Jornada de Atualização em Informática 2021
Sinopse
Mantendo sua tradição em apresentar temas relevantes em pesquisa e desenvolvimento, a Jornada de Atualização em Informática (JAI), nesta edição, trata de tecnologias e conceitos da área de computação com bastante impacto no desenvolvimento tecnológico da sociedade moderna. Esta publicação apresenta temas que têm relação com segurança cibernética e internet das coisas (IoT), privacidade de dados, comunicação entre pessoas e sistemas computacionais, e processamento de grandes volumes de dados.
Abrimos este livro com uma apresentação sobre a história da JAI elaborada pelo professor Roberto S. Bigonha (UFMG), que ministrou um curso na I JAI em 1982. Agradecemos ao professor Bigonha por ter aceito este convite que se tornou um desafio devido à pandemia do Covid-19, uma vez que informações sobre as primeiras versões da JAI, registradas apenas em meio impresso, se encontram inacessíveis em bibliotecas nas universidades. Assim, com os dados que foram possíveis recuperar, o prof. Bigonha faz um prazeroso relato da criação e histórico da Jornada de Atualização em Informática, marcando a comemoração dos seus 40 anos.
Agradecemos ao comitê de programa e a todos os autores que submeteram propostas. Tivemos sete propostas submetidas e selecionamos quatro para serem desenvolvidas como capítulos neste livro. Agradecemos também ao coordenador do CSBC 2021, prof. Frank Siqueira, e toda a equipe de organização pelo apoio na elaboração deste evento.
Finalmente, gostaríamos de registrar a nossa satisfação e alegria em coordenar a JAI no seu 40º ano de existência.
Aline Maria Santos Andrade (UFBA)
Raul Sidnei Wazlawick (UFSC)
Coordenadores da JAI 2021
Capítulos:
Downloads
Referências
Abijaude, J., Serra, H., Sobreira, P., and Greve, F. (2021). Minicurso blockchain e contratos inteligentes para aplicações em iot, uma abordagem prática. https://github.com/lifuesc/jai2021. Acessado em 14/05/2021.
Adomavicius G., Tuzhilin, A. Toward The Next Generation of Recommender Systems: A Survey of the State-of-The-Art and Possible Extensions. IEEE Transactions On Knowledge And Data Engineering, 17, 6 (2005), 734–749.
Ahmad, R. W., Salah, K., Jayaraman, R., Yaqoob, I., Ellahham, S., and Omar, M. (2021). The role of blockchain technology in telehealth and telemedicine. International Journal of Medical Informatics, 148:104399.
Alexander, C. (1965). A city is not a tree. Architectural Forum, 122, 58-62.
Alladi, T., Chamola, V., Rodrigues, J. J., and Kozlov, S. A. (2019). Blockchain in smart grids: A review on different use cases. Sensors, 19(22):4862.
Almatarneh, A. (2020). Blockchain technology and corporate governance: The issue of smart contracts—current perspectives and evolving concerns.
Alphand, O., Amoretti, M., Claeys, T., Dall’Asta, S., Duda, A., Ferrari, G., Rousseau, F., Tourancheau, B., Veltri, L., and Zanichelli, F. (2018). Iotchain: A blockchain security architecture for the internet of things. In 2018 IEEE wireless communications and networking conference (WCNC), pages 1–6. IEEE.
Alves, D. (2021). Proof-of-concept (poc) of restaurant’s food requests in the lisk blockchain/sidechain. In Journal of Physics: Conference Series, volume 1828, page 012110. IOP Publishing.
Angraal, S., Krumholz, H. M., and Schulz, W. L. (2017). Blockchain technology: applications in health care. Circulation: Cardiovascular quality and outcomes, 10(9):e003800.
Antonopoulos, A. (2017). Mastering Bitcoin: Programming the Open Blockchain. O’reilly, 2nd edition.
Arake, S., Fernandes, I., Santos, G., Rodrigues, R., Maciel, C. Fiscalização das ações políticas utilizando reputação e compartilhamento na Web Social. In: Anais do III Workshop sobre Aspectos da Interação Humano-Computador para a Web Social, Porto de Galinhas, 2011.
