Department of Computer Science (DCC)
Departamento de Ciências dos Computadores
AuthID: I-000-0JZ
Publications Actions
Publications at Authenticus Institutional Profile
An Authenticus institution (group) is an organization which consists of a set of researchers (institutional/group team). The set of researchers depends on the organizational structure of the institution per year and can be set at the institution profile, under ‘Researchers’ interface. Based on the institutional team we produce listings of publications, statistics and institutional reports.
Publications displayed at an Authenticus institutional profile depend on two parameters:
- Researchers team associated with the institution per year.
- Publications source type.
We define 3 types of publication sources:
- Validated by team members - includes all publications validated by team members. Requires the definition of the institutional team.
- All published by team members - includes all publications validated by the institution team members plus all not-validated (only identified) publications. Requires the definition of the institutional team.
- Affiliation Based - includes publications that have the institution/group in the publication affiliation. Does not require institutional team, but at the same time does not guarantee that all publications will be listed.
External
Internal
No data about last update.
Rules:
This actions updates publications citations of every team member.
Only validated by team members publications are included.
Only the current year team is included in this action.>
The action is executed in the background, thus the results are NOT immediate.
This actions can be executed only once a month!
Only validated by team members publications are included.
Only the current year team is included in this action.>
The action is executed in the background, thus the results are NOT immediate.
This actions can be executed only once a month!
No data about last update.
Rules:
This actions updates all pre print publications of the group/institution.
Only validated by current year team members publications are included.
The action is executed in the background, thus the results are NOT immediate.
This actions can be executed only once a day!
Only validated by current year team members publications are included.
The action is executed in the background, thus the results are NOT immediate.
This actions can be executed only once a day!
Publications Count: 2637
43 Team MembersFilters -> Year: 2024
2061
TITLE: Analysis and forecast of team formations in the simulated robotic soccer domain using Weka classification methodologies [Análise e previsão das formações das equipas no domínio do futebol robótico simulado utilizando metodologias de classificação no weka]
AUTHORS: Almeida, R; Reis, LP ; Jorge, AM ;
PUBLISHED: 2009, SOURCE: 4a Conferencia Iberica de Sistemas e Tecnologias de Informacao, CISTI 2009 - 4th Iberian Conference on Information Systems and Technologies, CISTI 2009 in Actas da 4a Conferencia Iberica de Sistemas e Tecnologias de Informacao, CISTI 2009, PAGES: 627-632
AUTHORS: Almeida, R; Reis, LP ; Jorge, AM ;
PUBLISHED: 2009, SOURCE: 4a Conferencia Iberica de Sistemas e Tecnologias de Informacao, CISTI 2009 - 4th Iberian Conference on Information Systems and Technologies, CISTI 2009 in Actas da 4a Conferencia Iberica de Sistemas e Tecnologias de Informacao, CISTI 2009, PAGES: 627-632
INDEXED IN: Scopus
2062
TITLE: ANALYSIS AND PREDICTION OF TRAINING TEAMS IN THE FIELD OF ROBOTIC SOCCER SIMULATION METHODOLOGIES FOR CLASSIFICATION IN WEKA
AUTHORS: Rui Almeida; Luis Paulo Reis ; Alipio Mario Jorge ;
PUBLISHED: 2009, SOURCE: 4th Iberian Conference on Information Systems and Technologies in SISTEMAS E TECHNOLOGIAS DE INFORMACAO: ACTAS DA 4A CONFERENCIA IBERICA DE SISTEMAS E TECNOLOGIAS DE LA INFORMACAO, PAGES: 627-632
AUTHORS: Rui Almeida; Luis Paulo Reis ; Alipio Mario Jorge ;
PUBLISHED: 2009, SOURCE: 4th Iberian Conference on Information Systems and Technologies in SISTEMAS E TECHNOLOGIAS DE INFORMACAO: ACTAS DA 4A CONFERENCIA IBERICA DE SISTEMAS E TECNOLOGIAS DE LA INFORMACAO, PAGES: 627-632
INDEXED IN: WOS
2063
TITLE: Analysis of Probabilistic Flooding: How do we Choose the Right Coin?
