2024
Authors
Baghcheband, H; Soares, C; Reis, LP;
Publication
IEEE INTERNET COMPUTING
Abstract
Today, autonomous agents, the Internet of Things, and smart devices produce more and more distributed data and use them to learn models for different purposes. One challenge is that learning from local data only may lead to suboptimal models. Thus, better models are expected if agents can exchange data, leading to approaches such as federated learning. However, these approaches assume that data have no value and, thus, is exchanged for free. A machine learning data market (MLDM), a framework based on multiagent systems with a market-based perspective on data exchange, was recently proposed. In an MLDM, each agent trains its model based on both local data and data bought from other agents. Although the empirical results are interesting, several challenges are still open, including data acquisition and data valuation. The MLDM is an illustrative example of how the value of data can and should be integrated into the design of distributed ML systems.
2024
Authors
Cunha, S; Silva, L; Saraiva, J; Fernandes, JP;
Publication
PROCEEDINGS OF THE 17TH ACM SIGPLAN INTERNATIONAL CONFERENCE ON SOFTWARE LANGUAGE ENGINEERING, SLE 2024
Abstract
Energy efficiency of software is crucial in minimizing environmental impact and reducing operational costs of ICT systems. Energy efficiency is therefore a key area of contemporary software language engineering research. A recurrent discussion that excites our community is whether runtime performance is always a proxy for energy efficiency. While a generalized intuition seems to suggest this is the case, this intuition does not align with the fact that energy is the accumulation of power over time; hence, time is only one of the factors in this accumulation. We focus on the other factor, power, and the impact that capping it has on the energy efficiency of running software. We conduct an extensive investigation comparing regular and power-capped executions of 9 benchmark programs obtained from The Computer Language Benchmarks Game, across 20 distinct programming languages. Our results show that employing power caps can be used to trade running time, which is degraded, for energy efficiency, which is improved, in all the programming languages and in all benchmarks that were considered. We observe overall energy savings of almost 14% across the 20 programming languages, with notable savings of 27% in Haskell. This saving, however, comes at the cost of an overall increase of the program's execution time of 91% in average. We are also able to draw similar observations using language specific benchmarks for programming languages of different paradigms and with different execution models. This is achieved analyzing a wide range of benchmark programs from the nofib Benchmark Suite of Haskell Programs, DaCapo Benchmark Suite for Java, and the Python Performance Benchmark Suite. We observe energy savings of approximately 8% to 21% across the test suites, with execution time increases ranging from 21% to 46%. Notably, the DaCapo suite exhibits the most significant values, with 20.84% energy savings and a 45.58% increase in execution time. Our results have the potential to drive significant energy savings in the context of computational tasks for which runtime is not critical, including Batch Processing Systems, Background Data Processing and Automated Backups.
2024
Authors
Silva, IOe; Jesus, SM; Ferreira, HM; Saleiro, P; Sousa, I; Bizarro, P; Soares, C;
Publication
CoRR
Abstract
2024
Authors
Costa, J; Barbosa, J;
Publication
ADMINISTRATIVE SCIENCES
Abstract
The present study examines the impact of family ownership and control on the internationalization strategies of Portuguese manufacturing firms. The study contributes to the existing literature by providing evidence that different forms of international market presence are asymmetrically influenced by family control and by underscoring the importance of innovative strategies. The analysis includes a sample of 25,533 firms observed from 2018 to 2021. Econometric models address the role of ownership in alternative internationalization endeavors, demonstrating that these firms differ from their non-family counterparts. By comparing the export propensity, intensity, and reach of family businesses to non-family businesses, the research sheds light on the challenges faced by family-owned firms and the significance of structural characteristics such as technological regimes and regional competitive advantages. The findings emphasize the negative impact of family presence on internationalization while highlighting the importance of innovation and ecosystem support. Additionally, the study contributes to the empirical refinement of firm classification by proposing a more reliable segmentation method. It also presents alternative econometric methods to appraise internationalization strategies better. Future research directions are suggested, particularly regarding the use of additional information related to innovation and human capital, offering insights for enhancing the global engagement of family businesses in global markets. This research provides valuable empirical evidence and practical implications for policymakers and practitioners seeking to support the required actions to promote the growth and internationalization of family businesses in the context of the Portuguese manufacturing industry.
2024
Authors
Ascençao, C; Teixeira, H; Gonçalves, J; Almeida, F;
Publication
INFORMATION AND COMPUTER SECURITY
Abstract
PurposeSecurity in large-scale agile is a crucial aspect that should be carefully addressed to ensure the protection of sensitive data, systems and user privacy. This study aims to identify and characterize the security practices that can be applied in managing large-scale agile projects.Design/methodology/approachA qualitative study is carried out through 18 interviews with 6 software development companies based in Portugal. Professionals who play the roles of Product Owner, Scrum Master and Scrum Member were interviewed. A thematic analysis was applied to identify deductive and inductive security practices.FindingsThe findings identified a total of 15 security practices, of which 8 are deductive themes and 7 are inductive. Most common security practices in large-scale agile include penetration testing, sensitive data management, automated testing, threat modeling and the implementation of a DevSecOps approach.Originality/valueThe results of this study extend the knowledge about large-scale security practices and offer relevant practical contributions for organizations that are migrating to large-scale agile environments. By incorporating security practices at every stage of the agile development lifecycle and fostering a security-conscious culture, organizations can effectively address security challenges in large-scale agile environments.
2024
Authors
Silva, HBGE; Santos, RMN; Ricardo, M;
Publication
INTERNET POLICY REVIEW
Abstract
The implementation of traffic differentiation measures by internet service providers (ISPs) has raised concerns regarding net neutrality, potentially leading to discriminatory practices that challenge existing regulatory frameworks. The complexity of this issue intensifies with the advent of 5G networks as they dynamically assemble elements of the physical infrastructure to create logically segregated domains customised to accommodate usage scenarios with specific requirements, resulting in the categorisation of users, applications, and services into distinct groups which possess the capacity to disrupt the non-discriminatory treatment of data flows. Within this context, a pivotal question arises: how can regulatory authorities effectively evaluate traffic differentiation in 5G networks? In response, this paper proposes an innovative application of the standardised network data analytics function (NWDAF) to facilitate the assessment of internet traffic differentiation. We introduce this novel concept and demonstrate its implementation through a proof -of -concept prototype. By leveraging the NWDAF, regulators may obtain direct and automatic access to performance metrics of 5G networks, enabling the analysis of the traffic management mechanisms employed by ISPs.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.