Paulo Alencar
Affiliations: | Computer Science | University of Waterloo, Waterloo, ON, Canada |
Google:
"Paulo Alencar"Mean distance: (not calculated yet)
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Velmovitsky PE, Lotto M, Alencar P, et al. (2023) Can heart rate variability data from the Apple Watch electrocardiogram quantify stress? Frontiers in Public Health. 11: 1178491 |
Velmovitsky PE, Alencar P, Leatherdale ST, et al. (2022) Using apple watch ECG data for heart rate variability monitoring and stress prediction: A pilot study. Frontiers in Digital Health. 4: 1058826 |
Peng P, Portugal I, Alencar P, et al. (2021) A face recognition software framework based on principal component analysis. Plos One. 16: e0254965 |
Velmovitsky PE, Bevilacqua T, Alencar P, et al. (2021) Convergence of Precision Medicine and Public Health Into Precision Public Health: Toward a Big Data Perspective. Frontiers in Public Health. 9: 561873 |
Melo G, Oliveira T, Alencar P, et al. (2020) Knowledge reuse in software projects: Retrieving software development Q&A posts based on project task similarity. Plos One. 15: e0243852 |
Portugal I, Alencar P, Cowan D. (2020) A Framework for Spatial-Temporal Trajectory Cluster Analysis Based on Dynamic Relationships Ieee Access. 8: 169775-169793 |
Telemaco U, Oliveira T, Alencar P, et al. (2020) A Catalogue of Agile Smells for Agility Assessment Ieee Access. 8: 79239-79259 |
Portugal I, Alencar P, Cowan D. (2018) The use of machine learning algorithms in recommender systems: A systematic review Expert Systems With Applications. 97: 205-227 |
Lucas EM, Oliveira TC, Farias K, et al. (2017) CollabRDL: A language to coordinate collaborative reuse Journal of Systems and Software. 131: 505-527 |
Karimi VR, Alencar PSC, Cowan DD. (2016) A formal modeling and analysis approach for access control rules, policies, and their combinations International Journal of Information Security. 1-32 |