Tomas Cerny

@baylor.edu

Associate Professor at Computer Science
Baylor University



                    

https://researchid.co/tomcerny

EDUCATION

Czech Technical University, FEE
Baylor University

RESEARCH INTERESTS

Cloud-native, static analysis, microservices

143

Scopus Publications

1921

Scholar Citations

22

Scholar h-index

52

Scholar i10-index

Scopus Publications

  • Evaluating ChatGPT’s Proficiency in Understanding and Answering Microservice Architecture Queries Using Source Code Insights
    Ernesto Quevedo, Amr S. Abdelfattah, Alejandro Rodriguez, Jorge Yero, and Tomas Cerny

    Springer Science and Business Media LLC

  • Review of Open Software Bug Datasets
    Tomas Holek, Miroslav Bures, and Tomas Cerny

    Springer Nature Switzerland


  • Comparative Evaluation of Java Virtual Machine-Based Message Queue Services: A Study on Kafka, Artemis, Pulsar, and RocketMQ
    Md Showkat Hossain Chy, Muhammad Ashfakur Rahman Arju, Sri Manjusha Tella, and Tomas Cerny

    MDPI AG
    Message Queue (MQ) services play a vital role in modern distributed systems as they enable asynchronous communication between services and facilitate the decoupling of various components of the system. Among the many MQ services available, Kafka, Apache Pulsar, Artemis, and RocketMQ are popular choices, each offering unique features and capabilities. As the adoption of MQ services continues to grow, choosing the appropriate service that can meet the requirements of the system has become increasingly challenging. Therefore, a comprehensive comparison of these services is crucial to determine the most suitable one for a specific use-case. This research paper presents a thorough evaluation of these MQ services based on critical metrics such as CPU utilization, memory usage, garbage collection, latency, and throughput. Based on our extensive review, no other research has delved into such a detailed evaluation, thereby establishing our work as a cornerstone in this field. The results of our study offer valuable insights into the strengths and limitations of each service. Our findings indicate that each message queue behaves differently inside the Java Virtual Machine (JVM). This work aims to assist developers and researchers in strategically deploying and optimizing MQ services based on specific system and use-case requirements. In addition to providing machine metrics, our results demonstrate the performance of each message queue under different load scenarios, making it a valuable resource for those seeking to ensure the effective functioning of their MQ services.

  • Catalog and detection techniques of microservice anti-patterns and bad smells: A tertiary study
    Tomas Cerny, Amr S. Abdelfattah, Abdullah Al Maruf, Andrea Janes, and Davide Taibi

    Elsevier BV

  • Unikernels Motivations, Benefits and Issues: A Multivocal Literature Review
    Nabil El Ioini, Ayoub El Majjodi, David Hastbacka, Tomas Cerny, and Davide Taibi

    ACM
    While working in the cloud, the trend is to secure all the resources in order for the applications and systems to operate as efficiently as possible. Huge amounts of resources are wasted on unnecessary utilities and resource-consuming processes, which can rather have a negative effect. Unikernels are the last trend in this direction. We aim to shed light on the motivations, benefits, and issues in unikernels. Our goal is to systematically analyze what made this technology so attractive, identifying the benefits they have attained and the issues encountered in embracing this new technology. We surveyed academic and grey literature by means of the Multivocal Literature Review process, analyzing 590 sources, of which 62 reported motivations, benefits, and issues. The main motivations for adopting unikernels are performance and security, which are also reflected in the benefits reported. In terms of issues, the maturity of the existing frameworks as well as the tool support, are the main challenges that need to be addressed. Given the great potential that unikernels can bring in terms of performance and security, further research is needed to investigate the pros and cons, how to use them, and in which contexts they are beneficial.

  • Detecting Semantic Clones in Microservices Using Components
    Amr S. Abdelfattah, Alejandro Rodriguez, Andrew Walker, and Tomas Cerny

    Springer Science and Business Media LLC

  • Benchmarking Message Queues
    Rokin Maharjan, Md Showkat Hossain Chy, Muhammad Ashfakur Arju, and Tomas Cerny

    MDPI AG
    Message queues are a way for different software components or applications to communicate with each other asynchronously by passing messages through a shared buffer. This allows a sender to send a message without needing to wait for an immediate response from the receiver, which can help to improve the system’s performance, reduce latency, and allow components to operate independently. In this paper, we compared and evaluated the performance of four popular message queues: Redis, ActiveMQ Artemis, RabbitMQ, and Apache Kafka. The aim of this study was to provide insights into the strengths and weaknesses of each technology and to help practitioners choose the most appropriate solution for their use case. We primarily evaluated each technology in terms of latency and throughput. Our experiments were conducted using a diverse array of workloads to test the message queues under various scenarios. This enables practitioners to evaluate the performance of the systems and choose the one that best meets their needs. The results show that each technology has its own pros and cons. Specifically, Redis performed the best in terms of latency, whereas Kafka significantly outperformed the other three technologies in terms of throughput. The optimal choice depends on the specific requirements of the use case. This paper presents valuable insights for practitioners and researchers working with message queues. Furthermore, the results of our experiments are provided in JSON format as a supplement to this paper.

  • Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping Study
    Md Shahidur Rahaman, Sadia Nasrin Tisha, Eunjee Song, and Tomas Cerny

    MDPI AG
    Protecting the resources of a cloud-native application is essential to meet an organization’s security goals. Cloud-native applications manage thousands of user requests, and an organization must employ a proper access control mechanism. However, unfortunately, developers sometimes grumble when designing and enforcing access decisions for a gigantic scalable application. It is sometimes complicated to choose the potential access control model for the system. Cloud-native software architecture has become an integral part of the industry to manage and maintain customer needs. A microservice is a combination of small independent services that might have hundreds of parts, where the developers must protect the individual services. An efficient access control model can defend the respective services and consistency. This study intends to comprehensively analyze the current access control mechanism and techniques utilized in cloud-native architecture. For this, we present a systematic mapping study that extracts current approaches, categorizes access control patterns, and provides developers guidance to meet security principles. In addition, we have gathered 234 essential articles, of which 29 have been chosen as primary studies. Our comprehensive analysis will guide practitioners to identify proper access control mechanisms applicable to ensuring security goals in cloud-native architectures.

  • Message from the Program Chairs


  • Fairness Analysis of Deep Reinforcement Learning based Multi-Path QUIC Scheduling
    Ernesto Quevedo Caballero, Michael Donahoo, and Tomas Cerny

    ACM
    Computing devices with multiple active network interfaces, such as cellular, wired, and WiFi, are becoming more and more common. Typically, such devices select a single interface for communication, but throughput and availability can increase by utilizing multipath protocols. Multipath TCP (MPTCP) is the predominant protocol in this space; however, Multipath QUIC (MPQUIC) provides several advantages over MPTCP and is increasing in adoption. Multipath protocols use a multipath scheduler to determine which packets use which interface. Legacy schedulers exhibit good performance but often poorly handle adjusting to dynamic changes in the network. Recent research includes the development of several Deep Reinforcement Learning (DRL) based schedulers that outperform legacy schedulers and improve adaptability to changing network conditions. Evaluation of any packet scheduling approach must include an assessment of fairness to concurrent TCP flows. Specifically, under congestion conditions, all flows (multipath or unipath) should tend toward an equal share of the bandwidth. Unfortunately, MPQUIC DRL-based scheduler research does not include a rigorous analysis of the fairness aspect under various network conditions, risking significant network problems as adoption increases. We present an efficiency and fairness comparison of MPQUIC using DRL-based schedulers with classic agents like DQN, Deep SARSA, and Double DQN. Experimental results over a bi-path network show that these schedulers are TCP-friendly in many cases on both paths and converge to link-centric fairness on one path. However, our work shows that they are not TCP-friendly or can be bullied under certain conditions, degrading TCP or MPQUIC performance.

  • Static-Analysis-Based Solutions to Security Challenges in Cloud-Native Systems: Systematic Mapping Study
    Md Shahidur Rahaman, Agm Islam, Tomas Cerny, and Shaun Hutton

    MDPI AG
    Security is a significant priority for cloud-native systems, regardless of the system size and complexity. Therefore, one must utilize a set of defensive mechanisms or controls to protect the system from exploitation by potential adversaries. There is an expanding amount of research on security issues, including attacks against individual microservices or overall systems and their corresponding defense mechanism options. This study intends to provide a comprehensive overview of currently used defense mechanisms involving static analysis that can detect and react against associated attacks and vulnerabilities. We present a systematic literature review that extracts current approaches for the security analysis of microservices and the violation of security principles. We gathered 1049 relevant publications, of which 50 were selected as primary studies. We are providing practitioners and developers with a structured survey of the existing literature of defensive solutions for microservice architectures and cloud-native systems to aid them in identifying applicable solutions for their systems.

  • Roadmap to Reasoning in Microservice Systems: A Rapid Review
    Amr S. Abdelfattah and Tomas Cerny

    MDPI AG
    Understanding software systems written by others is often challenging. When we want to assess systems to reason about them, i.e., to understand dependencies, analyze evolution trade-offs, or to verify conformance to the original blueprint, we must invest broad efforts. This becomes difficult when considering decentralized systems. Microservice-based systems are mainstream these days; however, to observe, understand, and manage these systems and their properties, we are missing fundamental tools that would derive various simplified system abstract perspectives. Microservices architecture characteristics yield many advantages to system operation; however, they bring challenges to their development and deployment lifecycles. Microservices urge a system-centric perspective to better reason about the system evolution and its quality attributes. This process review paper considers the current system analysis approaches and their possible alignment with automated system assessment or with human-centered approaches. We outline the necessary steps to accomplish holistic reasoning in decentralized microservice systems. As a contribution, we provide a roadmap for analysis and reasoning in microservice-based systems and suggest that various process phases can be decoupled through the introduction of system intermediate representation as the trajectory to provide various system-centered perspectives to analyze various system aspects. Furthermore, we cover different technical-based reasoning strategies and metrics in addition to the human-centered reasoning addressed through alternative visualization approaches. Finally, a system evolution is discussed from the perspective of such a reasoning process to illustrate the impact analysis evaluation over system changes.

  • Legal Natural Language Processing from 2015-2022: A Comprehensive Systematic Mapping Study of Advances and Applications
    Ernesto Quevedo, Tomas Cerny, Alejandro Rodriguez, Pablo Rivas, Jorge Yero, Korn Sooksatra, Alibek Zhakubayev, and Davide Taibi

    Institute of Electrical and Electronics Engineers (IEEE)

  • Metrics and models for developer collaboration analysis in microservice-based systems. A systematic mapping study


  • One Microservice per Developer: Is This the Trend in OSS?
    Dario Amoroso d’Aragona, Xiaozhou Li, Tomas Cerny, Andrea Janes, Valentina Lenarduzzi, and Davide Taibi

    Springer Nature Switzerland

  • The Microservice Dependency Matrix
    Amr S. Abdelfattah and Tomas Cerny

    Springer Nature Switzerland

  • End-to-End Test Coverage Metrics in Microservice Systems: An Automated Approach
    Amr S. Abdelfattah, Tomas Cerny, Jorge Yero Salazar, Austin Lehman, Joshua Hunter, Ashley Bickham, and Davide Taibi

    Springer Nature Switzerland

  • Benchmarks for End-to-End Microservices Testing
    Sheldon Smith, Ethan Robinson, Timmy Frederiksen, Trae Stevens, Tomas Cerny, Miroslav Bures, and Davide Taibi

    IEEE
    Testing microservice systems involves a large amount of planning and problem-solving. The difficulty of testing microservice systems increases as the size and structure of such systems become more complex. To help the microservice community and simplify experiments with testing and traffic simulation, we created a test benchmark containing full functional testing coverage for two well-established open-source microservice systems. Through our benchmark design, we aimed to demonstrate ways to overcome certain challenges and find effective strategies when testing microservices. In addition, to demonstrate our benchmark use, we conducted a case study to identify the best approaches to take to validate a full coverage of tests using service-dependency graph discovery and business process discovery using tracing.

  • Analyzing Organizational Structure of Microservice Projects based on Contributor Collaboration
    Xiaozhou Li, Amr S. Abdelfattah, Jorge Yero, Dario Amoroso d'Aragona, Tomas Cerny, and Davide Taibi

    IEEE
    Software system quality is strongly affected by the organizational structure and collaboration across developers. Effective and loosely coupled organization structures reflect the high quality of the system architecture and the efficiency with which this system can evolve. Especially for microservice-based systems, as the notion of “one-microservice-per-team” is highly recommended and advocated as one of the best practices in the industry, it is crucial for the companies to be aware of the status of their organizational structure and the critical contributors therein. To such an end, this paper proposes an approach to analyze the organizational structure of microservice-based software projects in terms of contributor collaboration and to identify the core contributors therein. Furthermore, we can also monitor the evolution of the project's organizational structure via the growing collaboration activities through different releases. The proposed method shall help the companies and organizations adopting microservices better understand their organizational structure and make more effective decisions in maintaining the quality of microservice architectures.


  • Microservices Architecture Language for Describing Service View
    Luka Lelovic, Michael Mathews, Amr Abdelfattah, and Tomas Cerny

    SCITEPRESS - Science and Technology Publications

  • Towards Security-Aware Microservices: On Extracting Endpoint Data Access Operations to Determine Access Rights
    Amr Abdelfattah, Micah Schiewe, Jacob Curtis, Tomas Cerny, and Eunjee Song

    SCITEPRESS - Science and Technology Publications

  • Filling The Gaps in Microservice Frontend Communication: Case for New Frontend Patterns
    Amr Abdelfattah and Tomas Cerny

    SCITEPRESS - Science and Technology Publications

  • Navigating an Interdisciplinary Approach to Cybercrime Research


RECENT SCHOLAR PUBLICATIONS

  • From static code analysis to visual models of microservice architecture
    T Cerny, AS Abdelfattah, J Yero, D Taibi
    Cluster Computing, 1-26 2024

  • Service Weaver: A Promising Direction for Cloud-native Systems?
    J Johnson, S Kharel, A Mannamplackal, AS Abdelfattah, T Cerny
    arXiv preprint arXiv:2404.09357 2024

  • Evaluating ChatGPT’s Proficiency in Understanding and Answering Microservice Architecture Queries Using Source Code Insights
    E Quevedo, AS Abdelfattah, R Alejandro, J Yero, T Cerny
    SN COMPUT. SCI. 5 (4), 422 2024

  • Comparison of Static Analysis Architecture Recovery Tools for Microservice Applications
    S Schneider, A Bakhtin, X Li, J Soldani, A Brogi, T Cerny, R Scandariato, ...
    arXiv preprint arXiv:2403.06941 2024

  • Review of Open Software Bug Datasets
    T Holek, M Bures, T Cerny
    World Conference on Information Systems and Technologies, 3-12 2024

  • Microservice-Aware Static Analysis: Opportunities, Gaps, and Advancements
    T Cerny, D Taibi
    Joint Post-proceedings of the Third and Fourth International Conference on 2023

  • Comparative Evaluation of Java Virtual Machine-Based Message Queue Services: A Study on Kafka, Artemis, Pulsar, and RocketMQ
    MSH Chy, MAR Arju, SM Tella, T Cerny
    Electronics 12 (23), 4792 2023

  • Legal Natural Language Processing from 2015-2022: A Comprehensive Systematic Mapping Study of Advances and Applications
    E Quevedo, T Cerny, A Rodriguez, P Rivas, J Yero, K Sooksatra, ...
    IEEE Access 2023

  • Unikernels Motivations, Benefits and Issues: A Multivocal Literature Review
    N El Ioini, A El Majjodi, D Hastbacka, T Cerny, D Taibi
    Proceedings of the 3rd Eclipse Security, AI, Architecture and Modelling 2023

  • End-to-End Test Coverage Metrics in Microservice Systems: An Automated Approach
    AS Abdelfattah, T Cerny, JY Salazar, A Lehman, J Hunter, A Bickham, ...
    European Conference on Service-Oriented and Cloud Computing, 35-51 2023

  • The microservice dependency matrix
    AS Abdelfattah, T Cerny
    European Conference on Service-Oriented and Cloud Computing, 276-288 2023

  • One microservice per developer: is this the trend in OSS?
    D Amoroso d’Aragona, X Li, T Cerny, A Janes, V Lenarduzzi, D Taibi
    European Conference on Service-Oriented and Cloud Computing, 19-34 2023

  • ChatGPT for Microservice Development: How far can we go?
    L Adams, F Boyle, P Boyle, D Amoroso D'Aragona, T Cerny, D Taibi
    Microservices 2023, 1-6 2023

  • Catalog and detection techniques of microservice anti-patterns and bad smells: A tertiary study
    T Cerny, AS Abdelfattah, AA Maruf, A Janes, D Taibi
    Journal of Systems and Software 2023

  • Aligning Word Embeddings from BERT to Vocabulary-Free Representations
    AR Perez, K Sooksatra, P Rivas, E Quevedo, J Turek, G Bichler, T Cerny, ...
    2023 Congress in Computer Science, Computer Engineering, & Applied Computing 2023

  • Analyzing organizational structure of microservice projects based on contributor collaboration
    X Li, AS Abdelfattah, J Yero, DA d'Aragona, T Cerny, D Taibi
    2023 IEEE International Conference on Service-Oriented System Engineering 2023

  • An empirical analysis towards replacing vocabulary-rigid embeddings by a vocabulary-free mechanism
    AR Perez, K Sooksatra, P Rivas, EQ Caballero, JS Turek, G Bichler, ...
    LatinX in AI Workshop at ICML 2023 (Regular Deadline) 2023

  • Detecting Semantic Clones in Microservices Using Components
    AS Abdelfattah, A Rodriguez, A Walker, T Cerny
    SN Computer Science 4 (5), 470 2023

  • Benchmarking Message Queues
    R Maharjan, MSH Chy, MA Arju, T Cerny
    Telecom 4 (2), 298-312 2023

  • Benchmarks for End-to-End Microservices Testing
    S Smith, E Robinson, T Frederiksen, T Stevens, T Cerny, M Bures, D Taibi
    2023 IEEE International Conference on Service-Oriented System Engineering 2023

MOST CITED SCHOLAR PUBLICATIONS

  • Contextual understanding of microservice architecture: current and future directions
    T Cerny, MJ Donahoo, M Trnka
    ACM SIGAPP Applied Computing Review 17 (4), 29-45 2018
    Citations: 251

  • Survey of Authentication and Authorization for the Internet of Things
    M Trnka, T Cerny, N Stickney
    Security and Communication Networks 2018 2018
    Citations: 93

  • Disambiguation and comparison of soa, microservices and self-contained systems
    T Cerny, MJ Donahoo, J Pechanec
    Proceedings of the International Conference on research in adaptive and 2017
    Citations: 79

  • Aspects of quality in Internet of Things (IoT) solutions: A systematic mapping study
    BS Ahmed, M Bures, K Frajtak, T Cerny
    IEEE Access 7, 13758-13780 2019
    Citations: 65

  • Internet of things: Current challenges in the quality assurance and testing methods
    M Bures, T Cerny, BS Ahmed
    International conference on information science and applications, 625-634 2018
    Citations: 59

  • Aspect-driven, Data-reflective and Context-aware User Interfaces Design
    T Cerny, K Cemus, MJ Donahoo, E Song
    Applied Computing Review 13 (4), 53-65 2013
    Citations: 51

  • Open-source tools and benchmarks for code-clone detection: past, present, and future trends
    A Walker, T Cerny, E Song
    ACM SIGAPP Applied Computing Review 19 (4), 28-39 2020
    Citations: 47

  • Context-sensitive, cross-platform user interface generation
    M Macik, T Cerny, P Slavik
    Journal on Multimodal User Interfaces, 1-13 2014
    Citations: 47

  • On Microservice Analysis and Architecture Evolution: A Systematic Mapping Study
    V Bushong, AS Abdelfattah, AA Maruf, D Das, A Lehman, E Jaroszewski, ...
    Applied Sciences 11 (17) 2021
    Citations: 46

  • Microservice architecture reconstruction and visualization techniques: A review
    T Cerny, AS Abdelfattah, V Bushong, A Al Maruf, D Taibi
    2022 IEEE International Conference on Service-Oriented System Engineering 2022
    Citations: 45

  • Automated code-smell detection in microservices through static analysis: A case study
    A Walker, D Das, T Cerny
    Applied Sciences 10 (21), 7800 2020
    Citations: 40

  • On vulnerability and security log analysis: A systematic literature review on recent trends
    J Svacina, J Raffety, C Woodahl, B Stone, T Cerny, M Bures, D Shin, ...
    Proceedings of the International Conference on Research in Adaptive and 2020
    Citations: 38

  • Aspect-oriented challenges in system integration with microservices, SOA and IoT
    T Cerny
    Enterprise Information Systems 13 (4), 467-489 2019
    Citations: 38

  • On security level usage in context-aware role-based access control
    M Trnka, T Cerny
    Proceedings of the 31st Annual ACM Symposium on Applied Computing, 1192-1195 2016
    Citations: 38

  • Competitive and Collaborative Approach Towards a More Effective Education in Computer Science
    T Cerny, B Mannova
    CONTEMPORARY EDUCATIONAL TECHNOLOGY 2 (2), 163-173 2011
    Citations: 34

  • Systematic Review of Authentication and Authorization Advancements for the Internet of Things
    M Trnka, AS Abdelfattah, A Shrestha, M Coffey, T Cerny
    Sensors 22 (4) 2022
    Citations: 27

  • Identity management of devices in internet of things environment
    M Trnka, T Cerny
    2016 6th international conference on it convergence and security (ICITCS), 1-4 2016
    Citations: 27

  • On distributed concern delivery in user interface design
    T Cerny, M Macik, MJ Donahoo, J Janousek
    Computer Science and Information Systems 12 (2), 655-681 2015
    Citations: 26

  • Towards effective adaptive user interfaces design
    T Cerny, MJ Donahoo, E Song
    Proceedings of the 2013 Research in Adaptive and Convergent Systems, 373-380 2013
    Citations: 25

  • Prioritized Process Test: More Efficiency in Testing of Business Processes and Workflows
    M Bures, T Cerny, M Klima
    International Conference on Information Science and Applications, 585-593 2017
    Citations: 24