Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

2019

Association and Temporality between News and Tweets

Autores
Moutinho, V; Brazdil, P; Cordeiro, J;

Publicação
KDIR

Abstract
With the advent of social media, the boundaries of mainstream journalism and social networks are becoming blurred. User-generated content is increasing, and hence, journalists dedicate considerable time searching platforms such as Facebook and Twitter to announce, spread, and monitor news and crowd check information. Many studies have looked at social networks as news sources, but the relationship and interconnections between this type of platform and news media have not been thoroughly investigated. In this work, we have studied a series of news articles and examined a set of related comments on a social network during a period of six months. Specifically, a sample of articles from generalist Portuguese news sources published on the first semester of 2016 was clustered, and the resulting clusters were then associated with tweets of Portuguese users with the recourse to a similarity measure. Focusing on a subset of clusters, we have performed a temporal analysis by examining the evolution of the two types of documents (articles and tweets) and the timing of when they appeared. It appears that for some stories, namely Brexit and the European Football Cup, the publishing of news articles intensifies on key dates (event-oriented), while the discussion on social media is more balanced throughout the months leading up to those events.

2019

The Harmonix Set: Beats, Downbeats, and Functional Segment Annotations of Western Popular Music

Autores
Nieto, O; McCallum, M; Davies, MEP; Robertson, A; Stark, AM; Egozy, E;

Publicação
Proceedings of the 20th International Society for Music Information Retrieval Conference, ISMIR 2019, Delft, The Netherlands, November 4-8, 2019

Abstract
We introduce the Harmonix set: a collection of annotations of beats, downbeats, and functional segmentation for over 900 full tracks that covers a wide range of western popular music. Given the variety of annotated music information types in this set, and how strongly these three types of data are typically intertwined, we seek to foster research that focuses on multiple retrieval tasks at once. The dataset includes additional metadata such as MusicBrainz identifiers to support the linking of the dataset to third-party information or audio data when available. We describe the methodology employed in acquiring this set, including the annotation process and song selection. In addition, an initial data exploration of the annotations and actual dataset content is conducted. Finally, we provide a series of baselines of the Harmonix set with reference beat-trackers, downbeat estimation, and structural segmentation algorithms.

2019

Security Risk Analysis of LoRaWAN and Future Directions

Autores
Butun, I; Pereira, N; Gidlund, M;

Publicação
FUTURE INTERNET

Abstract
LoRa (along with its upper layers definition-LoRaWAN) is one of the most promising Low Power Wide Area Network (LPWAN) technologies for implementing Internet of Things (IoT)-based applications. Although being a popular technology, several works in the literature have revealed vulnerabilities and risks regarding the security of LoRaWAN v1.0 (the official 1st specification draft). The LoRa-Alliance has built upon these findings and introduced several improvements in the security and architecture of LoRa. The result of these efforts resulted in LoRaWAN v1.1, released on 11 October 2017. This work aims at reviewing and clarifying the security aspects of LoRaWAN v1.1. By following ETSI guidelines, we provide a comprehensive Security Risk Analysis of the protocol and discuss several remedies to the security risks described. A threat catalog is presented, along with discussions and analysis in view of the scale, impact, and likelihood of each threat. To the best of the authors' knowledge, this work is one of the first of its kind, by providing a detailed security risk analysis related to the latest version of LoRaWAN. Our analysis highlights important practical threats, such as end-device physical capture, rogue gateway and self-replay, which require particular attention by developers and organizations implementing LoRa networks.

2019

VR4Neuropain: Interactive rehabilitation system

Autores
Fonseca, M; Cardoso, H; Ferreira, N; Loureiro, T; Gomes, I; Quaresma, C;

Publicação
BIODEVICES 2019 - 12th International Conference on Biomedical Electronics and Devices, Proceedings; Part of 12th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2019

Abstract
Virtual Reality (VR) has finally found its way to be used in the healthcare industry, covering many different areas such as medical training, marketing, patient education, psychotherapy and physiotherapy, and many others. The need to develop increasingly personalized technology to be used during the rehabilitation process is extremely important. Therefore, the VR4NeuroPain solution aims to cover the unique influence that it obtains from the VR applied to the rehabilitation area, creating unique and virtual spaces where patients with neuropathic pain can be submitted to their therapy sessions, not only in hospitals and clinics, but also at home. The VR4NeuroPain system monitors electrophysiological data in real time, and consists of the following components: Virtual Reality Interface, Plataform and a Glove-“GNeuroPathy”. The main objective of this paper is to describe all the components of VR4NeuroPain solution. The system can be used by physicians, occupational therapists and physiotherapists. VR4Neuropain allows the use of innovative and interactive intervention methodologies. © 2019 by SCITEPRESS - Science and Technology Publications, Lda.

2019

Characterizing and comparing Portuguese and English Wikipedia medicine-related articles

Autores
Domingues, G; Lopes, CT;

Publicação
COMPANION OF THE WORLD WIDE WEB CONFERENCE (WWW 2019 )

Abstract
Wikipedia is the largest on-line collaborative encyclopedia, containing information from a plethora of fields, including medicine. It has been shown that Wikipedia is one of the top visited sites by readers looking for information on this topic. The large reliance on Wikipedia for this type of information drives research towards the analysis of the quality of its articles. In this work, we evaluate and compare the quality of medicine-related articles in the English and Portuguese Wikipedia. For that we use metrics such as authority, completeness, complexity, informativeness, consistency, currency and volatility, and domain-specific measurements, in order to evaluate and compare the quality of medicine related articles in the English and Portuguese Wikipedia. We were able to conclude that the English articles score better across most metrics than the Portuguese articles.

2019

Secure Provisioning for Achieving End-to-End Secure Communications

Autores
Sousa, PR; Resende, JS; Martins, R; Antunes, L;

Publicação
AD-HOC, MOBILE, AND WIRELESS NETWORKS (ADHOC-NOW 2019)

Abstract
The growth of the Internet of Things (IoT) is raising significant impact in several contexts, e.g., in cities, at home, and even attached to the human body. This digital transformation is happening at a high pace and causing a great impact in our daily lives, namely in our attempt to make cities smarter in an attempt to increase their efficiency while reducing costs and increasing safety. However, this effort is being supported by the massive deployment of sensors throughout cities worldwide, leading to increase concerns regarding security and privacy. While some of these issues have already been tackled, device authentication remains without a viable solution, specially when considering a resilient decentralized approach that is the most suitable for this scenario, as it avoids some issues related to centralization, e.g., censorship and data leakage or profit from corporations. The provisioning is usually an arduous task that encompasses device configuration, including identity and key provisioning. Given the potential large number of devices, this process must be scalable and semi-autonomous, at least. This work presents a novel approach for provisioning IoT devices that adopts an architecture where other device acts as a manager that represents a CA, allowing it to be switched on/off during the provisioning phase to reduce single point of failure (SPOF) problems. Our solution combines One Time Password (OTP) on a secure token and cryptographic algorithms on a hybrid authentication system.

  • 1694
  • 4387