Correia, Natacha, Virgílio C. Machado, and Isabel L. Nunes Case Study “Estratégia de Aplicação de Ferramentas de Apoio à Gestão do Desempenho Humano em Ambientes Lean” [Case Study “Strategy for the Application of Tools for Supporting Human Performance Management in Lean Environments”]. Eds. P. Arezes, J. S. Baptista, M. P. Barroso, P. Carneiro, P. Cordeiro, N. Costa, R. Melo, A. S. Miguel, and G. P. Perestrelo. Occupational Safety and Hygiene (SHO10). Guimarães - Portugal: SPOSHO, 2010.
Abstractn/a
Pinto, R. M., A. A. Dias, M. L. Costa, and J. P. Santos. "
Computational study on the ionization energies of benzyl azide and its methyl derivatives."
Journal of Molecular Structure: THEOCHEM. 948 (2010): 15-20.
AbstractIonization energies of benzyl azide (BA), C6H5CH2N3, its methyl derivatives, 2-, 3- and 4-methyl benzyl azide and (1-azidoethyl)benzene (2-, 3- and 4-MBA and 1-AEB), (CH3)C6H4CH2 N3, have been calculated with several basis sets, with M¯ller-Plesset and Hartree-Fock methods. The data are compared to the ionizations energies obtained from HeI photoelectron spectroscopy (UVPES) experiments, in order to support the correct assignment of the bands. The nature and character of the molecular orbitals are also discussed.
Teixeira, Bruno, João Louren{\c c}o, Eitan Farchi, Ricardo Dias, and Diogo Sousa. "
Detection of Transactional Memory anomalies using static analysis."
Proceedings of the 8th Workshop on Parallel and Distributed Systems: Testing, Analysis, and Debugging. PADTAD ’10. New York, NY, USA: ACM, 2010. 26-36.
AbstractTransactional Memory allows programmers to reduce the number of synchronization errors introduced in concurrent programs, but does not ensures its complete elimination. This paper proposes a pattern matching based approach to the static detection of atomicity violation, based on a path-sensitive symbolic execution method to model four anomalies that may affect Transactional Memory programs. The proposed technique may be used to to bring to programmer’s attention pairs of transactions that the programmer has mis-specified, and should have been combined into a single transaction. The algorithm first traverses the AST tree, removing all the non-transactional blocks and generating a trace tree in the path sensitive manner for each thread. The trace tree is a Trie like data structure, where each path from root to a leaf is a list of transactions. For each pair of threads, erroneous patterns involving two consecutive transactions are then checked in the trace tree. Results allow to conclude that the proposed technique, although triggering a moderate number of false positives, can be successfully applied to Java programs, correctly identifying the vast majority of the relevant erroneous patterns.