Rui L. Aguiar

Rui L. Aguiar
University of Aveiro | UA · Telecommunications Institute (IT)

PhD

About

486
Publications
106,482
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,540
Citations
Additional affiliations
January 2015 - present
Universidade Federal de Uberlândia (UFU)
Position
  • Invited Researcher
January 2005 - present
January 1998 - December 2009
University of Aveiro

Publications

Publications (486)
Conference Paper
Full-text available
The increasing use of smart devices for monitoring spaces has caused an increase in concerns about the privacy of users of these spaces. Given this problem, the legislation on the right to privacy has been worked to ensure that the existing laws on this subject are sufficiently comprehensive to preserve the privacy of users. In this way, research o...
Article
Full-text available
Monitoring road traffic is extremely important given the possibilities it opens up in terms of studying the behavior of road users, road design and planning problems, as well as because it can be used to predict future traffic. Especially on highways that connect beaches and larger urban areas, traffic is characterized by having peaks that are high...
Conference Paper
5G technologies provide several advancements regarding low latency and high bandwidth network scenarios, thus enabling new vertical use cases. Nonetheless, the lack of testing and validation mechanisms for NFV-based services poses a severe challenge in reducing their time to market. In this work we showcase a service to automate the validation of 5...
Article
Full-text available
Fault-tolerance methods are required to ensure high availability and high reliability in cloud computing environments. In this survey, we address fault-tolerance in the scope of cloud computing. Recently, cloud computing-based environments have presented new challenges to support fault-tolerance and opened new paths to develop novel strategies, arc...
Article
Full-text available
Data collection within a real-world environment may be compromised by several factors such as data-logger malfunctions and communication errors, during which no data is collected. As a consequence, appropriate tools are required to handle the missing values when analysing and processing such data. This problem is often tackled via matrix decomposit...
Conference Paper
Full-text available
This paper proposes and validates a Interdomain Network Slicing framework for verticals, allowing them to directly participate in the establishment and control of end-to-end Communication Services deployment across multiple inter-operator domains. The framework progresses the means made available by different standards and research initiatives to e...
Article
Full-text available
IoT platforms have become quite complex from a technical viewpoint, becoming the cornerstone for information sharing, storing, and indexing given the unprecedented scale of smart services being available by massive deployments of a large set of data-enabled devices. These platforms rely on structured formats that exploit standard technologies to de...
Conference Paper
Data collection within a real-world environment may be compromised by several factors such as data-logger malfunctions and communication errors, during which no data is collected. As a consequence, appropriate tools are required to handle the missing values when analysing and processing such data. This problem is often tackled via matrix decomposit...
Article
Full-text available
The function and performance of neural networks are largely determined by the evolution of their weights and biases in the process of training, starting from the initial configuration of these parameters to one of the local minima of the loss function. We perform the quantitative statistical characterization of the deviation of the weights of two-h...
Conference Paper
Full-text available
Up until recently, a physical SIM card was mandatory to make calls, send messages, and access the Internet using hardware modems, but a physical card has some limitations, especially when it is used within IoT devices deployed in a wide area. eSIM is an embedded alternative of the traditional physical SIM cards, providing the same usability, privac...
Conference Paper
Full-text available
The Internet of Things (IoT) is a growing research field and one of today's prime examples of Wireless Sensor Networks (WSN) applicability and possible impact on general society. IoT scenarios use a great diversity of sensors, protocols, and mechanisms widely researched from a system perspective. Unfortunately, the security within the small sensing...
Conference Paper
Full-text available
Network Softwarization, the process by which network equipment's are being replaced by software running in a cloud environment, is playing an important role in the transformation of next-generation networks starting with 5G. In this environment, the use of AI/ML aided network automation to perform management tasks is vital to provide a more reliabl...
Conference Paper
Full-text available
The technological world has grown by incorporating billions of small sensing devices, collecting and sharing large amounts of diversified data over the new generation of wireless and mobile networks. Semantic similarity models have been used as a means to organize and optimize devices in constrained environments such as IoT, edge computing, and 5G...
Technical Report
Full-text available
The White Paper covers key areas related to 6G research from a technical, societal, policy and business perspective providing a vision for the future networks and services. In the coming decade, 6G will bring a new era in which billions of things, humans, connected vehicles, robots and drones will generate zettabytes of digital information. 6G will...
Conference Paper
Full-text available
We explore a 'Smart-BnB scenario' whereby someone (an Owner) advertises a smart property on a web platform. Renters use the platform for short periods, and may fully enjoy the property, including its smart features such as sensors. This scenario should further ensure the Renter's privacy, so we use consent receipts and selective sharing. This paper...
Conference Paper
Full-text available
Recent research showed that heating, ventilation and air conditioning systems consume a considerable amount of electricity when compared with the remaining household appliances. Therefore, efficient use of solar energy on these appliances in combination with the Internet of Things (IoT) platforms became a well-researched topic, especially when stor...
Article
The adoption of Software Defined Networking (SDN) has encountered resistance mainly due to its disruptive nature for current deployed networks. In order to allow a smoother transition of SDN into production networks and take advantage of SDN’s characteristics, a mix of SDN with traditional networks, or Hybrid SDN Networks, can be deployed, paving t...
Article
Edge computing is crucial for many of the new 5G business vertical use-cases, such as Industry 4.0 robots, safety-critical communications, and highly-efficient smart grids. However, the tighter integration of such impactful businesses into previously core network operations raises significant security, trustworthiness, and reliability issues. A bus...
Preprint
Full-text available
This paper presents an economical assessment of the benefits of introducing 5G technologies into pilot use cases pertaining to the railroad transportation and energy sectors. For each of the pilots, undergone by EFACEC Engenharia e Sistemas and EFACEC Energia, respectively, under the scope of the H2020 5Growth project, evaluates the expenditure and...
Article
Full-text available
This paper presents a framework for improved and efficient video delivery in scenarios featuring users moving at high speed (e.g., trains), leveraging on dynamic Multi-access Edge Computing (MEC) enabled 5G network capabilities. The framework is location-aware and it allows the content to efficiently follow the users, conserving load usage on netwo...
Conference Paper
With the variety of applications and the different user requirements, it is necessary to offer tailored resources efficiently not only in access but also in the core of the network. Inspired by the definition and standardization of mobile networks, especially 5G that focused on business verticals, the term network slicing has received numerous stat...
Article
Full-text available
5G systems are putting increasing pressure on Telecom operators to enhance users’ experience, leading to the development of more techniques with the aim of improving service quality. However, it is essential to take into consideration not only users’ demands but also service providers’ interests. In this work, we explore policies that satisfy both...
Preprint
Full-text available
The function and performance of neural networks is largely determined by the evolution of their weights and biases in the process of training, starting from the initial configuration of these parameters to one of the local minima of the loss function. We perform the quantitative statistical characterization of the deviation of the weights of two-hi...
Conference Paper
Network traffic classification can improve the management and network service offer, taking into account the kind of application. The future network architectures, mainly mobile networks, foresee intelligent mechanisms in their architectural frameworks to deliver application-aware network requirements.The potential of convolutional neural networks...
Article
Full-text available
As data become an increasingly important asset for organizations, so does the access control policies that protect aforesaid data. Many subjects (public, researchers, etc.) are interested in accessing these data, leading to the desire for simple access control. However, some scenarios use vague concepts, such as the “researcher’s expertise”, when m...
Conference Paper
Full-text available
Reinforcement Learning has seen some interesting development over the last years, which made it very attractive to use on recommendation scenarios. In this work, we have extended the previously developed pervasive system, which is aware of the conversational context to suggest documents potentially useful to the users, with the ability to use users...
Chapter
In order to adapt to the recent phenomenon of exponential growth of time series data sets in both academic and commercial environments, and with the goal of deriving valuable knowledge from this data, a multitude of analysis software tools have been developed to allow groups of collaborating researchers to find and annotate meaningful behavioral pa...
Article
Full-text available
Key Performance Indicators (KPIs) are a higher‐level characterization of the performance of a network slice, meant to be assessable at any time. Bodies such as the GSM Alliance have proposed the use of KPIs, including, but not limited to, latency, throughput, power consumption, and security. However, while latency, throughput, and power consumption...
Article
Emerging concepts such as Software Defined Networking (SDN), Network Function Virtualization (NFV) and Network Slicing have been pushing new and flexible ways for providers to manage their services through the simplification of the hardware, allowing a faster deployment of new services and the optimization of their capital and operational expenses....
Article
Full-text available
Heating appliances consume approximately 48 % of the energy spent on household appliances every year. Furthermore, a malfunctioning device can increase the cost even further. Thus, there is a need to create methods that can identify the equipment’s malfunctions and eventual failures before they occur. This is only possible with a combination of...
Chapter
Full-text available
The traditional business models exploited in networking are changing into industry verticals, which in turn builds new applications with striking and specific requirements. Therefore, the service-oriented, fully programmable, and flexible features that translate to sliced-capable networks are fundamentals in the design, deployment, and orchestratio...
Article
Full-text available
Online access to information while on the move has conferred businesses with the capability to be constantly accessible and in operation, independently of geographical area or time zone. There are situations, however, that demand technical solutions for specific scenarios, such as controlled access to corporate‐based content. Virtual Private Networ...
Conference Paper
Full-text available
Over the last few years, pervasive systems have seen some interesting development. Nevertheless, human–human interaction can also take advantage of those systems by using their ability to perceive the surrounding environment. In this work, we have developed a pervasive system – named CLASSY – that is aware of the conversational context and suggests...
Conference Paper
This paper proposes a slice management and orchestration framework for abstracting the instantiation of end-to-end network slices, which are composed by a chain of both physical and virtual network functions. In this line, the proposed SliMANO framework is a plug-in based system that requests network resources and coordinates the interaction among...
Conference Paper
This paper proposes a framework where Customer Premises Equipments (CPEs) are dynamically instantiated, by leveraging Software Defined Networking (SDN) and Network Function Vitualisation (NFV), in the cloud as a chain of con-tainerised virtual network functions (VNFs). Resulting virtual CPE instances (i.e., vCPEs) are organised in clusters and a Ma...
Article
Full-text available
Fault-tolerance is an essential aspect of network resilience. Fault-tolerance mechanisms are required to ensure high availability and high reliability in systems. The advent of software-defined networking (SDN) has both presented new challenges and opened new paths to develop novel strategies, architectures, and standards to support fault-tolerance...
Conference Paper
This paper presents a framework for improved mobile video delivery in high speed vehicles, integrating Network Function Virtualization, Software Defined Networking and Multi-access Edge Computing (MEC), with user mobility and service consumption context for enabling the dynamic instantiation of video services in edge-positioned virtualized Content...
Conference Paper
Internet of Things (IoT) solutions are becoming very popular since everything can now be processed through a technological service. Currently, data is digital information, creating the need to design platforms and services that fill the gap between data sensors and processing frameworks. IoT Platforms are responsible for attaching data sources with...
Article
Full-text available
Network slicing emerges as a key technology in next generation networks, boosted by the integration of software‐defined networking and network functions virtualization. However, while allowing resource sharing among multiple tenants, such networks must also ensure the security requirements needed for the scenarios they are employed. This letter pre...
Conference Paper
The recent expansion of metrification on a daily basis has led to the production of massive quantities of data, which in many cases correspond to time series. To streamline the discovery and sharing of meaningful information within time series, a multitude of analysis software tools were developed. However, these tools lack appropriate mechanisms t...
Conference Paper
Full-text available
The fact that most IoT solutions are provided by third parties, along with the pervasiveness of the collected data, raises privacy and security concerns. There is a need to verify which data is being sent to the third party, as well as preventing those channels from becoming an exploitation avenue. We propose to use existing API definition language...
Article
The new communication paradigm established by social media along with its growing popularity in recent years contributed to attract an increasing interest of several research fields. One such research field is the field of event detection in social media. The contribution of this article is to implement a system to detect newsworthy events in Twitt...
Article
Uniform Resource Locators reveal a significant amount of metadata about user actions, in ways that inherently violate our natural expectations of privacy. Adequately protecting this information is an important issue tackled (sometimes partially) in areas such as secure transport protocols, terminal encryption and caching strategies. A different (an...
Article
Full-text available
This paper proposes a framework that optimizes network slicing provisioning in over‐the‐top (OTT) scenarios, by reducing occupied resources of slices from where the User Equipment (UE) handovers from. To achieve this, the framework leverages an existing Software Defined Networking (SDN)‐based UE virtualisation scheme, which allows to instantiate in...
Article
Full-text available
Network operators are under pressure to offer efficient network-based services while keeping service deployment costs to a minimum. Network Functions Virtualization (NFV) can potentially revolutionize network-based services bringing low deployment costs for network operators. NFV has been introduced to ultimately extend the non-proprietary and open...
Conference Paper
Full-text available
The increasing number of small, cheap devices full of sensing capabilities lead to an untapped source of information that can be explored to improve and optimize several systems. Yet, hand in hand with this growth goes the increasing difficulty to manage and organize all this new information. In fact, it becomes increasingly difficult to properly e...
Article
Full-text available
The fifth generation (5G) telecommunications network aims not only to enhance traffic performance and allow efficient management, but also to enable it to dynamically and flexibly adapt to the traffic demands of different vertical scenarios. In order to support that enablement, the underlying network procedures (i.e., network functions) are being v...
Article
Full-text available
5G systems are envisioned to support numerous delay-sensitive applications such as tactile Internet, mobile gaming, and augmented reality. Such applications impose new demands on service providers in terms of the Quality of Service (QoS) provided to the end-users. Achieving these demands in mobile 5G-enabled networks represents a technical and admi...
Conference Paper
Full-text available
The heterogeneity of 5G requirements commands more complex network architectures, imposing the need for network orchestration. ETSI NFV MANO is the standard which defines a common framework for vendors and operators to integrate their orchestration efforts. In this paper, we evaluated how an ETSI NFV MANO compliant orchestrator (OSM) fares while or...
Conference Paper
Full-text available
Heating appliances such as HVAC systems consume around 48% of the energy power spent on household appliances every year 1. With this in mind, it is relevant to increase the efficiency of those solutions. Moreover, a malfunctioning device can increase this value even further. Thus, there is a need to develop methods that allow the identification of...
Article
Clean-slate network architectures have been proposed in the recent years as an alternative to the current IP-based architecture. However, a complete replacement of the current Internet architecture is a difficult and lengthy process. A heterogeneous Future Internet where several network architectures coexist simultaneously can be expected. Nonethel...