Micado-edge: Towards an application-level orchestrator for the cloud-to-edge computing continuum A Ullah, H Dagdeviren, RC Ariyattu, J DesLauriers, T Kiss, J Bowden Journal of Grid Computing 19 (4), 47, 2021 | 49 | 2021 |
A control theoretical view of cloud elasticity: taxonomy, survey and challenges A Ullah, J Li, Y Shen, A Hussain Cluster Computing 21, 1735-1764, 2018 | 49 | 2018 |
Cloud apps to‐go: Cloud portability with TOSCA and MiCADO J DesLauriers, T Kiss, RC Ariyattu, HV Dang, A Ullah, J Bowden, ... Concurrency and Computation: Practice and Experience 33 (19), e6093, 2021 | 22 | 2021 |
(f) unctional sifting: A privacy-preserving reputation system through multi-input functional encryption A Bakas, A Michalas, A Ullah Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event …, 2021 | 15 | 2021 |
Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions A Ullah, T Kiss, J Kovács, F Tusa, J Deslauriers, H Dagdeviren, R Arjun, ... Journal of Cloud Computing 12 (1), 135, 2023 | 10 | 2023 |
Genetic optimization of fuzzy membership functions for cloud resource provisioning A Ullah, J Li, A Hussain, Y Shen 2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016 | 9 | 2016 |
Towards a biologically inspired soft switching approach for cloud resource provisioning A Ullah, J Li, A Hussain, E Yang Cognitive Computation 8, 992-1005, 2016 | 9 | 2016 |
Toward a reference architecture based science gateway framework with embedded e‐learning support G Pierantoni, T Kiss, A Bolotov, D Kagialis, J DesLauriers, A Ullah, ... Concurrency and Computation: Practice and Experience 35 (18), e6872, 2023 | 6 | 2023 |
Attribute-based symmetric searchable encryption HV Dang, A Ullah, A Bakas, A Michalas Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite …, 2020 | 4 | 2020 |
Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach A Ullah, J Li, A Hussain International Journal of High Performance Computing and Networking 12 (1), 13-25, 2018 | 4 | 2018 |
Footsteps in the fog: Certificateless fog-based access control E Frimpong, A Michalas, A Ullah Computers & Security 121, 102866, 2022 | 3 | 2022 |
Design and evaluation of a biologically-inspired cloud elasticity framework A Ullah, J Li, A Hussain Cluster Computing 23, 3095-3117, 2020 | 2 | 2020 |
Towards a novel biologically-inspired cloud elasticity framework A Ullah University of Stirling, 2017 | 2 | 2017 |
YASF: A Vendor-Agnostic Framework for Serverless Computing M Giacomini, A Ullah Scitepress Digital Library, 2023 | 1 | 2023 |
Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology MS Khan, J Ahmad, A Al-Dubai, N Pitropakis, B Ghaleb, A Ullah, MA Khan, ... IEEE Transactions on Consumer Electronics, 2024 | | 2024 |
Swarmchestrate: Towards a Fully Decentralised Framework for Orchestrating Applications in the Cloud-to-Edge Continuum T Kiss, A Ullah, G Terstyanszky, O Kao, S Becker, Y Verginadis, ... International Conference on Advanced Information Networking and Applications …, 2024 | | 2024 |
Attribute-Based Symmetric Searchable Encryption H Van Dang, A Ullah, A Bakas, A Michalas Applied Cryptography and Network Security Workshops, 2020 | | 2020 |
Towards workload-aware fine-grained control over cloud resources: student research abstract A Ullah Proceedings of the 31st Annual ACM Symposium on Applied Computing, 488-489, 2016 | | 2016 |
Survival vs. revenue: modelling and reasoning on population dynamics (WIP). A Bracciali, G Caravagna, A Ullah SpringSim (TMS-DEVS), 29, 2013 | | 2013 |
Survival vs. revenue: modelling and reasoning on population dynamics G Caravagna, A Bracciali, A Ullah SIMULATION SERIES 45 (4), 204-209, 2013 | | 2013 |