Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by CRACS

2012

Predicting Ramp Events with a Stream-Based HMM Framework

Authors
Ferreira, CA; Gama, J; Costa, VS; Miranda, V; Botterud, A;

Publication
Discovery Science - 15th International Conference, DS 2012, Lyon, France, October 29-31, 2012. Proceedings

Abstract
The motivation for this work is the study and prediction of wind ramp events occurring in a large-scale wind farm located in the US Midwest. In this paper we introduce the SHRED framework, a stream-based model that continuously learns a discrete HMM model from wind power and wind speed measurements. We use a supervised learning algorithm to learn HMM parameters from discretized data, where ramp events are HMM states and discretized wind speed data are HMM observations. The discretization of the historical data is obtained by running the SAX algorithm over the first order variations in the original signal. SHRED updates the HMM using the most recent historical data and includes a forgetting mechanism to model natural time dependence in wind patterns. To forecast ramp events we use recent wind speed forecasts and the Viterbi algorithm, that incrementally finds the most probable ramp event to occur. We compare SHRED framework against Persistence baseline in predicting ramp events occurring in short-time horizons, ranging from 30 minutes to 90 minutes. SHRED consistently exhibits more accurate and cost-effective results than the baseline. © 2012 Springer-Verlag Berlin Heidelberg.

2012

Mobile edoclink: a mobile workflow and document management application for healthcare institutions

Authors
Gomes, P; Antunes, M;

Publication
4TH CONFERENCE OF ENTERPRISE INFORMATION SYSTEMS - ALIGNING TECHNOLOGY, ORGANIZATIONS AND PEOPLE (CENTERIS 2012)

Abstract
The exponential growth of mobile devices, like smart phones and tablets, has led to a growing ubiquitous computing paradigm, in which computing is distributed and available anytime, anywhere and supported by different devices. The document and workflow management in organizations is made through computers connected to one or several servers via a networking infrastructure. The emergence of ubiquitous computing paradigm leads those solutions to be adapted for mobile platforms. Thus, users tasks can be done in a more efficient way due to the availability of information wherever they are using a mobile device, improving both the time needed to complete tasks and organizations' efficiency. In this paper we present the mobile version of edoclink document and workflow management solution. Edoclink system was developed by Link Consulting c and is widely implemented in several healthcare institutions. (C) 2012 Published by Elsevier Ltd. Selection and/or peer review under responsibility of CENTERIS/SCIKA - Association for Promotion and Dissemination of Scientific Knowledge

2012

Self tolerance by tuning T-cell activation: An artificial immune system for anomaly detection

Authors
Antunes, MJ; Correia, ME;

Publication
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

Abstract
The Artificial Immune Systems (AIS) constitute an emerging and very promising area of research that historically have been falling within two main theoretical immunological schools of thought: those based on Negative selection (NS) or those inspired on Danger theory (DT). Despite their inherent strengths and well known promising results, both deployed AIS have documented difficulties on dealing with gradual dynamic changes of self behavior through time. In this paper we propose and describe the development of an AIS framework for anomaly detection based on a rather different immunological theory, which is the Grossman's Tunable Activation Thresholds (TAT) theory for the behaviour of T-cells. The overall framework has been tested with artificially generated stochastic data sets based on a real world phenomena and the results thus obtained have been compared with a non-evolutionary Support Vector Machine (SVM) classifier, thus demonstrating TAT's performance and competitiveness for anomaly detection. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.

2012

Extracting BI-RADS features from Portuguese clinical texts

Authors
Nassif, H; Cunha, F; Moreira, IC; Cruz Correia, R; Sousa, E; Page, D; Burnside, E; Dutra, I;

Publication
Proceedings - 2012 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2012

Abstract
In this work we build the first BI-RADS parser for Portuguese free texts, modeled after existing approaches to extract BI-RADS features from English medical records. Our concept finder uses a semantic grammar based on the BI-RADS lexicon and on iterative transferred expert knowledge. We compare the performance of our algorithm to manual annotation by a specialist in mammography. Our results show that our parser's performance is comparable to the manual method. © 2012 IEEE.

2012

OFELIA - A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management

Authors
Augusto, AB; Correia, ME;

Publication
INFORMATION SECURITY AND PRIVACY RESEARCH

Abstract
Personal mobile devices with real practical computational power and Internet connectivity are currently widespread throughout all levels of society. This is so much so that the most popular of these devices, the smart phone, in all its varied ubiquitous manifestations is nowadays the de facto personal mobile computing platform, be it for civil or even military applications. In parallel with these developments, Internet application providers like Google and Facebook are developing and deploying an ever increasing set of personal services that are being aggregated and structured over personal user accounts were an ever increasing set of personal private sensitive attributes is being massively aggregated. In this paper we describe OFELIA (Open Federated Environment for Leveraging of Identity and Authorization), a framework for user centric identity management that provides an identity/authorization versatile infrastructure that does not depend upon the massive aggregation of users identity attributes to offer a versatile set of identity services. In OFELIA personal attributes are distributed among and protected by several otherwise unrelated AAs (Attribute Authorities). Only the user mobile device knows how to aggregate these scattered AAs identity attributes back into some useful identifiable entity identity. Moreover by recurring to an IdB (Identity Broker), acting as a privacy enhancing blind caching-proxy, in OFELIA the identity attributes location in the Internet is hidden from the RP/SP (Relying Party, Service Provider) that wants to have temporary access to the users personal data. The mobile device thus becomes the means by which the user can asynchronously exercise discretionary access control over their most sensitive dynamic identity attributes in a simple but highly transparent way.

2012

A mobile based authorization mechanism for patient managed role based access control

Authors
Santos Pereira, C; Augusto, AB; Correia, ME; Ferreira, A; Cruz Correia, R;

Publication
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Abstract
The Internet has proved the enormous benefits that can be accrued to all players involved in online services. However, it has also clearly demonstrated the risks involved in exposing personal data to the outside world and constitutes at the same time a teeming breeding ground of innovation for highly flexible security solutions that can minimize these risks. It is now widely believed that the benefits of online services to healthcare in general supplant the risks involved, provided adequate security measures are taken and the role played by all the parties involved, be they physicians, nurses or patients are clearly outlined. Due to the highly sensitive nature of the data held on the Electronic Health Record (EHR), it is commonly agreed that providing online access to patients EHR to the outside world carries an unacceptable level of risk not only to the patients but also to the healthcare institution that plays a custodian to that sensitive data. However, by sharing these risks with the patients, healthcare institutions can start to equate the possibility of providing controlled exterior online access to patients EHR. The mobile phone is nowadays the preferred mean by which people can interact with each other at a distance. Not only that, the smartphone constitutes the full embodiment of the truly personal device users carry constantly with them, everywhere. They are therefore the ideal means by which the user can casually and conveniently interact with information systems. In this paper we propose a discretionary online access rights management mechanism based on the Role Based Access Control (RBAC) model that takes advantage on the personal/technical characteristics and data communications capabilities of the smartphone in order to provide patients with the means by which they can conveniently exercise safe discretionary online access permissions to their own EHR. © 2012 Springer-Verlag.

  • 140
  • 202