Cloud storage tier optimization through storage object classification
Cloud storage adoption has increased over the years given the high demand for fast processing, low access latency, and ever-increasing amount of data being generated by, e.g., Internet of Things applications. In order to meet the users’ demands ...
XL: explainable lead generation with microservices and hypothetical answers
Multi-objective cuckoo optimizer for task scheduling to balance workload in cloud computing
A cloud load balancer should be proficient to modify it’s approach to handle the various task kinds and the dynamic environment. In order to prevent situations where computing resources are excess or underutilized, an efficient task scheduling ...
Edge-driven Docker registry: facilitating XR application deployment
- Antonios Makris,
- Evangelos Psomakelis,
- Ioannis Korontanis,
- Theodoros Theodoropoulos,
- Ioannis Kontopoulos,
- Maria Pateraki,
- Christos Diou,
- Konstantinos Tserpes
In recent years, containerization is becoming more and more popular for deploying applications and services and it has significantly contributed to the expansion of edge computing. The demand for effective and scalable container image management, ...
High-performance microservice differentiated domain communication technology
Microservice architecture splits the traditional monolithic application into different small services. Differences in programming language and data structure make communication between each service difficult, and the communication performance ...
A new approach for service activation management in fog computing using Cat Swarm Optimization algorithm
Today, with the increasing expansion of IoT devices and the growing number of user requests, processing their demands in computational environments has become increasingly challenging.The large volume of user requests and the appropriate ...
Analysis of strategies for scalable transaction creation in blockchains
The growing popularity of blockchains highlights the need to improve their scalability. While previous research has focused on scaling transaction processing, the scalability of transaction creation remains unexplored. This issue is particularly ...
Business process discovery as a service with event log privacy and access control over discovered models
- Hector A. de la Fuente-Anaya,
- Heidy M. Marin-Castro,
- Miguel Morales-Sandoval,
- Jose Juan Garcia-Hernandez
The information systems supporting business processes of organizations generate and collect a large number of records in event logs that are exploitable in process mining tasks (discovery, conformance and enhancement). Under a Big Data scenario, ...
Performance evaluation of an oracle-based interoperability for permissioned blockchain
Blockchain interoperability has become an essential requirement for the advancement of blockchain technology in numerous fields. Enterprise organizations are increasingly utilizing permissioned blockchains to manage and store their organizations’ ...
VNF placement in NFV-enabled networks: considering time-varying workloads and multi-tenancy with a throughput optimization heuristic
Through the integration of Network Function Virtualization (NFV), Software-Defined Networks, cloud service providers can realize cost reduction, performance enhancement, and support for advanced application scenarios. Within this framework, ...
Automatic video captioning using tree hierarchical deep convolutional neural network and ASRNN-bi-directional LSTM
The development of automatic video understanding technology is highly needed due to the rise of mass video data, like surveillance videos, personal video data. Several methods have been presented previously for automatic video captioning. But, the ...
Community detection in multiplex continous weighted nodes networks using an extension of the stochastic block model
The stochastic block model (SBM) is a probabilistic model aimed at clustering individuals within a simple network based on their social behavior. This network consists of individuals and edges representing the presence or absence of relationships ...
Data and resource aware incremental ML training in support of pervasive applications
Nowadays, the use of Artificial Intelligence (AI) and Machine Learning (ML) algorithms is increasingly affecting the performance of innovative systems. At the same time, the advent of the Internet of Things (IoT) and the Edge Computing (EC) as ...
A survey on the cold start latency approaches in serverless computing: an optimization-based perspective
Serverless computing is one of the latest technologies that has received much attention from researchers and companies in recent years since it provides dynamic scalability and a clear economic model. Serverless computing enables users to pay only ...
Energy-aware and trust-based cluster head selection in healthcare WBANs with enhanced GWO optimization
This paper describes a comprehensive methodology for improving Wireless Body Area Networks (WBANs) in healthcare systems using Enhanced Gray Wolf Optimization (GWO). The methodology begins with WBAN initialization and the configuration of critical ...