Search
Now showing items 11-20 of 22
Web Application Resource Requirements Estimation Based on the Workload Latent Features
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Most cloud computing platforms offer reactive resource auto-scaling mechanisms for dealing with variable traffic patterns to deliver the desired QoS properties while keeping low provisioning costs. However, a range of ...
Policy-based customisation and corrective adaptation of composite web services
(
Inderscience Publishers
, 2011 , Article)
Due to the typical long-running character of business processes, it is often desirable to be able to change a running process to respond to changes of business requirements and company policies. However, current process ...
Predictive Autoscaling of Microservices Hosted in Fog Microdata Center
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Fog computing provides microdata center (MDC) facilities closer to the users and applications, which help to overcome the application latency and response time concerns. However, guaranteeing specific service-level objectives ...
Towards automated hazard analysis for CPS security with application to CSTR system
(
Elsevier
, 2022 , Article)
Hazard analysis to identify risks due to cyber attacks is crucial to ensure cyber-physical systems' safety and correct their behavior. This study proposes a framework to analyze cyber-physical systems (CPS) risks using ...
Addressing security compatibility for multi-tenant cloud services
(
Inderscience Publishers
, 2013 , Article)
This paper addresses the issue of compatibility checking between the security requirements of service clients and the security assurances provided by multi-tenant cloud services. To allow early detection of security ...
Online cost optimization algorithms for tiered cloud storage services
(
Elsevier
, 2020 , Article)
The new generation multi-tiered cloud storage services offer various tiers, such as hot and cool tiers, which are characterized by differentiated Quality of Service (QoS) (i.e., access latency, availability and throughput) ...
Diminishing Returns and Deep Learning for Adaptive CPU Resource Allocation of Containers
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Containers provide a lightweight runtime environment for microservices applications while enabling better server utilization. Automatic optimal allocation of CPU pins to the containers serving specific workloads can help ...
Detecting deception attacks in cyber-physical linear parameter varying systems with packet loss
(
John Wiley and Sons Ltd
, 2023 , Article)
The increased connectivity of cyber-physical systems (CPS) to enterprise networks raises challenging security concerns. Detecting attacks on CPS is a vital step to improving their security. Most of the existing attack ...
Cyber LOPA: An Integrated Approach for the Design of Dependable and Secure Cyber-Physical Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Safety risk assessment is an essential process to ensure a dependable cyber-physical system (CPS) design. Traditional risk assessment considers only physical failures. For modern CPSs, failures caused by cyber attacks are ...
Canny edge detection and Hough transform for high resolution video streams using Hadoop and Spark
(
Springer
, 2020 , Article)
Nowadays, video cameras are increasingly used for surveillance, monitoring, and activity recording. These cameras generate high resolution image and video data at large scale. Processing such large scale video streams to ...