scispace - formally typeset
Search or ask a question

Showing papers by "University of Luxembourg published in 2015"


Journal ArticleDOI
01 Jan 2015
TL;DR: This paper presents an in-depth analysis of the hardware infrastructure, southbound and northbound application programming interfaces (APIs), network virtualization layers, network operating systems (SDN controllers), network programming languages, and network applications, and presents the key building blocks of an SDN infrastructure using a bottom-up, layered approach.
Abstract: The Internet has led to the creation of a digital society, where (almost) everything is connected and is accessible from anywhere. However, despite their widespread adoption, traditional IP networks are complex and very hard to manage. It is both difficult to configure the network according to predefined policies, and to reconfigure it to respond to faults, load, and changes. To make matters even more difficult, current networks are also vertically integrated: the control and data planes are bundled together. Software-defined networking (SDN) is an emerging paradigm that promises to change this state of affairs, by breaking vertical integration, separating the network's control logic from the underlying routers and switches, promoting (logical) centralization of network control, and introducing the ability to program the network. The separation of concerns, introduced between the definition of network policies, their implementation in switching hardware, and the forwarding of traffic, is key to the desired flexibility: by breaking the network control problem into tractable pieces, SDN makes it easier to create and introduce new abstractions in networking, simplifying network management and facilitating network evolution. In this paper, we present a comprehensive survey on SDN. We start by introducing the motivation for SDN, explain its main concepts and how it differs from traditional networking, its roots, and the standardization activities regarding this novel paradigm. Next, we present the key building blocks of an SDN infrastructure using a bottom-up, layered approach. We provide an in-depth analysis of the hardware infrastructure, southbound and northbound application programming interfaces (APIs), network virtualization layers, network operating systems (SDN controllers), network programming languages, and network applications. We also look at cross-layer problems such as debugging and troubleshooting. In an effort to anticipate the future evolution of this new paradigm, we discuss the main ongoing research efforts and challenges of SDN. In particular, we address the design of switches and control platforms—with a focus on aspects such as resiliency, scalability, performance, security, and dependability—as well as new opportunities for carrier transport networks and cloud providers. Last but not least, we analyze the position of SDN as a key enabler of a software-defined environment.

3,589 citations


Journal ArticleDOI
TL;DR: This review outlines some of the advantages and challenges that may accompany a transition from macroscopic to microfluidic cell culture and focuses on decisive factors that distinguish Macroscopic from microfluidity cell culture to encourage a reconsideration of how macroscopy cell culture principles might apply to micro fluidiccell culture.

760 citations


Journal ArticleDOI
TL;DR: In this article, the authors rely on the theory of planned behavior to identify the beliefs that influence young people's pro-environmental behavior and find that attitudes, subjective norms, and perceptions of control made independent contributions to the prediction of intentions, and intentions together with perceived control predicted behavior.

707 citations


Proceedings ArticleDOI
16 May 2015
TL;DR: IccTA, a static taint analyzer to detect privacy leaks among components in Android applications goes beyond state-of-the-art approaches by supporting inter- component detection and propagating context information among components, which improves the precision of the analysis.
Abstract: Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. At installation, this application is given permission to (1) access the Internet (for updating wallpapers) and (2) use the device microphone (to change background following noise changes). With these permissions, the application could silently record user conversations and upload them remotely. To give more confidence about how Shake Them All actually processes what it records, it is necessary to build a precise analysis tool that tracks the flow of any sensitive data from its source point to any sink, especially if those are in different components. Since Android applications may leak private data carelessly or maliciously, we propose IccTA, a static taint analyzer to detect privacy leaks among components in Android applications. IccTA goes beyond state-of-the-art approaches by supporting inter- component detection. By propagating context information among components, IccTA improves the precision of the analysis. IccTA outperforms existing tools on two benchmarks for ICC-leak detectors: DroidBench and ICC-Bench. Moreover, our approach detects 534 ICC leaks in 108 apps from MalGenome and 2,395 ICC leaks in 337 apps in a set of 15,000 Google Play apps.

