Fabíola Greve

Fabíola Greve
Universidade Federal da Bahia · Departamento de Ciência da Computação

PhD Computer Science

About

88
Publications
19,551
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
500
Citations
Introduction
Dr. Fabíola is currently Full Professor in the Department of Computer Science at the Federal University of Bahia, Brazil, and current Information Tech Advisor to the President of the University. She received a PhD degree in Computer Science from Rennes University, INRIA Labs, France. She's the leader of the distributed computing group Gaudi. Her main interests spam the domains of distributed computing and fault tolerance, blockchain, cloud, fog computing and IoT. She's been serving as principal investigator of some funded research projects in Brazil and as a program committee member of some of the main Internacional conferences in the domain. She was invited as a visiting professor to labs in France: IRISA, INRIA, LIP6-Paris.
Additional affiliations
February 1992 - present
Universidade Federal da Bahia
Position
  • Professor (Associate)
February 1992 - November 2017
Universidade Federal da Bahia
Position
  • CEO

Publications

Publications (88)
Article
Full-text available
Brazil was one of the largest cocoa producers in the world, mainly supported by the South of Bahia region. After the 1980s, the witch-broom disease demolished plantations, and farmers were forced into bankruptcy. The worldwide search for gourmet cocoa has rekindled interest in this production, whose fermentation process is a key step in obtaining f...
Conference Paper
A identidade é fundamental para o reconhecimento das entidades (indivíduos, coisas e organizações) e das suas diversas relações no contexto em que estão inseridas. A gestão de identidades (GId) estabelece procedimentos de autenticação, autorização, responsabilização e auditoria, de forma a preservar a segurança do acesso aos recursos das organizaçõ...
Chapter
Full-text available
The Internet of Things aggregates devices able to capture information and interfere in the environment, acting in systems of different domains of application, such as health-care. These systems need a layer of security to guarantee, among other characteristics, the irrefutability, anonymity, and integrity of the manipulated data. In this sense, an...
Conference Paper
In this paper, we evaluate the benefits of the Lisk SDK version, 5.0.3, over the old version of Lisk SDK 2.3.8 using the Restaurant sidechain solution created as a Proof-Of-Concept of online food requests using Lisk blockchain technology. We evaluated the Restaurant sidechain in aspects of performance, the capacity of receiving transactions in a sh...
Book
This book constitutes the refereed proceedings of the 21st IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, DAIS 2021, held in Valletta, Malta, in June 2021, as part of the 16th International Federated Conference on Distributed Computing Techniques, DisCoTec 2021. The 7 regular papers and 3 short papers pr...
Conference Paper
Full-text available
In recent years, the Named Data Networking (NDN) has been proposed as a promising paradigm to the Future Internet due to its content-centric disruptive characteristic. To ensure the content authenticity, NDN uses a digital signature, which due to its complexity may result in additional overhead. As a result, some NDN implementations are susceptible...
Conference Paper
The Internet of Things (IoT) is playing a great role in the technology scenario due to its high potential and impact on different society segments. Currently, several IoT initiatives have simultaneously developed new architectures, platforms and applications which has resulted in the creation of parallel IoT ecosystems. This makes access to IoT dev...
Chapter
Full-text available
A Internet das Coisas (Internet of Things - IoT) vem desempenhando um importante papel no cenário tecnológico devido ao seu alto potencial e impacto em diferentes segmentos da sociedade. Recentemente, diferentes iniciativas em IoT desenvolveram simultaneamente novas arquiteturas, plataformas e aplicações, o que resultou na criação de diversos ecoss...
Conference Paper
The Internet of Things (IoT) brings a great change to the daily life and well-being of people. Sensors and platforms connected to the Internet transform the routine of users in a transparent and gradual way. This work proposes an intelligent water consumption monitoring system, associated to the construction of a database for analytical studies of...
Conference Paper
The fog computing model integrates cloud services into the network on a widely distributed level to overcome challengers of cloud-based IoT platforms. The deployment of IoT solutions employing a fog architecture requires a decentralized and scalable computing infrastructure, which places networking, compute and storage resources in a hierarchy of l...
Chapter
Full-text available
Blockchain introduces a new on-demand consensus paradigm where the set of P2P network nodes confirm the order in which the transaction blocks are aggregated into the chain of blocks, providing a reliable, secure, scalable, and immutable distributed environment for the transactions' execution on the Internet. The blockchain eliminates the need for a...
Conference Paper
All the data volume generated by modern applications brings opportunities for knowledge extraction and value creation. In this sense, the integration of predictive and prescriptive analytics may help the industry and users to be more productive and successful. It means not only to estimate an outcome but also to act on it in the real world. Nonethe...
Conference Paper
A Internet das Coisas (IoT), aliada a diversas outras tendências, tem proporcionado uma geração massiva de dados. Todo esse volume de dados gera oportunidades para extração de conhecimento e agregação de valor. Nesse contexto, a integração da análise de dados preditiva com a análise prescritiva pode auxiliar usuários e a Indústria a serem mais prod...
Conference Paper
O controle patrimonial dos bens ativos de uma empresa é uma tarefa complexa. Apesar do esforço para aumentar o nível de automação, observa-se que ainda é necessária a presença do ser humano para administrar, alimentar e manter tais sistemas. Este trabalho apresenta um sistema Web, de nome InventoryIoT, que automatiza o controle de bens patrimoniáve...
Article
Full-text available
Quorum systems are useful tools for implementing consistent and available storage in the presence of failures. These systems usually comprise a static set of servers that provide a fault-tolerant read/write register accessed by a set of clients. We consider a dynamic variant of these systems and propose FreeStore, a set of fault-tolerant protocols...
Chapter
Full-text available
Currently, cloud-based solutions have become the predominant approach for the Internet of Things (IoT). However, to meet requirements such as mobility support, location awareness and low latency, current IoT proposals are fomenting a major shift from a centralized model towards a decentralized model. Seen in these terms, Fog Computing is a paradigm...
Article
Consensus is a fundamental building block used to solve many practical problems that appear on reliable distributed systems. In spite of the fact that consensus is being widely studied in the context of standard networks, few studies have been conducted in order to solve it in dynamic and self-organizing systems characterized by unknown networks. W...
Conference Paper
Quorum systems are useful tools for implementing consistent and available storage in the presence of failures, especially in modern distributed systems such as clouds and MANETs. This paper proposes Free Store, a set of fault-tolerant protocols that emulates a register in dynamic asynchronous systems in which processes are able to join/leave the se...
Conference Paper
Many reliable distributed services rely on an eventual leader election to coordinate actions. The eventual leader detector has been proposed as a way to implement such an abstraction. It ensures that, eventually, each process in the system will be provided by an unique leader, elected among the set of correct processes in spite of crashes and uncer...
Conference Paper
The shared memory model matches important classes of modern applications, such as fault-tolerant and highly available data centric services. Consensus is an important building block able to realize such reliable distributed systems. However, there exists no deterministic solution to consensus in asynchronous systems prone to failures. Failure and l...
Conference Paper
The shared memory model matches important classes of systems deployed over dynamic networks, as for example, fault-tolerant and high available data centric services. Consensus is a fundamental building block able to realize such reliable distributed systems. Unlike the classical setting where the full set of participants and their identities are kn...
Conference Paper
Full-text available
The use of distributed object technology in the web information systems development process has been evidenced as a trend, due to the adoption of mechanisms that laverages the construction of reusable, flexible and scalable applications. However, the use of specifications such as J2EE or Corba has implied in a bigger effort of development, justifie...
Article
The distributed computing scenario is rapidly evolving for integrating self-organizing and dynamic wireless networks. Unreliable failure detectors (FDs) are classical mechanisms that provide information about process failures and can help systems to cope with the high dynamics of these networks. A number of failure detection algorithms have been pr...
Conference Paper
Quorum systems are constructions used to ensure consistency and availability of data stored in replicated servers. These systems usually comprise a static set of servers that provide a fault-tolerant read/write (r/w) register accessed by a set of clients. This approach is not adequate for long lived systems since, given a sufficient amount of time,...
Conference Paper
A complex wireless deployment under realistic scenario is prone to failures and it becomes very hard to determine when to stop retransmitting a message in order to ensure proper delivery. In this paper, a simple effective link-attribute estimator is proposed that is capable of identifying the quality of communication between neighboring mobile devi...
Conference Paper
Full-text available
Modern distributed systems deployed over wireless ad-hoc networks are inherently dynamic and the issue of designing dependable services which can cope with the high dynamics of these systems is a challenge. Byzantine failure detectors provide an elegant abstraction for implementing Byzantine fault tolerance. However, very few works have been propos...
Article
Full-text available
Failure detectors are classical mechanisms which provide information about process failures and can help systems to cope with the high dynamics of self-organizing, unstructured and mobile wireless networks. Unreliable failure detectors of class ◊S are of special interest because they meet the weakest assumptions able to solve fundamental problems o...
Conference Paper
Full-text available
The distributed computing scenario is rapidly evolving for integrating self-organizing and dynamic wireless networks. Unreliable failure detectors are classical mechanisms which provide information about process failures and can help systems to cope with the high dynamism of these networks. A number of failure detection algorithms has been proposed...
Conference Paper
Full-text available
Modern distributed systems deployed over wireless ad-hoc networks are inherently dynamic and the issue of designing dependable services which can cope with the high dynamics of these systems is a challenge. Byzantine failure detectors provide an elegant abstraction for solving security problems; however, very few work has been pro- posed for the ne...
Article
Failure detection is an important abstraction for the development of fault-tolerant middleware, such as group communication toolkits, replication and transaction services. Unreliable failure detector (namely, FD) can be seen as an oracle which provides information about process failures. The dynamics and self-organization of Mobile Ad-hoc Networks...
Conference Paper
Full-text available
O modelo de sistemas entre pares (P2P) tornou-se altamente popular na Internet, particularmente em sistemas de compartilhamento e distribuição de conteúdo. No entanto, a pesquisa e o desenvolvimento de novas tecnologias na área são limitadas pela ausência de ferramentas genéricas de projeto e simulação P2P, sobretudo as que oferecem suporte a simul...
Article
Full-text available
The consensus problem is at the heart of solutions re-lated to the development of modern reliable distributed sys-tems. This paper studies necessary and sufficient conditions under which fault-tolerant consensus become solvable in dynamic systems and self-organizing networks. Those con-ditions are related to the synchrony requirements of the en-vir...
Article
Full-text available
Byzantine failure detectors provide an elegant abstraction for solving security problems. However, as far as we know, there is no general solution for this problem in a dynamic distributed system of unknown networks. This paper presents thus a first Byzantine failure detector for this context. The protocol has the interesting feature to be asynchro...
Conference Paper
Full-text available
Byzantine failure detectors provide an elegant solution for security problems. However, as far as we know, there is no specific solution for this problem in a dynamic distributed system. This paper presents a first Byzantine failure detector for this context. Besides, the protocol presented is asynchronous, that is, the failure detection process do...
Article
Full-text available
Byzantine failure detectors provide an elegant abstraction for solving security problems. However, as far as we know, there is no complete solution for this problem in a dynamic distributed system. This paper presents thus a first Byzantine failure detector for this context. The protocol has the interesting feature to be asynchronous, that is, the...
Conference Paper
Full-text available
This paper presents an asynchronous implementation of a failure detector for unknown and mobile networks. Our approach does not rely on timers. Neither the composition nor the number of nodes in the system are known. Our algorithm can implement failure detectors of class ¨S\diamondsuit S when behavioral properties and connectivity conditions are sa...
Conference Paper
Full-text available
Consensus is a fundamental building block used to solve many practical problems that appear on reliable distributed systems. In spite of the fact that consensus is being widely studied in the context of classical networks, few studies have been conducted in order to solve it in the context of dynamic and self-organizing systems characterized by unk...
Conference Paper
This paper evaluates how well a significant number of broadcasting protocols for MANETs behave when under a realistic scenario of momentary failures and topology changes, which is represented by an omission fault model. Reliable protocols which use additional mechanisms to ensure higher delivery rates beyond best- effort guarantees - have been prop...
Conference Paper
Ensuring reliable communication between nodes is a major challenge in mobile ad-hoc networks due to wireless signal propagation that can be signican tly aected by terrain, obstacles, battery exhaustion and node mobility. Existing broadcasting protocols for MANETs are able to deal with mobility, as well as congestion and collision, but only when und...
Conference Paper
Full-text available
In self-organizing systems, such as mobile ad-hoc and peer-to-peer networks, consensus is a fundamental building block to solve agreement problems. It contributes to coordinate actions of nodes distributed in an ad-hoc manner in order to take consistent decisions. It is well known that in classical environments, in which entities behave asynchronou...
Conference Paper
Full-text available
Consensus services have been recognized as fundamental building blocks for fault-tolerant distributed systems. Many different protocols to implement such a service have been proposed, however, not a lot of effort has been placed in evaluating their performance. In particular, in the context of round-based consensus protocols for asynchronous system...
Article
Full-text available
Dans les réseaux auto-organisés, tels que les réseaux mobiles ad hoc et les réseaux pair-à-pair, le consensus est une brique fondamentale pour résoudre les problèmes d'accord. Il permet de coordoner les actions de noeuds répartis de manière ad hoc de telle sorte que des décisions cohérentes peuvent être prises. Il est notoire que dans les environne...
