2022
Authors
Amalfitano, D; Paiva, ACR; Inquel, A; Pinto, L; Fasolino, AR; Just, R;
Publication
COMMUNICATIONS OF THE ACM
Abstract
OVER A DECADE ago, Jeff Offutt noted, The field of mutation analysis has been growing, both in the number of published papers and the number of active researchers.(33) This trend has since continued, as confirmed by a survey of recent literature.(36) Mutation analysis is the use of well-defined rules defined on syntactic descriptions to make systematic changes to the syntax or to objects developed from the syntax.(33) It has been successfully used in research for assessing test efficacy and as a building block for testing and debugging approaches. It systematically generates syntactic variations, called mutants, of an original program based on a set of mutation operators, which are well-defined program transformation rules. The most common use case of mutation analysis is to assess test efficacy. In this use case, mutants represent faulty versions of the original program, and the ratio of detected mutants quantifies a test suite's efficacy. Empirical evidence supports the use of systematically
2022
Authors
Ferreira, R; Sousa, C; Carneiro, D; Cardeiro, C;
Publication
CENTERIS 2022 - International Conference on ENTERprise Information Systems / ProjMAN - International Conference on Project MANagement / HCist - International Conference on Health and Social Care Information Systems and Technologies 2022, Hybrid Event / Lisbon, Portugal, November 9-11, 2022.
Abstract
2022
Authors
Pinto, JR; Carvalho, P; Pinto, C; Sousa, A; Capozzi, L; Cardoso, JS;
Publication
PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS (VISAPP), VOL 5
Abstract
With the advent of self-driving cars, and big companies such as Waymo or Bosch pushing forward into fully driverless transportation services, the in-vehicle behaviour of passengers must be monitored to ensure safety and comfort. The use of audio-visual information is attractive by its spatio-temporal richness as well as non-invasive nature, but faces tile likely constraints posed by available hardware and energy consumption. Hence new strategies are required to improve the usage of these scarce resources. We propose the processing of audio and visual data in a cascade pipeline for in-vehicle action recognition. The data is processed by modality-specific sub-modules. with subsequent ones being used when a confident classification is not reached. Experiments show an interesting accuracy-acceleration trade-off when compared with a parallel pipeline with late fusion, presenting potential for industrial applications on embedded devices.
2022
Authors
Catalao, JPS; Kim, YJ; Aghaei, J; Rodrigues, JJPC; Shafie Khah, M;
Publication
IEEE TRANSACTIONS ON CLOUD COMPUTING
Abstract
2022
Authors
Almeida, F; Pinheiro, J; Oliveira, V;
Publication
Research Anthology on Combating Cyber-Aggression and Online Negativity
Abstract
2022
Authors
Lima, J; Pinto, VH; Moreira, AP; Costa, P;
Publication
2022 IEEE INTERNATIONAL CONFERENCE ON AUTONOMOUS ROBOT SYSTEMS AND COMPETITIONS (ICARSC)
Abstract
Motion control is an important task in several areas, such as robotics where the angular position and speed should be acquired, usually with encoders. For slow angular speeds, an error is introduced spoiling the measurement. In this paper there will be proposed two new methodologies, that when combined allow to increase the precision whereas reducing the error, even on transient velocities. The two methodologies Variable Acquisition Window and a Quadrature Phase Compensation are addressed and combined simultaneously. A real implementation of the proposed algorithms is performed on a real hardware, with a DC motor and a low resolution encoder based on hall effect. The results validate the proposed approach since the errors are reduced compared with the standard Quadrature Encoder Reading.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.