27 results on '"Luís Rodrigues"'
Search Results
2. Uptake of lipid core nanoparticles by fragments of tissues collected during cerebral tumor excision surgeries: hypotheses for use in drug targeting therapy
- Author
-
Pereira, Edmundo Luís Rodrigues, Feio, Danielle Cristinne Azevedo, Tavares, João Pojucan Lobo, Morikawa, Natalia Megumi, Deus, Debora Fernandes, Vital, Carolina Graziani, Tavares, Elaine Rufo, and Maranhão, Raul Cavalcante
- Published
- 2022
- Full Text
- View/download PDF
3. On Adding Structure to Unstructured Overlay Networks
- Author
-
Luís Rodrigues, João Leitão, José Pereira, Nuno A. Carvalho, and Rui Oliveira
- Subjects
Spanning tree ,Computer science ,business.industry ,Distributed computing ,Overlay network ,020206 networking & telecommunications ,Topology (electrical circuits) ,02 engineering and technology ,Overlay ,Average path length ,Metric (mathematics) ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Performance metric ,Computer network - Abstract
Unstructured peer-to-peer overlay networks are very resilient to churn and topology changes, while requiring little maintenance cost. Therefore, they are an infrastructure to build highly scalable large-scale services in dynamic networks. Typically, the overlay topology is defined by a peer sampling service that aims at maintaining, in each process, a random partial view of peers in the system. The resulting random unstructured topology is suboptimal when a specific performance metric is considered. On the other hand, structured approaches (for instance, a spanning tree) may optimize a given target performance metric but are highly fragile. In fact, the cost for maintaining structures with strong constraints may easily become prohibitive in highly dynamic networks. This chapter discusses different techniques that aim at combining the advantages of unstructured and structured networks. Namely we focus on two distinct approaches, one based on optimizing the overlay and another based on optimizing the gossip mechanism itself.
- Published
- 2009
4. Semantically Reliable Broadcast
- Author
-
Luís Rodrigues, Rui Oliveira, and José Pereira
- Subjects
Consistency (database systems) ,Computer science ,Replica ,Distributed computing ,Strong consistency ,Semantic memory ,Protocol (object-oriented programming) ,Throughput (business) ,Whole systems - Abstract
Replicated services are often required to sustain high loads of multiple concurrent requests. This requirement is hard to balance with strong consistency. Typically, to ensure inter-replica consistency, all replicas should receive all updates. Unfortunately, in this case, a single slow replica may degrade the performance of the whole system. This paper proposes a novel reliable broadcast primitive that uses semantic knowledge to weaken reliable delivery guarantees while, at the same time, ensuring strong consistency at the semantic level. By allowing some obsolete messages to be dropped, the protocol that implements this primitive is able to sustain a higher throughput than a fully reliable broadcast protocol. The usefulness of the primitive and the performance of the protocol are illustrated through a concrete example.
- Published
- 2002
5. Dependable Systems and Platforms
- Author
-
Paulo Veríssimo and Luís Rodrigues
- Subjects
Class (computer programming) ,Transactional leadership ,business.industry ,Computer science ,Legacy system ,Section (typography) ,Selection (linguistics) ,Software engineering ,business - Abstract
This chapter gives some examples of dependable systems and platforms. Whenever possible, paradigms and models previously studied are pointed to the reader. The overview of each system is concise and the selection is subjective but tries to ilLuistrate each class of approaches using concrete case studies that we find representative of that class. Namely, we discuss: distributed fault-tolerant systems, transactional systems, cLuister architectures, and how to make legacy systems dependable. In each section, we will mention several examples in a summarized form, and then will describe one or two the most relevant in detail.at the end of the chapter gives a few URL pointers to where information about most of these systems can be found.
