Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

2014

Hybrid User Centered Development Methodology: An Application to Educational Software Development

Autores
Costa, AP; Reis, LP; Loureiro, MJ;

Publicação
NEW HORIZONS IN WEB BASED LEARNING, ICWL 2014

Abstract
This paper describes a Hybrid User Centered Development Methodology (HUCDM). This is a simple, iterative and incremental development process that has as building blocks the principles of User Centered Design (UCD), specified in the International Organization for Standardization 9241-210. In its base lies the disciplined structure of development processes as well as practices and values from agile software development methods. The process consists of four main phases: planning, design, implementation and maintenance/operation. The prototyping and evaluation are carried out across the entire process. The HUCDM was implemented in an Educational Software Small and Medium Enterprise (SME) developer. The first feature based on this methodology was Courseware Sere. The quality of this educational resource has been internationally recognized. This Courseware was finalist in the national contest of multimedia products and thus got the interest of multinational companies such as BP - British Petroleum, which financed a new phase for the product development.

2014

Security vulnerabilities and risks in industrial usage of wireless communication

Autores
Plosz, S; Farshad, A; Tauber, M; Lesjak, C; Ruprechter, T; Pereira, N;

Publicação
19th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2014

Abstract
Due to its availability and low cost, the use of wireless communication technologies increases in domains beyond the originally intended usage areas, e.g. M2M communication in industrial applications. Such industrial applications often have specific security requirements. Hence, it is important to understand the characteristics of such applications and evaluate the vulnerabilities bearing the highest risk in this context. We present a comprehensive overview of security issues and features in existing WLAN, NFC and ZigBee standards, investigating the usage characteristics of these standards in industrial environments. We apply standard risk assessment methods to identify vulnerabilities with the highest risk across multiple technologies. We present a threat catalogue, conclude in which direction new mitigation methods should progress and how security analysis methods should be extended to meet requirements in the M2M domain. © 2014 IEEE.

2014

Solid to liquid light: Soliton dynamics using GPU computing

Autores
Guerreiro, A; Silva, NA;

Publicação
SECOND INTERNATIONAL CONFERENCE ON APPLICATIONS OF OPTICS AND PHOTONICS

Abstract
In this paper we address soliton-soliton interactions in a nonlinear cubic-quintic optic media, using for that purpose numerical methods and high performance graphics processor unit (GPU) computing. We describe an implementation of GPU-based computational simulations of the generalized Nonlinear Schrodinger Equation, obtaining simulations more than 40 times faster relative to CPU-based simulations, especially in the multidimensional case. We focus our attention in the study of soliton collisions and scattering phenomena that, offering the possibility of steering light with light, open a path towards future optical devices.

2014

Unsupervised density-based behavior change detection in data streams

Autores
Vallim, RMM; Andrade Filho, JA; de Mello, RF; de Carvalho, ACPLF; Gama, J;

Publicação
INTELLIGENT DATA ANALYSIS

Abstract
The ability to detect changes in the data distribution is an important issue in Data Stream mining. Detecting changes in data distribution allows the adaptation of a previously learned model to accommodate the most recent data and, therefore, improve its prediction capability. This paper proposes a framework for non-supervised automatic change detection in Data Streams called M-DBScan. This framework is composed of a density-based clustering step followed by a novelty detection procedure based on entropy level measures. This work uses two different types of entropy measures, where one considers the spatial distribution of data while the other models temporal relations between observations in the stream. The performance of the method is assessed in a set of experiments comparing M-DBScan with a proximity-based approach. Experimental results provide important insight on how to design change detection mechanisms for streams.

2014

On the Move to Meaningful Internet Systems: OTM 2014 Workshops

Autores
Meersman, R; Panetto, H; Mishra, A; Valencia-García, R; Soares, AL; Ciuciu, I; Ferri, F; Weichhart, G; Moser, T; Bezzi, M; Chan, H;

Publicação
Lecture Notes in Computer Science

Abstract

2014

Developing iconographic driven applications for nonverbal communication: A roadside assistance app for the deaf

Autores
Paredes, H; Fonseca, B; Barroso, J;

Publicação
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Abstract
Touchscreens allow interaction with icons and buttons for executing applications or selecting information. This can be used for non-verbal communication, enabling the deaf to communicate without the need for sign language translation and with a richer context than just using text. This paper explores the development process of iconographic driven applications for nonverbal communication following a user centered design approach. MyCarMobile, a mobile application intended to facilitate the communication of the deaf with roadside assistance services, is introduced as a case study. The application follows the iconographic driven interaction model allowing users to describe an occurrence, through the interaction with icons and buttons in a touchscreen device. Based on the implementation of the case study application and previous work a set of guidelines for implementing iconographic driven applications is proposed. © 2014 Springer International Publishing.

  • 2730
  • 4202