This page has only limited features, please log in for full access.
The remarkable growth of the Internet of Things (IoT) has given rise to application areas where it is crucial to secure the endpoints, to guarantee users privacy and even safety. In this context, secure group communication among low-cost devices is a fundamental and challenging research question. Namely, the limited computational resources of nodes, uncertain periods of connectivity, and potentially large number of connected devices make it impractical to apply established solutions to IoT settings. This paper specifies a security protocol, named Sharelock, that provides end-to-end security and confidentiality of messages exchanged by groups of communicating nodes. The protocol establishes long-term security for nodes communicating through untrusted edge servers and scales to large groups of nodes by using cryptographic primitives that are not only applicable to low-cost devices, but also suitable for post-quantum cryptography. The protocol is designed to support the exchange and storage of generic messages among nodes, thereby making it appropriate for a wide range of IoT applications.
André Lizardo; Raul Barbosa; Samuel Neves; Jaime Correia; Filipe Araujo. End-to-end secure group communication for the Internet of Things. Journal of Information Security and Applications 2021, 58, 102772 .
AMA StyleAndré Lizardo, Raul Barbosa, Samuel Neves, Jaime Correia, Filipe Araujo. End-to-end secure group communication for the Internet of Things. Journal of Information Security and Applications. 2021; 58 ():102772.
Chicago/Turabian StyleAndré Lizardo; Raul Barbosa; Samuel Neves; Jaime Correia; Filipe Araujo. 2021. "End-to-end secure group communication for the Internet of Things." Journal of Information Security and Applications 58, no. : 102772.
At ProvSec 2013, Minematsu presented the circulant hash, an almost-xor universal hash using only the xor and rotation operations. The circulant hash is a variant of Carter and Wegman’s H 3 hash as well as Krawczyk’s Toeplitz hash, both of which are hashes based on matrix-vector multiplication over 𝔽2. In this paper we revisit the circulant hash and reinterpret it as a multiplication in the polynomial ring 𝔽2[x]/(xn + 1). This leads to simpler proofs, faster implementations in modern computer chips, and newer variants with practical implementation advantages.
Filipe Araujo; Samuel Neves. The circulant hash revisited. Journal of Mathematical Cryptology 2020, 15, 250 -257.
AMA StyleFilipe Araujo, Samuel Neves. The circulant hash revisited. Journal of Mathematical Cryptology. 2020; 15 (1):250-257.
Chicago/Turabian StyleFilipe Araujo; Samuel Neves. 2020. "The circulant hash revisited." Journal of Mathematical Cryptology 15, no. 1: 250-257.
We propose a benchmarking test suite to evaluate performance of cloud serverless platforms and an open source software tool to automate the test process. Additionally, we used this setup to compare the commercial offers of Amazon, Google, Microsoft, and IBM. The work builds on ideas and experiments reported in the literature that, nevertheless, did not offer a “standard” set of coherent and comprehensive tests, capable of analyzing diverse serverless platforms, across the same set of features. To that end, we defined seven tests that cover scalability (latency and throughput), the effect of allocated memory, the performance for CPU-bound cases, the impact of payload size, the influence of the programming language, resource management (e.g., reuse of containers), and overall platform overhead. We created a software tool to deploy the test code and collect metrics in a manner agnostic to the serverless platforms under study. At a time when serverless computing popularity is rising, this benchmarking suite and software test tool enable developers to take informed decisions on the suitability and performance of each provider’s serverless offer. Additionally, they also help to identify attributes in need for improvement in the existing platforms.
Horácio Martins; Filipe Araujo; Paulo Rupino Da Cunha. Benchmarking Serverless Computing Platforms. Journal of Grid Computing 2020, 18, 691 -709.
AMA StyleHorácio Martins, Filipe Araujo, Paulo Rupino Da Cunha. Benchmarking Serverless Computing Platforms. Journal of Grid Computing. 2020; 18 (4):691-709.
Chicago/Turabian StyleHorácio Martins; Filipe Araujo; Paulo Rupino Da Cunha. 2020. "Benchmarking Serverless Computing Platforms." Journal of Grid Computing 18, no. 4: 691-709.
