projects and Grants in 2012

bull we measure usersrsquo query privacy when query dependency is taken intoaccount and propose a new anonymization algorithm to protect usersrsquoquery privacy [257] This paper has been accepted by CODASPYrsquo13

bull we perform a formal analysis on our electronic toll pricing systemndash GroupETP using ProVerif This paper has been submitted to thejournal JOWUA

Publications The project resulted in the following publications in 2012[216] [255] [256] [257]

Analysis of the SHA-3 Remaining CandidatesAcronym SHARCReference F1R-CSC-AFR-080000PI Prof Dr Alex BiryukovFunding FNR-AFR PostdocBudget 102620eBudget UL NADuration 2010-10-15 ndash 2012-10-14

Members Gaetan Leurent

Domain(s) Cryptography Secret Key Hash Functions CryptanalysisSHA-3

Partner(s) NA

Description This project is about the analysis of hash functions andwill be closely related to the SHA-3 competition currently run by NISTIn cryptography a hash function is a public function with no structuralproperties It is an essential primitive in modern cryptography used inmany protocols and standards including signatures schemes authenticationcodes and key derivation

Following devastating attacks against many widely used hash functions (in-cluding MD4 MD5 and SHA-1) NIST organized the SHA-3 competition toselect and standardize a new hash function This competition is similar tothe AES competition held in 1998-2000 and attracts worldwide attentionwith a large effort underway to assess the security of the candidates Duringthis project we will study the application of known cryptanalysis techniquesto the new designs submitted for the SHA-3 competition and try to developnew dedicated techniques tailored to some of the SHA-3 candidates

Results The paper ldquoPractical Partial-Collisions on the Compression Func-

42 Grants 161

tion of BMWrdquo is accepted for presentation at the 18th IACR Workshop onFast Software Encryption (FSE 2011)

Publications NA

Dynamic and Composite Service-Oriented Architecture Secu-rity TestingAcronym DYNOSTReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2010-10-01 ndash 2013-09-30

Members Alexandre Bartel PhD

Domain(s) Dynamic adaptive systems andoid security access-control pol-cies permission-based architecture Model-driven engineering

Partner(s) NA

Description Initially DYNOST dealt with rdquoDynamic and Composite Service-Oriented Architecture Security Testingrdquo

Dynamically Adaptive Systems modify their behavior and structure in re-sponse to changes in their surrounding environment and according to anadaptation logic Critical systems increasingly incorporate dynamic adap-tation capabilities examples include disaster relief and space explorationsystems One of the main questions to adress is rdquoHow can we test the secu-rity of such a system which is often seen as a black boxrdquo

As a first step we propose a fault model for adaptation logics which classifiesfaults into environmental completeness and adaptation correctness [1] Sincethere are several adaptation logic languages relying on the same underlyingconcepts the fault model is expressed independently from specific adapta-tion languages Taking benefit from model-driven engineering technologywe express these common concepts in a metamodel and define the opera-tional semantics of mutation operators at this level Mutation is appliedon model elements and model transformations are used to propagate thesechanges to a given adaptation policy in the chosen formalism Preliminaryresults on an adaptive web server highlight the difficulty of killing mutantsfor adaptive systems and thus the difficulty of generating efficient tests

Shift to Android

162 Projects and Grants in 2012

With FNR agreement the project evolved and now focuses much more on thesecurity of the Android software stack still keeping the dynamic adaptationaspect in mind Android is a permission based system on top of which runapplication developed by programmers and downloaded from markets byend-users Every application comes with a Manifest file containing a list ofthe permissions the application requires to run

Results We developed a static analysis tools which computes the appro-priate permission set for an application by analyzing its bytecode By com-paring the permission list generated by our tool to the original permissionlist we noticed that a non-negligible part of Android applications are over-privileged they do not respect the principle of least privilege

Publications One publication in 2011 [312]

A Testing Framework for Large-Scale ApplicationsAcronym PeerunitReference NAPI Prof Dr Yves Le TraonFunding NABudget NABudget UL NADuration 2011-01-15 ndash 2014-01-15

Members Jorge Meira (PhD)

Domain(s) NA

Partner(s) Federal University of Parana Brazil

Description The aim of this project is to develop a highly scalable testingarchitecture for large-scale systems This project has three main objectives

bull To design a scalable testing synchronization algorithm to execute large-scale tests This algorithm will be incorporated to the PeerUnit archi-tecture to test any kind of large-scale application besides P2P

bull To design a highly scalable and automatic oracle approach to vali-date large-scale tests This approach will be also incorporated to thePeerUnit architecture

bull To test popular large-scale systems (eg Hadoop Hive FreePastry)and to validate our algorithm and oracle approach Tests can be exe-cuted in an incremental schedule from a less complex scenario to a morecomplex one First we start testing simple applications in small-scale

42 Grants 163

(eg distributed word count) Then we test the same application inlarge-scale Finally we test a complex large-scale application (egHive data warehouse architecture)

Results The student has started his PhD this year (January 2011) and isfinishing his basic formation that is part of the Brazilian regulations to getthe degree This is predicted in the co-joint agreement In this formationthe student must fulfil thirty six (36) credits in taught courses which ingeneral takes 12-18 months The student will finish by December 2011 Inresearch the student is finishing his first paper and is already mastering thelarge-scale environment (ie Grid5000) that is going to be used throughoutthe project His findings are interesting and it is expected at least twoconference paper in the following couple of months

Publications NA

Selected Problems in Executable ModelingAcronym SPEMReference PHD-09-084PI Prof Dr Pierre KelsenFunding FNR-AFR PhDBudget NABudget UL NADuration 2009-11-15 ndash 2012-11-15

Members Moussa Amrani and Nuno Amalio

Domain(s) Model-Driven Engineering Domain-Specific Modeling Lan-guages Structural and Behavioural Specification Structural and BehavioralSemantics Executability

Partner(s) NA

Description Model-Driven Engineering considers models as first-class en-tity in the development process In this way developers deal only withmodels which are used at the required level of abstraction for each taskthey need to perform to finally generate actual code on a given platform

Transformations can also be modeled Transformations are the Model-Driven Engineering tool that allow one to make models change evolve to fi-nally compute something Transformation Languages can be classified in twotrends object-oriented languages and rule-based languages Each of thempresent some strengths but comes with some complications when dealingwith huge models and or huge transformations

164 Projects and Grants in 2012

The Model-Driven Engineering approach gained maturity over the yearsand started to be used for safety-critical and embedded softwares whereformal verification plays a key role in the validation of applications Formalverification could be performed either by model-checking exhaustively theexecution state space or by theorem-proving assertions and properties aboutthe execution states But to be able to use such techniques formal semanticsof transformation languages must be precisely specified

This PhD has three goals

1 Define the semantics of a transformation language

2 Equip a transformation language with the ability to define contractswhich are an abstract and adequate way of defining behavior withoutgoing into implementation details

3 Apply theorem-proving techniques to formally verify models and trans-formations against dynamic properties

Results Since the PhD started the last year the results are just comingThe results basically follows the first workpackages defined in the Afr pro-posal It is also important to mention participation in conferences and paperreview for a PhD

State of the Art in Model-Driven Engineering This year was largelydedicated to study the existing techniques and tools for structural andbehavioral modeling A Technical Report will be soon published onbehalf of the LassyCsc adressing these points and completed withthe graph- based tools

Semantics Specification of an Object-Oriented Transformation LanguageAn important result regarding the development of formal verificationtechniques over Domain-Specific Modeling Languages is the formalspecification of the semantics of such languages It is known to bea hard task but it is a necessary step towards formal and trustableverification In the next few months an article paper will be publishedsoon

Conference Summer School Participation The candidate participatedto one important conference in the domain namely the European Con-ference on Modeling Foundations and Applications (Ecmfa 2010) andthe First Summer School on Domain-Specific Modeling Theory andPractice (Dsm- Tp 2010)

Publications NA

42 Grants 165

422 Workshop amp Conferences (FNR Accompanying Mea-sures)

Building the Skeleton of a SO schedulerAcronym SandpileReference FNR11AM2c32PI Prof Dr Pascal BouvryFunding FNR - AM2cBudget 634900Budget UL NADuration 2012-03-01 ndash 2012-05-01

Members Juan Luis Jimenez Laredo

Domain(s) Optimization GridCloud Computing Load balancing schedul-ing

Partner(s) NA

Description This project aims at designing and implementing the skele-ton of an organic scheduler for GridCloud Computing so that it acquiresautonomic properties such as self-organization of tasks or self-healing underresource failures To cope with these goals the working hypothesis relieson the Self-Organizing Criticality theory (SOC) that describes a property ofcomplex systems and consists in a critical state formed by self-organizationat the border of order and chaos More specifically we will extend a SOCsystem so-called sandpile The sandpile is a nature-inspired cellular automa-ton where piles of sand are accumulated and balanced in a self-organized wayalong the lattice The metaphore here is that tasks can be seen as grainsof sand and resources as cells in the lattice Given the decentralized natureof resources in GridCloud Computing systems we propose a Peer-to-Peeragent-based system as the underlying infrastructure to construct the cel-lular automaton (ie agents represent cells with a neighbourhood definedby the Peer-to-Peer overlay network) In order to study the viability ofthe approach the initial objective of the project is to reduce the schedulelength (or makespan) of scientific directed acyclic graph (DAG) in whichthe destination group in Innsbruck has an extensive expertise and after-wards compare results against state-of-the-art approaches Here it has tobe noted that there are two divergent trends in the literature when ap-proaching DAG scheduling On the one hand the fittest approaches assume

166 Projects and Grants in 2012

an unrealistic accurate knowledge on the problem structure On the otherhand real middleware frameworks use much simpler heuristics such as justin-time planning or round robin Our approach aims to bridge this gap andproposes the skeleton of a scheduler for a do-as-you-like scheduling ie bymodifing simple rules the approach can be tuned from a non-clairvoyant to aperfectly-informed scheduler Not only this we aim to take advantage of thepotentials of the approach and redefine the optimization objective to meetthe energy-aware criteria described in the FNR Core GreenIT project forwhich the candidate Dr Jimenez Laredo is working As can be graspedfrom this summary the ambitious nature of the project will require of amulti-disciplinary set of experts We find that both organizations Inns-bruck and Luxembourg account with complementary people to bring theproject to success with Luxembourg having a stronger focus on energy op-timization and green computing and Innsbruck on middleware developmentand scientific workflows analysis The candidate Juan Luis Jimenez Laredofits especially well in this project given his expertise on the aforementionedareas that can be assessed by referring to some of his publications either inSOC or agent-based decentralized optimization

Results In this project we have designed and developed an on-line anddecentralized scheduler based on a Self-Organized Criticallity Model calledsandpile in which every computing resource executes a sandpile agent Thesource-code with the simulator has been released as open-source and is avail-able at httpssandpile-schedulergooglecodecom published under GPL v3public license Additionally a first publication has been already publishedin the Workshop of Soft-Computing Techniques in Cluster and Grid Com-puting Systems (httpalturlcom33vo3) from which an extended version isexpected to be published in Cluster Computing (2010 Impact Factor 0679)(httpalturlcomxkzuh) The whole text of the publication is available forchecking at httpalturlcomcypi6 This report presents the problem def-inition the main points of the followed methodology and a summary of theachieved results

Publications NA

Chapter 5

CSC Representation

51 Conferences

The following local events have been organized during 2012

bull IFIP AIMS 2012 Luxembourg Luxembourg Radu State

ndash Description 6th International Conference on Autonomous In-frastructure Management and Security (AIMS 2012) June 04-08 2012 University of Luxembourg Luxembourg

bull 13th International Workshop on Computational Logic in Multi-AgentSystems (2012-08-27 ndash 2012-08-28) Montpellier France Leon van derTorre

bull Capture The Flag competition 2012 (2012-10-23 ndash 2012-10-25) Lux-embourg Luxembourg Piotr Kordy Matthijs Melissen Sasa RadomirovicPatrick Schweitzer Hugo Jonker Andrzej Mizera Yann Le Corre aswell as a former member of the SaToSS group Dr Ton van Deursen

ndash Description In 2012 the hackbraten team headed by Piotr Ko-rdy represented the SaToSS group at the Capture the Flag Com-petition co-located with the Hacklu conference Capture TheFlag is a competition where registered teams solve computer chal-lenges within limited time It is part of the Hacklu conferenceTopics of the challenges include (among others) web security

168 CSC Representation

cryptography reverse engineering and forensic Example chal-lenges include finding vulnerabilities in the servers exploitingbuffer overflows in binary files or reverse engineering javascriptcode embedded in a pdf file The hackbraten team was ranked24th amongst 575 teams registered for the event

bull Workshop on Dynamics of Argumentation Rules and Conditionals(2012-04-02 ndash 2012-04-03) Luxembourg Luxembourg Richard BoothEmil Weydert Tjitze Rienstra (organisers)

bull European Conference on Artificial Intelligence (2012-08-27 ndash 2012-08-31) Montpellier France Tjitze Rienstra

bull EVOLVE 2012 International Conference Mexico City Mexico Alexandru-Adrian Tantar Emilia Tantar Pascal BOUVRY (General Chairs)

ndash Description A Bridge between Probability Set Oriented Numer-ics and Evolutionary Computing

bull Interdisciplinary PhD Workshop on Security in eVoting (eVote PhDDays 2012) (2012-10-14 ndash 2012-10-15) Luxembourg Luxembourg HugoJonker (main organizer)

ndash Description In 2012 the University of Luxembourg hosted the5th installment of the Interdisciplinary PhD Workshop on Se-curity in eVoting The goal of this workshop series is to fosterunderstanding and collaboration between the various disciplinesworking on e-voting as well as to provide an informal platformfor young researchers to present results discuss research ideasand research directions with their peers and expand their net-works There were 14 participants from 10 institutes across Eu-rope What makes this workshop series special is that it is trulyinterdisciplinary where PhD students from legal backgroundsare joined by PhD students with computer science and cryptog-raphy backgrounds and by social scientists

bull GreenGEC Workshop Genetic and Evolutionary Computation Con-ference Philadelphia USA Pascal Bouvry Alexandru-Adrian TantarEmilia Tantar Bernabe Dorronsoro Gregoire Danoy

ndash Description Green and Efficient Energy Applications of Geneticand Evolutionary Computation

bull The 5th Workshop on Logical Aspects of Multi-Agent Systems (LAMASrsquo2012)(2012-06-05 ndash 2012-06-05) Valencia Spain Wojciech Jamroga (co-organizer) Matthijs Melissen (co-organizer)

51 Conferences 169

ndash Description LAMAS is a scientific network spanning an inter-disciplinary community of researchers working on logical aspectsof MAS from the perspectives of logic artificial intelligence com-puter science game theory etc The LAMAS workshop is thepivotal event of the network and it provides a platform for pre-sentation exchange and publication of ideas in all these areasincluding

lowast Logical systems for specification analysis and reasoning aboutMAS

lowast Modeling MAS with logic-based models

lowast Deductive systems and decision procedures for logics for MAS

lowast Development complexity analysis and implementation of al-gorithmic methods for formal verification of MAS

lowast Logic-based tools for MAS

lowast Applications of logics in MAS

bull Normative Multi-Agent Systems (2012-03-12 ndash 2012-03-16) DagstuhlGermany Leon van der Torre

bull OPTIM 2012 (2012-07-02 ndash 2012-07-06) Madrid Spain Pascal Bou-vry Gregoire Danoy Bernabe Dorronsoro Sebastien Varrette (Work-shop Organisers)

ndash Description Workshop on Optimization Issues in Energy Effi-cient Distributed Systems

bull 20th International Conference on Real-Time and Network Systems(2012-11-08 ndash 2012-11-09) Pont-a-mousson France Nicolas Navet(General Chair)

ndash Description The purpose of the conference is to share ideas ex-periences and informations among academic researchers devel-opers and service providers in the field of real-time systems andnetworks

bull SCCG 2012 Victoria Canada Bernabe Dorronsoro (Workshop Or-ganisers)

ndash Description First International Workshop on Soft ComputingTechniques in Cluster and Grid Computing Systems

bull Summer School on Secure Voting (SecVotersquo2012) (2012-07-16 ndash 2012-07-20) Dagstuhl Germany Hugo Jonker (general chair)

170 CSC Representation

ndash Description The SecVote 2012 summer school covered the foun-dations of secure voting as well as examine recent developmentsin the field of e-voting The school provided a good overview ofwork in voting including design of voting systems social choicecryptography practical experiences practical deployment andauditing There were 27 participants coming from AustraliaBrazil the USA Israel Estonia Poland the UK the Nether-lands Luxembourg Italy and Germany

bull VTP 2012 San Francisco USA Pascal Bouvry Gregoire Danoy Patri-cia Ruiz Julien Schleich Marcin Seredynski (Workshop Organisers)

ndash Description Workshop on VANETs From Theory to Practice

bull Summer School on Verification Technology Systems amp Applications(VTSArsquo2012) (2012-09-03 ndash 2012-09-07) Saarbrucken Germany JunPang (coordinator)

ndash Description The fourth summer school on verification technol-ogy systems amp applications takes place at Max Planck Institutefor Informatics at Saarbrucken Germany from September 03rdto 7th 2012 All three aspects verification technology systems ampapplications strongly depend on each other and that progress inthe area of formal analysis and verification can only be madeif all three aspects are considered as a whole Five speakersArmin Biere Ahmed Bouajjani Jurgen Giesl David Monniauxand Carsten Schurmann stand for this view in that they repre-sent and will present a particular verification technology and itsimplementation in a system in order to successfully apply theapproach to real world verification problems There were about30 participants for the summer school More information can befound at httpwwwmpi-infmpgdeVTSA12

52 PC and other memberships

bull 26th AAAI Conference on Artificial Intelligence (2012-07-22 ndash 2012-07-26) Toronto Canada Richard Booth (PC member)

bull 25th Australasian Joint Conference on Artificial Intelligence Dec 4-72012 Sydney Australia Richard Booth (PC member)

bull 24th Benelux Conference on Artificial Intelligence Oct 25-26 2012Maastricht Netherlands Richard Booth (PC member)

52 PC and other memberships 171

bull Workshop on Belief Change Nonmonotonic Reasoning and ConflictResolution (2012-08-27 Montpellier France Richard Booth (PC mem-ber)

bull 3rd IIAI International Conference on e-Services and Knowledge Man-agement (2012-09-20 ndash 2012-09-22) Fukuoka Japan Richard Booth(PC member)

bull 13th European Conference on Logics in Artificial Intelligence (2012-09-26 ndash 2012-09-28) Toulouse Franch Richard Booth (PC member)

bull 6th Multi-Disciplinary International Workshop on Artificial Intelli-gence (2012-12-26 ndash 2012-12-28) Ho Chi Minh City Vietnam RichardBooth (PC member)

bull NMR 2012 - 14th International Workshop on Non-Monotonic Rea-soning (2012-06-08 ndash 2012-06-10) Rome Italy Richard Booth (PCmember)

bull NIDISC 2012 (2012-05-21 ndash 2012-05-25) Shanghai China PascalBouvry (Program Chair)

ndash Description 15th International Workshop on Nature InspiredDistributed Computing held in conjunction with the 26th IEEEACMInternational Parallel and Distributed Processing (IPDPS 2012)

bull VTP 2012 (2012-06-25 ndash 2012-06-25) San Francisco USA PAscalBouvry (General Chair)

ndash Description VANETs from Theory to Practice

bull BNAIC 2012 (2012-10-25 ndash 2012-10-26) Maastricht Netherlands Gre-goire Danoy (PC Member)

ndash Description 24th Benelux Conference on Artificial Intelligence

bull ICUMT 2012 (2012-10-03 ndash 2012-10-05) St Petersburg Russia Gre-goire Danoy (PC Member)

bull IEEE MENS 2012 (2012-12-03 ndash 2012-12-07) Anaheim USA GregoireDanoy (PC Member)

ndash Description 4th IEEE International Workshop on Managementof Emerging Networks and Services

bull NIDISC 12 (2012-05-21 ndash 2012-05-25) Shanghai China GregoireDanoy (Publicity Chair)

172 CSC Representation

ndash Description 15th International Workshop on Nature InspiredDistributed Computing held in conjunction with the 26th IEEEACMInternational Parallel and Distributed Processing (IPDPS 2012)

bull SCALSOL 2012 (2012-12-18 ndash 2012-12-18) Changzhou China Gre-goire Danoy (PC Member)

ndash Description The International Workshop on Scalable Solutionsfor GreenIT (SCALSOL) as part of The 12th IEEE InternationalConference on Scalable Computing and Communications (SCAL-COM 2012)

bull SCCG-2012 (2012-11-12 ndash 2012-11-14) Victoria Canada GregoireDanoy (PC Member)

ndash Description Workshop 1st International Workshop on Soft Com-puting Techniques in Cluster and Grid Computing Systems

bull VTP 2012 (2012-06-25 ndash 2012-06-25) San Francisco USA GregoireDanoy (PC Chair)

ndash Description VANETs from Theory to Practice

bull EVOLVE 2012 (2012-08-07 ndash 2012-08-09) Mexico City Mexico Bern-abe Dorronsoto (Program Committee)

ndash Description VOLVE 2012 A bridge between Probability SetOriented Numerics and Evolutionary Computation

bull GECCO 2012 (2012-07-07 ndash 2012-07-11) Philadelphia USA BernabeDorronsoto (Program Committee)

ndash Description ACM International Genetic and Evolutionary Op-timization Conference

bull GreenCom 2012 (2012-11-20 ndash 2012-11-23) Besancon France Bern-abe Dorronsoto (Program Committee)

ndash Description IEEE GreenCom 2012

bull HPMS-ECMS 2012 (2012-05-29 ndash 2012-06-01) Koblenz GermanyBernabe Dorronsoto (Program Committee)

ndash Description 26th European Conference on Modelling and Simu-lation (ECMS 2012) Track on High Perfomance Modelling andSimulation

