Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Tidjani Négadi
Daniel P. Kennedy
Barbara Aquilani
zhiwei liu
Maximilian Dürr
Jhonathan Pinzon
Richard P. Schumeyer
Liangliang Shang
Chen Ma
Haiyan Wang
Home
/
Author
/
WEVERTON LUIS DA COSTA CORDEIRO
Author Info
Open Visualization
Name
Affiliation
Papers
WEVERTON LUIS DA COSTA CORDEIRO
Univ Fed Rio Grande do Sul, Inst Informat, Av Bento Goncalves 9500, BR-91501970 Porto Alegre, RS, Brazil
24
Collaborators
Citations
PageRank
47
99
12.10
Referers
Referees
References
144
446
286
Search Limit
100
446
Publications (24 rows)
Collaborators (47 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Harnessing Cloud Computing to Power Up HPC Applications: The BRICS CloudHPC Project
0
0.34
2021
Toward In-Network Intelligence: Running Distributed Artificial Neural Networks in the Data Plane
0
0.34
2021
Adaptive placement & chaining of virtual network functions with NFV-PEAR.
3
0.37
2019
Making puzzles green and useful for adaptive identity management in large-scale distributed systems.
1
0.35
2016
Limiting Fake Accounts In Large-Scale Distributed Systems Through Adaptive Identity Management
0
0.34
2015
Were You There? Bridging the Gap to Unveil Users' Online Sessions in Networked, Distributed Systems
1
0.35
2014
Beyond pollution and taste: A tag-based strategy to increase download quality in P2P file sharing systems
1
0.35
2013
Make it green and useful: Reshaping puzzles for identity management in large-scale distributed systems.
1
0.35
2013
Slowing down to speed up: Mitigating collusion attacks in Content Distribution Systems.
1
0.34
2013
Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks
7
0.45
2012
Planning in the large: efficient generation of IT change plans on large infrastructures
1
0.36
2012
Securing P2P systems from Sybil attacks through adaptive identity management
3
0.38
2011
A conservative strategy to protect P2P file sharing systems from pollution attacks
6
0.44
2011
Funnel: Choking Polluters in BitTorrent File Sharing Communities.
4
0.40
2011
On strategies for planning the assignment of human resources to IT change activities
8
0.64
2010
Computer-generated comprehensive risk assessment for IT project management
2
0.41
2010
ChangeAdvisor: A Solution to Support Alignment of IT Change Design with Business Objectives/Constraints
5
0.57
2009
Refined failure remediation for IT change management systems
2
0.40
2009
Improving IT Change Management Processes with Automated Risk Assessment
16
0.91
2009
ChangeLedge: Change design and planning in networked systems based on reuse of knowledge and automation
6
0.59
2009
CHANGEMINER: a solution for discovering IT change templates from past execution traces
3
0.95
2009
A solution to support risk analysis on IT change management
7
0.68
2009
Enabling rollback support in IT change management systems
16
1.32
2008
A Runtime Constraint-Aware Solution for Automated Refinement of IT Change Plans
5
0.49
2008
1