3,999,952 Works

D7.3: Pilot training and testing materials

Sonja Grossberndt, Hai-Ying Liu, Arne Fellermann, Eleftherios Spyromitros-Xioufis, Stefanos Vrochidis, Wiebke Herding, Elroy Bos, Fabiola Benavente & Panagiota Syropoulou
The present document is a deliverable of the hackAIR project, funded by the European Commission under the Horizon 2020 programme. This deliverable comprises an overview of the pilot training and testing materials that we provided to the volunteers at each pilot location. It refers to the static Arduino platforms with WiFi, Ethernet and SD card to transfer data, as well as the mobile PSOC platform and the static Wemos sensor.

Le système d'endiguement de Sartrouville et Montesson – un projet conciliant prévention des inondations, gestion des milieux aquatiques et intégration urbaine

Daniela Calvar & Rémy Croix
Les quartiers riverains de la Seine de Sartrouville et Montesson ont été inondés par trois fois depuis 20 ans. En cas de crue centennale, 2700 habitants, une dizaine d’activités et une dizaine d’ERP sont inondés. Les dommages pour cette crue sont estimés à 17 M€. Les crues de juin 2016 et janvier 2018 ont rappelé cette vulnérabilité. Le projet de protection de ces populations a été initié en 2003 avec un programme fonctionnel proposant la...

Le système d'endiguement de Sartrouville et Montesson – un projet conciliant prévention des inondations, gestion des milieux aquatiques et intégration urbaine

Daniela Calvar & Rémy Croix
Les quartiers riverains de la Seine de Sartrouville et Montesson ont été inondés par trois fois depuis 20 ans. En cas de crue centennale, 2700 habitants, une dizaine d’activités et une dizaine d’ERP sont inondés. Les dommages pour cette crue sont estimés à 17 M€. Les crues de juin 2016 et janvier 2018 ont rappelé cette vulnérabilité. Le projet de protection de ces populations a été initié en 2003 avec un programme fonctionnel proposant la...

Self-Attentive Residual Decoder for Neural Machine Translation

Lesly Miculicich Werlen, Nikolaos Pappas, Dhananjay Ram & Andrei Popescu-Belis
Neural sequence-to-sequence networks with attention have achieved remarkable performance for machine translation. One of the reasons for their effectiveness is their ability to capture relevant source-side contextual information at each time-step prediction through an attention mechanism. However, the target-side context is solely based on the sequence model which, in practice, is prone to a recency bias and lacks the ability to capture effectively non-sequential dependencies among words. To address this limitation, we propose a target-side-attentive...

Self-Attentive Residual Decoder for Neural Machine Translation

Lesly Miculicich Werlen, Nikolaos Pappas, Dhananjay Ram & Andrei Popescu-Belis
Neural sequence-to-sequence networks with attention have achieved remarkable performance for machine translation. One of the reasons for their effectiveness is their ability to capture relevant source-side contextual information at each time-step prediction through an attention mechanism. However, the target-side context is solely based on the sequence model which, in practice, is prone to a recency bias and lacks the ability to capture effectively non-sequential dependencies among words. To address this limitation, we propose a target-side-attentive...

gitesei/SI-peptidebilayer: Coarse-grained Model of Titrating Peptides Interacting with Lipid Bilayers

Giulio Tesei
Jupyter Notebooks and simulation data for reproducing the work of the scientific paper "Coarse-grained Model of Titrating Peptides Interacting with Lipid Bilayers".

D8.6: hackAIR workshop toolkit

Inge Jansen, Wiebke Herding, Elroy Bos, Fabiola Benavente, Arne Fellermann, Panagiota Syropoulou, Lefteris Spyomitros, Gavin McCrory & Carina Veeckman
The present document is a deliverable of the hackAIR project, funded by the European Commission under the Horizon 2020 programme. This document contains the overview of the hackAIR workshop toolkit. The purpose of the hackAIR workshop toolkit is to enable local organisers to easily set up engaging events that introduce hackAIR to potential users and ultimately help to build awareness and citizens’ engagement on air quality.

