default search action
Alysson Neves Bessani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j29]Samaneh Shafee, Alysson Bessani, Pedro M. Ferreira:
Evaluation of LLM-based chatbots for OSINT-based Cyber Threat Awareness. Expert Syst. Appl. 261: 125509 (2025) - 2024
- [c91]Tiago Carvalho, António Casimiro, Alysson Bessani:
On the Design of Coordination Services for IoT. DSN-S 2024: 38-42 - [c90]Hasan Heydari, Robin Vassantlal, Alysson Bessani:
Knowledge Connectivity Requirements for Solving BFT Consensus with Unknown Participants and Fault Threshold. ICDCS 2024: 221-231 - [c89]Diogo Avelas, Hasan Heydari, Eduardo Alchieri, Tobias Distler, Alysson Bessani:
Probabilistic Byzantine Fault Tolerance. PODC 2024: 170-181 - [e4]Alysson Bessani, Xavier Défago, Junya Nakamura, Koichi Wada, Yukiko Yamauchi:
27th International Conference on Principles of Distributed Systems, OPODIS 2023, December 6-8, 2023, Tokyo, Japan. LIPIcs 286, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2024, ISBN 978-3-95977-308-9 [contents] - [i20]Samaneh Shafee, Alysson Bessani, Pedro M. Ferreira:
Evaluation of LLM Chatbots for OSINT-based Cyberthreat Awareness. CoRR abs/2401.15127 (2024) - [i19]Diogo Avelas, Hasan Heydari, Eduardo Alchieri, Tobias Distler, Alysson Bessani:
Probabilistic Byzantine Fault Tolerance (Extended Version). CoRR abs/2405.04606 (2024) - [i18]Hasan Heydari, Robin Vassantlal, Alysson Bessani:
Knowledge Connectivity Requirements for Solving BFT Consensus with Unknown Participants and Fault Threshold (Extended Version). CoRR abs/2405.06055 (2024) - 2023
- [c88]Kevin Mika, René Griessl, Nils Kucza, Florian Porrmann, Martin Kaiser, Lennart Tigges, Jens Hagemeyer, Pedro Trancoso, Muhammad Waqar Azhar, Fareed Qararyah, Stavroula Zouzoula, Jämes Ménétrey, Marcelo Pasin, Pascal Felber, Carina Marcus, Oliver Brunnegård, Olof Eriksson, Hans Salomonsson, Daniel Ödman, Andreas Ask, António Casimiro, Alysson Bessani, Tiago Carvalho, Karol Gugala, Piotr Zierhoffer, Grzegorz Latosinski, Marco Tassemeier, Mario Porrmann, Hans-Martin Heyn, Eric Knauss, Yufei Mao, Franz Meierhöfer:
VEDLIoT: Next generation accelerated AIoT systems and applications. CF 2023: 291-296 - [c87]Alysson Neves Bessani:
Byzantine State Machine Replication in the Age of Blockchains: Fundamentals and Recent Results (Tutorial). DSN-S 2023: 1 - [c86]Hasan Heydari, Guthemberg Silvestre, Alysson Bessani:
How Hard is Asynchronous Weight Reassignment? ICDCS 2023: 523-533 - [c85]Robin Vassantlal, Hasan Heydari, Alysson Bessani:
On the Minimal Knowledge Required for Solving Stellar Consensus. ICDCS 2023: 682-691 - [c84]Christian Berger, Lívio Rodrigues, Hans P. Reiser, Vinicius Vielmo Cogo, Alysson Bessani:
Poster: Faster Quorums with FlashConsensus. PRDC 2023: 244-246 - [i17]Kevin Mika, René Griessl, Nils Kucza, Florian Porrmann, Martin Kaiser, Lennart Tigges, Jens Hagemeyer, Pedro Trancoso, Muhammad Waqar Azhar, Fareed Qararyah, Stavroula Zouzoula, Jämes Ménétrey, Marcelo Pasin, Pascal Felber, Carina Marcus, Oliver Brunnegård, Olof Eriksson, Hans Salomonsson, Daniel Ödman, Andreas Ask, António Casimiro, Alysson Bessani, Tiago Carvalho, Karol Gugala, Piotr Zierhoffer, Grzegorz Latosinski, Marco Tassemeier, Mario Porrmann, Hans-Martin Heyn, Eric Knauss, Yufei Mao, Franz Meierhöfer:
VEDLIoT - Next generation accelerated AIoT systems and applications. CoRR abs/2305.05388 (2023) - [i16]Christian Berger, Lívio Rodrigues, Hans P. Reiser, Vinicius Vielmo Cogo, Alysson Bessani:
Chasing the Speed of Light: Low-Latency Planetary-Scale Adaptive Byzantine Consensus. CoRR abs/2305.15000 (2023) - [i15]Robin Vassantlal, Hasan Heydari, Alysson Bessani:
On the Minimal Knowledge Required for Solving Stellar Consensus. CoRR abs/2305.17989 (2023) - [i14]Hasan Heydari, Guthemberg Silvestre, Alysson Bessani:
How Hard is Asynchronous Weight Reassignment? (Extended Version). CoRR abs/2306.03185 (2023) - [i13]Alysson Bessani, Miguel Correia, Tobias Distler, Rüdiger Kapitza, Paulo Esteves Veríssimo, Jiangshan Yu:
Vivisecting the Dissection: On the Role of Trusted Components in BFT Protocols. CoRR abs/2312.05714 (2023) - 2022
- [j28]Christian Berger, Hans P. Reiser, João Sousa, Alysson Bessani:
AWARE: Adaptive Wide-Area Replication for Fast and Resilient Byzantine Consensus. IEEE Trans. Dependable Secur. Comput. 19(3): 1605-1620 (2022) - [c83]Martin Kaiser, René Griessl, Nils Kucza, Carola Haumann, Lennart Tigges, Kevin Mika, Jens Hagemeyer, Florian Porrmann, Ulrich Rückert, Micha vor dem Berge, Stefan Krupop, Mario Porrmann, Marco Tassemeier, Pedro Trancoso, Fareed Qararyah, Stavroula Zouzoula, António Casimiro, Alysson Neves Bessani, José Cecílio, Stefan Andersson, Oliver Brunnegård, Olof Eriksson, Roland Weiss, Franz Meierhöfer, Hans Salomonsson, Elaheh Malekzadeh, Daniel Ödman, Anum Khurshid, Pascal Felber, Marcelo Pasin, Valerio Schiavoni, Jämes Ménétrey, Karol Gugala, Piotr Zierhoffer, Eric Knauss, Hans-Martin Heyn:
VEDLIoT: Very Efficient Deep Learning in IoT. DATE 2022: 963-968 - [c82]Robin Vassantlal, Eduardo Alchieri, Bernardo Ferreira, Alysson Bessani:
COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services. SP 2022: 1335-1353 - [i12]Martin Kaiser, René Griessl, Nils Kucza, Carola Haumann, Lennart Tigges, Kevin Mika, Jens Hagemeyer, Florian Porrmann, Ulrich Rückert, Micha vor dem Berge, Stefan Krupop, Mario Porrmann, Marco Tassemeier, Pedro Trancoso, Fareed Qararyah, Stavroula Zouzoula, António Casimiro, Alysson Bessani, José Cecílio, Stefan Andersson, Oliver Brunnegård, Olof Eriksson, Roland Weiss, Franz Meierhöfer, Hans Salomonsson, Elaheh Malekzadeh, Daniel Ödman, Anum Khurshid, Pascal Felber, Marcelo Pasin, Valerio Schiavoni, Jämes Ménétrey, Karol Gugula, Piotr Zierhoffer, Eric Knauss, Hans-Martin Heyn:
VEDLIoT: Very Efficient Deep Learning in IoT. CoRR abs/2207.00675 (2022) - 2021
- [j27]Ricardo Macedo, João Paulo, José Pereira, Alysson Bessani:
A Survey and Classification of Software-Defined Storage Systems. ACM Comput. Surv. 53(3): 48:1-48:38 (2021) - [j26]Fernando Alves, Aurélien Bettini, Pedro M. Ferreira, Alysson Bessani:
Processing tweets for cybersecurity threat awareness. Inf. Syst. 95: 101586 (2021) - [j25]Wilson S. Melo, Luiz V. G. Tarelho, Bruno A. Rodrigues Filho, Alysson Neves Bessani, Luiz F. R. C. Carmo:
Field surveillance of fuel dispensers using IoT-based metering and blockchains. J. Netw. Comput. Appl. 175: 102914 (2021) - [j24]Vinicius Vielmo Cogo, João Paulo, Alysson Bessani:
GenoDedup: Similarity-Based Deduplication and Delta-Encoding for Genome Sequencing Data. IEEE Trans. Computers 70(5): 669-681 (2021) - [j23]Ricardo Mendes, Tiago Oliveira, Vinicius Vielmo Cogo, Nuno Neves, Alysson Bessani:
Charon: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data. IEEE Trans. Cloud Comput. 9(4): 1349-1361 (2021) - [c81]Christian Berger, Hans P. Reiser, Alysson Bessani:
Making Reads in BFT State Machine Replication Fast, Linearizable, and Live. SRDS 2021: 1-12 - [c80]Vinicius Vielmo Cogo, Alysson Bessani:
Brief Announcement: Auditable Register Emulations. DISC 2021: 53:1-53:4 - [i11]Christian Berger, Hans P. Reiser, Alysson Bessani:
Making Reads in BFT State Machine Replication Fast, Linearizable, and Live. CoRR abs/2107.11144 (2021) - 2020
- [c79]Enrique Fynn, Alysson Bessani, Fernando Pedone:
Smart Contracts on the Move. DSN 2020: 233-244 - [c78]Alysson Bessani, Eduardo Alchieri, João Sousa, André Oliveira, Fernando Pedone:
From Byzantine Replication to Blockchain: Consensus is Only the Beginning. DSN 2020: 424-436 - [c77]Fernando Alves, Ambrose Andongabo, Ilir Gashi, Pedro M. Ferreira, Alysson Bessani:
Follow the Blue Bird: A Study on Threat Data Published on Twitter. ESORICS (1) 2020: 217-236 - [c76]Nuno Dionísio, Fernando Alves, Pedro M. Ferreira, Alysson Bessani:
Towards end-to-end Cyberthreat Detection from Twitter using Multi-Task Learning. IJCNN 2020: 1-8 - [i10]Enrique Fynn, Alysson Bessani, Fernando Pedone:
Smart Contracts on the Move. CoRR abs/2004.05933 (2020) - [i9]Alysson Bessani, Eduardo Alchieri, João Sousa, André Oliveira, Fernando Pedone:
From Byzantine Replication to Blockchain: Consensus is only the Beginning. CoRR abs/2004.14527 (2020) - [i8]Christian Berger, Hans P. Reiser, João Sousa, Alysson Bessani:
AWARE: Adaptive Wide-Area Replication for Fast and Resilient Byzantine Consensus. CoRR abs/2011.01671 (2020)
2010 – 2019
- 2019
- [j22]Eduardo Viegas, Altair Olivo Santin, Alysson Bessani, Nuno Neves:
BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks. Future Gener. Comput. Syst. 93: 473-485 (2019) - [j21]Wilson S. Melo, Alysson Bessani, Nuno Neves, Altair Olivo Santin, Luiz Fernando Rust da Costa Carmo:
Using Blockchains to Implement Distributed Measuring Systems. IEEE Trans. Instrum. Meas. 68(5): 1503-1514 (2019) - [c75]Fernando Alves, Pedro Miguel Ferreira, Alysson Bessani:
Design of a Classification Model for a Twitter-Based Streaming Threat Monitor. DSN Workshops 2019: 9-14 - [c74]Nuno Dionísio, Fernando Alves, Pedro Miguel Ferreira, Alysson Bessani:
Cyberthreat Detection from Twitter using Deep Neural Networks. IJCNN 2019: 1-8 - [c73]Miguel Garcia, Alysson Bessani, Nuno Neves:
Lazarus: Automatic Management of Diversity in BFT Systems. Middleware 2019: 241-254 - [c72]Adriano Serckumecka, Ibéria Medeiros, Bernardo Ferreira, Alysson Bessani:
SLICER: Safe Long-Term Cloud Event Archival. PRDC 2019: 43-52 - [c71]Vinicius Vielmo Cogo, Alysson Bessani:
Enabling the Efficient, Dependable Cloud-Based Storage of Human Genomes. SRDS Workshops 2019: 19-24 - [c70]Christian Berger, Hans P. Reiser, João Sousa, Alysson Bessani:
Resilient Wide-Area Byzantine Consensus Using Adaptive Weighted Replication. SRDS 2019: 183-192 - [c69]Adriano Serckumecka, Ibéria Medeiros, Alysson Bessani:
Low-Cost Serverless SIEM in the Cloud. SRDS 2019: 381-382 - [c68]Rui Azevedo, Ibéria Medeiros, Alysson Bessani:
PURE: Generating Quality Threat Intelligence by Clustering and Correlating OSINT. TrustCom/BigDataSE 2019: 483-490 - [i7]Nuno Dionísio, Fernando Alves, Pedro Miguel Ferreira, Alysson Bessani:
Cyberthreat Detection from Twitter using Deep Neural Networks. CoRR abs/1904.01127 (2019) - [i6]Fernando Alves, Aurélien Bettini, Pedro Miguel Ferreira, Alysson Bessani:
Processing Tweets for Cybersecurity Threat Awareness. CoRR abs/1904.02072 (2019) - [i5]Vinicius Vielmo Cogo, Alysson Bessani:
Auditable Register Emulations. CoRR abs/1905.08637 (2019) - 2018
- [j20]Eduardo Adílio Pelinson Alchieri, Alysson Bessani, Fabíola Greve, Joni da Silva Fraga:
