Victor Muntés-Mulero

Victor Muntés-Mulero
CA Technologies · Strategic Research

PhD

About

91
Publications
26,948
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,435
Citations
Citations since 2016
35 Research Items
1072 Citations
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
Additional affiliations
June 2011 - December 2017
CA Technologies
Position
  • VP, Strategic Research
September 2003 - June 2011
Universitat Politècnica de Catalunya
Position
  • Professor (Associate)

Publications

Publications (91)
Article
EU data protection law requires that digital service providers and system developers put in place technical measures that are adequate to protect children’s informational privacy. The stringent legal obligations of implementing principles of data protection by design into digital systems intensified the engineers’ need to create processes and techn...
Article
Context Over the last decade, Agile methods have changed the software development process in an unparalleled way and with the increasing popularity of Big Data, optimizing development cycles through data analytics is becoming a commodity. Objective Although a myriad of research exists on software analytics as well as on Agile software development...
Chapter
To unleash the full potential of IoT, it is critical to facilitate threation and operation of trustworthy Smart IoT Systems (SIS). Software development and delivery of SIS would greatly benefit from DevOps as devices and IoT services requirements for reliability, quality, security and safety are paramount. However, DevOps practices are far from wid...
Preprint
Industry in all sectors is experiencing a profound digital transformation that puts software at the core of their businesses. In order to react to continuously changing user requirements and dynamic markets, companies need to build robust workflows that allow them to increase their agility in order to remain competitive. This increasingly rapid tra...
Article
Full-text available
Service-oriented architectures and microservices define two ways of designing software with the aim of dividing an application into loosely-coupled services that communicate among each other. This translates into rapid development, where each service is developed and deployed by small teams, enabling continuous shipping of new features and fast-evo...
Article
Full-text available
Industry in all sectors is experiencing a profound digital transformation that puts software at the core of their businesses. To react to continuously changing user requirements and dynamic markets, companies need to build robust workflows that allow them to increase their agility in order to remain competitive. This increasingly rapid transformati...
Article
Full-text available
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679, GDPR) and security assurance are currently two major challenges of Cloud‐based systems. GDPR compliance implies both privacy and security mechanisms definition, enforcement and control, including evidence collection. This study presents a novel DevOps fra...
Chapter
Situation faced: In the era of pervasive digitalization, the airline IT software industry is facing a number of challenges from the combination of new distribution channels, social media, Big data, Cloud Computing, etc. One of the major challenges in creating smart and scalable software applications is how to tackle security challenges when compone...
Chapter
To unleash the full potential of IoT and flourishing innovations in application domains such as eHealth or smart city, it is critical to facilitate the creation and operation of trustworthy Smart IoT Systems (SIS). Since SIS typically operate in a changing and often unpredictable environment, the ability of these systems to continuously evolve and...
Preprint
Full-text available
Performing diagnostics in IT systems is an increasingly complicated task, and it is not doable in satisfactory time by even the most skillful operators. Systems and their architecture change very rapidly in response to business and user demand. Many organizations see value in the maintenance and management model of NoOps that stands for No Operatio...
Article
Conducting empirical research in software engineering industry is a process, and as such, it should be generalizable. The aim of this paper is to discuss how academic researchers may address some of the challenges they encounter during conducting empirical research in the software industry by means of a systematic and structured approach. The proto...
Technical Report
Full-text available
In this technical report, we show insights and results of operational data analysis from petascale supercomputer Mistral, which is ranked as 42nd most powerful in the world as of January 2018. Data sources include hardware monitoring data, job scheduler history, topology, and hardware information. We explore job state sequences, spatial distributio...
Chapter
Several business-to-business and business-to-consumer services are provided as a human-to-human conversation in which the provider representative guides the conversation towards its resolution based on her experience, following internal guidelines. Several attempts to automatize these services are becoming popular, but they are currently limited to...
Chapter
Full-text available
In the application economy, digital business initiatives are at the forefront of the growth strategy of many companies. Cloud based solutions offer a significant competitive advantage for both large companies and SMEs, leading to a rapid increase in the number of Cloud Service Providers (CSP). An important CSP driver is the improvement of consumers...
Article
Full-text available
In this paper we design and evaluate a Deep-Reinforcement Learning agent that optimizes routing. Our agent adapts automatically to current traffic conditions and proposes tailored configurations that attempt to minimize the network delay. Experiments show very promising performance. Moreover, this approach provides important operational advantages...
Conference Paper
This paper presents an overview of current needs on data provenance and data privacy, and discusses state-of-the-art results in this area. The paper highlights the difficulties that we need to face and finishes with some lines that require further work.
Article
Full-text available
In-memory cluster computing platforms have gained momentum in the last years, due to their ability to analyse big amounts of data in parallel. These platforms are complex and difficult-to-manage environments. In addition, there is a lack of tools to better understand and optimize such platforms that consequently form the backbone of big data infras...
Conference Paper
Cloud service selection is a complex process that requires assessment of not only individual features of a cloud service but also its ability to interoperate with an ecosystem of cloud services. In this position paper, we address the problem by devising metrics to measure the impact of interoperability among the cloud services to guide the cloud se...
Article
Full-text available
Automation and computer intelligence to support complex human decisions becomes essential to manage large and distributed systems in the Cloud and IoT era. Understanding the root cause of an observed symptom in a complex system has been a major problem for decades. As industry dives into the IoT world and the amount of data generated per year grows...
Conference Paper
Full-text available
The explosion in the number of Internet of Things (IoT) and fog computing applications and the need for large data centers to host cloud and web applications make it necessary to create mechanisms to effectively control complex, heterogeneous and distributed digital ecosystems. These rapidly developing IT markets require distributed, fast and lean...
Conference Paper
Full-text available
The automated comparison of process models has received increasing attention in the last decade, due to the growing existence of process models and repositories, and the consequent need to assess similarities between the underlying processes. Current techniques for process model comparison are either structural (based on graph edit distances), or b...
Article
The research community has considered the application of Artificial Intelligence (AI) techniques to control and operate networks. A notable example is the Knowledge Plane as proposed by D.Clark et al. Such techniques have not been extensively prototyped or deployed in the field yet. In this paper, we explore the reasons for the lack of adoption and...
Article
The growth in the number of cloud computing users has led to the availability of a variety of cloud based services provided by different vendors. This has made the task of selecting suitable set of services quite difficult. There has been a lot of research towards the development of suitable decision support system (DSS) to assist users in making a...
Conference Paper
Full-text available
Internet and communication technologies have lowered the costs for communities to collaborate, leading to new services and collectively built infrastructures like community networks. Community networks get formed when individuals and local organisations from a geographic area team up to create and run a community-owned IP network to satisfy the com...
Article
Although crowdsourcing has been proven efficient as a mechanism to solve independent tasks for on-line production, it is still unclear how to define and manage workflows in complex tasks that require the participation and coordination of different workers. Despite the existence of different frameworks to define workflows, we still lack a commonly a...
Conference Paper
The increasing adoption of crowdsourcing for commercial and industrial purposes rises the need for creating sophisticated mechanisms in crowd-based digital platforms for efficient worker management. One of the main challenges in this area is worker motivation and skill set control and its impact on the output quality. The quality delivered by the w...
Article
Anonymization techniques that provide k-anonymity suffer from loss of quality when data dimensionality is high. Microaggregation techniques are not an exception. Given a set of records, attributes are grouped into non-intersecting subsets and microaggregated independently. While this improves quality by reducing the loss of information, it usually...
Article
With the unstoppable growth of applications requiring data to be represented as graphs, the interest for keeping this type of data private also grows. While many efforts have been made in order to anonymize tabular data, anonymizing graphs is a recent topic of research. Previous work on graph anonymization assumes that techniques proposed for tabul...
Patent
Full-text available
Disclosed is a data processing system, and an article of manufacturing for use with the data processing system. The data processing system joins rows associated with a column of a source table with rows associated with a column of a target table. The data processing system includes a source node containing the source table and including a target no...
Conference Paper
Vendor lock-in and cloud outages are two impor-tant challenges that make IT managers reluctant in widely adopting the cloud within the enterprise. Vendor lock-in happens when the adoption of cloud provider-specific tech-nologies and APIs forces consumers to stay with the same provider even if they would like to change. Cloud outages can happen to a...
Chapter
Full-text available
The generalized use of the Internet and social network platforms has changed the way human beings establish relations, collaborate and share resources. In this context, crowdsourcing (or crowd computing) is becoming a common solution to provide answers to complex problems by automatically coordinating the potential of machines and human beings work...
Conference Paper
Full-text available
Machine Translation (MT) is said to be the next lingua franca. With the evolution of new technologies and the capacity to produce a humungous number of written digital documents, human translators will not be able to translate documentation fast enough. However, some applications require a level of quality that is still beyond that provided by MT....
Article
Full-text available
As the complexity of enterprise systems increases, the need for monitoring and analyzing such systems also grows. A number of companies have built sophisticated monitoring tools that go far beyond simple resource utilization reports. For example, based on instrumentation and specialized APIs, it is now possible to monitor single method invocations...
Conference Paper
The increasing amount of graph like data from social networks, science and the web has grown an interest in analyzing the relationships between different entities. New specialized solutions in the form of graph databases, which are generic and able to adapt to any schema as an alternative to RDBMS, have appeared to manage attributed multigraphs eff...
