Mobility aware blockchain enabled offloading and scheduling in vehicular fog cloud computing

A Lakhan, M Ahmad, M Bilal, A Jolfaei… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The development of vehicular Internet of Things (IoT) applications, such as E-Transport,
Augmented Reality, and Virtual Reality are growing progressively. The mobility aware …

Cost-efficient mobility offloading and task scheduling for microservices IoVT applications in container-based fog cloud network

A Lakhan, MS Memon, Q Mastoi, M Elhoseny… - Cluster …, 2022 - Springer
These days, the usage of the internet of Vehicle Things (IVoT) applications such as E-
Business, E-Train, E-Ambulance has been growing progressively. These applications …

Method for continuous integration and deployment using a pipeline generator for agile software projects

IC Donca, OP Stan, M Misaros, D Gota, L Miclea - Sensors, 2022 - mdpi.com
Lately, the software development industry is going through a slow but real transformation.
Software is increasingly a part of everything, and, software developers, are trying to cope …

{DC-Store}: Eliminating noisy neighbor containers using deterministic {I/O} performance and resource isolation

M Kwon, D Gouk, C Lee, B Kim, J Hwang… - 18th USENIX Conference …, 2020 - usenix.org
We propose DC-store, a storage framework that offers deterministic I/O performance for a
multi-container execution environment. DC-store's hardware-level design implements …

Community detection in attributed networks considering both structural and attribute similarities: two mathematical programming approaches

E Alinezhad, B Teimourpour, MM Sepehri… - Neural Computing and …, 2020 - Springer
Community detection is one of the most well-known and emerging research topics in the
area of social network analysis. There are a wide variety of approaches to find communities …

Pipeline-Generated Continuous Integration and Deployment Method For Agile Software Development

AK Bhardwaj, S Rangineni - Authorea Preprints, 2023 - techrxiv.org
PIPELINE-GENERATED CONTINUOUS INTEGRATION AND DEPLOYMENT METHOD
FOR AGILE SOFTWARE DEVELOPMENT Page 1 P osted on 24 Jul 2020 — CC-BY 4.0 …

PocketCTF: a fully featured approach for hosting portable attack and defense cybersecurity exercises

S Karagiannis, C Ntantogian, E Magkos, LL Ribeiro… - Information, 2021 - mdpi.com
Capture the flag (CTF) challenges are broadly used for engaging trainees in the technical
aspects of cybersecurity, maintaining hands-on lab exercises, and integrating gamification …

Wave height statistical characteristic analysis

G Liu, B Chen, L Wang, S Zhang, K Zhang… - Journal of oceanology and …, 2019 - Springer
When exploring the temporal and spatial change law of ocean environment, the most
common method used is using smaller-scale observed data to derive the change law for a …

Cost-efficient scheduling algorithms based on beetle antennae search for containerized applications in Kubernetes clouds

H Li, J Shen, L Zheng, Y Cui, Z Mao - The Journal of Supercomputing, 2023 - Springer
With the development of cloud-native technologies, Kubernetes becomes the standard of
fact for container scheduling. Kubernetes provides service discovery and scheduling of …

An optimal image storage strategy for container-based edge computing in smart factory

L Yin, J Luo, K Li - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Edge computing provides efficient and low-latency computing services for Internet of Things
applications. Container virtualization technology is widely used as an indispensable key …