Recursos de colección

Biblioteca Digital do IPB (53.442 recursos)

A Biblioteca Digital do IPB, tem por objectivo divulgar e permitir o livre acesso à produção científica produzida pela comunidade académica, promovendo a integração, partilha e a visibilidade da informação científica e garantindo a preservação da memória intelectual do Instituto Politécnico de Bragança.

IC - Comunicações em Encontros Científicos Não Indexadas ao ISI

Mostrando recursos 1 - 20 de 179

  1. Technology-enhanced learning on campus: insights from EUNIS e-Learning Task Force

    Ferrell, Gill; Alves, Paulo; Bubas, Goran; Engert, Steffi; Epelboin, Yves; Madey, Jan; Palma, José; Piteira, Martinha; Restivo, T.M.; Ribeiro, Ligia; Sidelmann Rossen, Dorte; Soares, Filomena; Uhomoibhi, James
    In 2010 the EUNIS e-Learning Task Force (ELTF) members collaborated on a review of tools and technologies in use across our member institutions. One of the key features of that paper was the use of technology to give off-campus learners, such as distance learners, those undertaking field studies and learners in the workplace a richly supported learning experience. Building on the success of that collaboration, the ELTF members have turned their attention this year to the use of technology on campus. Whilst technology and distance learning go hand in hand, universities are often slower to take advantage of the possibilities...

  2. SIDE – teaching support information system

    Barbosa, Luís; Alves, Paulo; Reis, Arsénio; Barroso, João
    The success of any information system in any area can be assessed by the voluntary accession of users. In an institution where there is a single system available to the users, this evaluation has to be done through user surveys. SIDE is a portal based on information systems architecture to support teaching, academic management of courses and the learning process, in order to support the needs of integration of information flows in several university information systems. This portal, which is in operation at the University of Trás-os-Montes e Alto Douro since 2002, allows data management coming from the operation of courses, providing to the management entities one platform...

  3. Assessment of virtual learning environments by higher education teachers and students

    Miranda, Luísa; Alves, Paulo; Morais, Carlos
    This research focuses on the problematic of the use of virtual learning environments in a higher education institution in the north of Portugal. In this study, we set the scientific and pedagogical background of virtual learning environments, and we analyze the responses obtained from an online questionnaire conducted to 536 subjects, all teachers and students at that same higher education institution, namely 347 students and 189 teachers. The research questions of this study were set out in order to assess the frequency with which the higher education students and teachers of that institution access virtual learning environments, the value they assign...

  4. An empirical study on the estimation of software development effort with use case points

    Alves, Luís M.; Sousa, André; Ribeiro, Pedro; Machado, Ricardo J.
    Empirical studies are important in software engineering to evaluate new tools, techniques, methods and technologies in a structured way before they are introduced in the industrial (real) software process. Perform empirical studies in a real context is very difficult due to various obstacles, so, we intend to create a stable environment that allows us to perform reliably empirical studies with students. This paper describes a case study with 104 students grouped in seven teams that developed a software system (Web application) for a real costumer. In this study we used a model based on Use Case Points (UCP) to estimate...

  5. An empirical study on the estimation of software development effort with use case points

    Alves, Luís M.; Sousa, André; Ribeiro, Pedro; Machado, Ricardo J.
    Empirical studies are important in software engineering to evaluate new tools, techniques, methods and technologies in a structured way before they are introduced in the industrial (real) software process. Perform empirical studies in a real context is very difficult due to various obstacles, so, we intend to create a stable environment that allows us to perform reliably empirical studies with students. This paper describes a case study with 104 students grouped in seven teams that developed a software system (Web application) for a real costumer. In this study we used a model based on Use Case Points (UCP) to estimate...

  6. A secure personal health record repository

    Pedrosa, Tiago; Lopes, Rui Pedro; Santos, João C.; Costa, Carlos; Oliveira, José Luís
    Due to strict regulatory, ethic and legal issues, Electronic Health Record (EHR) systems have been mainly deployed in federated health care scenarios. This situation has been hindering the wide adoption of EHRs, contributing to delaying the establishment of a competitive market where contributions from different providers could take full advantage of information exchange and regular practitioners’ collaboration. Moreover, with the increasing awareness of medical subjects, patients are demanding more control over their own personal data - Personal Health Record (PHR). This paper presents a secure PHR repository which access is controlled through the joint use of a Virtual Health Card...