52 PC and other memberships 173

bull IC3 2012 (2012-08-06 ndash 2012-08-08) Noida India Bernabe Dorronsoto(Program Committee)

ndash Description The Fifth International Conference on Contempo-rary Computing

bull MAEB 2012 (2012-02-08 ndash 2012-02-10) Albacete Spain BernabeDorronsoro (Program Committee)

ndash Description VIII Congreso Espanol sobre Metaheurısticas Al-goritmos Evolutivos y Bioinspirados

bull MENS-GLOBECOM 2012 Anaheim California USA Bernabe Dor-ronsoto (Program Committee)

ndash Description The 4th IEEE International Workshop on Manage-ment of Emerging Networks and Services (IEEE MENS 2012) inconjunction with IEEE GLOBECOM 2012

bull MICAI 2012 (2012-10-27 San Luis Potosı Mexico Bernabe Dor-ronsoto (Program Committee)

ndash Description The 11th Mexican International Conference on Ar-tificial Intelligence

bull NostraDamus 2012 Ostrava Czech Republic Bernabe Dorronsoto(Program Committee)

ndash Description The NostraDamus conference

bull P2PAMN track at 3PGCIC 2012 (2012-11-12 ndash 2012-11-14) VictoriaCanada Bernabe Dorronsoto (Program Committee)

ndash Description The 7th International Conference on P2P ParallelGrid Cloud and Internet Computing (3PGCIC-2012) track onP2P Ad-hoc and Mobile Networking

bull SCALSOL-SCALCOM 2012 (2012-12-18 ndash 2012-12-18) ChangzhouChina Bernabe Dorronsoro (Program Committee)

ndash Description The International Workshop on Scalable Solutionsfor GreenIT (SCALSOL) as part of The 12th IEEE InternationalConference on Scalable Computing and Communications (SCAL-COM 2012)

174 CSC Representation

bull WASI-CACIC 2012 ndash 2012-10-12) Bahıa Blanca Argentina BernabeDorronsoto (Program Committee)

ndash Description Workshop de Agentes y Sistemas Inteligentes (WASI)- XVIII Congreso Argentino de Ciencias de la Computacion (CACIC)

bull LAMAS 2012 (2012-06-05 ndash 2012-06-05) Valencia Spain WojciechJamroga (PC Co-chair)

ndash Description 5th Workshop on Logical Aspects of Multi-AgentSystems

bull The Twenty-Sixth Conference on Artificial Intelligence (AAAI-12) (2012-07-22 ndash 2012-07-26) Toronto Canada Wojciech Jamroga (PC Mem-ber)

ndash Description The purpose of the AAAI-12 conference is to pro-mote research in AI and scientific exchange among AI researcherspractitioners scientists and engineers in related disciplines

bull AAMAS 2012 (2012-06-04 ndash 2012-06-08) Valencia Spain WojciechJamroga (PC Member)

ndash Description The AAMAS conference series was initiated in 2002in Bologna Italy as a joint event comprising the 6th Interna-tional Conference on Autonomous Agents (AA) the 5th Interna-tional Conference on Multiagent Systems (ICMAS) and the 9thInternational Workshop on Agent Theories Architectures andLanguages (ATAL)

Subsequent AAMAS conferences have been held in MelbourneAustralia (July 2003) New York City NY USA (July 2004)Utrecht The Netherlands (July 2005) Hakodate Japan (May2006) Honolulu Hawaii USA (May 2007) Estoril Portugal(May 2008) Budapest Hungary (May 2009) Toronto Canada(May 2010) Taipei Taiwan (May 2011) AAMAS 2012 will beheld in June in Valencia Spain AAMAS is the largest and mostinfluential conference in the area of agents and multiagent sys-tems the aim of the conference is to bring together researchersand practitioners in all areas of agent technology and to providea single high-profile internationally renowned forum for researchin the theory and practice of autonomous agents and multiagentsystems

AAMAS is the flagship conference of the non-profit InternationalFoundation for Autonomous Agents and Multiagent Systems (IFAA-MAS)

52 PC and other memberships 175

bull BNAIC 2012 (2012-11-25 ndash 2012-11-26) Maastricht the NetherlandsWojciech Jamroga (PC Member)

ndash Description The 24th Benelux Conference on Artificial Intelli-gence (BNAIC 2012) is organised by the Department of Knowl-edge Engineering (DKE) of Maastricht University (UM) BNAIC2012 is organised under the auspices of the Benelux Associa-tion for Artificial Intelligence (BNVKI) and the Dutch ResearchSchool for Information and Knowledge Systems (SIKS)

bull CLIMA XIII (2012-08-27 ndash 2012-08-28) Montpellier France WojciechJamroga (PC Member)

ndash Description 13th International Workshop on Computational Logicin Multi-Agent Systems The purpose of the CLIMA workshops isto provide a forum for discussing techniques based on computa-tional logic for representing programming and reasoning aboutagents and multi-agent systems in a formal way More informa-tion about the series os CLIMA workshops including its previouseditions and publications can be found here

The 13th edition of CLIMA will be affiliated with ECAIrsquo12 andwill take place in Montpellier France between the 27th and 28thof August 2012

bull ECAI 2012 (2012-08-27 ndash 2012-08-31) Montpellier France WojciechJamroga PC Member()

ndash Description ECAI the biennial European Conference on Artifi-cial Intelligence is the leading conference on Artificial Intelligencein Europe

ECAI 2012 the 20th conference in this series will be jointly or-ganized by the European Coordination Committee for ArtificialIntelligence (ECCAI) the French Association for Artificial In-telligence (AFIA) and Montpellier Laboratory for InformaticsRobotics and Microelectronics (LIRMM)

LIRMM is a research laboratory supervised by both MontpellierUniversity (Universite Montpellier 2) and the French NationalCenter for Scientific Research (CNRS)

ECAI 2012 will give researchers from all over the world the possi-bility to identify important new trends and challenges in all sub-fields of Artificial Intelligence and it will provide a major forumfor potential users of innovative AI techniques

bull EUMASrsquo12 (2012-12-18 ndash 2012-12-19) Dublin Ireland Wojciech Jam-roga (PC Member)

176 CSC Representation

ndash Description Research on multi-agent systems has shed light ontoand provided solutions to many real life problems As the fieldmatures academics and industrialists benefit from European-based forums where state-of-the-art and state-of-the-practice arepresented and discussed The EUMAS series of events have servedthis purpose and in this 10th edition (following Maastricht TheNetherlands 2011 Paris France 2010 Aiya Napa Cyprus 2009Bath England 2008 Hammamet Tunisia 2007 Lisbon Portu-gal 2006 Brussels Belgium 2005 Barcelona Spain 2004 Ox-ford England 2003) we shall carry on in this tradition The EU-MAS series of workshops is primarily intended as a European fo-rum at which researchers and those interested in activities relat-ing to research in the area of autonomous agents and multi-agentsystems can meet present (potentially preliminary) research re-sults problems and issues in an open and informal but academicenvironment

bull ICAART 2012 (2012-02-06 ndash 2012-02-08) Vilamoura Portugal Woj-ciech Jamroga (PC Member)

ndash Description The purpose of the 5th International Conference onAgents and Artificial Intelligence (ICAART) is to bring togetherresearchers engineers and practitioners interested in the theoryand applications in these areas Two simultaneous but stronglyrelated tracks will be held covering both applications and currentresearch work within the area of Agents Multi-Agent Systemsand Software Platforms Distributed Problem Solving and Dis-tributed AI in general including web applications on one handand within the area of non-distributed AI including the moretraditional areas such as Knowledge Representation PlanningLearning Scheduling Perception and also not so traditional ar-eas such as Reactive AI Systems Evolutionary Computing andother aspects of Computational Intelligence and many other areasrelated to intelligent systems on the other hand

53 Doctoral board

bull Cynthia Wagner University of Luxembourg Luxembourg Luxem-bourg March 2012 2012 Thomas Engel

bull Shaonan Wang University of Luxembourg Luxembourg LuxembourgApril 2012 Thomas Engel

54 Guests 177

bull Sheila Becker University of Luxembourg Luxembourg LuxembourgOctober 2012 2012 Thomas Engel

bull Sheila Becker UL Luxembourg Luxembourg October 2012 2012Yves Le Traon

bull Frederic Garcia Becerro University of Luxembourg Luxembourg Lux-embourg March 2012 2012 Bjorn Ottersten Thomas Engel

bull Thorsten Ries University of Luxembourg Luxembourg LuxembourgOctober 2012 2012 Thomas Engel

54 Guests

Invited Researchers

bull Prof Dr Andreas Albers (Goethe University of Frankfurt) October2012 Hugo Jonker Reason Research collaboration and presentation

bull Dr Dragos Horvath (Louis Pasteur University Strasbourg) October2012 Alexandru-Adrian Tantar Reason collaboration on samplingalgorithms

bull Dr Marek Bednarczyk (Polish Academy of Sciences Gdansk) May2012 Wojciech Jamroga Reason Research collaboration and pre-sentation

bull Dr Fei Gao (Norwegian University of Science and Technology (NTNU))October 1-12 2012 Pascal Bouvry Reason Collaboration on parallelevolutionary computing

bull Prof Dr Joanna Kolodziej (Cracow University of Technology) June2012 Pascal Bouvry Reason Collaboration on green computing re-search activities

bull Prof Dr Pierre Manneback (University of Mons) April 2012 PascalBouvry Reason Parallel computing research collaboration

bull Prof Dr Malgorzata Sterna (Poznan University of Technology) Jan-uary 2012 Pascal Bouvry Reason Collaboration on scheduling re-search activities

bull Dr Alexey Vinel (Tampere University of Technology Finland) august2012 Pascal Bouvry Reason Collaboration on wireless networksactivities

178 CSC Representation

bull Dr Nils Bulling (Clausthal University of Technology ) April 2012Wojciech Jamroga Reason Research collaboration and presentation

bull Dr Kostas Chatzikokolakis (LIX Ecole Polytechnique amp INRIASaclay) April 2012 Jun Pang Xihui Chen Reason Research col-laboration and presentation

bull Prof Dr Jason Crampton (Royal Holloway University of London)JUly 2012 Barbara Kordy Reason Research collaboration and pre-sentation

bull Dr Cas Cremers (ETH Zurich) August 2012 Sjouke Mauw ReasonResearch collaboration and presentation

bull Mrs Denise Demirel (TU Darmstadt) May 2012 Hugo Jonker Rea-son Research collaboration

bull Mr Andre Deuker (Goethe University of Frankfurt) October 2012Hugo Jonker Reason Research collaboration and presentation

bull Prof Dr Josep Domingo-Ferrer (Universitat Rovira i Virgili Catalunya) October 2012 Sjouke Mauw Barbara Kordy Reason Research col-laboration and presentation

bull Mr Santiago Iturriaga (Universidad de la Republica Uruguay) April1 to June 30 2012 Pascal Bouvry Reason Co-advising his workon parallel multi-objective local search heuristics for multi-objectivescheduling problems

bull Prof Dr Sergio Nesmachnow (Universidad de la Republica Uruguay)14-18 May 2012 Pascal Bouvry Reason Co-advising his work on par-allel multi-objective local search heuristics for multi-objective schedul-ing problems

bull Dr Alexandre Dulaunoy (CIRCLSMILE Luxembourg) December2012 Gabriele Lenzini Barbara Kordy Reason Research discussionand presentation

bull Prof Dr Eduardo Ferme (University of Madeira Portugal) Nov 1-22012 Reason ICR-ILIAS talk research collaboration

bull Ms Weili Fu (Free University of Bolzano and Technical University ofDresden ) July 2012 Sjouke Mauw Barbara Kordy Reason Researchpresentation

bull Dr Flavio Garcia (Radboud University Nijmegen) April 2012 SjoukeMauw Reason Research discussion

54 Guests 179

bull Prof Dr Valentin Goranko (Technical University of Denmark) June2012 Wojciech Jamroga Reason Research collaboration and presen-tation

bull Mr Mohammad Hassan Habibi (ISSL Lab EE Department SharifUniversity of Technology) April 2012 Sjouke Mauw Barbara Kordy Reason Research presentation

bull Prof Dr Lynda Hardman (CWI Amsterdam) December 2012 SjoukeMauw Reason discussion

bull Prof Dr Iyad Rahwan ( Masdar Institute of Science and Technology)May 17-19 2012 ICR-ILIAS Reason attending the defence ceremonyof Yining Wu

bull Mr Oljira Dejene Boru (University of Trento Italy) March - June2012 Dzmitry Kliazovich Reason Master internship

bull Mr Sisay Tadesse (University of Trento Italy) March - June 2012Dzmitry Kliazovich Reason Master internship

bull Prof Dr Tomasz Lipniacki (Institute of Fundamental Technologi-cal Research Polish Academy of Sciences) December 2012 AndrzejMizera Jun Pang Reason CSC-Bio research presentation

bull Dr Yang Liu (National University of Singapore) June 2012 Jun Pang Reason Research collaboration and presentation

bull Dr Madalina Croitoru (University of Montpellier 2) November 26-302012 Reason ICR-ILIASresearch collaboration

bull Mr Artur Meski (Polish Academy of Sciences Warsaw) April 2012Wojciech Jamroga Reason Research presentation

bull Prof Dr Marko Bertogna (University of Modena Italy) June 2012Nicolas Navet Reason Real-time Dependable Systems seminar atLASSY

bull Dr Liliana Cucu-Grosjean (INRIA France) June 2012 Nicolas NavetReason Real-time Dependable Systems seminar at LASSY

bull Dr Rob Davis (University of York UK) June 2012 Nicolas NavetReason Real-time Dependable Systems seminar at LASSY

bull Mr Stephan Neumann (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration and presentation

bull Dr Evangelos Evangelos (University of the Aegean) January 2012Sasa Radomirovic Reason Research collaboration and presentation

180 CSC Representation

bull Mrs Maina Olembo (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration

bull Prof Dr Andrei Tchernykh (CICESE research center EnsenadaMexico) October 2012 Pascal Bouvry Reason Collaboration andcontribution to FNR CORE GreenIT project

bull Prof Dr Pierre-Etienne Moreau (INRIA-Nancy France) Yves LeTraon Reason Collaboration

bull Prof Dr Selwyn Piramuthu (University of Florida) June-July 2012SaToSS group Reason visiting professor at SnT and SaToSS group

bull Prof Dr Henry Prakken (Utrecht University) May 2012 Leon vander Torre Reason Attending the defence ceremony of Yining Wu

bull Dr Hongyang Qu (Oxford University) November 2012 Jun Pang Reason Research collaboration and presentation

bull Dr Sasa Radomirovic (ETH Zurich) November 2012 Sjouke MauwBarbara Kordy Reason Research collaboration and presentation

bull Dr Rolando Trujillo Rasua (Universitat Rovira i Virgili Catalunya) October 2012 Sjouke Mauw Barbara Kordy Reason Researchcollaboration and presentation

bull Dr MohammadReza Mousavi (Eindhoven University) January 2012Jun Pang Reason Research collaboration and presentation

bull Prof Dr Olivier Roux (Ecole Centrale de Nantes) April 2012 SjoukeMauw Jun Pang Reason Research collaboration and presentation

bull Prof Dr Samir Chopra (Brooklyn College of the City University ofNew York USA) Nov 12-16 2012 Reason talk research collabora-tion

bull Dr Samy Passos (Universidade Federal do Ceara) Jul 10 - Aug 122012 Reason ICR-SnT talk research collaboration

bull Mr Maciej Szreter (Polish Academy of Sciences Warsaw) April 2012Wojciech Jamroga Reason Research collaboration

bull Ms Iuliia Tkachenko (University Bordeaux 1) July 2012 Sjouke MauwBarbara Kordy Reason Research presentation

bull Dr Devrim Unal (TUBITAK-BILGEM UEKAE Turkey ) November2012 Sjouke Mauw Barbara Kordy Reason Research presentationand discussion

55 Visits and other representation activities 181

bull Dr Matthias Thimm (Universitat Koblenz) June 18-19 2012 ICR-ILIAS Reason talk research collaboration

bull Dr Harm van Beek (Netherlands Forensic Institute) June 2012 SjoukeMauw Reason Research collaboration and presentation

bull Mr Andre van Cleeff (University of Twente) March 2012 SjoukeMauw Reason Research collaboration and presentation

bull Dr Melanie Volkamer (TU Darmstadt CASED) April 2012 HugoJonker Reason Research collaboration

bull Dr Melanie Volkamer (TU Darmstad CASED) October 2012 HugoJonker Reason invited lecture

bull Mr Pim Vullers (Radboud University Nijmegen) February 2012 SjoukeMauw Sasa Radomirovic Reason Research collaboration and pre-sentation

bull Dr Roland Wen (University of New South Wales Australia ) Septem-ber 2012 Hugo Jonker Reason Research collaboration

bull Dr Jan Willemson (Cybernetica Estonia) May 2012 Barbara KordyPatrick Schweitzer Sjouke Mauw Reason Research collaborationand presentation

bull Dr Zhenchang Xing (National University of Singapore) June 2012Jun Pang Reason Research collaboration and presentation

55 Visits and other representation activities

bull Richard Booth Visited organization Katholieke Universiteit Leuven(Oct 18-23 2012) Reason Research collaboration

bull Martin Caminada Visited organization (June 1-2 2012) Reasonparticipation in COST AT coordination network on behalf of ICR

bull Wojciech Jamroga Visited organization (6-8062012) Reasonconference participation contributed talk poster presentation

bull Wojciech Jamroga Visited organization Polish Academy of Sciences(2minus 4042012) Reason work on a joint paper

bull Wojciech Jamroga Visited organization Technical University of Den-mark (19minus 21042012) Reason Research collaboration and presen-tation

182 CSC Representation

bull Wojciech Jamroga Visited organization Clausthal University ofTechnology (20minus 25022012) Reason Research collaboration

bull Wojciech Jamroga Visited organization Polish-Japanese IT Institute(31012012) Reason Research collaboration

bull Wojciech Jamroga Visited organization International PhD Programme(29 minus 30012012) Reason Meeting of the International PhD Pro-gramme project overview talk

bull Wojciech Jamroga Visited organization Polish Academy of Sciences(25minus 26062012 ) Reason supervision of a PhD student

bull Wojciech Jamroga Visited organization LAMAS 2012 (4minus5062012)Reason workshop organization

bull Wojciech Jamroga Visited organization Dagstuhl seminar on Nor-mative Multi-Agent Systems (14032012) Reason seminar visit

bull Wojciech Jamroga Visited organization Trento University (28 minus29052012) Reason Research collaboration and presentation

bull Hugo Jonker Visited organization Cyberwarfare thinktank (09112012)Reason Founding meeting Cyberwarfare thinktank

bull Hugo Jonker Visited organization Privacy Lab (03042012) Rea-son Privacy Lab opening

bull Hugo Jonker Visited organization Digital Enlightenment Forum(18minus 19062012) Reason networking event

bull Hugo Jonker Visited organization TDL Consortium (05102012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization TDL Consortium (23012012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization TDL Consortium (12062012)Reason TDL workgroup meeting

bull Hugo Jonker Visited organization Thales Research amp Technology(29112012) Reason Attack Trees workshop research collaboration

bull Hugo Jonker Visited organization VeriMag (11minus 13112012) Rea-son Research collaboration

bull Dzmitry Kliazovich Visited organization GREENET project meet-ing (19-09-2012 - 21-09-2012) Reason Initial Training Network onGreen Wireless Networks - Seminar presentation

55 Visits and other representation activities 183

bull Dzmitry Kliazovich Visited organization Koc Universtiy - COSTIC0804 Meeting (05-10-2012 - 07-10-2012) Reason Presentation -GreenCloud A Packet-level Simulator of Energy-aware Cloud Com-puting Data Centers

bull Dzmitry Kliazovich Visited organization University of Trento (17-11-2012) Reason Seminar presentaiton - Energy-Efficient Design inCloud Computing Communication Systems

bull Barbara Kordy Visited organization University of Twente (05 minus06112012) Reason FP7 TREsPASS project kick off meeting

bull Barbara Kordy Visited organization LORIA (15052012) ReasonResearch collaboration and presentation

bull Barbara Kordy Visited organization Royal Holloway University ofLondon (01032012) Reason Research collaboration and presenta-tion

bull Barbara Kordy Visited organization SINTEF (16 minus 19042012)Reason Research collaboration

bull Barbara Kordy Visited organization NTNU (16minus19042012) Rea-son Invited talk

bull Barbara Kordy Visited organization Thales Research amp Technol-ogy (29112012) Reason Keynote presentation at the Attack Treesworkshop and collaboration

bull Simon Kramer Visited organization Institute of Mathematical Sci-ences (0101minus 28022012) Reason invited research visit

bull Juan Luis Jimenez Laredo Visited organization University of Inns-bruck (01-03-2012 to 05-05-2012) Reason Research visit in the con-text of the AM2c FNR11AM2c32Building the Skeleton of a SOscheduler

bull Yves Le Traon Visited organization 7th International Workshopon Automation of Software Test (AST 2012) (June 2012) ReasonKeynote on Security testing and software engineering challenges

bull Yves Le Traon Visited organization 8th International Summer Schoolon Training And Research On Testing (TAROT 2012) (July 2012)Reason Invited Keynote on Security Testing

bull Yves Le Traon Visited organization LCIS-ESISAR INPG (23-25August 2012) Reason Attract PhD students build collaboration onsensor networks and testing

