Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

2024

A Framework for Consistency Models in Distributed Systems

Autores
Almeida, PS;

Publicação
CoRR

Abstract

2024

Subsurface Metallic Object Detection Using GPR Data and YOLOv8 Based Image Segmentation

Autores
Branco, D; Coutinho, R; Sousa, A; dos Santos, FN;

Publicação
ICINCO (1)

Abstract
Ground Penetrating Radar (GPR) is a geophysical imaging technique used for the characterization of a sub surface’s electromagnetic properties, allowing for the detection of buried objects. The characterization of an object’s parameters, such as position, depth and radius, is possible by identifying the distinct hyperbolic signature of objects in GPR B-scans. This paper proposes an automated system to detect and characterize the presence of buried objects through the analysis of GPR data, using GPR and computer vision data pro cessing techniques and YOLO segmentation models. A multi-channel encoding strategy was explored when training the models. This consisted of training the models with images where complementing data processing techniques were stored in each image RGB channel, with the aim of maximizing the information. The hy perbola segmentation masks predicted by the trained neural network were related to the mathematical model of the GPR hyperbola, using constrained least squares. The results show that YOLO models trained with multi-channel encoding provide more accurate models. Parameter estimation proved accurate for the object’s position and depth, however, radius estimation proved inaccurate for objects with relatively small radii.

2024

Report on the 7th International Workshop on Narrative Extraction from Texts (Text2Story 2024) at ECIR 2024

Autores
Campos, R; Jorge, AM; Jatowt, A; Bhatia, S; Litvak, M; Cordeiro, JP; Rocha, C; Sousa, HO; Mansouri, B;

Publicação
SIGIR Forum

Abstract
The Seventh International Workshop on Narrative Extraction from Texts (Text2Story'24) was held on March 24 th , 2024, in conjunction with the 46 th European Conference on Information Retrieval (ECIR 2024) in Glasgow, Scotland. Over the day, more than 50 attendees engaged in discussions and presentations focused on recent advancements in narrative representation, extraction, and generation. The workshop featured two invited keynote addresses, fourteen research paper presentations, and a poster session. The workshop proceedings are available online. 1 Date : 24 March 2024. Website : https://text2story24.inesctec.pt/.

2024

RHiOTS: A Framework for Evaluating Hierarchical Time Series Forecasting Algorithms

Autores
Roque, L; Soares, C; Torgo, L;

Publicação
PROCEEDINGS OF THE 30TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2024

Abstract
We introduce the Robustness of Hierarchically Organized Time Series (RHiOTS) framework, designed to assess the robustness of hierarchical time series forecasting models and algorithms on real-world datasets. Hierarchical time series, where lower-level forecasts must sum to upper-level ones, are prevalent in various contexts, such as retail sales across countries. Current empirical evaluations of forecasting methods are often limited to a small set of benchmark datasets, offering a narrow view of algorithm behavior. RHiOTS addresses this gap by systematically altering existing datasets and modifying the characteristics of individual series and their interrelations. It uses a set of parameterizable transformations to simulate those changes in the data distribution. Additionally, RHiOTS incorporates an innovative visualization component, turning complex, multidimensional robustness evaluation results into intuitive, easily interpretable visuals. This approach allows an in-depth analysis of algorithm and model behavior under diverse conditions. We illustrate the use of RHiOTS by analyzing the predictive performance of several algorithms. Our findings show that traditional statistical methods are more robust than state-of-the-art deep learning algorithms, except when the transformation effect is highly disruptive. Furthermore, we found no significant differences in the robustness of the algorithms when applying specific reconciliation methods, such as MinT. RHiOTS provides researchers with a comprehensive tool for understanding the nuanced behavior of forecasting algorithms, offering a more reliable basis for selecting the most appropriate method for a given problem.

2024

Influencing wine tourists' decision-making with VR: The impact of immersive experiences on their behavioural intentions

Autores
Sousa, N; Alén, E; Losada, N; Melo, M;

Publicação
TOURISM MANAGEMENT PERSPECTIVES

Abstract
Virtual Reality (VR) has proven to be an important contribution to tourists' decision-making regarding a destination. This fact can be determinant, especially when tourists face some social limitation or restriction that conditions their participation in tourism activities. Therefore, we aim to understand whether the possibility of experiencing immersive wine tourism activities can encourage future visits, as well as the recommendation of the VR experience and the destination itself. To achieve our goal, we offered 405 participants an experimental VR experience with digital content about a wine tourism activity. The results showed that participants feel that the VR experience influences their behavioural intention towards the wine tourism destination. The satisfaction felt from the experience leads to a significant effect on the intention to visit and to recommend the destination and the VR activity. These findings suggest to wine tourism destination managers that VR can play an essential role in tourism management.

2024

TorKameleon: Improving Tor's Censorship Resistance with K-anonymization and Media-based Covert Channels

Autores
Vilalonga, A; Resende, JS; Domingos, H;

Publicação
2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023

Abstract
Anonymity networks like Tor significantly enhance online privacy but are vulnerable to correlation attacks by state-level adversaries. While covert channels encapsulated in media protocols, particularly WebRTC-based encapsulation, have demonstrated effectiveness against passive traffic correlation attacks, their resilience against active correlation attacks remains unexplored, and their compatibility with Tor has been limited. This paper introduces TorKameleon, a censorship evasion solution designed to protect Tor users from both passive and active correlation attacks. TorKameleon employs K-anonymization techniques to fragment and reroute traffic through multiple TorKameleon proxies, while also utilizing covert WebRTC-based channels or TLS tunnels to encapsulate user traffic.

  • 462
  • 4387