Alan Godoy

Alan Godoy
QuintoAndar

PhD candidate in Computer Eng.

About

25
Publications
9,771
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
266
Citations
Additional affiliations
July 2014 - present
CPQD
Position
  • Researcher
March 2010 - August 2016
University of Campinas
Position
  • Research Assistant

Publications

Publications (25)
Conference Paper
Full-text available
In this work we analyzed the role social networks play in the efficiency of collective problem-solving, evaluating whether the topological characteristics seen in real-world networks yield any performance improvement in such processes. To study this we used the Particle Swarm Optimization as a testbed for social groups performing a collective task,...
Article
Full-text available
How can systems in which individuals’ inner workings are very similar to each other, as neural networks or ant colonies, produce so many qualitatively different behaviors, giving rise to roles and specialization? In this work, we bring new perspectives to this question by focusing on the underlying network that defines how individuals in these syst...
Conference Paper
Full-text available
This paper proposes a new variant of the PSO algorithm named complex neighborhood particle swarm optimizer (CNPSO) for solving global optimization problems. In the CNPSO, the neighborhood of the particles is organized through a complex network which is modified during the search process. This evolution of the topology seeks to improve the influence...
Article
Full-text available
The emergence and popularization of online social networks suddenly made available a large amount of data from social organization, interaction and human behaviour. All this information opens new perspectives and challenges to the study of social systems, being of interest to many fields. Although most online social networks are recent (less than f...
Preprint
Full-text available
In this paper, we show how a Portuguese BERT model can be combined with structured data in order to deploy a chatbot based on a finite state machine to create a conversational AI system that helps a real-estate company to predict its client's contact motivation. The model achieves human level results in a dataset that contains 235 unbalanced labels...
Conference Paper
In this paper, we show how a Portuguese BERT model can be combined with structured data in order to deploy a chatbot based on a finite state machine to create a conversational AI system that helps a real-estate company to predict its client's contact motivation. The model achieves human level results in a dataset that containts 235 unbalanced label...
Preprint
Full-text available
Despite recent advances in architectures for mobile devices, deep learning computational requirements remains prohibitive for most embedded devices. To address that issue, we envision sharing the computational costs of inference between local devices and the cloud, taking advantage of the compression performed by the first layers of the networks to...
Conference Paper
In order to capture the effects of social ties in knowledge diffusion, this paper examines the publication network that emerges from the collaboration of researchers, using citation information as means to estimate knowledge flow. For this purpose, we analyzed the papers published in the PLOS ONE journal finding strong evidence to support that the...
Preprint
Full-text available
Millions of visually impaired people depend on relatives and friends to perform their everyday tasks. One relevant step towards self-sufficiency is to provide them with means to verify the value and operation presented in payment machines. In this work, we developed and released a smartphone application, named Pay Voice, that uses image processing,...
Conference Paper
Full-text available
In recent years, software-based face presentation attack detection (PAD) methods have seen a great progress. However, most existing schemes are not able to generalize well in more realistic conditions. The objective of this competition is to evaluate and compare the generalization performances of mobile face PAD techniques under some real-world var...
Book
This book focuses on the next generation optical networks as well as mobile communication technologies. The reader will find chapters on Cognitive Optical Network, 5G Cognitive Wireless, LTE, Data Analysis and Natural Language Processing. It also presents a comprehensive view of the enhancements and requirements foreseen for Machine Type Communicat...
Conference Paper
Full-text available
We investigate the use of machine learning algorithms to classify the topic of messages published in Online Social Networks using as input solely user interaction data, instead of the actual message content. During a period of six months, we monitored and gathered data from users interacting with news messages on Twitter, creating thousands of info...
Article
Full-text available
Cross-domain biometrics has been emerging as a new necessity, which poses several additional challenges, including harsh illumination changes, noise, pose variation, among others. In this paper, we explore approaches to cross-domain face verification, comparing self-portrait photographs ("selfies") to ID documents. We approach the problem with prop...
Article
Full-text available
In order to capture the effects of social ties in knowledge diffusion, this paper examines the publication network that emerges from the collaboration of researchers, using citation information as means to estimate knowledge flow. For this purpose, we analyzed the papers published in the PLOS ONE journal finding strong evidence to support that the...
Conference Paper
Full-text available
This paper provides an overview of the Speaker Anti-spoofing Competition organized by Biometric group at Idiap Research Institute for the IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2016). The competition used AVspoof database, which contains a comprehensive set of presentation attacks, including, (i) direct...
Article
Full-text available
It is well known that speaker verification systems are subject to spoofing attacks. The Automatic Speaker Verification Spoofing and Countermeasures Challenge -- ASVSpoof2015 -- provides a standard spoofing database, containing attacks based on synthetic speech, along with a protocol for experiments. This paper describes CPqD's systems submitted to...
Conference Paper
Full-text available
Complex network is a recent research subject which is related to multiple application domains, like computer, social, and biological systems, providing conceptual and numerical tools to examine the network components and their relationships. Currently, there are several models and techniques which help to understand such systems. The assortative mi...
Conference Paper
Full-text available
Graduate school is the locus par excellence for didactic and pedagogical training of future university professor. However, this aspect has received little attention in masters and doctoral programs in Brazil. In this work we evaluate how engaging with a teaching internship program impacts on the confidence level of graduate students in Electrical E...
Conference Paper
Full-text available
High-dimensional optimization problems may be addressed using populational meta-heuristics, whose statistical proper-ties may indicate important characteristics of the optimiza-tion process. There is a great number of these properties, which means their joint visualization may become impracti-cal. We developed a method for sonically displaying char...
Conference Paper
Full-text available
This paper proposes a new variant of the PSO algorithm named Complex Neighborhood Particle Swarm Optimizer (CNPSO) for solving global optimization problems. In the CNPSO, the neighborhood of the particles is organized through a complex network which is modified during the search process. This evolution of the topology seeks to improve the influence...

Network

Cited By