- Published
- 2001
6. Models of Distributed Computing
- Author
-
Luís Rodrigues and Paulo Veríssimo
- Subjects
Distributed design patterns ,Distributed shared memory ,Shared memory ,Grid computing ,Distributed algorithm ,Computer science ,Distributed computing ,Distributed concurrency control ,Data-intensive computing ,Unconventional computing ,computer.software_genre ,computer - Abstract
This chapter discusses the main distributed systems models. As an introduc-tion, it sets the context by addressing the main facets of the problem. Frame-works clarify what can be done given different assumptions on failures and synchronism, explaining that we can structure distributing computing along different vectors serving different needs. Strategies help the architect reason about the available ways to go in order to serve her requirements and objectives. Then two more fundamental issues are addressed before delving into the system models: explaining the main differences between the synchronous and asynchronous formal frameworks for distributed computing; and presenting the primitive classes of distributed activities and their overall scheme of operation, for understanding the purposes of distribution. Finally, the chapter presents known models such as: client-server with RPC, group-oriented, distributed shared memory, message buses.
- Published
- 2001
7. Secure Systems and Platforms
- Author
-
Paulo Veríssimo and Luís Rodrigues
- Subjects
Authentication ,Transport Layer Security ,Computer science ,business.industry ,media_common.quotation_subject ,Request for Comments ,Payment ,Computer security ,computer.software_genre ,Firewall (construction) ,Table (database) ,Smart card ,business ,computer ,Private network ,media_common - Abstract
This chapter gives examples of systems and platforms for secure computing. We are going to talk about remote operations and messaging, firewall systems, virtual private networks, authentication and authorization services, smart cards and payment systems, and secure electronic commerce. In each section, we will mention several examples in a summarized form, and then will describe one or two the most relevant in detail. at the end of the chapter gives a few URL pointers to where information about most of these systems can be found. The table also points to the IETF Request for Comments site, where the RFCs cited can also be found.
- Published
- 2001
8. Distributed Real-Time Systems and Platforms
- Author
-
Luís Rodrigues and Paulo Veríssimo
- Subjects
Atomic broadcast ,business.industry ,Computer science ,Section (typography) ,Network Time Protocol ,Table (database) ,The Internet ,Request for Comments ,business ,Software engineering ,Field (computer science) ,CAN bus - Abstract
This chapter gives examples of systems and platforms for real-time computing, consolidating the matters discussed in the previous chapters. Namely, it discusses: operating systems; real-time LANs and field buses; time services; embedded systems; dynamic mission-critical systems; real-time over the Internet. In each section, we will mention several examples in a summarized form, and then will describe one or two the most relevant in detail. Table 14.1 at the end of the chapter gives a few URL pointers to where information about most of these systems can be found. The table also points to the IETF Request for Comments site, where any RFCs cited can also be found.
- Published
- 2001
9. Fault-Tolerant Systems Foundations
- Author
-
Luís Rodrigues and Paulo Veríssimo
- Subjects
Mean time between failures ,Software fault ,Computer science ,Dependability ,Fault tolerance ,Reliability engineering - Abstract
This chapter addresses the fundamental concepts concerning fault tolerance. It starts by introducing the notion of dependability and discussing why it is difficult to build dependable systems. The evolution of fault-tolerant computing is reviewed, from hardware fault tolerance to distributed software-based fault tolerance. Finally, the chapter introduces the most relevant architectures for fault-tolerant communication and processing, that are later described in detail in the subsequent chapters of this part.
- Published
- 2001
10. Case Study: VP’63- The Vintageport’63 Large-Scale Information System
- Author
-
Paulo Veríssimo and Luís Rodrigues
- Subjects
Scale (ratio) ,Computer science ,business.industry ,Carry (arithmetic) ,Information system ,Modular design ,Modernization theory ,business ,Industrial engineering ,The Imaginary - Abstract
This chapter starts a case study that we carry throughout the book: The VP’63 (VintagePort’63) Large-Scale Information System. An imaginary wine company owning a traditional and obsolete information system starts a project aiming at its modernization. The case study is methodically addressed at the end of each part, so that we progressively improve VP’63. In this part, we start by making it: modular, distributed and interactive.
