Edmundo Monteiro
YOU?
Author Swipe
View article: Computational complexity-constrained spectral efficiency analysis for 6G waveforms
Computational complexity-constrained spectral efficiency analysis for 6G waveforms Open
In this work, we present a tutorial on how to account for the computational time complexity overhead of signal processing in the Spectral Efficiency (SE) analysis of wireless waveforms. Our methodology is particularly relevant in scenarios…
View article: Fast Computation of the Discrete Fourier Transform Rectangular Index Coefficients
Fast Computation of the Discrete Fourier Transform Rectangular Index Coefficients Open
In~\cite{sic-magazine-2025}, the authors show that the square index coefficients (SICs) of the $N$-point discrete Fourier transform (DFT) -- that is, the coefficients $X_{k\sqrt{N}}$ for $k = 0, 1, \ldots, \sqrt{N} - 1$ -- can be losslessl…
View article: PQBFL: A Post-Quantum Blockchain-based Protocol for Federated Learning
PQBFL: A Post-Quantum Blockchain-based Protocol for Federated Learning Open
One of the goals of Federated Learning (FL) is to collaboratively train a global model using local models from remote participants. However, the FL process is susceptible to various security challenges, including interception and tampering…
View article: Cognitive customer profiling at the edge: Challenges and research directions
Cognitive customer profiling at the edge: Challenges and research directions Open
The proliferation of automated services and applications has generated large amounts of data that must be handled with artificial intelligence and machine learning techniques, impacting businesses in different fields. Cognitive customer pr…
View article: Computational Complexity-Constrained Spectral Efficiency Analysis for 6G Waveforms
Computational Complexity-Constrained Spectral Efficiency Analysis for 6G Waveforms Open
In this work, we present a tutorial on how to account for the computational time complexity overhead of signal processing in the spectral efficiency (SE) analysis of wireless waveforms. Our methodology is particularly relevant in scenarios…
View article: Fast Computation of the Discrete Fourier Transform Square Index Coefficients
Fast Computation of the Discrete Fourier Transform Square Index Coefficients Open
The $N$-point discrete Fourier transform (DFT) is a cornerstone for several signal processing applications. Many of these applications operate in real-time, making the computational complexity of the DFT a critical performance indicator to…
View article: Deep Reinforcement Learning-Based Multi-Access in Massive Machine-Type Communication
Deep Reinforcement Learning-Based Multi-Access in Massive Machine-Type Communication Open
The diverse applications of Machine-Type Communication (MTC) lead to exponential growth in Machine to Machine traffic. In connection with MTC deployment, a large number of devices are expected to access the wireless network simultaneously,…
View article: Computation-Limited Signals: A Channel Capacity Regime Constrained by Computational Complexity
Computation-Limited Signals: A Channel Capacity Regime Constrained by Computational Complexity Open
In this letter, we introduce the computational-limited (comp-limited) signals, a communication capacity regime in which the signal time computational complexity overhead is the key constraint -- rather than power or bandwidth -- to the ove…
View article: Learning‐driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things
Learning‐driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things Open
Ubiquitous edge computing facilitates efficient cloud services near mobile devices, enabling mobile edge computing (MEC) to offer services more efficiently by presenting storage and processing capability within the proximity of mobile devi…
View article: Intrusion and Anomaly Detection in Industrial Automation and Control Systems
Intrusion and Anomaly Detection in Industrial Automation and Control Systems Open
In the domain of Industrial Automation and Control
\nSystems (IACS), security was traditionally downplayed to a
\ncertain extent, as it was originally deemed an exclusive concern of
\nInformation and Communications Technology (ICT) systems…
View article: Resource orchestration in 5G and beyond: Challenges and opportunities
Resource orchestration in 5G and beyond: Challenges and opportunities Open
5G networks have strict constraints regarding the services in terms of latency, reliability, and availability, which pose additional challenges to the traditional orchestration solutions, and 6G networks will increment the number of slices…
View article: Is FFT Fast Enough for Beyond 5G Communications? A Throughput-Complexity Analysis for OFDM Signals
Is FFT Fast Enough for Beyond 5G Communications? A Throughput-Complexity Analysis for OFDM Signals Open
In this paper, we study the impact of computational complexity on the throughput limits of the fast Fourier transform (FFT) algorithm for orthogonal frequency division multiplexing (OFDM) waveforms. Based on the spectro-computational compl…
View article: Privacy in the Cloud: A Survey of Existing Solutions and Research Challenges
Privacy in the Cloud: A Survey of Existing Solutions and Research Challenges Open
Private data is transmitted and stored online every second. Therefore, security and privacy assurances should be provided at all times. However, that is not always the case. Private information is often unwillingly collected, sold, or expo…
View article: Service Placement for Latency Reduction in the Fog Using Application Profiles
Service Placement for Latency Reduction in the Fog Using Application Profiles Open
The Cloud-Fog-Internet of Things continuum combines different paradigms to provide connectivity and ubiquity for end-users, while also granting low latency and low jitter to cope with different challenges, including the requirements of lat…
View article: Is FFT Fast Enough for Beyond-5G Communications?
