Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CRACS

2012

Proceedings 2nd International Workshop on Linearity

Autores
Alves, S; Mackie, I;

Publicação
Electron. Proc. Theor. Comput. Sci. - Electronic Proceedings in Theoretical Computer Science - EPTCS

Abstract

2012

Verification of MPI Programs Using Session Types

Autores
Honda, K; Marques, ERB; Martins, F; Ng, N; Vasconcelos, VT; Yoshida, N;

Publicação
Recent Advances in the Message Passing Interface - 19th European MPI Users' Group Meeting, EuroMPI 2012, Vienna, Austria, September 23-26, 2012. Proceedings

Abstract
Developing safe, concurrent (and parallel) software systems is a hard task in multiple aspects, particularly the sharing of information and the synchronization among multiple participants of the system. In the message passing paradigm, this is achieved by sending and receiving messages among different participants, raising a number of verification problems. For instance, exchanging messages in a wrong order may prevent the system from progressing, causing a deadlock.MPI is the most commonly used protocol for high-performance, message-based parallel programs, and the need for formal verification approaches is well acknowledged by much recent work (e.g., see [1]). © 2012 Springer-Verlag.

2012

Implementation of a control architecture for networked vehicle systems

Autores
Pinto, J; Calado, P; Braga, J; Dias, P; Martins, R; Marques, E; Sousa, JB;

Publicação
IFAC Proceedings Volumes (IFAC-PapersOnline)

Abstract
This paper describes the layered control architecture and its software implementation developed and used at the Underwater Systems and Technology Laboratory. The architecture is implemented as a toolchain which consists on three main entities: DUNE onboard software, Neptus command and control software and a common IMC message-based communication protocol. The LSTS software toolchain has been tested throughout various field deployments where it was used to control heterogeneous autonomous vehicles like AUVs, ASVs, UAVs and ROVs in both single and multi-vehicle operations.

2012

Structural alignment of plain text books

Autores
Santos, A; Almeida, JJ; Carvalho, N;

Publicação
LREC 2012 - EIGHTH INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION

Abstract
Text alignment is one of the main processes for obtaining parallel corpora. When aligning two versions of a book, results are often affected by unpaired sections - sections which only exist in one of the versions of the book. We developed Text : : Perfide : : BookSync, a Perl module which performs books synchronization (structural alignment based on section delimitation), provided they have been previously annotated by Text : : Perfide : : BookCleaner. We discuss the need for such a tool and several implementation decisions. The main functions are described, and examples of input and output are presented. Text : : Perfide : : PartialAlign is an extension of the partialAlign.py tool bundled with hunalign which proposes an alternative methods for splitting bitexts.

2012

A Cooperative Protocol for Jamming Eavesdroppers in Wireless Networks

Autores
Vilela, JP; Barros, J;

Publicação
2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)

Abstract
We present a jamming protocol for secrecy-enhanced wireless networks in which otherwise silent devices are selected as jammers to cause interference to potential eavesdroppers. This cooperative protocol includes several jammer selection policies that lead to different levels of secrecy-energy tradeoffs. Our results show that there is some advantage over selecting well-connected jammers and there is a need for a minimum number of jammers for the energy cost of jamming to payoff.

2012

Security and privacy issues for the network of the future

Autores
Marias, GF; Barros, J; Fiedler, M; Fischer, A; Hauff, H; Herkenhoener, R; Grillo, A; Lentini, A; Lima, L; Lorentzen, C; Mazurczyk, W; de Meer, H; Oliveira, PF; Polyzos, GC; Pujol, E; Szczypiorski, K; Vilela, JP; Vinhoza, TTV;

Publicação
SECURITY AND COMMUNICATION NETWORKS

Abstract
The vision towards the Network of the Future cannot be separated from the fact that today's networks, and networking services are subject to sophisticated and very effective attacks. When these attacks first appeared, spoofing and distributed denial-of-service attacks were treated as apocalypse for networking. Now, they are considered moderate damage, whereas more sophisticated and inconspicuous attacks, such as botnets activities, might have greater and far reaching impact. As the Internet is expanding to mobile phones and smart dust and as its social coverage is liberalized towards the realization of ubiquitous computing (with communication), the concerns on security and privacy have become deeper and the problems more challenging than ever. Re-designing the Internet as the Network of the Future is self-motivating for researchers, and security and privacy cannot be provided again as separate, external, add-on, solutions. In this paper, we discuss the security and privacy challenges of the Network of the Future and try to delimit the solutions space on the basis of emerging techniques. We also review methods that help the quantification of security and privacy in an effort to provide a more systematic and quantitative treatment of the area in the future. Copyright (c) 2011 John Wiley & Sons, Ltd.

  • 132
  • 192