Skip to main content

Showing 1–11 of 11 results for author: Batista, A

Searching in archive cs. Search in all archives.
.
  1. AsQM: Audio streaming Quality Metric based on Network Impairments and User Preferences

    Authors: Marcelo Rodrigo dos Santos, Andreza Patrícia Batista, Renata Lopes Rosa, Muhammad Saadi, Dick Carrillo Melgarejo, Demóstenes Zegarra Rodríguez

    Abstract: There are many users of audio streaming services because of the proliferation of cloud-based audio streaming services for different content. The complex networks that support these services do not always guarantee an acceptable quality on the end-user side. In this paper, the impact of temporal interruptions on the reproduction of audio streaming and the users preference in relation to audio conte… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

    Comments: 11 pages

    Journal ref: IEEE Transactions on Consumer Electronics, vol. 69, no. 3, pp. 408-420, Aug. 2023

  2. arXiv:2306.03602  [pdf, other

    cs.SE cs.AI

    TestLab: An Intelligent Automated Software Testing Framework

    Authors: Tiago Dias, Arthur Batista, Eva Maia, Isabel Praça

    Abstract: The prevalence of software systems has become an integral part of modern-day living. Software usage has increased significantly, leading to its growth in both size and complexity. Consequently, software development is becoming a more time-consuming process. In an attempt to accelerate the development cycle, the testing phase is often neglected, leading to the deployment of flawed systems that can… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: 10 pages, 5 figures, 1 table, accepted for DCAI2023

  3. arXiv:2304.02768  [pdf, other

    cs.CL cs.AI cs.LG

    Application of Transformers based methods in Electronic Medical Records: A Systematic Literature Review

    Authors: Vitor Alcantara Batista, Alexandre Gonçalves Evsukoff

    Abstract: The combined growth of available data and their unstructured nature has received increased interest in natural language processing (NLP) techniques to make value of these data assets since this format is not suitable for statistical analysis. This work presents a systematic literature review of state-of-the-art advances using transformer-based methods on electronic medical records (EMRs) in differ… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

  4. arXiv:2111.02185  [pdf, ps, other

    physics.comp-ph cs.CE eess.SP

    EISPY2D: An Open-Source Python Library for the Development and Comparison of Algorithms in Two-Dimensional Electromagnetic Inverse Scattering Problems

    Authors: André Costa Batista, Ricardo Adriano, Lucas S. Batista

    Abstract: Microwave Imaging is an essential technique for reconstructing the electrical properties of an inaccessible medium. Many approaches have been proposed employing algorithms to solve the Electromagnetic Inverse Scattering Problem associated with this technique. In addition to the algorithm, one needs to implement adequate structures to represent the problem domain, the input data, the results of the… ▽ More

    Submitted 12 January, 2022; v1 submitted 3 November, 2021; originally announced November 2021.

    Comments: 30 pages, 10 figures. Submitted to IOP Inverse Problems on January 2022

  5. arXiv:2107.10395  [pdf, other

    cs.SI cs.NI

    An Access Control for IoT Based on Network Community Perception and Social Trust Against Sybil Attacks

    Authors: Gustavo Oliveira, Agnaldo de Souza Batista, Michele Nogueira, Aldri Santos

    Abstract: The evolution of the Internet of Things (IoT) has increased the connection of personal devices, mainly taking into account the habits and behavior of their owners. These environments demand access control mechanisms to protect them against intruders, like Sybil attacks. that can compromise data privacy or disrupt the network operation. The Social IoT paradigm enables access control systems to aggr… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: This work has been submitted to the International Journal of Network Management (IJNM) and accepted for publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  6. arXiv:2105.05983  [pdf, other

    cs.LG cs.AI cs.RO

    An Open-Source Tool for Classification Models in Resource-Constrained Hardware

    Authors: Lucas Tsutsui da Silva, Vinicius M. A. Souza, Gustavo E. A. P. A. Batista

    Abstract: Applications that need to sense, measure, and gather real-time information from the environment frequently face three main restrictions: power consumption, cost, and lack of infrastructure. Most of the challenges imposed by these limitations can be better addressed by embedding Machine Learning (ML) classifiers in the hardware that senses the environment, creating smart sensors able to interpret t… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

    MSC Class: 68T99 ACM Class: I.2.9

  7. arXiv:2010.09134  [pdf, other

    cs.NI

    GROWN: Local Data Compression in Real-Time To Support Energy Efficiency in WBAN

    Authors: Cainã Passos, Carlos Pedroso, Agnaldo Batista, Michele Nogueira, Aldri Santos

    Abstract: The evolution of wireless technologies has enabled the creation of networks for several purposes as health care monitoring. The Wireless Body Area Networks (WBANs) enable continuous and real-time monitoring of physiological signals, but that monitoring leads to an excessive data transmission usage, and drastically affects the power consumption of the devices. Although there are approaches for redu… ▽ More

    Submitted 18 October, 2020; originally announced October 2020.

    Comments: This work has been accepted for presentation at IEEE LATINCOM 2020. 978-1-7281-8903-1/20/\$31.00 Copyright 2020 IEEE

  8. arXiv:2005.07296  [pdf, other

    cs.CY cs.NI cs.SI

    E-Health Sensitive Data Dissemination Exploiting Trust and Mobility of Users

    Authors: Agnaldo Batista, Michele Nogueira, Aldri Santos

    Abstract: E-health services handle a massive amount of sensitive data, requiring reliability and privacy. The advent of new technologies drives e-health services into their continuous provision outside traditional care institutions. This creates uncertain and unreliable conditions, resulting in the challenge of controlling sensitive user data dissemination. Then, there is a gap in sensitive data disseminati… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  9. Challenges in Benchmarking Stream Learning Algorithms with Real-world Data

    Authors: Vinicius M. A. Souza, Denis M. dos Reis, Andre G. Maletzke, Gustavo E. A. P. A. Batista

    Abstract: Streaming data are increasingly present in real-world applications such as sensor measurements, satellite data feed, stock market, and financial data. The main characteristics of these applications are the online arrival of data observations at high speed and the susceptibility to changes in the data distributions due to the dynamic nature of real environments. The data stream mining community sti… ▽ More

    Submitted 30 June, 2020; v1 submitted 30 April, 2020; originally announced May 2020.

    Comments: Preprint of article accepted for publication in the journal Data Mining and Knowledge Discovery

    MSC Class: 68T05 ACM Class: I.2.6

  10. arXiv:1812.05440  [pdf, other

    cs.CR

    The dangerous path towards your own cryptography method

    Authors: Warley M. S. Alves, Thiago L. Prado, Antonio M. Batista, Fabiano A. S. Ferrari

    Abstract: Would you like to have your own cryptography method? Experts say you should not do it. If you think you can develop a better cryptography method anyway. We present a brief discussion about some well known cryptography methods and how our model fails against the traditional attacks. We do not want to discourage anybody, we just want to show that, despite of the importance of develo** better crypt… ▽ More

    Submitted 26 September, 2018; originally announced December 2018.

  11. arXiv:1506.05154  [pdf

    cs.MA cs.AI cs.SI

    SNA-based reasoning for multiagent team composition

    Authors: Andre Filipe de Moraes Batista, Maria das Graças Bruno Marietto

    Abstract: The social network analysis (SNA), branch of complex systems can be used in the construction of multiagent systems. This paper proposes a study of how social network analysis can assist in modeling multiagent systems, while addressing similarities and differences between the two theories. We built a prototype of multi-agent systems for resolution of tasks through the formation of teams of agents t… ▽ More

    Submitted 16 June, 2015; originally announced June 2015.

    Comments: 10 pages

    Journal ref: International Journal of Artificial Intelligence & Applications (IJAIA) Vol. 6, No. 3, May 2015