556 citations


Journal ArticleDOI
TL;DR: A broad overview of magnetic hyperthermia addressing new perspectives and the progress on relevant features such as the ad hoc preparation of magnetic nanoparticles, physical modeling of magnetic heating, methods to determine the heat dissipation power of magnetic colloids including the development of experimental apparatus and the influence of biological matrices on the heating efficiency is presented in this article.
Abstract: Nowadays, magnetic hyperthermia constitutes a complementary approach to cancer treatment. The use of magnetic particles as heating mediators, proposed in the 1950s, provides a novel strategy for improving tumor treatment and, consequently, patient's quality of life. This review reports a broad overview about several aspects of magnetic hyperthermia addressing new perspectives and the progress on relevant features such as the ad hoc preparation of magnetic nanoparticles, physical modeling of magnetic heating, methods to determine the heat dissipation power of magnetic colloids including the development of experimental apparatus and the influence of biological matrices on the heating efficiency.

545 citations


Journal ArticleDOI
TL;DR: The current version of the Human Disease Ontology (DO), a biomedical resource of standardized common and rare disease concepts with stable identifiers organized by disease etiology, is moving to a multi-editor model utilizing Protégé to curate DO in web ontology language.
Abstract: The current version of the Human Disease Ontology (DO) (http://www.disease-ontology.org) database expands the utility of the ontology for the examination and comparison of genetic variation, phenotype, protein, drug and epitope data through the lens of human disease. DO is a biomedical resource of standardized common and rare disease concepts with stable identifiers organized by disease etiology. The content of DO has had 192 revisions since 2012, including the addition of 760 terms. Thirty-two percent of all terms now include definitions. DO has expanded the number and diversity of research communities and community members by 50+ during the past two years. These community members actively submit term requests, coordinate biomedical resource disease representation and provide expert curation guidance. Since the DO 2012 NAR paper, there have been hundreds of term requests and a steady increase in the number of DO listserv members, twitter followers and DO website usage. DO is moving to a multi-editor model utilizing Protege to curate DO in web ontology language. This will enable closer collaboration with the Human Phenotype Ontology, EBI's Ontology Working Group, Mouse Genome Informatics and the Monarch Initiative among others, and enhance DO's current asserted view and multiple inferred views through reasoning.

523 citations


Journal ArticleDOI
TL;DR: An introduction to IGA applied to simple analysis problems and the related computer implementation aspects is presented, and implementation of the extended IGA which incorporates enrichment functions through the partition of unity method (PUM) is presented.

522 citations


Journal ArticleDOI
TL;DR: This work presents the first comprehensive assessment of the B-vitamin synthesis capabilities of the human gut microbiota, and proposes that in addition to diet, the gut microbiota is an important source of B- vitamins, and that changes in the Gut microbiota composition can severely affect the authors' dietary B-Vitamin requirements.
Abstract: The human gut microbiota supplies its host with essential nutrients, including B-vitamins. Using the PubSEED platform, we systematically assessed the genomes of 256 common human gut bacteria for the presence of biosynthesis pathways for eight B-vitamins: biotin, cobalamin, folate, niacin, pantothenate, pyridoxine, riboflavin, and thiamin. On the basis of the presence and absence of genome annotations, we predicted that each of the eight vitamins was produced by 40-65% of the 256 human gut microbes. The distribution of synthesis pathways was diverse; some genomes had all eight biosynthesis pathways, whereas others contained no de novo synthesis pathways. We compared our predictions to experimental data from 16 organisms and found 88% of our predictions to be in agreement with published data. In addition, we identified several pairs of organisms whose vitamin synthesis pathway pattern complemented those of other organisms. This analysis suggests that human gut bacteria actively exchange B-vitamins among each other, thereby enabling the survival of organisms that do not synthesize any of these essential cofactors. This result indicates the co-evolution of the gut microbes in the human gut environment. Our work presents the first comprehensive assessment of the B-vitamin synthesis capabilities of the human gut microbiota. We propose that in addition to diet, the gut microbiota is an important source of B-vitamins, and that changes in the gut microbiota composition can severely affect our dietary B-vitamin requirements.

494 citations


Journal ArticleDOI
TL;DR: Key issues in interpreting (13)C metabolite labeling patterns are reviewed, with the goal of drawing accurate conclusions from steady state and dynamic stable isotopic tracer experiments.

471 citations


Journal ArticleDOI
01 Mar 2015-Methods
TL;DR: The DISEASES resource, which integrates the results from text mining with manually curated disease-gene associations, cancer mutation data, and genome-wide association studies from existing databases, is developed.

468 citations


Journal ArticleDOI
TL;DR: VizBin can be applied de novo for the visualization and subsequent binning of metagenomic datasets from single samples, and it can be used for the post hoc inspection and refinement of automatically generated bins.
Abstract: Background: Metagenomics is limited in its ability to link distinct microbial populations to genetic potential due to a current lack of representative isolate genome sequences. Reference-independent approaches, which exploit for example inherent genomic signatures for the clustering of metagenomic fragments (binning), offer the prospect to resolve and reconstruct population-level genomic complements without the need for prior knowledge. Results: We present VizBin, a Java™-based application which offers efficient and intuitive reference-independent visualization of metagenomic datasets from single samples for subsequent human-in-the-loop inspection and binning. The method is based on nonlinear dimension reduction of genomic signatures and exploits the superior pattern recognition capabilities of the human eye-brain system for cluster identification and delineation. We demonstrate the general applicability of VizBin for the analysis of metagenomic sequence data by presenting results from two cellulolytic microbial communities and one human-borne microbial consortium. The superior performance of our application compared to other analogous metagenomic visualization and binning methods is also presented. Conclusions: VizBin can be applied de novo for the visualization and subsequent binning of metagenomic datasets from single samples, and it can be used for the post hoc inspection and refinement of automatically generated bins. Due to its computational efficiency, it can be run on common desktop machines and enables the analysis of complex metagenomic datasets in a matter of minutes. The software implementation is available at https://claczny.github.io/VizBin under the BSD License (four-clause) and runs under Microsoft Windows™, Apple Mac OS X™ (10.7 to 10.10), and Linux.

Journal ArticleDOI
TL;DR: It is shown that MaMIMO itself is robust against passive eavesdropping attacks and a pilot contamination scheme that actively attacks the channel estimation process is reviewed.
Abstract: This article discusses opportunities and challenges of physical layer security integration in MaMIMO systems. Specifically, we first show that MaMIMO itself is robust against passive eavesdropping attacks. We then review a pilot contamination scheme that actively attacks the channel estimation process. This pilot contamination attack not only dramatically reduces the achievable secrecy capacity but is also difficult to detect. We proceed by reviewing some methods from literature that detect active attacks on MaMIMO. The last part of the article surveys the open research problems that we believe are the most important to address in the future and give a few promising directions of research to solve them.

Journal ArticleDOI
TL;DR: It is shown that the observed 2D line width contains valuable information on strain variations in graphene on length scales far below the laser spot size, that is, on the nanometre-scale.
Abstract: Confocal Raman spectroscopy has emerged as a major, versatile workhorse for the non-invasive characterization of graphene. Although it is successfully used to determine the number of layers, the quality of edges, and the effects of strain, doping and disorder, the nature of the experimentally observed broadening of the most prominent Raman 2D line has remained unclear. Here we show that the observed 2D line width contains valuable information on strain variations in graphene on length scales far below the laser spot size, that is, on the nanometre-scale. This finding is highly relevant as it has been shown recently that such nanometre-scaled strain variations limit the carrier mobility in high-quality graphene devices. Consequently, the 2D line width is a good and easily accessible quantity for classifying the crystalline quality, nanometre-scale flatness as well as local electronic properties of graphene, all important for future scientific and industrial applications.

Journal ArticleDOI
TL;DR: The authors examined environmental change as a potential determinant of international migration and found no direct impact of climatic change on international migration across their entire sample, but there is evidence of indirect effects of environmental factors going through wages.
Abstract: We examine environmental change as a potential determinant of international migration. We distinguish between unexpected short-run factors, captured by natural disasters, as well as long-run climate change and climate variability captured by deviations and volatilities of temperatures and rainfall from and around their long-run averages. Starting from a simple neo-classical model we use a panel dataset of bilateral migration flows for the period 1960-2000 that allows us to control for numerous time-varying and time invariant factors. We find no direct impact of climatic change on international migration across our entire sample. These results are robust when conditioning on characteristics of origin countries as well as when further considering migrants returning home and the potential endogeneity of our network variable. In contrast, there is evidence of indirect effects of environmental factors going through wages. We further find strong evidence that natural disasters beget greater flows of migrants to urban environs.

Journal ArticleDOI
TL;DR: In this article, the authors revisited stochastic thermodynamics for a system with discrete energy states in contact with a heat and particle reservoir, and showed that it is possible to solve the problem with a convex geometry.
Abstract: We revisit stochastic thermodynamics for a system with discrete energy states in contact with a heat and particle reservoir.

Journal ArticleDOI
TL;DR: This work proposes an algorithm to break-down the large problem size when many periods have to be considered, and the effectiveness of the approach and the significant benefits obtained by static and dynamic reconfiguration options in terms of DG hosting capacity are demonstrated using a modified benchmark distribution system.
Abstract: As the amount of distributed generation (DG) is growing worldwide, the need to increase the hosting capacity of distribution systems without reinforcements is becoming nowadays a major concern. This paper explores how the DG hosting capacity of active distribution systems can be increased by means of network reconfiguration, both static, i.e., grid reconfiguration at planning stage, and dynamic, i.e., grid reconfiguration using remotely controlled switches as an active network management (ANM) scheme. The problem is formulated as a mixed-integer, nonlinear, multi-period optimal power flow (MP-OPF) which aims to maximize the DG hosting capacity under thermal and voltage constraints. This work further proposes an algorithm to break-down the large problem size when many periods have to be considered. The effectiveness of the approach and the significant benefits obtained by static and dynamic reconfiguration options in terms of DG hosting capacity are demonstrated using a modified benchmark distribution system.

Journal ArticleDOI
19 Jun 2015-PLOS ONE
TL;DR: The results indicate that the capacity to form a functional NLRP3 inflammasome and secretion of IL-1β is limited to the microglial compartment in the mouse brain and microglia-dependent inflammaome activation can play an important role in the brain and especially in neuroinflammatory conditions.
Abstract: Neuroinflammation is the local reaction of the brain to infection, trauma, toxic molecules or protein aggregates. The brain resident macrophages, microglia, are able to trigger an appropriate response involving secretion of cytokines and chemokines, resulting in the activation of astrocytes and recruitment of peripheral immune cells. IL-1β plays an important role in this response; yet its production and mode of action in the brain are not fully understood and its precise implication in neurodegenerative diseases needs further characterization. Our results indicate that the capacity to form a functional NLRP3 inflammasome and secretion of IL-1β is limited to the microglial compartment in the mouse brain. We were not able to observe IL-1β secretion from astrocytes, nor do they express all NLRP3 inflammasome components. Microglia were able to produce IL-1β in response to different classical inflammasome activators, such as ATP, Nigericin or Alum. Similarly, microglia secreted IL-18 and IL-1α, two other inflammasome-linked pro-inflammatory factors. Cell stimulation with α-synuclein, a neurodegenerative disease-related peptide, did not result in the release of active IL-1β by microglia, despite a weak pro-inflammatory effect. Amyloid-β peptides were able to activate the NLRP3 inflammasome in microglia and IL-1β secretion occurred in a P2X7 receptor-independent manner. Thus microglia-dependent inflammasome activation can play an important role in the brain and especially in neuroinflammatory conditions.

Journal ArticleDOI
TL;DR: This paper analyzes how smartphone sensors can be used to identify driving maneuvers and proposes SenseFleet, a driver profile platform that is able to detect risky driving events independently from the mobile device and vehicle.
Abstract: Today's smartphones and mobile devices typically embed advanced motion sensors. Due to their increasing market penetration, there is a potential for the development of distributed sensing platforms. In particular, over the last few years there has been an increasing interest in monitoring vehicles and driving data, aiming to identify risky driving maneuvers and to improve driver efficiency. Such a driver profiling system can be useful in fleet management, insurance premium adjustment, fuel consumption optimization or CO2 emission reduction. In this paper, we analyze how smartphone sensors can be used to identify driving maneuvers and propose SenseFleet, a driver profile platform that is able to detect risky driving events independently from the mobile device and vehicle. A fuzzy system is used to compute a score for the different drivers using real-time context information like route topology or weather conditions. To validate our platform, we present an evaluation study considering multiple drivers along a predefined path. The results show that our platform is able to accurately detect risky driving events and provide a representative score for each individual driver.