AUTHORS: Sergio Crisostomo ; Udo Schilcher; Christian Bettstetter; Joao Barros ;
PUBLISHED: 2009, SOURCE: IEEE International Conference on Communications (ICC 2009) in 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, PAGES: 2080-2085
AUTHORS: Sergio Crisostomo ; Udo Schilcher; Christian Bettstetter; Joao Barros ;
PUBLISHED: 2009, SOURCE: IEEE International Conference on Communications (ICC 2009) in 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, PAGES: 2080-2085
2064
TITLE: Antimirov and Mosses's Rewrite System Revisited Full Text
AUTHORS: Marco Almeida; Nelma Moreira ; Rogério Reis ;
PUBLISHED: 2009, SOURCE: Int. J. Found. Comput. Sci., VOLUME: 20, ISSUE: 4, PAGES: 669-684
AUTHORS: Marco Almeida; Nelma Moreira ; Rogério Reis ;
PUBLISHED: 2009, SOURCE: Int. J. Found. Comput. Sci., VOLUME: 20, ISSUE: 4, PAGES: 669-684
2065
TITLE: ANTIMIROV AND MOSSES'S REWRITE SYSTEM REVISITED Full Text
AUTHORS: Marco Almeida; Nelma Moreira ; Rogerio Reis ;
PUBLISHED: 2009, SOURCE: 13th International Conference on Implementation and Application of Automata in INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, VOLUME: 20, ISSUE: 4, PAGES: 669-684
AUTHORS: Marco Almeida; Nelma Moreira ; Rogerio Reis ;
PUBLISHED: 2009, SOURCE: 13th International Conference on Implementation and Application of Automata in INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, VOLUME: 20, ISSUE: 4, PAGES: 669-684
2066
TITLE: Applying reinforcement learning to scheduling strategies in an actual grid environment
AUTHORS: Costa, BF; Mattoso, M; Dutra, I ;
PUBLISHED: 2009, SOURCE: International Journal of High Performance Systems Architecture, VOLUME: 2, ISSUE: 2, PAGES: 116-128
AUTHORS: Costa, BF; Mattoso, M; Dutra, I ;
PUBLISHED: 2009, SOURCE: International Journal of High Performance Systems Architecture, VOLUME: 2, ISSUE: 2, PAGES: 116-128
2067
TITLE: BIORED - A Genetic Algorithm for Pattern Detection in Biosequences
AUTHORS: Pedro Pereira; Fernando Silva ; Nuno A Fonseca ;
PUBLISHED: 2009, SOURCE: 2nd International Workshop on Practical Applications of Computational Biology and Bioinformatics (IWPACBB 08) in 2ND INTERNATIONAL WORKSHOP ON PRACTICAL APPLICATIONS OF COMPUTATIONAL BIOLOGY AND BIOINFORMATICS (IWPACBB 2008), VOLUME: 49, PAGES: 156-165
AUTHORS: Pedro Pereira; Fernando Silva ; Nuno A Fonseca ;
PUBLISHED: 2009, SOURCE: 2nd International Workshop on Practical Applications of Computational Biology and Bioinformatics (IWPACBB 08) in 2ND INTERNATIONAL WORKSHOP ON PRACTICAL APPLICATIONS OF COMPUTATIONAL BIOLOGY AND BIOINFORMATICS (IWPACBB 2008), VOLUME: 49, PAGES: 156-165
2068
TITLE: Body sensor networks: can we use them?. can we use them?
