Attention deficit/hyperactivity disorder (ADHD) is a neurodevelopmental disorder that often persists into adulthood, affecting approximately 1.5% - 3% of the adult population in Portugal. Untreated ADHD in adults is associated with increased risks of substance abuse, criminality, poor academic and professional performance. Less than 20% of adults with ADHD are properly diagnosed and treated due to overlapping s...
Explainable Artificial Intelligence (XAI) methods are valuable tools for promoting understanding, trust, and efficient use of Artificial Intelligence (AI) systems in business organizations. However, the question of how organizations should select suitable XAI methods for a given task and business context remains a challenge, particularly when the number of methods available in the literature continues to increa...
A perturbação de hiperatividade e défice de atenção (PHDA) é uma perturbação do neurodesenvolvimento que frequentemente persiste na vida adulta, afetando aproximadamente 1,5% - 3% da população adulta em Portugal. A PHDA não tratada em adultos está ligada a um risco aumentado de abuso de substâncias, criminalidade, baixo desempenho académico e profissional. Menos de 20% dos adultos com PHDA são diagnosticados e ...
Explainable Artificial Intelligence (XAI) methods are valuable tools for promoting understanding, trust, and efficient use of Artificial Intelligence (AI) systems in business organizations. However, the question of how organizations should select suitable XAI methods for a given task and business context remains a challenge, particularly when the number of methods available in the literature continues to increa...
The integration of Vehicle-to-everything (V2X) communication and Intelligent Transportation Systems (ITS) promises to revolutionize smart mobility. However, this technological advancement also exposes V2X networks to cybersecurity threats. To address these challenges, this work explores the critical security requirements for V2X communications, including User Equipment (UE) authorization, data integrity protect...
Requirements elicitation is a core activity of requirements engineering for the product to be developed. The knowledge that has been gained during requirements engineering about the product to be developed forms the basis for requirement elicitation. The agile approach is becoming known day by day as the most widely used innovative process in the domain of requirements engineering. Requirements elicitation in a...
Although remote work was already possible and used in some contexts, the COVID-19 pandemic made it normal and, in some situations, even mandatory. This was the case in Portugal and in particular in its software industry. Given this abrupt change in how we work, it became pressing to investigate the impacts of this profound change to remote work, so that we can cope with the potential negative consequences (prof...
Software Product Lines enable the development of a perfect family of products by reusing shared assets in a systematic manner. Product derivation is a critical activity in software product line engineering and one of the most pressing issues that a software product line must address. This work introduces an approach for automating the derivation of a product from a software product line. The software product li...
In material requirements planning (MRP) systems, safety stock and safety time are two well-known inventory buffering strategies to protect against supply and demand uncertainties. While the role of safety stocks in coping with uncertainty is well studied, safety time has received only scarce attention in the supply chain management literature. Particularly, most previous operations research models have typicall...
The order in which authors of a scientific paper place their names on the byline follows in many research fields some implicit rules. In most fields, the first author is considered to be the one who contributed most to the intellectual effort described in the paper. Additionally, the last author is normally the most senior researcher and in many situations the contribution to the paper is more indirect. In this...