Proceedings ArticleDOI
01 Jan 2015
TL;DR: The process used to build the Luxembourg SUMO Traffic (LuST) Scenario is shown, and a summary of its characteristics together with an overview of its possible use cases is presented.
Abstract: Different research communities varying from telecommunication to traffic engineering are working on problems related to vehicular traffic congestion, intelligent transportation systems, and mobility patterns using information collected from a variety of sensors. To test the solutions, the first step is to use a vehicular traffic simulator with an appropriate scenario in order to reproduce realistic mobility patterns. Many mobility simulators are available, and the choice is usually done based on the size and type of simulation required, but a common problem is to find a realistic traffic scenario. In order to evaluate and compare new communication protocols for vehicular networks, it is necessary to use a wireless network simulator in combination with a vehicular traffic simulator. This additional step introduces further requirements for the scenario. The aim of this work is to provide a scenario able to meet all the common requirements in terms of size, realism and duration, in order to have a common basis for the evaluations. In the interest of building a realistic scenario, we decided to start from a real city with a standard topology common in mid-size European cities, and real information concerning traffic demands and mobility patterns. In this paper we show the process used to build the Luxembourg SUMO Traffic (LuST) Scenario, and present a summary of its characteristics together with an overview of its possible use cases.

Journal ArticleDOI
TL;DR: Results from a controlled experiment show that the use of mutation as a testing technique provides benefits to the fault localization process, and fault localization is significantly improved by using mutation‐based tests instead of block‐based or branch‐based test suites.
Abstract: Fault localization methods seek to identify faulty program statements based on the information provided by the failing and passing test executions. Spectrum-based methods are among the most popular ones and assist programmers by assigning suspiciousness values on program statements according to their probability of being faulty. This paper proposes Metallaxis, a fault localization approach based on mutation analysis. The innovative part of Metallaxis is that it uses mutants and links them with the faulty program places. Thus, mutants that are killed mostly by failing tests provide a good indication about the location of a fault. Experimentation using Metallaxis suggests that it is significantly more effective than statement-based approaches. This is true even in the case where mutation cost-reduction techniques, such as mutant sampling, are facilitated. Additionally, results from a controlled experiment show that the use of mutation as a testing technique provides benefits to the fault localization process. Therefore, fault localization is significantly improved by using mutation-based tests instead of block-based or branch-based test suites. Finally, evidence in support of the methods' scalability is also given. Copyright © 2013 John Wiley & Sons, Ltd.

Journal ArticleDOI
TL;DR: In this article, the authors examined the evolution of European land management over the past 200 years with the aim of identifying key episodes of changes in land management, and their underlying technological, institutional and economic drivers.

Journal ArticleDOI
TL;DR: The main goal of the present study is to get a better understanding of practitioners' viewpoints on the notion of UX and to analyze potential evolutions over time in the understanding and practical use of the concept.

Journal ArticleDOI
TL;DR: Next-generation sequencing results establish KCNA2 as a new gene involved in human neurodevelopmental disorders through two different mechanisms, predicting either hyperexcitability or electrical silencing of KV1.2-expressing neurons.
Abstract: Epileptic encephalopathies are a phenotypically and genetically heterogeneous group of severe epilepsies accompanied by intellectual disability and other neurodevelopmental features. Using next-generation sequencing, we identified four different de novo mutations in KCNA2, encoding the potassium channel KV1.2, in six isolated patients with epileptic encephalopathy (one mutation recurred three times independently). Four individuals presented with febrile and multiple afebrile, often focal seizure types, multifocal epileptiform discharges strongly activated by sleep, mild to moderate intellectual disability, delayed speech development and sometimes ataxia. Functional studies of the two mutations associated with this phenotype showed almost complete loss of function with a dominant-negative effect. Two further individuals presented with a different and more severe epileptic encephalopathy phenotype. They carried mutations inducing a drastic gain-of-function effect leading to permanently open channels. These results establish KCNA2 as a new gene involved in human neurodevelopmental disorders through two different mechanisms, predicting either hyperexcitability or electrical silencing of KV1.2-expressing neurons.