Is FFT Fast Enough for Beyond-5G Communications? Open
In this paper, we study the impact of computational complexity on the throughput limits of the {\color{black}fast Fourier transform (FFT)} algorithm for {\color{black}orthogonal frequency division multiplexing(OFDM)} waveforms. Based on th…
View article: Optimal Mapper for OFDM With Index Modulation: A Spectro-Computational Analysis
Optimal Mapper for OFDM With Index Modulation: A Spectro-Computational Analysis Open
In this work, we present an optimal mapper for OFDM with index modulation\n(OFDM-IM). By optimal we mean the mapper achieves the lowest possible\nasymptotic computational complexity (CC) when the spectral efficiency (SE) gain\nover OFDM ma…
View article: Resilient Service Chains through Smart Replication
Resilient Service Chains through Smart Replication Open
The Internet of Things paradigm enables a new set of smart end-user applications. The Cloud-
\nFog-Mist-Internet of Things infrastructure provides communication, compute, and storage support for these
\napplications. However, this complex,…
View article: A comparative analysis of simulators for the Cloud to Fog continuum
A comparative analysis of simulators for the Cloud to Fog continuum Open
The Cloud to Fog continuum is a very dense and complex scenario. At the core level (Cloud) resources are vast, whilst they become scarce at the Edge (Fog). This complexity leads to the need of simulation tools in order to evaluate the perf…
View article: A Comprehensive Security Analysis of a SCADA Protocol: From OSINT to Mitigation
A Comprehensive Security Analysis of a SCADA Protocol: From OSINT to Mitigation Open
It is an established fact that the security of Industrial Automation and Control Systems (IACS)
\nstrongly depends on the robustness of the underlying supervisory control and data acquisition (SCADA)
\nnetwork protocols (among other factor…
View article: Fog orchestration for the Internet of Everything: state-of-the-art and research challenges
Fog orchestration for the Internet of Everything: state-of-the-art and research challenges Open
Recent developments in telecommunications have allowed drawing new paradigms, including the Internet of
\nEverything, to provide services by the interconnection of different physical devices enabling the exchange of data to
\nenrich and au…
View article: Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence
Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence Open
Culprits' identi cation by the means of suspicious pattern detection techniques from mobile
\ndevice data is one of the most important aims of the mobile forensic data analysis. When criminal activities
\nare related to entirely automated …
View article: Virtualizing Programmable Logic Controllers: Toward a Convergent Approach
Virtualizing Programmable Logic Controllers: Toward a Convergent Approach Open
Modern Programmable Logic Controllers (PLCs) are pervasive components in Industrial Control Systems (ICS) such as Supervisory Control and Data Acquisition (SCADA), designed to control industrial processes autonomously or as part of a distr…
View article: A survey on security attacks and countermeasures with primary user detection in cognitive radio networks
A survey on security attacks and countermeasures with primary user detection in cognitive radio networks Open
Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies aiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR) emerges as one of the most p…