AUTHORS: Pedro Brandão ; Jean Bacon;
PUBLISHED: 2009, SOURCE: International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-MPAC 2009 co-located with ACM/IFIP/USENIX International Middleware Conference in Proceedings of the 1st International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2009), November 30, 2009, Urbana Champaign, Illinois, USA, PAGES: 3
AUTHORS: Pedro Brandão ; Jean Bacon;
PUBLISHED: 2009, SOURCE: International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-MPAC 2009 co-located with ACM/IFIP/USENIX International Middleware Conference in Proceedings of the 1st International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2009), November 30, 2009, Urbana Champaign, Illinois, USA, PAGES: 3
2069
TITLE: BSN MIDDLEWARE Abstracting Resources to Human Models
AUTHORS: Pedro Brandao ; Jean Bacon;
PUBLISHED: 2009, SOURCE: 2nd International Conference on Health Informatics (HEALTHINF 2009) in HEALTHINF 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON HEALTH INFORMATICS, PAGES: 245-250
AUTHORS: Pedro Brandao ; Jean Bacon;
PUBLISHED: 2009, SOURCE: 2nd International Conference on Health Informatics (HEALTHINF 2009) in HEALTHINF 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON HEALTH INFORMATICS, PAGES: 245-250
INDEXED IN: Scopus WOS DBLP
2070
TITLE: Commitment and Authentication Systems Full Text
AUTHORS: Alexandre Pinto ; Andre Souto ; Armando Matos ; Luis Antunes ;
PUBLISHED: 2009, SOURCE: 2nd International Conference on Information Theoretic Security in INFORMATION THEORETIC SECURITY, VOLUME: 4883, PAGES: 1-22
AUTHORS: Alexandre Pinto ; Andre Souto ; Armando Matos ; Luis Antunes ;
PUBLISHED: 2009, SOURCE: 2nd International Conference on Information Theoretic Security in INFORMATION THEORETIC SECURITY, VOLUME: 4883, PAGES: 1-22
2071
TITLE: Commitment and authentication systems Full Text
AUTHORS: Alexandre Pinto ; Andre Souto ; Armando Matos ; Luis Antunes ;
PUBLISHED: 2009, SOURCE: DESIGNS CODES AND CRYPTOGRAPHY, VOLUME: 53, ISSUE: 3, PAGES: 175-193
AUTHORS: Alexandre Pinto ; Andre Souto ; Armando Matos ; Luis Antunes ;
PUBLISHED: 2009, SOURCE: DESIGNS CODES AND CRYPTOGRAPHY, VOLUME: 53, ISSUE: 3, PAGES: 175-193
2072
TITLE: Comparative Study of Classification Algorithms Using Molecular Descriptors in Toxicological DataBases
AUTHORS: Pereira, M; Costa, VS ; Camacho, R ; Fonseca, NA ; Simoes, C; Brito, RMM ;
PUBLISHED: 2009, SOURCE: 4th Brazilian Symposium on Bioinformatics (BSB 2009) in ADVANCES IN BIOINFORMATICS AND COMPUTATIONAL BIOLOGY, PROCEEDINGS, VOLUME: 5676, PAGES: 121-132
AUTHORS: Pereira, M; Costa, VS ; Camacho, R ; Fonseca, NA ; Simoes, C; Brito, RMM ;
PUBLISHED: 2009, SOURCE: 4th Brazilian Symposium on Bioinformatics (BSB 2009) in ADVANCES IN BIOINFORMATICS AND COMPUTATIONAL BIOLOGY, PROCEEDINGS, VOLUME: 5676, PAGES: 121-132
2073
TITLE: Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography Full Text
AUTHORS: Barbosa, M ; Moss, A; Page, D;
PUBLISHED: 2009, SOURCE: JOURNAL OF CRYPTOLOGY, VOLUME: 22, ISSUE: 2, PAGES: 259-281
AUTHORS: Barbosa, M ; Moss, A; Page, D;
PUBLISHED: 2009, SOURCE: JOURNAL OF CRYPTOLOGY, VOLUME: 22, ISSUE: 2, PAGES: 259-281