Journal ArticleDOI
TL;DR: This survey paper provides an overview of the enabling techniques for CR communications and discusses the main imperfections that may occur in the most widely used CR paradigms and then reviews the existing approaches toward addressing these imperfections.
Abstract: Cognitive radio (CR) has been considered as a potential candidate for addressing the spectrum scarcity problem of future wireless networks. Since its conception, several researchers, academic institutions, industries, and regulatory and standardization bodies have put their significant efforts toward the realization of CR technology. However, as this technology adapts its transmission based on the surrounding radio environment, several practical issues may need to be considered. In practice, several imperfections, such as noise uncertainty, channel/interference uncertainty, transceiver hardware imperfections, signal uncertainty, and synchronization issues, may severely deteriorate the performance of a CR system. To this end, the investigation of realistic solutions toward combating various practical imperfections is very important for the successful implementation of cognitive technology. In this direction, first, this survey paper provides an overview of the enabling techniques for CR communications. Subsequently, it discusses the main imperfections that may occur in the most widely used CR paradigms and then reviews the existing approaches toward addressing these imperfections. Finally, it provides some interesting open research issues.

Journal ArticleDOI
01 Mar 2015
TL;DR: This paper studies data replication in cloud computing data centers and considers both energy efficiency and bandwidth consumption of the system, in addition to the improved quality of service QoS obtained as a result of the reduced communication delays.
Abstract: Cloud computing is an emerging paradigm that provides computing, communication and storage resources as a service over a network. Communication resources often become a bottleneck in service provisioning for many cloud applications. Therefore, data replication which brings data (e.g., databases) closer to data consumers (e.g., cloud applications) is seen as a promising solution. It allows minimizing network delays and bandwidth usage. In this paper we study data replication in cloud computing data centers. Unlike other approaches available in the literature, we consider both energy efficiency and bandwidth consumption of the system. This is in addition to the improved quality of service QoS obtained as a result of the reduced communication delays. The evaluation results, obtained from both mathematical model and extensive simulations, help to unveil performance and energy efficiency tradeoffs as well as guide the design of future data replication solutions.

Journal ArticleDOI
TL;DR: A maximum ratio transmission (MRT) based algorithm that jointly exploits DI and CSI to glean the benefits from constructive multiuser interference and novel constructive interference precoding techniques that tackle the transmit power minimization with individual SINR constraints at each user's receivers are proposed.
Abstract: This paper investigates the problem of interference among the simultaneous multiuser transmissions in the downlink of multiple-antenna systems Using symbol-level precoding, a new approach to exploit the multiuser interference is discussed The concept of exploiting the interference between spatial multiuser transmissions by jointly utilizing data information (DI) and channel state information (CSI), in order to design symbol-level precoders, is proposed To this end, the interference between data streams is transformed under certain conditions into useful signal that can improve the signal to interference noise ratio (SINR) of the downlink transmissions We propose a maximum ratio transmission (MRT) based algorithm that jointly exploits DI and CSI to glean the benefits from constructive multiuser interference Subsequently, a relation between the constructive interference downlink transmission and physical layer multicasting is established In this context, novel constructive interference precoding techniques that tackle the transmit power minimization (min-power) with individual SINR constraints at each user's receivers is proposed Furthermore, fairness through maximizing the weighted minimum SINR (max-min SINR) of the users is addressed by finding the link between the min power and max min SINR problems Moreover, heuristic precoding techniques are proposed to tackle the weighted sum rate problem Finally, extensive numerical results show that the proposed schemes outperform other state of the art techniques

Journal ArticleDOI
TL;DR: In this article, a frame-based precoding problem is optimally solved using the principles of physical layer multicasting to multiple co-channel groups under per-antenna constraints, and a novel optimization problem that aims at maximizing the system sum rate under individual power constraints is proposed.
Abstract: The present work focuses on the forward link of a broadband multibeam satellite system that aggressively reuses the user link frequency resources. Two fundamental practical challenges, namely the need to frame multiple users per transmission and the per-antenna transmit power limitations, are addressed. To this end, the so-called frame-based precoding problem is optimally solved using the principles of physical layer multicasting to multiple co-channel groups under per-antenna constraints. In this context, a novel optimization problem that aims at maximizing the system sum rate under individual power constraints is proposed. Added to that, the formulation is further extended to include availability constraints. As a result, the high gains of the sum rate optimal design are traded off to satisfy the stringent availability requirements of satellite systems. Moreover, the throughput maximization with a granular spectral efficiency versus SINR function, is formulated and solved. Finally, a multicast-aware user scheduling policy, based on the channel state information, is developed. Thus, substantial multiuser diversity gains are gleaned. Numerical results over a realistic simulation environment exhibit as much as 30% gains over conventional systems, even for 7 users per frame, without modifying the framing structure of legacy communication standards.

