Alex Borges Vieira

ORCID: 0000-0003-0821-126X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Complex Network Analysis Techniques
  • Blockchain Technology Applications and Security
  • Software-Defined Networks and 5G
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Network Traffic and Congestion Control
  • Energy Efficient Wireless Sensor Networks
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Optical Network Technologies
  • EEG and Brain-Computer Interfaces
  • Underwater Vehicles and Communication Systems
  • Network Security and Intrusion Detection
  • Optical Wireless Communication Technologies
  • Advanced Memory and Neural Computing
  • Power Line Communications and Noise
  • Wireless Body Area Networks
  • Image and Video Quality Assessment
  • Spam and Phishing Detection
  • Data Stream Mining Techniques
  • Neuroscience and Neural Engineering
  • Multimedia Communication and Technology
  • Human Mobility and Location-Based Analysis
  • Privacy-Preserving Technologies in Data

Universidade Federal de Juiz de Fora
2016-2025

Universidade Federal de Minas Gerais
2004-2024

Universidade Federal da Bahia
2023

Secretaria da Educação do Estado da Bahia
2023

Universidade Federal de Viçosa
2020-2021

Universidade Federal do Paraná
2020

Weatherford College
2020

Universidade Federal de Lavras
2020

Laboratoire d'Informatique de Paris-Nord
2016

Universidade Federal do Espírito Santo
2016

During the last decade, exponential growth of mobile devices and wireless services created a huge demand for radio frequency-based technologies. Meanwhile, lighting industry has been revolutionized due to popularization LED light bulbs, which are more economical efficient. In that context, visible communication (VLC) is disruptive technology based on LEDs offers free spectrum high data rate, can potentially serve as complementary current frequency standards. this paper, we present...

10.1109/comst.2019.2913348 article EN IEEE Communications Surveys & Tutorials 2019-01-01

Despite the growing interest in cryptocurrencies, delays incurred to confirm transactions are one of factors that hamper wide adoption systems such as Bitcoin. Bitcoin usually confirmed short periods (minutes), but still much larger than conventional credit card (seconds). In this work, we propose a framework encompassing machine learning and queueing theory model (i) identify which will be confirmed; (ii) characterize confirmation time transactions. The proposed accounts for activity blocks...

10.1145/3308897.3308952 article EN ACM SIGMETRICS Performance Evaluation Review 2019-01-25

Summary Ethereum is a new blockchain‐based platform that also capable of running smart contracts. Despite its increasing popularity, there lack studies on characterizing this system, in special the fees paid by users and respective delay to confirm transactions, is, pending time . In sense, we study main features transactions evaluate common belief—for blockchain systems rely proof work—that who pay higher will have their confirmed faster. Specifically, collect information about 7.2 million...

10.1002/nem.2113 article EN International Journal of Network Management 2020-07-06

In the literature, majority of research efforts in power line communication (PLC) has been focused on physical layer order to deal with issues such as time varying behavior loads electric systems, presence high impulsive noise, occurrence impedance mismatching, widespread use unshielded cables, and existence coupling losses. While some works have also carried out PLC medium access control (MAC) sublayer, there are scopes for further address novel demands associated cyber systems that need...

10.1109/comst.2018.2865835 article EN IEEE Communications Surveys & Tutorials 2018-08-16

The Darknet is a set of networks and technologies, having as fundamental principles anonymity security. In many cases, they are associated with illicit activities, opening space for malware traffic attacks to legitimate services. To prevent misuse necessary classify characterize its existing traffic. this paper, we the real available from CIC-Darknet2020 dataset. that sense, performed feature extraction grouped possible subnets an n-gram approach. Furthermore, evaluated relevance best...

10.1016/j.iswa.2023.200199 article EN cc-by-nc-nd Intelligent Systems with Applications 2023-02-17

Structural health monitoring (SHM) is critical for ensuring the safety and longevity of structures, yet existing methodologies often face challenges such as high data dimensionality, lack interpretability, reliance on extensive label datasets. Current research in SHM has primarily focused supervised approaches, which require significant manual effort labeling are less adaptable to new environments. Additionally, large volume generated from dynamic structural campaigns includes irrelevant or...

10.3390/infrastructures10020032 article EN cc-by Infrastructures 2025-01-28

There is an ever-increasing interest in investigating dynamics time-varying graphs (TVGs). Nevertheless, so far, the notion of centrality TVG scenarios usually refers to metrics that assess relative importance nodes along temporal evolution dynamic complex network. For some scenarios, however, more important than identifying central under a given node definition key time instants for taking certain actions. In this paper, we thus introduce and investigate TVGs. Analogously centrality,...

10.1142/s021952591550023x article EN Advances in Complex Systems 2015-11-01

The advent of the Internet Things (IoT) has revolutionized way we, as a society, perform different daily tasks, such healthcare. Health (IoHT) is an example IoT specialization handling sensitive user data and applications requiring solutions to address security privacy issues. IoHT requires mechanisms in communication. However, these need consider limitations devices Hence, symmetric cryptography suitable once it uses less computational communication resources than asymmetric cryptography....

10.1109/access.2022.3143210 article EN cc-by-nc-nd IEEE Access 2022-01-01

Abstract In this paper we focus on knowledge extraction from large-scale wireless networks through stream processing. We present the primary methods for sampling, data collection, and monitoring of characterize as a machine learning problem big show main trends in processing frameworks. Additionally, explore preprocessing, feature engineering, algorithms applied to scenario network analytics. address challenges research projects Finally, future perspectives, such deep reinforcement...

10.1186/s13174-020-00127-2 article EN cc-by Journal of Internet Services and Applications 2020-10-19

Cloud storage systems are currently very popular, generating a large amount of traffic. Indeed, many companies offer this kind service, including worldwide providers such as Dropbox, Microsoft and Google. These companies, well new entering the market, could greatly benefit from knowing typical workload patterns that their services have to face in order develop more cost-effective solutions. However, despite recent analyses usage possible performance bottlenecks, no previous work investigated...

10.1109/icc.2014.6883506 article EN 2014-06-01

Content Centric Networking (CCN) represents an important change in the current operation of Internet, prioritizing content over communication between end nodes. Routers play essential role CCN, since they receive requests for a given and provide caching most popular ones. They have their own forwarding strategies policies contents. Despite number works on this field, experimental evaluation different algorithms yet demands huge effort routers programming. In paper we propose SDCCN, SDN...

10.1109/aina.2016.86 article EN 2016-03-01

With the significant increase in mobile users connected to wireless network, coupled with escalating energy consumption and risk of network saturation, search for resource management has become paramount. Managing several access points throughout a whole region is hugely relevant this context. Moreover, must keep its Service Level Agreement, regardless number users. that mind, work, we propose four prediction models allow one predict on network. Once been predicted, resources can be properly...

10.1016/j.comnet.2024.110762 article EN cc-by-nc-nd Computer Networks 2024-09-02

Underwater sensor networks (USNs) are an emerging research field, with applications ranging from military to environment monitoring. The authors present innovative USN application: autonomous wireless lake Such technology can be applied monitor lakes, especially for limnology, where scientists determine water quality by measuring environmental variables such as temperature, pH, and dissolved oxygen. This application, which collect analyze those physical quantities in near real time, could...

10.1109/mcse.2017.2581140 article EN Computing in Science & Engineering 2018-01-01

Peer-to-Peer live streaming systems help content providers and distributors drastically reduce bandwidth costs by sharing among peers. Researchers have dedicated significant effort developing techniques to discourage or exclude uncooperative peers from peer-to-peer systems. However, users are often unable cooperate, e.g., using a mobile device with limited, costly bandwidth. We study the impact of on video discontinuity latency PlanetLab. find that simple mechanisms, like forwarding data...

10.1109/p2p.2013.6688712 article EN 2013-09-01
Coming Soon ...