2017
Authors
Gay, S; Ravara, A;
Publication
Behavioural Types: from Theory to Tools English
Abstract
Behavioural type systems in programming languages support the specification and verification of properties of programs beyond the traditional use of type systems to describe data processing. A major example of such a property is correctness of communication in concurrent and distributed systems, motivated by the importance of structured communication in modern software. Behavioural Types: from Theory to Tools presents programming languages and software tools produced by members of COST Action IC1201: Behavioural Types for Reliable Large-Scale Software Systems, a European research network that was funded from October 2012 to October 2016. As a survey of the most recent developments in the application of behavioural type systems, it is a valuable reference for researchers in the field, as well as an introduction to the area for graduate students and software developers.
2017
Authors
Sousa, PR; Antunes, L; Martins, R;
Publication
Fog Computing in the Internet of Things: Intelligence at the Edge
Abstract
2017
Authors
Costa, V; Resende, J; Sousa, P; Sousa, A; Lau, N; Reis, L;
Publication
10TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION (ICERI2017)
Abstract
Autonomous Vehicles are a topic of important research, also being visually appealing to the public and attractive to educators and researchers. The autonomous driving competition in the Portuguese Robotics Open tries to take advantage of this context but concerns arise from lack of participators. Participants mention the complexity of issues related to the challenge, the space occupied for the track and the budget needed for participation. This paper takes advantage of a realistic simulator under Gazebo/ROS, studies a new track design and proposes a change in the track. The analysis presented tries to ascertain if the new design facilitates the learning process that is intended for participants while keeping visual appeal for both the general public and the participants. The proposed setup for the rules and simulator is expected to address the mentioned concerns. The rule's modification and simulator are evaluated and tested, hinting that expected learning outcomes are encouraged and the track occupied area is reduced. Learning includes mobile robotics (discrete event system and continuous control), real time artificial image vision systems (2D at image recognition and processing of real world imagery seen in 3D perspective), general real world robotics such as mechanics, control, programming, batteries, systems thinking as well as transversal skills such as team cooperation, soft skills, etc. Shown results hint that the new track and realistic simulation are promising to foster learning and hopefully attract more competing teams.
2017
Authors
Pfister, J; Gomes, MAC; Vilela, JP; Harrison, WK;
Publication
IEEE International Conference on Communications
Abstract
This paper presents a new technique for providing the analysis and comparison of wiretap codes in the small blocklength regime over the binary erasure wiretap channel. A major result is the development of Monte Carlo strategies for quantifying a code's equivocation, which mirrors techniques used to analyze forward error correcting codes. For this paper, we limit our analysis to coset-based wiretap codes, and give preferred strategies for calculating and/or estimating the equivocation in order of preference. We also make several comparisons of different code families. Our results indicate that there are security advantages to using algebraic codes for applications that require small to medium blocklengths. © 2017 IEEE.
2017
Authors
Mendes, R; Vilela, JP;
Publication
IEEE Access
Abstract
The collection and analysis of data are continuously growing due to the pervasiveness of computing devices. The analysis of such information is fostering businesses and contributing beneficially to the society in many different fields. However, this storage and flow of possibly sensitive data poses serious privacy concerns. Methods that allow the knowledge extraction from data, while preserving privacy, are known as privacy-preserving data mining (PPDM) techniques. This paper surveys the most relevant PPDM techniques from the literature and the metrics used to evaluate such techniques and presents typical applications of PPDM methods in relevant fields. Furthermore, the current challenges and open issues in PPDM are discussed. © 2017 IEEE.
2017
Authors
Pfister, J; Gomes, MAC; Vilela, JP; Harrison, WK;
Publication
2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)
Abstract
This paper presents a new technique for providing the analysis and comparison of wiretap codes in the small blocklength regime over the binary erasure wiretap channel. A major result is the development of Monte Carlo strategies for quantifying a code's equivocation, which mirrors techniques used to analyze forward error correcting codes. For this paper, we limit our analysis to coset-based wiretap codes, and give preferred strategies for calculating and/or estimating the equivocation in order of preference. We also make several comparisons of different code families. Our results indicate that there are security advantages to using algebraic codes for applications that require small to medium blocklengths.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.