Many companies have embraced the benefits of cloud computing because of its pay-per-use cost model and the elasticity of resources that it provides. But from a data confidentiality and integrity viewpoint, moving a company’s IT systems to a public cloud poses some challenges. System protection is often based on perimeter security, but in the cloud, the company’s systems run on the cloud provider’s hardware and ...
Recent developments in computer architecture progress towards systems with large core count, which expose more parallelism to applications, creating a hierarchical setup at the node and cluster levels. To take advantage of all this parallelism, applications must carefully exploit the different levels of the system which, if ignored, may yield surprising results. This aggravates the already difficult task of par...
GNU Prolog is a general-purpose implementation of the Prolog language, which distinguishes itself from most other systems by being, above all else, a native-code compiler which produces stand-alone executables which do not rely on any bytecode emulator or meta-interpreter. Other aspects which stand out include the explicit organization of the Prolog system as a multipass compiler, where intermediate representat...
The Costas Array Problem is a highly combina- torial problem linked to radar applications. We present in this paper its detailed modeling and solving by Adaptive Search, a constraint-based local search method. Experiments have been done on both sequential and parallel hardware up to several hundreds of cores. Performance evaluation of the sequential version shows results outperforming previous implementations, ...
The main topic of this paper is to find ways to improve learning in a formal Higher Education Area. In this environment, the teacher publishes or suggests contents that support learners in a given course, as supplement of classroom training. Generally, these materials are pre-stored and not changeable. These contents are typically published in learning management systems (the Moodle platform emerges as one of t...
TheCostasArrayProblemisahighlycombinatorialproblem linked to radar applications. We present in this paper its detailed mod- eling and solving by Adaptive Search, a constraint-based local search method. Experiments have been done on both sequential and parallel hardware up to several hundreds of cores. Performance evaluation of the sequential version shows results outperforming previous implemen- tations, while ...
Este artigo tem por objetivo apresentar um Modelo para Recomendação Personalizada de conteúdos de aprendizagem, baseado numa estratégia de recomendação híbrida e no perfil de cada aluno. Incluímos uma proposta para a similaridade entre alunos que reflete os seus interesses em termos das avaliações pretendidas e da proximidade das sequências de atividades de aprendizagem dos diversos alunos. Este modelo prevê, i...
Este artigo tem por objetivo apresentar um Modelo para Recomendação Personalizada de conteúdos de aprendizagem, baseado numa estratégia de recomendação híbrida e no perfil de cada aluno. Incluímos uma proposta para a similaridade entre alunos que reflete os seus interesses em termos das avaliações pretendidas e da proximidade das sequências de atividades de aprendizagem dos diversos alunos. Este modelo prevê, i...
This volume contains a selection of papers, revised and extended, which were presented at the 18th International Conference on Applications of Declarative Programming and Knowledge Management, INAP 2009, which was held in Évora, Portugal, from November 3rd to 5th, 2009.
GNU Prolog is a general-purpose implementation of the Prolog language, which distinguishes itself from most other systems by being, above all else, a native-code compiler which produces stand-alone executables which do not rely on any bytecode emulator or meta-interpreter. Other aspects which stand out include the explicit organization of the Prolog system as a multipass compiler, where intermediate representat...
Financiadores do RCAAP | |||||||
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |