scispace - formally typeset
Search or ask a question
Institution

University of Luxembourg

EducationLuxembourg, Luxembourg
About: University of Luxembourg is a education organization based out in Luxembourg, Luxembourg. It is known for research contribution in the topics: Population & European union. The organization has 4744 authors who have published 22175 publications receiving 381824 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Recent ML methods for molecular simulation are reviewed, with particular focus on (deep) neural networks for the prediction of quantum-mechanical energies and forces, on coarse-grained molecular dynamics, on the extraction of free energy surfaces and kinetics, and on generative network approaches to sample molecular equilibrium structures and compute thermodynamics.
Abstract: Machine learning (ML) is transforming all areas of science. The complex and time-consuming calculations in molecular simulations are particularly suitable for an ML revolution and have already been profoundly affected by the application of existing ML methods. Here we review recent ML methods for molecular simulation, with particular focus on (deep) neural networks for the prediction of quantum-mechanical energies and forces, on coarse-grained molecular dynamics, on the extraction of free energy surfaces and kinetics, and on generative network approaches to sample molecular equilibrium structures and compute thermodynamics. To explain these methods and illustrate open methodological problems, we review some important principles of molecular physics and describe how they can be incorporated into ML structures. Finally, we identify and describe a list of open challenges for the interface between ML and molecular simulation.

379 citations

Journal ArticleDOI
TL;DR: Using a normalized CES function with factor-augmenting technical progress, the authors estimate a supply-side system of the U.S. economy from 1953 to 1998, avoiding potential estimation biases that...
Abstract: Using a normalized CES function with factor-augmenting technical progress, we estimate a supply-side system of the U.S. economy from 1953 to 1998. Avoiding potential estimation biases that...

373 citations

Journal ArticleDOI
TL;DR: In this article, the synthesis and characterization of single-crystal tin sulfides (SnS, SnS2, and Sn2S3) through chemical vapor transport, and combine electronic structure calculations with time-resolved microwave conductivity measurements to shed light on the underlying electrical properties of each material.
Abstract: Tin sulfide is being widely investigated as an earth-abundant light harvesting material, but recorded efficiencies for SnS fall far below theoretical limits. We describe the synthesis and characterization of the single-crystal tin sulfides (SnS, SnS2, and Sn2S3) through chemical vapor transport, and combine electronic structure calculations with time-resolved microwave conductivity measurements to shed light on the underlying electrical properties of each material. We show that the coexistence of the Sn(II) and Sn(IV) oxidation states would limit the performance of SnS in photovoltaic devices due to the valence band alignment of the respective phases and the “asymmetry” in the underlying point defect behavior. Furthermore, our results suggest that Sn2S3, in addition to SnS, is a candidate material for low-cost thin-film solar cells.

369 citations

01 Jan 2011
TL;DR: DES was one of the first commercially developed (as opposed to government developed) ciphers whose structure was fully published and led to a wave of public interest in cryptography, from which much of the cryptography as the authors know it today was born.
Abstract: Background TheData Encryption Standard (DES) [] has been around for more than  years. During this time, the standard was revised three times: as FIPS-- in , as FIPS-- in , and as FIPS-- in . DES was an outcome of a call for primitives in , which did not result in many serious candidates except for a predecessor of DES, Lucifer [, ] designed by IBM around . It took another year for a joint IBM–NSA effort to turn Lucifer intoDES.The structure of Lucifer was significantly altered: Since the design rationale was never made public and the secret key size was reduced from -bit to -bits, this initially resulted in controversy, and some distrust among the public. After some delay, FIPS- was published by NBS (National Bureau of Standards) – nowNIST (National Institute of Standards and Technology) – on January ,  [] (see [] for a discussion of the standardization process). However, in spite of all the controversy it is hard to underestimate the role of DES []. DES was one of the first commercially developed (as opposed to government developed) ciphers whose structure was fully published. This effectively created a community of researchers who could analyze it and propose their own designs. This led to a wave of public interest in cryptography, from which much of the cryptography as we know it today was born.

367 citations

Proceedings Article
14 Aug 2013
TL;DR: This paper reduces the discovery of inter-component communication in smartphones to an instance of the Interprocedural Distributive Environment (IDE) problem, and develops a sound static analysis technique targeted to the Android platform that finds ICC vulnerabilities with far fewer false positives than the next best tool.
Abstract: Many threats present in smartphones are the result of interactions between application components, not just artifacts of single components. However, current techniques for identifying inter-application communication are ad hoc and do not scale to large numbers of applications. In this paper, we reduce the discovery of inter-component communication (ICC) in smartphones to an instance of the Interprocedural Distributive Environment (IDE) problem, and develop a sound static analysis technique targeted to the Android platform. We apply this analysis to 1,200 applications selected from the Play store and characterize the locations and substance of their ICC. Experiments show that full specifications for ICC can be identified for over 93% of ICC locations for the applications studied. Further the analysis scales well; analysis of each application took on average 113 seconds to complete. Epicc, the resulting tool, finds ICC vulnerabilities with far fewer false positives than the next best tool. In this way, we develop a scalable vehicle to extend current security analysis to entire collections of applications as well as the interfaces they export.

367 citations


Authors

Showing all 4893 results

NameH-indexPapersCitations
Jun Wang1661093141621
Leroy Hood158853128452
Andreas Heinz108107845002
Philippe Dubois101109848086
John W. Berry9735152470
Michael Müller9133326237
Bart Preneel8284425572
Bjorn Ottersten81105828359
Sander Kersten7924623985
Alexandre Tkatchenko7727126863
Rudi Balling7523819529
Lionel C. Briand7538024519
Min Wang7271619197
Stephen H. Friend7018453422
Ekhard K. H. Salje7058119938
Network Information
Related Institutions (5)
Royal Institute of Technology
68.4K papers, 1.9M citations

90% related

University of York
56.9K papers, 2.4M citations

90% related

ETH Zurich
122.4K papers, 5.1M citations

90% related

Carnegie Mellon University
104.3K papers, 5.9M citations

90% related

École Polytechnique Fédérale de Lausanne
98.2K papers, 4.3M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202360
2022250
20211,671
20201,776
20191,710
20181,663