184 CSC Representation

bull Yves Le Traon Visited organization INRIA-IRISA (August Novem-ber ) Reason Continuous collaboration Project writing seminarsrecruitment of research associates

bull Yves Le Traon Visited organization Microsoft Luxembourg (March2012) Reason Presentation of my group research activities to MS

bull Yves Le Traon Visited organization KIT Karlsruhe (several meetingsper year) Reason Collaboration (EU project PhD co-supervision)

bull Yves Le Traon Visited organization Lip6 - Univ Paris VI (July2012) Reason Collaboration on SPL reverse engineering and testing

bull Yves Le Traon Visited organization Telecom Bretagne (April andJuly 2012) Reason PhD supervision Project proposals writing

bull Llio Humphreys Visited organization Delft University of Technology(18-21 November2012) Reason research visit

bull Llio Humphreys Visited organization Kings College London (28 June2012) Reason research visit

bull Sjouke Mauw Visited organization COST DC ICT (13minus16062012)Reason project meeting

bull Sjouke Mauw Visited organization COST IC1205 (30112012)Reason project meeting

bull Sjouke Mauw Visited organization COST DC ICT (10minus11092012)Reason project meeting

bull Sjouke Mauw Visited organization Digital Enlightenment Forum(18minus 19062012) Reason networking event

bull Sjouke Mauw Visited organization University of Twente (05minus06112012)Reason FP7 TREsPASS project kick off meeting

bull Sjouke Mauw Visited organization Nationaal Instituut voor Crim-inalistiek en Criminologie (NICC) (23012012) Reason Researchcollaboration and presentation

bull Sjouke Mauw Visited organization IFIP WG 112 seminar (04072012)Reason presentation

bull Sjouke Mauw Visited organization STM 2012 (12 minus 14092012)Reason conference visit and presentation

bull Sjouke Mauw Visited organization Thales Research amp Technology(29112012) Reason Attack Trees workshop research collaboration

55 Visits and other representation activities 185

bull Nicolas Navet Visited organization University of Nantes (June 82012) Reason Lecture rdquoIndustrial practices of real-time schedulingrdquoat the colloquium rdquo1972-2012 40 years of research in real-time schedul-ingrdquo scientific days of the University of Nantes June 8 2012

bull Jun Pang Visited organization Nanjing University (08minus12102012)Reason Research collaboration

bull Xavier Parent Visited organization Imperial College and Kingrsquos Col-lege London (29 April - 4 march 2012) Reason Presentation at sym-posium and research collaboration

bull Johnatan E Pecero Visited organization National Electronics andComputer Technology Center (NECTEC) (6-12-2012) Reason En-ergy efficient solutions for cloud and HPC green scheduling and nextgeneration hardware

bull Sasa Radomirovic Visited organization Nationaal Instituut voorCriminalistiek en Criminologie (NICC) (23012012) Reason Re-search collaboration and presentation

bull Tjitze Rienstra Visited organization Twente University (February27 - March 2 2012) Reason talk research collaboration

bull Patrick Schweitzer Visited organization KTH (24042012) ReasonResearch presentation

bull Patrick Schweitzer Visited organization NTNU (16 minus 19042012)Reason Research collaboration

bull Patrick Schweitzer Visited organization SINTEF (16minus 19042012)Reason Research collaboration and presentation

bull Alexandru-Adrian Tantar Visited organization 2012 IEEE WorldCongress on Computational Intelligence (WCCI) (June 10-15 2012)Reason Green Evolutionary Computing for Sustainable Environments(tutorial)

bull Silvano Tosatto Visited organization Sophia Antipolis (February 8-11 2012) Reason Research collaboration

bull Silvano Tosatto Visited organization University of Queensland (May15- June 1 2012) Reason Research collaboration

bull Paolo Turrini Visited organization Technical University of Denmark(May 1-8 2012) Reason Research collaboration

186 CSC Representation

56 Research meeting

bull 13th International Workshop on Computational Logic in Multi-AgentSystems (2012-08-27 ndash 2012-08-28)

ndash Description Montpellier France

bull Joint UR-Math and UR-CSC Discrete Mathematics Colloquium (2010-05-10 ndash 2012-04-03) Number of presentations 15

ndash Description The Decision Aid Systems group within the Com-puter Science and Communication Research Unit (CSC) and theDiscrete Mathematics group within the Mathematics ResearchUnit (MATH) of the University of Luxembourg organize period-ically a common research seminar Regular Members

lowast R Bisdorff (responsible co-organiser CSC)

lowast M Couceiro (ass researcher postdoc MATH)

lowast E Lehtonen (ass researcher postdoc CSC)

lowast J-L Marichal(responsible co-organiser MATH)

lowast P Mathoney (ass researcher postdoc MATH)

lowast A Olteanu (assistantPhd studentCSC)

lowast Th Veneziano (assistantPhd studentCSC)

lowast T Walhauser (ass researcher postdoc MATH)

bull ICR Seminars

ndash Description Typically weekly (Monday 4pm) Seminar with guestresearchersInternal seminar

bull MINE Research Meeting (2012-01-09 ndash 2012-12-04) Number of presen-tations 24

ndash Description Research meetings

lowast Prof Dr Stephan Busemann German Research Centre forArtificial Intelligence 5 CET meetings (official and unofficialmeetings)

lowast Dr Urich Schaefer German Research Centre for ArtificialIntelligence 2 CET meetings (official and unofficial meet-ings)

lowast Prof Dr Theoharry Grammatikos Dept of Finance (LSF)15 meetings FNR CORE Project ESCAPE

lowast Dr Georges Krier SES 2 CET meetings (official and unoffi-cial meetings)

56 Research meeting 187

lowast Prof Dr Susanne Jekat University of Winterthur Dept ofLinguistics 1 inofficial CET meeting

bull ILIAS - TeamBouvry Seminars

ndash Description Research team meetings and one yearly team meet-ing with 25 presentations organized in November

bull Lassy Seminar

ndash Description This seminar is given several times a year by invitedspeakers on topics related to software construction

bull MAO - Multi-Agent Organisation (2011-12-19 ndash 2011-12-23)

ndash Description Leiden The Netherlands

bull Norm group research meeting

ndash Description weekly (Friday 2pm) presentations by guest re-searchers and internal members

bull Normative Multi-Agent Systems (2012-03-11 ndash 2012-03-16)

ndash Description Dagstuhl Germany

bull SaToSS Research Meeting

ndash Description On Tuesdays from 1030 to 1130 the SaToSS groupand the APSIA group led by Prof Peter YA Ryan hold theirweekly Security Research Meeting (SRM) The purpose of theSRM is to present and discuss research problems that are interest-ing for the members of both groups In 2012 Sasa RadomirovicBarbara Kordy and Jean Lancrenon were responsible for the or-ganization of the SRM The meeting featured 50 presentations in2012 Notable speakers in 2012 include Prof Luca Vigano ProfJason Crampton and Prof Josep Domingo-Ferrer The completelist of speakers as well as our seminar rules can be found at theseminar webpage httpsatossuniluseminarssrm

188 CSC Representation

Chapter 6

CSC Software

bull ACL-Lean Licence Free

ndash Description Developers Daniele Rispoli and Valerio Genovese

ACL-Lean is a decidable theorem prover (written in PROLOG)for propositional access control logics with says operator ACL-Lean implements an analytic labelled sequent calculus for condi-tional access control logics presented in V Genovese L GiordanoV Gliozzi and G L Pozzato ldquoA Conditional Constructive Logicfor Access Control and its Sequent Calculusrdquo 20th InternationalConference on Automated Reasoning with Analytic Tableaux andRelated Methods

bull ADTool Licence free use

ndash Description The attackndashdefense tree language formalizes andextends the attack tree formalism It is a methodology to graph-ically analyze security aspects of scenarios With the help ofattributes on attackndashdefense trees also quantitative analysis canbe performed As attackndashdefense tree models grow they soonbecome intractable to be analyzed by hand Hence computersupport is desirable Software toll called the ADTool has beenimplemented as a part of the ATREES project to support theattackndashdefense tree methodology for security modeling The mainfeatures of the ADTool are easy creation efficient editing andquantitative analysis of attackndashdefense trees The tool is avail-able at httpsatossunilusoftwareadtool The tool was

190 CSC Software

realized by Piotr Kordy and its manual was written by PatrickSchweitzer

bull ARGULAB Licence GPL v3

ndash Description Developers Mikolaj Podlaszewski

We present an implementation of the recently developed per-suasion dialogue game for formal argumentation theory undergrounded semantics The idea is to apply Mackenzie-style dia-logue to convince the user that an argument is or is not in thegrounded extension Hence to provide a (semi-)natural user in-terface to formal argumentation theory

bull bagit Licence non-redistributable for internal use only

ndash Description An internal web-based tool that provides assistanceto research groups by storing pooling tagging and indexing pa-pers and other publications Developed by Christian Glodt In2012 minor bugfixes have been applied to Bagit

bull Canephora Licence free use

ndash Description Trust opinions can be represented as probability dis-tributions over an (unknown) integrity parameter Simple trustopinions (that are based only on personal observations) can berepresented as a class of distributions known as Beta distribu-tions Trust opinions that are based on recommendations do not(necessarily) have such a simple representation Canephora nu-merically approximates the trust opinion that can be inferredfrom a recommendation Precision and coarseness of the resultcan be selected The result may depend on the strategy of therecommender Canephora allows implementations of such pos-sible strategies to be added on the fly The tool was createdby Tim Muller and can be accessed at httpsatossunilu

softwarecanephora

bull mCarve and cCarve Licence free use

ndash Description mCarve and cCarve are software tools for carvingattributed dump sets These dump sets can for instance beobtained by dumping the memory of a number of smart cards orby regularly dumping the memory of a single smart card duringits lifetime The tools help in determining at which location inthe dumps certain attributes are stored mCarve is written inPython and is available from httpsatossunilusoftware

191

mcarve More information about mCarve can be obtained fromour paper [259] cCarve is written in C++ It implements alinear algorithm for carving attributed dump sets which improvesits run time with respect to mCarve cCarve is available fromhttpsatossunilusoftwareccarve

bull delegation2spass Licence Free

ndash Description Developers Daniele Rispoli and Valerio Genovese

delegstion2spass is a parser (written in SCHEME) which imple-ments a set of complete reduction axioms and translates dynamicformulas for a delegationrevocation logic into propositional logicexpressed in DFG syntax

bull Democles Licence Freely redistributable see details athttpdemocleslassyunilulicensehtml

ndash Description Democles is a modeling tool that supports the EPlanguage developed by LASSYs MDE group It is mainly devel-oped by Christian Glodt In 2012 the following improvementswere made to Democles Nuno Amalio started work on imple-menting an EP-to-Alloy transformation for EP systems in Demo-cles Christian Glodt created a branch of Democles implement-ing model bridging interfaces as described in Sam Schmitrsquos MasterThesis rdquoA Bridging Mechanism for Adapting Abstract Models toPlatformsrdquo

bull Discrete Particle Method (DPM) Licence Internal use only

ndash Description The Discrete Particle Method (DPM) itself is anadvanced numerical simulation tool which deals with both mo-tion and chemical conversion of particulate material such as coalor biomass in furnaces However predictions of solely motion orconversion in a de-coupled mode are also applicable The DiscreteParticle Method uses object oriented techniques that support ob-jects representing three-dimensional particles of various shapessuch as cylinders discs or tetrahedrons for example size and ma-terial properties This makes it a highly versatile tool dealingwith a large variety of different industrial applications of granu-lar matter A user interface allows easily extending the softwarefurther by adding user-defined models or material properties toan already available selection of materials properties and reac-tion systems describing conversion Thus the user is relievedof underlying mathematics or software design and therefore is

192 CSC Software

able to direct his focus entirely on the application The DiscreteParticle Method is organised in a hierarchical structure of C++classes and works both in Linux and XP environments also onmulti-processor machines

This software is developed by the XDEM research team from theResearch Unit in Engineering Science (RUES) in collaborationwith the Computer Science and Communications (CSC) researchunit

bull GreenCloud Licence Open source

ndash Description Greencloud is a sophisticated packet-level simulatorfor energy-aware cloud computing data centers with a focus oncloud communications It offers a detailed fine-grained modelingof the energy consumed by the data center IT equipment such ascomputing servers network switches and communication links

bull JShadObf

ndash Description A JavaScript Obfuscation Framework based on evo-lutionary algorithms

bull LuxTraffic

ndash Description LuxTraffic is a project aiming to provide real timetraffic information by using smartphones as mobile traffic sensorsLuxembourg is an ideal location to validate the suggested systembecause of several factors The country has a well developed roadinfrastructure with 282 km of highways in total on its territorywhich permits to have a country- scoped instead of city-scopedapproach Also the recent high penetration rate of smartphonesin combination with the data flat rates create a favorable envi-ronment for community based traffic sensing using mobile phonesTaking these factors into account we designed LuxTraffic a trafficinformation system which is in essence an online repository aim-ing at centralizing all information related to individual mobilityin Luxembourg

The system has two main goals The first is to create and main-tain a community of users that will actively participate in col-lecting relevant traffic information using smartphone devices inan anonymous and autonomous manner To accomplish this ap-plications (APPs) for the two dominant mobile platforms iOSand Android have been developed In return the users benefitfrom a variety of traffic information services available online In

193

the first phase the system provides detailed information abouttraffic fluidity on Luxembourg highways In the second phasethe system will be extended to cover the entire road network

The second purpose of the LuxTraffic platform is to gather archiveand analyze the collected traffic data centrally in order to identifytraffic bottlenecks and propose solutions To provide additionalinformation we interface with the local highway traffic controlsystem called CITA which among others provides a 24 hoursaccess to highway cameras

bull MaM Multidimensional Aggregation Monitoring Licence Open Source

ndash Description MaM Multidimensional Aggregation MonitoringMaM performs multidimensional aggregation over various typesof data The targegeted use is the storage visualisation and anal-ysis of big data For example network operators may capturelarge quantities of flow based data which includes source and des-tination IP addresses and ports number of packets etc Aggre-gation allows to leverage global view and so is particularly helpfulfor anomaly tracking as the most powerful like spam campaignsbotnets distributed denial of service are distributed phenomenaand can only be observed assuming a global point of view How-ever defining the aggregation granularity is quite difficult andshould not fixed over all the space For example some IP net-works may require a small granularity while others need only ahigh level overview Hence MaM automatically selects the gran-ularity by creating irregular dimension splits which are so betterfitted to the underlying distribution In addition if a user doesnot know exactly what is looking for when he is monitoring hisnetwork it does not know which dimension is the most importantFor example there is no reason to aggregate first on source IPaddresses and then destination ports or vice-versa Thus MaMwill automatically optimizes that by selecting the proper order ofdimensions and even on multiple levels involving twice or morethe same dimension with different granularity levels

To achieve a good scalability MaM uses an underneath tree struc-ture A MaM tree is updated online with a limited complexityusing a Least Recently Used strategy to keep the tree size com-pact and so to save resources

MaM is a generic tool and can be extended to any hierarchicaltypes of data by implementing very few functions which describethe hierarchy

To summarize the advantages of MaM are - support of het-erogeneous types of data simultaneously - high scalability - easy

194 CSC Software

to extend - user friendly outputs and graphical user interface -open-source (available at httpsgithubcomjfrancoismam)

The practicability of MaM have been highlighted in [252] and apresentation is available at (demonstration at 1415)

httpswwwusenixorgconferencelisa12efficient-multidimensional-aggregation-large-scale-monitoring

bull MiCS Management System Licence non-redistributable for internaluse only

ndash Description An internal web-based tool developed for the man-agement of modules courses and profiles of the Master in Infor-mation and Computer Sciences Developed by Christian GlodtNumerous improvements have been made to the MiCS Manage-ment System in 2012

bull Model Decomposer Licence free to use binary redistribution per-mitted

ndash Description An Eclipse plugin that implements a generic modeldecomposition technique which is applicable to Ecore instancesand EP models and is described in a paper published in the pro-ceedings of the FASE 2011 conference Developed by ChristianGlodt

bull MSC Macro Package for LATEX Licence free use

ndash Description The message sequence chart (MSC) language is avisual language for the description of the interaction between dif-ferent components of a system This language is standardizedby the ITU (International Telecommunication Union) in Recom-mendation Z120 MSCs have a wide application domain rang-ing from requirements specification to testing and documenta-tion In order to support easy drawing of MSCs in LATEX doc-uments Sjouke Mauw and coworkers have developed the MSCmacro package Currently Piotr Kordy is responsible for main-tenance of the package Version 117 is currently available fromhttpsatossunilumscpackage In 2012 work started onrecoding the package as to make it compatible with pdflatex

bull OVNIS

ndash Description For online vehicular wireless and traffic simulationAn integration of traffic simulator SUMO with network simulatorns-3

195

bull ROS face recognition package Licence Attribution-NonCommercial30

ndash Description Developers Pouyan Ziafati Provides a ROS simpleactionlib server interface for performing different face recognitionfunctionalities in video stream

bull Seq-ACL+ Licence Free

ndash Description Developers Daniele Rispoli Valerio Genovese andDeepak Garg

Seq-ACL+ is a decidable theorem prover (written in PROLOG)for the modal access control logic ACL+ presented in V Genoveseand D Garg rdquoNew Modalities for Access Control Logics Permis-sion Control and Ratificationrdquo 7th International Workshop onSecurity and Trust Management - STM 2011

bull SHARC Licence GPL v3

ndash Description Source code and benchmarking framework for theSHARC (Sharper Heuristic for Assignment of Robust Communi-ties) protocol

bull VehILux

ndash Description Large set of realistic vehicular traces over the areaof Luxembourg country (110000 trips) than can be used by trafficsimulators like SUMO and in other simulations of traffic informa-tion systems

bull Visual Contract Builder Licence free to use binary redistributionpermitted

ndash Description A suite of Eclipse plugins that provide supportfor graphically editing and typechecking VCL (Visual ContractLanguage) diagrams Developed by Christian Glodt and NunoAmalio

196 CSC Software

Chapter 7

CSC Publications in 2012

The publications listed in this chapter have been generated from the officialpublication record repository of the university

httppublicationsunilu

An overview of the publication quantity (per category) is provided in thetable below

Publication category Quantity Section

Books 1 sect71 page 197Book Chapters 7 sect72 page 198

International journals 69 sect73 page 198Conferences Articles 165 sect74 page 204

Internal Reports 6 sect75 page 223Proceedings 3 sect76 page 224

Total 251

Table 71 Overview of CSC publications in 2012

71 Books

[1] Cas Cremers and Sjouke Mauw Operational semantics and verificationof security protocols Springer-Verlag 2012

198 BIBLIOGRAPHY

72 Book Chapters

[2] Paolo Turrini Xavier Parent Leendert van der Torre and SilvanoColombo Tosatto Contrary-To-Duties in Games pages 329ndash348Springer 2012

[3] Johnatan E Pecero Bernabe Dorronsoro Mateusz Guzek and Pas-cal Bouvry Memetic Algorithms for Energy-Aware Computation andCommunications Optimization in Computing Clusters pages 443 ndash473 Chapman and HallCRC Press 2012

[4] Xavier Parent Why Be Afraid of Identity volume 7360 of LectureNotes in Computer Science pages 295ndash307 Springer 2012

[5] Hugo Jonker Sjouke Mauw and Jun Pang Location-Based ServicesPrivacy Security and Assurance pages 235ndash244 IOS Press 2012

[6] Moussa Amrani A Formal Semantics of Kermeta pages 274 ndash 315IGI Global Hershey PA USA 2012

[7] Marcin Seredynski and Pascal Bouvry The Application of Evolution-ary Heuristics for Solving Soft Security Issues in MANETs pages 97ndash114 Springer 2012

[8] Jianguo Ding Ilangko Balasingham and Pascal Bouvry ManagementChallenges for Emerging Wireless Networks pages 3ndash34 CRC Press2012

73 International journals

[9] Raymond Bisdorff On polarizing outranking relations with large per-formance differences Journal of Multi-Criteria Decision AnalysisDOI 101002mcda14721ndash20 2012

[10] Christoph Benzmuller Dov Gabbay Valerio Genovese and DanieleRispoli Embedding and automating conditional logics in classicalhigher-order logic Ann Math Artif Intell 66(1-4)257ndash271 2012

[11] Benoıt Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee Technique et science informa-tiques 31(8-9-10)1121ndash1152 2012

[12] Alex Biryukov and Johann Grosschadl Cryptanalysis of the full aesusing gpu-like special-purpose hardware Fundamenta Informaticae114(3-4)221ndash237 2012

BIBLIOGRAPHY 199

[13] Alexander Bochman and Dov Gabbay Causal dynamic inference AnnMath Artif Intell 66(1-4)231ndash256 2012

[14] Davide Falessi Mehrdad Sabetzadeh Lionel Briand EmanueleTurella Thierry Coq and Rajwinder Kaur Panesar-Walawege Plan-ning for safety standards compliance A model-based tool-supportedapproach IEEE Software 29(3)64ndash70 2012

