Results 11 to 20 of about 641,939 (299)

Containerized Architecture Performance Analysis for IoT Framework Based on Enhanced Fire Prevention Case Study: Rwanda

open access: yesSensors, 2022
Nowadays, building infrastructures are pushed to become smarter in response to desires for the environmental comforts of living. Enhanced safety upgrades have begun taking advantage of new, evolving technologies.
Eric Hitimana   +4 more
doaj   +1 more source

When is a container a comonad? [PDF]

open access: yes, 2014
Abbott, Altenkirch, Ghani and others have taught us that many parameterized datatypes (set functors) can be usefully analyzed via container representations in terms of a set of shapes and a set of positions in each shape.
Ahman, Danel   +2 more
core   +2 more sources

Trace-Driven Scaling of Microservice Applications

open access: yesIEEE Access, 2023
The containerized microservices architecture is being increasingly used to build complex applications. To minimize operating costs, service providers typically rely on an auto-scaler to “right size” their infrastructure amid fluctuating ...
Vahid Mirzaebrahim Mostofi   +3 more
doaj   +1 more source

Directed Containers as Categories [PDF]

open access: yes, 2016
Directed containers make explicit the additional structure of those containers whose set functor interpretation carries a comonad structure. The data and laws of a directed container resemble those of a monoid, while the data and laws of a directed ...
Ahman, Danel, Uustalu, Tarmo
core   +2 more sources

Modeling and Characterizing Service Interference in Dynamic Infrastructures

open access: yesIEEE Access, 2023
Performance interference can occur when various services are executed over the same physical infrastructure in a cloud system. This can lead to performance degradation compared to the execution of services in isolation.
Victor Medel   +4 more
doaj   +1 more source

Sealed containers in Z [PDF]

open access: yes, 2014
Physical means of securing information, such as sealed envelopes and scratch cards, can be used to achieve cryptographic objectives. Reasoning about this has so far been informal.
C. Morgan   +7 more
core   +1 more source

Megalos: A Scalable Architecture for the Virtualization of Large Network Scenarios

open access: yesFuture Internet, 2021
We introduce an open-source, scalable, and distributed architecture, called Megalos, that supports the implementation of virtual network scenarios consisting of virtual devices (VDs) where each VD may have several Layer 2 interfaces assigned to virtual ...
Mariano Scazzariello   +3 more
doaj   +1 more source

Cloud-Native Architectures: Transforming Enterprise IT Operations [PDF]

open access: yesIranian Journal of Information Processing & Management
Background: The cloud-native architectures have reinvented the original strategies of the companies’ IT infrastructure approach and became popular due to the concepts of modularity, scalability, and resilience.
Lara Mwafaq   +4 more
doaj   +1 more source

CANNING FOOD IN SEMI-RIGID POLYMERIC AND COMPOSITE CONTAINERS

open access: yesHarčova Nauka ì Tehnologìâ, 2020
For thermal preservation of food, various types of retail polymeric packaging can be used: rigid, semi-rigid, flexible, and other kinds of containers. To make polymeric (plastic) containers usable for thermal sterilisation, and to ensure long storage of ...
Ya Verkhivker, Ye Miroshnychenko
doaj   +1 more source

A Comparative Analysis of High Availability for Linux Container Infrastructures

open access: yesFuture Internet, 2023
In the current era of prevailing information technology, the requirement for high availability and reliability of various types of services is critical. This paper focusses on the comparison and analysis of different high-availability solutions for Linux
Marek Šimon   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy