TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
A | |
ACID | |
Adaptação Dinâmica | |
Adaptação Guiada por Políticas | |
ambientes pervasivos | |
analysis | |
Android | |
análise estática de código | |
Aplicação móvel | |
aplicações web | |
Approximate Duplicate Elimination | |
ArduPilot | |
ARM TrustZone | |
Armazenamento distribuído | |
arx tool | |
Assisted-drones | |
ATMS | |
automated drones | |
Automatic testing | |
B | |
Bases de dados | |
Belenios | |
bicicletas | |
Biomedical word sense disambiguation | |
blacklists | |
BlockChain | |
Bluetooth | |
BPMN | |
Business process testing | |
C | |
CAN | |
Captura de dados | |
CBWFQ | |
cegos | |
Cidades Inteligentes | |
clinical data anonymization | |
cloud computing | |
Code Complexity Metrics | |
Computação Autonómica | |
Computação distribuída | |
Computação em "Clouds" móveis na periferia | |
Computação na Nuvem | |
Computer Assisted Language Learning | |
Comutação de Protocolos | |
Consistência eventual | |
Contracts | |
Controller Area Network | |
Controller Area Networks | |
crowdsoursing | |
Cryptography | |
D | |
dados clínicos | |
Data annotation | |
Data Cleaning | |
Data flow analysis | |
Data gathering | |
data mining | |
database knowledge discovery | |
Database system | |
Decision Support System | |
Decision-Aiding Process | |
Decomposição de processos de negócio | |
Dependability and adaptability | |
dependências circulares | |
Design-based research | |
deteção de ameaças | |
DiffServ | |
Dispositivos móveis | |
Distributed cache | |
Distributed mechanism | |
distributed systems | |
Driver Assistance Systems | |
driver's behavior | |
drones as a service | |
E | |
eBook | |
eIDAS | |
Electronic Voting | |
Emergency scenarios | |
Energy-Efficiency | |
eSaúde | |
Especificação | |
estacionamento inteligente | |
F | |
failure-consistency | |
Fault Injection | |
Fault Tolerance | |
Fault-Tolerance | |
FIFO | |
Flexible time-triggered | |
floating car data | |
flush | |
Fog computing | |
Fork-Join | |
Form Validation | |
G | |
Gamificação | |
Geographical deployment | |
Gestão de Identidade | |
Gestão de Recursos | |
GPGPU | |
GPS | |
H | |
histórico | |
Hybrid Control Plane | |
hybrid voting protocol | |
I | |
IDM | |
idosos | |
Information Management System | |
Integração de dados | |
Internet of Things | |
internet voting | |
Invariants | |
IoT | |
Irregular Programs | |
K | |
Knowledge-based approaches | |
L | |
LDAP | |
M | |
machine learning | |
Middleware | |
migração | |
Mobile communication | |
mobile development | |
Mobile distributed applications | |
Monitoring systems | |
Monitorização | |
Multi-Criteria Decision Aiding | |
N | |
Nagios | |
named entity recognition | |
named-entity recognition | |
natural language processing | |
navigation | |
Networks and Multimedia | |
NFC | |
Non-intrusive system observability | |
NoSQL | |
NTRIP | |
NVM | |
O | |
Offline access control | |
Ontologies | |
open-source intelligence | |
OpenRefine | |
order | |
Origin-Destination matrix | |
OSINT | |
OTT | |
Outdoor learning | |
OutSystems | |
P | |
paper voting | |
Pathogenicity Prediction | |
Pentaho Data Integration | |
pervasive computing | |
Plant Phenotyping | |
Portal de Utilizador | |
positioning systems | |
posture control | |
privacy models | |
Processamento de Fluxos | |
Processamento Incremental de Grafos | |
Processos de negócio dependentes da IoT | |
Production | |
Program Slicing | |
programming framework | |
Protocolos de disseminação epidémicos | |
Proxy cache | |
Psychophysiology assessment | |
public transport | |
Publicador/subscritor | |
Q | |
QoS | |
Quadcopter | |
qualified digital signatures | |
R | |
Real-time and embedded system | |
Real-time and embedded systems | |
Real-time communications | |
Real-time reliable communications | |
real-time systems | |
Realidade aumentada | |
Record Linkage | |
recuperação | |
Redes de Sensores sem Fios | |
Redes sem fios | |
redo | |
Refactoring | |
Reliability | |
Reliability and safety | |
remote digital signatures | |
remote drone control | |
Replicação não uniforme | |
Replicação parcial | |
Research lab | |
Resilience | |
REST API | |
road traffic | |
Role-based access control | |
RTK | |
Rumor | |
S | |
scheduling | |
SDI | |
Security | |
security information event management | |
security metrics | |
Segurança | |
segurança de software | |
Segurança no estacionamento | |
Self-Healing | |
Sensor Fusion | |
sensor network | |
Sensors communication | |
serious games | |
server | |
SI | |
Single Nucleotide Variants | |
Single Page Applications | |
Sistema de Monitorização | |
Sistema de tipos | |
Sistemas adaptativos | |
sistemas de localização em tempo real | |
Sistemas entre-pares | |
SMT | |
software architecture | |
Software Construction techniques | |
Software Defined Networking | |
Software testing | |
Specific Phobia | |
Spider Phobia | |
T | |
Task automation | |
temporal redundancy | |
Testes | |
text mining | |
Threat Inteligence | |
threat intelligence | |
time-triggered | |
Tipos de dados replicados | |
Tolerância a Faltas Bizantina | |
Tolerância a Faltas Bizantinas | |
transação | |
Trust and Reputation | |
Trusted Computing | |
U | |
undo | |
Universidade de Lisboa | |
V | |
VANET | |
vehicle tracker | |
Vehicular Networks | |
vineyards | |
Virtal Machine Introspection | |
virtual fence | |
Virtual Reality | |
Virtualization | |
vulnerabilidades | |
W | |
WAVE | |
Web Application | |
weed control | |
WFQ | |
Wi-Fi | |
wisdom of the crowd | |
Word embeddings | |
Work-stealing |