Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CRACS

2013

Using Device Detection Techniques in M-Learning Scenarios

Autores
Queiros, R; Pinto, M;

Publicação
INNOVATIONS IN XML APPLICATIONS AND METADATA MANAGEMENT: ADVANCING TECHNOLOGIES

Abstract
Recent studies of mobile Web trends show the continued explosion of mobile-friend content. However, the wide number and heterogeneity of mobile devices poses several challenges for Web programmers, who want automatic delivery of context and adaptation of the content to mobile devices. Hence, the device detection phase assumes an important role in this process. In this chapter, the authors compare the most used approaches for mobile device detection. Based on this study, they present an architecture for detecting and delivering uniform m-Learning content to students in a Higher School. The authors focus mainly on the XML device capabilities repository and on the REST API Web Service for dealing with device data. In the former, the authors detail the respective capabilities schema and present a new caching approach. In the latter, they present an extension of the current API for dealing with it. Finally, the authors validate their approach by presenting the overall data and statistics collected through the Google Analytics service, in order to better understand the adherence to the mobile Web interface, its evolution over time, and the main weaknesses. Copyright (C) 2013, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.

2013

CodeSkelGen - A program skeleton generator

Autores
Queiros, R;

Publicação
OpenAccess Series in Informatics

Abstract
Existent computer programming training environments help users to learn programming by solving problems from scratch. Nevertheless, initiating the resolution of a program can be frustrating and demotivating if the student does not know where and how to start. Skeleton programming facilitates a top-down design approach, where a partially functional system with complete highlevel structures is available, so the student needs only to progressively complete or update the code to meet the requirements of the problem. This paper presents CodeSkelGen - a program skeleton generator. CodeSkelGen generates skeleton or buggy Java programs from a complete annotated program solution provided by the teacher. The annotations are formally described within an annotation type and processed by an annotation processor. This processor is responsible for a set of actions ranging from the creation of dummy methods to the exchange of operator types included in the source code. The generator tool will be included in a learning environment that aims to assist teachers in the creation of programming exercises and to help students in their resolution. © Ricardo Queirós.

2013

The LSTS Toolchain for Networked Vehicle Systems

Autores
Pinto, J; Dias, PS; Martins, R; Fortuna, J; Marques, E; Sousa, J;

Publicação
2013 MTS/IEEE OCEANS - BERGEN

Abstract
This paper describes the open-source software toolchain developed by the Underwater Systems and Technology Laboratory (LSTS) for supporting networked heterogeneous air and ocean vehicle systems. The toolchain supports the deployment of air and ocean vehicles interacting over limited acoustic and wireless networks combined with disruption-tolerant networking protocols. We present the different components of the toolchain and how they can be deployed and extended for different scenarios. We conclude with descriptions of recent applications to onboard deliberative planning and integration of low-cost micro UAVs into the toolchain.

2013

Towards deductive verification of MPI programs against session types

Autores
Marques, ERB; Martins, F; Vasconcelos, VT; Ng, N; Martins, N;

Publicação
Proceedings 6th Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, PLACES 2013, Rome, Italy, 23rd March 2013.

Abstract
The Message Passing Interface (MPI) is the de facto standard message-passing infrastructure for developing parallel applications. Two decades after the first version of the library specification, MPI-based applications are nowadays routinely deployed on super and cluster computers. These applications, written in C or Fortran, exhibit intricate message passing behaviours, making it hard to statically verify important properties such as the absence of deadlocks. Our work builds on session types, a theory for describing protocols that provides for correct-by-construction guarantees in this regard. We annotate MPI primitives and C code with session type contracts, written in the language of a software verifier for C. Annotated code is then checked for correctness with the software verifier. We present preliminary results and discuss the challenges that lie ahead for verifying realistic MPI program compliance against session types.

2013

Fine-grained Patches for Java Software Upgrades

Autores
Marques, ERB;

Publicação
5th Workshop on Hot Topics in Software Upgrades, HotSWUp'13, San Jose, CA, USA, June 28, 2013

Abstract

2013

End-to-End Delay Estimation using RPL Metrics in WSN

Autores
Pinto, P; Pinto, A; Ricardo, M;

Publicação
2013 IFIP WIRELESS DAYS (WD)

Abstract
Critical monitoring applications can use wireless sensor networks to transport delay sensitive data. This data may demand bounded delays in order to be considered useful by the receiver. In these cases, an accurate and real-time estimation of the end-to-end delay could be used to anticipate the data usefulness prior to sending it. A novel real-time and end-to-end delay estimation mechanism is proposed in this paper, which considers processing times and two new RPL metrics. Results show that our proposal is more accurate than the ETT-based solution for delay estimation, and it does not significantly degrade the network performance.

  • 120
  • 192