- Published
- 2001
11. Distributed System Paradigms
- Author
-
Luís Rodrigues and Paulo Veríssimo
- Subjects
Atomicity ,Consistency (database systems) ,Message delivery ,Computer science ,Distributed computing ,Concurrency ,Communication in small groups ,Message passing ,Mutual exclusion - Abstract
This chapter presents the most important paradigms in distributed systems, in a problem-oriented manner, purposely addressed to to-be architects. Namely, the chapter addresses: naming and addressing; message passing; remote op-erations; group communication; time and clocks; synchrony; ordering; coordi-nation; consistency; concurrency; and atomicity. Paradigms are motivated by showing their problem-solving potential and also their limitations.
- Published
- 2001
12. Case Study: Making VP’63 Dependable
- Author
-
Paulo Veríssimo and Luís Rodrigues
- Subjects
Service (business) ,Computer science ,Information system ,Geographical dispersion ,Reliability (statistics) ,Reliability engineering - Abstract
This chapter takes the next step in our case study: making the VP’63 (VintagePort’63) Large-Scale Information System dependable. Increased reliance on computers for day-to-day operation on the one hand, and greater geographical dispersion of the system on the other, have raised concerns about the impact of service outages or even severe failures on the business results. In consequence, part of the study concerns the enhancement of the reliability and availability of the VP’63 system.
- Published
- 2001
13. Paradigms for Distributed Fault Tolerance
- Author
-
Luís Rodrigues and Paulo Veríssimo
- Subjects
Asynchronous system ,Consensus ,Computer science ,Distributed computing ,Fault tolerance ,Resilience (network) ,Replication (computing) - Abstract
This chapter discusses the main paradigms concerning fault tolerance in distributed systems. Namely, the chapter addresses: failure detection, membership, fault-tolerant communication, replication management, resilience and recovery. The paradigms are explained in practical terms, by exemplifying the problems they solve, as well as their limitations.
- Published
- 2001
14. Case Study: Managing VP’63
- Author
-
Luís Rodrigues and Paulo Veríssimo
- Subjects
Process management ,Information system ,Control reconfiguration ,Strategic management ,Business ,Integrated management ,Corporate management - Abstract
This chapter finalizes our case study: managing the (VintagePort’63) Large-Scale Information System. VP’63 became significantly complex, and the company depends heavily on it. Its operation must remain stable, and its reconfiguration made as easy as possible. Tactical management mechanisms implementing strategic management policies will be studied, and developed around an integrated management platform.
- Published
- 2001
15. Case Study: Making VP’63 Timely
- Author
-
Paulo Veríssimo and Luís Rodrigues
- Subjects
Bottling line ,Engineering management ,SCADA ,Computer science ,business.industry ,Control (management) ,Perspective (graphical) ,Information system ,Programmable logic controller ,business ,Enterprise resource planning ,Automation - Abstract
This chapter continues the case study that we have been carrying throughout the book: The VP’63 (VintagePort’63) Large-Scale Information System. The wine company has planned to automate some of its industrial facilities and needs to guarantee two objectives: to implement distributed real-time control and automation of some units such as wine processing and bottling/corking; to incorporate the real-time supervisory, control and acquisition (SCADA) into the global enterprise resource planning and information system, under a CIM perspective.
- Published
- 2001
16. Security Paradigms
- Author
-
Paulo Veríssimo and Luís Rodrigues
- Published
- 2001
17. Distributed Systems Foundations
- Author
-
Luís Rodrigues and Paulo Veríssimo
- Subjects
Network Computer ,Mobile code ,Formal notation ,Distribution (number theory) ,Computer science ,Distributed computing ,Mobile computing - Abstract
This chapter discusses the foundations of distributed systems. It begins with defining distributed systems, and performing a review of the basic subjects re-garding distribution, such as computer networks, distributed operating systems and services. It introduces some generic formal notation to be used throughout the book in more elaborate treatments of some subjects. Distributed system architectures are discussed, namely: remote access; file and memory distribu-tion; client-server; thin clients and network computers; portable and mobile code; message-based architectures; mobile computing.
- Published
- 2001
18. Models of Network and Distributed Systems Management
- Author
-
Paulo Veríssimo and Luís Rodrigues
- Subjects
Structure of Management Information ,Distributed design patterns ,Desktop Management Interface ,Process management ,Distributed algorithm ,Computer science ,Distributed computing ,Element management system ,Simple Network Management Protocol ,Network management station ,Network management application - Abstract
This chapter aims at giving the reader a global view of the problem of management. After studying several paradigms, we see how they fit in several models for management of networks and distributed systems. We start by presenting management frameworks: functional, such as configuration, management, monitoring; and structural, such as the tool and platform levels. Then we discuss the strategic alternatives the architect is faced with, clarifying the difference between strategy and tactics, and the subtleties between distribution, centralization and decentralization. Finally, specific models for distributed systems management are presented.
- Published
- 2001
19. Models of Distributed Fault-Tolerant Computing
- Author
-
Luís Rodrigues and Paulo Veríssimo
- Subjects
Distributed design patterns ,Concurrency control ,Grid computing ,Distributed algorithm ,Asynchronous communication ,Event (computing) ,Computer science ,Distributed computing ,Distributed concurrency control ,Fault tolerance ,computer.software_genre ,computer - Abstract
This chapter ilLuistrates how the paradigms discussed in the previous chapter can be applied and combined to achieve fault tolerance in an application-oriented way. The chapter starts by introducing classes of fault-tolerant systems that make different assumptions about the system properties, from arbitrary to crash and from asynchronous to synchronous. Then, it discusses strategies for the several approaches to building a fault-tolerant architecture. The main models for building fault-tolerant systems are then presented: remote operations, event services and transactions.
- Published
- 2001
20. Real-Time Systems Foundations
- Author
-
Paulo Veríssimo and Luís Rodrigues
- Subjects
Relation (database) ,Distribution (number theory) ,Computer science ,Current (fluid) ,Industrial engineering - Abstract
This chapter addresses the fundamental concepts concerning real-time, starting with the definition real-time and clarifying a few current misconceptions. It traces the evolution of real-time computing towards distribution and discusses its relation with fault-tolerance. Finally, the most relevant architectural approaches to real-time in networks and distributed systems are introduced, to be detailed in the subsequent chapters of this part.
- Published
- 2001
21. Paradigms for Distributed Systems Management
- Author
-
Luís Rodrigues and Paulo Veríssimo
- Subjects
Configuration management ,Standardization ,business.industry ,Computer science ,computer.software_genre ,Fault management ,Management information systems ,Engineering management ,Systems management ,Directory service ,The Internet ,Security management ,business ,computer - Abstract
This chapter addresses the main paradigms for distributed systems management. Management models have been developed in the past few years, mainly in the course of standardization activities, such as OSI Systems Management, the Internet Engineering Task Force, or the Open Distributed Processing initiative, but also under significant research effort. As these models have matured, a number of significant paradigms have been retained, and made it possible to define the generic body of research and technology of today’s systems management. We will make a non-exhaustive effort to study the main paradigms, and in consequence, we will address: managers and managed objects, domains, management information bases, and the several management functions— configuration, faults, performance and QoS, accounting, security, names and directories.
- Published
- 2001
22. Management Systems and Platforms
- Author
-
Luís Rodrigues and Paulo Veríssimo
- Subjects
Network management ,business.industry ,Computer science ,Management system ,Table (database) ,Distributed management ,Security management ,The Internet ,Request for Comments ,Simple Network Management Protocol ,Software engineering ,business - Abstract
This chapter gives examples of management systems and platforms. Namely, we discuss ISO (CMISE/CMIP) and Internet (SNMP) management services and protocols, standard MIBs, management tools and platforms, and the Distributed Management Environment (DME). We finish the chapter with a presentation of several tools specifically addressing security management. In each section of the chapter, we will mention several examples in a summarized form, and then will describe one or two of the most relevant in detail. at the end of the chapter gives a few URL pointers to where information about most of these systems can be found. The table also points to the IETF Request for Comments, ISO and ITU sites, where any cited standards can also be found.
- Published
- 2001
23. Models of Distributed Real-Time Computing
- Author
-
Paulo Veríssimo and Luís Rodrigues
- Subjects
Distributed design patterns ,Grid computing ,Distributed algorithm ,Computer science ,Distributed computing ,Distributed concurrency control ,Data-intensive computing ,Active database ,Unconventional computing ,computer.software_genre ,computer ,Timing failure - Abstract
In this chapter, we aim at providing a global view of what is timely behavior of a distributed system architecture. The chapter starts by introducing classes of real-time systems with different timeliness guarantees, setting the stage for introducing the several frameworks for structuring real-time systems. Then, it discusses strategies for the several approaches to building an architecture, where the paradigms presented in the last chapter show their usefulness. The main models of real-time systems are then presented. From the viewpoint of timing: partial synchronism; time-triggered; and event-triggered models. From a functional viewpoint: real-time communication; real-time control; real-time and active databases; and quality-of-service.
- Published
- 2001
24. Fundamental Security Concepts
- Author
-
Luís Rodrigues and Paulo Veríssimo
- Subjects
business.industry ,Computer science ,Distribution (economics) ,Fault tolerance ,Smart card ,Zigzag line ,Cryptographic protocol ,business ,Computer security ,computer.software_genre ,computer ,Secure computing - Abstract
This chapter addresses the fundamental concepts concerning security. It starts by defining what security is: the reasons leading to insecurity, the types of computer misuse, and the evaluation of the risk associated with both the vulnerabilities of computers and the threats to which they are exposed. Then, it explains the foundations of secure computing, and traces the relationship between distribution and security, on the one hand, and fault tolerance and security, on the other hand. Next, it analyzes the behavior of the intruder, in an attempt to ilLuistrate to the reader both the motivations for attack, and the techniques and procedures normally used to perform that attack. Finally, the most relevant architectural and technological approaches to security in networks and distributed systems are introduced, to be detailed in the subsequent chapters of this part.
- Published
- 2001
25. Fundamental Concepts of Management
- Author
-
Luís Rodrigues and Paulo Veríssimo
- Subjects
business.industry ,Computer science ,Order (business) ,Systems management ,Interface description language ,Software engineering ,business ,computer.software_genre ,computer ,Management architecture - Abstract
This chapter discusses the problem of management. The fundamental concepts are presented, and the rationale for configuring and managing systems is discussed. The main architectures for systems management are introduced, in order to be further developed in the following chapters.
- Published
- 2001
26. Models of Distributed Secure Computing
- Author
-
Paulo Veríssimo and Luís Rodrigues
- Subjects
Distributed design patterns ,SSLIOP ,Utility computing ,computer.internet_protocol ,Computer science ,Distributed algorithm ,Distributed computing ,Secure two-party computation ,Distributed concurrency control ,CSIv2 ,computer ,Autonomic computing - Abstract
This chapter aims at providing the architect with a global view of the problem of security, by showing where the paradigms learned in the previous chapter, fit in the several models of distributed secure computing. It starts by discussing the main classes of malicious faults and errors expected in computer systems, and in distributed systems in particular— that is, attacks and intrusions. Then, it equates the main frameworks and strategies for building secure systems authentication, secure channels and envelopes, protection and authorization, and auditing— as a form of bridging from the detail of paradigms to the global view provided by models. Finally, specific models for distributed secure computing are presented.
- Published
- 2001
27. Paradigms For Real-Time
- Author
-
Luís Rodrigues and Paulo Veríssimo
- Subjects
Flow control (data) ,Theoretical computer science ,Computer science ,System Architect ,Clock synchronization ,Timing failure ,Scheduling (computing) - Abstract
This chapter discusses the main paradigms concerning real-time in distributed systems, in the viewpoint of the system architect. Namely, the chapter addresses: specifications for describing timeliness; timing failure detection; the real-time entity-representative relation; the time-value duality of real-time entities; real-time communication; flow control; scheduling; clock synchronization; input-output. We explain these paradigms in practical terms, giving examples of the problems they solve and of their limitations.
- Published
- 2001
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.