Journal ArticleDOI
TL;DR: It is shown that aging is accompanied by a progressive change of the local chemical order towards the crystalline one, which sets phase-change materials apart from conventional glass-forming systems, which display the same local structure and bonding in both phases.
Abstract: Aging is a ubiquitous phenomenon in glasses. In the case of phase-change materials, it leads to a drift in the electrical resistance, which hinders the development of ultrahigh density storage devices. Here we elucidate the aging process in amorphous GeTe, a prototypical phase-change material, by advanced numerical simulations, photothermal deflection spectroscopy and impedance spectroscopy experiments. We show that aging is accompanied by a progressive change of the local chemical order towards the crystalline one. Yet, the glass evolves towards a covalent amorphous network with increasing Peierls distortion, whose structural and electronic properties drift away from those of the resonantly bonded crystal. This behaviour sets phase-change materials apart from conventional glass-forming systems, which display the same local structure and bonding in both phases.

Proceedings ArticleDOI
09 Nov 2015
TL;DR: Three state-of-the-art unit test generation tools for Java (Randoop, EvoSuite, and Agitar) are applied to the 357 real faults in the Defects4J dataset and investigated how well the generated test suites perform at detecting these faults.
Abstract: Rather than tediously writing unit tests manually, tools can be used to generate them automatically --- sometimes even resulting in higher code coverage than manual testing. But how good are these tests at actually finding faults? To answer this question, we applied three state-of-the-art unit test generation tools for Java (Randoop, EvoSuite, and Agitar) to the 357 real faults in the Defects4J dataset and investigated how well the generated test suites perform at detecting these faults. Although the automatically generated test suites detected 55.7% of the faults overall, only 19.9% of all the individual test suites detected a fault. By studying the effectiveness and problems of the individual tools and the tests they generate, we derive insights to support the development of automated unit test generators that achieve a higher fault detection rate. These insights include 1) improving the obtained code coverage so that faulty statements are executed in the first instance, 2) improving the propagation of faulty program states to an observable output, coupled with the generation of more sensitive assertions, and 3) improving the simulation of the execution environment to detect faults that are dependent on external factors such as date and time.

Journal ArticleDOI
TL;DR: It is shown that the proposed cognitive exploitation framework represents a promising approach for enhancing the throughput of conventional satellite systems and guarantees protection of the terrestrial FS system while maximizing the satellite total throughput.
Abstract: The lack of available unlicensed spectrum together with the increasing spectrum demand by multimedia applications has resulted in a spectrum scarcity problem, which affects satellite communications (SatCom) as well as terrestrial systems. The goal of this paper is to propose resource allocation (RA) techniques, i.e., carrier, power, and bandwidth allocation, for a cognitive spectrum utilization scenario where the satellite system aims at exploiting the spectrum allocated to terrestrial networks as the incumbent users without imposing harmful interference to them. In particular, we focus on the microwave frequency bands 17.7–19.7 GHz for the cognitive satellite downlink and 27.5–29.5 GHz for the cognitive satellite uplink, although the proposed techniques can be easily extended to other bands. In the first case, assuming that the satellite terminals are equipped with multiple low block noise converters (LNB), we propose a joint beamforming and carrier allocation scheme to enable cognitive space-to-Earth communications in the shared spectrum where fixed service (FS) microwave links have priority of operation. In the second case, however, the cognitive satellite uplink should not cause harmful interference to the incumbent FS system. For the latter, we propose a joint power and carrier allocation (JPCA) strategy followed by a bandwidth allocation scheme, which guarantees protection of the terrestrial FS system while maximizing the satellite total throughput. The proposed cognitive satellite exploitation techniques are validated with numerical simulations considering realistic system parameters. It is shown that the proposed cognitive exploitation framework represents a promising approach for enhancing the throughput of conventional satellite systems.