Araujo, P., Viana, W., Veras, N., Farias, E. J., and de Castro Filho, J. A. (2019). Exploring students perceptions and performance in flipped classroom designed with adaptive learning techniques: A study in distributed systems courses. In Brazilian Symposium on Computers in Education (Simpósio Brasileiro de Informática na Educação-SBIE), volume 30, page 219.
Araújo, R. M.; Dias, M. S.; Borges, M. Borges. Suporte por computador ao desenvolvimento cooperativo de Software: classificação e propostas. Simpósio Brasileiro de Engenharia de Software – SBES 11, 1997, pp. 299-314.
Atonomi (2019). Atonomi—bringing trust and security to iot. https://atonomi.io/. Acessado em 04/05/2021.
Atzori, M. (2016). Blockchain-based architectures for the internet of things: A survey (2016). Available at SSRN 2846810 eLibrary.
Azaria, A., Ekblaw, A., Vieira, T., and Lippman, A. (2016). Medrec: Using blockchain for medical data access and permission management. In 2016 2nd International Conference on Open and Big Data (OBD), pages 25–30. IEEE.
Bach, L. M., Mihaljevic, B., and Zagar, M. (2018). Comparative analysis of blockchain consensus algorithms. In 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pages 1545–1550. IEEE.
Back, A., Corallo, M., Dashjr, L., Friedenbach, M., Maxwell, G., Miller, A., Poelstra, A., Timón, J., and Wuille, P. (2014). Enabling blockchain innovations with pegged sidechains. URL: http://www.opensciencereview.com/papers/123/enablingblockchain-innovations-with-pegged-sidechains, 72.
Bahga, A. and Madisetti, V. K. (2016). Blockchain platform for industrial internet of things. Journal of Software Engineering and Applications, 9(10):533–546.
Balasubramaniam, A., Gul, M. J. J., Menon, V. G., and Paul, A. (2020). Blockchain for intelligent transport system. IETE Technical Review, pages 1–12.
Bartoletti, M. and Pompianu, L. (2017). An empirical analysis of smart contracts: platforms, applications, and design patterns. In International conference on financial cryptography and data security, pages 494–509. Springer.
Benyon, David Interação Humano-Computador. Tr. Heloísa Coimbra de Souza; revisão técnica: Illana de Almeida S. Concílio. – 2 ed. – São Paulo: Pearson Prentice Hall (2011).
Berdik, D., Otoum, S., Schmidt, N., Porter, D., and Jararweh, Y. (2021). A survey on blockchain for information systems management and security. Information Processing & Management, 58(1):102397.
Bessani, A., Sousa, J., and Alchieri, E. E. (2014). State machine replication for the masses with bft-smart. In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pages 355–362. IEEE.
Biswas, K. and Muthukkumarasamy, V. (2016). Securing smart cities using blockchain technology. In 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS), pages 1392–1393. IEEE.
Bogner, A., Chanson, M., and Meeuw, A. (2016). A decentralised sharing app running a smart contract on the ethereum blockchain. In Proceedings of the 6th International Conference on the Internet of Things, pages 177–178. ACM.
Brabham, D. Crowdsourcing as a Model for Problem Solving: An Introduction and Cases, In Convergence: The International Journal of Research into New Media Technologies 14, 1(2008), 75–90.
Buterin, V. et al. (2014). A next-generation smart contract and decentralized application platform. white paper.
Buxton, W., Hill, R., and Rowley, P. (1985). Issues and techniques in touch-sensitive tablet input. SIGGRAPH Computer Graphics, 19(3):215–224. 1985.
Cannavo, A. and Lamberti, F. (2020). How blockchain, virtual reality and augmented reality are converging, and why. IEEE Consumer Electronics Magazine.
Castro, M., Liskov, B., et al. (1999). Practical byzantine fault tolerance. In OSDI, volume 99, pages 173–186.