D8.6: hackAIR workshop toolkit

Inge Jansen, Wiebke Herding, Elroy Bos, Fabiola Benavente, Arne Fellermann, Panagiota Syropoulou, Lefteris Spyomitros, Gavin McCrory & Carina Veeckman
The present document is a deliverable of the hackAIR project, funded by the European Commission under the Horizon 2020 programme. This document contains the overview of the hackAIR workshop toolkit. The purpose of the hackAIR workshop toolkit is to enable local organisers to easily set up engaging events that introduce hackAIR to potential users and ultimately help to build awareness and citizens’ engagement on air quality.

Document-Level Neural Machine Translation with Hierarchical Attention Networks

Lesly Miculicich Werlen, Dhananjay Ram, Nikolaos Pappas & James Henderson
Neural Machine Translation (NMT) can be improved by including document-level contextual information. For this purpose, we propose a hierarchical attention model to capture the context in a structured and dynamic manner. The model is integrated in the original NMT architecture as another level of abstraction, conditioning on the NMT model’s own previous hidden states. Experiments show that hierarchical attention significantly improves the BLEU score over a strong NMT baseline with the state-of-the-art in context-aware methods,...

Document-Level Neural Machine Translation with Hierarchical Attention Networks

Lesly Miculicich Werlen, Dhananjay Ram, Nikolaos Pappas & James Henderson
Neural Machine Translation (NMT) can be improved by including document-level contextual information. For this purpose, we propose a hierarchical attention model to capture the context in a structured and dynamic manner. The model is integrated in the original NMT architecture as another level of abstraction, conditioning on the NMT model’s own previous hidden states. Experiments show that hierarchical attention significantly improves the BLEU score over a strong NMT baseline with the state-of-the-art in context-aware methods,...

RECAP Software Development Kit (SDK)

Ifigeneia-Maria Tsioutsia & Stavros Tekes
Various data like users’ personal information, farm information, farm logs, reports and shapefiles containing farm location have been generated via the platform. All of these data are useful for the agricultural consultants or even the Paying Agencies to create added value services on the top of the RECAP platform.

17: Robotik I - Einführung in die Robotik, Vorlesung, WS 2018/19, 13.12.2018

Prof. Dr.-Ing. Tamim Asfour
17 | 0:00:00 Start 0:00:07 Korrektur 0:06:06 Pfadplanung für mobile Roboter 0:11:48 Voronoi-Diagramme 0:19:58 Voronoi-Diagramme: Vor- und Nachteile 0:22:11 Sichtgraphen: Konstruktion 0:25:34 Sichtgraphen: Vor- und Nachteile 0:26:36 Sichtgraphen: Erweiterung der Hindernisse 0:28:45 Zellzerlegung 0:37:00 Approximative Zellzerlegung 0:45:18 Baumsuche 0:53:25 A*-Algorithmus 1:06:20 A*-Algorithmus: Beispiel 1:17:11 Pothentialfeld-Methode 1:27:36 Pothentialfelder: Beispiel

The design of Xoodoo and Xoofff

Joan Daemen, Seth Hoffert, Gilles Van Assche & Ronny Van Keer
This paper presents Xoodoo, a 48-byte cryptographic permutation with excellent propagation properties. Its design approach is inspired by Keccak-p, while it is dimensioned like Gimli for efficiency on low-end processors. The structure consists of three planes of 128 bits each, which interact per 3-bit columns through mixing and nonlinear operations, and which otherwise move as three independent rigid objects. We analyze its differential and linear propagation properties and, in particular, prove lower bounds on the...

Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants

Yongzhuang Wei, Tao Ye, Wenling Wu & Enes Pasalic
The nonlinear invariant attack was introduced at ASIACRYPT 2016 by Todo et al.. The attack has received extensive attention of cryptographic community due to its practical application on the full-round block ciphers SCREAM, iSCREAM, and Midori64. However, the attack heavily relies on the choice of round constants and it becomes inefficient in the case these constants nonlinearly affect the so-called nonlinear invariants. In this article, to eliminate the impact from the round constants, a generalized...

Adiantum: length-preserving encryption for entry-level processors

Paul Crowley & Eric Biggers
We present HBSH, a simple construction for tweakable length-preserving encryption which supports the fastest options for hashing and stream encryption for processors without AES or other crypto instructions, with a provable quadratic advantage bound. Our composition Adiantum uses NH, Poly1305, XChaCha12, and a single AES invocation. On an ARM Cortex-A7 processor, Adiantum decrypts 4096-byte messages at 10.6 cycles per byte, over five times faster than AES-256-XTS, with a constant-time implementation. We also define HPolyC which...

Nonlinear Approximations in Cryptanalysis Revisited

Christof Beierle, Anne Canteaut & Gregor Leander
This work studies deterministic and non-deterministic nonlinear approximations for cryptanalysis of block ciphers and cryptographic permutations and embeds it into the well-understood framework of linear cryptanalysis. For a deterministic (i.e., with correlation ±1) nonlinear approximation we show that in many cases, such a nonlinear approximation implies the existence of a highly-biased linear approximation. For non-deterministic nonlinear approximations, by transforming the cipher under consideration by conjugating each keyed instance with a fixed permutation, we are able...

New Yoyo Tricks with AES-based Permutations

Dhiman Saha, Mostafizar Rahman & Goutam Paul
In Asiacrypt 2017, Rønjom et al. reported some interesting generic properties of SPNs, leading to what they call the Yoyo trick, and applied it to find the most efficient distinguishers on AES. In this work, we explore the Yoyo idea in distinguishing public permutations for the first time. We introduce the notion of nested zero difference pattern which extends the Yoyo idea and helps to compose it using improbable and impossible differential strategies to penetrate...

Key Prediction Security of Keyed Sponges

Bart Mennink
The keyed sponge is a well-accepted method for message authentication. It processes data at a certain rate by sequential evaluation of an underlying permutation. If the key size k is smaller than the rate, currently known bounds are tight, but if it exceeds the rate, state of the art only dictates security up to 2k/2. We take closer inspection at the key prediction security of the sponge and close the remaining gap in the existing...

Key Assignment Scheme with Authenticated Encryption

Suyash Kandele & Souradyuti Paul
The Key Assignment Scheme (KAS) is a well-studied cryptographic primitive used for hierarchical access control (HAC) in a multilevel organisation where the classes of people with higher privileges can access files of those with lower ones. Our first contribution is the formalization of a new cryptographic primitive, namely, KAS-AE that supports the aforementioned HAC solution with an additional authenticated encryption property. Next, we present three efficient KAS-AE schemes that solve the HAC and the associated...

Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers

Joan Daemen, Bart Mennink & Gilles Van Assche
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of strengthening, Merkle trees, and sponge functions. As underlying primitives, these functions use arbitrary functions, permutations, or block ciphers. In this work we provide three simple proofs, one per primitive type, that cover all modes where the input to the primitive consists of message bits, chaining value bits, and bits that only depend on the mode and message length. Our approach generalizes and...

sherpa/sherpa: Sherpa 4.10.2

Doug Burke, Omar Laurino, Dtnguyen2, Jamie Budynkiewicz, Tom Aldcroft, Aneta Siemiginowska, Christoph Deil, Wmclaugh, Brigitta Sipocz & Katrin Leinweber
Sherpa 4.10.2 This release fixes a regression introduced in Sherpa 4.10.1 related to PSF convolution. As part of the long term PSF rebinning improvements, Sherpa 4.10.1 introduced a check to validate that the data pixel size and the PSF pixel size match. If they don't match, then a warning is issued. The change did not account for an edge error case. Sherpa 4.10.2 solves this problem. The regression introduced a downstream regression in the gammapy...

