CIIC - Publicações em Atas de Conferências com Peer Review
URI permanente para esta coleção:
Navegar
Percorrer CIIC - Publicações em Atas de Conferências com Peer Review por Domínios Científicos e Tecnológicos (FOS) "Ciências Naturais::Ciências da Computação e da Informação"
A mostrar 1 - 10 de 23
Resultados por página
Opções de ordenação
- 802.21-MPA-IMS ArchitecturePublication . Rodrigues, Carlos Miguel de Jesus; Rabadão, Carlos; Pereira, AntónioMobility has become a keyword nowadays with the evolution of mobile devices market and proliferation of realtime services. IP Multimedia Subsystem (IMS) is a single, standardized service framework that supports voice, video, data and messaging services, but does not provide seamless mobility for packet based sessions. This paper purposes an IMS architecture with IEEE 802.21 and media-independent pre-authentication (MPA) integrated. IEEE 802.21 can enable this seamless mobility in IMS and, additionally, MPA provides a secure handover optimization scheme, reducing, as a consequence, handover latency. The main goal of this architecture is to provide seamless and secure handovers between different access technologies in an IMS-based environment.
- Blind Guide: An Ultrasound Sensor-based Body Area Network for Guiding Blind PeoplePublication . Pereira, António; Nunes, Nelson; Vieira, Daniel; Costa, Nuno; Fernandes, Hugo; Barroso, JoãoWireless Sensor Networks, in particular Wireless Body Area Networks, is a technology suggested by the research community as allowing elderly people, or people with some kind of disability, to live in a safer, responsive and comfortable environment while at their homes. One of the most active threats to the autonomous life of blind people is the quantity and variety of obstacles they face while moving, whether they are obstacles in the footpath or obstacles coming out from the walls of buildings. Hence, it is necessary to develop a solution that helps or assists blind people while moving either in indoor or outdoor scenarios, simultaneously allowing the use of the use of white cane or the Seeing Eye dog. In this article, the authors propose the use of an ultra-sound based body area network for obstacle detection and warning as a complementary and effective solution for aiding blind people when moving from place to place. According to the cost estimates of the solution and to the negligible setup time, this could be a real effective complementary solution for blind people.
- Os Desafios Web no Processo Formativo - O Caso de Estudo da humansoftPublication . Sousa, Mayelson de; Gonçalves, AlexandrinoA constante evolução das tecnologias web tem originado o aparecimento de plataformas que facilitam a gestão das tarefas dos utilizadores nos dias de hoje. No sentido de maximizar a satisfação do cliente e disporem de soluções de acordo com os padrões de atuais do mercado, as empresas devem adaptar os seus produtos, com particular enfoque nas soluções web-based, com vista a potenciar a usabilidade e a fluidez do seu uso. Neste sentido, este artigo apresenta um caso de estudo real, de desenvolvimento web na empresa humansoft, onde foram desenvolvidos diversos módulos relativos aos dois principais produtos da empresa, o humantrain, que é um sistema de gestão do processo formativo, e o humanportal, que é uma aplicação web que permite a interoperabilidade entre o humantrain e a web. Ambas as aplicações permitem às entidades formadoras e/ou empresas rentabilizarem a gestão dos seus recursos tanto ao nível pedagógico como financeiros.
- Discrete Compound Tests and Dorfman’s Methodology in the Presence of MisclassificationPublication . Santos, Rui; Martins, João Paulo; Felgueiras, MiguelCompound tests can be used to save resources for classification or estimation purposes in clinical trials and quality control. Nevertheless, the methodologies that are usually applied are restricted to qualitative group tests. Moreover, when quantitative compound tests are applied the problem is to ascertain whether the amount of some substance of any individual in the group is greater or lower than a prefixed threshold. An overview of the applications of the discrete compound tests highlights the advantages (to save resources) and disadvantages (higher probability of misclassification), and suggests criteria to assess the suitability of applying Dorfman’s methodology.
- An easy-to-use tool to inject DoS and spoofing networking attacksPublication . Almeida, Rafaela; Pacheco, Vasco; Antunes, Mário; Frazão, LuísComputer network attacks are vast and negatively impact the infrastructure and its applicational services. From a cyber offensive and defensive perspective, there are a plethora of tools to craft and inject customized malicious packets in the network and exploit operating systems and application vulnerabilities. Those tools are however hard to operate by practitioners with less knowledge on networking fundamentals and students in the early stage of their studies. This paper proposes an easy-to-use application tool that can produce customized Denial of Service (DoS) and spoofing attacks. It was developed in Python and takes advantage of scapy library to process and inject network packets. A set of experiments was made, and the results obtained show the efficiency and accuracy of the attacks, by impairing the proper functioning of the victim's machines.
- Elder Care Modular SolutionPublication . Marcelino, Isabel; Pereira, António Manuel de JesusThe Elder Care solution has two primary goals: monitoring vital signs, sending alerts to family and specialized help and provide a social network in order to wrap all older population to avoid social isolation [1][2]. In this paper we will show the methodology used to obtain Elder Care's architecture and point some guidelines to our present work: Elder Care's implementation.
- An end-to-end cryptography based real-time chatPublication . Melo, Tiezer; Barros, António; Antunes, Mário; Frazão, LuísConfidentiality protects users' data from digital eavesdroppers when traveling through the Internet. Confidentiality is complex and costly, especially on applications that involve communication and data exchange between multiple users. Cryptography has been the most used medium to achieve confidentiality, being the greatest challenge the sharing of a secret key to a group of people in a safe and effective way. This paper presents a chat application that implements an innovative way of sending messages with end-to-end encryption, in real-time, with a dynamic key store, and without the existence of data persistence. The application stands out from the others by the fact that it innovates the way the keys are shared with multiple users.
- Evolution of Artificial Terrains for Video Games Based on AccessibilityPublication . Frade, Miguel; Vega, Francisco Fernandez de; Cotta, CarlosDiverse methods have been developed to generate terrains under constraints to control terrain features, but most of them use strict restrictions. However, there are situations were more flexible restrictions are sufficient, such as ensuring that terrains have enough accessible area, which is an important trait for video games. The Genetic Terrain Program technique, based on genetic programming, was used to automatically evolve Terrain Programs (TPs - which are able to generate terrains procedurally) for the desired accessibility parameters. Results showed that the accessibility parameters have negligible influence on the evolutionary system and that the terminal set has a major role on the terrain look. TPs produced this way are already being used on Chapas video game.
- Fighting Elders’ Social and Technological Exclusion: The TV Based ApproachPublication . Correia, Luís; Costa, Nuno; Pereira, AntónioWe are assisting to the fastest grow of senior population ever and that tendency has brought several challenges for governments, families and for the elderly. The society was not prepared for that. On the one hand, there are many elderly who live alone in the cities and, on the other hand, active people is moving to the cities looking for a better life while leaving behind the villages where they born and grow and the older family members. On the other side, everyone is expecting the aid of technology in order to solve or at least minimize this problem. This paper present a video-calling service targeted for elderly social and technological exclusion and promoting socialization while using recent technology embedded into well-known electronic devices like TVs. The evaluation of results showed that when assisted technology is encapsulated into everyday objects, older people can use it seamlessly, without any learning curve.
- Filtering Email Addresses, Credit Card Numbers and Searching for Bitcoin Artifacts with the Autopsy Digital Forensics SoftwarePublication . Domingues, Patricio; Frade, Miguel; Parreira, João MotaEmail addresses and credit card numbers found on digital forensic images are frequently an important asset in a forensic casework. However, the automatic harvesting of these data often yields many false positives. This paper presents the Forensic Enhanced Analysis (FEA) module for the Autopsy digital forensic software. FEA aims to eliminate false positives of email addresses and credit card numbers harvested by Autopsy, thus reducing the workload of the forensic examiner. FEA also harvests potential Bitcoin public addresses and private keys and validates them by looking into Bitcoin’s blockchain for the transactions linked to public addresses. FEA explores the report functionality of Autopsy and allows exports in CSV, HTML and XLS formats. Experimental results over four digital forensic images show that FEA eliminates as many as of email addresses and of credit card numbers.
- «
- 1 (current)
- 2
- 3
- »