Article
The contradictory requirements of data privacy and data analysis have fostered the development of statistical disclosure control techniques. In this context, microaggregation is one of the most frequently used methods since it offers a good trade-off between simplicity and quality. Unfortunately, most of the currently available microaggregation alg...
Chapter
In this chapter, we review different graph implementation alternatives that have been proposed in the literature. Our objective is to provide the readers with a broad set of alternatives to implement a graph, according to their needs. We pay special attention to the techniques that enable the management of large graphs. We also include a descriptio...
Article
The need for managing massive attributed graphs is becoming common in many areas such as recommendation systems, proteomics analysis, social network analysis or bibliographic analysis. This is making it necessary to move towards parallel systems that allow managing graph databases containing millions of vertices and edges. Previous work on distribu...
Article
Presentamos el algoritmo OCA para buscar comunidades solapadas en grafos grandes, como por ejemplo la Wikipedia con 1,6×107 nodos y 1,8×108 aristas. OCA se basa en la búsqueda iterativa de subconjuntos localmente óptimos para una función objetivo, representando los subconjuntos como vectores suma de una configuración virtual de vectores. Analizamos...
Conference Paper
Graph Database Management systems (GDBs) are gaining popularity. They are used to analyze huge graph datasets that are naturally appearing in many application areas to model interrelated data. The objective of this paper is to raise a new topic of discussion in the benchmarking community and allow practitioners having a set of basic guidelines for...
Conference Paper
Full-text available
Main memory database management systems have become essential for response-time-bounded applications, such as those in telecommunications systems or Internet, where users frequently access a table in order to get information or check whether an element exists, and require the response to be as fast as possible. Continuous data growth is making it u...
Conference Paper
Full-text available
Traversing massive graphs as efficiently as possible is essential for many applications. Many common operations on graphs, such as calculating the distance between two nodes, are based on the Breadth First Search traversal. However, because of the exhaustive exploration of all the nodes and edges of the graph, this operation might be very time cons...
Conference Paper
Full-text available
Finding decompositions of a graph into a family of clusters is crucial to understanding its underlying structure. While most existing approaches focus on partitioning the nodes, real-world datasets suggest the presence of overlapping communities. We present OCA, a novel algorithm to detect overlapped communities in large data graphs. It outperforms...
Chapter
Many situations demand for publishing confidential data without revealing the identity of data owners. For this purpose, anonymization methods are specially important in order to minimize both the disclosure risk and the information loss of the released data. In this chapter, we describe a methodology for numerical data anonymization based on a nov...
Conference Paper
With the increase of available public data sources and the interest for analyzing them, privacy issues are becoming the eye of the storm in many applications. The vast amount of data collected on human beings and organizations as a result of cyberinfrastructure advances, or that collected by statistical agencies, for instance, has made traditional...
Conference Paper
Microaggregation is one of the most commonly employed microdata protection methods. This method builds clusters of at least k original records and replaces the records in each cluster with the centroid of the cluster. Usually, when records are complex, i.e., the number of attributes of the data set is large, this data set is split into smaller bloc...
Conference Paper
Handling very large volumes of confidential data is becoming a common practice in many organizations such as statistical agencies. This calls for the use of protection methods that have to be validated in terms of the quality they provide. With the use of Record Linkage (RL) it is possible to compute the disclosure risk, which gives a measure of th...
Article
The monitoring of data streams is a very important issue in many different areas. Aspects such as accuracy, the speed of response, the use of memory and the adaptability to the changing nature of data may vary in importance depending on the situation. Examples such as Web page access monitoring, approximate aggregation in relational queries or IP m...
Conference Paper
The need for data privacy motivates the development of new methods that allow to protect data minimizing the disclosure risk without losing valuable statistical information. In this paper, we propose a new protection method for numerical data called Ordered Neural Networks (ONN). ONN presents a new way to protect data based on the use of Artificia...
Conference Paper
Full-text available
ABSTRACT In this demonstration we show,the Bibliographic Explo- ration tool BIBEX. BIBEX is based on the graph database query engine DEX and,integrates both the Citeseer and DBLP databases. BIBEX can be found in our web site at www.dama.upc.edu/bibex. BIBEX allows for complex bibliographic search and shows the results of its queries as a combinatio...
Conference Paper
Efficiency of memory-intensive operations is a key factor in obtaining good performance during multi-join query processing. The pipelined execution of these queries forces the operations in the query plan to be processed concurrently. Making a wrong decision regarding the amount of memory allocated for such operations can have a drastic impact on t...
Article
Full-text available
The amount of confidential information ac-cessible through the Internet is growing con-tinuously. In this scenario, the improvement of anonymizing methods becomes crucial to avoid revealing sensible information of indi-viduals. Among several protection methods proposed, those based on the use of linear re-gressions are widely utilized. However, the...