2020
Authors
Mendonça, AM; Melo, T; Araújo, T; Campilho, A;
Publication
ICIAR (2)
Abstract
The optic disc (OD) and the fovea are relevant landmarks in fundus images. Their localization and segmentation can facilitate the detection of some retinal lesions and the assessment of their importance to the severity and progression of several eye disorders. Distinct methodologies have been developed for detecting these structures, mainly based on color and vascular information. The methodology herein described combines the entropy of the vessel directions with the image intensities for finding the OD center and uses a sliding band filter for segmenting the OD. The fovea center corresponds to the darkest point inside a region defined from the OD position and radius. Both the Messidor and the IDRiD datasets are used for evaluating the performance of the developed methods. In the first one, a success rate of 99.56% and 100.00% are achieved for OD and fovea localization. Regarding the OD segmentation, the mean Jaccard index and Dice’s coefficient obtained are 0.87 and 0.94, respectively. The proposed methods are also amongst the top-3 performing solutions submitted to the IDRiD online challenge.
2020
Authors
Almeida, JB; Barbosa, M; Barthe, G; Grégoire, B; Koutsos, A; Laporte, V; Oliveira, T; Strub, PY;
Publication
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020)
Abstract
We develop a new approach for building cryptographic implementations. Our approach goes the last mile and delivers assembly code that is provably functionally correct, protected against side-channels, and as efficient as handwritten assembly. We illustrate our approach using ChaCha20Poly1305, one of the two ciphersuites recommended in TLS 1.3, and deliver formally verified vectorized implementations which outperform the fastest non-verified code. We realize our approach by combining the Jasmin framework, which offers in a single language features of high-level and low-level programming, and the EasyCrypt proof assistant, which offers a versatile verification infrastructure that supports proofs of functional correctness and equivalence checking. Neither of these tools had been used for functional correctness before. Taken together, these infrastructures empower programmers to develop efficient and verified implementations by "game hopping", starting from reference implementations that are proved functionally correct against a specification, and gradually introducing program optimizations that are proved correct by equivalence checking. We also make several contributions of independent interest, including a new and extensible verified compiler for Jasmin, with a richer memory model and support for vectorized instructions, and a new embedding of Jasmin in EasyCrypt.
2020
Authors
Dias, J; Cunha, J; Pereira, R;
Publication
HCI (48)
Abstract
Data science has started to become one of the most important skills one can have in the modern world, due to data taking an increasingly meaningful role in our lives. The accessibility of data science is however limited, requiring complicated software or programming knowledge. Both can be challenging and hard to master, even for the simple tasks. With this in mind, we have approached this issue by providing a new data science platform, termed DS4All.Curation, that attempts to reduce the necessary knowledge to perform data science tasks, in particular for data cleaning and curation. By combining HCI concepts, this platform is: simple to use through direct manipulation and showing transformation previews; allows users to save time by eliminate repetitive tasks and automatically calculating many of the common analyses data scientists must perform; and suggests data transformations based on the contents of the data, allowing for a smarter environment.
2020
Authors
Cantalloube, F; Farley, OJD; Milli, J; Bharmal, N; Brandner, W; Correia, C; Dohlen, K; Henning, T; Osborn, J; Por, E; Suárez Valles, M; Vigan, A;
Publication
Astronomy & Astrophysics
Abstract
2020
Authors
Rahman, MM; Rahman, SSMM; Allayear, SM; Patwary, MFK; Munna, MTA;
Publication
Advances in Intelligent Systems and Computing - Data Engineering and Communication Technology
Abstract
2020
Authors
Barlatier P.J.; Mention A.L.;
Publication
Journal of Business Strategy
Abstract
Purpose: This paper aims to present a framework to guide managerial action for social media (SM) strategies for innovation by exploring its constituent elements – the “what” (SM types), the “who” (stakeholders to be reached), the “for” (innovation types) and the “how” (innovation process stages), as well as the value, benefits and barriers. Design/methodology/approach: A comprehensive and critical review of literature at the intersection of SM and innovation guides the development of a typology of SM types and their use across innovation types and stages. Findings: SM type and use tend to differ across innovation processes. The authors identify four types of SM in use across four stages of innovation, supporting six types of innovation, influenced by five categories of barriers, benefits and stakeholders each. Research limitations/implications: The research provides an integrative set of building blocks to consider for developing further studies of SM and innovation. Practical implications: By highlighting the intertwined aspects of SM and innovation in an open and collaborative environment, the paper calls for development of an SM readiness organisational diagnosis. It empowers managers with a coherent framework of different elements they should take into consideration when defining their SM strategies for innovation. Originality/value: Research on SM adoption and the extent of its usage for innovation purposes is still at its infancy. Given the increasingly open and collaborative innovation settings, the authors draw managerial attention to the need of SM strategies for innovation activities and provide a coherent analytical framework to guide action for organisational diagnosis.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.