- Software Engineering Techniques and Practices
- Software Engineering Research
- Software Reliability and Analysis Research
- Big Data and Business Intelligence
- Software System Performance and Reliability
- Bayesian Modeling and Causal Inference
- Data Quality and Management
- Team Dynamics and Performance
- Collaboration in agile enterprises
- IoT and Edge/Fog Computing
- Data Mining Algorithms and Applications
- Systems Engineering Methodologies and Applications
- Advanced Software Engineering Methodologies
- Open Source Software Innovations
- Network Security and Intrusion Detection
- Organizational and Employee Performance
- Manufacturing Process and Optimization
- Software Testing and Debugging Techniques
- Healthcare Technology and Patient Monitoring
- Academic Research in Diverse Fields
- AI-based Problem Solving and Planning
- Semantic Web and Ontologies
- Youth, Drugs, and Violence
- Employee Performance and Management
- Flexible and Reconfigurable Manufacturing Systems
Universidade Federal de Campina Grande
2016-2025
Instituto Federal de Educação Ciência e Tecnologia da Paraíba
2015-2021
Software (Spain)
2021
Instituto Federal de Educação, Ciência e Tecnologia do Pará
2015-2018
Universidade Federal de Mato Grosso
2018
Olivet Nazarene University
2011
Internet of Things (IoT) resources cooperate with themselves for requesting and providing services. In heterogeneous complex environments, those must trust each other. On-Off attacks threaten the IoT security through nodes performing good bad behaviors randomly, to avoid being rated as a menace. Some countermeasures demand prior levels knowledge time classify node behavior. some cases, malfunctioning can be mismatched an attacker. this paper, we introduce smart management method, based on...
This paper presents a research investigation into the application of Artificial Intelligence (AI) within code review processes, aiming to enhance quality and efficiency this critical activity. An IntelliJ IDEA plugin was developed achieve objective, leveraging GPT-3.5 as foundational framework for automated assessment. The tool comprehensively analyses snippets pinpoint syntax semantic issues while proposing potential resolutions. study showcases tool's architecture, configuration methods,...
In today's rapidly changing business landscape, innovation is recognized as a critical driver of growth and competitiveness for organizations. As businesses strive to remain agile respond evolving customer demands, the need effective tools assess performance has become increasingly vital. Problem Statement: To better understand Research, Development, Innovation (RD&I) projects, it might be valuable investigate implement new approaches improve current indexes. Such exploration could allow...
<italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Context:</i> Software team formation is an important project management activity. However, forming appropriate teams a challenge for most of the companies. xmlns:xlink="http://www.w3.org/1999/xlink">Objective:</i> To analyze and synthesize state art on software research. Additionally, we aim to organize identified body knowledge in as taxonomy....
Trusted Execution Environments have been applied to improve data security in many distinct application scenarios since they enable processing a separate and protected region of memory. To investigate how this technology has the different IoT scenarios, which commonly deal with specific characteristics such as device resource constraints, we carried out systematic literature review. For this, selected analyzed 58 papers from conferences journals, identifying main solutions TEE employed. We...
One of the main issues an agile software project is how to accurately estimate development effort. In 2014, a Systematic Literature Review (SLR) regarding this subject was published. The authors concluded that there were several gaps in literature, such as low level accuracy techniques and little consensus on appropriate cost drivers. goal our work provide updated review state art based reference SLR work. We applied Forward Snowballing approach, which seed set included former its selected...
Understanding the human body dynamics in response to any medical treatment makes automated decision support systems for healthcare quite complex. In this paper, we present an architecture Medical Cyber-Physical Systems help developers generate test cases their applications using models already validated. It is based on component simulate operation of devices and patient data. guidelines a clinical database have been used together with statistical techniques create regression that vital...
Security is a key concern in Internet of Things (IoT) designs. In heterogeneous and complex environment, service providers requesters must trust each other. On-off attack sophisticated threat which malicious device can perform good bad services randomly to avoid being rated as low node. Some countermeasures demands prior level knowing time classify node behavior. this paper, we introduce Smart Middleware that automatically assesses the IoT resources trust, evaluating attributes protect...
Forming effective teams is an essential but challenging task, especially for organizations that carry out multiple projects simultaneously, a problem known as the Multiple Team Formation (MTF) problem. The literature presents several solutions MTF problem, mostly modeling it search However, existing are not suitable Scrum projects. We addressed this gap by developing approach composed of two main steps. First, we designed Structured Task Model to support creating developers' profiles given...
Technical Debt (TD) is a metaphor reflecting technical compromises that can yield short-term benefits but might hurt the long-term health of software system. With increasing amount data generated when performing development activities, an emergent research field has gained attention: applying Intelligent Techniques to solve Software Engineering problems. were used explore for knowledge discovery, reasoning, learning, planning, perception, or supporting decision-making. Although these...
There is a high rate of software development projects that fails. Whenever problems can be detected ahead time, may have better chances success, and therefore save money time. In this paper, we present probabilistic model to help ScrumMasters apply Scrum in organizations. The model's goal provide information the project's ScrumMaster him aware enough guide team improve success. We published survey collect data for study validated by applying it scenarios. results obtained so far show promising.
Abstract Scrum is a simple process to understand, but hard adopt. Therefore, there need for resources assist on its adoption. In this paper, we present the followed build Bayesian network assessment of quality software in context projects. The model provides data help Masters lead improvement business value delivery teams. divided into 2 phases. first phase, built based expert knowledge extracted from literature and experts. We used top‐down approach reasoning define key metrics necessary...
The software industry's current decision-making relating to product/project management and development is largely done in a value neutral setting, which cost the primary driver for every decision taken. However, numerous studies have shown that critical success factor differentiates successful products/projects from failed ones lie domain. Therefore, remain competitive, innovative grow, companies must change cost-based value-based decisionmaking where decisions taken are best company's...
<italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Context</i> - Agile Software Development (ASD) and Reuse-Driven Engineering (RDSE) are well-accepted strategies to improve the efficiency of software processes. A challenge integrate both approaches is that ASD relies mostly on tacit knowledge, hampering reuse development assets. An opportunity enable RDSE for by improving traceability between user stories (USs), most used notation register...
(Context) Code smells indicate poor coding practices or design flaws, suggesting deeper software quality issues. While addressing code promptly improves quality, traditional detection techniques often fail in continuous during development. (Problem Statement) More recently, Interactive Detection (ID) technique has been proposed, enabling the of continuously. Although use this by developers and organizations is promising, there are no practical recommendations for its context (Goal) The...
As opposed to traditional software development, agile development encourages requirements change. Given the importance of change management, there is an increasing number studies discussing this process in both and developments. By examining existing works, we observed that are many ways improve management Aiming addressing research gap, our study focus on defining a handle Agile Requirement Change Management (ARCM), as well identifying practices support ARCM process. We performed systematic...
Despite the quantity of software metrics that has been proposed, their adoption and application by practitioners limited. A challenge to use is interpret them perform assessments predictions. The existing approaches assist with interpretation consists defining thresholds determine whether value a metric acceptable. These are not enough ensure correct metrics' interpretation, because they ignore risks other subjective factors influence measurement process. This might affect consequently,...
Technical Debt (TD) refers to the consequences of taking shortcuts when developing software. Management (TDM) becomes complex since it relies on a decision process based multiple and heterogeneous data, which are not straightforward be synthesized. In this context, there is promising opportunity use Intelligent Techniques support TDM activities these techniques explore data for knowledge discovery, reasoning, learning, or supporting decision-making. Although can used improving activities, no...
Code smell detection is traditionally supported by Non-Interactive Detection (NID) techniques, which enable devel-opers to reveal smells in later software versions. These techniques only the source code upon an explicit developer request and do not support progressive interaction with affect code. The are detected, higher effort refactor affected notion of Interactive (ID) has emerged address NID's limitations. An ID technique reveals instances without request, encouraging early smells. Even...