Nelson Souto Rosa

Nelson Souto Rosa
Federal University of Pernambuco | UFPE · Department of Computer Science

PhD

About

146
Publications
16,733
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,283
Citations
Additional affiliations
January 2004 - present
Universidade Federal de Pernambuco (UFPE)
March 1997 - June 1997
University of Westminster
Position
  • Teatcher Assistant

Publications

Publications (146)
Article
Purpose This paper aims to present Long4Cloud (long-running workflows execution environment for cloud), a distributed and adaptive LRW execution environment delivered “as a service” solution. Design/methodology/approach LRWs last for hours, days or even months and their duration open the possibility of changes in business rules, service interrupti...
Article
Full-text available
Abstract Adaptive middleware is essential for developing distributed systems in several applications domains. The design and implementation of this kind of middleware, however, it is still a challenge due to general adaptation issues, such as When to adapt? Where to include the adaptation code? What to adapt?, and How to guarantee safe adaptations?...
Conference Paper
Languages commonly used to implement adaptive middleware systems are object-oriented with reflective capability, what entails in performance overhead, exposure of internal structure and also limits the abstraction level. In this paper, we propose an adaptive middleware, namely AFIrM, developed in Haskell, a purely functional language whose features...
Article
Full-text available
Given the characteristics of dynamic provisioning and illusion of unlimited resources, clouds are becoming a popular alternative for running scientific workflows. In a cloud system for processing workflow applications, the system’s performance is heavily influenced by two factors: the scheduling strategy and failure of components. Failures in a clo...
Article
Full-text available
Abstract Microservices are a popular method to design scalable cloud-based applications. Microservice-based applications (μApps) rely on message passing for communication and to decouple each microservice, allowing the logic in each service to scale independently. Complex μApps can contain hundreds of microservices, complicating the ability of DevO...
Conference Paper
Full-text available
Tracing has been applied to study and understand the behavior and performance of distributed systems. Despite the attention this topic has received, two important aspects are still challenges and especially harmful in the context of microservice-based applications: source code instrumentation and performance overhead. Existing attempts resort on wo...
Conference Paper
Full-text available
The interest over building security-based solutions to reduce the vulnerability exploits and mitigate the risks associated with smart homes in IoT is growing. However, our investigation identified to architect and implement distributed security mechanisms is still a challenge because is necessary to handle security and privacy in IoT middleware wit...
Article
Full-text available
Creating a cost-effective and highly available private cloud infrastructure from scratch is challenging. In order to improve availability, system administrators commonly employ redundant hardware, which incurs increased acquisition cost. There are plenty of decisions involved in this process. It is necessary to specify how many servers will be empl...
Conference Paper
Modern languages like Go has a set of innovative characteristics that create new possibilities for implementing adaptive middleware systems, such as runtime reflection, dynamic plugins, lightweight threads, and process algebra inspired channels. This paper explores those characteristics and combines them with software architecture concepts and ligh...
Article
The development of adaptive middleware systems is still a challenge due to the complexity of dealing with traditional adaptation issues, such as Why to adapt? When to adapt? Where is the need for change? What kind of change is needed? How is the adaptation performed? The emerging of new technologies (e.g., process mining) and maturation of existing...
Preprint
It increases the concern about building security-based solutions to reduce exposure to vulnerabilities and mitigate the risks associated with smart homes in IoT. However, many applications still face challenges in architecting distributed security mechanisms. Faced this, several middleware appears as a viable solution to address this problem, altho...
Article
Full-text available
Service-oriented computing (SOC) and business process management (BPM) are essential topics in computer science. Companies are widely adopting business process standards, such as BPMN, to model their business processes, while automatise them by using services from the SOC world. The automation leads to a gain of efficiency in executing business pro...
Conference Paper
The development of an adaptive middleware is still a challenge due to the complexity of dealing with traditional adaptation issues, such as Why to adapt? When to adapt? Where do we have to implement change? What kind of change is needed? How is the adaptation performed? This paper presents a solution that integrates software architecture concepts,...
Article
The widespread adoption of Web 2.0 applications has forced enterprises to rethink their ways of doing business. To support enterprises in their endeavors, this paper puts forward business-data artifact and social-data artifact to capture, respectively, the intrinsic characteristics of the business world (associated with business process management...