Prosumer Policy

Martin Klein & Ahmad Ziade
Prosumer Policy   This project aims to model the optimum dispatch behaviour of households with PV and battery systems under different policy instrument mixes. Household electricity consumers with photovoltaics and battery systems are referred to as prosumers since they both produce and consume electricity. This model uses the Gurobi optimizer (plans on adding more soon, contact us if you want to have more interfaces) to determine the optimal household charging behaviour under different policies such...

Prosumer Policy

Martin Klein & Ahmad Ziade
Prosumer Policy   This project aims to model the optimum dispatch behaviour of households with PV and battery systems under different policy instrument mixes. Household electricity consumers with photovoltaics and battery systems are referred to as prosumers since they both produce and consume electricity. This model uses the Gurobi optimizer (plans on adding more soon, contact us if you want to have more interfaces) to determine the optimal household charging behaviour under different policies such...

D7.2: Evaluation and impact assessment framework

Gavin McCrory, Carina Veeckman, Laurence Claeys, Hai-Ying Liu, Christodoulos Keratidis, Philipp Schneider, Eleftherios Spyromitros-Xioufis, Anastasia Moumtzidou, Panagiota Syropoulou & Sonja Grossberndt
The present document is a deliverable of the hackAIR project, funded by the European Commission under the Horizon 2020 programme. This document outlines the evaluation framework of the hackAIR project. The evaluation framework had the objective to evaluate (1) the usability, user experience (UX), effectiveness and acceptance of the hackAIR platform, and (2) the established impact of the platform at the social and environmental level in the communities.

D7.2: Evaluation and impact assessment framework

Gavin McCrory, Carina Veeckman, Laurence Claeys, Hai-Ying Liu, Christodoulos Keratidis, Philipp Schneider, Eleftherios Spyromitros-Xioufis, Anastasia Moumtzidou, Panagiota Syropoulou & Sonja Grossberndt
The present document is a deliverable of the hackAIR project, funded by the European Commission under the Horizon 2020 programme. This document outlines the evaluation framework of the hackAIR project. The evaluation framework had the objective to evaluate (1) the usability, user experience (UX), effectiveness and acceptance of the hackAIR platform, and (2) the established impact of the platform at the social and environmental level in the communities.

Registration Year

  • 2018
    653,712
  • 2017
    949,883
  • 2016
    333,477
  • 2015
    348,706
  • 2014
    450,324
  • 2013
    328,229
  • 2012
    327,366
  • 2011
    133,421
  • 2010
    186,816
  • 2009
    75,812
  • 2008
    22,830
  • 2007
    26,358
  • 2006
    65,830
  • 2005
    97,167
  • 2004
    21

Resource Types

  • Text
    2,091,721
  • Dataset
    1,281,937
  • Image
    242,504
  • Workflow
    70,817
  • Software
    63,572
  • Collection
    28,282
  • Audiovisual
    16,442
  • Other
    15,641
  • Film
    1,552
  • Interactive resource
    1,306
  • Model
    1,186
  • Event
    1,068
  • Sound
    746
  • Physical object
    225
  • Service
    3

Data Centers

  • E-Periodica
    748,195
  • ZENODO - Research. Shared.
    559,145
  • Deutsches Institut für Erwachsenenbildung
    373,193
  • PANGAEA
    372,460
  • DSMZ
    238,455
  • University Library Heidelberg
    220,074
  • University College Dublin
    212,799
  • NRCT Data Center
    139,100
  • Partnership for Interdisciplinary Studies of Coastal Oceans (PISCO)
    101,397
  • Universität Zürich, ZORA
    70,914
  • e-manuscripta
    70,032
  • e-rara.ch
    68,276
  • German Medical Science
    57,403
  • TIB Hannover
    56,868
  • Archaeology Data Service
    49,985