Department of Computer Science (DCC)
Departamento de Ciências dos Computadores
AuthID: I-000-0JZ
Publications Actions
Publications at Authenticus Institutional Profile
An Authenticus institution (group) is an organization which consists of a set of researchers (institutional/group team). The set of researchers depends on the organizational structure of the institution per year and can be set at the institution profile, under ‘Researchers’ interface. Based on the institutional team we produce listings of publications, statistics and institutional reports.
Publications displayed at an Authenticus institutional profile depend on two parameters:
- Researchers team associated with the institution per year.
- Publications source type.
We define 3 types of publication sources:
- Validated by team members - includes all publications validated by team members. Requires the definition of the institutional team.
- All published by team members - includes all publications validated by the institution team members plus all not-validated (only identified) publications. Requires the definition of the institutional team.
- Affiliation Based - includes publications that have the institution/group in the publication affiliation. Does not require institutional team, but at the same time does not guarantee that all publications will be listed.
External
Internal
No data about last update.
Rules:
This actions updates publications citations of every team member.
Only validated by team members publications are included.
Only the current year team is included in this action.>
The action is executed in the background, thus the results are NOT immediate.
This actions can be executed only once a month!
Only validated by team members publications are included.
Only the current year team is included in this action.>
The action is executed in the background, thus the results are NOT immediate.
This actions can be executed only once a month!
No data about last update.
Rules:
This actions updates all pre print publications of the group/institution.
Only validated by current year team members publications are included.
The action is executed in the background, thus the results are NOT immediate.
This actions can be executed only once a day!
Only validated by current year team members publications are included.
The action is executed in the background, thus the results are NOT immediate.
This actions can be executed only once a day!
Publications Count: 2851
46 Team MembersFilters -> Year: 2026
2261
TITLE: Antimirov and Mosses's Rewrite System Revisited Full Text
AUTHORS: Marco Almeida; Nelma Moreira ; Rogério Reis ;
PUBLISHED: 2009, SOURCE: Int. J. Found. Comput. Sci., VOLUME: 20, ISSUE: 4, PAGES: 669-684
AUTHORS: Marco Almeida; Nelma Moreira ; Rogério Reis ;
PUBLISHED: 2009, SOURCE: Int. J. Found. Comput. Sci., VOLUME: 20, ISSUE: 4, PAGES: 669-684
2262
TITLE: Applying reinforcement learning to scheduling strategies in an actual grid environment
AUTHORS: Bernardo Fortunato Costa; Marta Mattoso; Inês de Castro Dutra ;
PUBLISHED: 2009, SOURCE: Int. J. High Perform. Syst. Archit., VOLUME: 2, ISSUE: 2, PAGES: 116-128
AUTHORS: Bernardo Fortunato Costa; Marta Mattoso; Inês de Castro Dutra ;
PUBLISHED: 2009, SOURCE: Int. J. High Perform. Syst. Archit., VOLUME: 2, ISSUE: 2, PAGES: 116-128
2263
TITLE: BIORED - A Genetic Algorithm for Pattern Detection in Biosequences
AUTHORS: Pereira, P; Silva, F ; Fonseca, NA ;
PUBLISHED: 2009, SOURCE: 2nd International Workshop on Practical Applications of Computational Biology and Bioinformatics (IWPACBB 08) in 2ND INTERNATIONAL WORKSHOP ON PRACTICAL APPLICATIONS OF COMPUTATIONAL BIOLOGY AND BIOINFORMATICS (IWPACBB 2008), VOLUME: 49, PAGES: 156-+
AUTHORS: Pereira, P; Silva, F ; Fonseca, NA ;
PUBLISHED: 2009, SOURCE: 2nd International Workshop on Practical Applications of Computational Biology and Bioinformatics (IWPACBB 08) in 2ND INTERNATIONAL WORKSHOP ON PRACTICAL APPLICATIONS OF COMPUTATIONAL BIOLOGY AND BIOINFORMATICS (IWPACBB 2008), VOLUME: 49, PAGES: 156-+
2264
TITLE: Body sensor networks: can we use them?. can we use them?
AUTHORS: Pedro Brandão ; Jean Bacon;
PUBLISHED: 2009, SOURCE: M-MPAC@Middleware, PAGES: 3
AUTHORS: Pedro Brandão ; Jean Bacon;
PUBLISHED: 2009, SOURCE: M-MPAC@Middleware, PAGES: 3
2265
TITLE: BSN MIDDLEWARE <i>Abstracting Resources to Human Models</i>
AUTHORS: Brandao, P ; Bacon, J;
PUBLISHED: 2009, SOURCE: 2nd International Conference on Health Informatics (HEALTHINF 2009) in HEALTHINF 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON HEALTH INFORMATICS, PAGES: 245-250
AUTHORS: Brandao, P ; Bacon, J;
PUBLISHED: 2009, SOURCE: 2nd International Conference on Health Informatics (HEALTHINF 2009) in HEALTHINF 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON HEALTH INFORMATICS, PAGES: 245-250
INDEXED IN:
Scopus
WOS
DBLP
2266
TITLE: Commitment and authentication systems Full Text
AUTHORS: Alexandre Pinto ; Andre Souto ; Armando Matos ; Luis Antunes ;
PUBLISHED: 2009, SOURCE: DESIGNS CODES AND CRYPTOGRAPHY, VOLUME: 53, ISSUE: 3, PAGES: 175-193
AUTHORS: Alexandre Pinto ; Andre Souto ; Armando Matos ; Luis Antunes ;
PUBLISHED: 2009, SOURCE: DESIGNS CODES AND CRYPTOGRAPHY, VOLUME: 53, ISSUE: 3, PAGES: 175-193
2267
TITLE: Commitment and Authentication Systems Full Text
AUTHORS: Alexandre Pinto ; Andre Souto ; Armando Matos ; Luis Antunes ;
PUBLISHED: 2009, SOURCE: 2nd International Conference on Information Theoretic Security in INFORMATION THEORETIC SECURITY, VOLUME: 4883, PAGES: 1-22
AUTHORS: Alexandre Pinto ; Andre Souto ; Armando Matos ; Luis Antunes ;
PUBLISHED: 2009, SOURCE: 2nd International Conference on Information Theoretic Security in INFORMATION THEORETIC SECURITY, VOLUME: 4883, PAGES: 1-22
2268
TITLE: Comparative Study of Classification Algorithms Using Molecular Descriptors in Toxicological DataBases
AUTHORS: Pereira, M; Costa, VS ; Camacho, R ; Fonseca, NA ; Simoes, C; Brito, RMM ;
PUBLISHED: 2009, SOURCE: 4th Brazilian Symposium on Bioinformatics (BSB 2009) in ADVANCES IN BIOINFORMATICS AND COMPUTATIONAL BIOLOGY, PROCEEDINGS, VOLUME: 5676, PAGES: 121-+
AUTHORS: Pereira, M; Costa, VS ; Camacho, R ; Fonseca, NA ; Simoes, C; Brito, RMM ;
PUBLISHED: 2009, SOURCE: 4th Brazilian Symposium on Bioinformatics (BSB 2009) in ADVANCES IN BIOINFORMATICS AND COMPUTATIONAL BIOLOGY, PROCEEDINGS, VOLUME: 5676, PAGES: 121-+
2269
TITLE: Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography Full Text
AUTHORS: Barbosa, M ; Moss, A; Page, D;
PUBLISHED: 2009, SOURCE: JOURNAL OF CRYPTOLOGY, VOLUME: 22, ISSUE: 2, PAGES: 259-281
AUTHORS: Barbosa, M ; Moss, A; Page, D;
PUBLISHED: 2009, SOURCE: JOURNAL OF CRYPTOLOGY, VOLUME: 22, ISSUE: 2, PAGES: 259-281
2270
TITLE: Coordination via Interaction Constraints I: Local Logic Full Text
AUTHORS: Dave Clarke; José Proença ;
PUBLISHED: 2009, SOURCE: ICE, VOLUME: 12, PAGES: 17-39
AUTHORS: Dave Clarke; José Proença ;
PUBLISHED: 2009, SOURCE: ICE, VOLUME: 12, PAGES: 17-39
2271
TITLE: CrimsonHex: A Service Oriented Repository of Specialised Learning Objects
AUTHORS: Leal, JP ; Qleirós, R ;
PUBLISHED: 2009, SOURCE: 11th International Conference on Enterprise Information Systems in ENTERPRISE INFORMATION SYSTEMS-BK, VOLUME: 24, PAGES: 102-+
AUTHORS: Leal, JP ; Qleirós, R ;
PUBLISHED: 2009, SOURCE: 11th International Conference on Enterprise Information Systems in ENTERPRISE INFORMATION SYSTEMS-BK, VOLUME: 24, PAGES: 102-+
2272
TITLE: CrimsonHex: an interoperable repository of programming problems
AUTHORS: José P Leal ; Ricardo Queirós ;
PUBLISHED: 2009, SOURCE: ACM-ICPC 2nd Competitive Learning Symposium - CLIS 2009
AUTHORS: José P Leal ; Ricardo Queirós ;
PUBLISHED: 2009, SOURCE: ACM-ICPC 2nd Competitive Learning Symposium - CLIS 2009
INDEXED IN:
Handle
Handle2273
TITLE: CrimsonHex: um repositório de objectos de aprendizagem
AUTHORS: José P Leal ; Ricardo Queirós ;
