Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

2023

Fill in the blank for fashion complementary outfit product Retrieval: VISUM summer school competition

Authors
Castro, E; Ferreira, PM; Rebelo, A; Rio Torto, I; Capozzi, L; Ferreira, MF; Goncalves, T; Albuquerque, T; Silva, W; Afonso, C; Sousa, RG; Cimarelli, C; Daoudi, N; Moreira, G; Yang, HY; Hrga, I; Ahmad, J; Keswani, M; Beco, S;

Publication
MACHINE VISION AND APPLICATIONS

Abstract
Every year, the VISion Understanding and Machine intelligence (VISUM) summer school runs a competition where participants can learn and share knowledge about Computer Vision and Machine Learning in a vibrant environment. 2021 VISUM's focused on applying those methodologies in fashion. Recently, there has been an increase of interest within the scientific community in applying computer vision methodologies to the fashion domain. That is highly motivated by fashion being one of the world's largest industries presenting a rapid development in e-commerce mainly since the COVID-19 pandemic. Computer Vision for Fashion enables a wide range of innovations, from personalized recommendations to outfit matching. The competition enabled students to apply the knowledge acquired in the summer school to a real-world problem. The ambition was to foster research and development in fashion outfit complementary product retrieval by leveraging vast visual and textual data with domain knowledge. For this, a new fashion outfit dataset (acquired and curated by FARFETCH) for research and benchmark purposes is introduced. Additionally, a competitive baseline with an original negative sampling process for triplet mining was implemented and served as a starting point for participants. The top 3 performing methods are described in this paper since they constitute the reference state-of-the-art for this particular problem. To our knowledge, this is the first challenge in fashion outfit complementary product retrieval. Moreover, this joint project between academia and industry brings several relevant contributions to disseminating science and technology, promoting economic and social development, and helping to connect early-career researchers to real-world industry challenges.

2023

A DTW Approach for Complex Data A Case Study with Network Data Streams

Authors
Silva, PR; Vinagre, J; Gama, J;

Publication
38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023

Abstract
Dynamic Time Warping (DTW) is a robust method to measure the similarity between two sequences. This paper proposes a method based on DTW to analyse high-speed data streams. The central idea is to decompose the network traffic into sequences of histograms of packet sizes and then calculate the distance between pairs of such sequences using DTW with Kullback-Leibler (KL) distance. As a baseline, we also compute the Euclidean Distance between the sequences of histograms. Since our preliminary experiments indicate that the distance between two sequences falls within a different range of values for distinct types of streams, we then exploit this distance information for stream classification using a Random Forest. The approach was investigated using recent internet traffic data from a telecommunications company. To illustrate the application of our approach, we conducted a case study with encrypted Internet Protocol Television (IPTV) network traffic data. The goal was to use our DTW-based approach to detect the video codec used in the streams, as well as the IPTV channel. Results strongly suggest that the DTW distance value between the data streams is highly informative for such classification tasks.

2023

Institutional arrangements for water reuse: assessing challenges for the transition to water circularity

Authors
Riazi, F; Fidélis, T; Matos, MV; Sousa, MC; Teles, F; Roebeling, P;

Publication
WATER POLICY

Abstract
Water scarcity and security drive attention to water reuse in policy and business. However, water reuse may generate new water loops and challenge water governance with new and different types of water, risks, involved actors, and responsibilities. These challenges demand robust institutional arrangements related to water governance. This article assesses the institutional arrangements associated with four case studies in Spain, Italy, Croatia, and Israel. The findings reveal that the more diverse the water uses and users, the more challenges and risks, particularly those associated with institutional arrangements such as quality standards, sanctions, and conflict prevention, are likely to emerge. The weaknesses of governance models and regulations to deal with changes, uncertainties, and public resistance call for special attention to the design of the institutional arrangements before the adoption. Independent of the type of technology adopted, governance may be improved by ensuring internal and external water monitoring; integrating water management with spatial concerns; improving training, expert engagement, and civil society awareness; and reducing water reuse costs. In addition, alternative models that guarantee the efficiency of governance in attaining objectives and assuring the participation of new water users in the management of water reuse loops may also improve governance.

2023

Emotion4MIDI: A Lyrics-Based Emotion-Labeled Symbolic Music Dataset

Authors
Sulun, S; Oliveira, P; Viana, P;

Publication
PROGRESS IN ARTIFICIAL INTELLIGENCE, EPIA 2023, PT II

Abstract
We present a new large-scale emotion-labeled symbolic music dataset consisting of 12 k MIDI songs. To create this dataset, we first trained emotion classification models on the GoEmotions dataset, achieving state-of-the-art results with a model half the size of the baseline. We then applied these models to lyrics from two large-scale MIDI datasets. Our dataset covers a wide range of fine-grained emotions, providing a valuable resource to explore the connection between music and emotions and, especially, to develop models that can generate music based on specific emotions. Our code for inference, trained models, and datasets are available online.

2023

THE NEXT GENERATION OF ADMS FUNCTIONS FOR PREDICTIVE MANAGEMENT OF DER

Authors
Viegas, P; Cabral, D; Gonçalves, L; Pereira, J; Andrade, R; Azevedo, M; Simões, J; Gomes, M; Costa, C; Benedicto, P; Viana, J; Silva, P; Rodrigues, A; Bessa, R; Simões, M; Araújo, M;

Publication
IET Conference Proceedings

Abstract
The increasing integration of renewable energy sources (RES) at different voltage levels of the distribution grid has led to technical challenges, namely voltage and congestion problems. Conversely, the integration of new Distributed Energy Resources (DER) provides the necessary flexibility to accommodate higher RES integration levels. This work describes the development of innovative functional modules, based on optimal power flow calculations and grid forecasting, dedicated to the predictive management of the distribution grid considering DER flexibility, which are integrated into a commercial SCADA/DMS solution. © The Institution of Engineering and Technology 2023.

2023

General-Purpose Secure Conflict-free Replicated Data Types

Authors
Portela, B; Pacheco, H; Jorge, P; Pontes, R;

Publication
2023 IEEE 36TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF

Abstract
Conflict-free Replicated Data Types (CRDTs) are a very popular class of distributed data structures that strike a compromise between strong and eventual consistency. Ensuring the protection of data stored within a CRDT, however, cannot be done trivially using standard encryption techniques, as secure CRDT protocols would require replica-side computation. This paper proposes an approach to lift general-purpose implementations of CRDTs to secure variants using secure multiparty computation (MPC). Each replica within the system is realized by a group of MPC parties that compute its functionality. Our results include: i) an extension of current formal models used for reasoning over the security of CRDT solutions to the MPC setting; ii) a MPC language and type system to enable the construction of secure versions of CRDTs and; iii) a proof of security that relates the security of CRDT constructions designed under said semantics to the underlying MPC library. We provide an open-source system implementation with an extensive evaluation, which compares different designs with their baseline throughput and latency.

  • 500
  • 4363