Non INESC TEC publications - Book Chapters

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 5 of 15
  • Item
    Integrating Computer Vision, Robotics, and Artificial Intelligence for Healthcare
    ( 2022) Costa,T ; Coelho,L ; Manuel Santos Silva ; 5655
    Technological evolution has allowed that tasks, usually performed by humans, can now be performed accurately by automated systems, often with superior performance. The healthcare area has been paradigmatic in the automation of processes, as the need to optimize costs, ensuring the provision of quality care, is crucial for the success of organizations. Diabetes, whose prevalence has increased significantly in the last decade, could be a case of application of several technologies that facilitate diagnosis, tracking and monitoring. Such tasks demand a great effort from health systems, requiring the allocation of material, human and financial resources, under penalty of worsening symptoms and emergence of serious complications. In this chapter the authors will present and explore how different technologies can be integrated to provide better healthcare, ensuring quality and safety standards, with reference to the case of diabetes.
  • Item
    The Singing Bridge: Sonification of a Stress-Ribbon Footbridge
    ( 2023) Torresan,C ; Gilberto Bernardes Almeida ; Caetano,E ; Restivo,T ; 6231
  • Item
    Desiring Machines and Affective Virtual Environments
    ( 2023) Forero,J ; Gilberto Bernardes Almeida ; Mendes,M ; 6231
  • Item
    On the feasibility of byzantine agreement to secure fog/edge data management
    ( 2021) Houssam Ahmad Yactin ; Shoker,A ; 6717
    Fog/Edge computing improves the latency and security of data by keeping storage and computation close to the data source. Nevertheless, this raises other security challenges against malicious, a.k.a, Byzantine, attacks that can exploit the isolation of nodes, or when access to distributed data is required in untrusted environments. In this work, we study the feasibility of deploying Byzantine Agreement protocols to improve the security of fog/edge systems in untrusted environments. In particular, we explore existing Byzantine Agreement protocols, heavily developed in the Blockchain area, emphasizing the Consistency, Availability, and Partition-Tolerance tradeoffs in a geo-replicated system. Our work identifies and discusses three different approaches that follow the Strong Consistency, Eventual Consistency, and Strong Eventual Consistency models. Our conclusions show that Byzantine Agreement protocols are still immature to be used by fog/edge computing in untrusted environment due to their high finality latency; however, they are promising candidates that encourage further research in this direction. © 2021, Springer Nature Switzerland AG.
  • Item
    Cyst Detection in OCT Images for Pathology Characterization
    ( 2014) González,A ; Beatriz Remeseiro López ; Ortega,M ; Penedo,M ; Charlón,P