Chaer, A., Salah, K., Lima, C., Ray, P. P., and Sheltami, T. (2019). Blockchain for 5g: opportunities and challenges. In 2019 IEEE Globecom Workshops (GC Wkshps), pages 1–6. IEEE.
Chen, H. (2020). Quantum relay blockchain and its applications in key service. In Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, pages 95–99.
Chirigati, F., Rampin, R., Shasha, D., and Freire, J. (2016). Reprozip: Computational reproducibility with ease. InSIGMOD, pages 2085–2088.
Chowdhury, M. J. M., Colman, A., Kabir, M. A., Han, J., and Sarda, P. (2018). Blockchain as a notarization service for data sharing with personal data store. In 2018 17th ieee international conference on trust, security and privacy in computing and communications/12th ieee international conference on big data science and engineering (TrustCom/BigDataSE), pages 1330–1335. IEEE.
Christidis, K. and Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. Ieee Access, 4:2292–2303.
Christin, N. (2013). Traveling the silk road: A measurement analysis of a large anonymous online marketplace. In Proceedings of the 22nd international conference on World Wide Web, pages 213–224.
Clarke, D. J. et al. (2021). Appyters: Turning jupyter notebooks into data-driven web apps. Patterns, 2(3):100213.
Cocco, L., Pinna, A., and Marchesi, M. (2017). Banking on blockchain: Costs savings thanks to the blockchain technology. Future internet, 9(3):25.
Croman, K., Decker, C., Eyal, I., Gencer, A. E., Juels, A., Kosba, A., Miller, A., Saxena, P., Shi, E., Sirer, E. G., et al. (2016). On scaling decentralized blockchains. In International conference on financial cryptography and data security, pages 106–125. Springer.
Dashkevich, N., Counsell, S., and Destefanis, G. (2020). Blockchain application for central banks: A systematic mapping study. IEEE Access, 8:139918–139952.
De Angelis, S., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., and Sassone, V. (2018). Pbft vs proof-of-authority: Applying the cap theorem to permissioned blockchain.
Deepa, N., Pham, Q.-V., Nguyen, D. C., Bhattacharya, S., Prabadevi, B., Gadekallu, T. R., Maddikunta, P. K. R., Fang, F., and Pathirana, P. N. (2020). A survey on blockchain for big data: Approaches, opportunities, and future directions. arXiv preprint arXiv:2009.00858.
Dennis, R. and Owen, G. (2015). Rep on the block: A next generation reputation system based on the blockchain. In 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pages 131–138. IEEE.
Dettling, W. (2018). How to teach blockchain in a business school. In Business Information Systems and Technology 4.0, pages 213–225. Springer.
Diaz-Tula, A. and Morimoto, C. H. (2016). Augkey: Increasing foveal throughput in eye typing with augmented keys. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI ’2016, pp. 3533–3544.
Díaz, M., Martín, C., and Rubio, B. (2016). State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing. Journal of Network and Computer applications, 67:99–117.
Dorri, A., Kanhere, S. S., and Jurdak, R. (2016). Blockchain in internet of things: Challenges and solutions. CoRR, abs/1608.05187.
Dorri, A., Kanhere, S. S., Jurdak, R., and Gauravaram, P. (2017). Blockchain for iot security and privacy: The case study of a smart home. In 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops), pages 618–623. IEEE.
Dorri, A., Kanhere, S. S., Jurdak, R., and Gauravaram, P. (2019). Lsb: A lightweight scalable blockchain for iot security and anonymity. Journal of Parallel and Distributed Computing, 134:180–197.
Dziembowski, S., Faust, S., Kolmogorov, V., and Pietrzak, K. (2015). Proofs of space. In Annual Cryptology Conference, pages 585–605. Springer.
Ekramifard, A., Amintoosi, H., Seno, A. H., Dehghantanha, A., and Parizi, R. M. (2020). A systematic literature review of integration of blockchain and artificial intelligence. Blockchain cybersecurity, trust and privacy, pages 147–160.
