Challenges in integration of heterogeneous internet of things

M Noaman, MS Khan, MF Abrar, S Ali… - Scientific …, 2022 - Wiley Online Library
Internet of Things (IoT) is considered the upcoming industrial and academic revolution in the
technological world having billions of things and devices connected to the Internet. These …

Cloud topology and orchestration using TOSCA: A systematic literature review

J Bellendorf, ZÁ Mann - Service-Oriented and Cloud Computing: 7th IFIP …, 2018 - Springer
Abstract Topology and Orchestration Specification for Cloud Applications (TOSCA) is a
standard for specifying the topology of cloud applications, their deployment on cloud …

Modeling and automated deployment of serverless applications using tosca

M Wurster, U Breitenbücher, K Képes… - 2018 IEEE 11th …, 2018 - ieeexplore.ieee.org
The serverless computing paradigm brings multiple benefits to application developers who
are interested in consuming computing resources as services without the need to manage …

Modeling different deployment variants of a composite application in a single declarative deployment model

M Stötzner, S Becker, U Breitenbücher, K Képes… - Algorithms, 2022 - mdpi.com
For automating the deployment of composite applications, typically, declarative deployment
models are used. Depending on the context, the deployment of an application has to fulfill …

Specification of cloud topologies and orchestration using TOSCA: a survey

J Bellendorf, ZÁ Mann - Computing, 2020 - Springer
Abstract Topology and Orchestration Specification for Cloud Applications (TOSCA) is an
OASIS standard for specifying the topology of cloud applications, their deployment on …

Modeling and automated execution of application deployment tests

M Wurster, U Breitenbücher, O Kopp… - 2018 IEEE 22nd …, 2018 - ieeexplore.ieee.org
In recent years, many deployment systems have been developed that process deployment
models to automatically provision applications. The main objective of these systems is to …

Eine Methode zum Verteilen, Adaptieren und Deployment partnerübergreifender Anwendungen

K Wild - 2022 - elib.uni-stuttgart.de
Ein wesentlicher Aspekt einer effektiven Kollaboration innerhalb von Organisationen, aber
vor allem organisationsübergreifend, ist die Integration und Automatisierung der Prozesse …

Semantic clone detection: Can source code comments help?

A Ghosh, SK Kuttal - … on Visual Languages and Human-Centric …, 2018 - ieeexplore.ieee.org
Programmers reuse code to increase their productivity, which leads to large fragments of
duplicate or near-duplicate code in the code base. The current code clone detection …

Application threat modeling and automated VNF selection for mitigation using TOSCA

K Saatkamp, C Krieger, F Leymann… - 2019 International …, 2019 - ieeexplore.ieee.org
In the era of Internet of Things (IoT) the interconnectedness of devices, and thus the need to
protect them against threats increased. The widely used threat modeling method STRIDE …

Adversarial generation of defensive trajectories in basketball games

CY Chen, W Lai, HY Hsieh, YS Wang… - … on Multimedia & …, 2018 - ieeexplore.ieee.org
In this paper, we present a method to generate realistic trajectories of defensive players in a
basketball game based on the ball and the offensive team's movements. We train on the …