Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

2016

Identification of Residential Energy Consumption Behaviors

Autores
Abreu, PH; Silva, DC; Amaro, H; Magalhaes, R;

Publicação
JOURNAL OF ENERGY ENGINEERING

Abstract
Climate change has raised consciousness of the need to use cleaner energy instead of fossil fuels. Meanwhile, a change of consciousness regarding resource use has to be achieved, which can be triggered by energy consumption monitoring studies that also provide useful recommendations for energy saving. Over time, researchers have identified behaviors by monitoring energy consumption in households, but these studies are usually limited to the number of monitored households and/or to the geographical region in which the monitoring takes place. In this research work, a study with a global reach is proposed to mitigate these limitations. Using a hierarchical clustering algorithm, three distinct groups were identified using the collected data, representative of distinct behaviors. The results illustrate several behaviors regarding energy consumption, like cold temperatures, seasonal behaviors, wake up hour, stay-at-home periods, and standby device consumption.

2016

Foundations of Hardware-Based Attested Computation and Application to SGX

Autores
Barbosa, M; Portela, B; Scerri, G; Warinschi, B;

Publicação
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY

Abstract
Exciting new capabilities of modern trusted hardware technologies allow for the execution of arbitrary code within environments completely isolated from the rest of the system and provide cryptographic mechanisms for securely reporting on these executions to remote parties. Rigorously proving security of protocols that rely on this type of hardware faces two obstacles. The first is to develop models appropriate for the induced trust assumptions (e.g., what is the correct notion of a party when the peer one wishes to communicate with is a specific instance of an an outsourced program). The second is to develop scalable analysis methods, as the inherent stateful nature of the platforms precludes the application of existing modular analysis techniques that require high degrees of independence between the components. We give the first steps in this direction by studying three cryptographic tools which have been commonly associated with this new generation of trusted hardware solutions. Specifically, we provide formal security definitions, generic constructions and security analysis for attested computation, key-exchange for attestation and secure outsourced computation. Our approach is incremental: each of the concepts relies on the previous ones according to an approach that is quasi-modular. For example we show how to build a secure outsourced computation scheme from an arbitrary attestation protocol combined together with a key-exchange and an encryption scheme.

2016

Requirements change management based on web usage mining

Autores
Garcia, JE;

Publicação

Abstract

2016

An Interoperable Approach for Energy Systems Simulation: Electricity Market Participation Ontologies

Autores
Santos, G; Pinto, T; Praca, I; Vale, Z;

Publicação
ENERGIES

Abstract
Electricity markets are complex environments with very particular characteristics. Some of the main ones for this complexity are the need for an adequate integration of renewable energy sources and the electricity markets' restructuring process. The growth of simulation tool usage is driven by the need to understand those mechanisms and how the involved players' interactions affect the markets' outcomes. Several modelling tools directed to the study of restructured wholesale electricity markets have emerged. Although, they share a common limitation: the lack of interoperability between the various systems to allow the exchange of information and knowledge, to test different market models and to allow players from different systems to interact in common market environments. This paper proposes the use of ontologies for semantic interoperability between multi-agent platforms in the scope of electricity markets simulation. The achieved results allow the identification of the added value gained by using the proposed ontologies. They facilitate the integration of independent multi-agent simulators, by providing a way for communications to be understood by heterogeneous agents from different systems.

2016

Main Factors Affecting the Development of Interorganizational Partnerships in Biodiesel Supply Chain in Brazil

Autores
Ribeiro, ECB; Moreira, AC; Ferreira, LMDF; de Souza, LLC; da Silva César, A;

Publicação
Lecture Notes in Management and Industrial Engineering - Engineering Systems and Networks

Abstract

2016

End-to-End Research Data Management Workflows A Case Study with Dendro and EUDAT

Autores
Silva, F; Amorim, RC; Castro, JA; da Silva, JR; Ribeiro, C;

Publicação
METADATA AND SEMANTICS RESEARCH, MTSR 2016

Abstract
Depositing and sharing research data is at the core of open science practices. However, institutions in the long tail of science are struggling to properly manage large amounts of data. Support for research data management is still fragile, and most existing solutions adopt generic metadata schemas for data description. These might be unable to capture the production contexts of many datasets, making them harder to interpret. EUDAT is a large ongoing EU-funded project that aims to provide a platform to help researchers manage their datasets and share them when they are ready to be published. Data-Publication@U. Porto is an EUDAT Data Pilot proposing the integration between Dendro, a prototype research data management platform, and the EUDAT B2Share module. The goal is to offer researchers a streamlined workflow: they organize and describe their data in Dendro as soon as they are available, and decide when to deposit in a data repository. Dendro integrates with the API of B2Share, automatically filling the standard metadata descriptors and complementing the data package with additional files for domain-specific descriptors. Our integration offers researchers a simple but complete workflow, from data preparation and description to data deposit.

  • 2447
  • 4362