2074
TITLE: Coordination via Interaction Constraints I: Local Logic Full Text
AUTHORS: Dave Clarke; José Proença ;
PUBLISHED: 2009, SOURCE: Proceedings 2nd Interaction and Concurrency Experience: Structured Interactions, ICE 2009, Bologna, Italy, 31st August 2009., VOLUME: 12, PAGES: 17-39
AUTHORS: Dave Clarke; José Proença ;
PUBLISHED: 2009, SOURCE: Proceedings 2nd Interaction and Concurrency Experience: Structured Interactions, ICE 2009, Bologna, Italy, 31st August 2009., VOLUME: 12, PAGES: 17-39
2075
TITLE: CrimsonHex: A Service Oriented Repository of Specialised Learning Objects
AUTHORS: Leal, JP ; Qleiros, R ;
PUBLISHED: 2009, SOURCE: 11th International Conference on Enterprise Information Systems in ENTERPRISE INFORMATION SYSTEMS-BK, VOLUME: 24, PAGES: 102-113
AUTHORS: Leal, JP ; Qleiros, R ;
PUBLISHED: 2009, SOURCE: 11th International Conference on Enterprise Information Systems in ENTERPRISE INFORMATION SYSTEMS-BK, VOLUME: 24, PAGES: 102-113
2076
TITLE: CrimsonHex: an interoperable repository of programming problems
AUTHORS: José P Leal ; Ricardo Queirós;
PUBLISHED: 2009, SOURCE: ACM-ICPC 2nd Competitive Learning Symposium - CLIS 2009
AUTHORS: José P Leal ; Ricardo Queirós;
PUBLISHED: 2009, SOURCE: ACM-ICPC 2nd Competitive Learning Symposium - CLIS 2009
INDEXED IN: Handle
2077
TITLE: CrimsonHex: um repositório de objectos de aprendizagem
AUTHORS: José P Leal ; Ricardo Queirós;
PUBLISHED: 2009, SOURCE: JLBE09: Jornadas Luso-Brasileiras de Ensino e Tecnologia em Engenharia
AUTHORS: José P Leal ; Ricardo Queirós;
PUBLISHED: 2009, SOURCE: JLBE09: Jornadas Luso-Brasileiras de Ensino e Tecnologia em Engenharia
INDEXED IN: Handle
2078
TITLE: Cryptographic Security of Individual Instances Full Text
AUTHORS: Antunes, L ; Laplante, S; Pinto, A ; Salvador, L;
PUBLISHED: 2009, SOURCE: 2nd International Conference on Information Theoretic Security in INFORMATION THEORETIC SECURITY, VOLUME: 4883, PAGES: 195-210
AUTHORS: Antunes, L ; Laplante, S; Pinto, A ; Salvador, L;
PUBLISHED: 2009, SOURCE: 2nd International Conference on Information Theoretic Security in INFORMATION THEORETIC SECURITY, VOLUME: 4883, PAGES: 195-210
2079
TITLE: Deconstructing Reo
AUTHORS: Dave Clarke; José Proença ; Alexander Lazovik; Farhad Arbab;
PUBLISHED: 2009, SOURCE: Electr. Notes Theor. Comput. Sci., VOLUME: 229, ISSUE: 2, PAGES: 43-58
AUTHORS: Dave Clarke; José Proença ; Alexander Lazovik; Farhad Arbab;
PUBLISHED: 2009, SOURCE: Electr. Notes Theor. Comput. Sci., VOLUME: 229, ISSUE: 2, PAGES: 43-58
2080
TITLE: Deductive Verification of Cryptographic Software
AUTHORS: Manuel Barbosa ; José Bacelar Almeida ; Jorge Sousa Pinto ; Bárbara Vieira;
PUBLISHED: 2009, SOURCE: First NASA Formal Methods Symposium - NFM 2009, Moffett Field, California, USA, April 6-8, 2009., VOLUME: NASA/CP-2009-215407, PAGES: 146-155
AUTHORS: Manuel Barbosa ; José Bacelar Almeida ; Jorge Sousa Pinto ; Bárbara Vieira;
PUBLISHED: 2009, SOURCE: First NASA Formal Methods Symposium - NFM 2009, Moffett Field, California, USA, April 6-8, 2009., VOLUME: NASA/CP-2009-215407, PAGES: 146-155
INDEXED IN: DBLP