[15] Dov Gabbay Overview on the connection between reactive kripkemodels and argumentation networks Ann Math Artif Intell 66(1-4)1ndash5 2012

[16] Dov Gabbay Introducing reactive kripke semantics and arc accessi-bility Ann Math Artif Intell 66(1-4)7ndash53 2012

[17] Dov Gabbay Introducing reactive modal tableaux Ann Math ArtifIntell 66(1-4)55ndash79 2012

[18] Dov Gabbay Completeness theorems for reactive modal logics AnnMath Artif Intell 66(1-4)81ndash129 2012

[19] Dov Gabbay and Sergio Marcelino Global view on reactivity switchgraphs and their logics Ann Math Artif Intell 66(1-4)131ndash1622012

[20] Philipp Grabher Johann Grosschadl Simon Hoerder Kimmo Jarvi-nen Dan Page Stefan Tillich and Marcin Wojcik An explorationof mechanisms for dynamic cryptographic instruction set extensionJournal of Cryptographic Engineering 2(1)1ndash18 2012

[21] Laurent Kirsch Jean Botev and Steffen Rothkugel Snippets andcomponent-based authoring tools for reusing and connecting docu-ments Journal of Digital Information Management 10(6)399ndash4092012

[22] Tom Mens and Jacques Klein Evolving software - introduction to thespecial theme Ercim News 888ndash9 2012

[23] Gilles Perrouin Sebastian Oster Sagar Sen Jacques Klein BenoitBaudry and Yves Le Traon Pairwise testing for software prod-uct lines Comparison of two approaches Software Quality Journal20(3)605ndash643 2012

[24] Selwyn Piramuthu Gaurav Kapoor Wei Zhou and Sjouke MauwInput online review data and related bias in recommender systemsDecision Support Systems 53(3)418ndash424 2012

200 BIBLIOGRAPHY

[25] Qiang Tang Public key encryption schemes supporting equality testwith authorization of different granularity International Journal ofApplied Cryptography pages 304ndash321 2012

[26] Qiang Tang Public key encryption supporting plaintext equality testand user specified authorization Security and Communication Net-works pages 1351ndash1362 2012

[27] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre Modelling defeasible and prioritized support in bipolar argu-mentation Ann Math Artif Intell 66(1-4)163ndash197 2012

[28] Serena Villata Guido Boella Dov Gabbay Leendert van der Torreand Joris Hulstijn A logic of argumentation for specification andverification of abstract argumentation frameworks Ann Math ArtifIntell 66(1-4)199ndash230 2012

[29] Ying Zhang Chenyi Zhang Jun Pang and Sjouke Mauw Game-based verification of contract signing protocols with minimal messagesInnovations in Systems and Software Engineering 8111ndash124 2012

[30] Qixia Yuan Panuwat Trairatphisan Jun Pang Sjouke MauwMonique Wiesinger and Thomas Sauter Probabilistic model check-ing of the pdgf signaling pathway Transactions on ComputationalSystems Biology XIV151ndash180 2012

[31] Emil Weydert Conditional ranking revision - iterated revision withsets of conditionals Journal of Philosophical Logic 41(1)237ndash2712012

[32] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre Modelling defeasible and prioritized support in bipolar argu-mentation Ann Math Artif Intell 66(1-4)163ndash197 2012

[33] Serena Villata Guido Boella Dov Gabbay and Leendert van derTorre A logic of argumentation for specification and verification ofabstract argumentation frameworks Ann Math Artif Intell 66(1-4)199ndash230 2012

[34] Paolo Turrini Jan Broersen Rosja Mastrop and John-Jules ChMeyer Regulating competing coalitions a logic for socially optimalgroup choices Journal of Applied Non-Classical Logics 22(1-2)181ndash202 2012

[35] Yanjie Sun Chenyi Zhang Jun Pang Baptiste Alcalde and SjoukeMauw A trust-augmented voting scheme for collaborative privacymanagement Journal of Computer Security 20(4)437ndash459 2012

BIBLIOGRAPHY 201

[36] Hanna Scholzel Hartmut Ehrig Maria Maximova Karsten Gabrieland Frank Hermann Satisfaction restriction and amalgamation ofconstraints in the framework of m-adhesive categories Electronic Pro-ceedings in Theoretical Computer Science (EPTCS) 9383ndash104 2012

[37] Ayda Saidane and Nicolas Guelfi Seter Towards architecture-modelbased security engineering International Journal of secure softwareengineering to appear 0920120ndash0 2012

[38] Frederic Pinel Bernabe Dorronsoro Johnatan E Pecero Pascal Bou-vry and Samee U Khan A two-phase heuristic for the energy-efficientscheduling of independent tasks on computational grids Cluster Com-puting 2012

[39] Frederic Pinel Bernabe Dorronsoro and Pascal Bouvry Solving verylarge instances of the scheduling of independent tasks problem on thegpu Journal of Parallel and Distributed Computing 2012

[40] Jakub Muszynski Sebastien Varrettte Pascal Bouvry FranciszekSeredynski and Samee U Khan Convergence analysis of evolutionaryalgorithms in the presence of crash-faults and cheaters InternationalJournal of Computers amp Mathematics with Applications 64(12)3809ndash 3819 2012

[41] Roman Ledyayev Benoıt Ries and Anatoliy Gorbenko React anarchitectural framework for the development of a software productline for dependable crisis management systems Radioelectronic andComputer Systems 59(7)284ndash288 2012

[42] Simon Kramer Rajeev Gore and Eiji Okamoto Computer-aideddecision-making with trust relations and trust domains (cryptographicapplications) Journal of Logic and Computation pages 0 ndash 0 2012page numbers not yet known

[43] Dzmitry Kliazovich Simone Redana and Fabrizio Granelli Arqproxy Cross-layer error recovery in wireless access networks Inter-national Journal of Communication Systems 25(4)461 ndash 477 2012

[44] You Ilsun Lenzini Gabriele Ogiela Marek R and Bertino Elisa De-fending against insider threats and internal data leakage (guest edito-rial) Security and Communication Networks 5(8)831 ndash 833 2012

[45] Frank Hermann and Janis Voigtlander First international work-shop on bidirectional transformations (bx 2012) Preface ElectronicCommunications of the European Association of Software Science andTechnology (ECEASST) 491ndash4 2012

202 BIBLIOGRAPHY

[46] Davide Grossi and Paolo Turrini Dependence in games and de-pendence games Autonomous Agents and Multi-Agent Systems25(2)284ndash312 2012

[47] Valentin Goranko Wojciech Jamroga and Paolo Turrini Strategicgames and truly playable effectivity functions Autonomous Agentsand Multi-Agent Systems 2012

[48] David Galindo Rodrigo Roman and Javier Lopez On the energy costof authenticated key agreement in wireless sensor networks WirelessCommunications and Mobile Computing 12(1)133 ndash 143 2012

[49] Claudia Ermel Frank Hermann Jurgen Gall and Daniel BinanzerVisual modeling and analysis of emf model transformations based ontriple graph grammars Electronic Communications European Associ-ation of Software Science and Technology (EC-EASST) pages 1ndash122012

[50] Vasileios Efthymiou Maria Koutraki and Grigoris Antoniou Real-time activity recognition and assistance in smart classrooms Advancesin Distributed Computing and Artificial Intelligence Journal 15367ndash74 2012

[51] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry New state-of-the-art results for cassini2 global trajectory optimization problemThe Journal of the Advanced Concepts Team 556 ndash 72 2012

[52] Miguel Couceiro and Erkko Lehtonen Galois theory for sets of op-erations closed under permutation cylindrification and compositionAlgebra Universalis 67(3)273ndash297 2012

[53] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser The aritygap of order-preserving functions and extensions of pseudo-booleanfunctions Discrete Applied Mathematics 160(4-5)383ndash390 2012

[54] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser Decom-positions of functions based on arity gap Discrete Mathematics312(2)238ndash247 2012

[55] Martin Caminada Walter Carnielli and Paul Dunne Semi-stablesemantics J Log Comput 22(5)1207ndash1254 2012

[56] Richard Booth Thomas Meyer and Chattrakul Sombattheera A gen-eral family of preferential belief removal operators Journal of Philo-sophical Logic 41(4)711ndash733 2012

[57] Mike Behrisch Miguel Couceiro Keith A Kearnes Erkko Lehtonenand Agnes Szendrei Commuting polynomial operations of distributivelattices Order 29(2)245ndash269 2012

BIBLIOGRAPHY 203

[58] Alessandra Bagnato Barbara Kordy Per H Meland and PatrickSchweitzer Attribute decoration of attack-defense trees InternationalJournal of Secure Software Engineering 3(2)1ndash35 2012

[59] Peter Ryan and Thea Peacock Verifiable voting Recent advances andfuture challenges Voting What Has Changed What Hasnrsquot amp WhatNeeds Improvement 1(1)1ndash84 2012

[60] Le-Nam Tran Mats Bengtsson and Bjorn Ottersten Iterative pre-coder design and user scheduling for block-diagonalized systems IEEETransactions on Signal Processing 60(7)3726ndash3739 2012

[61] Yongming Huang Gan Zheng Mats Bengtsson Kai-Kit Wong LuxiYang and Bjorn Ottersten Distributed multicell beamforming designapproaching pareto boundary with max-min fairness IEEE Transac-tions on Wireless Communications 11(8)2921ndash2933 2012

[62] Bhavani Shankar Daniel Arapoglou Pantelis and Bjorn OtterstenSpace-frequency coding for dual polarized hybrid mobile satellite sys-tems IEEE Transactions on Wireless Communications 11(8)2806ndash2814 2012

[63] Emil Bjornson Mats Bengtsson and Bjorn Ottersten Pareto char-acterization of the multicell mimo performance region with simple re-ceivers IEEE Transactions on Signal Processing 60(8)4464ndash44692012

[64] Symeon Chatzinotas Gan Zheng and Bjorn Ottersten Generic op-timization of linear precoding in multibeam satellite systems IEEETransactions on Wireless Communications 11(6)2308ndash2320 2012

[65] Bhavani Shankar M R Pantelis-Daniel Arapoglou and Bjorn Otter-sten Space-frequency coding for dual polarized hybrid mobile satellitesystems IEEE Transactions on Wireless Communications 11(8)2806ndash 2814 2012

[66] Frederic Garcia Djamila Aouada Bruno Mirbach and Bjorn Otter-sten Real-time distance-dependent mapping for a hybrid tof multi-camera rig IEEE Journal of Selected Topics in Signal Procesing(JSTSP) 6(5)1ndash12 2012

[67] Dimitrios Christopoulos Symeon Chatzinotas Gan Zheng Joel Grotzand Bjorn Ottersten Multibeam joint processing in satellite communi-cations Eurasip Journal on Wireless Communications and Network-ing 2012(1) 2012

204 BIBLIOGRAPHY

[68] Emil Bjornson Gan Zheng Mats Bengtsson and Bjorn OtterstenRobust monotonic optimization framework for multicell miso systemsIEEE Transactions on Signal Processing 60(5)2508ndash2523 2012

[69] David Fotue Houda Labiod and Thomas Engel Performance eval-uation of mini-sinks mobility using multiple paths in wireless sensornetworks International Journal of Computer Science and Security(IJCSS) 6(3)150ndash167 2012

[70] Marcin Seredynski and Pascal Bouvry Analysing the development ofcooperation in manets The Journal of Supercomputing pages 1ndash172012

[71] Marcin Seredynski and Pascal Bouvry Direct reciprocity-based coop-eration in mobile ad hoc networks International Journal of Founda-tions of Computer Science 23(2)501ndash521 2012

[72] Dzmitry Kliazovich Pascal Bouvry and Samee U Khan Greenclouda packet-level simulator of energy-aware cloud computing data centersThe Journal of Supercomputing 62(3)pp 1263ndash1283 2012

[73] Patricia Ruiz Bernabe Dorronsoro Pascal Bouvry and Lorenzo JTardon Information dissemination in vanets based upon a tree topol-ogy Journal of Ad hoc Networks 10(1)111ndash127 2012

[74] Patricia Ruiz Bernabe Dorronsoro Giorgio Valentini Frederic Pineland Pascal Bouvry Optimisation of the enhanced distance basedbroadcasting protocol for manets J of Supercomputing Special Is-sue on Green networks 62(3)1213ndash1240 2012

[75] Shaukat Ali Tao Yue and Lionel Briand Does aspect-oriented mod-eling help improve the readability of uml state machines Softwareand Systems Modeling 2012

[76] Andrea Arcuri and Lionel Briand A hitchhikerrsquos guide to statisti-cal tests for assessing randomized algorithms in software engineeringSoftware Testing Verification and Reliability 2012

[77] Andrea Arcuri and Lionel Briand Formal analysis of the probability ofinteraction fault detection using random testing IEEE Transactionson Software Engineering 38(5)1088ndash1099 2012

74 Conferences Articles

[78] Apostolos Stathakis Gregoire Danoy Thomas Veneziano Pascal Bou-vry and Gianluigi Morelli Bi-objective optimisation of satellite pay-load configuration In Proceedings of the 13e congres annuel de la

BIBLIOGRAPHY 205

Societe francaise de Recherche Operationnelle et drsquoAide a la Decision(ROADEF) pages 1ndash2 2012

[79] Apostolos Stathakis Gregoire Danoy Thomas Veneziano JulienSchleich and Pascal Bouvry Optimising satellite payload reconfig-uration An ilp approach for minimising channel interruptions In 2ndESA Workshop on Advanced Flexible Telecom Payloads pages 1ndash8ESA 2012

[80] Guido Boella Joris Hulstijn Llio Humphreys Livio Robaldo andLeendert Van der Torre Legal knowledge management systems forregulatory compliance In IX Conference of the Italian Chapter ofAIS pages 1ndash8 2012

[81] Guido Boella Joris Hulstijn Llio Humphreys Marijn Janssen andLeendert van der Torre Towards legal knowledge management systemsfor regulatory compliance In IX Conference of the Italian Chapter ofAIS pages 1ndash8 2012

[82] Guido Boella Luigi di Caro Llio Humphreys Livio Robaldo andLeendert van der Torre Nlp challenges for eunomos a tool to build andmanage legal knowledge In Proceedings of the Eighth InternationalConference on Language Resources and Evaluation (LREC rsquo12) pages3672ndash3678 European Language Resources Association (ELRA) 2012

[83] Guido Boella Llio Humphreys Marco Martin Piercarlo Rossi andLeendert van der Torre Eunomos a legal document and knowledgemanagement system to build legal services In Monica (Editor) Palmi-rani Ugo (Editor) Pagallo Pompeu (Editor) Casanovas and Gio-vanni (Editor) Sartor editors AI Approaches to the Complexity ofLegal Systems Models and Ethical Challenges for Legal Systems LegalLanguage and Legal Ontologies Argumentation and Software Agentsvolume 7639 of Lecture Notes in Computer Science pages 131ndash146Berlin Heidelberg 2012 Springer

[84] Pouyan Ziafati Mehdi Dastani John-Jules Meyer and Leon VanDer Torre Agent programming languages requirements for program-ming cognitive robots (extended abstract) In Proceedings of the 24thBenelux Conference on Artificial Intelligence pages 337ndash338 2012

[85] Eric Tobias Eric Ras and Nuno Amalio Suitability of visual mod-elling languages for modelling tangible user interface applicationsIn Symposium on Visual Languages and Human-Centric Computing(VLHCC) pages 269 ndash270 IEEE 2012

206 BIBLIOGRAPHY

[86] Jerome Leemans and Nuno Amalio Modelling a cardiac pacemakervisually and formally In Symposium on Visual Languages and Human-Centric Computing (VLHCC) pages 257 ndash258 IEEE 2012

[87] Mike Papadakis and Yves Le Traon Using mutants to locate ldquoun-knownrdquo faults In Fifth International Conference on Software TestingVerification and Validation (ICST) pages 691ndash700 2012

[88] Silvano Colombo Tosatto Guido Boella Leendert van der Torre andSerena Villata Abstract normative systems Semantics and prooftheory In Proceedings of the Thirteenth International Conference onPrinciples of Knowledge Representation and Reasoning pages 358ndash368 2012

[89] Silvano Colombo Tosatto Guido Boella Leon van der Torre and Ser-ena Villata Visualizing normative systems an abstract approach InDeontic Logic in Computer Science - 11th International ConferenceDEON 2012 pages 16ndash30 2012

[90] Silvano Colombo Tosatto Marwane El Kharbili Guido GovernatoriPierre Kelsen Qin Ma and Leender van der Torre Algorithms forbasic compliance problems In Benelux conference on Artificial Intel-ligence (BNAIC) 2012

[91] Jayanta Poray and Christoph Schommer Operations on conver-sational mind-graphs In The 4th International Conference onAgents and Artificial Intelligence (ICAART - 2012) pages 511ndash514SciTePress 2012

[92] Christoph Bosch Qiang Tang Peter Hartel and Willem Jonker Selec-tive document retrieval from encrypted database In Information Se-curity - 15th International Conference ISC 2012 volume 7483 pages224ndash241 Springer 2012

[93] Xiaofeng Chen Jin Li Jianfeng Ma Qiang Tang and Wenjing LouNew algorithms for secure outsourcing of modular exponentiations InComputer Security - ESORICS 2012 - 17th European Symposium onResearch in Computer Security volume 7459 pages 541ndash556 Springer2012

[94] Johann Grosschadl Dan Page and Stefan Tillich Efficient java im-plementation of elliptic curve cryptography for j2me-enabled mobiledevices In Information Security Theory and Practice mdash WISTP 2012volume LNCS 7322 pages 189ndash207 Springer Verlag 2012

[95] Arjan Jeckmans Qiang Tang and Pieter Hartel Privacy-preservingcollaborative filtering based on horizontally partitioned dataset In

BIBLIOGRAPHY 207

International Symposium on Security in Collaboration Technologiesand Systems pages 439ndash446 2012

[96] Max E Kramer Jacques Klein and Jim R H Stell Building specifica-tions as a domain-specific aspect language In Proceedings of the Sev-enth Workshop on Domain-Specific Aspect Languages at the Aspect-Oriented Software Development Conference pages 29ndash32 ACM 2012

[97] Daniel Marnach Sjouke Mauw Miguel Martins and Carlo HarpesDetecting meaconing attacks by analysing the clock bias of gnss re-ceivers In European Navigation Conference (ENC 2012) pages 1ndash192012

[98] Jorge Augusto Meira Eduardo Cunha Almeida Yves Le Traon andGerson Sunye Peer-to-peer load testing In ICST - 2012 IEEE FifthInternational Conference on Software Testing Verification and Vali-dation pages 642ndash647 IEEE 2012

[99] Gilles Perrouin Brice Morin Franck Chauvel Franck Fleurey JacquesKlein Yves Le Traon Olivier Barais and Jean-Marc Jezequel To-wards flexible evolution of dynamically adaptive systems in the newideas amp emerging results track of the international conference ofsoftware engineering (niericse) In New Ideas amp Emerging Re-sults Track of the International Conference of Software Engineering(NIERICSE) Zurich Switzerland 2012 pages 1353ndash1356 IEEEPress 2012

[100] Qiang Tang Cryptographic framework for analyzing the privacy ofrecommender algorithms In International Conference on Collabora-tion Technologies and Systems pages 455ndash462 IEEE 2012

[101] Ton van Deursen and Sasa Radomirovic Insider attacks and privacy ofrfid protocols In Public Key Infrastructures Services and Applications-8th European Workshop EuroPKI 2011 volume 7163 pages 91ndash105Springer 2012

[102] Erich Wenger and Johann Grosschadl An 8-bit avr-based elliptic curvecryptographic risc processor for the internet of things In Proceedingsof the 1st Workshop on Hardware and Architectural Support for Secu-rity and Privacy (HASP 2012) pages 37ndash45 IEEE Computer Society2012

[103] Reiko Heckel Hartmut Ehrig Ulrike Golas and Frank Hermann Par-allelism and concurrency of stochastic graph transformations In GraphTransformations volume 7562 of Lecture Notes in Computer Sciencepages 96ndash110 Springer Berlin Heidelberg 2012

208 BIBLIOGRAPHY

[104] Jan Broersen Dov Gabbay and Leendert van der Torre Discussionpaper Changing norms is changing obligation change In DeonticLogic in Computer Science volume 7393 of Lecture notes in ComputerScience pages 199ndash214 Springer 2012

[105] Chenyi Zhang and Jun Pang An algorithm for probabilistic alternat-ing simulation In Proc the 38th International Conference on CurrentTrends in Theory and Practice of Computer Science pages 431ndash4422012

[106] Emil Weydert On arguments and conditionals In ECAI WS WeightedLogics for AI (WL4AI) pages 69ndash78 IRIT 2012

[107] Srdjan Vesic Mykhailo Ianchuk and Andrii Rubtsov The synergy Aplatform for argumentation-based group decision making In Proceed-ings of the 4th International Conference on Computational Models ofArgument COMMA 2012 pages 501ndash502 2012

[108] Srdjan Vesic and Leendert van der Torre Beyond maxi-consistent ar-gumentation operators In Proceedings of the 13th European Confer-ence on Logics in Artificial Intelligence JELIA 2012 pages 424ndash4362012

[109] Srdjan Vesic Maxi-consistent operators in argumentation In Proceed-ings of the 20th European Conference on Artificial Intelligence ECAI2012 pages 810ndash815 2012

[110] Leendert van der Torre and Guido Boella Reasoning for agreementtechnologies In Proceedings of the 20th European Conference on Ar-tificial Intelligence (ECAI) pages 895ndash896 2012

