INFORUM 2017: 9TH INFORUM - INFORMATICS SYMPOSIUM [THE ORGINAL TITLE IS IN PORTUGESE: 9º INFORUM - SIMPóSIO DE INFORMáTICA]
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

A
ACID
Adaptação Dinâmica
Adaptação Guiada por Políticas
ambientes pervasivos
analysis
Android
análise estática de código
Aplicação móvel
aplicações web
Approximate Duplicate Elimination
ArduPilot
ARM TrustZone
Armazenamento distribuído
arx tool
Assisted-drones
ATMS
automated drones
Automatic testing
B
Bases de dados
Belenios
bicicletas
Biomedical word sense disambiguation
blacklists
BlockChain
Bluetooth
BPMN
Business process testing
C
CAN
Captura de dados
CBWFQ
cegos
Cidades Inteligentes
clinical data anonymization
cloud computing
Code Complexity Metrics
Computação Autonómica
Computação distribuída
Computação em "Clouds" móveis na periferia
Computação na Nuvem
Computer Assisted Language Learning
Comutação de Protocolos
Consistência eventual
Contracts
Controller Area Network
Controller Area Networks
crowdsoursing
Cryptography
D
dados clínicos
Data annotation
Data Cleaning
Data flow analysis
Data gathering
data mining
database knowledge discovery
Database system
Decision Support System
Decision-Aiding Process
Decomposição de processos de negócio
Dependability and adaptability
dependências circulares
Design-based research
deteção de ameaças
DiffServ
Dispositivos móveis
Distributed cache
Distributed mechanism
distributed systems
Driver Assistance Systems
driver's behavior
drones as a service
E
eBook
eIDAS
Electronic Voting
Emergency scenarios
Energy-Efficiency
eSaúde
Especificação
estacionamento inteligente
F
failure-consistency
Fault Injection
Fault Tolerance
Fault-Tolerance
FIFO
Flexible time-triggered
floating car data
flush
Fog computing
Fork-Join
Form Validation
G
Gamificação
Geographical deployment
Gestão de Identidade
Gestão de Recursos
GPGPU
GPS
H
histórico
Hybrid Control Plane
hybrid voting protocol
I
IDM
idosos
Information Management System
Integração de dados
Internet of Things
internet voting
Invariants
IoT
Irregular Programs
K
Knowledge-based approaches
L
LDAP
M
machine learning
Middleware
migração
Mobile communication
mobile development
Mobile distributed applications
Monitoring systems
Monitorização
Multi-Criteria Decision Aiding
N
Nagios
named entity recognition
named-entity recognition
natural language processing
navigation
Networks and Multimedia
NFC
Non-intrusive system observability
NoSQL
NTRIP
NVM
O
Offline access control
Ontologies
open-source intelligence
OpenRefine
order
Origin-Destination matrix
OSINT
OTT
Outdoor learning
OutSystems
P
paper voting
Pathogenicity Prediction
Pentaho Data Integration
pervasive computing
Plant Phenotyping
Portal de Utilizador
positioning systems
posture control
privacy models
Processamento de Fluxos
Processamento Incremental de Grafos
Processos de negócio dependentes da IoT
Production
Program Slicing
programming framework
Protocolos de disseminação epidémicos
Proxy cache
Psychophysiology assessment
public transport
Publicador/subscritor
Q
QoS
Quadcopter
qualified digital signatures
R
Real-time and embedded system
Real-time and embedded systems
Real-time communications
Real-time reliable communications
real-time systems
Realidade aumentada
Record Linkage
recuperação
Redes de Sensores sem Fios
Redes sem fios
redo
Refactoring
Reliability
Reliability and safety
remote digital signatures
remote drone control
Replicação não uniforme
Replicação parcial
Research lab
Resilience
REST API
road traffic
Role-based access control
RTK
Rumor
S
scheduling
SDI
Security
security information event management
security metrics
Segurança
segurança de software
Segurança no estacionamento
Self-Healing
Sensor Fusion
sensor network
Sensors communication
serious games
server
SI
Single Nucleotide Variants
Single Page Applications
Sistema de Monitorização
Sistema de tipos
Sistemas adaptativos
sistemas de localização em tempo real
Sistemas entre-pares
SMT
software architecture
Software Construction techniques
Software Defined Networking
Software testing
Specific Phobia
Spider Phobia
T
Task automation
temporal redundancy
Testes
text mining
Threat Inteligence
threat intelligence
time-triggered
Tipos de dados replicados
Tolerância a Faltas Bizantina
Tolerância a Faltas Bizantinas
transação
Trust and Reputation
Trusted Computing
U
undo
Universidade de Lisboa
V
VANET
vehicle tracker
Vehicular Networks
vineyards
Virtal Machine Introspection
virtual fence
Virtual Reality
Virtualization
vulnerabilidades
W
WAVE
Web Application
weed control
WFQ
Wi-Fi
wisdom of the crowd
Word embeddings
Work-stealing