Article
Full-text available
Power consumption is a primary interest in Wireless Sensor Networks (WSNs), and a large number of strategies have been proposed to evaluate it. However, those approaches usually neither consider reliability issues nor the power consumption of applications executing in the network. A central concern is the lack of consolidated solutions that enable...
Conference Paper
Full-text available
Microservices have become a popular pattern for deploying scale-out application logic and are used at companies like Netflix, IBM, and Google. An advantage of using microservices is their loose coupling, which leads to agile and rapid evolution, and continuous re-deployment. However, developers are tasked with managing this evolution and largely do...
Article
Business Process Management (BPM) and Service-Oriented Computing (SOC) are essential topics in Computer Science. Companies are widely adopting business process standards, like BPMN, to model their business processes, while automatize them by using services from the SOC world. The automation leads to a gain of efficiency in executing business proces...
Conference Paper
Microservices have become a popular pattern for deploying scale-out application logic and are used at companies like Netflix, IBM, and Google. An advantage of using microservices is their loose coupling, which leads to agile and rapid evolution, and continuous re-deployment. However, developers are tasked with managing this evolution and largely do...
Conference Paper
Elasticity plays a key role in developing applications to run in cloud environments. However, to implement elasticity directly in the application code is a hard task. Besides, current elasticity strategies usually focus on IaaS resources without taking into account what is running on top of VMs, leading to issues such as inaccurate elasticity and r...
Article
Quality attributes play a relevant role in service-oriented computing, as they allow distinguishing similar services. These attributes impact on various activities related to the life-cycle of service-based applications (SBAs). The effect starts from service discovery and permeates other activities such as service level agreement establishment and...
Conference Paper
Service-Oriented Computing (SOC) has been used in business environments in order to integrate heterogeneous systems. The dynamic nature of these environments causes changes in the application requirements. As a result, service composition must be flexible, dynamic and adaptive, which motivate the need to ensure the service composition behavior at r...
Article
Full-text available
The use of business process standards to model and execute business needs is growing rapidly. In addition, Service-oriented Computing has been adopted to realize business processes, which basically consists of executing the process activities using services available in the Internet. In this context, the importance of security is apparent, because...
Article
Full-text available
Nowadays, several organisations provide services on the Internet with similar functionality but different price and pricing schemes. Since these services are used in service compositions, the providers of composed services have to face the challenge of managing the services they use, in order to decrease the cost of the service compositions without...
Article
Full-text available
The use of business process standards to model and execute business needs is growing rapidly. In addition, Service-oriented Computing has been adopted to realize business processes, which basically consists of executing the process activities using services available in the Internet. In this context, the importance of security is apparent, because...
Article
Full-text available
Wireless sensor networks (WSNs) are made up of nodes with limited resources, such as processing, bandwidth, memory and, most importantly, energy. For this reason, it is essential that WSNs always work to reduce the power consumption as much as possible in order to maximize its lifetime. In this context, this paper presents SITRUS (semantic infrastr...
Conference Paper
A significant number of parallel applications are implemented using MPI (Message Passing Interface) and several existing approaches focus on their verification. However, these approaches typically work with complete applications and fixing any undesired behaviour at this late stage of application development is difficult and time consuming. To addr...
Conference Paper
Full-text available
Quality attributes play a very relevant role in the service-oriented computing world, as they allow distinguishing between functionally equivalent services. In fact, these attributes have an impact in various activities related to the life-cycle of service-based applications (SBAs), starting from service discovery and permeating other activities su...
Conference Paper
Full-text available
Nowadays, many companies expose their competencies as services on the Internet to facilitate the cooperation with their customers. This situation has created a new marketplace where services have been provided with similar functionality but different qualities such as cost, performance, and reliability. In this scenario, service composition provide...
Conference Paper
Full-text available
Government initiatives to open data to the public are becoming increasingly popular every day. The vast amount of data made available by government organizations yields interesting opportunities and challenges-both socially and technically. In this paper, we propose a social machine-oriented architecture as a way to extend the power of open data an...
Conference Paper
The use of middleware systems to support multi-tenancy applications in cloud computing environments can help to decrease the application costs by reducing the hardware infrastructure and the amount of software license required to run a software, and facilitating the its maintenance. However, the design and implementation of middleware systems that...
Conference Paper
Full-text available
During the service composition lifecycle, service costs should be predicted, controlled and reported in order to optimize resource utilization and increase profit. Several approaches have been proposed to address cost issues in some phases of the service composition lifecycle. However, each approach expresses costs in its own way, which makes it ha...
Conference Paper
Measurement is an important activity whenever design embedded systems, as it provides means for platform characterization and selection as well as system validation and specification. The sample frequency is a key aspect for obtaining accurate and precise measures. Obtaining highly accurate and precise measures may require measurement systems able...
Conference Paper
The agnostic, integrated and automated treatment of non-functional (quality) attributes into a business process realization is still a challenge. While functional attributes are already addressed by existing approaches, non-functional ones are commonly neglected. A systematic way of dealing with such attributes from the most abstract business level...
Conference Paper
Workflows have been widely adopted in enterprise environments to allow the formalization and automation of business processes through the execution of activities implemented by computational services. Some of these workflows, namely long running workflows, take a long time (e.g., Hours or even days and weeks) to complete their work and produce the...
Article
Full-text available
Wireless Sensor Networks (WSNs) consist of hundreds or thousands of sensor nodes with limited processing, storage, and battery capabilities. There are several strategies to reduce the power consumption of WSN nodes (by increasing the network lifetime) and increase the reliability of the network (by improving the WSN Quality of Service). However, th...
Conference Paper
Full-text available
Nowadays, companies are increasingly offering their business services through computational services on the Internet in order to attract more customers and increase their revenues. However, these services have financial costs that need to be managed in order to maximize profit. Several models and techniques have been recently reported that aim at m...
Conference Paper
Full-text available
Service oriented computing enables the development of applications as compositions of basic entities called services. These services offer business functions, which are used as primary criteria in the service selection algorithms. In distributed scenarios, a large number of services can offer similar functionalities, motivating the embracement of q...
Article
Full-text available
Several strategies to evaluate the power consumption of of wireless sensor networks (WSNs) have been proposed. The limited amount of energy and the difficulty of recharging them have demanded the emerging of these strategies. However, to evaluate the lifetime of a WSN is not a trivial task due to the complexity of reproducing the environment, inher...
Conference Paper
Service-Oriented Computing (SOC) was introduced some years ago as a paradigm that allows companies to expose their core competencies as services. Yet, we can only benefit from the full potential of SOC if we explore the possibility of composing services. In practice, service composition enables the development of complex systems by combining existi...
Patent
Full-text available
A functional model of a business process which is annotated with security requirements is provided. Platform-specific executable code and at least one configuration file for a given security enforcement component to enforce the security requirements of the model are then generated automatically.
Patent
Full-text available
A functional model of a business process which is annotated with security requirements is provided. Platform-specific executable code and at least one configuration file for a given security enforcement component to enforce the security requirements of the model are then generated automatically.
Conference Paper
Full-text available
In this paper, we extend the initial classification scheme for Social Machines (SM) by including Personal APIs as a new SM-related topic of research inquiry. Personal APIs basically refer to the use of Open Application Programming Interfaces(Open APIs) to programmatically access information about a person (e.g., personal basic info, health-related...
Conference Paper
Wireless Sensor Networks (WSN) have a gained increasing attention from the research community in recent years, especially for the great potential for distributed applications. They are capable of processing, sensing and transmitting wireless information, generating a large volume of raw data which possess natural heterogeneity. In this context, we...
Conference Paper
I/O bound systems can significantly reduce theirtotal execution time by performing I/O operationsconcurrently. Despite this enormous potential, most systemsperform I/O operations sequentially. One of the reasons behindthis is that the most widespread mechanisms for concurrentI/O are callback-based, resulting in code hard to write andmaintain. In th...
Article
A systematic way for treating non-functional (quality) attributes into the business process management lifecycle is still a challenge. The agnostic, integrated and automated treatment of these attributes from the most abstract business level to their technical realisation at execution level is a complex task. In this context, this paper presents a...
Conference Paper
The use of business processes to model and design business activities is becoming a reality to a significant number of companies. Meanwhile, the Service-Oriented Architecture (SOA) is being a widely adopted strategy for business processes execution, which often demands communication between different (and remote) services. This fact leads to the ne...
Conference Paper
Middleware systems are widely recognized as complex software systems. The origin of this complexity is mainly related to the need of providing distribution transparencies (e.g., location, access, mobility) and services (e.g., naming, security, concurrency control) to distributed application developers. This complexity suggests the use of formal met...
Conference Paper
Full-text available
Blending computational and social elements into software has gained significant attention in key conferences and journals. In this context, "Social Machines" appears as a promising model for unifying both computational and social processes. However, it is a fresh topic, with concepts and definitions coming from different research fields, making a u...
Conference Paper
Full-text available
The applications for Wireless Sensor Networks (WSN) have simple functional requirements, which basically consist of reading the sensors, and sending the read data to the application. However, when non-functional requirements are taken into account, developers of applications for WSN have to deal with such requirements as: restrictions on the consum...
Article
Full-text available
Power consumption is the main concern in developing Wireless Sensor Network (WSN) applications. Consequently, several strategies have been proposed for investigating the power consumption of this kind of application. These strategies can help to predict the WSN lifetime, provide recommendations to application developers and may optimize the energy...
Conference Paper
The exponential growth of cloud computing popularity in the last years brings up new possibilities to reduce costs and places new challenges for application and middleware developers. As usually adopted, applications are developed atop middleware systems whose role is to hide the complexity of underlying cloud technologies and distribution mechanis...
Conference Paper
Full-text available
The need to replacing services belonging to a composition is motivated by several reasons, such as changes in the application’s requirements, bug fixing, existence of a fresh service and so on. Due to the large number of services having similar (or even identical) functionalities, it has been widely accepted that the selection process for a new ser...
Article
Modelling and enforcing security requirements is an important but challenging task in web service composition. However, the explicit treatment of security requirements is challenging for many reasons: diversity of security background of involved stakeholders, absence or complexity of notations to express security requirements, complexity of mapping...
Conference Paper
Wireless Sensor Networks (WSNs) have a very large growth in research in recent years. They are essentially adhoc networks, capable of processing, sensing and transmitting wireless information. These are networks that generate a large volume of raw data which possess natural heterogeneity. Besides, energy efficiency is an important performance measu...
Article
ABSTRACTThe adoption of business processes to design business activities is becoming a reality to a significant number of companies. In addition, the Service-Oriented Architecture (SOA) is being used in diverse situations for the execution of business processes using computational resources. In this context, the need of business process automation...
Article
Programming language concepts have inspired some networking design decisions. For example, concepts such as object encapsulation and interface invocation have been borrowed, at the time of their adoption, from an already well established object oriented programming paradigm. The authors suggest in this paper that it may be time again to revisit eme...
Conference Paper
Full-text available
There is an increasing need to monitor quality attributes (e.g., perfor- mance and availability) in SOA environments. Existing approaches to monitor these attributes (commonly referred to as QoS attributes) do not allow reconfigu- ration while services are in execution. This paper presents a generic QoS-aware SOA mechanism able to monitor runtime qu...
Conference Paper
Cloud Computing, Business Process Modeling (BPM) and Service-oriented architectures (SOA) are playing a relevant role in the evolution of Information Technology (IT). A considerable number of system developers are using Cloud technologies to deploy and make available systems over the Internet. Business Process Management standards are being widely...
Conference Paper
Full-text available
The design, deployment and execution of business process models and their associated security models is expensive and time consuming. This is because these activities usually involve multiple stakeholders that include business domain experts, security experts, web service developers and IT operations teams, and there is no streamlined development e...
Conference Paper
It is expensive and time-consuming for businesses process designers to perform iterative refinement of business process models and their associated security models, and to deploy the resulting business processes in an execution environment, with the enforcement of both functional and security requirements. We created a cloud-based modeling and exec...
Article
Full-text available
Wireless sensor networks (WSNs) have great potential for many distributed applications in different scenarios. As they grow in popularity and importance, it becomes increasingly desirable and necessary to share their data over the Internet. This paper presents an energy-aware middleware that focuses on integrating the Internet and WSNs at service l...
Conference Paper
Wireless sensor networks (WSNs) have received considerable attention in recent years as they have great potential for many distributed applications in different scenarios. Whatever the scenario, WSNs are actually connected to an external network, through which sensed information are passed to the Internet and control messages can reach the WSN. Thi...
Conference Paper
The growth of engineering disciplines, such as maintainability and reliability, have been motivated by several factors, which include the ever growing of system complexity as well as the high cost associated to failures repairing activities and productivity reduction. This work adopts a methodology, which includes a hybrid modeling technique that c...
Conference Paper
The advent of cloud computing has demanded more computational resources from data centers in order to provide high-availability services required in this new paradigm. To support data center dependability evaluation, this paper presents a tool, namely, ASTRO, which adopts a hybrid modeling approach, that includes Reliability Block Diagrams (RBD), S...