[111] Leendert van der Torre Logics for security and privacy In Data andApplications Security and Privacy XXVI pages 1ndash7 Springer 2012

[112] Paolo Turrini Agreements as norms In Deontic Logic in ComputerScience pages 31ndash45 2012

[113] Marija Slavkovik and Wojciech Jamroga Distance-based rules forweighted judgment aggregation (extended abstract) In Proceedings ofthe 11th International Conference on Autonomous Agents and Multi-agent Systems AAMAS2012 pages 1405ndash1406 2012

[114] Francois Schwarzentruber Srdjan Vesic and Tjitze Rienstra Build-ing an epistemic logic for argumentation In Proceedings of the 13thEuropean Conference on Logics in Artificial Intelligence JELIA 2012pages 359ndash371 2012

BIBLIOGRAPHY 209

[115] Tjitze Rienstra Towards a probabilistic dung-style argumentationsystem In AT 2012 Agreement Technologies Proceedings of the FirstInternational Conference on Agreement Technologies pages 138ndash152CEUR 2012

[116] Sandro Reis Denis Shirnin and Denis Zampunieris Design ofproactive scenarios and rules for enhanced e-learning In Proceed-ings CSEDU 2012 4th International Conference on Computer Sup-ported Education Porto (Portugal) 2012 volume 1 pages 253 ndash 258SciTePress ndash Science and Technology Publications 2012

[117] Raghunath Rajachandrasekar Xavier Besseron and Dhabaleswar KPanda Monitoring and predicting hardware failures in hpc clusterswith ftb-ipmi In 2012 IEEE 26th International Parallel and Dis-tributed Processing Symposium Workshops amp PhD Forum pages 1136ndash1443 IEEE Computer Society 2012

[118] Johnatan E Pecero Hector Joaquin Fraire Huacuja Pascal BouvryAurelio Alejandro Santiago Pineda Mario Cesar Lopez Loces andJuan Javier Gonzalez Barbosa On the energy optimization for prece-dence constrained applications using local search algorithms In Pro-ceedings of the 2012 International Conference on High PerformanceComputing amp Simulation (HPCS 2012) pages 133 ndash 139 2012

[119] Patrick Meyer and Alexandru-Liviu Olteanu Preferentially orderedclustering In Modelling Decisions for Artificial Intelligence pages87ndash98 2012

[120] Juan Julian Merelo Antonio M Mora Carlos Fernandes Anna IEsparcia-Alcazar and Juan Luis Jimenez Laredo Pool vs island basedevolutionary algorithms an initial exploration In 2012 Seventh In-ternational Conference on P2P Parallel Grid Cloud and InternetComputing pages 19ndash24 IEEE Computer Society 2012

[121] Sergio Marques Dias Sandro Reis and Denis Zampunieris Proac-tive computing based implementation of personalized and adaptivetechnology enhanced learning over moodle(tm) In Proceedings ofICALT 2012 IEEE 12th International Conference on Advanced Learn-ing Technologies pages 674 ndash 675 IEEE Computer Society Publica-tions 2012

[122] Diana Marosin Alex Handrik Proper and Leendert van der TorreChanging agreements Intention reconsideration based on assumptionsand reasons In Proceedings of the First International Conference onAgreement Technologies AT 2012 pages 296ndash297 2012

210 BIBLIOGRAPHY

[123] Qian Li Peter Schaffer Jun Pang and Sjouke Mauw Comparativeanalysis of clustering protocols with probabilistic model checking InProceedings of the 6th IEEE Symposium on Theoretical Aspects of Soft-ware Engineering pages 249ndash252 IEEE Computer Society 2012

[124] Erkko Lehtonen and Agnes Szendrei Partial orders induced by quasi-linear clones In Contributions to General Algebra volume 20 pages51ndash84 Verlag Johannes Heyn 2012

[125] Barbara Kordy Marc Pouly and Patrick Schweitzer Computationalaspects of attack-defense trees In Security amp Intelligent InformationSystems volume LNCS 7053 pages 103ndash116 Springer 2012

[126] Laurent Kirsch Jean Botev and Steffen Rothkugel The snippet sys-tem - reusing and connecting documents In Proceedings of the 7thInternational Conference on Digital Information Management pages138ndash144 2012

[127] Laurent Kirsch Jean Botev and Steffen Rothkugel An extensible toolset for creating and connecting reusable documents In Proceedings ofWorld Conference in Educational Media Hypermedia and Telecommu-nications pages 1434ndash1442 2012

[128] Coron Jean-Sebastien Giraud Christophe Prouff Emmanuel Ren-ner Soline Rivain Matthieu and Vadnala Praveen Kumar Conver-sion of security proofs from one leakage model to another A newissue In Constructive Side-Channel Analysis and Secure Design vol-ume 72752012 pages 69ndash81 Springer Lecture Notes in ComputerScience 2012 2012

[129] Gallais Jean-Francois Roy Arnab and Vadnala Praveen Kumar Fullkey recovery attacks on modular addition An application to threefishIn Workshop on Embedded Systems Security 2012 pages 1ndash9 ACM2012

[130] Wojciech Jamroga Concepts agents and coalitions in alternatingtime In Proceedings of the 20th European Conference on ArtificialIntelligence ECAI 2012 pages 438ndash443 2012

[131] Santiago Iturriaga Sergio Nesmachnow and Bernabe Dorronsoro Amultithreading local search for multiobjective energy-aware schedulingin heterogeneous computing systems In 26th European Conference onModelling and Simulation (ECMS) pages 1 ndash 7 2012

[132] Frank Hermann Hartmut Ehrig and Claudia Ermel Concurrentmodel synchronization with conflict resolution based on triple graphgrammars In Fundamental Approaches to Software Engineering vol-ume 7212 pages 178ndash193 Springer 2012

BIBLIOGRAPHY 211

[133] Davide Grossi and Paolo Turrini Short sight in extensive gamesIn Proceedings of the 11th International Conference on AutonomousAgents and Multiagent Systems (AAMAS 2012) pages 805ndash812 2012

[134] Valentin Goranko and Wojciech Jamroga State and path effectivitymodels for logics of multi-player games In Proceedings of the 11thInternational Conference on Autonomous Agents and Multiagent Sys-tems AAMAS 2012 pages 1123ndash1130 Springer 2012

[135] Eugenio Giordano Lara Codeca Brian Geffon Giulio Grassi Gio-vanni Pau and Mario Gerla Movit The mobile network virtual-ized testbed In Proceedings of the ninth ACM international workshopon Vehicular inter-networking systems and applications pages 3ndash12ACM New York NY USA ccopy2012 2012

[136] Nicolas Genon Patrice Caire Hubert Toussaint Patrick Heymansand Daniel Moody Towards a more semantically transparent i visualsyntax In Requirements Engineering Foundation for Software Qual-ity - 18th International Working Conference REFSQ 2012 EssenGermany March 19-22 2012 Proceedings Lecture Notes in Com-puter Science 7195 Springer 2012 volume 7195 of Lecture Notes inComputer Science pages 140ndash146 Springer Berlin Heidelberg 2012

[137] Vijayalakshmi Ganesan Sergio Sousa Marija Slavkovik and Leendertvan der Torre Selecting judgment aggregation rules for nao robotsan experimental approach In Proceedings of the 11th InternationalConference on Autonomous Agents and Multiagent Systems (AAMAS2012) pages 1403ndash1404 International Foundation for AutonomousAgents and Multiagent Systems 2012

[138] Francois Fouquet Gregory Nain Brice Morin Erwan Daubert OlivierBarais Noel Plouzeau and Jean-Marc Jezequel An eclipse modellingframework alternative to meet the modelsruntime requirements InMODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMSvolume 7590 pages 87ndash101 Springer Berlin Heidelberg 2012

[139] Vasileios Efthymiou and Patrice Caire Privacy challenges in ambientintelligent systems A critical discussion In Proceedings of the 3rdPrivacy Protection Symposium - Atelier protection de la vie privee(APVP) 2012

[140] Vasileios Efthymiou Patrice Caire and Antonis Bikakis Modeling andevaluating cooperation in multi-context systems using conviviality InProceedings of BNAIC 2012 The 24th Benelux Conference on ArtificialIntelligence pages 83ndash90 2012

212 BIBLIOGRAPHY

[141] Naipeng Dong Hugo Jonker and Jun Pang Formal analysis of privacyin an ehealth protocol In Proceedings of the 17th European Symposiumon Research in Computer Security volume 7459 of Lecture Notes inComputer Science pages 325ndash342 Springer-Verlag 2012

[142] Naipeng Dong Hugo Jonker and Jun Pang Challenges in ehealthfrom enabling to enforcing privacy In Proceedings of the First inter-national conference on Foundations of Health Informatics Engineeringand Systems (FHIESrsquo11) volume 7151 of Lecture Notes in ComputerScience pages 195ndash206 Springer-Verlag 2012

[143] Sergio Dias Marques Sandro Reis and Denis Zampunieris Personal-ized adaptive and intelligent support for online assignments based onproactive computing In Proceedings of ICALT 2012 IEEE 12th In-ternational Conference on Advanced Learning Technologies pages 668ndash 669 IEEE Computer Society Conference Publishing Services 2012

[144] Denise Demirel Hugo Jonker and Melanie Volkamer Random blockverification Improving the norwegian electoral mix net In Proceed-ings of the 5th International Conference on Electronic Voting (EVOTE2012) volume 205 pages 65ndash78 Gesellschaft fur Informatik eV 2012

[145] Mehdi Dastani Leendert van der Torre and Neil Yorke-Smith A pro-gramming approach to monitoring communication in an organisationalenvironment In AAMAS rsquo12 Proceedings of the 11th InternationalConference on Autonomous Agents and Multiagent Systems - Volume3 pages 1373ndash1374 2012

[146] Sviatlana Danilava Stephan Busemann and Christoph SchommerArtificial conversational companions In Proceedings of the 4th Inter-national Conference on Agents and Artificial Intelligence volume 2pages 282ndash289 SciTePress 2012 2012

[147] Miguel Couceiro Erkko Lehtonen and Tamas Waldhauser Gap vspag In 42nd IEEE International Symposium on Multiple-Valued Logic(ISMVL 2012) pages 268ndash273 IEEE Computer Society 2012

[148] Xihui Chen and Jun Pang Measuring query privacy in location-basedservices In Proceeding of 2nd ACM Conference on Data and Applica-tion Security and Privacy pages 49 ndash 61 ACM 2012

[149] Martin Caminada and Podlaszewski Mikolaj Grounded semantics aspersuasion dialogue In Computational Models of Argument - Proceed-ings of COMMA 2012 volume 245 pages 478ndash485 IOS Press 2012

[150] Martin Caminada and Mikolaj Podlaszewski User-computer persua-sion dialogue for grounded semantics In Proceedings of the 24th

BIBLIOGRAPHY 213

Benelux Conference on Artificial Intelligence (BNAIC 2012) pages343ndash344 2012

[151] Martin Caminada and Mikolaj Podlaszewski Grounded semantics aspersuasion dialogue In Proceedings of the 4th International Confer-ence on Computational Models of Argument (COMMA 2012) volume245 pages 478ndash485 IOS Press 2012

[152] Patrice Caire Antonis Bikakis and Vasileios Efthymiou Convivialityby design In Social computing Social cognition social networks Ac-quisition representation and reasoning with contextualized knowledge(ARCOE 2012) 2012

[153] M Majid Butt and Eduard A Jorsweick Energy efficient multiuserscheduling Exploiting the loss tolerance of the application In IEEEGlobecom - Symposium on Selected Areas in Communications pages3555ndash3560 IEEE 2012

[154] M Majid Butt Benjamin Schubert Martin Kurras Kai BornerThomas Haustein and Lars Thiele On the energy-bandwidth trade-off in green wireless networks System level results In Workshop onSmart and Green Communications amp Networks (SGCNet) at Interna-tional conference on communication in China (ICCC) pages 91ndash95IEEE 2012

[155] M Majid Butt Deadline delay constrained multiuser multicell sys-tems Energy efficient scheduling In 13th IEEE International Work-shop on Signal Processing Advances in Wireless Communications(SPAWC) pages 309ndash313 IEEE 2012

[156] Richard Booth Martin Caminada Mikolaj Podlaszewski and IyadRahwan Quantifying disagreement in argument-based reasoningIn Proceedings of the 11th International Conference on AutonomousAgents and Multiagent Systems (AAMAS 2012) pages 493ndash500 Inter-national Foundation for Autonomous Agents and Multiagent Systems2012

[157] Richard Booth Eduardo Ferme Sebastien Konieczny and RamonPino Perez Credibility-limited revision operators in propositionallogicrsquo In Proceedings of the 24th Benelux Conference on ArtificialIntelligence (BNAIC 2012) pages 277ndash278 2012

[158] Richard Booth Eduardo Ferme Sebastien Konieczny and RamonPino Perez Credibility-limited revision operators in propositionallogic In Proceedings of the 13th International Conference on Prin-ciples of Knowledge Representation and Reasoning (KR 2012) pages116ndash125 AAAI 2012

214 BIBLIOGRAPHY

[159] Richard Booth Souhila Kaci Tjitze Rienstra and Leon van der TorreConditional acceptance functions In Proceedings of the 4th Interna-tional Conference on Computational Models of Argument (COMMA2012) volume 245 pages 470ndash477 IOS Press 2012

[160] Richard Booth Thomas Meyer and Ivan Vazinczak Ptl A proposi-tional typicality logic In 13th Conference on Logics in Artificial In-telligence (JELIA 2012) volume 7519 pages 107ndash119 Springer BerlinHeidelberg 2012

[161] Nicolas Bernard and Franck Leprevost Beyond tor The truenymsprotocol In Security and Intelligent Information Systems volume7053 of Lecture Notes in Computer Science pages 68ndash84 Springer2012

[162] Aritz Barrondo Andrei Tchernykh Elisa Shaeffer and JohnatanPecero Energy efficiency of knowledge-free scheduling in peer-to-peerdesktop grids In Proceedings of the 2012 International Conferenceon High Performance Computing amp Simulation (HPCS 2012) pages105ndash111 IEEE 2012

[163] Pietro Baroni Guido Boella Federico Cerutti Massimiliano Gia-comin Leendert van der Torre and Serena Villata On inputoutputargumentation frameworks In Computational Models of Argument(Proceedings of COMMA 2012) pages 358ndash365 IOS Press 2012

[164] Arash Atashpendar Laurent Kirsch Jean Botev and SteffenRothkugel A native approach to semantics and inference in fine-grained documents In Proceedings of the 2nd Joint International Se-mantic Technology Conference 2012

[165] Ofer Arieli and Martin Caminada A general qbf-based formalization ofabstract argumentation theory In Computational Models of Argument- Proceedings of COMMA 2012 volume 245 pages 105ndash116 IOS Press2012

[166] Giulia Andrighetto Guido Governatori Pablo Noriega and Leendertvan der Torre Normative multi-agent systems In Dagstuhl Reportsvolume 2 pages 23ndash49 2012

[167] Maha Alodeh Qoe for spatial cognitive systems In IEEE Interna-tional Conference on Communications 2012

[168] Dzmitry Kliazovich Pascal Bouvry and Samee Ullah Khan Sim-ulating communication processes in energy-efficient cloud computingsystems In IEEE 1st International Conference on Cloud Networkingpages 2015ndash2017 2012

BIBLIOGRAPHY 215

[169] Juan Luis Jimenez Laredo Bernabe Dorronsoro Johnatan PeceroPascal Bouvry Juan Jose Durillo and Carlos Fernandes Designing aself-organized approach for scheduling bag-of-tasks In Proceedings ofthe 7th International Conference on P2P Parallel Grid Cloud andInternet Computing (3PGCIC) pages 315ndash320 IEEE 2012

[170] Mateusz Guzek Cesar O Diaz Johnatan E Pecero Pascal Bouvryand Albert Y Zomaya Impact of voltage levels number for energy-aware bi-objective dag scheduling for multi-processors systems InCommunications in Computer and Information Science volume 344pages 70ndash80 Springer 2012

[171] Bernabe Dorronsoro and Pascal Bouvry Study of different small-worldtopology generation mechanisms for genetic algorithms In Proceedingsof the IEEE Congress on Evolutionary Computation (CEC) part ofWorld Conference in Computational Intelligence (WCCI) pages 1580ndash 1587 IEEE 2012

[172] Sune S Nielsen Bernabe Dorronsoro Gregoire Danoy and PascalBouvry Novel efficient asynchronous cooperative co-evolutionarymulti-objective algorithms In Congress on Evolutionary Computa-tion pages 1ndash7 IEEE 2012

[173] Apostolos Stathakis Gregoire Danoy Pascal Bouvry and GianluigiMorelli Satellite payload reconfiguration optimisation An ilp modelIn INTELLIGENT INFORMATION AND DATABASE SYSTEMSvolume 7197 pages 311ndash320 Springer 2012

[174] Marcin Seredynski Gregoire Danoy Masoud Tabatabaei Pascal Bou-vry and Yoann Pignie Generation of realistic mobility for vanetsusing genetic algorithms In Proceedings of the IEEE Congress onEvolutionary Computation pages 1ndash8 IEEE 2012

[175] Marcin Seredynski and Pascal Bouvry The necessity for strong re-ciprocators in mobile ad hoc networks In Proceedings of the 2012IEEE International Symposium on Parallel and Distributed Process-ing Workshops and PhD Forum pages 609ndash616 IEEE 2012

[176] Juan Luis Jimenez Laredo Pascal Bouvry Sanaz Mostaghim andJuan Julian Merelo Guervos Validating a peer-to-peer evolutionaryalgorithm In European Conference on the Applications of Evolution-ary Computation volume 7248 pages 436ndash445 Springer Berlin Hei-delberg 2012

[177] Marcin Seredynski and Pascal Bouvry Solving soft security prob-lem in manets using an evolutionary approach In Security and In-telligent Information Systems International Joint Confererence SIIS

216 BIBLIOGRAPHY

2011 Warsaw Poland June 13-14 2011 Revised Selected Papersvolume 7053 pages 33ndash44 Springer LNCS 2012

[178] Muhammad Zohaib Iqbal Andrea Arcuri and Lionel Briand Empir-ical investigation of search algorithms for environment model-basedtesting of real-time embedded software In Proceedings of the Inter-national Symposium on Software Testing and Analysis (ISSTArsquo12)pages 199ndash209 ACM 2012

[179] Muhammad Zohaib Iqbal Andrea Arcuri and Lionel Briand Com-bining search-based and adaptive random testing strategies for envi-ronment model-based testing of real-time embedded systems In Pro-ceedings of the 4th Symposium on Search Based Software Engineering(SSBSErsquo12) pages 136ndash151 Springer-Verlag 2012

[180] Muhammad Zohaib Iqbal Shaukat Ali Tao Yue and Lionel BriandExperiences of applying umlmarte on three industrial projects InProceedings of ACMIEEE 15th International Conference on ModelDriven Engineering Languages amp Systems (MODELSrsquo12) pages 642ndash658 Springer-Verlag 2012

[181] Razieh Behjati Tao Yue and Lionel Briand A modeling approach tosupport the similarity-based reuse of configuration data In Proceed-ings of ACMIEEE 15th International Conference on Model DrivenEngineering Languages amp Systems (MODELSrsquo12) pages 497ndash513Springer-Verlag 2012

[182] Shaukat Ali Tao Yue Lionel Briand and Suneth Walawege A prod-uct line modeling and configuration methodology to support model-based testing An industrial case study In Proceedings of ACMIEEE15th International Conference on Model Driven Engineering Lan-guages amp Systems (MODELSrsquo12) pages 726ndash742 Springer-Verlag2012

[183] Nina Elisabeth Holt Richard Torkar Lionel Briand and Kai HansenState-based testing Industrial evaluation of the cost-effectiveness ofround-trip path and sneak-path strategies In Proceedings of the 23rdIEEE International Symposium on Software Reliability Engineering(ISSRE 2012) IEEE Computer Society 2012

[184] Stefano Di Alesio Arnaud Gotlieb Shiva Nejati and Lionel BriandTesting deadline misses for real-time systems using constraint opti-mization techniques In Workshop on Constraints in Software Test-ing Verification and Analysis (CSTVA 2012) pages 764ndash769 IEEE2012

BIBLIOGRAPHY 217

[185] Lionel Briand Davide Falessi Shiva Nejati Mehrdad Sabetzadeh andTao Yue Research-based innovation A tale of three projects in model-driven engineering In 15th International Conference Model DrivenEngineering Languages and Systems - volume 7590 pages 759ndash775Springer Berlin Heidelberg 2012

[186] Razieh Behjati Shiva Nejati Tao Yue Arnaud Gotlieb and LionelBriand Model-based automated and guided configuration of embed-ded software systems In Modelling Foundations and Applications -8th European Conference volume 7349 of Lecture Notes in ComputerScience pages 226ndash243 Springer Berlin Heidelberg 2012

[187] Shiva Nejati Stefano Di Alesio Mehrdad Sabetzadeh and LionelBriand Modeling and analysis of cpu usage in safety-critical embeddedsystems to support stress testing In Proceedings of ACMIEEE 15thInternational Conference on Model Driven Engineering Languages ampSystems (MODELSrsquo12) pages 759ndash775 2012

[188] Markus Forster Raphael Frank Mario Gerla and Thomas Engel Im-proving highway traffic through partial velocity synchronization In2012 IEEE Global Communications Conference (GLOBECOM) 3-7December 2012 Anaheim CA USA pages 5795ndash5800 2012

