Profile

Cover photo
Jácome Cunha
120 followers|359,244 views
AboutPostsPhotosVideos

Stream

Jácome Cunha

Shared publicly  - 
 
 
Concurso aberto para Bolseiro de Investigação.
 ·  Translate
Referência: BI1-2015_INGrid_UMINHO. Área científica genérica: Computer science. Área científica específica: Informatics. Resumo do anúncio: Encontra-se aberto concurso para a atribuição de uma Bolsa de Investigação no âmbito do projeto INGrid “Ubiquidade em Sistemas Multisite Nation Wide e ...
View original post
1
Add a comment...

Jácome Cunha

Shared publicly  - 
 
  O programa de Media Digitais UT Austin – Portugal convida professores e alunos que investigam em temas relacionados com a saúde para participar num simpósio de investigação no dia 6 de fevereiro na FCT/UNL.
1
Add a comment...

Jácome Cunha

Shared publicly  - 
 
#GTTSE is coming!!!
SCOPE. Historically, in the first four editions of GTTSE, the school series focused on generative and transformational techniques in software engineering, as evident from the original acronym (GTTSE - Generative and Transformational Techniques in Software Engineering).
4
Add a comment...

Jácome Cunha

Shared publicly  - 
 
A colaboração entre investigadores do DI / NOVA-LINCS e a equipa R&D da OutSystems começou em 2009 e foi recentemente renovada. Durante este período foram produzidos resultados importantes que vão desde protótipos a documentos científicos e que influenciaram a evolução da plataforma da Outsystems de diversas formas.
1
Add a comment...

Jácome Cunha

Shared publicly  - 
 
 
-- NUNO MACEDO INVESTIGATES BIDIRECTIONAL TRANSFORMATIONS AS A WAY TO IMPROVE THE CREATION OF MODEL- DRIVEN SOFTWARE --

Nuno Macedo, the latest HASLab Doctorate, discovers, in his PhD thesis, the best way to develop bidirectional transformations and, therefore, improve the creation of model-driven software.

Software development depends, in a large scale, on the creation and manipulation of models that enable software engineers to focus on different components. As the investigations on this field move forward, it is possible that these models are independently modified, maintaining consistency in the system in question.

Thus, instead of proceeding to unilateral transformations between the models, bidirectional transformations are used and allow the definition of transformations through a single specification.

It is important to point out that there are several ways to restore the consistency of the environment, however, according to Nuno Macedo, bidirectional transformations must be correct and predictable to be effective. Correct, because they should consider the restrictions that may have been imposed on each individual model. Predictable, because they should change as minimum as possible on each model.

The results obtained in this investigation contribute to the progress of the development practices of the model- driven software, promoting thereby, the improvement of the quality of the final product that reaches the consumer.

The PhD thesis "The relational approach to bidirectional transformations" was defended on October 29th at the University of Minho.
View original post
1
Add a comment...

Jácome Cunha

Shared publicly  - 
 
Parabéns a André Pontes, André Rijo, Maria Sales, Nuno Martins e  Raquel Macedo, alunos do Mestrado Integrado em Engenharia Informática, que conseguiram mais de metade das bolsas de mérito atribuídas pela FCT-NOVA e que premeiam os melhores alunos do ano letivo de 2013/14.
1
Add a comment...
 
 
--- HASLAB DISCOVERS A TECHNIQUE THAT AMPLIFIES THE RESISTANCE OF CRITICAL COMPONENTS TO THE COMPUTER SYSTEM'S SECURITY -

The article "The Related-Key Analysis of Feistel Constructions", of Manuel Barbosa, HASLab researcher and Pooya Farshim presents a change in the building technique of “block ciphers", able to increase the efficiency of construction and simultaneously its resistance to intrusive attacks.

The security of computer systems depends, generally, on the implementation of cryptographic algorithms. This principle applies regardless the size and complexity of the system, in other words, it can be applied to a simple locking system of an automobile door, or to an application of management organization.

From the relevant cryptographic components, the most used is the "Block Cipher". Thus, these ciphers are often implemented directly in the hardware through extremely efficient dedicated circuits. However, with the spread of these implementations, there have also been attacks that intend to pervert its security and recover cryptographic keys that reside in them.

In this publication it is shown that a construction of "block cipher", widely known and used, has, until now, an unknown property: reusing parts of the key. This is often used to increase the efficiency of the construction and increase the resistance to such attacks. These results allow to obtain implementations more efficient and more robust than the existing cryptographic systems.
View original post
1
Add a comment...
Have him in circles
120 people
Filipe Campos's profile photo
Jurgen Vinju's profile photo
Daniel Marujo's profile photo
Dave Clarke's profile photo
Simao Cunha's profile photo
J.C. Silva's profile photo
Jorge Sousa Pinto's profile photo
Miguel Carvalho's profile photo
Ricardo Santos's profile photo

Jácome Cunha

Shared publicly  - 
 
 
Title: FORMAL MODELLING, SAFETY ANALYSIS AND MEDICAL DEVICES

Speaker: Michael Harrison (Newcastle University & Queen Mary University of London)

Abstract: The talk describes aspects of two current research projects, part of CHI+MED a UK funded initiative focusing on the safety and usability of medical devices. The first project uses the IVY tool (developed at Braga) in an ongoing risk analysis of a paediatric dialysis machine, currently making the transition from research project at Newcastle Royal Victoria Infirmary to marketable product. Issues for focus include the nature of the model, the properties relevant to arguing that appropriate control measures are in place, and the nature of the conversation between the medical physicists, who developed the device, and the modeller.

The second project explores the role of IVY patterns in proving properties of an IV infusion pump using theorem proving techniques. This part of the talk will (if there is time) discuss the role of the patterns as heuristics driving the analysis of the interactive behaviour of the device, demonstrating that user related safety requirements are satisfied.
View original post
1
Add a comment...

Jácome Cunha

Shared publicly  - 
 
Dos 70 alunos que participaram no processo de Recrutamento & Seleção do Programa Novabase Academy 2014, foram contratados 18 alunos da Faculdade de Ciências e Tecnologia da Universidade Nova de Lisboa, dos quais 7 foram alunos do MIEI. A Novabase contratou em 2014 mais de 100 recém-diplomados para integrar vários projetos. ()
1
Add a comment...

Jácome Cunha

Shared publicly  - 
 
A FCT UNL tomou de novo lugar este ano no PODIUM da MIUP (Maratona Inter-Universitária de Programação), tendo a equipa do DI “Caparica Exceptions” recebido uma medalha de prata. Parabéns à Ana Garcia e pelo Ricardo Martins, e à sua treinadora, Professora Margarida Mamede, que tem assegurado desde há muito a atividade de coordenação.
1
Add a comment...

Jácome Cunha

Shared publicly  - 
 
NOVA LINCS researchers Luísa Lourenço (PhD student) and Luis Caires (PI) will present a new paper on at POPL’15, which develops a powerful programming language based technique to ensure, at development time, information privacy in complex software systems.
1
Add a comment...
 
 
--- HASLAB DISCOVERS A TECHNIQUE THAT AMPLIFIES THE RESISTANCE OF CRITICAL COMPONENTS TO THE COMPUTER SYSTEM'S SECURITY -

The article "The Related-Key Analysis of Feistel Constructions", of Manuel Barbosa, HASLab researcher and Pooya Farshim presents a change in the building technique of “block ciphers", able to increase the efficiency of construction and simultaneously its resistance to intrusive attacks.

The security of computer systems depends, generally, on the implementation of cryptographic algorithms. This principle applies regardless the size and complexity of the system, in other words, it can be applied to a simple locking system of an automobile door, or to an application of management organization.

From the relevant cryptographic components, the most used is the "Block Cipher". Thus, these ciphers are often implemented directly in the hardware through extremely efficient dedicated circuits. However, with the spread of these implementations, there have also been attacks that intend to pervert its security and recover cryptographic keys that reside in them.

In this publication it is shown that a construction of "block cipher", widely known and used, has, until now, an unknown property: reusing parts of the key. This is often used to increase the efficiency of the construction and increase the resistance to such attacks. These results allow to obtain implementations more efficient and more robust than the existing cryptographic systems.
View original post
1
Add a comment...
People
Have him in circles
120 people
Filipe Campos's profile photo
Jurgen Vinju's profile photo
Daniel Marujo's profile photo
Dave Clarke's profile photo
Simao Cunha's profile photo
J.C. Silva's profile photo
Jorge Sousa Pinto's profile photo
Miguel Carvalho's profile photo
Ricardo Santos's profile photo
Links
Basic Information
Gender
Male