


default search action
Nuno Neves 0001
Person information
- affiliation: University of Lisbon, Faculty of Sciences, Department of Computer Science, Portugal
- affiliation (PhD 1998): University of Illinois at Urbana-Champaign, IL, USA
- not to be confused with: Nuno Neves 0002
Other persons with the same name
- Nuno Neves 0002
— University of Lisbon, Instituto Superior Técnico, INESC-ID, Portugal
- Nuno Neves 0003 — Hospital Infante D. Pedro, Aveiro, Portugal
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i6]Nuno Neves:
Mingling with the Good to Backdoor Federated Learning. CoRR abs/2501.01913 (2025) - 2023
- [c76]Filipe Rodrigues, Rodrigo Simões, Nuno Neves:
FADO: A Federated Learning Attack and Defense Orchestrator. DSN-W 2023: 141-148 - [c75]Paulo Antunes, Ibéria Medeiros
, Nuno Neves:
Towards PHP Vulnerability Detection at an Intermediate Language Level. DSN-S 2023: 182-184 - 2022
- [j30]Ibéria Medeiros
, Nuno Neves
, Miguel Correia
:
Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages. IEEE Trans. Reliab. 71(2): 1033-1056 (2022) - [c74]Nuno Neves:
Towards Fuzzing Target Lines. DSN (Supplements) 2022: 35-36 - 2021
- [j29]Ricardo Mendes
, Tiago Oliveira
, Vinicius Vielmo Cogo
, Nuno Neves
, Alysson Bessani
:
Charon: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data. IEEE Trans. Cloud Comput. 9(4): 1349-1361 (2021) - [e2]Leyla Bilge, Lorenzo Cavallaro, Giancarlo Pellegrino, Nuno Neves:
Detection of Intrusions and Malware, and Vulnerability Assessment - 18th International Conference, DIMVA 2021, Virtual Event, July 14-16, 2021, Proceedings. Lecture Notes in Computer Science 12756, Springer 2021, ISBN 978-3-030-80824-2 [contents] - 2020
- [j28]Max Alaluna, Luís Ferrolho, José Rui Figueira
, Nuno Neves
, Fernando M. V. Ramos
:
Secure multi-cloud virtual network embedding. Comput. Commun. 155: 252-265 (2020) - [c73]Ibéria Medeiros
, Nuno Neves:
Impact of Coding Styles on Behaviours of Static Analysis Tools for Web Applications. DSN (Supplements) 2020: 55-56 - [c72]Ibéria Medeiros, Nuno Neves
:
Effect of Coding Styles in Detection of Web Application Vulnerabilities. EDCC 2020: 111-118 - [c71]Ricardo Morgado, Ibéria Medeiros
, Nuno Neves:
Towards Web Application Security by Automated Code Correction. ENASE 2020: 86-96 - [c70]Francisco Araújo, Ibéria Medeiros
, Nuno Neves:
Generating Tests for the Discovery of Security Flaws in Product Variants. ICST Workshops 2020: 133-142 - [c69]Ana Fidalgo, Ibéria Medeiros
, Paulo Antunes, Nuno Neves:
Towards a Deep Learning Model for Vulnerability Detection on Web Application Variants. ICST Workshops 2020: 465-476 - [c68]Max Alaluna, Nuno Neves
, Fernando M. V. Ramos:
Elastic Network Virtualization. INFOCOM 2020: 814-823 - [p1]Pedro Gomes, Naércio Magaia, Nuno Neves
:
Industrial and Artificial Internet of Things with Augmented Reality. Convergence of Artificial Intelligence and the Internet of Things 2020: 323-346 - [e1]Clémentine Maurice
, Leyla Bilge, Gianluca Stringhini, Nuno Neves:
Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24-26, 2020, Proceedings. Lecture Notes in Computer Science 12223, Springer 2020, ISBN 978-3-030-52682-5 [contents]
2010 – 2019
- 2019
- [j27]Max Alaluna, Eric Vial, Nuno Neves
, Fernando M. V. Ramos
:
