About
172
Publications
100,089
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,986
Citations
Introduction
Current institution
Additional affiliations
July 2012 - present
Education
January 2006 - September 2009
September 2004 - December 2005
January 2003 - December 2003
Publications
Publications (172)
This article investigates the impact of a low-cost Internet of Things system for autonomous environmental regulation in poultry farming, demonstrating its potential to optimize growth, welfare, and operational efficiency in small-scale production within the Brazilian agricultural context.
Most software-intensive systems present large and complex architectures, which should satisfy different quality attributes, such as performance, reliability, and security. Some of these attributes could only be measured at runtime, which is undesired, particularly for critical systems whose attributes should still be evaluated at design time to avo...
This article investigates why aspect-oriented programming, once celebrated as a revolutionary programming paradigm, lost its traction. We examine its early achievements, the technical obstacles it faced, and the core reasons it fell short of mainstream adoption.
The exponential growth of text-based data in domains such as healthcare, education, and social sciences has outpaced the capacity of traditional qualitative analysis methods, which are time-intensive and prone to subjectivity. Large Language Models (LLMs), powered by advanced generative AI, have emerged as transformative tools capable of automating...
Software bots, extensively adopted by Open Source Software (OSS) projects, support developers across several activities, from automating predefined tasks to generating code that aids software engineers. However, with the growing prominence of bots, questions have emerged regarding the extension to which they truly assist or hinder software engineer...
Fake News are a contemporary phenomenon with potential devastating effects. For inquiry and auditability purposes, it is essential that the news, once classified as false, can be persisted in an immutable means so that interested parties can query it. Although Blockchain clearly satisfies the main requirements for Fake News Management Software Syst...
Fake News are a contemporary phenomenon with potential devastating effects. For inquiry and auditability purposes, it is essential that the news, once classified as false, can be persisted in an immutable means so that interested parties can query it. Although Blockchain clearly satisfies the main requirements for Fake News Management Software Syst...
“Internet of Things (IoT) Engineers” are in demand and need to encompass a wide range of expertise. This article explores the “IoT Engineer” skill set and U.S. job market opportunities.
Smart cities emerge as a response to build the city of the future, where the well-being and rights of citizens are ensured under a sustainable perspective. Understanding the current state of smart cities in Brazil becomes essential to assess how technology is impacting urban dynamics in the country. In that sense, the main contribution of this pape...
Sneakers have been designated as one of the most counterfeited fashion items online, with three times more risk in a trade than any other fashion purchase. As the market expands, the current sneaker scene displays several vulnerabilities and trust flaws, mostly related to the legitimacy of assets or actors. In this paper, we investigate various blo...
The integration of the Internet of Things (IoT) and ChatGPT can enhance user experiences and facilitate process automation. We examine use cases, challenges, and future directions for ChatGPT’s potential to revolutionize human–machine interactions within IoT ecosystems.
In today’s cybersecurity landscape, the primary goal is to protect against threats, but cybersecurity’s influence extends beyond mere defense. We highlight how cybersecurity practices can impact productivity in both software development and day-to-day operations.
Software testing and debugging are standard practices of software quality assurance since they enable the identification and correction of failures. Benchmarks have been used in that context as a group of programs to support the comparison of different techniques according to pre-established parameters. However, the reasons that inspire researchers...
Systems-of-Systems (SoS) are composed of multiple independent systems called constituents that, together, achieve a set of goals by means of emergent behaviors. Those behaviors can be deliberately planned as a combination of the individual functionalities (herein named as features ) provided by the constituents. Currently, SoS engineers heavily rel...
Sneakers were designated as the most counterfeited fashion item online, with three times more risk in a trade than any other fashion purchase. As the market expands, the current sneaker scene displays several vulnerabilities and trust flaws, mostly related to the legitimacy of assets or actors. In this paper, we investigate various blockchain-based...
Lyzis Labs is an incentive-driven and democratic protocol built upon a decentralized online marketplace based on blockchain technology. The major proposal of the protocol, Lyzis Marketplace, allows two or more people to be securely connected in a decentralized way without going through a Trusted Third Party (TTP) to perform physical asset exchanges...
Security and reliability in Blockchain software systems is a major challenge in Blockchain Oriented Software Engineering. One of the most critical components to address at the architectural level is the consensus protocol, as it serves as the mechanism for accepting valid transactions and incorporating them into the ledger history. Given that this...
This paper explores the potential of blockchain technology to improve cross-border trade by providing a secure and transparent way to track and verify the movement of goods, services, and funds across borders. By creating a tamper-proof record of transactions, blockchain can reduce fraud and increase transparency in the supply chain, as well as str...