Knowledge Connectivity Requirements for Solving Byzantine Consensus with Unknown Participants. IEEE Trans. Dependable Secur. Comput. 15(2): 246-259 (2018) - [j19]Miguel Garcia, Nuno Neves, Alysson Bessani:
SieveQ: A Layered BFT Protection System for Critical Services. IEEE Trans. Dependable Secur. Comput. 15(3): 511-525 (2018) - [c67]Paulo R. Coelho, Tarcisio Ceolin Junior, Alysson Bessani, Fernando Luís Dotti, Fernando Pedone:
Byzantine Fault-Tolerant Atomic Multicast. DSN 2018: 39-50 - [c66]João Sousa, Alysson Bessani, Marko Vukolic:
A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform. DSN 2018: 51-58 - [c65]Pedro Marques, Zayani Dabbabi, Miruna-Mihaela Mironescu, Olivier Thonnard, Frances V. Buontempo, Ilir Gashi, Alysson Bessani:
Using Diverse Detectors for Detecting Malicious Web Scraping Activity. DSN Workshops 2018: 67-68 - [c64]Alysson Bessani, Hans P. Reiser, Marko Vukolic, Tobias Distler:
BCRB 2018 introduction. DSN Workshops 2018: 121 - [c63]André Nogueira, Miguel Garcia, Alysson Bessani, Nuno Neves:
On the Challenges of Building a BFT SCADA. DSN 2018: 163-170 - [c62]Wilson S. Melo, Luiz F. R. C. Carmo, Alysson Bessani, Nuno Neves, Altair Olivo Santin:
How blockchains can improve measuring instruments regulation and control. I2MTC 2018: 1-6 - [c61]Pedro Marques, Zayani Dabbabi, Miruna-Mihaela Mironescu, Olivier Thonnard, Alysson Bessani, Frances V. Buontempo, Ilir Gashi:
Detecting Malicious Web Scraping Activity: A Study with Diverse Detectors. PRDC 2018: 269-278 - [c60]Carlos Carvalho, Daniel Porto, Luís E. T. Rodrigues, Manuel Bravo, Alysson Bessani:
Dynamic adaptation of byzantine consensus protocols. SAC 2018: 411-418 - [e3]James Aspnes, Alysson Bessani, Pascal Felber, João Leitão:
21st International Conference on Principles of Distributed Systems, OPODIS 2017, Lisbon, Portugal, December 18-20, 2017. LIPIcs 95, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2018, ISBN 978-3-95977-061-3 [contents] - [i4]David R. Matos, Nuno Neves, Alysson Bessani:
SITAN: Services for Fault-Tolerant Ad Hoc Networks with Unknown Participants. CoRR abs/1804.09107 (2018) - 2017
- [j18]André Nogueira, António Casimiro, Alysson Bessani:
Elastic State Machine Replication. IEEE Trans. Parallel Distributed Syst. 28(9): 2486-2499 (2017) - [c59]Eduardo Viegas, Altair Olivo Santin, Nuno Ferreira Neves, Alysson Bessani, Vilmar Abreu:
A Resilient Stream Learning Intrusion Detection Mechanism for Real-Time Analysis of Network Traffic. GLOBECOM 2017: 1-6 - [c58]Wilson S. Melo, Alysson Bessani, Luiz F. R. C. Carmo:
How blockchains can help legal metrology. SERIAL@Middleware 2017: 5:1-5:2 - [c57]Alysson Bessani, João Sousa, Marko Vukolic:
A byzantine fault-tolerant ordering service for the hyperledger fabric blockchain platform. SERIAL@Middleware 2017: 6:1-6:2 - [c56]Joel Alcântara, Tiago Oliveira, Alysson Bessani:
Ginja: one-dollar cloud-based disaster recovery for databases. Middleware 2017: 248-260 - [c55]Eduardo Alchieri, Alysson Bessani, Fabíola Greve, Joni da Silva Fraga:
Efficient and Modular Consensus-Free Reconfiguration for Fault-Tolerant Storage. OPODIS 2017: 26:1-26:17 - [c54]Vinicius Vielmo Cogo, Alysson Bessani, Francisco M. Couto, Margarida Gama-Carvalho, Maria Fernandes, Paulo Jorge Esteves Veríssimo:
How Can Photo Sharing Inspire Sharing Genomes? PACBB 2017: 74-82 - [i3]João Sousa, Alysson Bessani, Marko Vukolic:
A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform. CoRR abs/1709.06921 (2017) - 2016
- [j17]Alysson Bessani, Nuno Ferreira Neves, Paulo Veríssimo, Wagner Saback Dantas, Alexandre Fonseca, Rui Silva, Pedro Luz, Miguel Correia:
JITeR: Just-in-time application-layer routing. Comput. Networks 104: 122-136 (2016) - [c53]Fábio Andrade Botelho, Tulio Alberton Ribeiro, Paulo Ferreira, Fernando M. V. Ramos, Alysson Neves Bessani:
Design and Implementation of a Consistent Data Store for a Distributed SDN Control Plane. EDCC 2016: 169-180 - [c52]Tiago Oliveira, Ricardo Mendes, Alysson Neves Bessani:
Exploring Key-Value Stores in Multi-Writer Byzantine-Resilient Register Emulations. OPODIS 2016: 30:1-30:17 - [e2]Peter Alvaro, Alysson Bessani:
Proceedings of the 2nd Workshop on the Principles and Practice of Consistency for Distributed Data, PaPoC@EuroSys 2016, London, United Kingdom, April 18, 2016. ACM 2016, ISBN 978-1-4503-4296-4 [contents] - [i2]Eduardo Alchieri, Alysson Bessani, Fabíola Greve, Joni da Silva Fraga:
Efficient and Modular Consensus-Free Reconfiguration for Fault-Tolerant Storage. CoRR abs/1607.05344 (2016) - 2015
- [c51]Alysson Neves Bessani, Ricardo Mendes, Tiago Oliveira:
On the consistency of heterogeneous composite objects. PaPoC@EuroSys 2015: 9:1-9:2 - [c50]Tobias Distler, Christopher Bahn, Alysson Neves Bessani, Frank Fischer, Flavio Junqueira:
Extensible distributed coordination. EuroSys 2015: 10:1-10:16 - [c49]João Sousa, Alysson Bessani:
Separating the WHEAT from the Chaff: An Empirical Design for Geo-Replicated State Machines. SRDS 2015: 146-155 - [c48]Alysson Bessani, Jörgen Brandt, Marc Bux, Vinicius Vielmo Cogo, Lora Dimitrova, Jim Dowling, Ali Gholami, Kamal Hakimzadeh, Michael Hummel, Mahmoud Ismail, Erwin Laure, Ulf Leser, Jan-Eric Litton, Roxanna Martinez, Salman Niazi, Jane Reichel, Karin Zimmermann:
BiobankCloud: A Platform for the Secure Storage, Sharing, and Processing of Large Biomedical Data Sets. Big-O(Q)/DMAH@VLDB 2015: 89-105 - [c47]Vinicius Vielmo Cogo, Alysson Bessani, Francisco M. Couto, Paulo Veríssimo:
A High-Throughput Method to Detect Privacy-Sensitive Human Genomic Data. WPES@CCS 2015: 101-110 - [e1]Alysson Bessani, Sara Bouchenak:
Distributed Applications and Interoperable Systems - 15th IFIP WG 6.1 International Conference, DAIS 2015, Held as Part of the 10th International Federated Conference on Distributed Computing Techniques, DisCoTec 2015, Grenoble, France, June 2-4, 2015, Proceedings. Lecture Notes in Computer Science 9038, Springer 2015, ISBN 978-3-319-19128-7 [contents] - 2014
- [j16]Alysson Bessani, Leucio Antonio Cutillo, Gianluca Ramunno, Norbert Schirmer, Paolo Smiraglia:
The TClouds Platform: From the Concept to the Implementation of Benchmark Scenarios. ACM SIGOPS Oper. Syst. Rev. 48(2): 13-22 (2014) - [j15]Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, Nuno Ferreira Neves, Rafael R. Obelheiro:
Analysis of operating system diversity for intrusion tolerance. Softw. Pract. Exp. 44(6): 735-770 (2014) - [c46]Alysson Neves Bessani, João Sousa, Eduardo Adílio Pelinson Alchieri:
State Machine Replication for the Masses with BFT-SMART. DSN 2014: 355-362 - [c45]Tiago Oliveira, Ricardo Mendes, Alysson Neves Bessani:
Sharing Files Using Cloud Storage Services. Euro-Par Workshops (2) 2014: 13-25 - [c44]Fábio Andrade Botelho, Alysson Neves Bessani, Fernando M. V. Ramos, Paulo Ferreira:
On the Design of Practical Fault-Tolerant SDN Controllers. EWSDN 2014: 73-78 - [c43]Diego Kreutz, Alysson Neves Bessani, Eduardo Feitosa, Hugo Cunha:
Towards Secure and Dependable Authentication and Authorization Infrastructures. PRDC 2014: 43-52 - [c42]Eduardo Adílio Pelinson Alchieri, Alysson Neves Bessani, Fabíola Greve, Joni da Silva Fraga:
Modular Quorum Systems Reconfigurations. SBRC 2014: 147-155 - [c41]Alysson Neves Bessani, Ricardo Mendes, Tiago Oliveira, Nuno Ferreira Neves, Miguel Correia, Marcelo Pasin, Paulo Veríssimo:
SCFS: A Shared Cloud-backed File System. USENIX ATC 2014: 169-180 - [i1]Fábio Andrade Botelho, Alysson Neves Bessani, Fernando M. V. Ramos, Paulo Ferreira:
SMaRtLight: A Practical Fault-Tolerant SDN Controller. CoRR abs/1407.6062 (2014) - 2013
- [j14]Paulo Jorge Esteves Veríssimo, Alysson Neves Bessani:
E-biobanking: What Have You Done to My Cell Samples? IEEE Secur. Priv. 11(6): 62-65 (2013) - [j13]Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, Paulo Veríssimo:
Efficient Byzantine Fault-Tolerance. IEEE Trans. Computers 62(1): 16-30 (2013) - [j12]Pedro A. R. S. Costa, Marcelo Pasin, Alysson Neves Bessani, Miguel P. Correia:
On the Performance of Byzantine Fault-Tolerant MapReduce. IEEE Trans. Dependable Secur. Comput. 10(5): 301-313 (2013) - [j11]Alysson Neves Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa:
DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. ACM Trans. Storage 9(4): 12 (2013) - [c40]Vinicius Vielmo Cogo, André Nogueira, João Sousa, Marcelo Pasin, Hans P. Reiser, Alysson Neves Bessani:
FITCH: Supporting Adaptive Replicated Services in the Cloud. DAIS 2013: 15-28 - [c39]Miguel Garcia, Nuno Ferreira Neves, Alysson Bessani:
An intrusion-tolerant firewall design for protecting SIEM systems. DSN Workshops 2013: 1-7 - [c38]Fábio Andrade Botelho, Fernando Manuel Valente Ramos, Diego Kreutz, Alysson Neves Bessani:
On the Feasibility of a Consistent and Fault-Tolerant Data Store for SDNs. EWSDN 2013: 38-43 - [c37]Alysson Bessani, Leucio Antonio Cutillo, Gianluca Ramunno, Norbert Schirmer, Paolo Smiraglia:
The TClouds platform: concept, architecture and instantiations. DISCCO@SRDS 2013: 1:1-1:6 - [c36]Alysson Neves Bessani, Marcel Santos, João Felix, Nuno Ferreira Neves, Miguel Correia:
On the Efficiency of Durable State Machine Replication. USENIX ATC 2013: 169-180 - 2012
- [j10]Luís Teixeira d'Aguiar Norton Brandao, Alysson Neves Bessani:
On the reliability and availability of replicated and rejuvenating systems under stealth attacks and intrusions. J. Braz. Comput. Soc. 18(1): 61-80 (2012) - [j9]Luís Teixeira d'Aguiar Norton Brandao, Alysson Neves Bessani:
Erratum to: On the reliability and availability of replicated and rejuvenating systems under stealth attacks and intrusions. J. Braz. Comput. Soc. 18(3): 267 (2012) - [j8]Alysson Neves Bessani, Rüdiger Kapitza, Dana Petcu, Paolo Romano, Spyridon V. Gogouvitis, Dimosthenis Kyriazis, Roberto G. Cascella:
A look to the old-world_sky: EU-funded dependability cloud computing research. ACM SIGOPS Oper. Syst. Rev. 46(2): 43-56 (2012) - [j7]Luciana Arantes, Alysson Neves Bessani, Vinicius Vielmo Cogo, Miguel Correia, Pedro Costa, Jonathan Lejeune, M. Piffaretti, Olivier Marin, Marcelo Pasin, Pierre Sens, Fabrício Silva, Julien Sopena:
Vers une plate-forme MapReduce tolérant les fautes byzantines. Tech. Sci. Informatiques 31(8-10): 1079-1099 (2012) - [c35]Paulo Veríssimo, Alysson Neves Bessani, Marcelo Pasin:
The TClouds architecture: Open and resilient cloud-of-clouds computing. DSN Workshops 2012: 1-6 - [c34]João Sousa, Alysson Neves Bessani:
From Byzantine Consensus to BFT State Machine Replication: A Latency-Optimal Transformation. EDCC 2012: 37-48 - [c33]Miguel Correia, Pedro A. R. S. Costa, Marcelo Pasin, Alysson Neves Bessani, Fernando M. V. Ramos, Paulo Veríssimo:
On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds. SRDS 2012: 448-453 - [c32]Eduardo Adílio Pelinson Alchieri, Alysson Neves Bessani, Fabíola Greve, Joni da Silva Fraga:
Brief Announcement: Decoupled and Consensus-Free Reconfiguration for Fault-Tolerant Storage. DISC 2012: 443-444 - 2011
- [c31]Pedro A. R. S. Costa, Marcelo Pasin, Alysson Neves Bessani, Miguel Correia:
Byzantine Fault-Tolerant MapReduce: Faults are Not Just Crashes. CloudCom 2011: 32-39 - [c30]Alysson Neves Bessani, Partha P. Pal:
5th Workshop on recent advances in intrusion-tolerant systems WRAITS 2011. DSN Workshops 2011: 1-2 - [c29]Alysson Neves Bessani:
From Byzantine fault tolerance to intrusion tolerance (a position paper). DSN Workshops 2011: 15-18 - [c28]Bernhard Kauer, Paulo Veríssimo, Alysson Neves Bessani:
Recursive virtual machines for advanced security mechanisms. DSN Workshops 2011: 117-122 - [c27]Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, Nuno Ferreira Neves, Rafael R. Obelheiro:
OS diversity for intrusion tolerance: Myth or reality? DSN 2011: 383-394 - [c26]Alysson Neves Bessani, Partha P. Pal:
5th Workshop on Recent Advances in Intrusion-Tolerant Systems WRAITS 2011. DSN 2011: 586-587 - [c25]Alysson Neves Bessani, Miguel P. Correia, Bruno Quaresma, Fernando André, Paulo Sousa:
DepSky: dependable and secure storage in a cloud-of-clouds. EuroSys 2011: 31-46 - [c24]Luís T. A. N. Brandão, Alysson Neves Bessani:
On the Reliability and Availability of Systems Tolerant to Stealth Intrusion. LADC 2011: 35-44 - 2010
- [j6]Eduardo Adílio Pelinson Alchieri, Alysson Neves Bessani, Joni da Silva Fraga:
A Dependable Infrastructure for Cooperative Web Services Coordination. Int. J. Web Serv. Res. 7(2): 43-64 (2010) - [j5]Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Trans. Parallel Distributed Syst. 21(4): 452-465 (2010) - [c23]Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung:
EBAWA: Efficient Byzantine Agreement for Wide-Area Networks. HASE 2010: 10-19 - [c22]Alysson Neves Bessani, Paulo Sousa, Miguel Correia:
Active Quorum Systems. HotDep 2010
2000 – 2009
- 2009
- [j4]Alysson Neves Bessani, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung:
An Efficient Byzantine-Resilient Tuple Space. IEEE Trans. Computers 58(8): 1080-1094 (2009) - [j3]Alysson Neves Bessani, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung:
Sharing Memory between Byzantine Processes Using Policy-Enforced Tuple Spaces. IEEE Trans. Parallel Distributed Syst. 20(3): 419-432 (2009) - [c21]Paulo Sousa, Alysson Neves Bessani, Wagner Saback Dantas, Fabio Souto, Miguel Correia, Nuno Ferreira Neves:
Intrusion-tolerant self-healing devices for critical infrastructure protection. DSN 2009: 217-222 - [c20]Paulo Veríssimo, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa:
Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned. HICSS 2009: 1-8 - [c19]Eduardo Adílio Pelinson Alchieri, Alysson Neves Bessani, Fernando Carlos Pereira, Joni da Silva Fraga:
Proactive Byzantine Quorum Systems. OTM Conferences (1) 2009: 708-725 - [c18]Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung:
Spin One's Wheels? Byzantine Fault Tolerance with a Spinning Primary. SRDS 2009: 135-144 - 2008
- [j2]Alysson Neves Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
The Crutial Way of Critical Infrastructure Protection. IEEE Secur. Priv. 6(6): 44-51 (2008) - [j1]Miguel Correia, Alysson Neves Bessani, Paulo Veríssimo:
On Byzantine generals with alternative plans. J. Parallel Distributed Comput. 68(9): 1291-1296 (2008) - [c17]Alysson Neves Bessani, Eduardo Adílio Pelinson Alchieri, Miguel Correia, Joni da Silva Fraga:
DepSpace: a byzantine fault-tolerant coordination service. EuroSys 2008: 163-176 - [c16]Eduardo Adílio Pelinson Alchieri, Alysson Neves Bessani, Joni da Silva Fraga:
A Dependable Infrastructure for Cooperative Web Services Coordination. ICWS 2008: 21-28 - [c15]Alysson Neves Bessani, Hans P. Reiser, Paulo Sousa, Ilir Gashi, Vladimir Stankovic, Tobias Distler, Rüdiger Kapitza, Alessandro Daidone, Rafael R. Obelheiro:
FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery. Middleware (Companion) 2008: 99-101 - [c14]Eduardo Adílio Pelinson Alchieri, Alysson Neves Bessani, Joni da Silva Fraga, Fabíola Greve:
Byzantine Consensus with Unknown Participants. OPODIS 2008: 22-40 - 2007
- [c13]Alysson Neves Bessani, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung:
Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems. NCA 2007: 231-238 - [c12]Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
Resilient Intrusion Tolerance through Proactive and Reactive Recovery. PRDC 2007: 373-380 - [c11]Wagner Saback Dantas, Alysson Neves Bessani, Joni da Silva Fraga, Miguel Correia:
Evaluating Byzantine Quorum Systems. SRDS 2007: 253-264 - [c10]Alysson Neves Bessani, Miguel Correia, Henrique Moniz, Nuno Ferreira Neves, Paulo Veríssimo:
When 3f+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus. DISC 2007: 480-481 - 2006
- [b1]Alysson Neves Bessani:
Coordenação desacoplada tolerante a faltas bizantinas. Federal University of Santa Catarina, Florianópolis, Brazil, 2006 - [c9]Alysson Neves Bessani, Joni da Silva Fraga, Miguel Correia, Lau Cheuk Lung:
Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces. ICDCS 2006: 35 - [c8]Alysson Neves Bessani, Joni da Silva Fraga, Lau Cheuk Lung:
BTS: a Byzantine fault-tolerant tuple space. SAC 2006: 429-433 - [c7]Alysson Neves Bessani, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung:
Brief Announcement: Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems. DISC 2006: 554-556 - 2005
- [c6]Christiane M. Bortoleto, Lau Cheuk Lung, Frank Siqueira, Alysson Neves Bessani, Joni da Silva Fraga:
A Semi-reliable Multicast Protocol for Distributed Multimedia Applications in Large Scale Networks. MMNS 2005: 109-120 - [c5]Alysson Neves Bessani, Joni da Silva Fraga, Lau Cheuk Lung:
Extending the UMIOP Specification for Reliable Multicast in CORBA. OTM Conferences (1) 2005: 662-679 - [c4]Daniel Borusch, Lau Cheuk Lung, Alysson Neves Bessani, Joni da Silva Fraga:
Integrating the ROMIOP and ETF Specifications for Atomic Multicast in CORBA. OTM Conferences (1) 2005: 680-697 - 2004
- [c3]Alysson Neves Bessani, Joni da Silva Fraga, Lau Cheuk Lung, Eduardo Adílio Pelinson Alchieri:
Active Replication in CORBA: Standards, Protocols, and Implementation Framework. CoopIS/DOA/ODBASE (2) 2004: 1395-1412 - 2003
- [c2]Alysson Neves Bessani, Lau Cheuk Lung, Joni da Silva Fraga, Alcides Calsavara:
Integrating the Unreliable Multicast Inter-ORB Protocol in MJACO. DAIS 2003: 200-211 - [c1]Alysson Neves Bessani, Joni da Silva Fraga, Lau Cheuk Lung:
Implementing the Multicast Inter-ORB Protocol. ISORC 2003: 135-138
Coauthor Index
aka: Eduardo Adílio Pelinson Alchieri
aka: Pedro Miguel Ferreira
aka: Nuno Ferreira Neves
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint