Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleJune 2024
The MORPHEMIC Project on the Data Intensive E-Brain Science Case Study
ACM SIGAda Ada Letters (SIGADA), Volume 43, Issue 2December 2023, Pages 73–77https://doi.org/10.1145/3672359.3672371The MORPHEMIC project covers several features from modelling cross-cloud applications, continuous and autonomous optimization and deployment and providing access to several cloud capabilities for data intensive application needing on one hand more and ...
- research-articleMay 2024
Intelligent Monitoring Framework for Cloud Services: A Data-Driven Approach
ICSE-SEIP '24: Proceedings of the 46th International Conference on Software Engineering: Software Engineering in PracticeApril 2024, Pages 381–391https://doi.org/10.1145/3639477.3639753Cloud service owners need to continuously monitor their services to ensure high availability and reliability. Gaps in monitoring can lead to delay in incident detection and significant negative customer impact. Current process of monitor creation is ad-...
- research-articleJuly 2024
An architectural view of VANETs cloud: its models, services, applications and challenges
International Journal of Web and Grid Services (IJWGS), Volume 20, Issue 32024, Pages 292–341https://doi.org/10.1504/ijwgs.2024.139779This research explores vehicular ad hoc networks (VANETs) and their extensive applications, such as enhancing traffic efficiency, infotainment, and passenger safety. Despite significant study, widespread deployment of VANETs has been hindered by security ...
- research-articleJuly 2024
Design and application of a new massive open online training platform
International Journal of Business Intelligence and Data Mining (IJBIDM), Volume 25, Issue 12024, Pages 52–64https://doi.org/10.1504/ijbidm.2024.139431Over the past decade, e-learning has been a tremendous success. Many MOOCs have been established around the world. A mounting number of college students study through MOOCs. But with the rapid development of cloud computing, big data and artificial ...
- ArticleMarch 2024
Predictive Auto-scaling: LSTM-Based Multi-step Cloud Workload Prediction
Service-Oriented Computing – ICSOC 2023 WorkshopsNov 2023, Pages 5–16https://doi.org/10.1007/978-981-97-0989-2_1AbstractAuto-scaling, also known as elasticity, provides the capacity to efficiently allocate computing resources on demand, rendering it beneficial for a wide array of applications, particularly web-based ones. However, the dynamic and unpredictable ...
-
- research-articleJune 2023
Compliance Checking of Cloud Providers: Design and Implementation
Distributed Ledger Technologies: Research and Practice (DLT), Volume 2, Issue 2Article No.: 13, Pages 1–20https://doi.org/10.1145/3585538The recognition of capabilities supplied by cloud systems is presently growing. Collecting or sharing healthcare data and sensitive information especially during the Covid-19 pandemic has motivated organizations and enterprises to leverage the upsides ...
- articleApril 2023
MORPHEMIC - Optimization of the Deployment and Life-cycle Management of Data-intensive Applications in the Cloud Computing Continuum
ACM SIGAda Ada Letters (SIGADA), Volume 42, Issue 2December 2022, Pages 104–108https://doi.org/10.1145/3591335.3591350In their Cloud strategy companies are choosing more and more multi-cloud computing giving them the opportunity to distribute its assets, redundancies, software, applications, and anything it deems worthy not only on one Cloud-hosting environment, but ...
- posterJune 2023
AI Enabled Cloud Service to detect Conversion Fraud in E-commerce
SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied ComputingMarch 2023, Pages 45–48https://doi.org/10.1145/3555776.3577831Digital advertising has become very crucial in E-commerce. Artificial display requests or clicks created by malicious codes, bot-nets, and click-firms, pose a significant threat to the advertising ecosystem. Conversion fraud done by attackers directly ...
- research-articleJanuary 2022
Analysis of modern cloud services to ensure cybersecurity
- Yevhenii Pedchenko,
- Yevheniia Ivanchenko,
- Ihor Ivanchenko,
- Iryna Lozova,
- Daniel Jancarczyk,
- Pawel Sawicki
Procedia Computer Science (PROCS), Volume 207, Issue C2022, Pages 110–117https://doi.org/10.1016/j.procs.2022.09.043AbstractThis article describes the use of cloud services. The analysis of the most popular cloud services and comparison of their basic functionality is carried out. Examples of practical application of cloud services among well-known companies around the ...
- research-articleOctober 2021
A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications
ACM Transactions on Internet Technology (TOIT), Volume 22, Issue 2Article No.: 47, Pages 1–17https://doi.org/10.1145/3430508Cloud services provide decentralized and pervasive access for resources to reduce the complex infrastructure requirements of the user. In decentralized service access, the implication of security is tedious to match the user requirements. Therefore, cloud ...
- research-articleOctober 2021
IoT-based Cloud Service for Secured Android Markets using PDG-based Deep Learning Classification
ACM Transactions on Internet Technology (TOIT), Volume 22, Issue 2Article No.: 40, Pages 1–17https://doi.org/10.1145/3418206Software piracy is an act of illegal stealing and distributing commercial software either for revenue or identify theft. Pirated applications on Android app stores are harming developers and their users by clone scammers. The scammers usually generate ...
- research-articleJuly 2021
MIDAS-OWL: An Ontology for Interoperability between Data and Service Cloud Layers
SBSI '21: Proceedings of the XVII Brazilian Symposium on Information SystemsJune 2021, Article No.: 20, Pages 1–8https://doi.org/10.1145/3466933.3466953As different cloud computing services have emerged over the years, the diversity of technologies and the lack of standardization has given rise to an interoperability problem in cloud computing. Cloud computing services include those such as Software ...
- research-articleFebruary 2021
Information Reuse and Stochastic Search: Managing Uncertainty in Self-* Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS), Volume 15, Issue 1Article No.: 3, Pages 1–36https://doi.org/10.1145/3440119Many software systems operate in environments of change and uncertainty. Techniques for self-adaptation allow these systems to automatically respond to environmental changes, yet they do not handle changes to the adaptive system itself, such as the ...
- research-articleJanuary 2021
A model-based approach for multi-level privacy policies derivation for cloud services
International Journal of Security and Networks (IJSN), Volume 16, Issue 12021, Pages 12–27https://doi.org/10.1504/ijsn.2021.112836To benefit from the advantages offered by the cloud services, a data owner must move his private data to external servers to be accessed and handled by unknown parties. This brings about several concerns such as lack of user control, data leakage, ...
- research-articleMarch 2021
A Load Balancing Algorithm for 5G Vehicular Cloud Computing Systems
PCI '20: Proceedings of the 24th Pan-Hellenic Conference on InformaticsNovember 2020, Pages 241–244https://doi.org/10.1145/3437120.34373165G Vehicular Cloud Computing (5G-VCC) infrastructures are evolving rapidly. In a 5G-VCC system, Cloud resources should be efficiently distributed to provide satisfactory Quality of Service (QoS) for modern services with increased requirements. ...
- research-articleOctober 2020
Congestion‐aware adaptive decentralised computation offloading and caching for multi‐access edge computing networks
IET Communications (CMU2), Volume 14, Issue 19Pages 3410–3419https://doi.org/10.1049/iet-com.2020.0630Multi‐access edge computing (MEC) has attracted much more attention to revolutionising smart communication technologies and Internet of Everything. Nowadays, smart end‐user devices are designed to execute sophisticated applications that demand more ...
- short-paperMarch 2021
Design and delivery of cloud computing syllabus for computing undergraduates
CSERC '20: Proceedings of the 9th Computer Science Education Research ConferenceOctober 2020, Article No.: 12, Pages 1–3https://doi.org/10.1145/3442481.3442508Cloud computing is a highly disruptive paradigm transforming the way we interact with technologies. Cloud platforms and services have become the predominant choice for any real-world storage and computation intensive applications such as Internet of ...
- extended-abstractFebruary 2021
Cloudless Skies? Decentralizing Mobile Interaction
MobileHCI '20: 22nd International Conference on Human-Computer Interaction with Mobile Devices and ServicesOctober 2020, Article No.: 48, Pages 1–3https://doi.org/10.1145/3406324.3424598Mobile interaction is now almost exclusively dependent on an intransparent cloud infrastructure beyond the users’ control, resulting in multiple issues related to security, privacy, and availability. While alternative approaches based on decentralized ...
- research-articleSeptember 2020
Fast Consistency Auditing for Massive Industrial Data in Untrusted Cloud Services
GLSVLSI '20: Proceedings of the 2020 on Great Lakes Symposium on VLSISeptember 2020, Pages 381–386https://doi.org/10.1145/3386263.3407598Cloud service is an essential technique to provide product traceability for industrial systems by providing data integration and sharing services. However, a malicious or corrupted cloud service may prevent industrial participants from acquiring ...
- research-articleSeptember 2020
DeCaf: diagnosing and triaging performance issues in large-scale cloud services
ICSE-SEIP '20: Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: Software Engineering in PracticeJune 2020, Pages 201–210https://doi.org/10.1145/3377813.3381353Large scale cloud services use Key Performance Indicators (KPIs) for tracking and monitoring performance. They usually have Service Level Objectives (SLOs) baked into the customer agreements which are tied to these KPIs. Dependency failures, code bugs, ...