Sending data to a sink node is a crucial operation in wireless ad hoc networks serving humanitarian, environmental, industrial, military, or other purposes. While seemingly the inverse of broadcasting, this operation, known as “convergecast”, is more complex, because each node sends different data to the sink. Convergecast should minimize convergence time (i.e., the time at which the root hears from other nodes) and energy consumption, but since these two objectives are conflicting, most algorithms will set for one and disregard the other. In this paper, we propose a family of convergecast algorithms, called CHOPIN, offering a configuration parameter that explicitly trades convergence time for energy. Using closed-form analysis and simulation, we are able to show that CHOPIN can reach operation points that are either in, or very close to the Pareto frontier. This makes the network much more adaptable to changing external conditions.
Filipe Araujo; André Gomes; Rui P. Rocha. Towards optimal convergecast in wireless ad hoc networks. Ad Hoc Networks 2020, 107, 102214 .
AMA StyleFilipe Araujo, André Gomes, Rui P. Rocha. Towards optimal convergecast in wireless ad hoc networks. Ad Hoc Networks. 2020; 107 ():102214.
Chicago/Turabian StyleFilipe Araujo; André Gomes; Rui P. Rocha. 2020. "Towards optimal convergecast in wireless ad hoc networks." Ad Hoc Networks 107, no. : 102214.
Frederico Cerveira; Raul Barbosa; Henrique Madeira; Filipe Araujo. The Effects of Soft Errors and Mitigation Strategies for Virtualization Servers. IEEE Transactions on Cloud Computing 2020, 1 -1.
AMA StyleFrederico Cerveira, Raul Barbosa, Henrique Madeira, Filipe Araujo. The Effects of Soft Errors and Mitigation Strategies for Virtualization Servers. IEEE Transactions on Cloud Computing. 2020; ():1-1.
Chicago/Turabian StyleFrederico Cerveira; Raul Barbosa; Henrique Madeira; Filipe Araujo. 2020. "The Effects of Soft Errors and Mitigation Strategies for Virtualization Servers." IEEE Transactions on Cloud Computing , no. : 1-1.
Creating dependable distributed applications for the cloud is a challenging task that heavily depends on the communication middleware. Such middleware will invariably depend on the Transmission Control Protocol (TCP), as TCP stands at the core of reliable communication on the Internet. Despite offering reliability against dropped and out-of-order packets, the ubiquitous TCP provides no recovery options when connections crash due to, for example, lost connectivity. Should this happen, developers must rollback the communication endpoints to some coherent state, using their own error-prone solutions. In fact, overcoming this limitation is a difficult and unsolved problem, and so far, no solution managed to gain wide acceptance, as they all impact TCP’s simplicity, performance, or pervasiveness. In this chapter, we present the Connection Handler design pattern, a reusable design solution that allows the development of cloud communication middleware that is tolerant to connection crashes. Being a design pattern, it bears little or no dependence to the operating system, programming language, or external libraries, having minimal impact on any other cloud system layers. To demonstrate that the Connection Handler does not impair performance and involves a low programming complexity, we applied it to: (i) a stream-based TCP, (ii) an HTTP, and (iii) a message-oriented application. Our results show that our design pattern is efficient and of general use, thus being applicable to a wide range of cloud-based applications and services.
Naghmeh Ivaki; Nuno Laranjeiro; Fernando Barros; Filipe Araujo. Connection Handler: A Design Pattern for Recovery from Connection Crashes. Computer Communications and Networks 2020, 211 -251.
AMA StyleNaghmeh Ivaki, Nuno Laranjeiro, Fernando Barros, Filipe Araujo. Connection Handler: A Design Pattern for Recovery from Connection Crashes. Computer Communications and Networks. 2020; ():211-251.
Chicago/Turabian StyleNaghmeh Ivaki; Nuno Laranjeiro; Fernando Barros; Filipe Araujo. 2020. "Connection Handler: A Design Pattern for Recovery from Connection Crashes." Computer Communications and Networks , no. : 211-251.
Large online web sites are supported in the back-end by a cluster of servers behind a load balancer. Ensuring proper operation of the cluster with minimal monitoring efforts from the load balancer is necessary to ensure performance. Previous monitoring efforts require extensive data from the system and fail to include the client perspective. We monitor the cluster using machine learning techniques that process data collected and uploaded by web clients, an approach that might complement system-side information. To experiment our solution, we trained the machine learning algorithms in a cluster of 10 machines with a load balancer and evaluated the results of these algorithms when one of the machines is overloaded. While a fine-grained view of the state of the machines, may require much effort to accomplish, given the compensation effect of the remaining healthy machines, the results show that we can achieve a coarse grained view of the entire system, to produce relevant insight about the cluster.
Ricardo Filipe; Filipe Araujo. Client-Side Monitoring of HTTP Clusters Using Machine Learning Techniques. 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA) 2019, 282 -286.
AMA StyleRicardo Filipe, Filipe Araujo. Client-Side Monitoring of HTTP Clusters Using Machine Learning Techniques. 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA). 2019; ():282-286.
Chicago/Turabian StyleRicardo Filipe; Filipe Araujo. 2019. "Client-Side Monitoring of HTTP Clusters Using Machine Learning Techniques." 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA) , no. : 282-286.
Measuring the capacity and modeling the response to load of a real distributed system and its components requires painstaking instrumentation. Even though it greatly improves observability, instrumentation may not be desirable, due to cost, or possible due to legacy constraints. To model how a component responds to load and estimate its maximum capacity, and in turn act in time to preserve quality of service, we need a way to measure component occupation. Hence, recovering the occupation of internal non-instrumented components is extremely useful for system operators, as they need to ensure responsiveness of each one of these components and ways to plan resource provisioning. Unfortunately, complex systems will often exhibit non-linear responses that resist any simple closed-form decomposition. To achieve this decomposition in small subsets of non-instrumented components, we propose training a neural network that computes their respective occupations. We consider a subsystem comprised of two simple sequential components and resort to simulation, to evaluate the neural network against an optimal baseline solution. Results show that our approach can indeed infer the occupation of the layers with high accuracy, thus showing that the sampled distribution preserves enough information about the components. Hence, neural networks can improve the observability of online distributed systems in parts that lack instrumentation.
Ricardo Filipe; Jaime Correia; Filipe Araujo; Jorge Cardoso. Towards Occupation Inference in Non-instrumented Services. 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA) 2019, 1 -7.
AMA StyleRicardo Filipe, Jaime Correia, Filipe Araujo, Jorge Cardoso. Towards Occupation Inference in Non-instrumented Services. 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA). 2019; ():1-7.
Chicago/Turabian StyleRicardo Filipe; Jaime Correia; Filipe Araujo; Jorge Cardoso. 2019. "Towards Occupation Inference in Non-instrumented Services." 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA) , no. : 1-7.
With the raising concerns for the environment, interest in monitoring air quality is likely to increase in the near future. However, most data comes from a limited number of government-owned sensors, which can only capture a small fraction of reality. Improving data coverage thus involves reducing the cost of sensors and make data widely available. For this, we will use a very high number of low-cost sensors as the basis for an air quality monitoring platform, capable of collecting, aggregating, storing and displaying data. This platform will use stream-based technologies capable of scaling for large numbers of sensors and users. The resulting NanoSen-AQM platform will provide vast amounts of air quality data to the public, with the aim of improving public health.
Jorge Silva; Pedro Salgueiro; Luis Rato; José Saias; Vitor Nogueira; Pedro Lucas; Filipe Araujo; Catarina Silva; Paulo Gil; Alberto Cardoso; Joel Arrais; Bernardete Ribeiro; Daniel Coutinho. A Hybrid Application for Real-Time Air Quality Monitoring. 2019 5th Experiment International Conference (exp.at'19) 2019, 270 -271.
AMA StyleJorge Silva, Pedro Salgueiro, Luis Rato, José Saias, Vitor Nogueira, Pedro Lucas, Filipe Araujo, Catarina Silva, Paulo Gil, Alberto Cardoso, Joel Arrais, Bernardete Ribeiro, Daniel Coutinho. A Hybrid Application for Real-Time Air Quality Monitoring. 2019 5th Experiment International Conference (exp.at'19). 2019; ():270-271.
Chicago/Turabian StyleJorge Silva; Pedro Salgueiro; Luis Rato; José Saias; Vitor Nogueira; Pedro Lucas; Filipe Araujo; Catarina Silva; Paulo Gil; Alberto Cardoso; Joel Arrais; Bernardete Ribeiro; Daniel Coutinho. 2019. "A Hybrid Application for Real-Time Air Quality Monitoring." 2019 5th Experiment International Conference (exp.at'19) , no. : 270-271.
The interest in the quality of air is likely to increase, as the public concern for health and environmental issues is on the rise. So far, most data available comes from a small numbers of government-owned sensors, lacking a wide coverage of the entire reality. Improving the amount of data available thus involves reducing the cost of sensors and make their readings accessible to the public. The NanoSen-AQM project aims to do precisely that. Create and use vast numbers of low-cost nano-sensors, to make their data accessible for the public. To achieve such an ambitious goal, the project will use state-of-the-art techniques from Machine Learning and mobile and web development frameworks. As a result, the NanoSen-AQM platform should provide free access to the public and low-cost of entry for sensor owners willing to share their data.
Jorge Silva; Pedro Salgueiro; Luis Rato; José Saias; Vitor Nogueira; Pedro Lucas; Filipe Araujo; Catarina Silva; Paulo Gil; Alberto Cardoso; Joel Arrais; Bernardete Ribeiro; Daniel Coutinho. An Online Platform For Real-Time Air Quality Monitoring. 2019 5th Experiment International Conference (exp.at'19) 2019, 320 -325.
AMA StyleJorge Silva, Pedro Salgueiro, Luis Rato, José Saias, Vitor Nogueira, Pedro Lucas, Filipe Araujo, Catarina Silva, Paulo Gil, Alberto Cardoso, Joel Arrais, Bernardete Ribeiro, Daniel Coutinho. An Online Platform For Real-Time Air Quality Monitoring. 2019 5th Experiment International Conference (exp.at'19). 2019; ():320-325.
Chicago/Turabian StyleJorge Silva; Pedro Salgueiro; Luis Rato; José Saias; Vitor Nogueira; Pedro Lucas; Filipe Araujo; Catarina Silva; Paulo Gil; Alberto Cardoso; Joel Arrais; Bernardete Ribeiro; Daniel Coutinho. 2019. "An Online Platform For Real-Time Air Quality Monitoring." 2019 5th Experiment International Conference (exp.at'19) , no. : 320-325.
This note extends the first-order truncated differentials found by Das, Maitra, and Meier [1] on 2 rounds of the NORX32 permutation. These lead to stronger 2.5-round differential biases for NORX and BLAKE2's permutation, and for 5 rounds of the ChaCha permutation. These biases lead to efficient “inside-out” distinguishers on 4 rounds of the NORX and BLAKE2 permutations, and 8 rounds of the ChaCha permutation. These distinguishers do not directly affect the security claims of NORX, BLAKE2, or ChaCha in their respective modes of operation.
Samuel Neves; Filipe Araujo. An observation on NORX, BLAKE2, and ChaCha. Information Processing Letters 2019, 149, 1 -5.
AMA StyleSamuel Neves, Filipe Araujo. An observation on NORX, BLAKE2, and ChaCha. Information Processing Letters. 2019; 149 ():1-5.
Chicago/Turabian StyleSamuel Neves; Filipe Araujo. 2019. "An observation on NORX, BLAKE2, and ChaCha." Information Processing Letters 149, no. : 1-5.
In pursuit of faster development cycles, companies have favored small decoupled services over monoliths. Following this trend, distributed systems made of microservices have grown in scale and complexity, giving rise to a new set of operational problems. Even though this paradigm simplifies development, deployment, management of individual services, it hinders system observability. In particular, performance monitoring and analysis becomes more challenging, especially for critical production systems that have grown organically, operate continuously, and cannot afford the availability cost of online benchmarking. Additionally, these systems are often very large and expensive, thus being bad candidates for full-scale development replicas. Creating models of services and systems for characterization and formal analysis can alleviate the aforementioned issues. Since performance, namely response time, is the main interest of this work, we focused on bottleneck detection and optimal resource scheduling. We propose a method for modeling production services as queuing systems from request traces. Additionally, we provide analytical tools for response time characterization and optimal resource allocation. Our results show that a simple queuing system with a single queue and multiple homogeneous servers has a small parameter space that can be estimated in production. The resulting model can be used to accurately predict response time distribution and the necessary number of instances to maintain a desired service level, under a given load.
Jaime Correia; Fabio Ribeiro; Ricardo Filipe; Filipe Arauio; Jorge Cardoso. Response Time Characterization of Microservice-Based Systems. 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) 2018, 1 -5.
AMA StyleJaime Correia, Fabio Ribeiro, Ricardo Filipe, Filipe Arauio, Jorge Cardoso. Response Time Characterization of Microservice-Based Systems. 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA). 2018; ():1-5.
Chicago/Turabian StyleJaime Correia; Fabio Ribeiro; Ricardo Filipe; Filipe Arauio; Jorge Cardoso. 2018. "Response Time Characterization of Microservice-Based Systems." 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) , no. : 1-5.
Despite the advantages of microservice and function-oriented architectures, there is an increase in complexity to monitor such highly dynamic systems. In this paper, we analyze two distinct methods to tackle the monitoring problem in a system with reduced instrumentation. Our goal is to understand the feasibility of such approach with one specific driver: simplicity. We aim to determine the extent to which it is possible to characterize the state of two generic tandem processes, using as little information as possible. To answer this question, we resorted to a simulation approach. Using a queue system, we simulated two services, that we could manipulate with distinct operation sets for each module. We used the total response time seen upstream of the system. Having this setup and metric, we applied two distinct methods to analyze the results. First, we used supervised machine learning algorithms to identify where the bottleneck is happening. Secondly, we used an exponential decomposition to identify the occupation in the two components in a more black-box fashion. Results show that both methodologies have their advantages and limitations. The separation of the signal more accurately identifies occupation in low occupied resources, but when a service is totally dominating the overall time, it lacks precision. The machine learning has a more stable error, but needs the training set. This study suggest that a black-box occupation approach with both techniques is possible and very useful.
Ricardo Filipe; Jaime Correia; Filipe Araujo; Jorge Cardoso. On Black-Box Monitoring Techniques for Multi-Component Services. 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) 2018, 1 -5.
AMA StyleRicardo Filipe, Jaime Correia, Filipe Araujo, Jorge Cardoso. On Black-Box Monitoring Techniques for Multi-Component Services. 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA). 2018; ():1-5.
Chicago/Turabian StyleRicardo Filipe; Jaime Correia; Filipe Araujo; Jorge Cardoso. 2018. "On Black-Box Monitoring Techniques for Multi-Component Services." 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) , no. : 1-5.
Breaking large software systems into smaller functionally interconnected components is a trend on the rise. This architectural style, known as “microservices”, simplifies development, deployment and management at the expense of complexity and observability. In fact, in large scale systems, it is particularly difficult to determine the set of microservices responsible for delaying a client's request, when one module impacts several other microservices in a cascading effect. Components cannot be analyzed in isolation, and without instrumenting their source code extensively, it is difficult to find the bottlenecks and trace their root causes. To mitigate this problem, we propose a much simpler approach: log gateway activity, to register all calls to and between microservices, as well as their responses, thus enabling the extraction of topology and performance metrics, without changing source code. For validation, we implemented the proposed platform, with a microservices-based application that we observe under load. Our results show that we can extract relevant performance information with a negligible effort, even in legacy systems, where instrumenting modules may be a very expensive task.