Article
Full-text available
We consider the problem of failure detection in dynamic networks such as MANETs. Unreliable failure detectors are classical mechanisms which provide information about process failures. However, most of current implementations consider that the network is fully connected and that the initial number of nodes of the system is known. This assumption is...
Conference Paper
This work introduces a highly modular derivation of fast non-blocking atomic commit protocols. Modularity is achieved by the use of consensus protocols as completely independent services. Fast de- cision is obtained by the use of consensus protocols that decide in one communication step in good scenarios. Two original non-blocking atomic commit pro...
Article
Two vertices of a graph are said to be similar if there exists a graph automorphism mapping one of them into the other. Procedures aiming to separate vertices of a graph into equivalence classes accordingly to their similarities are the basis of many isomorphism-testing algorithms. In practice, these procedures ecien tly reduce the search space of...
Conference Paper
Agreement protocols are fundamental for the design of dependable systems. They ensure consistent cooperation among distributed entities, helping both to keep the continuity of services in spite of failures and to enhance performance. Consensus is the greatest common denominator among all agreement problems. It allows a set of processes to agree on...
Conference Paper
The Workshop on Theses and Dissertations on Dependable Computing is a student forum for bringing together graduate students that research on topics related to dependable computing. The aim of this meeting is to present and discuss the proposed contribution, preliminary results and possible directions for their research. The previous editions of thi...
Article
Computer vision techniques supply us with pro-mising human-computer interaction methods by analysing and recognising human movements. The process of detection and tracking human body parts is one of the main steps neces-sary to reach a robust and precise recognition. Nevertheless, this task is rather difficult, specially when the response from that...
Conference Paper
Full-text available
The use of distributed object technology in the web systems development process has been evidenced as a trend, due to the adoption of mechanisms that leverages the construction of reusable, flexible and scalable applications. However, the use of specifications such as J2EE or CORBA has implied in a bigger effort of development, justified by the lea...
Conference Paper
Full-text available
This paper presents the design of OPEN EDEN, an implementation of the Fault Tolerant CORBA specification based on the use of a group communication system, called EDEN. The design of OPEN EDEN has been driven by the desire to use only portable techniques (mainly portable interceptors) to implement the interaction between the EDEN group communication...
Article
Group-based computing is becoming more and more popular when one has to design a middleware able to support reliable distributed applications. This paradigm is made of two basic services, namely, a group membership service and a group communication service. More generally, a group is a set of processes cooperating to carry out a common task (e.g.,...
Article
We consider the priority inversion problem in an actively replicated system. Priority inversion was originally defined in the context of non-replicated systems. Therefore we first introduce the concept of group priority inversion, which extends the concept of (local) priority inversion to the context of a group of processors that perform an activel...
Article
This paper presents a framework for the development of higher level communication protocols that provides extra functionalities (e.g. one-to-many ordered delivery, atomic delivery, etc.) not supplied by standard off-the-shelf lower level communication protocols (e.g. the TCP/IP suite of protocols). The framework is based on the event channel abstra...
Article
jvj is the maximal size (in bits) of a value a process can initially propose to the consensus. All the protocols work provided that f ! n. Hence, they are optimal with respect to the number of process crashes that can be tolerated. The protocols of the first two lines systematically require n rounds ([4] and [5] each proposes a particular generaliz...
Article
Full-text available
Considers the priority inversion problem in an actively replicated system. Priority inversion was originally defined in the context of nonreplicated systems. Therefore, we first introduce the concept of group priority inversion, which extends the concept of (local) priority inversion to the context of a group of processors that perform an actively...
Conference Paper
Full-text available
This paper presents a very simple consensus protocol that converges in a single communication step in favorable circumstances. Those situations occur when “enough” processes propose the same value. (“Enough” means “at least (n−f)” where f is the maximum number of processes that can crash in a set of n processes.) The protocol requires f < n/3. It i...
Conference Paper
Full-text available
We consider the priority inversion problem in an actively replicated system. Priority inversion was originally defined in the context of non-replicated systems. Therefore we first introduce the concept of group priority inversion, which extends the concept of (local) priority inversion to the context of a group of processors that perform an activel...
Conference Paper
Full-text available
Presents a framework for the development of higher level communication protocols that provides extra functionalities not supplied by standard off-the-shelf lower level communication protocols. The framework is based on the event channel abstraction which allows circumventing the main drawbacks of the layered-based approach traditionally used to dev...