2022 - Research.com Computer Science in Saudi Arabia Leader Award
2009 - ACM Fellow For contributions to dependable and secure distributed computing.
Paulo Veríssimo spends much of his time researching Distributed computing, Intrusion tolerance, Computer network, Fault tolerance and Dependability. His research integrates issues of Local area network, Asynchronous communication and Key in his study of Distributed computing. His research in Intrusion tolerance intersects with topics in System deployment and Resilience.
His Broadcast communication network, Two-way communication, Real-time communication and Inter-domain study, which is part of a larger body of work in Computer network, is frequently linked to Wired communication, bridging the gap between disciplines. His work on Software fault tolerance as part of general Fault tolerance study is frequently connected to A priori and a posteriori, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them. His Dependability research integrates issues from Exploit, File system and Quantum Byzantine agreement.
His primary areas of study are Distributed computing, Computer network, Computer security, Dependability and Fault tolerance. Paulo Veríssimo has researched Distributed computing in several fields, including Intrusion tolerance, Protocol and Asynchronous communication. Asynchronous communication is often connected to Component in his work.
His Computer network study is mostly concerned with Local area network, Communications protocol, Broadcasting and Multicast. His study in the field of Access control also crosses realms of Vulnerability. His work carried out in the field of Dependability brings together such families of science as Real-time computing, Correctness and Cloud computing.
Paulo Veríssimo mainly focuses on Distributed computing, Computer security, Cloud computing, Dependability and Computer network. He does research in Distributed computing, focusing on Byzantine fault tolerance specifically. His Virtualization study in the realm of Cloud computing connects with subjects such as Biobank.
His Computer network study incorporates themes from Fault tolerance, Replication and Communication complexity. In his study, Separation of concerns is inextricably linked to Network virtualization, which falls within the broad field of Software-defined networking. His work focuses on many connections between Network management and other disciplines, such as Flexibility, that overlap with his field of interest in Software.
His scientific interests lie mostly in Distributed computing, Cloud computing, Dependability, Byzantine fault tolerance and Network management. The concepts of his Distributed computing study are interwoven with issues in Applications architecture, Service-oriented modeling, Intrusion tolerance, Communications protocol and Finite-state machine. His study in the field of Virtualization also crosses realms of Distributed System Security Architecture.
His Dependability research incorporates elements of Exploit, Computer security and Formal system. His Byzantine fault tolerance research is multidisciplinary, incorporating perspectives in Distributed algorithm, Computer network, Asynchronous communication and State machine replication. The Network management study combines topics in areas such as Network virtualization and Software-defined networking.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Software-Defined Networking: A Comprehensive Survey
Diego Kreutz;Fernando M. V. Ramos;Paulo Esteves Verissimo;Christian Esteve Rothenberg.
Proceedings of the IEEE (2015)
Towards secure and dependable software-defined networks
Diego Kreutz;Fernando M.V. Ramos;Paulo Verissimo.
acm special interest group on data communication (2013)
Distributed Systems for System Architects
Paulo Verissimo;Luis Rodrigues.
Efficient Byzantine Fault-Tolerance
G. S. Veronese;M. Correia;A. N. Bessani;Lau Cheuk Lung.
IEEE Transactions on Computers (2013)
The Delta-4 Approach to Dependability in Open Distributed Computing Systems
D. Powell;G. Bonn;D. Seaton;P. Verissimo.
ieee international symposium on fault tolerant computing (1988)
Intrusion-tolerant architectures: concepts and design
Paulo Esteves Veríssimo;Nuno Ferreira Neves;Miguel Pupo Correia.
Lecture Notes in Computer Science (2003)
The timely computing base model and architecture
P. Verissimo;A. Casimiro.
IEEE Transactions on Computers (2002)
Fault-tolerant broadcasts in CAN
J. Rufino;P. Verissimo;G. Arroz;C. Almeida.
ieee international symposium on fault tolerant computing (1998)
How to tolerate half less one Byzantine nodes in practical distributed systems
M. Correia;N.F. Neves;P. Verissimo.
symposium on reliable distributed systems (2004)
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
P. Sousa;A.N. Bessani;M. Correia;N.F. Neves.
IEEE Transactions on Parallel and Distributed Systems (2010)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: