Daniel Feitosa

ORCID: 0000-0001-9371-232X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Advanced Software Engineering Methodologies
  • Software System Performance and Reliability
  • Software Reliability and Analysis Research
  • Open Source Software Innovations
  • Software Engineering Techniques and Practices
  • Big Data and Business Intelligence
  • Cloud Computing and Resource Management
  • Cloud Data Security Solutions
  • Digital Marketing and Social Media
  • Service-Oriented Architecture and Web Services
  • Model-Driven Software Engineering Techniques
  • Security and Verification in Computing
  • Business Process Modeling and Analysis
  • Scientific Computing and Data Management
  • Advanced Malware Detection Techniques
  • Green IT and Sustainability
  • Software Testing and Debugging Techniques
  • Advanced Neural Network Applications
  • Information and Cyber Security
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Technology Adoption and User Behaviour
  • Context-Aware Activity Recognition Systems
  • E-commerce and Technology Innovations

University of Groningen
2014-2024

Fryske Akademy
2020-2021

Institute on Governance
2020

Universidade de São Paulo
2010-2017

Sustainable tourism research focuses on mitigating or remediating environmental, social and economic impacts tourism. In the past years, Big Data approaches have been applied to field of allowing for remarkable progress. However, there seems be little evidence support that such are an inspiration sustainable being implemented. this context, we aim obtain a comprehensive overview use in address various issues understand how can decision-making scenarios. To end, paper reports results...

10.1080/13683500.2021.1974358 article EN cc-by-nc-nd Current Issues in Tourism 2021-09-14

Abstract The rapid adoption of digital technologies has revolutionized business operations and introduced emerging concepts such as Digital Twin (DT) technology, which the potential to predict system responses before they occur, making it an attractive option for smart sustainable tourism. However, implementing DT software systems poses significant challenges, including compliance with regulations effective communication among stakeholders, concerns surrounding security, privacy, trust use...

10.1007/s10676-023-09730-w article EN cc-by Ethics and Information Technology 2023-11-16

Reference architectures have emerged as a special type of software architecture that achieves well-recognized understanding specific domains, promoting reuse design expertise and facilitating the development, standardization, evolution systems. Because their advantages, several reference been proposed also successfully used, including in industry. However, most these are still built using an ad-hoc approach, lacking systematization to construction. If existing, approaches could motivate...

10.1109/wicsa.2014.25 preprint EN 2014-04-01

Modern AI practices all strive towards the same goal: better results. In context of deep learning, term "results" often refers to achieved accuracy on a competitive problem set. this paper, we adopt an idea from emerging field $\color{green}{\text{Green AI}}$ consider energy consumption as metric equal importance and reduce any irrelevant tasks or usage. We examine training stage learning pipeline sustainability perspective, through study hyperparameter tuning strategies model complexity,...

10.1109/cain58948.2023.00012 article EN 2023-05-01

10.1016/j.jss.2023.111670 article EN Journal of Systems and Software 2023-03-01

Managing technical debt (TD) is essential for maintaining long-term software projects. Nonetheless, the time and cost involved in management (TDM) are often high, which may lead practitioners to omit TDM tasks. The adoption of tools, particularly usage automated solutions, can potentially reduce time, cost, effort involved. However, tools remains low, indicating need further research on automation. To address this problem, study aims at understanding activities discussing with respect...

10.48550/arxiv.2502.03153 preprint EN arXiv (Cornell University) 2025-02-05

Context: Systematic mapping provides an overview of a research area to assess the quantity evidence existing on topic interest. In spite its relevance, establishment consistent categories and classification primary studies in these are manually conducted. Objective: We propose approach, named SM-VTM (Systematic Mapping based Visual Text Mining), support categorization stages systematic using Mining (VTM), aiming at reducing time effort required this process. Method: established SM-VTM,...

10.14236/ewic/ease2010.5 article EN cc-by Electronic workshops in computing 2010-04-01

Abstract Gang of Four (GoF) patterns are well‐known best practices for the design object‐oriented systems. In this paper, we aim at empirically assessing their relationship to energy consumption, ie, a performance indicator that has recently attracted attention both researchers and practitioners. To achieve goal, investigate pattern‐participating methods (ie, those play role within pattern) compare consumption functionally equivalent alternative (nonpattern) solutions. We obtained solution...

10.1002/smr.1851 article EN Journal of Software Evolution and Process 2017-01-31

Abstract In recent years, the evolution of software ecosystems and detection technical debt received significant attention by researchers from both industry academia. While a few studies that analyze various aspects already exist, to best our knowledge, there is no large‐scale study focuses on remediation over time in Python projects—that is, one most popular programming languages at moment. this paper, we 44 open‐source projects belonging Apache Software Foundation. We focus type amount...

10.1002/smr.2319 article EN cc-by Journal of Software Evolution and Process 2020-11-18

During the development of Critical Embedded Systems (CES), quality attributes that are critical for them (e.g., correctness, security, etc.) must be guaranteed. However, this often leads to complex trade-offs, since non-critical qualities reusability, understandability, may compromised. In study, we aim at empirically investigating existence on implemented architecture, among versions open source CESs, and compare with those systems from other application domains. The results study suggest...

10.1145/2737182.2737190 article EN 2015-04-22

Technical Debt (TD) can be paid back either by those that incurred it or others. We call the former self-fixed TD, and is particularly effective, as developers are experts in their own code best-suited to fix corresponding TD issues. To what extent self-fixed, which types of more likely remediation time shorter than non-self-fixed TD? This paper attempts answer these questions. It reports on an empirical study analyzes issues five (i.e., Code, Defect, Design, Documentation Test), captured...

10.1145/3387906.3388621 article EN 2020-06-28

Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI

10.2139/ssrn.4422122 preprint EN 2023-01-01

Software architectures have played a significant role in determining the success of software systems. In this perspective, lot work been conducted and considerable knowledge architecture area has accumulated. another systematic mapping is technique that provides an overview research to assess quantity evidence existing on topic interest. Thus, main objective paper introduce order explore, understand, organize summarize knowledge, aiming at contributing area. A simple example use presented...

10.1145/1833335.1833340 article EN 2010-05-02

The multi-agent patrolling problem has recently received growing attention from the community due to wide range of potential applications. This work presents an autonomous system composed by 4 intelligent robots that can freely move through indoor environment and detect intruders. use a localization/navigation artificial neural network (ANN) trained key features environment. These are used identify context changes, being as input finite state machine (FSM), allowing topological map...

10.1109/cbsec.2012.14 article EN 2012-05-01
Coming Soon ...