Fabio Pina; Jaime Correia; Ricardo Filipe; Filipe Araujo; Jorge Cardroom. Nonintrusive Monitoring of Microservice-Based Systems. 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) 2018, 1 -8.
AMA StyleFabio Pina, Jaime Correia, Ricardo Filipe, Filipe Araujo, Jorge Cardroom. Nonintrusive Monitoring of Microservice-Based Systems. 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA). 2018; ():1-8.
Chicago/Turabian StyleFabio Pina; Jaime Correia; Ricardo Filipe; Filipe Araujo; Jorge Cardroom. 2018. "Nonintrusive Monitoring of Microservice-Based Systems." 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA) , no. : 1-8.
Naghmeh Ivaki; Nuno Laranjeiro; Filipe Araujo. A survey on reliable distributed communication. Journal of Systems and Software 2018, 137, 713 -732.
AMA StyleNaghmeh Ivaki, Nuno Laranjeiro, Filipe Araujo. A survey on reliable distributed communication. Journal of Systems and Software. 2018; 137 ():713-732.
Chicago/Turabian StyleNaghmeh Ivaki; Nuno Laranjeiro; Filipe Araujo. 2018. "A survey on reliable distributed communication." Journal of Systems and Software 137, no. : 713-732.
With the emergence of Big Data, the scarcity of data scientists to analyse all the data being produced in different domains became evident. To train new data scientists faster, web applications providing data science practices without requiring programming skills can be a great help. However, some available web applications lack in providing good data mining practices, specially for assessment and selection of models. Thus, in this paper we describe a system, currently under development, that will provide the construction of data mining processes enforcing good data mining practices. The system will be available through a web UI and will follow a microservices architecture that is still being designed and tested. Preliminary usability tests, were conducted with two groups of users to evaluate the envisioned concept for the creation of data mining processes. In these tests we observed a general high level of user satisfaction. To assess the performance of the current system design, we
Artur Pedroso; Bruno Leonel Lopes; Jaime Correia; Filipe Araujo; Jorge Cardoso; Rui Pedro Paiva. A Data Mining Service for Non-Programmers. Proceedings of the 10th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management 2018, 340 -346.
AMA StyleArtur Pedroso, Bruno Leonel Lopes, Jaime Correia, Filipe Araujo, Jorge Cardoso, Rui Pedro Paiva. A Data Mining Service for Non-Programmers. Proceedings of the 10th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management. 2018; ():340-346.
Chicago/Turabian StyleArtur Pedroso; Bruno Leonel Lopes; Jaime Correia; Filipe Araujo; Jorge Cardoso; Rui Pedro Paiva. 2018. "A Data Mining Service for Non-Programmers." Proceedings of the 10th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management , no. : 340-346.
In spite of their growing maturity, current web monitoring tools are unable to observe all operating conditions. For example, clients in different geographical locations might get very diverse latencies to the server; the network between client and server might be slow; or third-party servers with external page resources might underperform. Ultimately, only the clients can determine whether a site is up and running in good conditions. In this paper, we use the response times experienced by clients, to infer about server and network performance. The goal is to detect internal and external bottlenecks doing black-box monitoring, in particular CPU (internal) and network (external). We aim to determine to what extent are the clients able to tell one type of bottleneck from the other, i.e., what kind of information do the server and network leak, regarding their operating conditions. To answer this question, we resort to an empirical approach. We submit an HTTP server and network to a large number of operating conditions and train two machine learning algorithms, a linear and a non-linear one, to identify the cause of the congestion affecting the system. Results show that the server and network leak information to a level of detail that allows sorting out CPU from network bottlenecks, or even a combination of the two, in a large spectrum of cases. This suggests that a black-box monitoring approach is not only possible, but promising, as it may complement traditional white-box approaches.
Ricardo Filipe; Rui Pedro Paiva; Filipe Araujo. Client-side black-box monitoring for web sites. 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA) 2017, 1 -5.
AMA StyleRicardo Filipe, Rui Pedro Paiva, Filipe Araujo. Client-side black-box monitoring for web sites. 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA). 2017; ():1-5.
Chicago/Turabian StyleRicardo Filipe; Rui Pedro Paiva; Filipe Araujo. 2017. "Client-side black-box monitoring for web sites." 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA) , no. : 1-5.
The one-way messaging pattern, in which a message sender does not expect any response, is fast and convenient for many applications, but whenever reliable communication is needed, developers either use heavy-weight middleware, such as JMS, or implement request-response interactions, based on TCP. However, TCP is poorly adapted to one-way messaging, because it offers a streaming channel with no mechanisms to encapsulate or track messages. Moreover, TCP does not tolerate connection crashes, forcing developers to come up with their own custom, error-prone solutions, to recover from crashes. In this paper, we propose three TCP-based design patterns that address these limitations, and facilitate developing light-weight and reliable one-way message-based applications. Our solutions are correct, modular, and involve low programming complexity.
Naghmeh Ivaki; Nuno Laranjeiro; Filipe Araujo. Design Patterns for Reliable One-Way Messaging. 2017 IEEE International Conference on Services Computing (SCC) 2017, 257 -264.
AMA StyleNaghmeh Ivaki, Nuno Laranjeiro, Filipe Araujo. Design Patterns for Reliable One-Way Messaging. 2017 IEEE International Conference on Services Computing (SCC). 2017; ():257-264.
Chicago/Turabian StyleNaghmeh Ivaki; Nuno Laranjeiro; Filipe Araujo. 2017. "Design Patterns for Reliable One-Way Messaging." 2017 IEEE International Conference on Services Computing (SCC) , no. : 257-264.
Ensuring the correct presentation and execution of web sites is a major concern for system developers and administrators. Unfortunately, only end users can determine which resources are available and working properly. For example, some internal or external addresses might be unavailable or unreachable for specific clients, while seemingly available resources, like JavaScript, might run with errors in some browsers. While standard monitoring and analytic tools certainly provide valuable information on web pages, problems might still escape such measures, to reach end web users. To demonstrate the limitations of current tools, we ran an experiment to count web page errors in a sample of 3,000 web sites, including network and JavaScript errors. Our results are significant: as many as 16% of the top 1,000 sites have errors in their own resources; less popular sites have even more. Based on these results, we make a review of three client-side monitoring approaches to mitigate such errors: stand-alone applications, browser extensions and JavaScript snippets with analytic tools. Interestingly, even the latter approach, which requires no software installation, and involves no security changes, can cover a large fraction of existing web errors.
Ricardo Filipe; Filipe Araujo. Client-side monitoring techniques for web sites. 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA) 2016, 363 -366.
AMA StyleRicardo Filipe, Filipe Araujo. Client-side monitoring techniques for web sites. 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA). 2016; ():363-366.
Chicago/Turabian StyleRicardo Filipe; Filipe Araujo. 2016. "Client-side monitoring techniques for web sites." 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA) , no. : 363-366.
Reliable communication is nowadays pervasively supported by TCP, which is poorly adapted for message-based communications, because it offers a streaming channel with no mechanisms to encapsulate messages. Moreover, TCP does not tolerate connection crashes. Thus, whenever reliable message-based communication is needed, developers either use heavy-weight middleware, like Java Message Service (JMS), or develop their own custom error-prone solutions for recovering from crashes. In this paper, we introduce two TCP-based design patterns that address these limitations, and facilitate the development of light-weight and reliable message-based applications. Our design solutions are modular, in the sense that they build on top of each other.
Naghmeh Ivaki; Nuno Laranjeiro; Filipe Araujo. Towards designing reliable messaging patterns. 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA) 2016, 204 -207.
AMA StyleNaghmeh Ivaki, Nuno Laranjeiro, Filipe Araujo. Towards designing reliable messaging patterns. 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA). 2016; ():204-207.
Chicago/Turabian StyleNaghmeh Ivaki; Nuno Laranjeiro; Filipe Araujo. 2016. "Towards designing reliable messaging patterns." 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA) , no. : 204-207.