Journal Articles 2020(1 publication) [publication]Sousa, B. and Fonseca, V. and Cordeiro, L. and Flamigni, B. and Luca Foschini, . and Simões, P. and Uthayasankar Sivarajah, . and Vishanth Weerakkody, . , "EMPATIA a Multichannel Platform for Participatory Budgeting", International Journal of Electronic Government Research (IJEGR), vol. 15, 2020 2019(1 publication) [publication]Evariste, M. and Sousa, B. , "SiGeFA - Sistema de Gestão de Frequências de Alunos ", Revista de Ciências da Computação, vol. 14, pp. 35-50, 2019 2016(2 publications) [publication]A. S. Gomes and Sousa, B. and D. Palma and Fonseca, V. and Zhao, Z. and Edmundo Monteiro and Braun, T. and Simões, P. and Cordeiro, L. , "Edge Caching with Mobility Prediction in Virtualized LTE Mobile Networks", Future Generation Computer Systems, 2016 [citation][year=2019]Yan, M., Chan, C., Gygax, A., Yan, J., Campbell, L., Nirmalathas, A. and Leckie, C., 2019. Modeling the Total Energy Consumption of Mobile Network Services and Applications. Energies, 12(1), p.184. [citation][year=2018]X. Zhao, P. Yuan, H. Li and S. Tang, "Collaborative edge caching in context-aware D2D networks," in IEEE Transactions on Vehicular Technology. doi: 10.1109/TVT.2018.2858254 [citation][year=2018]Tang, Yayuan, Kehua Guo, Jianhua Ma, Yutong Shen, and Tao Chi. "A smart caching mechanism for mobile multimedia in information centric networking with edge computing." Future Generation Computer Systems (2018). [citation][year=2018]Toczé, K. and Nadjm-Tehrani, S., 2018. A Taxonomy for Management and Optimization of Multiple Resources in Edge Computing. arXiv preprint arXiv:1801.05610. [citation][year=2018]C. Wang, Y. He, F. R. Yu, Q. Chen and L. Tang, "Integration of Networking, Caching, and Computing in Wireless Systems: A Survey, Some Research Issues, and Challenges," in IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 7-38, Firstquarter 2018. doi: 10.1109/COMST.2017.2758763 [citation][year=2018]Chang, C., Srirama, S. N., & Buyya, R. Internet of Things (IoT) and New Computing Paradigms. Wiley STM / Editor Buyya, Srirama: Fog and Edge Computing: Principles and Paradigms, Chapter 1, 2018. [citation][year=2018]D. Ren, X. Gui, W. Lu, J. An, H. Dai and X. Liang, "GHCC: Grouping-based and hierarchical collaborative caching for mobile edge computing," 2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Shanghai, China, 2018, pp. 1-6. doi: 10.23919/WIOPT.2018.8362881 [citation][year=2018]Qian, Peng. "Accelerating mobile web downloading through context-aware and cross-layer intelligence." PhD diss., University of Surrey, 2018. http://doi.org/10.15126/thesis.00849895 [citation][year=2018]Pedro Batista, Ivanes Araújo, Neiva Linder, Kim Laraqui, Aldebaro Klautau, Testbed for ICN Media Distribution over LTE Radio Access Networks, Computer Networks, 2018, ISSN 1389-1286, https://doi.org/10.1016/j.comnet.2018.12.013. [citation][year=2017]Alireza Farshin , Saeed Sharifian , A Chaotic Grey Wolf Controller Allocator for Software Defined Mobile Network (SDMN) for 5th Generation of Cloud-based Cellular Systems (5G), Computer Communications (2017), doi: 10.1016/j.comcom.2017.05.003 [citation][year=2017]S. Wang, X. Zhang, Y. Zhang, L. Wang, J. Yang and W. Wang, "A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications," in IEEE Access, vol. 5, pp. 6757-6779, 2017. doi: 10.1109/ACCESS.2017.2685434 [citation][year=2017]Y. Mao, C. You, J. Zhang, K. Huang and K. B. Letaief, "A Survey on Mobile Edge Computing: The Communication Perspective," in IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2322-2358, Fourthquarter 2017. doi: 10.1109/COMST.2017.2745201 [citation][year=2017]Vasilakos, Xenofon. "Mobility-based Proactive Caching Models for Addressing Niche Mobile Demand and Scalable ICN Name Resolution Designs." PhD dissertation, Athens University of Economics and Business, March 2017 [citation][year=2017]O. Semiari, W. Saad, and M. Bennis, “Caching Meets Millimeter Wave Communications for Enhanced Mobility Management in 5G Networks“, arXiv preprint arXiv:1701.05125, 2017, Available at https://arxiv.org/pdf/1701.05125.pdf [citation][year=2016]Ejaz Ahmed, Mubashir Husain Rehmani, Mobile Edge Computing: Opportunities, solutions, and challenges, Future Generation Computer Systems, Available online 30 September 2016, ISSN 0167-739X, http://dx.doi.org/10.1016/j.future.2016.09.015. [publication]Sousa, B. and Cordeiro, L. and Simões, P. and Edmonds, A. and Ruiz, S. and Corici, M. and Nikaein, N. and A. S. Gomes and Schiller, E. and Braun, T. and Thomas Michael Bohnert , "Towards a Fully Cloudified Mobile Network Infrastructure", Transactions on Network and Service Management, 2016 [citation][year=2018]M. Jin, H. Luo, S. Gao, J. Li, Y. Zhang and S. K. Das, "An Approach to Pre-schedule Traffic in Time-Dependent Pricing Systems," in IEEE Transactions on Network and Service Management. doi: 10.1109/TNSM.2018.2875549 2014(1 publication) [publication]Sousa, B. and Pentikousis, K. and Marilia Curado , "MeTHODICAL: Towards the next generation of multihomed applications", Computer Networks, vol. 65, pp. 21-40, 2014 2013(1 publication) [publication]Sousa, B. and Pentikousis, K. and Marilia Curado , "Multihoming: A Comprehensive Review", Elsevier Academic Press Advances in Computers, vol. 90, pp. 285-365, 2013 2011(1 publication) [publication]Sousa, B. and Pentikousis, K. and Marilia Curado , "Multihoming Management for Future Networks", Mobile Networks And Applications, vol. 16, pp. 505-517, 2011 [citation][year=2014]Kumbhkar, Ratnesh, Narayan Mandayam, and Ivan Seskar. "HetNetwork Coding: Scaling Throughput in Heterogeneous Networks using Multiple Radio Interfaces." arXiv preprint arXiv:1411.2953 (2014). [citation][year=2014]Podermanski, Toma. "IP45: Architecture, Design, and Implementation." Network Protocols (ICNP), 2014 IEEE 22nd International Conference on. IEEE, 2014. [citation][year=2014]Lin, Pingping, Jun Bi, and Hongyu Hu. "BTSDN: BGP-based Transition for the Existing Networks to SDN." Ubiquitous and Future Networks (ICUFN), 2014 Sixth International Conf on. IEEE, 2014. [citation][year=2014]Donoso, Yezid, et al. "A Fairness Load Balancing Algorithm in HWN Using a Multihoming Strategy." International Journal of Computers Communications & Control 9.5 (2014): 555-569. [citation][year=2014]Mugga, Charles, Dong Sun, and Dragos Ilie. "Performance Comparison of IPv6 Multihoming and Mobility Protocols." ICN 2014, The Thirteenth International Conference on Networks. 2014. [citation][year=2014]Sousa, Bruno, Kostas Pentikousis, and Marilia Curado. "MeTHODICAL: Towards the next generation of multihomed applications." Computer Networks 65 (2014): 21-40. [citation][year=2012]Pingping Lin, Jun Bi and Hongyu Hu, "ASIC: an architecture for scalable intra-domain control in OpenFlow", in CFI' 12 [citation][year=2012]Antonio Casimiro et al. "TRONE: Trustworthy and Resilient Operations in a Network Environment" [citation][year=2012]J Rajahalme, "Inter-domain incentives and Internet architecture" [citation][year=2012]Kostas Pentikousis and Ramon Aguero, "Mobility and Network Management in Virtualized Networks" 2008(1 publication) [publication]Thomas Michael Bohnert and Castrucci, M. and Ciulli, N. and Landi, G. and Nardini, C. and Sousa, B. and Neves, P. and Simões, P. , "QoS management and control for an all-IP WiMAX network architecture: Design, implementation and evaluation", Journal of Mobile Information Systems (ISSN: 1574-017x), vol. 4, pp. 253-271, 2008 [citation][year=2014]Louta, M., et al. "RLAM: A dynamic and efficient reinforcement learning-based adaptive mapping scheme in mobile WiMAX networks." Mobile Information Systems 10.2 (2014): 173-196. [citation][year=2013]M. Louta, P. Sarigiannidis, S. Misra, P. Nicopolitidis, G. Papadimitriou, RLAM: A dynamic and efficient reinforcement learning-based adaptive mapping scheme in mobile WiMAX networks, Journal of Mobile Information Systems, IOS Press, 2013. DOI: 10.3233/MIS-130177. [citation][year=2012]E Apostol, V Cristea, "Mobility management for multimedia services in heterogeneous environments", International Journal of Web and Grid Services [citation][year=2011]Rafidah Md. Noor and Christopher Edwards, A Comparative Performance Analysis on NEMO-QoS and MIPv6-QoS in Heterogeneous Environments, Journal of Applied Sciences, 2011, Vol. 11, N. 17, pp. 3130-3141, DOI: 10.3923/jas.2011.3130.3141 [citation][year=2011]Ines Houidi, Wajdi Louati, Walid Ben Ameur, Djamal Zeghlache, Virtual network provisioning across multiple substrate networks, Computer Networks, Volume 55, Issue 4, 10 March 2011, Pages 1011-1023, ISSN 1389-1286, 10.1016/j.comnet.2010.12.011. [citation][year=2011]Yi-Fu Ciou, Fang-Yie Leu, Yi-Li Huang, Kangbin Yim, A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802. 16e wireless networks, Mobile Information Systems, Vo.7 N.3 pp. 241-269, IOS Press, September 2011. DOI: 10.3233/MIS-2011-0120. [citation][year=2009]H. Dong, F. K. Hussain, E. Chang, “A QoS-based service retrieval methodology for digital ecosystems”, International Journal of Web and Grid Services, Vol. 5, N. 3 / 2009, pp. 261 – 283, Inderscience. [citation][year=2009]Vilmos Simon, László Bokor, and Sándor Imre. 2009. A hierarchical network design solution for mobile IPv6. J. Mob. Multimed. 5, 4 (December 2009), 317-332. 2007(1 publication) [publication]Domingues, P. and Silva, L. and Sousa, B. , "Sabotage-Tolerance and Trust Management in Desktop Grid Computing", Journal on Future Generation Computer Systems, vol. 23, 2007 [citation][year=2015]Pareek, Gaurav, Chetanya Goyal, and Mukesh Nayal. "A Result Verification Scheme for MapReduce Having Untrusted Participants." Intelligent Distributed Computing. Springer International Publishing, 2015. 11-19. [citation][year=2014]Wang, Yongzhi, Jinpeng Wei, and Yucong Duan. "Securing MapReduce Result Integrity via Verification-based Integrity Assurance Framework." International Journal of Grid & Distributed Computing 7.6 (2014). [citation][year=2014]Essaaidi, Mohamed, et al. "The Effectiveness of Reputation-based Voting for Collusion Tolerance in Large-Scale Grids.", 2014. [citation][year=2014]Mehta, Hemant Kumar, and Rohit Ahuja. "A Holistic Trust Management Leasing Algorithm for IaaS Cloud." International Journal of Systems and Service-Oriented Engineering (IJSSOE) 4.2 (2014): 1-12. [citation][year=2014]McGilvary, Gary Andrew. "Ad hoc cloud computing." (2014). [citation][year=2014]ZOCHNIAK, Micha?, and Bartosz SAWICKI. "Reliable peer-to-peer computing system." Przeglad Elektrotechniczny (2014). [citation][year=2013]Christoforou, Evgenia and Anta, Antonio Fernandez and Georgiou, Chryssis and Mosteiro, Miguel A et al., ”Reputation-based Mechanisms for Evolutionary Master-Worker Computing”,arXiv preprint arXiv:1307.2783, 2013. [citation][year=2013]Muszynski, Jakub and Varrette, Sébastien and Bouvry, Pascal, ”Expected running time of parallel evolutionary algorithms on unimodal pseudo-boolean functions over small-world networks”, IEEE Congress on Evolutionary Computation (CEC), pp. 2588-2594, 2013. [citation][year=2013]Watanabe, Kan and Fukushi, Masaru and Funabiki, Nobuo and Nakanishi, Toru,”Performance Evaluation of Check-By-Voting for Colluding Attack in Volunteer Computing Systems”, IAENG Transactions on Engineering Technologies, pp.33-48, 2013. [citation][year=2013]Watanabe, Kan and Funabiki, Nobuo and Nakanishi, Toru and Fukushi, Masaru, ”Optimal Spot-Checking for Delayed Attack on Desktop Grid Systems”, UKSim, pp.600-605, 2013. [citation][year=2012]Kan Watanabe, Nobuo Funabiki, Toru Nakanishi and Masaru Fukushi, ”Modeling and Performance Evaluation of Colluding Attack in Volunteer Computing Systems”, Proceedings of the International MultiConference of Engineers and Computer Scientists 2012, Vol. II, IMECS 2012, March 14-16, 2012, Hong Kong. [citation][year=2012]Silaghi C. Gheorghe, Dependable Resource Management Tools towards Automated Collaboration in Heterogeneous Computing Environments, Habilitation Thesis, Babes Bolyai University, Romenia, 2012. [citation][year=2012]Christoforou, Evgenia and Fernández Anta, Antonio and Georgiou, Chryssis and Mosteiro, Miguel A. Algorithmic Mechanisms for Reliable Master-Worker Internet-based Computing. IEEE Transactions on Computers. ISSN 0018-9340, 2012. [citation][year=2012]Fernández Anta, Antonio and Georgiou, Chryssis and López, Luis and Santos, Agustin (2012) Reliable Internet-based Master-Worker Computing in the Presence of Malicious Workers. Parallel Processing Letters, 22 (1). [citation][year=2012]Bendahmane, Ahmed and Essaaidi, Mohammad and Younes, Ali et al., ”A new mechanism to ensure integrity for MapReduce in cloud computing”, 2012 International Conference on Multimedia Computing and Systems (ICMCS), pp 785–790, 2012. [citation][year=2012]Bendahmane, Ahmed and Essaaidi, Mohammad and Moussaoui, Ahmed El and Younes, Ali, ”Result verification mechanism for MapReduce computation integrity in cloud computing”, 2012 International Conference on Complex Systems (ICCS), 2012. [citation][year=2012]W Viriyasitavat, A Martin, "A survey of trust in workflows and relevant contexts", Communications Surveys & Tutorials, 2012 [citation][year=2012]Y Cui, M Li, Y Xiang, Y Ren et al. "A QoS-based fine-grained reputation system in the grid environment", 2012, Wiley. [citation][year=2012]A Mohaisen, "Towards Trustworthy Computing on Social Networks: Measurements and New Applications" [citation][year=2012]A Bendahmane, M Essaaidi et al., "A new mechanism to ensure integrity for MapReduce in cloud computing" [citation][year=2012]A Bendahmane, M Essaaidi et al., "Result verification mechanism for MapReduce computation integrity in cloud computing" [citation][year=2012]AJ Sánchez-Santiago, "Planificación local de tareas con sistemas basados en reglas borrosas. Aplicación a la detección de defectos en tableros de fibra" [citation][year=2011]K., Watanabe, and Fukushi, M. and Kameyama, M., “Adaptive Group-Based Job Scheduling for High Performance and Reliable Volunteer Computing”, Journal of Information Processing, volume 19, pp. 39-51, 2011 [citation][year=2011]Moca, M.; Silaghi, G.C.; Fedak, G.;Babes-Bolyai , “Distributed results checking for MapReduce in volunteer computing”, Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium o. May 2011. (DOI: 10.1109/IPDPS.2011.351) [citation][year=2011]Yongzhi Wang, Jinpeng Wei, "VIAF: Verification-Based Integrity Assurance Framework for MapReduce", Cloud Computing (CLOUD), 2011 IEEE International Conference on. DOI: 10.1109/CLOUD.2011.33 [citation][year=2011]Hailong Sun, Jinpeng Huai, Xudong Liu, Jing Li, “RECON: a novel approach to fighting unreliability in peer-to-peer grids”, International Journal of Grid and Utility Computing (ISSN:1741-847X), pp 77-84, Volume 2, Number 2/2011, DOI: 10.1504/IJGUC.2011.040595 (http://inderscience.metapress.com/content/7w548p44225284w6/) [citation][year=2011]Viriyasitavat, W. Martin, A., "A Survey of Trust in Workflows and Relevant Contexts", Communications Surveys & Tutorials, IEEE, pp 1-30, Issue 99, 2011, DOI: 10.1109/SURV.2011.072811.00081 [citation][year=2011]Wander, M.; Weis, T.; Wacker, A.; “Detecting Opportunistic Cheaters in Volunteer Computing”, Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), 2011, pp 1-6, DOI: 10.1109/ICCCN.2011.6006040 [citation][year=2011]Bendahmane, A.; Essaaidi, M.; Moussaoui, A.E.; Younes, A., "Tolerating malicious resources to ensure safe computations in grid systems", 2011 International Conference on Multimedia Computing and Systems (ICMCS), DOI: 10.1109/ICMCS.2011.5945679 [citation][year=2011]Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim, “SocialCloud: Using Social Networks for Building Distributed Computing Services”, CoRR, 2011. [citation][year=2011]Viriyasitavat, W.; Martin, A.; , "A Survey of Trust in Workflows and Relevant Contexts," Communications Surveys & Tutorials, IEEE , vol.PP, no.99, pp.1-30, 2011. (doi:10.1109/SURV.2011.072811.00081) [citation][year=2010]Junseok Hwang, Jihyoun Park, Jorn Altmann, “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, in book “Information Systems, Technology and Management”, pp 187-197, 2010. [citation][year=2010]Wang, Y., Nakao, A., “Poisonedwater: An improved approach for accurate reputation ranking in P2P networks” Future Generation Computer Systems, volume 26, issue 8, year 2010, pp. 1317 – 1326. [citation][year=2010]Papaioannou, T.G., Stamoulis, G.D, “coverReputation-based estimation of individual performance in collaborative and competitive grids”, Future Generation Computer Systems, volume 26, issue 8, pp. 1327 – 1335, 2010. [citation][year=2010]Bernard, Y., Klejnowski, L., Hahner, J., Muller-Schloer, C., “Towards trust in desktop grid systems”, Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 637—642, 2010. [citation][year=2010]Choi, S.J. and Buyya, R., “Group-based adaptive result certification mechanism in Desktop Grids”, Future Generation Computer Systems, volume 26, issue 5, pp. 776—786, 2010. [citation][year=2010]Bendahmane, A., Essaaidi, M., El Moussaoui, A., Younes, A., “Compromised Resources Tolerance in Grid Computing Systems”, Intelligent Distributed Computing IV, pp. 145—154, 2010. [citation][year=2010]Antonopoulos, N., Rana, O.F., “Management and optimisation of P2P and Grid systems with network economics”, Future Generation Computer Systems, volume 26, issue 8, pp. 1282—1284, 2010. [citation][year=2010]Canon, Louis-Claude, Jeannot, Emmanuel, Weissman, Jon, “A Scheduling Algorithm for Defeating Collusion”, Research Report, INRIA, RR-7403, October 2010 [citation][year=2010]Hwang, J. and Kim, H.J. and Park, J., “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, volume 26, issue 8, pp. 1381-1390, 2010 [citation][year=2010]Hwang, J. and Park, J. and Altmann, J., “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, Information Systems, Technology and Management, pp. 187-197, 2010 [citation][year=2010]Canon, L.C. and Jeannot, E. and Weissman, J., “A Scheduling Algorithm for Defeating Collusion”, 2010 [citation][year=2010]Bendahmane, A. and Essaaidi, M. and El Moussaoui, A. and Younes, A., “Reputation-based Majority Voting for Malicious Grid Resources Tolerance”, Scalable Computing, pp. 385, 2010. [citation][year=2010]Canon, L.C., “Outils et algorithmes pour gérer l’incertitude lors de l’ordonnancement d’application sur plateformes distribuées”, PhD Thesis, Université Henri Poincarré – Nancy 1, France, 2010. [citation][year=2010]Bendahmane, Mohammad Essaaidi, Ahmed El Moussaoui, Ali Younes, "Reputation-based Majority Voting for Malicious Grid Resources Tolerance", Ahmed Scientific International Journal for Parallel and Distributed Computing, Vol 11, No 4 (2010) - (http://www.scpe.org/index.php/scpe/article/view/669) [citation][year=2010]K Watanabe, M Fukushi, S Horiguchi, “Expected-Credibility-Based Job Scheduling for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(2), pp 306-314, 2010. [citation][year=2010]K Watanabe, M Fukushi, “Generalized Spot-Checking for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(12), pp 3164-3172, 2010. [citation][year=2010]F. Taoab, Y. Hub, D. Zhaoc, Z. Zhoub, “Study of failure detection and recovery in manufacturing grid resource service scheduling”, International Journal of Production Research 48(1), pp 69-94, 2010. doi:10.1080/00207540802275871 [citation][year=2010]K Watanabe, M Fukushi, S Horiguchi, “Generalized Spot-Checking for Sabotage-Tolerance in Volunteer Computing Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 655-660, 2010. [citation][year=2010]Y. Bernard, L. Klejnowski, J. Hahner, C. Muller-Schloer, “Towards Trust in Desktop Grid Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 637-642, 2010. [citation][year=2010]F. Georgatos, V. Gkamas, A. Ilias, G. Kouretis, E. Varvarigos, “A Grid-enabled CPU Scavenging Architecture and a Case Study of its Use in the Greek School Network”, Journal of Grid Computing 8(1), pp 61-75, 2010. [citation][year=2009]J. Hwang, H.J. Kim, J. Park “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, 2009. [citation][year=2009]Y. Wang, A. Nakao, “Poisonedwater: An improved approach for accurate reputation ranking in P2P networks”, Future Generation Computer Systems, 2009. [citation][year=2009]Ana Cristina Oliveira, Lívia Sampaio, Stênio Flávio Fernandes, Francisco Brasileiro, "Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids," ladc, pp.25-32, 2009 Fourth Latin American Symposium on Dependable Computing, 2009 [citation][year=2009]S.J. Choi, R. Buyya, “Group-based adaptive result certification mechanism in Desktop Grids”, Future Generation Computer Systems, 2009. [citation][year=2009]T.G. Papaioannou, G.D. Stamoulis, “Reputation-based estimation of individual performance in collaborative and competitive grids”, Future Generation Computer Systems, 2009. [citation][year=2009]K Watanabe, M Fukushi, S Horiguchi, “Optimal Spot-checking for Computation Time Minimization in Volunteer Computing”, Journal of Grid Computing 7(4), pp 575-600, 2009. [citation][year=2009]W. Wei, J. Du, T. Yu, X. Gu, “SecureMR: A Service Integrity Assurance Framework for MapReduce”, Proceedings of the 2009 Annual Computer Security Applications Conference, pp 73-82, 2009. [citation][year=2009]K Watanabe, M Fukushi, S Horiguchi, “Collusion-Resistant Sabotage-Tolerance Mechanisms for Volunteer Computing Systems”, 2009 IEEE International Conference on e-Business Engineering, pp. 213-218, 2009. [citation][year=2009]J. Hwang, , H.J. Kim, J. Park, “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, 2009. [citation][year=2009]Oliveira, A.C. and Sampaio, L. and Fernandes, S.F. and Brasileiro, F., “Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids”, 2009 Fourth Latin-American Symposium on Dependable Computing, pp. 25-32, 2009 [citation][year=2008]Constantinescu-Fuløp, Zoran, "A Desktop Grid Computing Approach for Scientific Computing and Visualization?, PhD Thesis, Norwegian University of Science and Technology, May 2008 [citation][year=2008]Syed Naqvi, Stephane Mouton, Philippe Massonet, Gheorghe Cosmin Silaghi, Dominic Battré, Matthias Hovestadt, Karim Djemame, "Using SLA- Based Approach To Handle Sabotage Tolerance In The Grids?, From Grids to Service and Pervasive Computing, pp 153 162, Thierry Priol and Marco Vanneschi (eds), Springer-Verlag, ISBN: 978-0-387-09454-0, 2008. Conference Articles 2017(4 publications) [publication]Lima, A. and Tiago Cruz and Sousa, B. and Simões, P. , "Security monitoring for mobile device assets: a survey", in In Proc. of 12th International Conference on Cyber Warfare and Security - ICCWS 2017. ISBN: 978-1-911218-26-5, 2017 [citation][year=2020]Thomas N Cooke, Metadata, Jailbreaking, and the Cybernetic Governmentality of iOS: Or, the Need to Distinguish Digital Privacy from digital privacy, Surveillance & Society, Vol 18 No 1 (2020): Open Issue. DOI: 10.24908/ss.v18i1.13118 [citation][year=2017]Yang Hu, John C.S. Lui, Wenjun Hu, Xiaobo Ma, Jianfeng Li, Xiao Liang, Taming energy cost of disk encryption software on data-intensive mobile devices, In Future Generation Computer Systems, 2017, , ISSN 0167-739X, https://doi.org/10.1016/j.future.2017.09.025. [publication]Borges, P. and Ferreira, L. and Saghezchi, F. and Mantas, G. and Ribeiro, J. and Rodriguez, J. and Cordeiro, L. and Simões, P. and Sousa, B. , "Towards a Hybrid Intrusion Detection System for Android-based PPDR Terminals", in Integrated Network and Service Management (IM), 2017 [citation][year=2019]Ribeiro, J., Saghezchi, F.B., Mantas, G. et al. Mobile Netw Appl (2019). https://doi.org/10.1007/s11036-019-01220-y [citation][year=2018]Pedhadiya, M.K., Jha, R.K., Bhatt, H.G., Device to device communication: A survey, Journal of Network and Computer Applications (2018), doi: https://doi.org/10.1016/j.jnca.2018.10.012. [publication]Sousa, B. and Fonseca, V. and Simões, P. and Cordeiro, L. , "Evaluation of scalable, on-demand DNS-as-a-Service", in IM2017: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management, 2017 [publication]Sousa, B. and Marques, H. and Cordeiro, L. and Edmundo Monteiro and Rodriguez, J. and Simões, P. , "Sistemas de Comunicação de Próxima Geração para Segurança Pública", in CLME2017/VCEM, 8º Congresso Luso-Moçambicano de Engenharia / V Congresso de Engenharia de Moçambique, 2017 2016(2 publications) [publication]A. S. Gomes and Fonseca, V. and Sousa, B. and D. Palma and Simões, P. and Edmundo Monteiro and Cordeiro, L. , "A Mobile Follow-Me Cloud Content Caching Model", in IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), 2016 [citation][year=2018]W. Junior et al., A systematic mapping study on mobility mechanisms for cloud service provisioning in mobile cloud ecosystems, Computers and Electrical Engineering (2018), DOI: 10.1016/j.compeleceng.2018.01.030 [citation][year=2017]Hao Jin, Dan Xu, Chenglin Zhao, Dong Liang, Information-centric mobile caching network frameworks and caching optimization: a survey, EURASIP Journal on Wireless Communications and Networking, 2017, DOI: 10.1186/s13638-017-0806-6 [publication]Sousa, B. and Zhao, Z. and Karimzadeh, M. and D. Palma and Fonseca, V. and Simões, P. and Braun, T. and Berg, H.v.d. and Pras, A. and Cordeiro, L. , "Enabling a Mobility Prediction-Aware Follow-Me Cloud Model", in IEEE 41st Conference on Local Computer Networks (LCN 2016), 2016 [citation][year=2018]Shekhar, Shashank. "Algorithms and Techniques for Dynamic Resource Management across Cloud-Edge Resource Spectrum." PhD diss., Vanderbilt University, 2018. [citation][year=2016]Mayzaud, Anthéa, Daphné Tuncer, Anna Sperotto, Gabi Dreo, Marinos Charalambides, Rashid Mijumbi, Joan Serrat et al. Flamingo H2020 Project, "D6. 4—Fourth Year Report on Automated Configuration and Repair." Communications (2016). 2015(2 publications) [publication]Sousa, B. and Pentikousis, K. and Marilia Curado , "Multihoming Aware Optimization Mechanism", in IM2015, 2015 [publication]Sousa, B. and Simões, P. and Konstantia Barbatsalou, Konstantia Barmpatsalou and Edmundo Monteiro , "Mobile Forensics for PPDR Communications: How and why?", in Iccws 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security, 2015 2014(3 publications) [publication]D. Palma and Gonçalves, J. and Sousa, B. and Cordeiro, L. and Simões, P. and Sharma, S. and Staessens, D. , "The QueuePusher: Enabling Queue Management in OpenFlow", in EWSDN 2014 – Third European Workshop on Software Defined Networks, 2014 [citation][year=2019]Jain, Vanita, Vivek Yatri, and Chaitanya Kapoor. "Software defined networking: State-of-the-art." Journal of High Speed Networks 25, no. 1 (2019): 1-40. DOI: 10.3233/JHS-190601 [citation][year=2018]Alharbi, Faisal. "SDN-BASED MECHANISMS FOR PROVISIONING QUALITY OF SERVICE TO SELECTED NETWORK FLOWS." (2018). University of Kentucky, doi: 10.13023/etd.2018.317 [citation][year=2018]Karakus, Murat. "A framework for economic analysis of network architectures." PhD diss., 2018. Purdue University, http://hdl.handle.net/1805/17915 [citation][year=2018]Gonçalo Paiva Dias, Smart cities research in Portugal and Spain: An exploratory bibliometric analysis, Proc. of the 13th Iberian Conference on Information Systems and Technologies (CISTI), 2018. doi: 10.23919/CISTI.2018.8399295 [citation][year=2018]Sahrish Khan Tayyaba, Munam Ali Shah, Resource allocation in SDN based 5G cellular networks, in Peer-to-Peer Network Applications (2018). https://doi.org/10.1007/s12083-018-0651-3 [citation][year=2018]Bagci, Kadir & Tekalp, A. (2018). Dynamic Resource Allocation by Batch-Optimization for Value-Added Video Services over SDN. IEEE Transactions on Multimedia. PP. 1-1. 10.1109/TMM.2018.2823907. [citation][year=2017]Felipe Volpato, Marcio Castro, Mario A. R. Dantas, “Proposta de um Modelo de Abstração da Camada de Gerenciamento de Dispositivos com Enfase em QoS e Suporte a OpenFlow“, Fórum de Pós-Graduação – Anais da 17ª Escola Regional de Alto Desempenho do Estado do Rio Grande do Sul (ERAD/RS 2017), pp. 169-170, SBC, 5-7 de Abril de 2017, ISSN 2177-0085. [citation][year=2017]AlSous A., Marx Gómez J. (2017) QoS in NaaS (Network-as-a-Service) Using Software Defined Networking. In: Marx Gómez J., Mora M., Raisinghani M., Nebel W., O'Connor R. (eds) Engineering and Management of Data Centers. Service Science: Research and Innovations in the Service Economy. Springer, Cham, DOI https://doi.org/10.1007/978-3-319-65082-1_6 [citation][year=2017]K. T. Bagci, K. E. Sahin and A. M. Tekalp, "Compete or Collaborate: Architectures for Collaborative DASH Video Over Future Networks," in IEEE Transactions on Multimedia, vol. 19, no. 10, pp. 2152-2165, Oct. 2017. doi: 10.1109/TMM.2017.2736638 [citation][year=2017]A. Mendiola, J. Astorga, E. Jacob and M. Higuero, "A Survey on the Contributions of Software-Defined Networking to Traffic Engineering," in IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 918-953, Secondquarter 2017. doi: 10.1109/COMST.2016.2633579 [citation][year=2017]Cesar Alonso Irizar, Caridad Anías Calderon, Propuesta para la Evaluación de Parâmetros de QoS en SDN, Revista Telem@tica. Vol. 16. No. 2, mayo-agosto, 2017, p.12- 24 ISSN 1729-3804. [citation][year=2017]Samani, Abolfazl. "Flow Maximization for Multimedia Streaming Service in SDN Networks." MSc Dissertation., University of Calgary, 2017. [citation][year=2017]F. Volpato, M. P. Da Silva, A. L. Gonçalves and M. A. R. Dantas, "An Autonomic QoS management architecture for Software-Defined Networking environments," 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 2017, pp. 418-423. doi: 10.1109/ISCC.2017.8024565 [citation][year=2017]H. Gharakheili, Dynamic Fast Lanes with Two-Sided Control, in The Role of SDN in Broadband Networks", Springer, pp. 61-85, 2017, doi: 10.1007/978-981-10-3479-4_5 [citation][year=2016]A. Gopalasingham et al., "Software-Defined mobile backhaul for future Train to ground Communication services," 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC), Colmar, 2016, pp. 161-167. doi: 10.1109/WMNC.2016.7543984 [citation][year=2016]D. Caixinha, P. Kathiravelu and L. Veiga, "ViTeNA: An SDN-based virtual network embedding algorithm for multi-tenant data centers," 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, 2016, pp. 140-147. doi: 10.1109/NCA.2016.7778608 [citation][year=2016]KT Bagci, KE Sahin, AM Tekalp, Queue-allocation optimization for adaptive video streaming over software defined networks with multiple service-levels, 2016 IEEE International Conference on Image Processing, pp. 1519-1523, Phoenix, AZ, US, Sept. 2016 [citation][year=2016]H. Habibi Gharakheili; V. Sivaraman; A. Vishwanath; L. Exton; J. Matthews; C. Russell, "SDN APIs and Models for Two-Sided Resource Management in Broadband Access Networks," in IEEE Transactions on Network and Service Management , vol.PP, no.99, pp.1-1, doi: 10.1109/TNSM.2016.2615067 [citation][year=2016]M. Karakus, A. Durresi, Quality of Service (QoS) in Software Defined Networking (SDN): A Survey. Journal of Network and Computer Applications, 2016, http://dx.doi.org/10.1016/j.jnca.2016.12.019 [citation][year=2015]Kreutz, D.; Ramos, F.M.V.; Esteves Verissimo, P.; Esteve Rothenberg, C.; Azodolmolky, S.; Uhlig, S., "Software-Defined Networking: A Comprehensive Survey," Proceedings of the IEEE , vol.103, no.1, pp.14-76, Jan. 2015, doi: 10.1109/JPROC.2014.2371999 [citation][year=2015]Atanas Mirchev, “Survey of Concepts for QoS improvements via SDN“, Seminars FI / IITM SS 15, Network Architectures and Services, pp. 33-40, September 2015, doi: 10.2313/NET-2015-09-1_05 [citation][year=2015]C. Caba and J. Soler, "APIs for QoS configuration in Software Defined Networks," Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft), London, 2015, pp. 1-5. doi: 10.1109/NETSOFT.2015.7116157 [citation][year=2015]N. Zilberman, P. Watts, C. Rotsos, A. Moore, "Reconfigurable Network Systems and Software-Defined Networking," Proc. of the IEEE, v.103, no.7, pp.1102-1124, July 2015. doi: 10.1109/JPROC.2015.2435732 [publication]Sousa, B. and Marques, C. and D. Palma and Gonçalves, J. and Simões, P. and Thomas Michael Bohnert and Cordeiro, L. , "Towards a High Performance DNSaaS Deployment", in 6th International Conference on Mobile Networks and Management (MONAMI’2014), 2014 [citation][year=2017]I.M. Alsmadi and M. Zarour, Empirical Evidences in Software-Defined Network Security: A Systematic Literature Review", in Information Fusion for Cyber-Security Analytics, Springer International Publishing, pp. 253-295, doi: 10.1007/978-3-319-44257-0_11, 2017 [publication]Sousa, B. and Pentikousis, K. and Marilia Curado , "Optimizing Quality of Resilience in the Cloud", in Globecom 2014, 2014 2013(2 publications) [publication]Sousa, B. and Marilia Curado and Pentikousis, K. , "Enhancing Path Selection in Multihomed Nodes", in MONAMI'13, 2013 [publication]Sousa, B. and Santos, R. and Marilia Curado and Pertet, S. and Gandhi, R. and Silva, C. and Pentikousis, K. , "Expedient Reconfiguration in the Cloud", in CAMAD'13, 2013 2012(1 publication) [publication]Costa, A.C. and Verissimo, P. and Kreutz, D. and Araujo, F. and Barbosa, R. and Samuel Neves and Sousa, B. and Marilia Curado and Silva, C. and Gandhi, R. and Narasimhan, P. , "TRONE: Trustworthy and Resilient Operations in a Network Environment", in The Second International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology (DCDV 2012). Proceedings of the 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DCDV 2012), 2012 [citation][year=2014]J Jang-Jaccard, S Nepal, A survey of emerging threats in cybersecurity, Journal of Computer and System Sciences, 2014 [citation][year=2014]B Sousa, K Pentikousis, M Curado, MeTHODICAL: Towards the next generation of multihomed applications, Computer Networks, 2014 [citation][year=2013]B Sousa, R Santos, M Curado, S Pertet, Expedient reconfiguration in the cloud, Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2013 IEEE 18th International Workshop on. 2011(3 publications) [publication]Sousa, B. and Pentikousis, K. and Marilia Curado , "Ubiquity Evaluation Framework", in Wired/Wireless Internet Communications, 2011 [publication]Sousa, B. and Pentikousis, K. and Marilia Curado , "A study of multimedia application performance over Multiple Care-of Addresses in Mobile IPv6", in Computers and Communications (ISCC), 2011 IEEE Symposium on, 2011 [publication]Sousa, B. and Pentikousis, K. and Marilia Curado , "A Multiple Care of Addresses Model", in Computers and Communications (ISCC), 2011 IEEE Symposium on, 2011 [citation][year=2012]P Lin, J Bi, H Hu, "Asic: an architecture for scalable intra-domain control in openflow" [citation][year=2012]A Gladisch, R Daher, D Tavangarian, "Survey on Mobility and Multihoming in Future Internet" [citation][year=2012]J Rajahalme, "Inter-domain incentives and Internet architecture" [citation][year=2012]J Wang, J Liao, T Li, P Zhang, " Correlation?aware multipath selection to enhance path diversity in ubiquitous computing environment" [citation][year=2012]K Pentikousis, R Agüero, S Sargento et al. "Mobility and Network Management in Virtualized Networks" [citation][year=2012]A Gladisch, R Daher et al. "Node-oriented Internet Protocol: A novel concept for enhancement of mobility and multi-homing in Future Internet" 2010(1 publication) [publication]Sousa, B. and Pentikousis, K. and Marilia Curado , "REF: Resilience Evaluation Framework", in Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2010 [citation][year=2013]M Liu, T Feng, P Smith, D Hutchison, "Situational Awareness for Improving Network Resilience Management", Springer 2009(3 publications) [publication]Vitor Bernardo and Cordeiro, L. and Sousa, B. and Marilia Curado and Edmundo Monteiro , "A Seamless Mobility Scenario for IP over WiMAX", in 2nd International Workshop on Future Multimedia Networking - FMN 2009 - AR 25%, 2009 [publication]Vitor Bernardo and Sousa, B. and Marilia Curado , "VoIP over WiMAX: Quality of Experience Evaluation", in IEEE 4th Workshop on multiMedia Applications over Wireless Networks (MediaWiN 2009), 2009 [citation][year=2013]Elechi Onyekachi O., Eze Elias C., "Investigating the QoS of Voice over IP using WiMAX Access Networks in a Campus Network", Journal in Computer Engineering and Intelligent System, IISTE, Vol 4, No 5, 2013 [citation][year=2013]David Palma, Joao Goncalves, Luís Cordeiro, Paulo Simões, Edmundo Monteiro, Panagis Magdalinos, Ioannis P. Chochliouros: Tutamen: An Integrated Personal Mobile and Adaptable Video Platform for Health and Protection, Artificial Intelligence Applications and Innovations - 9th IFIP WG 12.5 International Conference, AIAI 2013, Paphos, Cyprus, September 30 - October 2, 2013 [citation][year=2012]Marcos César da Rocha Seruffo, Ádamo Lima de Santana, Liviane Pontes Rego, Carlos Renato Lisboa Francês, "Multicriteria strategies for planning the capacity of interactive services for the ISDB-T standard return channel", II Congresso Brasileiro de Sistemas Fuzzy (CBSF), Natal-RN, Brazil, November 06-09, 2012 [citation][year=2012]Raghavendra Ganiga, Balachandra Muniyal and Pradeep. "Characteristic Analysis of VoIP Traffic for Wireless Networks in Comparison with CBR using QualNet Network Simulator". International Journal of Computer Applications 50(11):25-31, July 2012. Published by Foundation of Computer Science, New York, USA [citation][year=2011]Kilhung Lee, “A backup path routing for guaranteeing bandwidth in mobile ad hoc networks for multimedia applications”, Multimedia Tools and Applications, Springer Netherlands, pp. 1-13, 2011. [citation][year=2011]S. Fernandes, A. Karmouch, "Vertical Mobility Management Architectures in Wireless Networks: A Comprehensive Survey and Future Directions," IEEE Communications Surveys & Tutorials, vol.PP, no.99, pp.1-19, 2011. [citation][year=2011]Cristiano Both, Rafael Kunst, Lisandro Granville, Juergen Rochol, “Uma Anáise do Overhead dos Mapas em Redes Metropolitanas Sem Fio Baseadas em OFDMA”, XXIX Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos, Campo Grande, Mato Grosso do Sul, Brasil, 30 de Maio a 3 de Junho, 2011. [citation][year=2011]Cristiano Bonato Both, "A new cross-layer adaptive architecture to guarantee quality of service in WiMAX networks", Thesis (Ph.D.) – Universidade Federal do Rio Grande do Sul. Programa de Pós-Graduação em Computação, Porto Alegre, December, 2011. (Advisor: Lisandro Zambenedetti Granville; Coadvisor: Juergen Rochol) [citation][year=2010]Pengjun Zheng, R. McDonald, M. McDonad, "UTMC Communication over WiMAX Network", 2010 International Conference on Multimedia Technology (ICMT), vol., no., pp.1-4, 29-31 October, 2010. [citation][year=2010]WiMAX Forum®, “WiMAX® VoIP Solutions for 4G Networks”, WMF-M14-v01, 2010- 08-30, Disponível em: http://www.wimaxforum.org, 2010. [citation][year=2010]Muhammad Naveed Khalid, “Simulation Based Comparison of SCTP, DCCP and UDP Using MPEG-4 Traffic Over Mobile WiMAX/IEEE 802.16e”, Master Thesis Electrical Engineering, School of Computing Blekinge Institute of Technology, Karlskrona, Sweden, May, 2010. [publication]Neves, P. and Sousa, B. and Landi, G. and Sargento, S. and Pentikousis, K. and Marilia Curado and Piri, E. , "Mobility Management for NGN WiMAX: Specification and Implementation", in 10th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2009), 2009 [citation][year=2014]Charitos, Michael, and Grigorios Kalivas. "Analysis of an Autonomous Vehicular WiMAX–WiFi Network for in-Tunnel Surveillance System Applications over Public Transportation." Mobile Networks and Applications 19.6 (2014): 758-771. [citation][year=2009]115. Regina Maia Sacchetti, "Mobilidade Entre Diferentes Redes de Acessoem Terminais de Próxima Geração?, online, http://www.di.uminho.pt/proptese/html/proposta_1494016396.html 2008(4 publications) [publication]Sousa, B. and D. Palma and Boavida, F. and Jorge Sá Silva and Marilia Curado and Neves, P. , "The Cost of Using IEEE 802.16d Dynamic Channel Configuration", in ICC 2008. IEEE Internation Conference on Communications, 2008 [citation][year=2013] [citation][year=2009]P Neves, R Matos, B Sousa, G Landiâ?¦, Mobility management for NGN WiMAX: specification and implementation, World of Wireless, …, 2009 [citation][year=2009]R Matos, B Sousa, P Nevesâ?¦, Advanced mobility in broadband wireless access scenarios, Wireless and Mobile …, 2009 [citation][year=2009]V Bernardo, L Cordeiro, I Caramelo, B Sousaâ?¦, A seamless Mobility Scenario for IP over WiMAX, Future Multimedia …, 2009 [citation][year=2009]P Neves, S Sargento, R Matos, G Landiâ?¦, A WiMAX Cross-layer Framework for Next Generation Networks, WiMAX …, 2009 [citation][year=2008]G Martufi, M Katz, P Neves, M Curadoâ?¦, Extending WiMAX to new scenarios: key results on system architecture and test-beds of the WEIRD project, Proceedings of the …, 2008 [citation][year=2008]L Cordeiro, V Bernardo, M Curadoâ?¦, HyPath: an Approach for Hybrid On-path Off-path End-to-End Signaling, Global …, 2008 [publication]Sousa, B. and Pentikousis, K. and Marilia Curado , "Evaluation of Multimedia Services in Mobile WiMAX", in 7th International Conference on Mobile and Ubiquitous Multimedia, 2008 [citation][year=2012]P Latkoski, B Popovski, "Latency and Dropping Rate Analysis of IEEE 802.16 e Handover" [citation][year=2010]Vishwanath, A., Dutta, P., Chetlu, M., Gupta, P., Kalyanaraman, S., and Ghosh, A. 2010. Perspectives on quality of experience for video streaming over WiMAX. SIGMOBILE Mob. Comput. Commun. Rev. 13, 4, March 2010. [citation][year=2009]Chi Ma, Enda Fallon, Yansong Qiao, "VOSHM: a velocity optimized seamless handover mechanism for WiMAX networks?, 9th. IT & T Conference, Dublin University, 2009. [citation][year=2009]Emmanuel Tsekleves, John Cosmas, Amar Aggoun, and Jonathan Loo, "Converged Digital TV Services: The Role of Middleware and Future Directions of Interactive Television?, International Journal of Digital Multimedia Broadcasting, 2009. [citation][year=2009]Ben-Mubarak Mohammed Awadh, Mohd. Ali Borhanuddin, Noordin Nor Kamariah, Ismail Alyani, Ng Chee Kyun, "Review of Handover Mechanisms to Support Triple Play in Mobile WiMAX?, IETE Tech Rev 2009, Vol. 26, pp. 258-67, 2009. [publication]Sousa, B. and Marilia Curado and Pentikousis, K. , "Experimental Evaluation of Multimedia Services in WiMAX", in 4th International Mobile Multimedia Communicartions Conference, 2008 [citation][year=2014]Seetharam, Anand. "Efficient Routing and Scheduling in Wireless Networks." (2014). [citation][year=2014]Wong, Ricky, et al. "WiMAX architecture priority scheduling for multimedia applications." Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian Conference on. IEEE, 2014. [citation][year=2012]P Dutta, A Seetharam, V Arya, M Chetlur et al. , "On managing quality of experience of multiple video streams in wireless networks", INFOCOM, 2012. [citation][year=2012]M Zolotukhin, V Hytönen, T Hämäläinen et al. "Optimal Relays Deployment for 802.16 j Networks", Mobile Networks and applications. [citation][year=2010]Vishwanath, A., Dutta, P., Chetlu, M., Gupta, P., Kalyanaraman, S., and Ghosh, A. "Perspectives on quality of experience for video streaming over WiMAX?. SIGMOBILE Mob. Comput. Commun. Rev. 13, 4, March 2010. [publication]Marilia Curado and Sousa, B. and Ribeiro, L.M. and Jorge Sá Silva and Simões, P. and Boavida, F. and Edmundo Monteiro and Viegas, D.X. , "Utilização da Tecnologia WIMAX na Prevenção de Incêndios", in 5º Congresso Luso-Moçambicano de Engenharia, 2008 2007(1 publication) [publication]Leão, G. and Sousa, B. and Marilia Curado and Jorge Sá Silva , "End-to-end Signaling with Heterogeneous QoS Models Support", in International Conference On Late Advances in Networks (ICLAN\'2007), 2007 2006(1 publication) [publication]Sousa, B. and Domingues, P. and Silva, L. , "Sabotage Tolerance and Trust Management in Desktop Grid Computing", in 2nd CoreGRID Workshop on Grid and Peer To Peer Systems Architecture, 2006 [citation][year=2013]TALAL H. NOOR , QUAN Z. SHENG, SHERALI ZEADALLY, IAN YU, "Trust Management of Services in Cloud Environments: Obstacles and Solutions", ACM Computing Surveys, Vol. 0, No. 0, 2013, Pages 1, 2013 [citation][year=2010]K Watanabe, M Fukushi, S Horiguchi, “Expected-Credibility-Based Job Scheduling for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(2), pp 306-314, 2010. [citation][year=2010]K Watanabe, M Fukushi, “Generalized Spot-Checking for Reliable Volunteer Computing”, IEICE TRANSACTIONS on Information and Systems 93(12), pp 3164-3172, 2010. [citation][year=2010]F. Taoab, Y. Hub, D. Zhaoc, Z. Zhoub, “Study of failure detection and recovery in manufacturing grid resource service scheduling”, International Journal of Production Research 48(1), pp 69-94, 2010. doi:10.1080/00207540802275871 [citation][year=2010]K Watanabe, M Fukushi, S Horiguchi, “Generalized Spot-Checking for Sabotage-Tolerance in Volunteer Computing Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 655-660, 2010. [citation][year=2010]Y. Bernard, L. Klejnowski, J. Hahner, C. Muller-Schloer, “Towards Trust in Desktop Grid Systems”, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp 637-642, 2010. [citation][year=2010]F. Georgatos, V. Gkamas, A. Ilias, G. Kouretis, E. Varvarigos, “A Grid-enabled CPU Scavenging Architecture and a Case Study of its Use in the Greek School Network”, Journal of Grid Computing 8(1), pp 61-75, 2010. [citation][year=2010]Junseok Hwang, Jihyoun Park, Jorn Altmann, “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, in book “Information Systems, Technology and Management”, pp 187-197, 2010. [citation][year=2010]Wang, Y., Nakao, A., “Poisonedwater: An improved approach for accurate reputation ranking in P2P networks” Future Generation Computer Systems, volume 26, issue 8, year 2010, pp. 1317 – 1326. [citation][year=2010]Papaioannou, T.G., Stamoulis, G.D, “coverReputation-based estimation of individual performance in collaborative and competitive grids”, Future Generation Computer Systems, volume 26, issue 8, pp. 1327 – 1335, 2010. [citation][year=2010]Bernard, Y., Klejnowski, L., Hahner, J., Muller-Schloer, C., “Towards trust in desktop grid systems”, Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 637—642, 2010. [citation][year=2010]Choi, S.J. and Buyya, R., “Group-based adaptive result certification mechanism in Desktop Grids”, Future Generation Computer Systems, volume 26, issue 5, pp. 776—786, 2010. [citation][year=2010]Bendahmane, A., Essaaidi, M., El Moussaoui, A., Younes, A., “Compromised Resources Tolerance in Grid Computing Systems”, Intelligent Distributed Computing IV, pp. 145—154, 2010. [citation][year=2010]Antonopoulos, N., Rana, O.F., “Management and optimisation of P2P and Grid systems with network economics”, Future Generation Computer Systems, volume 26, issue 8, pp. 1282—1284, 2010. [citation][year=2010]Canon, Louis-Claude, Jeannot, Emmanuel, Weissman, Jon, “A Scheduling Algorithm for Defeating Collusion”, Research Report, INRIA, RR-7403, October 2010 [citation][year=2010]Hwang, J. and Kim, H.J. and Park, J., “Managing risks in an open computing environment using mean absolute deviation portfolio optimization”, Future Generation Computer Systems, volume 26, issue 8, pp. 1381-1390, 2010 [citation][year=2010]Hwang, J. and Park, J. and Altmann, J., “Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods”, Information Systems, Technology and Management, pp. 187-197, 2010 [citation][year=2010]Canon, L.C. and Jeannot, E. and Weissman, J., “A Scheduling Algorithm for Defeating Collusion”, 2010 [citation][year=2010]Bendahmane, A. and Essaaidi, M. and El Moussaoui, A. and Younes, A., “Reputation-based Majority Voting for Malicious Grid Resources Tolerance”, Scalable Computing, pp. 385, 2010. [citation][year=2010]Canon, L.C., “Outils et algorithmes pour gérer l’incertitude lors de l’ordonnancement d’application sur plateformes distribuées”, PhD Thesis, Université Henri Poincarré – Nancy 1, France, 2010. [citation][year=2010]Bendahmane, Mohammad Essaaidi, Ahmed El Moussaoui, Ali Younes, "Reputation-based Majority Voting for Malicious Grid Resources Tolerance", Ahmed Scientific International Journal for Parallel and Distributed Computing, Vol 11, No 4 (2010) - (http://www.scpe.org/index.php/scpe/article/view/669) Book Chapters 2018(1 publication) [publication]Lima, A. and Borges, P. and Sousa, B. and Simões, P. and Tiago Cruz , "An Introduction to Mobile Device Security", in Mobile Apps Engineering - ISBN 9781138054356, vol. 1, pp. 1-34, 2018 2015(1 publication) [publication]Sousa, B. and Simões, P. and Edmundo Monteiro and Konstantia Barbatsalou, Konstantia Barmpatsalou and Pereira, L. and Rodriguez, J. and Fonseca, H. and D. Palma and Nyanyo, A. and Wickson, P. and Bouwers, B. and Olcan, D. and Zerzib, D. and Brouet, J. and Lasserre, P. and Ladas, A. and Trcek, D. and Mueller, W. and Marques, H. , "Next-Generation Communication Systems for PPDR: the SALUS Perspective", in Wireless Public Safety Networks 1 – Overview and Challenges, vol. 1, pp. 49-94, 2015 PhD Theses 2014(1 publication) [publication]Sousa, B. , "Multihoming Aware Optimization Mechanism", 2014 MSc Theses 2007(1 publication) [publication]Sousa, B. and Marilia Curado and Pentikousis, K. , "Quality of Service and Mobility Support in WiMAX", 2007