Etash (2020). Etash protocol. https://eth.wiki/en/concepts/ethash/ethash. Acessado em 04/05/2021.
Ethereum, W. (2014). A secure decentralised generalised transaction ledger [j]. Ethereum project yellow paper, 151:1–32.
EVM (2020). Ethereum virtual machine. https://eth.wiki/en/concepts/evm/ethereum-virtual-machine-(evm)-awesome-list. Acessado em 04/05/2021.
Factom (2019). A blockchain innovations company. https://www.factom.com/. Acessado em 04/05/2021.
Fakhri, D. and Mutijarsa, K. (2018). Secure iot communication using blockchain technology. In 2018 International Symposium on Electronics and Smart Devices (ISESD), pages 1–6. IEEE.
Fangohr, H., Kluyver, T., and DiPierro, M. (2021). Jupyter in computational science.Computing in Science Engineering, 23(2):5–6.
Fitts, P. M. (1954). The information capacity of the human motor system in controlling the amplitude of movement. Journal of Experimental PSychology, 74:381– 391.
Frankenfield, J. (2018). Proof of burn. https://www.investopedia.com/terms/p/proof-burn-cryptocurrency. Acessado em 04/05/2021.
Greve, F. G. P. (2005). Protocolos fundamentais para o desenvolvimento de aplicações robustas. In Minicursos SBRC 2005: Brazilian Symposium on Computer Networks, pages 330–398.
Greve, F., Sampaio, L., Abijaude, J., Coutinho, A., Valcy, Í., and Queiroz, S. (2018). Blockchain e a revolução do consenso sob demanda. Minicursos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (Minicursos_-SBRC), 36.
Guo, Y. and Liang, C. (2016). Blockchain application and outlook in the banking industry. Financial Innovation, 2(1):1–12.
Head, A., Hohman, F., Barik, T., Drucker, S. M., and DeLine, R.(2019). Managing messes in computational notebooks. In CHI, pages 1–12.
Hou, H. (2017). The application of blockchain technology in e-government in china. In 2017 26th International Conference on Computer Communication and Networks (ICCCN), pages 1–4.
Huh, S., Cho, S., and Kim, S. (2017). Managing iot devices using blockchain platform. In 2017 19th international conference on advanced communication technology (ICACT), pages 464–467. IEEE.
Igual, L. and Seguí, S. (2017). Introduction to Data Science - A Python Approach to Concepts, Techniques and Applications. Undergraduate Topics in Computer Science. Springer.
Ikeda, K. (2018). Security and privacy of blockchain and quantum computation. In Advances in Computers, volume 111, pages 199–228. Elsevier. 43
Ji, Y., Zhang, J., Ma, J., Yang, C., and Yao, X. (2018). Bmpls: blockchain-based multi-level privacy-preserving location sharing scheme for telecare medical information systems. Journal of medical systems, 42(8):1–13.
Jiang, J., Wen, S., Yu, S., Xiang, Y., and Zhou, W. (2016). Identifying propagation sources in networks: State-of-the-art and comparative studies. IEEE Communications Surveys & Tutorials, 19(1):465–481.
Johnson, J. W. (2020). Benefits and pitfalls of jupyter notebooks in the classroom. In SIGITE, pages 32–37.
Khan, M. A. and Salah, K. (2018). Iot security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82:395–411.
Kiayias, A., Russell, A., David, B., and Oliynykov, R. (2017). Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual International Cryptology Conference, pages 357–388. Springer.
Kluyver, T. et al. (2016). Jupyter notebooks - a publishing formatfor reproducible computational workflows. In ELPUB, pages 87–90.
Kuperberg, M., Kemper, S., and Durak, C. (2019). Blockchain usage for government-issued electronic ids: A survey. In International Conference on Advanced Information Systems Engineering, pages 155–167. Springer.
Kwon, J. (2014). Tendermint: Consensus without mining. Draft v. 0.6, fall, 1(11).
Lamport, L., Shostak, R., and Pease, M. (1982). The byzantine generals problem. ACM Trans. Program. Lang. Syst., 4(3):382–401.
Lao, L., Li, Z., Hou, S., Xiao, B., Guo, S., and Yang, Y. (2020). A survey of iot applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Computing Surveys (CSUR), 53(1):1–32.
Larimer, D. (2014). Delegated proof-of-stake (dpos). Bitshare whitepaper, 81:85.
Lazar, J., Feng, J. H., and Hocheiser, H. (2017). Research Methods in Human-Computer Interaction. John Wiley & Sons.
Lee, I. and Lee, K. (2015). The internet of things (iot): Applications, investments, and challenges for enterprises. Business Horizons, 58(4):431–440.
Leng, J., Zhou, M., Zhao, L. J., Huang, Y., and Bian, Y. (2020). Blockchain security: A survey of techniques and research directions. IEEE Transactions on Services Computing.
Lerner, S. D. (2015). Dagcoin: a cryptocurrency without blocks. White paper. 44
Lewine, D. (1991). POSIX programmers guide. "O’Reilly Media, Inc.".
Lin, I.-C. and Liao, T.-C. (2017). A survey of blockchain security issues and challenges. IJ Network Security, 19(5):653–659.
Liu, B., Xiao, L., Long, J., Tang, M., and Hosam, O. (2020). Secure digital certificate-based data access control scheme in blockchain. IEEE Access, 8:91751–91760.
Liu, B., Yu, X. L., Chen, S., Xu, X., and Zhu, L. (2017). Blockchain based data integrity service framework for iot data. In 2017 IEEE International Conference on Web Services (ICWS), pages 468–475. IEEE.
Liu, P. T. S. (2016). Medical record system using blockchain, big data and tokenization. In International conference on information and communications security, pages 254–261. Springer.
M., K., C., N., and P., M. (2010). Powerful and consistent analysis of Likert-type rating scales. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI'2010, pp. 2391–2394.
Macke, S., Gong, H., Lee, D. J. L., Head, A., Xin, D., and Parameswaran, A. (2020). Fine-grained lineage for safer notebook interactions. arXiv preprint arXiv:2012.06981.
Mackenzie, I. (2012). Human-Computer Interaction: An Empirical Research Perspective. Morgan Kauffmann Publishers, New York.
MacKenzie, I. S. (1992). Fitts’ law as a research and design tool in human-computer interaction. Human-Computer Interaction, 7(1):91–139.
Mackenzie, I. S., Zhang, S. X., and Soukoreff, R. W. (1999). Text entry using soft keyboards. Behaviour & Information Technology, 18(4):235– 244.
Majaranta, P. (2009). Text Entry by Eye Gaze. PhD thesis, University of Tampere, Department of Computer Science, Tampere, Finland.
Manzoor, H., Naik, A., Shaffer, C. A., North, C., and Edwards, S. H. (2020). Auto-grading jupyter notebooks. In SIGCSE, pages 1139–1144.
Matthews, C. M. (2015). Silk road creator found guilty of cybercrimes. https://www.wsj.com/articles/silk-road-creator-found-guilty-of-cybercrimes-1423083107. Acessado em 04/05/2021.
Mazieres, D. (2015). The stellar consensus protocol: A federated model for internet-level consensus. Stellar Development Foundation, 32.
Mehmood, Y., Ahmad, F., Yaqoob, I., Adnane, A., Imran, M., and Guizani, S. (2017). Internet-of-things-based smart cities: Recent advances and challenges. IEEE Communications Magazine, 55(9):16–24.
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., Mc-Coy, D., Voelker, G. M., and Savage, S. (2013). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference, pages 127–140.
Mendling, J., Weber, I., Aalst, W. V. D., Brocke, J. V., Cabanil-las, C., Daniel, F., Debois, S., Ciccio, C. D., Dumas, M., Dustdar, S., et al. (2018).Blockchains for business process management-challenges and opportunities.ACMTransactions on Management Information Systems (TMIS), 9(1):1Ð16
Merkle-Patricia-Tree (2020). Modified merkle patricia trie specification. https://eth.wiki/en/fundamentals/patricia-tree. Acessado em 04/05/2021.
Milutinovic, M., He,W.,Wu, H., and Kanwal, M. (2016). Proof of luck: An efficient blockchain consensus protocol. In proceedings of the 1st Workshop on System Software for Trusted Execution, pages 1–6.
Mistry, I., Tanwar, S., Tyagi, S., and Kumar, N. (2020). Blockchain for 5g-enabled iot for industrial automation: A systematic review, solutions, and challenges. Mechanical Systems and Signal Processing, 135:106382.
Morimoto, C. H. and Mimica, M. (2005). Eye gaze tracking techniques for interactive applications. Computer Vision and Image Understanding, 98:4–24.
Mqtt (2017). Message queuing telemetry transport. http://mqtt.org. Acessado em 04/05/2021.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Technical report, Bitcoin Org. 45
Narayanan, A., Bonneau, J., Felten, E., Miller, A., and Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies. Princeton University Press.
Nielsen, J. (1994). Enhancing the explanatory power of usability heuristics. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, CHI’1994, pp. 210.
Oliveira, G. P., Silva, M. O., Seufitelli, D. B., Lacerda, A., and Moro, M. M. (2020). Detecting collaboration profiles in success-based music genrenetworks. In ISMIR, pages 726–732.
Park, J.-S., Youn, T.-Y., Kim, H.-B., Rhee, K.-H., and Shin, S.-U. (2018). Smart contract-based review system for an iot data marketplace. Sensors, 18(10).
Pavithra, S., Ramya, S., and Prathibha, S. (2019). A survey on cloud security issues and blockchain. In 2019 3rd International Conference on Computing and Communications Technologies (ICCCT), pages 136–140. IEEE.
Peisert, S. (2021). Trustworthy scientific computing. Communications of the ACM, 64(5):18–21.
Perkel, J. M. (2018). Why Jupyter is data scientists’ computational notebook of choice.Nature, 563:145–146.
Perkel, J. M. (2021a). Reactive, reproducible, collaborative: computational notebooks evolve. Nature, 593:156–157.
Perkel, J. M. (2021b). Ten computer codes that transformed science. Nature, 589:344–348.
Pimentel, J. F. (2021). Provenance from Script. PhD thesis, Universidade Federal Fluminense.
Pimentel, J. F., Murta, L., Braganholo, V., and Freire, J. (2019). A large-scale study about quality and reproducibility of jupyter notebooks. In MSR, pages 507–517.
Pimentel, J. F., Murta, L., Braganholo, V., and Freire, J. (2021). Understanding and improving the quality and reproducibility of jupyter notebooks. Empirical Software Engineering, 26(4):65.
PoET (2018). Poet 1.0 specification. https://sawtooth.hyperledger.org/docs/core/releases/1.0/architecture/poet.html. Acessado em 04/05/2021.
Popov, S. (2018). The tangle. White paper, 1:3.
Popov, S., Moog, H., and et al. (2020). The coordicide. white paper Iota Foundation.
Rahimi, P., Khan, N. D., Chrysostomou, C., Vassiliou, V., and Nazir, B. (2020). A secure communication for maritime iot applications using blockchain technology. In 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS), pages 244–251. IEEE.
Rao, A. R. and Dave, R. (2019). Developing hands-on laboratory exercises for teaching stem students the internet-of-things, cloud computing and blockchain applications. In 2019 IEEE Integrated STEM Education Conference (ISEC), pages 191–198. IEEE.
Rathee, G., Balasaraswathi, M., Chandran, K. P., Gupta, S. D., and Boopathi, C. (2021). A secure iot sensors communication in industry 4.0 using blockchain technology. Journal of Ambient Intelligence and Humanized Computing, 12(1):533–545.
Robertson, J. and Kaptein, M. E. (2018). Modern Statistical Methods for HCI. Springer.
Ruta, M., Scioscia, F., Ieva, S., Capurso, G., and Di Sciascio, E. (2017). Semantic blockchain to improve scalability in the internet of things. Open Journal of Internet Of Things (OJIOT), 3(1):46–61.
Sagirlar, G., Carminati, B., Ferrari, E., Sheehan, J. D., and Ragnoli, E. (2018). Hybrid-iot: Hybrid blockchain architecture for internet of thingspow sub-blockchains. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pages 1007–1016. IEEE. 46
Saint-Andre, P. et al. (2004). Extensible messaging and presence protocol (xmpp): Core.
Samaniego, M., Jamsrandorj, U., and Deters, R. (2016). Blockchain as a service for iot. In 2016 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pages 433–436. IEEE.
Seitz, L., Selander, G., Wahlstroem, E., Erdtman, S., and Tschofenig, H. (2017). Authentication and authorization for constrained environments (ace). Internet Engineering Task Force, Internet-Draft draft-ietf-aceoauth-authz-07.
Selker, T. (2008). Touching the future. Communications of the ACM, 51(12):14–16.
Shae, Z. and Tsai, J. J. (2017). On the design of a blockchain platform for clinical trial and precision medicine. In 2017 IEEE 37th international conference on distributed computing systems (ICDCS), pages 1972–1980. IEEE.
Shannon, C. and Weaver, W. (1998). The Mathematical Theory of Communication. University of Illinois Press.
Sharma, P. K., Singh, S., Jeong, Y.-S., and Park, J. H. (2017). Distblocknet: A distributed blockchains-based secure sdn architecture for iot networks. IEEE Communications Magazine, 55(9):78–85.
Sharp, H., Preece, J., and Rogers, Y. (2019). Interaction Design: Beyond Human-Computer Interaction. Wiley, 5th edition.
Shelby, Z., Hartke, K., and Bormann, C. (2014). The constrained application protocol (coap).
Shen, H. (2014). Interactive notebooks: Sharing the code. Nature, 515(7525):151–152.
Silvano, W. F. and Marcelino, R. (2020). Iota tangle: A cryptocurrency to communicate internet-of-things data. Future Generation Computer Systems, 112:307–319.
Skiena, S. (2017). The Data Science Design Manual. Texts in Computer Science. Springer.
Sornin, N., Luis, M., Eirich, T., Kramp, T., and Hersent, O. (2015). Lorawan specification. LoRa alliance.
Sousa, J., Bessani, A., and Vukolic, M. (2018). A byzantine faulttolerant ordering service for the hyperledger fabric blockchain platform. In 2018 48th annual IEEE/IFIP international conference on dependable systems and networks (DSN), pages 51–58. IEEE.
Sporny, M. and D., L. (2017). The web ledger protocol 1.0. http://standards.ieee.org/develop/project/2418.html. Acessado em 04/05/2021.
Stojkoska, B. L. R. and Trivodaliev, K. V. (2017). A review of internet of things for smart home: Challenges and solutions. Journal of Cleaner Production, 140:1454–1464.
Szabo, N. (1997). Formalizing and securing relationships on public networks. First Monday, 2(9).
Sztajnberg, A., da Silva Macedo, R., and Stutzel, M. (2018). Protocolos de aplicação para a internet das coisas: conceitos e aspectos práticos. Sociedade Brasileira de Computação.
Ta-Shma, P., Akbar, A., Gerson-Golan, G., Hadash, G., Carrez, F., and Moessner, K. (2017). An ingestion and analytics architecture for iot applied to smart city use cases. IEEE Internet of Things Journal, 5(2):765–774.
Tecnology, C. B. (2017a). Blockchain data format specification. http://www.cbdforum.cn/bcweb/index/bz/1-0.html. Acessado em 04/05/2021.
Tecnology, C. B. (2017b). Blockchain reference architecture. http://www.cbdforum.cn/bcweb/index/article/bzwrr-1.html. Acessado em 04/05/2021.
Tecnology, C. B. (2017c). Standard for the framework of blockchain use in internet of things (iot). http://standards.ieee.org/develop/project/2418.htm. Acessado em 04/05/2021.
Todd, P. (2015). Ripple protocol consensus algorithm review. Ripple Labs Inc White Paper (May, 2015) https://raw.githubusercontent.com/petertodd/rippleconsensus-analysis-paper/master/paper.pdf.
Underwood, S. (2016). Blockchain beyond bitcoin. Communications of the ACM, 59(11):15–17.
Urbina,M.H. and Huckauf, A. (2010). Alternatives to single character entry and dwell time selection on eye typing. In Proceedings of the ACM Symposium on Eye-Tracking Research & Applications, ETRA’2010, pp. 315–322.
van Rossum, G., Warsaw, B., and Coghlan, N. (2001). Pep 8: style guide for python code.https://www.python.org/dev/peps/pep-0008/. Accessed: 2019-10-01.
Vinoski, S. (2006). Advanced message queuing protocol. IEEE Internet Computing, 10(6):87–89.
Vucinic, M., Tourancheau, B., Rousseau, F., Duda, A., Damon, L., and Guizzetti, R. (2015). Oscar: Object security architecture for the internet of things. Ad Hoc Networks, 32:3–16.
Wang, J., Tzu-Yang, K., Li, L., and Zeller, A. (2020). Assessing and Restoring Reproducibility of Jupyter Notebooks. In ASE, pages 138–149.
Willis, A., Charlton, P., and Hirst, T. (2020). Developing students’ written communication skills with jupyter notebooks. In SIGCSE, pages 1089–1095.
Wobbrock, J. O., Rubinstein, J., Sawyer, M. W., and Duchowski, A. T. (2008). Longitudinal evaluation of discrete consecutive gaze gestures for text entry. In Proceedings of the ACM Symposium on Eye Tracking Research & Applications, ETRA’2008, pp. 11–18.
Wu, M., Wang, K., Cai, X., Guo, S., Guo, M., and Rong, C. (2019). A comprehensive survey of blockchain: From theory to iot applications and beyond. IEEE Internet of Things Journal, 6(5):8114–8154.
Xie, R., Wang, Y., Tan, M., Zhu, W., Yang, Z., Wu, J., and Jeon, G. (2020). Ethereum-blockchain-based technology of decentralized smart contract certificate system. IEEE Internet of Things Magazine, 3(2):44–50.
Xu, C.,Wang, K., and Guo, M. (2017). Intelligent resource management in blockchain-based cloud datacenters. IEEE Cloud Computing, 4(6):50–59.
Xu, X., Zhang, X., Gao, H., Xue, Y., Qi, L., and Dou, W. (2019). Become: blockchain-enabled computation offloading for iot in mobile edge computing. IEEE Transactions on Industrial Informatics, 16(6):4187–4195.
Yermack, D. (2017). Corporate governance and blockchains. Review of Finance, 21(1):7–31.
Yoo, H. and Ko, N. (2020). Blockchain based data marketplace system. In 2020 International Conference on Information and Communication Technology Convergence (ICTC), pages 1255–1257. IEEE.
Yue, X., Wang, H., Jin, D., Li, M., and Jiang, W. (2016). Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. Journal of medical systems, 40(10):1–8.
Zhang, C. and Chen, Y. (2020). A review of research relevant to the emerging industry trends: Industry 4.0, iot, blockchain, and business analytics. Journal of Industrial Integration and Management, 5(01):165–180.
Zhang, W., Luo, Y., Fu, S., and Xie, T. (2020). Privacy-preserving reputation management for blockchain-based mobile crowdsensing. In 2020 17th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pages 1–9. IEEE.
Zheng, Z., Xie, S., Dai, H., Chen, X., and Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE international congress on big data (BigData congress), pages 557–564. IEEE.
Detalhes sobre o formato disponível para publicação: Volume Completo
© O(s) autor(es), 2021.

Esse trabalho foi publicado de acordo com os termos da licença Creative Commons Attribution 4.0 International License
.