2016
Autores
Cardoso N.; Madureira J.; Pereira N.;
Publicação
2016 IEEE 18th International Conference on e-Health Networking, Applications and Services, Healthcom 2016
Abstract
Smartphones are everywhere, and they are a very attractive platform to perform unobtrusive monitoring of users. In this work, we use common features of modern smartphones to build a human activity recognition (HAR) system for elderly care. We have built a classifier that detects the transport mode of the user including whether an individual is inactive, walking, in bus, in car, in train or in metro. We evaluated our approach using over 24 hours of transportation data from a group of 15 individuals. Our tests show that our classifier can detect the transportation mode with over 90% accuracy.
2016
Autores
Chaâri, R; Ellouze, F; Koubâa, A; Qureshi, B; Pereira, N; Youssef, H; Tovar, E;
Publicação
Computer Networks
Abstract
Cyber-Physical Systems (CPSs) represent systems where computations are tightly coupled with the physical world, meaning that physical data is the core component that drives computation. Industrial automation systems, wireless sensor networks, mobile robots and vehicular networks are just a sample of cyber-physical systems. Typically, CPSs have limited computation and storage capabilities due to their tiny size and being embedded into larger systems. With the emergence of cloud computing and the Internet-of-Things (IoT), there are several new opportunities for these CPSs to extend their capabilities by taking advantage of the cloud resources in different ways. In this survey paper, we present an overview of research efforts on the integration of cyber-physical systems with cloud computing and categorize them into three areas: (1) remote brain, (2) big data manipulation, (3) and virtualization. In particular, we focus on three major CPSs namely mobile robots, wireless sensor networks and vehicular networks. © 2016 Elsevier B.V.
2018
Autores
Fortuna, P; Pereira, N; Butun, I;
Publicação
ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY
Abstract
Due to their universal accessibility, interactivity and scaling ease, Web applications relying on client-side code execution are currently the most common form of delivering applications and it is likely that they will continue to enter into less common realms such as IoT-based applications. We reason that modern Web applications should be able to exhibit advanced security protection mechanisms and review the research literature that points to useful partial solutions. Then, we propose a framework to support such characteristics and the features needed to implement them, providing a roadmap for a comprehensive solution to support Web application integrity.
2018
Autores
Butun, I; Pereira, N; Gidlund, M;
Publicação
Abstract
2018
Autores
Butun, I; Pereira, N; Gidlund, M;
Publicação
Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects
Abstract
2018
Autores
Fortuna, P; Pereira, N; Butun, I;
Publicação
ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy
Abstract
Due to their universal accessibility, interactivity and scaling ease, Web applications relying on client-side code execution are currently the most common form of delivering applications and it is likely that they will continue to enter into less common realms such as IoT-based applications. We reason that modern Web applications should be able to exhibit advanced security protection mechanisms and review the research literature that points to useful partial solutions. Then, we propose a framework to support such characteristics and the features needed to implement them, providing a roadmap for a comprehensive solution to support Web application integrity. Copyright
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.