High-Assurance Software Laboratory (HASLab)
Laboratório de Software Confiável

Inesc Technology and Science (INESC TEC) :: CS: Computer Science

Publications Actions
Publications at Authenticus Institutional Profile

An Authenticus institution (group) is an organization which consists of a set of researchers (institutional/group team). The set of researchers depends on the organizational structure of the institution per year and can be set at the institution profile, under ‘Researchers’ interface. Based on the institutional team we produce listings of publications, statistics and institutional reports. 

Publications displayed at an Authenticus institutional profile depend on two parameters:

  • Researchers team associated with the institution per year. 
  • Publications source type. 

We define 3 types of publication sources:

  • Validated by team members - includes all publications validated by team members. Requires the definition of the institutional team. 
  • All published by team members - includes all publications validated by the institution team members plus all not-validated (only identified) publications. Requires the definition of the institutional team. 
  • Affiliation Based - includes publications that have the institution/group in the publication affiliation. Does not require institutional team, but at the same time does not guarantee that all publications will be listed. 
External   Internal

Update Citation

No data about last update.
Rules:
 This actions updates publications citations of every team member.
 Only validated by team members publications are included.
 Only the current year team is included in this action.>
 The action is executed in the background, thus the results are NOT immediate.
 This actions can be executed only once a month!

Update PrePrints

No data about last update.
Rules:
 This actions updates all pre print publications of the group/institution.
 Only validated by current year team members publications are included.
 The action is executed in the background, thus the results are NOT immediate.
 This actions can be executed only once a day!

