Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CRACS

2010

Gender Differences in Internet Usage Habits: A Case Study in Higher Education

Autores
Babo, R; Lopes, CT; Rodrigues, AC; Pinto, M; Queiros, R; de Oliveira, PC;

Publicação
BUSINESS TRANSFORMATION THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: AN ACADEMIC PERSPECTIVE, VOLS 1-2

Abstract
The usage of information and communication technologies has been growing among students and teachers. In order to improve the use of the Internet as a tool to support teaching and learning it is necessary to understand the Internet usage habits of students. Thus, a study was conducted with 1397 students from five schools of the Polytechnic of Porto. The data was collected through an online questionnaire abd was analized by age range, gender and scientific field. In this paper,gender differences are analyzed and presented in 3 dimensions: type of Internet usage, communication tools and the role of the Internet tools in education.

2010

Towards eLearning 2.0: Case Study of an eLearning Environment

Autores
Queiros, R; Oliveira, L; Pinto, M; Silva, C;

Publicação
PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON E-LEARNING, VOL 1

Abstract
In these days the learning experience is no longer confined within the four walls of a classroom. Computers and primarily the Internet have broadened this horizon by creating a way of delivering education that is known as eLearning. In the meantime, the Internet or, more precisely, the Web is heading towards a new paradigm where the user is no longer just a consumer of information and becomes an active part in the communication. This two-way channel where the user takes the role of the producer of content triggered the appearance of new types of services such as Social Networks, Blogs and Wikis. To seize this second generation of communities and services, educational vendors are willing to develop eLearning systems focused on the new and emergent users needs. This paper describes the analysis and specification of an eLearning environment at our School (ESEIG) towards this new Web generation, called PEACE - Project for ESEIG Academic Environment. This new model relies on the integration of several services controlled by teachers and students such as social networks, repositories, libraries, e-portfolios and e-conference systems, intelligent tutors, recommendation systems, automatic evaluators, virtual classrooms and 3D avatars.

2010

Linear Recursion

Autores
Alves, Sandra; Fernández, Maribel; Florido, Mario; Mackie, Ian;

Publicação
CoRR

Abstract

2010

Godel's system T revisited

Autores
Alves, S; Fernandez, M; Florido, M; Mackie, I;

Publicação
THEORETICAL COMPUTER SCIENCE

Abstract
The linear lambda calculus, where variables are restricted to occur in terms exactly once, has a very weak expressive power: in particular, all functions terminate in linear time. In this paper we consider a simple extension with natural numbers and a restricted iterator: only closed linear functions can be iterated. We show properties of this linear version of Godel's T using a closed reduction strategy, and study the class of functions that can be represented. Surprisingly, this linear calculus offers a huge increase in expressive power over previous linear versions of T, which are 'closed at construction' rather than 'closed at reduction'. We show that a linear T with closed reduction is as powerful as T.

2010

Linearity and iterator types for Gödel's System I

Autores
Alves, S; Fernandez, M; Florido, M; MacKie, I;

Publicação
Higher-Order and Symbolic Computation

Abstract
System L I is a linear ?-calculus with numbers and an iterator, which, although imposing linearity restrictions on terms, has all the computational power of Gödel's System I. System LI owes its power to two features: the use of a closed reduction strategy (which permits the construction of an iterator on an open function, but only iterates the function after it becomes closed), and the use of a liberal typing rule for iterators based on iterative types. In this paper, we study these new types, and show how they relate to intersection types. We also give a sound and complete type reconstruction algorithm for System LI. © 2010 Springer Science+Business Media, LLC.

2010

Secure multicast in IPTV services

Autores
Pinto, A; Ricardo, M;

Publicação
COMPUTER NETWORKS

Abstract
Technological evolution is leading telecommunications to all-IP networks where multiple services are transported as IP packets. Among these are the group communications services with confidentiality requirements. Secure IP multicast may be used to secure the broadcast of video channels. However, in scenarios such as cable TV where the concept of video channel and bundle are present, groups are very large, and users switch very rapidly between channels (zapping), a sort of problems still need to be addressed. The solution proposed in this paper addresses these problems. For that purpose, a centralized form of secure group communications is proposed also used to transmit, not data, but group cryptographic material. Threes types of cryptographic keys are used. End systems use this material to decrypt the data sent by the content providers.

  • 157
  • 201