[189] Foued Melakessou and Thomas Engel Narval scilab toolbox Networkanalysis and routing evaluation In 2012 International Workshop onScilab amp OW2 (IWSO) pages 1ndash18 2012

[190] Andriy Panchenko Fabian Lanze and Thomas Engel Improvingperformance and anonymity in the tor network In 31st IEEE In-ternational Performance Computing and Communications Conference(IEEE IPCCC 2012) IEEE Press 2012

[191] Samuel Marchal Jerome Francois Radu State and Thomas EngelSemantic based dns forensics In Proceedings of the IEEE InternationalWorkshop on Information Forensics and Security - WIFSrsquo12 IEEE2012

[192] Raphael Frank Maximilien Mouton and Thomas Engel Towardscollaborative traffic sensing using mobile phones In IEEE VehicularNetworking Conference 2012 pages 15ndash20 IEEE 2012

[193] Thorsten Ries Radu State and Thomas Engel Instant degradationof anonymity in low-latency anonymisation systems In DependableNetworks and Services pages 98ndash108 Springer Berlin Heidelberg2012

218 BIBLIOGRAPHY

[194] David Fotue Houda Labiod and Thomas Engel Performance evalua-tion of hybrid channel assignment for wireless sensor networks In The8th International Conference on Mobile Ad-hoc and Sensor Networks(MSN) pages 1ndash8 IEEE 2012

[195] David Fotue Houda Labiod and Thomas Engel An arbitrary mobil-ity model of mini-sinks using controlled data collection for reducingcongestion appearance in wireless sensor networks In 31st IEEE In-ternational Performance Computing and Communications Conference(IPCCC) pages 1ndash9 IEEE 2012

[196] David Fotue Houda Labiod and Thomas Engel Controlled data col-lection of mini-sinks for maximizing packet delivery ratio and through-put using multiple paths in wireless sensor networks In Proceedings ofthe 23rd IEEE International Symposium on Personal Indoor Mobileand Radio Communications (PIMRC) pages 758 ndash764 IEEE 2012

[197] Samuel Marchal Jerome Francois Radu State and Thomas EngelProactive discovery of phishing related domain names In The 15thInternational Symposium on Research in Attacks Intrusions and De-fenses volume 7462 pages 190ndash209 Springer-Verlag Berlin Heidel-berg 2012

[198] Samuel Marchal and Thomas Engel Large scale dns analysis In6th IFIP WG 66 International Conference on Autonomous Infras-tructure Management and Security volume 7279 pages 151ndash154Springer Berlin Heidelberg 2012

[199] Stefan Hommes Radu State and Thomas Engel Detecting stealthybackdoors with association rule mining In Lecture Notes in ComputerScience volume 7290 pages 161ndash171 Springer 2012

[200] Stefan Hommes Radu State and Thomas Engel A distance-basedmethod to detect anomalous attributes in log files In IEEE NetworkOperations and Management Symposium pages 498ndash501 2012

[201] Cynthia Wagner and Thomas Engel Detecting anomalies in netflowrecord time series by using a kernel function In IFIPLNCS De-pendable Network and Services 6th International Conference on Au-tonomous Infrastructure Management and Security (AIMS2012) vol-ume 7279 pages 122ndash125 Springer Verlag 2012

[202] Samuel Marchal Jerome Francois Cynthia Wagner and Thomas En-gel Semantic exploration of dns In 11th Networking Conference 2012pages 370ndash384 Springer Berlin Heidelberg 2012

BIBLIOGRAPHY 219

[203] Samuel Marchal Jerome Francois Cynthia Wagner Radu StateAlexandre Dulaunoy Thomas Engel and Olivier Festor Dnssm Alarge-scale passive dns security monitoring framework In IEEEIFIPNetwork Operations and Management Symposium pages 988 ndash 993IEEE 2012

[204] Jerome Francois Cynthia Wagner Radu State and Thomas EngelSafem Scalable analysis of flows with entropic measures and svm InProceedings of the Network Operations and Management Symposium2012 pages 510 ndash513 IEEE 2012

[205] Cynthia Wagner Jerome Francois Radu State Alexandre DulaunoyGerard Wagener and Thomas Engel Sdbf Smart dns brute-forcer In IEEEIFIP Network Operations and Management Sympo-sium (NOMSrsquo12) pages 1001ndash1007 IEEE 2012 to appear

[206] Jeehyun Hwang Tao Xie Donia Elkateb Tejeddine Mouelhi and YvesLe Traon Selection of regression system tests for security policy evolu-tion In Proceedings of the 27th IEEEACM International Conferenceon Automated Software Engineering pages 266ndash269 ACM 2012

[207] Assaad Moawad Vasileios Efthymiou Patrice Caire Gregory Nainand Yves Le Traon Introducing conviviality as a new paradigm forinteractions among it objects In Proceedings of the Workshop on AIProblems and Approaches for Intelligent Environments volume 907pages 3ndash8 CEUR-WSorg 2012

[208] Alexandre Bartel Jacques Klein Martin Monperrus and YvesLe Traon Automatically securing permission-based software by re-ducing the attack surface An application to android In IEEEACMInternational Conference on Automated Software Engineering pages1ndash4 2012

[209] Assaad Moawad Vasileios Efthymiou Patrice Caire Gregory Nainand Yves Le Traon Introducing conviviality as a new paradigmfor interactions among it objects In Workshop on AI Problems andApproaches for Intelligent Environments (AIIE 2012) volume 907pages 3ndash8 CEUR-WSorg 2012

[210] Antonis Bikakis Vasileios Efthymiou Patrice Caire and YvesLe Traon Introducing conviviality as a property of multi-context sys-tems In Acquisition Representation and Reasoning with Contextual-ized Knowledge (ARCOE 2012) pages 19ndash31 2012

[211] Alexandre Bartel Jacques Klein Martin Monperrus and YvesLe Traon Dexpler Converting android dalvik bytecode to jimple

220 BIBLIOGRAPHY

for static analysis with soot In ACM SIGPLAN International Work-shop on the State Of the Art in Java Program Analysis (SOAP 2012)pages 1ndash12 2012

[212] Donia Elkateb Tejeddine Mouelhi Yves Le Traon Jeehyun Hwangand Tao Xie Refactoring access control policies for performance im-provement In Proceedings of the third joint WOSPSIPEW interna-tional conference on Performance Engineering pages 323ndash334 ACM2012

[213] Yehia Elrakaiby Tejeddine Mouelhi and Yves Le Traon Testing obli-gation policy enforcement using mutation analysis In Proceedings ofthe fourth International Conference on Software Testing Verificationand Validation ICST 2012 pages 673 ndash680 IEEE 2012

[214] Dianxiang Xu Lijo Thomas Michael Kent Tejeddine Mouelhi andYves Le Traon A model-based approach to automated testing ofaccess control policies In Proceedings of the 17th ACM Symposium onAccess Control Models and Technologies pages 209ndash218 2012

[215] Xihui Chen Carlo Harpes Gabriele Lenzini Miguel Martins SjoukeMauw and Jun Pang Implementation and validation of a localisationassurance service provider In Proc of the 6th ESA Workshop onSatellite Navigation Technologies and European Workshop on GNSSSignals and Signal Processing (NAVITEC 2012) pages 1ndash7 IEEE2012

[216] Xihui Chen Gabriele Lenzini Sjouke Mauw and Jun Pang A groupsignature based electronic toll pricing system In Proceedings of the7th International Conference on Availability Reliability and Securitypages 85ndash93 IEEE Computer Society 2012

[217] Gan Zheng Symeon Chatzinotas and Bjorn Ottersten Multi-gatewaycooperation in multibeam satellite systems In IEEE 23rd Interna-tional Symposium on Personal Indoor and Mobile Radio Communica-tions (PIMRC) pages 1360ndash1364 2012

[218] Qingmin Meng Wei Feng Gan Zheng Symeon Chatzinotas andBjorn Ottersten Fixed full duplex relaying for wireless broadbandcommunication In International Conference on Wireless Communi-cations and Signal Processing WCSP 2012 2012

[219] Gan Zheng Li Jiangyuan Kai-Kit Wong Athina P Petropulu andBjorn Ottersten Using simple relays to improve physical-layer secu-rity In 1st IEEE International Conference on Communications inChina (ICCC2012) pages 329ndash333 2012

BIBLIOGRAPHY 221

[220] Sabrina Gerbracht Eduard A Jorswieck Gan Zheng and Bjorn Ot-tersten Non-regenerative two-hop wiretap channels using interferenceneutralization In Proceedings of the International Workshop on In-formation Forensics and Security pages 1ndash1 IEEE 2012

[221] Bhavani Shankar M R Saikat Chatterjee and Bjorn Ottersten De-tection of sparse random signals using compressive measurements InProceedings of IEEE International Conference on Acoustics Speechand Signal Processing pages 3257 ndash 3260 2012

[222] Bjorn Ottersten Signal processing challenges in satellite networks In2012 International Conference on Wireless Communications and Sig-nal Processing(WCSP 2012) pages 1ndash1 WCSP 2012 2012 KeynoteSpeaker

[223] Efthymios Tsakonas Joakim Jalden Nicolas D Sidiropoulos andBjorn Ottersten Maximum likelihood based sparse and distributedconjoint analysis In Statistical Signal Processing Workshop (SSP)2012 IEEE pages 33ndash36 IEEE 2012

[224] Symeon Chatzinotas and Bjorn Ottersten Capacity analysis of dual-hop amplify-and-forward mimo multiple-access channels In Interna-tional Conference on Wireless Communications and Signal ProcessingWCSP 2012 IEEE 2012

[225] Symeon Chatzinotas and Bjorn Ottersten Cognitive interferencealignment between small cells and a macrocell In 19th InternationalConference on Telecommunications (ICT) 2012 volume 1-6 IEEE2012

[226] Alexis Aravanis Bhavani Shankar M R Gregoire Danoy Pantelis-Daniel Arapoglou Panayotis Cottis and Bjorn Ottersten Multi-objective optimization approach to power allocation in multibeam sys-tems In 30th AIAA International Communications Satellite SystemsConference pages 1ndash6 2012

[227] Alexis Aravanis Bhavani Shankar M R Gregoire Danoy Pantelis-Daniel Arapoglou Panayotis Cottis and Bjorn Ottersten Power allo-cation in multibeam satellites - a hybrid-genetic algorithm approachIn 2nd ESA Workshop on Advanced Flexible Telecom Payloads pages1ndash5 European Space Agency 2012

[228] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenSpectrum sensing in dual polarized fading channels for cognitive sat-coms In accepted for publication in the proceedings of the IEEE Globe-com 2012 conference IEEE 2012

222 BIBLIOGRAPHY

[229] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenSatellite cognitive communications Interference modeling and tech-niques selection In 6th Advanced Satellite Multimedia Systems Con-ference (ASMS) and 12th Signal Processing for Space CommunicationsWorkshop (SPSC) pages 111ndash118 2012

[230] Frederic Garcia Djamila Aouada Hashim Kemal Abdella ThomasSolignac Bruno Mirbach and Bjorn Ottersten Depth enhancement byfusion for passive and active sensing In 12th European Conference onComputer Vision (ECCV) volume 7585 of Lecture Notes in ComputerScience pages 506ndash515 Springer Berlin Heidelberg 2012

[231] Shree Krishna Sharma Symeon Chatzinotas and Bjorn OtterstenExploiting polarization for spectrum sensing in cognitive satcoms In7th International Conference on Cognitive Radio Oriented WirelessNetworks pages 36ndash41 2012

[232] Kassem Al Ismaeil Djamila Aouada Bruno Mirbach and Bjorn Ot-tersten Bilateral filter evaluation based on exponential kernels In21st International Conference on Pattern Recognition IEEE Xplore2012

[233] Frederic Garcia Djamila Aouada Bruno Mirbach and Bjorn Otter-sten Spatio-temporal tof data enhancement by fusion In IEEE Inter-national Conference on Image Processing (ICIP) pages 1 ndash 4 IEEE2012

[234] Symeon Chatzinotas and Bjorn Ottersten Coordinated multipointuplink capacity over a mimo composite fading channel In Interna-tional Conference on Computing Networking and Communicationspages 1061 ndash1065 IEEE 2012

[235] Jiaheng Wang Mats Bengtsson Bjorn Ottersten and Daniel P Palo-mar Robust maximin mimo precoding for arbitrary convex uncer-tainty sets In Proceedings IEEE International Conference on Acous-ticsSpeechand Signal Processing (ICASSP) pages 3045ndash3048 IEEE2012

[236] Dalia Khader Ben Smyth Peter Y A Ryan and Feng Hao A fairand robust voting system by broadcast In International Conferenceon Electronic Voting volume 205 pages 285ndash299 Lecture Notes inInformatics 2012

[237] Craig Burton Burton Chris Culnane James Heather Thea PeacockPeter Ryan Steve Schneider Vanessa Teague Roland Wen Zhe Xiaand Sriramkrishnan Srinivasan A supervised verifiable voting protocolfor the victorian electoral commission In 5th International Conference

75 Internal Reports 223

on Electronic Voting 2012 5th International Conference on ElectronicVoting (EVOTE 2012) LNI pages 81ndash94 GI 2012

[238] Craig Burton Chris Culnane James Heather Thea Peacock PeterRyan Steve Schneider Sriramkrishnan Srinivasan Vanessa TeagueRoland Wen and Zhe Xia A supervised verifiable voting protocol forthe victorian electoral commission In 2012 Electronic Voting Tech-nology WorkshopWorkshop on Trustworthy Elections pages 1ndash100USENIX 2012

[239] Markus Jostock and Jurgen Sachau Compound model of inverterdriven grids In 5th International Conference on Integration of Re-newable and Distributed Energy Resources pages 194ndash195 OTTI -Ostbayerisches Technologie-Transfer-Institut eV 2012

[240] Markus Jostock and Jurgen Sachau Frequency coupling in invertergrids In 5th International Conference on Integration of RenewableEnergy and Distributed Energy Resources pages 192ndash193 OTTI - Os-tbayerisches Technologie-Transfer-Institut eV 2012

[241] Guido Boella Patrice Caire Leendert van der Torre and Ser-ena Villata Dependence networks for agreement technologies InAT2012 Agreement Technologies Proceedings of the First Interna-tional Conference on Agreement Technologies volume 918 pages 109ndash110 CEUR 2012

[242] Alan Perotti Guido Boella Silvano Colombo Tosatto Artur S drsquoAvilaGarcez Valerio Genovese and Leendert van der Torre Learning andreasoning about norms using neural-symbolic systems In Proceed-ings of the 11th International Conference on Autonomous Agents andMultiagent Systems - Volume 2 volume 2 pages 1023ndash1030 2012

75 Internal Reports

[243] Mihail Minev Christoph Schommer and Theoharry GrammatikosNews and stock markets A survey on abnormal returns and predictionmodels Technical Report - 2012

[244] Alexandre Bartel Jacques Klein Martin Monperrus Kevin Allix andYves Le Traon Improving privacy on android smartphones throughin-vivo bytecode instrumentation Technical report SnT TechnicalReport 2012

[245] Vasileios Efthymiou and Patrice Caire Diagram analysis report Usecases for conviviality and privacy in ambient intelligent systems Tech-nical report SnT Luxembourg 2012

224 BIBLIOGRAPHY

[246] Markus Forster Raphael Frank and Thomas Engel Evaluation ofsensors in modern smartphones for vehicular traffic monitoring Tech-nical report SnT 2012

[247] Raphael Frank Markus Forster Gerla Mario and Thomas EngelA survey on the performance of commercial mobile access networksTechnical report 2012

[248] Christopher Henard Mike Papadakis Gilles Perrouin Jacques KleinPatrick Heymans and Yves Le Traon Bypassing the combinatorialexplosion Using similarity to generate and prioritize t-wise test suitesfor large software product lines Technical report 2012 TechnicalReport

76 Proceedings

[249] Valentin Goranko and Wojciech Jamroga editors Proceedings of the5th Workshop on Logical Aspects of Multi-Agent Systems (LAMAS2012) IFAAMAS 2012

[250] STAST 2012 IEEE 2012

[251] Security and Intelligent Information Systems volume 7053 of LNCSSpringer 2012

Appendix A

Additional References

[252] Lauaro Dolberg Jampaposerome Francois and Thomas Engel EfficientMultidimensional Aggregation for Large Scale Monitoring In LargeInstallation System Administration Conference (LISA) San DiegoUSA 2012 USENIX

[253] Guido Boella Luigi di Caro Livio Robaldo and Llio Humphreys Us-ing legal ontology to improve classification in the eunomos legal docu-ment and knowledge management system In Semantic Processing ofLegal Texts (SPLeT-2012) Workshop Proceedings of the Eighth Inter-national Conference on Language Resources and Evaluation (LRECrsquo12) pages 13ndash20 2012

[254] Alessandra Bagnato Barbara Kordy Per H Meland and PatrickSchweitzer Attribute decoration of attack-defense trees InternationalJournal of Secure Software Engineering 3(2)1ndash35 2012

[255] Xihui Chen David Fonkwe and Jun Pang Post-hoc analysis of usertraceability in electronic toll collection systems In Proc 7th Work-shop on Data Privacy Management (DPMrsquo12) LNCS pages 19ndash42Springer 2013

[256] Xihui Chen Jun Pang and Ran Xue Constructing and comparinguser mobility profiles for location-based services In Proc 28th ACMSymposium on Applied Computing (SACrsquo13) ACM Press 2013

[257] Xihui Chen and Jun Pang Exploring dependency for query privacyprotection in location-based services In Proc 3rd ACM Conference

226 BIBLIOGRAPHY

on Data and Application Security and Privacy (CODASPYrsquo13) ACMPress 2013

[258] Barbara Kordy Sjouke Mauw Sasa Radomirovic and PatrickSchweitzer AttackndashDefense Trees Journal of Logic and Computa-tion 2013 Preprint available at httpsatossunilumembers

barbarapapersADT12pdf

[259] T van Deursen S Mauw and S Radomirovic mCarve Carvingattributed dump sets In 20th USENIX Security Symposium pages107ndash121 USENIX Association August 2011

[260] Simon Kramer Rajeev Gore and Eiji Okamoto Computer-aideddecision-making with trust relations and trust domains (cryptographicapplications) Journal of Logic and Computation 2012

[261] Simon Kramer A logic of interactive proofs Technical report Uni-versity of Luxembourg 2012 Available at httparxivorgabs

12013667

[262] Simon Kramer Logic of negation-complete interactive proofs (formaltheory of epistemic deciders) Technical report University of Luxem-bourg 2012 Available at httparxivorgabs12085913

[263] Simon Kramer Logic of non-monotonic interactive proofs (formaltheory of temporary knowledge transfer) Technical report Universityof Luxembourg 2012 Available at httparxivorgabs1208

1842

[264] Simon Kramer and Joshua Sack Parametric constructive kripke-semantics for standard multi-agent belief and knowledge (knowledgeas unbiased belief) Technical report University of Luxembourg 2012Available at httparxivorgabs12091885

[265] Jerome Francois Shaonan Wang Walter Bronzi Radu State andThomas Engel Botcloud Detecting botnets using mapreduce InProceddings of International Workshop on Information Forensics andSecurity (WIFSrsquo11) pages 1ndash6 IEEE 2011

[266] Andreas Zinnen and Thomas Engel Towards economic energy tradingin cloud environments In IEEE International Conference on CloudComputing Technology and Science pages 477ndash481 2011

[267] Andreas Zinnen and Thomas Engel Deadline constrained schedulingin hybrid clouds with gaussian processes In High Performance Com-puting and Simulation Conference (HPCS) pages 294 ndash 300 2011

BIBLIOGRAPHY 227

[268] Jerome Francois Radu State Thomas Engel and Olivier Festor En-forcing security with behavioral fingerprinting In International Con-ference on Network and Service Management (CNSM) pages 1 ndash92011

[269] Andriy Panchenko Lukas Niessen Andreas Zinnen and Thomas En-gel Website fingerprinting in onion routing based anonymization net-works In Proceedings of the 10th ACM Computer and Communica-tions Security (ACM CCS) Workshop on Privacy in the ElectronicSociety (WPES) pages 103ndash114 ACM Press 2011

[270] Andriy Panchenko Otto Spaniol Andre Egners and Thomas EngelLightweight hidden services In Proceedings of the 10th IEEE Interna-tional Conference on Trust Security and Privacy in Computing andCommunications (IEEE TrustCom 2011) Changsha China Novem-ber 2011 IEEE Computer Society 2011

[271] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Breaking tor anonymity with game theory anddata mining CONCURRENCY AND COMPUTATION PRACTICEAND EXPERIENCE pages 1ndash14 2011

[272] Raphael Frank Eugenio Giordano Mario Gerla and Thomas EngelPerformance bound for routing in urban scenarios In Proceedings ofthe 7th Asian Internet Engineering Conference (AINTEC) pages 38ndash45 2011

[273] Thorsten Ries Volker Fusenig Christian Vilbois and Thomas EngelVerification of data location in cloud networking In 2011 Fourth IEEEInternational Conference on Utility and Cloud Computing pages 439ndash444 2011

[274] Thorsten Ries Radu State and Thomas Engel Measuring anonymityusing network coordinate systems In 11th International Symposiumon Communications and Information Technologies (ISCIT) 2011pages 366ndash371 2011

[275] Stefan Hommes Radu State and Thomas Engel Detection of abnor-mal behaviour in a surveillance environment using control charts InIEEE International Conference on Advanced Video and Signal basedSurveillance (AVSS) pages 113ndash118 2011

[276] David Fotue Foued Melakessou Houda Labiod and Thomas EngelMini-sink mobility with diversity-based routing in wireless sensor net-works In Proceedings of the 8th ACM Symposium on Performanceevaluation of wireless ad hoc sensor and ubiquitous networks (PE-WASUN) pages 9ndash16 ACM 2011

228 BIBLIOGRAPHY

[277] David Fotue Foued Melakessou Houda Labiod and Thomas EngelA distributed hybrid channel selection and routing technique for wire-less sensor networks In IEEE 74th Vehicular Technology ConferenceVTC-Fall pages 1ndash6 IEEE 2011

[278] Cynthia Wagner Gerard Wagener Radu State and Thomas EngelPeeking into ip flow records using a visual kernel method In IWANN2011 workshops Part II CISIS 2011 volume 6694 pages 41ndash49LNCS Springer Verlag 2011

[279] Cynthia Wagner Jerome Francois Radu State and Thomas EngelMachine learning approach for ip-flow record anomaly detection InProceedings of the 10th international IFIP TC 6 conference on Net-working (NETWORKING) volume 6640 pages 28ndash39 Springer Ver-lag 2011

[280] Thorsten Ries Andriy Panchenko Radu State and Thomas EngelComparison of low-latency anonymous communication systems - prac-tical usage and performance In Australasian Information SecurityConference (AISC 2011) volume 116 pages 77ndash86 ACS 2011

[281] David Fotue Foued Melakessou Houda Labiod and Thomas EngelEffect of sink location on aggregation based on degree of connectivityfor wireless sensor networks In First International Workshop on Ad-vanced Communication Technologies and Applications to Intelligenttransportation systems Cognitive radios and Sensor Networks (AC-TICS) pages 271 ndash 276 2011

[282] Pascal Bouvry Horacio Gonzalez-Velez and Joanna Kolodziej In-telligent Decision Systems in Large-Scale Distributed Environmentsvolume 362 of Studies in Computational Intelligence Springer 2011

[283] Bernabe Dorronsoro and Pascal Bouvry Adaptive neighborhoods forcellular genetic algorithms In Nature Inspired Distributed Computing(NIDISC) sessions of the International Parallel and Distributed Pro-cessing Symposium (IPDPS) 2011 Workshop pages 383ndash389 IEEE2011

[284] Patricia Ruiz Bernabe Dorronsoro and Pascal Bouvry Optimiza-tion and performance analysis of the aedb broadcasting algorithmIn IEEE International Workshop on Wireless Mesh and Ad Hoc Net-works pages 1ndash6 IEEE 2011

[285] Mateusz Guzek Johnatan E Pecero Bernabe Dorronsoro and PascalBouvry Energy-aware scheduling of parallel applications with multi-objective evolutionary algorithm In A Bridge between Probability SetOriented Numerics and Evolutionary Computation pages 1ndash4 2011

BIBLIOGRAPHY 229

[286] Bernabe Dorronsoro and Pascal Bouvry On the use of small-world population topologies for genetic algorithms In Proceedingsof EVOLVE 2011 2011

[287] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry Multi-objective cooperative coevolutionary algorithms for robust schedulingIn Proceedings of EVOLVE 2011 2011

[288] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee In Proceedings des 20eme ren-contres francophones du parallelisme (RenParrsquo20) pages 1ndash10 2011

[289] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certiclouda novel tpm-based approach to ensure cloud iaas security In Proceed-ings of the 4th IEEE Intl Conf on Cloud Computing (CLOUD 2011)pages 121 ndash 130 IEEE Computer Society 2011

[290] Julien Schleich Guillaume-Jean Herbiet Patricia Ruiz Pascal Bou-vry Jerome Wagener Paul Bicheler Frederic Guinand and SergeChaumette Enhancing the broadcast process in mobile ad hoc net-works using community knowledge In Proceedings of the first ACMinternational symposium on Design and analysis of intelligent vehicu-lar networks and applications pages 23ndash30 2011

[291] V Goranko W Jamroga and P Turrini Strategic games and trulyplayable effectivity functions In Proceedings of AAMAS2011 pages727ndash734 2011

[292] M de Boer D Gabbay X Parent and M Slavkovik Two dimensionalstandard deontic logic [including a detailed analysis of the 1985 jonesndashporn deontic logic system] Synthese pages 1ndash38 2011

[293] Harold Castro German Sotelo Cesar O Diaz and Pascal BouvryGreen flexible opportunistic computing with virtualization In Pro-ceedings of the 11th IEEE International Conference on Computer andInformation Technology pages 629ndash634 2011

[294] Cesar O Diaz Mateusz Guzek Johnatan E Pecero Pascal Bouvryand Samee U Khan Scalable and energy-efficient scheduling tech-niques for large-scale systems In Proceedings of the 11th IEEE Inter-national Conference on Computer and Information Technology pages641ndash647 2011

[295] Cesar O Diaz Mateusz Guzek Johnatan E Pecero Gregoire DanoyPascal Bouvry and Samee U Khan Energy-aware fast schedulingheuristics in heterogeneous computing systems In Proceedings of the2011 International Conference on High Performance Computing ampSimulation (HPCS 2011) pages 478ndash484 2011

230 BIBLIOGRAPHY

[296] Jean Botev and Marco Milanesio Code - an application-layer frame-work for confidentiality in distributed environments In Proceedingsof the 3rd International Workshop on Collaborative Social Computing(SocialComp 2011) 2011

[297] Jean Botev Wei Tsang Ooi and Ingo Scholtes Getting real - self-organized resource allocation on second life avatar traces In Proceed-ings of the 4th International Workshop on Massively Multiuser VirtualEnvironments (MMVE 2011) pages 170 ndash 175 IEEE 2011

[298] Gregoire Danoy Bernabe Dorronsoro and Pascal Bouvry New state-of-the-art results for cassini2 global trajectory optimization problemIn International Joint Conference on Artificial Intelligence (IJCAI)Workshop on AI in Space Intelligence beyond planet Earth pages1ndash6 2011

[299] Bernabe Dorronsoro and Pascal Bouvry The explorationexploitationtradeoff in dynamic cellular evolutionary algorithms IEEE Transac-tions on Evolutionary Computation 15(1)67ndash98 2011

[300] Bernabe Dorronsoro Gregoire Danoy Pascal Bouvry and Antonio JNebro Multi-objective Cooperative Coevolutionary Evolutionary Algo-rithms for Continuous and Combinatorial Optimization volume 362of Studies in Computational Intelligence series pages 49ndash74 Springer2011

[301] Alexandru-Adrian Tantar Emilia Tantar and Pascal Bouvry Loadbalancing for sustainable ict In 13th Annual Genetic and Evolution-ary Computation Conference (GECCO 2011) Companion MaterialProceedings pages 733ndash738 ACM 2011

[302] Alexandru-Adrian Tantar Emilia Tantar and Pascal Bouvry A clas-sification of dynamic multi-objective optimization problems In 13thAnnual Genetic and Evolutionary Computation Conference (GECCO2011) Companion Material Proceedings pages 105ndash106 ACM 2011

[303] Emilia Tantar Alexandru-Adrian Tantar and Pascal Bouvry On dy-namic multi- objective optimization - classification and performancemeasures In Proceedings of the IEEE Congress on Evolutionary Com-putation pages 2759ndash2766 2011

[304] Eugenio Giordano Raphael Frank Giovanni Pau and Mario GerlaCorner A radio propagation model for vanets in urban scenariosProceedings of the IEEE 99(7)1280 ndash 1294 2011

[305] Johnatan Pecero Frederic Pinel Bernabe Dorronsoro GregoireDanoy Pascal Bouvry and Albert Zomaya Efficient Hierarchical

BIBLIOGRAPHY 231

Task Scheduling on GRIDS Accounting for Computation and Commu-nications volume 362 of Studies in Computational Intelligence pages25ndash48 Springer 2011

[306] Cynthia Wagner Jerome Francois Radu State and Thomas EngelDanakfinding the odd In Proceedings of the 5th International Con-ference on Network and System Security 2011 (NSS2011) pages 161ndash168 IEEE 2011

[307] Patricia Ruiz Bernabe Dorronsoro Giorgio Valentini Frederic Pineland Pascal Bouvry Optimisation of the enhanced distance basedbroadcasting protocol for manets J of Supercomputing Special Is-sue on Green networks pages 1ndash28 2011

[308] Jean Botev and Steffen Rothkugel Flora - flock-based resource alloca-tion for decentralized distributed virtual environments In Proceedingsof the 2nd International Workshop on Distributed Simulation and On-line Gaming (DISIO 2011) 2011

[309] Sebastien Varrette Emilia Tantar and Pascal Bouvry On the re-silience of [distributed] eas against cheaters in global computing plat-forms In IPDPS Workshops pages 409ndash417 IEEE 2011

[310] Alexandru-Adrian Tantar Gregoire Danoy Pascal Bouvry and SameeKhan Energy-Efficient Computing using Agent-Based Multi-ObjectiveDynamic Optimization pages 267ndash287 Springer New York NY USA2011

[311] Bernabe Dorronsoro and Pascal Bouvry Differential evolution algo-rithms with cellular populations Parallel Problem Solving from Nature(PPSN) Lecture Notes in Computer Science 6239320ndash330 2011

[312] Alexandre Bartel Benoit Baudry Freddy Munoz Jacques KleinTejeddine Mouelhi and Yves Le Model driven mutation applied toadaptative systems testing In Proceedings of the 2011 IEEE FourthInternational Conference on Software Testing Verification and Vali-dation Workshops ICSTW rsquo11 pages 408ndash413 IEEE Computer Soci-ety 2011

[313] Marwane El Kharbili Qin Ma Pierre Kelsen and Elke PulvermuellerEnterprise regulatory compliance modeling using corel An illustra-tive example In 13th IEEE Conference on Commerce and EnterpriseComputing pages 185ndash190 IEEE Computer Society Press 2011

[314] Marwane El Kharbili Qin Ma Pierre Kelsen and Elke PulvermuellerCorel Policy-based and model-driven regulatory compliance manage-ment In Proceedings of the 15th IEEE International Enterprise Dis-

232 BIBLIOGRAPHY

tributed Object Computing Conference pages 247ndash256 IEEE Com-puter Society Press 2011

[315] Wojciech Jamroga Sjouke Mauw and Matthijs Melissen Fairness innon-repudiation protocols In Security and Trust Management LectureNotes in Computer Science volume 7170 pages 122ndash139 Springer2012

[316] Agata Grzybek Gregoire Danoy and Pascal Bouvry Generation ofrealistic traces for vehicular mobility simulations In Proceedings ofthe second ACM international symposium on Design and analysis ofintelligent vehicular networks and applications DIVANet rsquo12 pages131ndash138 New York NY USA 2012 ACM

[317] Clark Thomborson Christian Collberg and Douglas Low A taxonomyof obfuscating transformations 1997

[318] Boaz Barak Oded Goldreich Russel Impagliazzo Steven RudichAmit Sahai Salil Vadhan and Ke Yang On the (im)possibility ofobfuscating programs 2001

[319] Christian Collberg and Jasvir Nagra Surreptitious Software Obfus-cation Watermarking and Tamperproofing for Software ProtectionAddison-Wesley Professional 2009

[320] M H Halstead Elements of software science 1977

[321] E I Oviedo Control flow data flow and program complexity Pro-ceedings of IEEE COMPSAC pages 146ndash152 1980

[322] Terence J Parr T J Parr and R W Quong Antlr A predicated-ll(k)parser generator 1995

[323] Benoit Bertholon Sebastien Varrette and Pascal Bouvry Certicloudune plate-forme cloud iaas securisee Technique et science informa-tiques 31(8-9-10)1121ndash1152 2012

[324] Jshadobf A javascript obfuscator based on evolutionary algorithmshttpjshadobfunilu 2013

[325] Apostolos Stathakis Gregoire Danoy El-Ghazali Talbi and PascalBouvry A local search algorithm for telecommunication satellite pay-load configuration In International Conference on Metaheuristics andNature Inspired Computing 2012

[326] Levi Lucio and Nicolas Guelfi A precise definition of operationalresilience Technical Report TR-LASSY-11-02 University of Luxem-bourg 2011

BIBLIOGRAPHY 233

[327] Nicolas Guelfi A formal framework for dependability and resiliencefrom a software engineering perspective Technical Report TR-LASSY-10-01 University of Luxembourg 2010

[328] Guido Boella Gabriella Pigozzi Marija Slavkovik and Leendertvan der Torre Group intentions are social choice with commitmentIn Procs of the 8th European Workshop on Multi-agent Systems (EU-MASrsquo10) 2010

[329] Patricia Ruiz and Pascal Bouvry On the improvement of the enhanceddistance based broadcasting algorithm Int J of Communication Net-works and Distributed Systems in Press

[330] Patricia Ruiz Bernabe Dorronsoro Pascal Bouvry and Lorenzo JTardon Information dissemination in vanets based upon a tree topol-ogy Journal of Ad hoc Networks 10(1)111ndash127 2012

[331] State R Ries T and A Panchenko Comparison of low-latency anony-mous communication systems - practical usage and performance InColin Boyd and Josef Pieprzyk editors Australasian Information Se-curity Conference (AISC 2011) volume 116 of CRPIT pages 77ndash86Perth Australia 2011 ACS

[332] Michael Kirley and Robert Stewart An analysis of the effects of pop-ulation structure on scalable multiobjective optimization problems InProceedings of the 9th annual conference on Genetic and evolutionarycomputation GECCO rsquo07 pages 845ndash852 New York NY USA 2007ACM

[333] Matthijs T J Spaan and Nikos A Vlassis Perseus Randomizedpoint-based value iteration for pomdps J Artif Intell Res (JAIR)24195ndash220 2005

[334] Pierre Del Moral Feynman-Kac formulae genealogical and interact-ing particle systems with applications Springer series in statisticsProbability and its applications Springer 2004

[335] Pierre Del Moral Arnaud Doucet and Ajay Jasra Sequential montecarlo samplers Journal of the Royal Statistical Society Series B (Sta-tistical Methodology) 68(3)411ndash436 2006

[336] Juan Luis Jimenez Laredo Pascal Bouvry Sanaz Mostaghim andJuan Julian Merelo Guervos Validating a peer-to-peer evolutionaryalgorithm In European Conference on the Applications of Evolution-ary Computation Accepted for publication in 2012

234 BIBLIOGRAPHY

[337] Daniel Lombra na Gonzalez Juan Luis Jimenez Laredo Francisco Fer-nandez de Vega and Juan Julian Merelo Guervos CharacterizingFault-tolerance in Evolutionary Algorithms Springer Verlag Acceptedfor publication in 2012

[338] F Caldeira T Schaberreiter E Monteiro J Aubert P Simoes andD Khadraoui Trust based interdependency weighting for on-line riskmonitoring in interdependent critical infrastructures In Risk and Se-curity of Internet and Systems (CRiSIS) 2011 6th International Con-ference on pages 1 ndash7 sept 2011

[339] T Schaberreiter J Aubert and D Khadraoui Critical infrastructuresecurity modelling and resci-monitor A risk based critical infrastruc-ture model In IST-Africa Conference Proceedings 2011 pages 1 ndash8may 2011

[340] Thomas Schaberreiter Filipe Caldeira Jocelyn Aubert EdmundoMonteiro Djamel Khadraoui and Paulo Simones Assurance and trustindicators to evaluate accuracy of on-line risk in critical infrastruc-tures In CRITIS2011 conference proceedings September 2011

[341] Thomas Schaberreiter Kati Kittila Kimmo Halunen Juha Roningand Djamel Khadraoui Risk assessment in critical infrastructuresecurity modelling based on dependency analysis (short paper) InCRITIS2011 conference proceedings September 2011

[342] Andriy Panchenko Privacy in communications on the internet Prac-tice of Information Processing and Communication Praxis der In-formationsverarbeitung und Kommunikation (PIK) 34(2) 2011

[343] Andriy Panchenko Anonymous communication in the digitalworld In 17th Conference on Communication in Distributed Systems(KiVSrsquo11) Kiel Germany march 2011 OASIcs ndash OpenAccess Seriesin Informatics

[344] Andriy Panchenko Otto Spaniol Andre Egners and Thomas EngelLightweight hidden services In 10th IEEE International Conferenceon Trust Security and Privacy in Computing and Communications(IEEE TrustCom 2011) Changsha China nov 2011 IEEE ComputerSociety Press

[345] Jerome Francois Shaonan Wang Walter Bronzi Radu State andThomas Engel Botcloud Detecting botnets using mapreduce InProceddings of International Workshop on Information Forensics andSecurity (WIFSrsquo11) pages 0ndash0 IEEE 2011

BIBLIOGRAPHY 235

[346] Jerome Francois Radu State Thomas Engel and Olivier Festor En-forcing security with behavioral fingerprinting In International Con-ference on Network and Service Management (CNSM) 2011

[347] AJ Nebro JJ Durillo F Luna B Dorronsoro and E Alba MocellA cellular genetic algorithm for multiobjective optimization Interna-tional Journal of Intelligent System Special Issue on Nature InspiredCooperative Strategies 24(7)726ndash746 2009

[348] Gabriella Pigozzi Marija Slavkovik and Leendert van der Torre Acomplete conclusion-based procedure for judgment aggregation InProceedings of the First International Conference on Algorithmic De-cision Theory (ADT) volume 5783 5783 of Lecture Notes in ArtificialIntelligence pages 1ndash13 Springer Verlag 2009

[349] Davide Grossi Gabriella Pigozzi and Marija Slavkovik White ma-nipulation in judgment aggregation In Proceedings of BNAIC 2009- The 21st Benelux Conference on Artificial Intelligence (to appear)2009

[350] Laurent Kirsch Markus Esch and Steffen Rothkugel The SnippetSystem - Fine-Granular Management of Documents and Their Re-lationships In Proceedings of the 6th International Conference onHuman-Computer Interaction (HCI 2011) Washington DC USA2011 IASTED

[351] Bernd Klasen Efficient Content Distribution in Social-Aware HybridNetworks Journal of Computational Science 2011

[352] Jean Botev Sociality and Self-Organization in Next-Generation Dis-tributed Environments PhD thesis University of Luxembourg 2011

[353] Peter Ryan James Heather and Vanessa Teague Pretty good democ-racy for more expressive voting schemes In Computer Security ndash ES-ORICS 2010 15th European Symposium on Research in Computer Se-curity Athens Greece September 20-22 2010 Proceedings pages 405ndash 423 2010

[354] Zhe Xia Chris Culnane James Heather Hugo Jonker Peter RyanSteve Schneider and Sriramkrishnan Srinivasan Versatile pret a voterHandling multiple election methods with a unified interface In Pro-ceedings of the 11th International Conference on Cryptology in India(Indocryptrsquo10) pages 98ndash114 2010

[355] Barbara Kordy Marc Pouly and Patrick Schweitzer Computationalaspects of attack-defense trees In Security and Intelligent InformationSystems volume LNCS 7053 pages 103ndash116 Springer 2012

236 BIBLIOGRAPHY

[356] Gerard Wagener Radu State Alexandre Dulaunoy and Thomas En-gel Heliza talking dirty to the attackers Journal in Computer Vi-rology pages 1ndash12 2010

[357] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Breaking tor anonymity with game theory anddata mining In Proceedings of 4th International Conference on Net-work and System Security NSS2010 pages 47ndash54 IEEE 2010 BestPaper Award of NSS 2010

[358] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Game theory driven monitoring of spatial-aggregated ip flow records In Proceedings of the 6th InternationalConference on Network and Services Management (CNSM) pages 0ndash0 IEEE 2010

[359] Cynthia Wagner Gerard Wagener Radu State Alexandre Dulaunoyand Thomas Engel Peekkernelflows Peeking into ip flows In Pro-ceedings of the Seventh International Symposium on Visualization forCyber Security pages 52ndash57 ACM International Conference Proceed-ings Series ACM New York NY USA 2010

[360] Cynthia Wagner Gerard Wagener Radu State and Thomas EngelMonitoring of spatial-aggregated ip-flow records In Advances in SoftComputing Series - CISISrsquo10 volume 85 pages 117ndash124 Springer2010

[361] Bernd Klasen Social fast efficient Content distribution in hybridnetworks In Computers and Communications (ISCC) 2011 IEEESymposium on pages 61ndash67 Kerkyra June 2011 IEEE

[362] Samuel Marchal Jerome Francois Cynthia Wagner and Thomas En-gel Semantic exploration of dns In 11th Networking Conference 2012pages 1ndash8 2012

[363] Samuel Marchal Jerome Francois Cynthia Wagner Radu StateAlexandre Dulaunoy Thomas Engel and Olivier Festor Dnssm Alarge-scale passive dns security monitoring framework In IEEEIFIPNetwork Operations and Management Symposium pages 1ndash8 IEEE2012

[364] David Fotue Foued Melakessou Thomas Engel and Houda LabiodDesign of new aggregation techniques for wireless sensor networks InThe 18th Annual Meeting of the IEEEACM International Symposiumon Modeling Analysis and Simulation of Computer and Telecommu-nication Systems pages 1ndash1 MASCOTS 2010

BIBLIOGRAPHY 237

[365] David Fotue Foued Melakessou Houda Labiod and Thomas EngelDesign of an enhanced energy conserving routing protocol based onroute diversity in wireless sensor networks In The 9th IEEEIFIPAnnual Mediterranean Ad Hoc Networking Worshop pages 1ndash6 IEEEXplore 2010

[366] Guillaume Aucher Guido Boella and Leendert van der Torre Adynamic logic for privacy compliance Artif Intell Law 19(2-3)187ndash231 2011

[367] Jerome Leemans and Nuno Amalio Modelling a cardiac pacemakervisually and formally In VLHCC 2012 pages 257ndash258 IEEE 2012

[368] Mauricio Alferez Nuno Amalio Selim Ciraci et al Aspect-orientedmodel development at different levels of abstraction In ECMFA 2011LNCS pages 361ndash376 Springer 2011

[369] Eric Tobias Eric Ras and Nuno Amalio Suitability of visual mod-elling languages for modelling tangible user interface applications InVLHCC 2012 IEEE 2012

[370] Eric Tobias Eric Ras and Nuno Amalio VML Usability for ModellingTUI Scenarios - A Comparative Study Technical Report TR-LASSY-12-06 University of Luxembourg LASSY 2012 available at http

vclgforgeuniludocVMLCaseStudypdf

[371] Nuno Amalio The VCL model of the barbados crisis managementsystem Technical Report TR-LASSY-12-09 Univ of Luxembourg2012

[372] Jerome Leemans and Nuno Amalio A VCL model of a cardiac pace-maker Technical Report TR-LASSY-12-04 University of Luxem-bourg 2012

238 BIBLIOGRAPHY

Appendix B

CSC Statistics for 2012

B1 CSC publications

For more details see chapter 7 page 197

B2 CSC budget

See also sect23 page 6

Lab structural funding 761070e

UL Research Projects 896775e

Total 1657845 e

Table B1 CSC Internal Budget

240 CSC Statistics for 2012

B3 CSC staff per category

Category Number

Professors 16Associate Professors 7

Scientific Supp Staff Members 12Post-Docs 7

Post-Docs on projects 8PhD Students 40

Technical Support Staff Members 4Technician on project 1Administrative Staff 5Research Facilitator 1

Total 101

Professors Associated Professors Post Docs Scientific support staff PhD Students Post Docs on Project Technical support staff Technicians on projects Administrative staff Research facilitator

Figure B1 CSC HR Repartition

B3 CSC staff per category 241

Professors - Associate Professors

Lastname Firstname Position

BIRYUKOV Alexei Associate-Professor

BISDORFF Raymond Joseph Professor

BOUVRY Pascal Professor

BRIAND Lionel Professor

CORON Jean-Sebastien Associate-Professor

DUHAUTPAS Theo Professor

ENGEL Thomas Professor

GUELFI Nicolas Professor

KELSEN Pierre Professor

LE TRAON Yves Professor

LEPREVOST Frank Professor

MAUW Sjouke Professor

OTTERSTEN Bjorn Professor

MULLER Volker Associate-Professor

NAVET Nicolas Associate-Professor

ROTHKUGEL Steffen Associate-Professor

RYAN Peter Professor

SACHAU Juergen Professor

SCHOMMER Christoph Associate-Professor

SORGER Ulrich Professor

STEENIS Bernard Associate-Professor

VAN DER TORRE Leon Professor

ZAMPUNIERIS Denis Professor

Total 23

242 CSC Statistics for 2012

Research Assistants - PostDocs

Lastname Firstname PositionAMALIO Nuno Scientific Coll on ProjectBERNARD Nicolas Scientific Supp Staff MemberBOTEV Jean Post-DocCAPOZUCCA Alfredo Scientific Supp Staff MemberDANOY Gregoire Scientific Supp Staff MemberGLODT Christian Scientific Supp Staff MemberGROSZSCHADL Johann Scientific Supp Staff MemberJONKER Hugo Scientific Coll on projectKHOVRATOVICH Dmitry PostDocKLEIN Jacques Scientific Supp Staff MemberLEHTONEN Erkko Post-DocMIZERA Andrzej PostDocPANG Jun Scientific Supp Staff MemberPARENT Xavier Post-DocPECERO SANCHEZ Johnatan Post-DocRIES Benoit Scientific Supp Staff MemberRISOLDI Matteo Scientific Coll on ProjectSCHLEICH Julien Scientific Coll on ProjectSTATE Radu Scientific Supp Staff MemberSUCHANECKI Zdzislaw Scientific Supp Staff MemberTANG Qiang Post-DocTEUCHERT Andrea Scientific Coll on ProjectTURRINI Paolo Post-DocVARRETTE Sebastien Scientific Supp Staff MemberVESIC Srdjan Post-DocWEYDERT Emil Scientific Supp Staff Member

Total 27 (AFR Total 1)

B3 CSC staff per category 243

PhD Students

Lastname Firstname PositionALLIX Kevin PhD StudentAMRANI Moussa PhD StudentBERSAN Roxana-Dolores PhD StudentDANILAVA Sviatlana PhD StudentDIAZ Cesar PhD StudentDOBRICAN Remus PhD StudentDONG Naipeng PhD StudentEL KATEB Donia PhD StudentEL KHARBILI Marwane PhD StudentFRANCK Christian PhD StudentGALLAIS Jean-Francois PhD StudentGIUSTOLISI Rosario PhD StudentGOERGEN David PhD StudentKAMPAS Dimitrios PhD StudentKHAN Yasir Imtiaz PhD StudentKIRSCH Laurent PhD StudentLI Yu PhD StudentLIU Zhe PhD StudentMARQUES DIAS Sergio Scientific Coll on ProjectMELISSEN Matthijs PhD StudentMINEV Mihail PhD StudentMULLER Tim PhD StudentMUSZYNSKI Jakub PhD StudentNIELSEN Sune PhD StudentOLTEANU Alexandru-Liviu PhD StudentPEREZ URQUIDI Jose Miguel PhD StudentPINEL Frederic PhD StudentPORAY Jayanta PhD StudentPUSTOGAROV Ivan PhD StudentRIENSTRA Tjitze PhD StudentROY Arnab PhD StudentRUBAB Irman PhD StudentRUIZ Patricia PhD StudentSHIRNIN Denis PhD StudentSIMIONOVICI Ana-Maria PhD StudentSKROBOT Marjan PhD StudentSUN Xin PhD StudentVADNALA Praveen Kumar PhD StudentVENKATESH Srivinas Vivek PhD StudentZHANG Yang PhD Student

Total 40 (AFR Total 8)

244 CSC Statistics for 2012

Technical Support

Lastname Firstname PositionCARTIAUX Hyacinthe Technician on ProjectDUNLOP Dominic Technical Support Staff MemberLE CORRE Yann Technical Support Staff MemberSTEMPER Andre Technical Support Staff MemberREIS Sandro Technician on Project

Total 5

Administrativ Aid

Lastname Firstname PositionDESSART Bertrand Research facilitator

EYJOLFSDOTTIR Ragnhildur Edda SecretaryFLAMMANG Daniele SecretarySCHMITZ Fabienne SecretarySCHROEDER Isabelle SecretaryVIOLET Catherine Secretary

Total 6

Appendix C

Acronyms used

ComSys Communicative Systems Laboratory

CSC Computer Science amp Communications

HPC High Performance Computing

ILIAS Interdisciplinary Laboratory for Intelligent and Adaptive Systems

LACS Laboratory of Algorithmics Cryptology and Security

LASSY Laboratory for Advanced Software Systems

SnT Interdisciplinary Centre for Security Reliability and Trust

UL University of Luxembourg

246 Acronyms used

httpcscunilu

Computer Science amp Communication (CSC) Research UnitUniversity of LuxembourgFaculty of Science Technology and Communication6 rue Richard Coudenhove-KalergiL-1359 LuxembourgLuxembourg

Administrative ContactIsabelle Glemot-Schroeder and Fabienne Schmitz

Email cscunilu

  • 1 The Computer Science amp Communications (CSC) Research Unit
  • 2 Executive Summary
    • 21 Academic Staff Overview
    • 22 Main activities in 2012
    • 23 CSC Budget in 2012
      • 3 CSC Laboratories
        • 31 Laboratory for Advanced Software Systems
        • 32 Laboratory of Algorithmics Cryptology and Security
        • 33 Communicative Systems Laboratory
        • 34 Interdisciplinary Laboratory for Intelligent and Adaptive Systems
          • 4 Projects and Grants in 2012
            • 41 Research projects
              • 411 European funding projects
              • 412 FNR COREINTER Projects
              • 413 UL Projects
              • 414 UL PhD PostDoc
              • 415 Other miscellaneous projects
                • 42 Grants
                  • 421 AFR
                  • 422 Workshop amp Conferences (FNR Accompanying Measures)
                      • 5 CSC Representation
                        • 51 Conferences
                        • 52 PC and other memberships
                        • 53 Doctoral board
                        • 54 Guests
                        • 55 Visits and other representation activities
                        • 56 Research meeting
                          • 6 CSC Software
                          • 7 CSC Publications in 2012
                            • 71 Books
                            • 72 Book Chapters
                            • 73 International journals
                            • 74 Conferences Articles
                            • 75 Internal Reports
                            • 76 Proceedings
                              • Appendix
                              • A Additional References
                              • B CSC Statistics for 2012
                                • B1 CSC publications
                                • B2 CSC budget
                                • B3 CSC staff per category
                                  • C Acronyms used
Page 6: Computer Science and Communications Research Unit
Page 7: Computer Science and Communications Research Unit
Page 8: Computer Science and Communications Research Unit
Page 9: Computer Science and Communications Research Unit
Page 10: Computer Science and Communications Research Unit
Page 11: Computer Science and Communications Research Unit
Page 12: Computer Science and Communications Research Unit
Page 13: Computer Science and Communications Research Unit
Page 14: Computer Science and Communications Research Unit
Page 15: Computer Science and Communications Research Unit
Page 16: Computer Science and Communications Research Unit
Page 17: Computer Science and Communications Research Unit
Page 18: Computer Science and Communications Research Unit
Page 19: Computer Science and Communications Research Unit
Page 20: Computer Science and Communications Research Unit
Page 21: Computer Science and Communications Research Unit
Page 22: Computer Science and Communications Research Unit
Page 23: Computer Science and Communications Research Unit
Page 24: Computer Science and Communications Research Unit
Page 25: Computer Science and Communications Research Unit
Page 26: Computer Science and Communications Research Unit
Page 27: Computer Science and Communications Research Unit
Page 28: Computer Science and Communications Research Unit
Page 29: Computer Science and Communications Research Unit
Page 30: Computer Science and Communications Research Unit
Page 31: Computer Science and Communications Research Unit
Page 32: Computer Science and Communications Research Unit
Page 33: Computer Science and Communications Research Unit
Page 34: Computer Science and Communications Research Unit
Page 35: Computer Science and Communications Research Unit
Page 36: Computer Science and Communications Research Unit
Page 37: Computer Science and Communications Research Unit
Page 38: Computer Science and Communications Research Unit
Page 39: Computer Science and Communications Research Unit
Page 40: Computer Science and Communications Research Unit
Page 41: Computer Science and Communications Research Unit
Page 42: Computer Science and Communications Research Unit
Page 43: Computer Science and Communications Research Unit
Page 44: Computer Science and Communications Research Unit
Page 45: Computer Science and Communications Research Unit
Page 46: Computer Science and Communications Research Unit
Page 47: Computer Science and Communications Research Unit
Page 48: Computer Science and Communications Research Unit
Page 49: Computer Science and Communications Research Unit
Page 50: Computer Science and Communications Research Unit
Page 51: Computer Science and Communications Research Unit
Page 52: Computer Science and Communications Research Unit
Page 53: Computer Science and Communications Research Unit
Page 54: Computer Science and Communications Research Unit
Page 55: Computer Science and Communications Research Unit
Page 56: Computer Science and Communications Research Unit
Page 57: Computer Science and Communications Research Unit
Page 58: Computer Science and Communications Research Unit
Page 59: Computer Science and Communications Research Unit
Page 60: Computer Science and Communications Research Unit
Page 61: Computer Science and Communications Research Unit
Page 62: Computer Science and Communications Research Unit
Page 63: Computer Science and Communications Research Unit
Page 64: Computer Science and Communications Research Unit
Page 65: Computer Science and Communications Research Unit
Page 66: Computer Science and Communications Research Unit
Page 67: Computer Science and Communications Research Unit
Page 68: Computer Science and Communications Research Unit
Page 69: Computer Science and Communications Research Unit
Page 70: Computer Science and Communications Research Unit
Page 71: Computer Science and Communications Research Unit
Page 72: Computer Science and Communications Research Unit
Page 73: Computer Science and Communications Research Unit
Page 74: Computer Science and Communications Research Unit
Page 75: Computer Science and Communications Research Unit
Page 76: Computer Science and Communications Research Unit
Page 77: Computer Science and Communications Research Unit
Page 78: Computer Science and Communications Research Unit
Page 79: Computer Science and Communications Research Unit
Page 80: Computer Science and Communications Research Unit
Page 81: Computer Science and Communications Research Unit
Page 82: Computer Science and Communications Research Unit
Page 83: Computer Science and Communications Research Unit
Page 84: Computer Science and Communications Research Unit
Page 85: Computer Science and Communications Research Unit
Page 86: Computer Science and Communications Research Unit
Page 87: Computer Science and Communications Research Unit
Page 88: Computer Science and Communications Research Unit
Page 89: Computer Science and Communications Research Unit
Page 90: Computer Science and Communications Research Unit
Page 91: Computer Science and Communications Research Unit
Page 92: Computer Science and Communications Research Unit
Page 93: Computer Science and Communications Research Unit
Page 94: Computer Science and Communications Research Unit
Page 95: Computer Science and Communications Research Unit
Page 96: Computer Science and Communications Research Unit
Page 97: Computer Science and Communications Research Unit
Page 98: Computer Science and Communications Research Unit
Page 99: Computer Science and Communications Research Unit
Page 100: Computer Science and Communications Research Unit
Page 101: Computer Science and Communications Research Unit
Page 102: Computer Science and Communications Research Unit
Page 103: Computer Science and Communications Research Unit
Page 104: Computer Science and Communications Research Unit
Page 105: Computer Science and Communications Research Unit
Page 106: Computer Science and Communications Research Unit
Page 107: Computer Science and Communications Research Unit
Page 108: Computer Science and Communications Research Unit
Page 109: Computer Science and Communications Research Unit
Page 110: Computer Science and Communications Research Unit
Page 111: Computer Science and Communications Research Unit
Page 112: Computer Science and Communications Research Unit
Page 113: Computer Science and Communications Research Unit
Page 114: Computer Science and Communications Research Unit
Page 115: Computer Science and Communications Research Unit
Page 116: Computer Science and Communications Research Unit
Page 117: Computer Science and Communications Research Unit
Page 118: Computer Science and Communications Research Unit
Page 119: Computer Science and Communications Research Unit
Page 120: Computer Science and Communications Research Unit
Page 121: Computer Science and Communications Research Unit
Page 122: Computer Science and Communications Research Unit
Page 123: Computer Science and Communications Research Unit
Page 124: Computer Science and Communications Research Unit
Page 125: Computer Science and Communications Research Unit
Page 126: Computer Science and Communications Research Unit
Page 127: Computer Science and Communications Research Unit
Page 128: Computer Science and Communications Research Unit
Page 129: Computer Science and Communications Research Unit
Page 130: Computer Science and Communications Research Unit
Page 131: Computer Science and Communications Research Unit
Page 132: Computer Science and Communications Research Unit
Page 133: Computer Science and Communications Research Unit
Page 134: Computer Science and Communications Research Unit
Page 135: Computer Science and Communications Research Unit
Page 136: Computer Science and Communications Research Unit
Page 137: Computer Science and Communications Research Unit
Page 138: Computer Science and Communications Research Unit
Page 139: Computer Science and Communications Research Unit
Page 140: Computer Science and Communications Research Unit
Page 141: Computer Science and Communications Research Unit
Page 142: Computer Science and Communications Research Unit
Page 143: Computer Science and Communications Research Unit
Page 144: Computer Science and Communications Research Unit
Page 145: Computer Science and Communications Research Unit
Page 146: Computer Science and Communications Research Unit
Page 147: Computer Science and Communications Research Unit
Page 148: Computer Science and Communications Research Unit
Page 149: Computer Science and Communications Research Unit
Page 150: Computer Science and Communications Research Unit
Page 151: Computer Science and Communications Research Unit
Page 152: Computer Science and Communications Research Unit
Page 153: Computer Science and Communications Research Unit
Page 154: Computer Science and Communications Research Unit
Page 155: Computer Science and Communications Research Unit
Page 156: Computer Science and Communications Research Unit
Page 157: Computer Science and Communications Research Unit
Page 158: Computer Science and Communications Research Unit
Page 159: Computer Science and Communications Research Unit
Page 160: Computer Science and Communications Research Unit
Page 161: Computer Science and Communications Research Unit
Page 162: Computer Science and Communications Research Unit
Page 163: Computer Science and Communications Research Unit
Page 164: Computer Science and Communications Research Unit
Page 165: Computer Science and Communications Research Unit
Page 166: Computer Science and Communications Research Unit
Page 167: Computer Science and Communications Research Unit
Page 168: Computer Science and Communications Research Unit
Page 169: Computer Science and Communications Research Unit
Page 170: Computer Science and Communications Research Unit
Page 171: Computer Science and Communications Research Unit
Page 172: Computer Science and Communications Research Unit
Page 173: Computer Science and Communications Research Unit
Page 174: Computer Science and Communications Research Unit
Page 175: Computer Science and Communications Research Unit
Page 176: Computer Science and Communications Research Unit
Page 177: Computer Science and Communications Research Unit
Page 178: Computer Science and Communications Research Unit
Page 179: Computer Science and Communications Research Unit
Page 180: Computer Science and Communications Research Unit
Page 181: Computer Science and Communications Research Unit
Page 182: Computer Science and Communications Research Unit
Page 183: Computer Science and Communications Research Unit
Page 184: Computer Science and Communications Research Unit
Page 185: Computer Science and Communications Research Unit
Page 186: Computer Science and Communications Research Unit
Page 187: Computer Science and Communications Research Unit
Page 188: Computer Science and Communications Research Unit
Page 189: Computer Science and Communications Research Unit
Page 190: Computer Science and Communications Research Unit
Page 191: Computer Science and Communications Research Unit
Page 192: Computer Science and Communications Research Unit
Page 193: Computer Science and Communications Research Unit
Page 194: Computer Science and Communications Research Unit
Page 195: Computer Science and Communications Research Unit
Page 196: Computer Science and Communications Research Unit
Page 197: Computer Science and Communications Research Unit
Page 198: Computer Science and Communications Research Unit
Page 199: Computer Science and Communications Research Unit
Page 200: Computer Science and Communications Research Unit
Page 201: Computer Science and Communications Research Unit
Page 202: Computer Science and Communications Research Unit
Page 203: Computer Science and Communications Research Unit
Page 204: Computer Science and Communications Research Unit
Page 205: Computer Science and Communications Research Unit
Page 206: Computer Science and Communications Research Unit
Page 207: Computer Science and Communications Research Unit
Page 208: Computer Science and Communications Research Unit
Page 209: Computer Science and Communications Research Unit
Page 210: Computer Science and Communications Research Unit
Page 211: Computer Science and Communications Research Unit
Page 212: Computer Science and Communications Research Unit
Page 213: Computer Science and Communications Research Unit
Page 214: Computer Science and Communications Research Unit
Page 215: Computer Science and Communications Research Unit
Page 216: Computer Science and Communications Research Unit
Page 217: Computer Science and Communications Research Unit
Page 218: Computer Science and Communications Research Unit
Page 219: Computer Science and Communications Research Unit
Page 220: Computer Science and Communications Research Unit
Page 221: Computer Science and Communications Research Unit
Page 222: Computer Science and Communications Research Unit
Page 223: Computer Science and Communications Research Unit
Page 224: Computer Science and Communications Research Unit
Page 225: Computer Science and Communications Research Unit
Page 226: Computer Science and Communications Research Unit
Page 227: Computer Science and Communications Research Unit
Page 228: Computer Science and Communications Research Unit
Page 229: Computer Science and Communications Research Unit
Page 230: Computer Science and Communications Research Unit
Page 231: Computer Science and Communications Research Unit
Page 232: Computer Science and Communications Research Unit
Page 233: Computer Science and Communications Research Unit
Page 234: Computer Science and Communications Research Unit
Page 235: Computer Science and Communications Research Unit
Page 236: Computer Science and Communications Research Unit
Page 237: Computer Science and Communications Research Unit
Page 238: Computer Science and Communications Research Unit
Page 239: Computer Science and Communications Research Unit
Page 240: Computer Science and Communications Research Unit
Page 241: Computer Science and Communications Research Unit
Page 242: Computer Science and Communications Research Unit
Page 243: Computer Science and Communications Research Unit
Page 244: Computer Science and Communications Research Unit
Page 245: Computer Science and Communications Research Unit
Page 246: Computer Science and Communications Research Unit
Page 247: Computer Science and Communications Research Unit
Page 248: Computer Science and Communications Research Unit
Page 249: Computer Science and Communications Research Unit
Page 250: Computer Science and Communications Research Unit
Page 251: Computer Science and Communications Research Unit
Page 252: Computer Science and Communications Research Unit
Page 253: Computer Science and Communications Research Unit
Page 254: Computer Science and Communications Research Unit
Page 255: Computer Science and Communications Research Unit
Page 256: Computer Science and Communications Research Unit