Publications Count: 1486

150 Team Members
Filters -> Year: 2024
1001
TITLE: Graph-based approach for interference free integration of pervasive applications
AUTHORS: Christophe Soares ; Moreiray, RS; Morla, R ; Jose M Torres ; Sobral, P ;
PUBLISHED: 2012, SOURCE: 2012 7th International Symposium on Wireless and Pervasive Computing, ISWPC 2012 in 2012 7th International Symposium on Wireless and Pervasive Computing, ISWPC 2012
INDEXED IN: Scopus CrossRef: 1
1002
TITLE: GUIsurfer: A Reverse Engineering Framework for User Interface Software
AUTHORS: Jos Creissac ; Joo Saraiva; Carlos Silva; Joo Carlos;
PUBLISHED: 2012, SOURCE: Reverse Engineering - Recent Advances and Applications
INDEXED IN: CrossRef: 2
1003
TITLE: Improving network measurement efficiency through multiadaptive sampling
AUTHORS: Silva, JMC ; Lima, SR ;
PUBLISHED: 2012, SOURCE: 4th International Workshop on Traffic Monitoring and Analysis, TMA 2012 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 7189 LNCS, PAGES: 171-174
INDEXED IN: Scopus CrossRef
1004
TITLE: Improving Network Measurement Efficiency through Multiadaptive Sampling
AUTHORS: João Marco C Silva ; Solange Rito Lima;
PUBLISHED: 2012, SOURCE: Traffic Monitoring and Analysis - 4th International Workshop, TMA 2012, Vienna, Austria, March 12, 2012. Proceedings, VOLUME: 7189, PAGES: 171-174
INDEXED IN: DBLP
1005
TITLE: Interference free integration of pervasive applications
AUTHORS: Christophe Soares ; Moreira, RS ; Morla, R ; Jose M Torres ; Sobral, P ;
PUBLISHED: 2012, SOURCE: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, PAGES: 1499-1506
INDEXED IN: Scopus DBLP CrossRef: 2
1006
TITLE: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
AUTHORS: Lumpe, M; Barbosa, LS ;
PUBLISHED: 2012, SOURCE: 7th International Workshop on Formal Aspects of Component Software, FACS 2010 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 6921 LNCS
INDEXED IN: Scopus
1007
TITLE: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
AUTHORS: De Carvalho, FH; Barbosa, LS ;
PUBLISHED: 2012, SOURCE: 16th Brazilian Symposium on Programming Languages, SBLP 2012 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 7554 LNCS
INDEXED IN: Scopus
1008
TITLE: Mathematical Literacy as a Condition for Sustainable Development
AUTHORS: Luís Soares Barbosa ; Maria Helena Martinho;
PUBLISHED: 2012, SOURCE: 10th International Conference on Software Engineering and Formal Methods, SEFM 2012, 1st International Symposium on InSuEdu 2012, 1st International Symposium on MoKMaSD 2012, 6th International Workshop on Foundations and Techniques for OpenCert 2012 in Information Technology and Open Source: Applications for Education, Innovation, and Sustainability - SEFM 2012 Satellite Events, InSuEdu, MoKMaDS, and OpenCert, Thessaloniki, Greece, October 1-2, 2012, Revised Selected Papers, VOLUME: 7991, PAGES: 64-77
INDEXED IN: Scopus DBLP CrossRef
1009
TITLE: MDSheet: A Framework for Model-Driven Spreadsheet Engineering
AUTHORS: Jacome Cunha ; Joao Paulo Fernandes ; Jorge Mendes ; Joao Saraiva ;
PUBLISHED: 2012, SOURCE: 34th International Conference on Software Engineering (ICSE) in 2012 34TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), PAGES: 1395-1398
INDEXED IN: Scopus WOS DBLP CrossRef: 34
1010
TITLE: Mitigating SPIT with social strength
AUTHORS: Azad, MA ; Morla, R ;
PUBLISHED: 2012, SOURCE: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 in Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, PAGES: 1393-1398
INDEXED IN: Scopus DBLP CrossRef: 6
1011
TITLE: Model-Based Programming Environments for Spreadsheets
AUTHORS: Jácome Cunha ; João Saraiva ; Joost Visser;
PUBLISHED: 2012, SOURCE: 16th Brazilian Symposium on Programming Languages, SBLP 2012 in Programming Languages - 16th Brazilian Symposium, SBLP 2012, Natal, Brazil, September 23-28, 2012. Proceedings, VOLUME: 7554, PAGES: 117-133
INDEXED IN: Scopus DBLP CrossRef Handle
1012
TITLE: Multiadaptive Sampling for Lightweight Network Measurements  Full Text
AUTHORS: Joao Marco C Silva ; Solange Rito Lima ;
PUBLISHED: 2012, SOURCE: 21st International Conference on Computer Communications and Networks (ICCCN) in 2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN)
INDEXED IN: Scopus WOS CrossRef: 3
1013
TITLE: Multiadaptive Sampling for Lightweight Network Measurements
AUTHORS: João Marco C Silva ; Solange Rito Lima;
PUBLISHED: 2012, SOURCE: 21st International Conference on Computer Communications and Networks, ICCCN 2012, Munich, Germany, July 30 - August 2, 2012, PAGES: 1-7
INDEXED IN: DBLP
1014
TITLE: Multifocal: A Strategic Bidirectional Transformation Language for XML Schemas
AUTHORS: Hugo Pacheco ; Alcino Cunha ;
PUBLISHED: 2012, SOURCE: 5th International Conference on Theory and Practice of Model Transformations, ICMT 2012 in Theory and Practice of Model Transformations - 5th International Conference, ICMT 2012, Prague, Czech Republic, May 28-29, 2012. Proceedings, VOLUME: 7307, PAGES: 89-104
INDEXED IN: Scopus DBLP CrossRef: 4
1016
TITLE: On the joint security of signature and encryption schemes under randomness reuse: Efficiency and security amplification
AUTHORS: Arriaga, A; Barbosa, M ; Farshim, P;
PUBLISHED: 2012, SOURCE: 10th International Conference on Applied Cryptography and Network Security, ACNS 2012 in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), VOLUME: 7341 LNCS, PAGES: 206-223
INDEXED IN: Scopus DBLP CrossRef: 6
1017
TITLE: On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
AUTHORS: Afonso Arriaga; Manuel Barbosa ; Pooya Farshim;
PUBLISHED: 2012, SOURCE: IACR Cryptology ePrint Archive, VOLUME: 2012, PAGES: 382
INDEXED IN: DBLP
1018
TITLE: Optimal leverage association rules with numerical interval conditions  Full Text
AUTHORS: Jorge, AM ; Azevedo, PJ ;
PUBLISHED: 2012, SOURCE: INTELLIGENT DATA ANALYSIS, VOLUME: 16, ISSUE: 1, PAGES: 25-47
INDEXED IN: Scopus WOS DBLP CrossRef Handle
1019
TITLE: Optimizing network measurements through self-adaptive sampling
AUTHORS: Joao Marco C Silva ; Solange Rito Lima ;
PUBLISHED: 2012, SOURCE: IEEE 14th International Conference on High Performance Computing and Communications (HPCC) / IEEE 9th International Conference on Embedded Software and Systems (ICESS) in 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), PAGES: 794-801
INDEXED IN: Scopus WOS CrossRef
1020
TITLE: Optimizing Network Measurements through Self-adaptive Sampling
AUTHORS: João Marco C Silva ; Solange Rito Lima;
PUBLISHED: 2012, SOURCE: 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, HPCC-ICESS 2012, Liverpool, United Kingdom, June 25-27, 2012, PAGES: 794-801
INDEXED IN: DBLP

Results per Page: 20.
Page 51 of 75. Total results: 1486.