2012
Authors
Santos Pereira, C; Augusto, AB; Correia, ME; Ferreira, A; Cruz Correia, R;
Publication
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Abstract
The Internet has proved the enormous benefits that can be accrued to all players involved in online services. However, it has also clearly demonstrated the risks involved in exposing personal data to the outside world and constitutes at the same time a teeming breeding ground of innovation for highly flexible security solutions that can minimize these risks. It is now widely believed that the benefits of online services to healthcare in general supplant the risks involved, provided adequate security measures are taken and the role played by all the parties involved, be they physicians, nurses or patients are clearly outlined. Due to the highly sensitive nature of the data held on the Electronic Health Record (EHR), it is commonly agreed that providing online access to patients EHR to the outside world carries an unacceptable level of risk not only to the patients but also to the healthcare institution that plays a custodian to that sensitive data. However, by sharing these risks with the patients, healthcare institutions can start to equate the possibility of providing controlled exterior online access to patients EHR. The mobile phone is nowadays the preferred mean by which people can interact with each other at a distance. Not only that, the smartphone constitutes the full embodiment of the truly personal device users carry constantly with them, everywhere. They are therefore the ideal means by which the user can casually and conveniently interact with information systems. In this paper we propose a discretionary online access rights management mechanism based on the Role Based Access Control (RBAC) model that takes advantage on the personal/technical characteristics and data communications capabilities of the smartphone in order to provide patients with the means by which they can conveniently exercise safe discretionary online access permissions to their own EHR. © 2012 Springer-Verlag.
2012
Authors
Clarke, D; Proenca, J;
Publication
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Abstract
Connector colouring provided an intuitive semantics of Reo connectors which lead to effective implementation techniques, first based on computing colouring tables directly, and later on encodings of colouring into constraints. One weakness of the framework is that it operates globally, giving a colouring to all primitives of the connector in lock-step, including those not involved in the interaction. This global approach limits both scalability and the available concurrency. This paper addresses these problems by introducing partiality into the connector colouring model. Partial colourings allow parts of a connector to operate independently and in isolation, increasing scalability and concurrency. © 2012 IFIP International Federation for Information Processing.
2012
Authors
Abal, I; Cunha, A; Hurd, J; Pinto, JS;
Publication
Theory and Applications of Satisfiability Testing - SAT 2012 - 15th International Conference, Trento, Italy, June 17-20, 2012. Proceedings
Abstract
Among many theories supported by SMT solvers, the theory of finite-precision bit-vector arithmetic is one of the most useful, for both hardware and software systems verification. This theory is also particularly useful for some specific domains such as cryptography, in which algorithms are naturally expressed in terms of bit-vectors. Cryptol is an example of a domain-specific language (DSL) and toolset for cryptography developed by Galois, Inc.; providing an SMT backend that relies on bit-vector decision procedures to certify the correctness of cryptographic specifications [3]. Most of these decision procedures use bit-blasting to reduce a bit-vector problem into pure propositional SAT. Unfortunately bit-blasting does not scale very well, especially in the presence of operators like multiplication or division. © 2012 Springer-Verlag.
2012
Authors
Vinagre, J; Jorge, AM;
Publication
Journal of the Brazilian Computer Society
Abstract
Collaborative filtering (CF) has been an important subject of research in the past few years. Many achievements have been made in this field, however, many challenges still need to be faced, mainly related to scalability and predictive ability. One important issue is how to deal with old and potentially obsolete data in order to avoid unnecessary memory usage and processing time. Our proposal is to use forgetting mechanisms. In this paper, we present and evaluate the impact of two forgetting mechanisms-sliding windows and fading factors-in user-based and item-based CF algorithms with implicit binary ratings under a scenario of abrupt change. Our results suggest that forgetting mechanisms reduce time and space requirements, improving scalability, while not significantly affecting the predictive ability of the algorithms. © 2012 The Brazilian Computer Society.
2012
Authors
Vasiljevska, J; Lopes, JP; Matos, MA;
Publication
Electricity Journal
Abstract
A decision-making approach based on multi-criteria techniques can help to make the massive deployment of the microgrid concept a viable solution, potentially leading to proper incentive mechanisms for distribution system operators, microgeneration owners and loads. © 2012 Elsevier Inc.
2012
Authors
Castro, CC; Gunning, C; Oliveira, CM; Couto, JA; Teixeira, JA; Martins, RC; Silva Ferreira, ACS;
Publication
JOURNAL OF AGRICULTURAL AND FOOD CHEMISTRY
Abstract
This study is focused on the evaluation of the impact of Saccharomyces cerevisiae metabolism in the profile of compounds with antioxidant capacity in a synthetic wine during fermentation. A bioanalytical pipeline, which allows for biological systems fingerprinting and sample classification by combining electrochemical features with biochemical background, is proposed. To achieve this objective, alcoholic fermentations of a minimal medium supplemented with phenolic acids were evaluated daily during 11 days, for electrochemical profile, phenolic acids, and the volatile fermentation fraction, using cyclic voltametry, high-performance liquid chromatography-diode array detection, and headspace/solid-phase microextraction/gas chromatography-mass spectrometry (target and nontarget approaches), respectively. It was found that acetic acid, 2-phenylethanol, and isoamyl acetate are compounds with a significative contribution for samples metabolic variability, and the electrochemical features demonstrated redox-potential changes throughout the alcoholic fermentations, showing at the end a similar pattern to normal wines. Moreover, S. cerevisiae had the capacity of producing chlorogenic acid in the supplemented medium fermentation from simple precursors present in the minimal medium.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.