  7. A secure personal health record repository

    Pedrosa, Tiago; Lopes, Rui Pedro; Santos, João C.; Costa, Carlos; Oliveira, José Luís
    Due to strict regulatory, ethic and legal issues, Electronic Health Record (EHR) systems have been mainly deployed in federated health care scenarios. This situation has been hindering the wide adoption of EHRs, contributing to delaying the establishment of a competitive market where contributions from different providers could take full advantage of information exchange and regular practitioners’ collaboration. Moreover, with the increasing awareness of medical subjects, patients are demanding more control over their own personal data - Personal Health Record (PHR). This paper presents a secure PHR repository which access is controlled through the joint use of a Virtual Health Card...

  8. An OpenEHR repository based on a native XML database

    Velte, Linda; Pedrosa, Tiago; Costa, Carlos; Oliveira, José Luís
    OpenEHR is an open standard specification that describes the management, storage, retrieval and exchange of data in Electronic Health Record (EHR). Despite its growing importance in the field, the lack of open source solutions is hindering a larger visibility. In this paper we present an openEHR-based repository supported by a native XML database, which allows to store and query OpenEHR records through the DB service layer and a set of REST web services. The obtained results highlight the efficiency of this API and show that it can be used as a persistence component in any OpenEHR solution.

  9. An OpenEHR repository based on a native XML database

    Velte, Linda; Pedrosa, Tiago; Costa, Carlos; Oliveira, José Luís
    OpenEHR is an open standard specification that describes the management, storage, retrieval and exchange of data in Electronic Health Record (EHR). Despite its growing importance in the field, the lack of open source solutions is hindering a larger visibility. In this paper we present an openEHR-based repository supported by a native XML database, which allows to store and query OpenEHR records through the DB service layer and a set of REST web services. The obtained results highlight the efficiency of this API and show that it can be used as a persistence component in any OpenEHR solution.

  10. Choosing grammars to support language processing courses

    Pereira, Maria João; Oliveira, Nuno; Cruz, Daniela; Henriques, Pedro
    Teaching Language Processing courses is a hard task. The level of abstraction inherent to some of the basic concepts in the area and the technical skills required to implement efficient processors are responsible for the number of students that do not learn the subject and do not succeed to finish the course. In this paper we intend to list the main concepts involved in Language Processing subject, and identify the skills required to learn them. In this context, it is feasible to identify the difficulties that lead students to fail. This enables us to suggest some pragmatic ways to overcome those...

  11. NESSy: a new evaluator for software development tools

    Miranda, Enrique; Berón, Mario; Montejano, Germán; Pereira, Maria João; Henriques, Pedro
    Select the best tool for developing a system is a complex process. There must be considered several aspects corresponding to the domain where the system is going to run. Generally, the domain characteristics only are comprehended by experts. They know very well which are the main characteristics, how they can be combined and which should not be considered. This knowledge is fundamental to select the most appropriate tool for implementing a system that solves problems or automates processes in a specific domain. For this reason, it is difficult to get a tool that allows to establish a ranking of development...

  12. Preschool observation supported by smartphone applications

    Mesquita, Cristina; Lopes, Rui Pedro
    Quality evaluation in early childhood education is fundamental to contribute to children’s sound future life. In this context, benchmarks to evaluate the quality of contexts has been developed, based on qualitative research methods such as interviews, field notes, observations among others. The resulting data allows the teacher to redefine strategies to improve the overall education process. One of these methodologies, developed under the Effective Early Learning Project, is the Child Tracking Observation Schedule. The observer records his perception about the concentration, persistence, motivation, energy, satisfaction, complexity and creativity, reaction time and language, trying to establish how the child really feels...

  13. Experimental software engineering in educational context

    Alves, Luís M.; Machado, Ricardo J.; Ribeiro, Pedro
    Empirical studies are important in software engineering to evaluate new tools, techniques, methods and technologies in a structured way before they are introduced in the industrial (real) software process. Within this PhD thesis we will develop a framework of a consistent process for involving students as subjects of empirical studies of software engineering. In concrete, our experiences with software development teams composed of students will analyze how RUP (Rational Unified Process) processes can be compliant with the CMMI (Capability Maturity Model Integration), namely in the context of MLs (maturity levels) 2 and 3. Additionally, we will also analyze the influence of project management tools...