Secure Multi-Cloud Network Virtualization. Comput. Networks 161: 45-60 (2019) - [j26]Paulo Jorge Costa Nunes, Ibéria Medeiros
, José Fonseca
, Nuno Neves
, Miguel Correia, Marco Vieira
:
An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios. Computing 101(2): 161-185 (2019) - [j25]Eduardo Viegas
, Altair Olivo Santin
, Alysson Bessani
, Nuno Neves:
BigFlow: Real-time and reliable anomaly-based intrusion detection for high-speed networks. Future Gener. Comput. Syst. 93: 473-485 (2019) - [j24]Wilson S. Melo
, Alysson Bessani
, Nuno Neves
, Altair Olivo Santin
, Luiz Fernando Rust da Costa Carmo:
Using Blockchains to Implement Distributed Measuring Systems. IEEE Trans. Instrum. Meas. 68(5): 1503-1514 (2019) - [j23]Ibéria Medeiros
, Miguel Beatriz, Nuno Neves
, Miguel Correia
:
SEPTIC: Detecting Injection Attacks and Vulnerabilities Inside the DBMS. IEEE Trans. Reliab. 68(3): 1168-1188 (2019) - [c67]Miguel Garcia
, Alysson Bessani
, Nuno Neves
:
Lazarus: Automatic Management of Diversity in BFT Systems. Middleware 2019: 241-254 - [i5]Ibéria Medeiros, Nuno Neves, Miguel Correia:
Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages. CoRR abs/1910.06826 (2019) - 2018
- [j22]Miguel Garcia
, Nuno Neves, Alysson Bessani
:
SieveQ: A Layered BFT Protection System for Critical Services. IEEE Trans. Dependable Secur. Comput. 15(3): 511-525 (2018) - [j21]Paulo Jorge Costa Nunes, Iberia Medeiros
, José Fonseca
, Nuno Neves
, Miguel Correia
, Marco Vieira
:
Benchmarking Static Analysis Tools for Web Security. IEEE Trans. Reliab. 67(3): 1159-1175 (2018) - [c66]André Nogueira, Miguel Garcia
, Alysson Bessani
, Nuno Neves:
On the Challenges of Building a BFT SCADA. DSN 2018: 163-170 - [c65]Henrique Mendes, Iberia Medeiros
, Nuno Neves
:
Validating and Securing DLMS/COSEM Implementations with the ValiDLMS Framework. DSN Workshops 2018: 179-184 - [c64]Ivo Vacas, Iberia Medeiros
, Nuno Neves:
Detecting Network Threats using OSINT Knowledge-Based IDS. EDCC 2018: 128-135 - [c63]Wilson S. Melo, Luiz F. R. C. Carmo, Alysson Bessani
, Nuno Neves
, Altair Olivo Santin
:
How blockchains can improve measuring instruments regulation and control. I2MTC 2018: 1-6 - [i4]David R. Matos, Nuno Neves, Alysson Bessani:
SITAN: Services for Fault-Tolerant Ad Hoc Networks with Unknown Participants. CoRR abs/1804.09107 (2018) - 2017
- [c62]Bruno Vavala, Nuno Ferreira Neves
, Peter Steenkiste
:
Secure Tera-scale Data Crunching with a Small TCB. DSN 2017: 169-180 - [c61]Iberia Medeiros
, Miguel Beatriz, Nuno Ferreira Neves
, Miguel Correia:
Demonstrating a Tool for Injection Attack Prevention in MySQL. DSN 2017: 551-558 - [c60]Paulo Jorge Costa Nunes, Iberia Medeiros
, José Fonseca
, Nuno Ferreira Neves
, Miguel Correia, Marco Vieira
:
On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study. EDCC 2017: 121-128 - [c59]Max Alaluna, Eric Vial, Nuno Neves
, Fernando M. V. Ramos
:
Secure and Dependable Multi-Cloud Network Virtualization. XDOMO@EuroSys 2017: 2:1-2:6 - [c58]Eduardo Viegas
, Altair Olivo Santin
, Nuno Ferreira Neves, Alysson Bessani
, Vilmar Abreu:
A Resilient Stream Learning Intrusion Detection Mechanism for Real-Time Analysis of Network Traffic. GLOBECOM 2017: 1-6 - [c57]Fabio Pereira, Nuno Neves
, Fernando M. V. Ramos
:
Secure network monitoring using programmable data planes. NFV-SDN 2017: 286-291 - [i3]Max Alaluna, Luís Ferrolho, José Rui Figueira, Nuno Neves, Fernando M. V. Ramos:
Secure Virtual Network Embedding in a Multi-Cloud Environment. CoRR abs/1703.01313 (2017) - 2016
- [j20]Marc Lacoste, Markus Miettinen, Nuno Neves
, Fernando M. V. Ramos
, Marko Vukolic, Fabien Charmet, Reda Yaich, Krzysztof Oborzynski, Gitesh Vernekar, Paulo Sousa
:
User-Centric Security and Dependability in the Clouds-of-Clouds. IEEE Cloud Comput. 3(5): 64-75 (2016) - [j19]Alysson Bessani
, Nuno Ferreira Neves
, Paulo Veríssimo, Wagner Saback Dantas, Alexandre Fonseca, Rui Silva, Pedro Luz, Miguel Correia
:
JITeR: Just-in-time application-layer routing. Comput. Networks 104: 122-136 (2016) - [j18]Iberia Medeiros
, Nuno Ferreira Neves
, Miguel Correia:
Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining. IEEE Trans. Reliab. 65(1): 54-69 (2016) - [c56]Iberia Medeiros
, Miguel Beatriz, Nuno Ferreira Neves
, Miguel Correia
:
Hacking the DBMS to Prevent Injection Attacks. CODASPY 2016: 295-306 - [c55]Bruno Vavala, Nuno Ferreira Neves
, Peter Steenkiste
:
Secure Identification of Actively Executed Code on a Generic Trusted Component. DSN 2016: 419-430 - [c54]Iberia Medeiros
, Nuno Ferreira Neves
, Miguel Correia
:
Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report. DSN 2016: 630-637 - [c53]Ibéria Medeiros
, Nuno Ferreira Neves
, Miguel Correia
:
DEKANT: a static analysis tool that learns to detect web application vulnerabilities. ISSTA 2016: 1-11 - [c52]Max Alaluna, Fernando M. V. Ramos
, Nuno Neves
:
(Literally) Above the clouds: Virtualizing the network over multiple clouds. NetSoft 2016: 112-115 - [i2]Luís Ferrolho, Max Alaluna, Nuno Neves, Fernando M. V. Ramos:
Secure and Dependable Virtual Network Embedding. CoRR abs/1602.02268 (2016) - 2015
- [c51]Bruno Vavala, Nuno Ferreira Neves
, Peter Steenkiste
:
Securing Passive Replication through Verification. SRDS 2015: 176-181 - [i1]Max Alaluna, Fernando M. V. Ramos, Nuno Neves:
(Literally) above the clouds: virtualizing the network over multiple clouds. CoRR abs/1512.01196 (2015) - 2014
- [j17]Miguel Garcia
, Alysson Neves Bessani
, Ilir Gashi
, Nuno Ferreira Neves
, Rafael R. Obelheiro:
Analysis of operating system diversity for intrusion tolerance. Softw. Pract. Exp. 44(6): 735-770 (2014) - [c50]José Lopes, Nuno Neves
:
Stopping a Rapid Tornado with a Puff. IEEE Symposium on Security and Privacy 2014: 509-523 - [c49]Alysson Neves Bessani
, Ricardo Mendes, Tiago Oliveira, Nuno Ferreira Neves, Miguel Correia, Marcelo Pasin, Paulo Veríssimo:
SCFS: A Shared Cloud-backed File System. USENIX ATC 2014: 169-180 - [c48]Iberia Medeiros
, Nuno Ferreira Neves
, Miguel Correia
:
Automatic detection and correction of web application vulnerabilities using data mining to predict false positives. WWW 2014: 63-74 - 2013
- [j16]Miguel Correia
, Nuno Ferreira Neves
, Paulo Veríssimo
:
BFT-TO: Intrusion Tolerance with Less Replicas. Comput. J. 56(6): 693-715 (2013) - [j15]Henrique Moniz
, Nuno Ferreira Neves
, Miguel Correia
:
Byzantine Fault-Tolerant Consensus in Wireless Ad Hoc Networks. IEEE Trans. Mob. Comput. 12(12): 2441-2454 (2013) - [c47]Miguel Garcia
, Nuno Ferreira Neves
, Alysson Bessani
:
An intrusion-tolerant firewall design for protecting SIEM systems. DSN Workshops 2013: 1-7 - [c46]Manuel Mendonça, Nuno Ferreira Neves
:
Intercept: Profiling Windows Network Device Drivers. EWDC 2013: 61-75 - [c45]Tiago Carvalho, Hyong S. Kim, Nuno Neves
:
PACE your network: Fair and controllable multi-tenant data center networks. ICC 2013: 3726-3731 - [c44]Iberia Medeiros
, Nuno Ferreira Neves
, Miguel Correia
:
Securing energy metering software with automatic source code correction. INDIN 2013: 701-706 - [c43]Alysson Neves Bessani, Marcel Santos, João Felix, Nuno Ferreira Neves, Miguel Correia:
On the Efficiency of Durable State Machine Replication. USENIX ATC 2013: 169-180 - 2012
- [c42]João Antunes, Nuno Ferreira Neves
:
Recycling Test Cases to Detect Security Vulnerabilities. ISSRE 2012: 231-240 - [c41]Bruno Vavala, Nuno Ferreira Neves
:
Robust and Speculative Byzantine Randomized Consensus with Constant Time Complexity in Normal Conditions. SRDS 2012: 161-170 - 2011
- [j14]Henrique Moniz
, Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
:
Randomization can be a healer: consensus with dynamic omission failures. Distributed Comput. 24(3-4): 165-175 (2011) - [j13]Miguel Correia
, Giuliana Santos Veronese, Nuno Ferreira Neves
, Paulo Veríssimo
:
Byzantine consensus in asynchronous message-passing systems: a survey. Int. J. Crit. Comput. Based Syst. 2(2): 141-161 (2011) - [j12]Henrique Moniz
, Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
:
RITAS: Services for Randomized Intrusion Tolerance. IEEE Trans. Dependable Secur. Comput. 8(1): 122-136 (2011) - [c40]Miguel Garcia
, Alysson Neves Bessani
, Ilir Gashi
, Nuno Ferreira Neves
, Rafael R. Obelheiro:
OS diversity for intrusion tolerance: Myth or reality? DSN 2011: 383-394 - [c39]João Antunes, Nuno Ferreira Neves
:
Automatically complementing protocol specifications from network traces. EWDC 2011: 87-92 - [c38]João Antunes, Nuno Ferreira Neves
:
Using Behavioral Profiles to Detect Software Flaws in Network Servers. ISSRE 2011: 1-10 - [c37]João Antunes, Nuno Ferreira Neves
:
DiveInto: Supporting Diversity in Intrusion-Tolerant Systems. SRDS 2011: 137-146 - [c36]João Antunes, Nuno Ferreira Neves
, Paulo Veríssimo
:
Reverse Engineering of Protocols from Network Traces. WCRE 2011: 169-178 - 2010
- [j11]Paulo Sousa
, Alysson Neves Bessani
, Miguel Correia
, Nuno Ferreira Neves
, Paulo Veríssimo
:
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Trans. Parallel Distributed Syst. 21(4): 452-465 (2010) - [j10]João Antunes, Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
, Rui Ferreira Neves
:
Vulnerability Discovery with Attack Injection. IEEE Trans. Software Eng. 36(3): 357-370 (2010) - [c35]Henrique Moniz
, Nuno Ferreira Neves
, Miguel Correia
:
Turquois: Byzantine consensus in wireless ad hoc networks. DSN 2010: 537-546
2000 – 2009
- 2009
- [c34]Paulo Sousa
, Alysson Neves Bessani
, Wagner Saback Dantas, Fabio Souto, Miguel Correia
, Nuno Ferreira Neves
:
Intrusion-tolerant self-healing devices for critical infrastructure protection. DSN 2009: 217-222 - [c33]Paulo Veríssimo
, Alysson Neves Bessani
, Miguel Correia
, Nuno Ferreira Neves
, Paulo Sousa:
Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned. HICSS 2009: 1-8 - [c32]Henrique Moniz
, Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
:
Randomization Can Be a Healer: Consensus with Dynamic Omission Failures. DISC 2009: 63-77 - 2008
- [j9]Alysson Neves Bessani
, Paulo Sousa
, Miguel Correia
, Nuno Ferreira Neves
, Paulo Veríssimo:
The Crutial Way of Critical Infrastructure Protection. IEEE Secur. Priv. 6(6): 44-51 (2008) - [j8]Paulo Veríssimo
, Nuno Ferreira Neves
, Miguel Correia
:
The CRUTIAL reference critical information infrastructure architecture: a blueprint. Int. J. Syst. Syst. Eng. 1(1/2): 78-95 (2008) - [c31]Manuel Mendonça, Nuno Ferreira Neves
:
Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities. EDCC 2008: 110-119 - [c30]João Antunes, Nuno Ferreira Neves
, Paulo Veríssimo
:
Detection and Prediction of Resource-Exhaustion Vulnerabilities. ISSRE 2008: 87-96 - 2007
- [j7]Miguel Correia
, Nuno Ferreira Neves
, Lau Cheuk Lung, Paulo Veríssimo
:
Worm-IT - A wormhole-based intrusion-tolerant group communication system. J. Syst. Softw. 80(2): 178-197 (2007) - [c29]Manuel Mendonça, Nuno Ferreira Neves
:
Robustness Testing of the Windows DDK. DSN 2007: 554-564 - [c28]Manuel Mendonça, Nuno Ferreira Neves:
Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities. HASE 2007: 379-380 - [c27]Paulo Veríssimo
, Nuno Ferreira Neves
, Miguel Correia
, Yves Deswarte, Anas Abou El Kalam
, Andrea Bondavalli
, Alessandro Daidone:
The CRUTIAL Architecture for Critical Information Infrastructures. WADS 2007: 1-27 - [c26]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Veríssimo:
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. PRDC 2007: 357-364 - [c25]Paulo Sousa
, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
Resilient Intrusion Tolerance through Proactive and Reactive Recovery. PRDC 2007: 373-380 - [c24]Alysson Neves Bessani, Miguel Correia, Henrique Moniz, Nuno Ferreira Neves, Paulo Veríssimo:
When 3f+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus. DISC 2007: 480-481 - 2006
- [j6]Miguel Correia
, Nuno Ferreira Neves
, Paulo Veríssimo
:
From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures. Comput. J. 49(1): 82-96 (2006) - [j5]Paulo Veríssimo
, Nuno Ferreira Neves
, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch:
Intrusion-tolerant middleware: the road to automatic security. IEEE Secur. Priv. 4(4): 54-62 (2006) - [c23]Paulo Veríssimo
, Nuno Ferreira Neves
, Miguel Correia
:
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture. CRITIS 2006: 1-14 - [c22]Nuno Ferreira Neves
, João Antunes, Miguel Correia
, Paulo Veríssimo
, Rui Ferreira Neves
:
Using Attack Injection to Discover New Vulnerabilities. DSN 2006: 457-466 - [c21]Henrique Moniz
, Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
:
Randomized Intrusion-Tolerant Asynchronous Services. DSN 2006: 568-577 - [c20]Paulo Sousa
, Nuno Ferreira Neves, Paulo Veríssimo:
Proactive resilience through architectural hybridization. SAC 2006: 686-690 - [c19]Paulo Sousa
, Nuno Ferreira Neves
, Paulo Veríssimo
, William H. Sanders:
Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available. SRDS 2006: 71-82 - [c18]Henrique Moniz
, Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
:
Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols. SRDS 2006: 235-244 - 2005
- [j4]Miguel Correia
, Nuno Ferreira Neves
, Lau Cheuk Lung, Paulo Veríssimo
:
Low complexity Byzantine-resilient consensus. Distributed Comput. 17(3): 237-249 (2005) - [j3]Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
:
Solving Vector Consensus with a Wormhole. IEEE Trans. Parallel Distributed Syst. 16(12): 1120-1131 (2005) - [c17]Paulo Sousa
, Nuno Ferreira Neves
, Paulo Veríssimo
:
How Resilient are Distributed f Fault/Intrusion-Tolerant Systems? DSN 2005: 98-107 - [c16]Paulo Sousa
, Nuno Ferreira Neves
, Paulo Veríssimo
:
Resilient State Machine Replication. PRDC 2005: 305-309 - 2004
- [c15]Luis Sardinha, Nuno Ferreira Neves, Paulo Veríssimo:
Tolerating Intrusions in Grid Systems. Security and Management 2004: 207-220 - [c14]Manuel Mendonça, Nuno Ferreira Neves:
Secure Application Updates on Point of Sale Devices. ICETE (2) 2004: 38-45 - [c13]Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. SRDS 2004: 174-183 - 2002
- [c12]Miguel Correia, Paulo Veríssimo, Nuno Ferreira Neves:
The Design of a COTSReal-Time Distributed Security Kernel. EDCC 2002: 234-252 - [c11]Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia:
Intrusion-Tolerant Architectures: Concepts and Design. WADS 2002: 3-36 - [c10]Miguel Correia
, Lau Cheuk Lung, Nuno Ferreira Neves
, Paulo Veríssimo:
Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model. SRDS 2002: 2-11 - 2001
- [c9]Miguel Correia
, Paulo Veríssimo, Nuno Ferreira Neves
:
The Architecture of a Secure Group Communication System Based on Intrusion Tolerance. ICDCS Workshops 2001: 17-24
1990 – 1999
- 1998
- [b1]Nuno Neves:
Time-Based Coordinated Checkpointing. University of Illinois Urbana-Champaign, USA, 1998 - [c8]Nuno Neves, W. Kent Fuchs:
RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols. FTCS 1998: 58-67 - 1997
- [j2]Nuno Neves, W. Kent Fuchs:
Adaptive Recovery for Mobile Environments. Commun. ACM 40(1): 68-74 (1997) - [c7]Nuno Ferreira Neves
, W. Kent Fuchs:
Fault Detection Using Hints from the Socket Layer. SRDS 1997: 64-71 - 1996
- [c6]Nuno Neves, W. Kent Fuchs:
Adaptive recovery for mobile environments. HASE 1996: 134-141 - [c5]Nuno Neves, Anthony-Trung Nguyen, Edgar L. Torres:
A Study of a Non-Linear Optimization Problem Using a Distributed Genetic Algorithm. ICPP, Vol. 2 1996: 29-36 - [c4]Manuel Costa, Paulo Guedes, Manuel Sequeira, Nuno Neves, Miguel Castro:
Lightweight Logging for Lazy Release Consistent Distributed Shared Memory. OSDI 1996: 59-73 - 1994
- [j1]Pedro Manuel Antunes Sousa, Andre Zuquete
, Nuno Neves
, José Alves Marques:
Orthogonal Persistence in a Heterogeneous Distributed Object-Oriented Environment. Comput. J. 37(6): 531-541 (1994) - [c3]Nuno Neves
, Miguel Castro, Paulo Guedes:
A Checkpoint Protocol for an Entry Consistent Shared Memory System. PODC 1994: 121-129 - [c2]Paulo Guedes, Miguel Castro, Nuno Neves:
The DiSOM Distributed Shared Object Memory. ACM SIGOPS European Workshop 1994: 138-140 - 1993
- [c1]Miguel Castro, Nuno Neves, Pedro Trancuso, Pedro Manuel Antunes Sousa:
MIKE: A Distributed object-oriented programming platform on top of the Mach micro-kernel. USENIX MACH Symposium 1993: 253-272
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-19 00:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint