Bridging machine learning and computer network research: a survey

Y Cheng, J Geng, Y Wang, J Li, D Li, J Wu - CCF Transactions on …, 2019 - Springer
With the booming development of artificial intelligence (AI), a series of relevant applications
are emerging and promoting an all-rounded reform of the industry. As the major technology …

On the resource management of kubernetes

E Kim, K Lee, C Yoo - 2021 international conference on …, 2021 - ieeexplore.ieee.org
Kubernetes is the most popular container orchestration platform that enables users to create
and run multiple containers in cloud environments. Kubernetes offers resource management …

Coope4m: A deployment framework for communication-intensive applications on mesos

A Di Stefano, A Di Stefano, G Morana… - 2018 IEEE 27th …, 2018 - ieeexplore.ieee.org
In recent years, the widespread use of container technologies has significantly altered the
interactions between cloud service providers and their customers when developing and …

Graph-based quantitative description of networks' slices isolation

Z Kotulski, TW Nowak, M Sepczuk… - … on Computer Science …, 2018 - ieeexplore.ieee.org
5G networks are expected to be a set of slices which are virtual subnets designed for
specific applications. A crucial requirement for providing proper functioning of the network …

Performance guarantee aware orchestration for service function chains with elastic demands

T Wen, H Yu, X Du - … and Software Defined Networks (NFV-SDN …, 2017 - ieeexplore.ieee.org
In this paper, we study how to provide optimal performance guarantee in multi-resource
scenarios, such as Network Function Virtualization (NFV), where Virtual Network Function …

Scheduling communication-intensive applications on mesos

AD Stefano, AD Stefano… - International Journal of …, 2020 - inderscienceonline.com
In recent years, the widespread use of container technologies has significantly altered the
interactions between cloud service providers and their customers when developing and …

Quantifying the isolation characteristics in container environments

C Zhao, Y Wu, Z Ren, W Shi, Y Ren, J Wan - Network and Parallel …, 2017 - Springer
In recent years, container technologies have attracted intensive attention due to the features
of light-weight and easy-portability. The performance isolation between containers is …

CNTC: A container aware network traffic control framework

L Gu, J Guan, S Wu, H Jin, J Rao, K Suo… - Green, Pervasive, and …, 2019 - Springer
As a lightweight virtualization technology, containers are attracting much attention and
widely deployed in the cloud data centers. To provide consistent and reliable performance …

Kernel-Based Container File Access Control Architecture to Protect Important Application Information

HK Lee, SH Han, D Lee - Electronics, 2022 - mdpi.com
Container platforms ease the deployment of applications and respond to failures. The
advantages of container platforms have promoted their use in information services …

Further refinements to the foundations of cyber zone defense

R Mitchell, E Walkup - MILCOM 2017-2017 IEEE Military …, 2017 - ieeexplore.ieee.org
Sophisticated cyber attacks by state-sponsored and criminal actors continue to plague
government and industrial infrastructure. Intuitively, partitioning cyber systems into …