Paulo Alencar

Affiliations: 
Computer Science University of Waterloo, Waterloo, ON, Canada 
Google:
"Paulo Alencar"
Mean distance: (not calculated yet)
 
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Velmovitsky PE, Lotto M, Alencar P, et al. (2023) Can heart rate variability data from the Apple Watch electrocardiogram quantify stress? Frontiers in Public Health. 11: 1178491
Velmovitsky PE, Alencar P, Leatherdale ST, et al. (2022) Using apple watch ECG data for heart rate variability monitoring and stress prediction: A pilot study. Frontiers in Digital Health. 4: 1058826
Peng P, Portugal I, Alencar P, et al. (2021) A face recognition software framework based on principal component analysis. Plos One. 16: e0254965
Velmovitsky PE, Bevilacqua T, Alencar P, et al. (2021) Convergence of Precision Medicine and Public Health Into Precision Public Health: Toward a Big Data Perspective. Frontiers in Public Health. 9: 561873
Melo G, Oliveira T, Alencar P, et al. (2020) Knowledge reuse in software projects: Retrieving software development Q&A posts based on project task similarity. Plos One. 15: e0243852
Portugal I, Alencar P, Cowan D. (2020) A Framework for Spatial-Temporal Trajectory Cluster Analysis Based on Dynamic Relationships Ieee Access. 8: 169775-169793
Telemaco U, Oliveira T, Alencar P, et al. (2020) A Catalogue of Agile Smells for Agility Assessment Ieee Access. 8: 79239-79259
Portugal I, Alencar P, Cowan D. (2018) The use of machine learning algorithms in recommender systems: A systematic review Expert Systems With Applications. 97: 205-227
Lucas EM, Oliveira TC, Farias K, et al. (2017) CollabRDL: A language to coordinate collaborative reuse Journal of Systems and Software. 131: 505-527
Karimi VR, Alencar PSC, Cowan DD. (2016) A formal modeling and analysis approach for access control rules, policies, and their combinations International Journal of Information Security. 1-32
See more...