The Internet of Things (IoT) plays a significant role in advancing Agro 4.0 in Brazil. This article explores current IoT trends, benefits, and challenges of the IoT in the agriculture industry.
LoRaWAN technology is of particular importance in the Internet of Things realm. It is a simple network architecture with a default-working mode optimized to sensors with limited power autonomy and a few downlink exchanges with the network server. In addition, LoRaWAN offers an optional operation mode, Class B, suitable for IoT applications based on...
Testing for critical AI systems is non-trivial as these systems are prone to a new breed of sophisticated software defects. The admissibility of these systems and their fundamental
social acceptance is tightly coupled with assuring whether the potential hazards to humans, animals, and property posed by the prospect defects can be minimized and limi...
Safety and trust are two of the most important features in a critical system. A critical system is one that must be highly reliable in that it not only completes its mission but causes zero harm to the public. The problem is testing a critical system, especially if it employs artificial intelligence (AI). The challenge is critical AI systems (CAIS)...
A challenging problem for software and systems engineers is to provide assurance of operations for a system that is critical but must operate in situations that cannot be easily created in the testing lab. For example, a space system cannot be fully tested in all operational modes until it is launched and nuclear power plants cannot be tested under...
With the increasing ubiquity of the Internet of Things (IoT), some issues with satisfying
quality requirements are emerging. This article discusses the current landscape and
concerns about IoT quality requirements.
Four exploratory surveys were conducted in 2003, 2008, 2013, and 2020 on the state of practice of requirements engineering. This article creates a panoramic view of the changes to the landscape of industrial practices by analyzing the responses from the four surveys.
Open banking (OB) is a special kind of financial ecosystem governed by certain security profiles, application interfaces, and guidelines with the objective of improving customer choices and experiences. OB also makes it easier for new entries into the financial business sector.
The term “open banking” defines a special kind of financial ecosystem that involves special security protocols, application interfaces, and stakeholder guidelines to provide enriched customer choices and experiences. An open banking ecosystem can provide more information and options to individuals and small to mid-size businesses. With open banking...
The Executable Models (ExM) research area is an ascending discipline that explores the use of models capable of being executed during the software development process. The research area is overloaded with terms and concepts derived from several areas. There is also ambiguities and an absence of consensus on definitions. This is a problem not only f...
The novel coronavirus that causes the Coronavirus Disease 2019 (COVID-19) has spread all over the world at an unprecedented rate. With growing recognition of the distributed nature of health services, the technology of blockchain has recently reached the impetus of the healthcare domain. This article provides: 1) a panoramic overview of existing so...
The need for cybersecurity education has grown significantly for all citizens. However, cybersecurity education has not been adequately addressed in fields outside of this domain. Cybersecurity concerns increase every time a new device connects to a network. As such, we need to increase involvement and advancement of cybersecurity education at all...
There is an indisputable industrial need for highly skilled individuals in the role of blockchain engineers. However, little is known about the typology of activities which fall under the blockchain engineers’ responsibilities and the competencies and experiences sought from employers’ perspectives. To shed light about the main characteristics of t...
The smart home (SH) concept is built around systems and devices to increase the comfort, energy efficiency, privacy, and safety of its inhabitants and their data. These technologically advanced homes are multifaceted, complex systems that deserve to be studied to improve upon those concepts. Nevertheless, there is a lack of consensus upon the exist...
Since the genesis case was confirmed in Wuhan, China in late 2019, the Novel Coronavirus Disease 2019 (COVID-19) has been spreading all over the world at an accelerating rate. Almost immediately, IoT technologies were deployed in various surveillance scenarios as part of an effort to combat the pandemic. Among the emerging solutions, contact tracin...
The smart home (SH) concept is built around systems and devices to increase the comfort, energy efficiency, privacy, and safety of its inhabitants and their data. These technologically advanced homes are multifaceted, complex systems that deserve to be studied to improve upon those concepts. Nevertheless, there is a lack of consensus upon the exist...
There is an indisputable industrial need for highly skilled individuals in the role of software testers. However, little is known about what activities under testers’ responsibilities, competencies, and experiences sought after from employers’ perspectives. For the purpose of this research, a data set of 1000 job ads related to software testing rol...
System-of-Systems (SoS) has consolidated itself as a special type of software-intensive systems. As such, subtypes of SoS have also emerged, such as Cyber-Physical SoS (CPSoS) that are formed essentially of cyber-physical constituent systems and Systems-of-Information Systems (SoIS) that contain information systems as their constituents. In contras...