  14. Analyzing the behavior of top spam botnets

    Silva, Rui; Rodrigues, Nuno G.; Salvador, Paulo; Nogueira, António Manuel
    Botnets became the preferred platform for launching attacks and committing fraud on enterprise networks and the Internet itself. Characterizing existing Botnets will help to coordinate and develop new technologies to face this serious security threat. Several approaches can be taken to study this phenomenon: analyze its source code, which can be a hard task mainly due to license restrictions; study the control mechanism, particularly the activity of its Command and Control server(s); study its behavior, by measuring real traffic and collecting relevant statistics. In this work, we have installed some of the most popular spam Botnets, capturing the originated traffic...

  15. SNMPFS - an SNMP filesystem

    Lopes, Rui Pedro; Pedrosa, Tiago; Pires, L.C.M.
    The intensive operation of constantly growing, heterogeneous networks is a challenging task. Besides the increase in size and complexity, data networks have become a critical factor for the success of many organizations. During the last decade, many network management architectures where developed and standardized, aiming at the definition of an open environment to control and optimize its operation. Many of these architectures use specific protocols and specialized tools, to allow remote monitoring and configuration of network equipment and computational platforms. One of the best well known paradigms of human-computer interaction is the file concept and the associated file system. Files...

  16. SNMPFS - an SNMP filesystem

    Lopes, Rui Pedro; Pedrosa, Tiago; Pires, L.C.M.
    The intensive operation of constantly growing, heterogeneous networks is a challenging task. Besides the increase in size and complexity, data networks have become a critical factor for the success of many organizations. During the last decade, many network management architectures where developed and standardized, aiming at the definition of an open environment to control and optimize its operation. Many of these architectures use specific protocols and specialized tools, to allow remote monitoring and configuration of network equipment and computational platforms. One of the best well known paradigms of human-computer interaction is the file concept and the associated file system. Files...

  17. Fighting botnets - a systematic approach

    Rodrigues, Nuno G.; Nogueira, António José Arsénia; Salvador, Paulo
    The increasing impact of Internet in the global economy has transformed botnets into one of the most feared security threats for citizens, organizations and governments. Despite the significant efforts that have been made over the last years to understand this phenomenon and develop detection techniques and countermeasures, this continues to be a field with big challenges to address. The most important detection approaches and countermeasures that have been proposed are usually oriented to address some specific type of botnet threat or fight botnets in particular scenarios or conditions. This paper proposes a generic and systematic model to describe the network dynamics whenever...

  18. Information security policies: a content analysis

    Lopes, Isabel Maria; Sá-Soares, Filipe de
    Among information security controls, the literature gives a central role to information security policies. However, there is a reduced number of empirical studies about the features and components of information security policies. This research aims to contribute to fill this gap. It presents a synthesis of the literature on information security policies content and it characterizes 25 City Councils information security policy documents in terms of features and components. The content analysis research technique was employed to characterize the information security policies. The profile of the policies is presented and discussed and propositions for future work are suggested.

  19. Learning spaces for knowledge generation

    Oliveira, Nuno; Pereira, Maria João; Gancarski, Alda; Henriques, Pedro
    As the Internet is becoming the main point for information access, Libraries, Museums and similar Institutions are preserving their collections as digital object repositories. In that way, the important information associated with digital objects may be delivered as Internet content over portals equipped with modern interfaces and navigation features. This enables the virtualization of real information exhibition spaces rising new learning paradigms. Geny is a project aiming at defining domain-specific languages and developing tools to generate web-based learning spaces from existent digital object repositories and associated semantic. The motto for Geny is “Generating learning spaces to generate knowledge”. Our objective within...

  20. Probabilistic synSet based concept location

    Carvalho, Nuno; Almeida, José João; Pereira, Maria João; Henriques, Pedro
    Concept location is a common task in program comprehension techniques, essential in many approaches used for software care and software evolution. An important goal of this process is to discover a mapping between source code and human oriented concepts. Although programs are written in a strict and formal language, natural language terms and sentences like identifiers (variables or functions names), constant strings or comments, can still be found embedded in programs. Using terminology concepts and natural language processing techniques these terms can be exploited to discover clues about which real world concepts source code is addressing. This work extends symbol tables build by compilers...

Aviso de cookies: Usamos cookies propias y de terceros para mejorar nuestros servicios, para análisis estadístico y para mostrarle publicidad. Si continua navegando consideramos que acepta su uso en los términos establecidos en la Política de cookies.