PUBLISHED: 2009, SOURCE: JLBE09: Jornadas Luso-Brasileiras de Ensino e Tecnologia em Engenharia
AUTHORS: José P Leal ; Ricardo Queirós ;
PUBLISHED: 2009, SOURCE: JLBE09: Jornadas Luso-Brasileiras de Ensino e Tecnologia em Engenharia
INDEXED IN:
Handle
Handle2274
TITLE: Cryptographic Security of Individual Instances Full Text
AUTHORS: Antunes, L ; Laplante, S; Pinto, A ; Salvador, L;
PUBLISHED: 2009, SOURCE: 2nd International Conference on Information Theoretic Security in INFORMATION THEORETIC SECURITY, VOLUME: 4883, PAGES: 195-210
AUTHORS: Antunes, L ; Laplante, S; Pinto, A ; Salvador, L;
PUBLISHED: 2009, SOURCE: 2nd International Conference on Information Theoretic Security in INFORMATION THEORETIC SECURITY, VOLUME: 4883, PAGES: 195-210
2275
TITLE: Deductive Verification of Cryptographic Software
AUTHORS: Manuel Barbosa ; José Bacelar Almeida ; Jorge Sousa Pinto ; Bárbara Vieira;
PUBLISHED: 2009, SOURCE: NASA Formal Methods, PAGES: 146-155
AUTHORS: Manuel Barbosa ; José Bacelar Almeida ; Jorge Sousa Pinto ; Bárbara Vieira;
PUBLISHED: 2009, SOURCE: NASA Formal Methods, PAGES: 146-155
INDEXED IN:
DBLP
2276
TITLE: Defining programming problems as learning objects
AUTHORS: Leal, JP ; Queiros, R ;
PUBLISHED: 2009, SOURCE: World Academy of Science, Engineering and Technology, VOLUME: 58, PAGES: 188-195
AUTHORS: Leal, JP ; Queiros, R ;
PUBLISHED: 2009, SOURCE: World Academy of Science, Engineering and Technology, VOLUME: 58, PAGES: 188-195
INDEXED IN:
Scopus
Handle
Handle2277
TITLE: Depth as Randomness Deficiency Full Text
AUTHORS: Luis Antunes ; Armando Matos ; Andre Souto ; Paul Vitanyi;
PUBLISHED: 2009, SOURCE: 3rd Computability in Europe Conference 2007 in THEORY OF COMPUTING SYSTEMS, VOLUME: 45, ISSUE: 4, PAGES: 724-739
AUTHORS: Luis Antunes ; Armando Matos ; Andre Souto ; Paul Vitanyi;
PUBLISHED: 2009, SOURCE: 3rd Computability in Europe Conference 2007 in THEORY OF COMPUTING SYSTEMS, VOLUME: 45, ISSUE: 4, PAGES: 724-739
2278
TITLE: Designing a user interface for repositories of learning objects
AUTHORS: Leal, JP ; Queiros, R ;
PUBLISHED: 2009, SOURCE: IADIS International Conference e-Learning 2009, Part of the IADIS Multi Conference on Computer Science and Information Systems, MCCSIS 2009 in Proceedings of the IADIS International Conference e-Learning 2009, Part of the IADIS Multi Conference on Computer Science and Information Systems, MCCSIS 2009, VOLUME: 2, PAGES: 137-140
AUTHORS: Leal, JP ; Queiros, R ;
PUBLISHED: 2009, SOURCE: IADIS International Conference e-Learning 2009, Part of the IADIS Multi Conference on Computer Science and Information Systems, MCCSIS 2009 in Proceedings of the IADIS International Conference e-Learning 2009, Part of the IADIS Multi Conference on Computer Science and Information Systems, MCCSIS 2009, VOLUME: 2, PAGES: 137-140
INDEXED IN:
Scopus
Handle
Handle2279
TITLE: Detecting Errors in Foreign Trade Transactions: Dealing with Insufficient Data
AUTHORS: Torgo, L ; Pereira, W; Soares, C ;
PUBLISHED: 2009, SOURCE: 14th Portuguese Conference on Artificial Intelligence in PROGRESS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, VOLUME: 5816, PAGES: 435-446
AUTHORS: Torgo, L ; Pereira, W; Soares, C ;
PUBLISHED: 2009, SOURCE: 14th Portuguese Conference on Artificial Intelligence in PROGRESS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, VOLUME: 5816, PAGES: 435-446
2280
TITLE: Deterministic Motif Mining in Protein Databases
AUTHORS: Pedro Gabriel Ferreira ; Paulo J Azevedo ;
PUBLISHED: 2009, SOURCE: Database Technologies: Concepts, Methodologies, Tools, and Applications, PAGES: 2632-2656
AUTHORS: Pedro Gabriel Ferreira ; Paulo J Azevedo ;
PUBLISHED: 2009, SOURCE: Database Technologies: Concepts, Methodologies, Tools, and Applications, PAGES: 2632-2656
INDEXED IN:
Scopus
DBLP