Results 21 to 30 of about 635,439 (298)
When is a container a comonad? [PDF]
Abbott, Altenkirch, Ghani and others have taught us that many parameterized datatypes (set functors) can be usefully analyzed via container representations in terms of a set of shapes and a set of positions in each shape.
Ahman, Danel +2 more
core +2 more sources
Issues of developer interaction with Kubernetes-based cloud infrastructures in test environments
Background. The object of the study is the issues that arise during the interaction of developers with cloud infrastructures. The subject of the research is methods for ensuring their correct operation with Kubernetes in test environments.
D.S. Fomin +3 more
doaj +1 more source
Molded Pulp Products for Sustainable Packaging: Production Rate Challenges and Product Opportunities
Molded cellulosic pulp products provide eco-friendly alternatives to various petroleum-based packaging systems. They have a long history of reliable usage for such applications as egg trays and the shipping of fruits.
Mrittika Debnath +3 more
doaj +1 more source
The ad-hoc proliferation of high-security biological labs must be controlled, and should be tied in more closely to broader research and public-health goals.
openaire +5 more sources
‘You have to keep your head on your shoulders’: A systems psychodynamic perspective on women leaders
Background:Women leaders within Higher Education Institutions (HEIs) in South Africa have increased in numbers over the past years and they have changed the dynamics in these institutions.
Claude-Helene Mayer +3 more
doaj +1 more source
Toward Smart Moving Target Defense for Linux Container Resiliency
This paper presents ESCAPE, an informed moving target defense mechanism for cloud containers. ESCAPE models the interaction between attackers and their target containers as a "predator searching for a prey" search game. Live migration of Linux-containers
Abed, Amr S. +3 more
core +1 more source
Correct Code Containing Containers [PDF]
For critical software development, containers such as lists, vectors, sets or maps are an attractive alternative to ad-hoc data structures based on pointers. As standards like DO-178C put formal verification and testing on an equal footing, it is important to give users the ability to apply both to the verification of code using containers.
Dross, Claire +2 more
openaire +2 more sources
Nowadays, building infrastructures are pushed to become smarter in response to desires for the environmental comforts of living. Enhanced safety upgrades have begun taking advantage of new, evolving technologies.
Eric Hitimana +4 more
doaj +1 more source
Trace-Driven Scaling of Microservice Applications
The containerized microservices architecture is being increasingly used to build complex applications. To minimize operating costs, service providers typically rely on an auto-scaler to “right size” their infrastructure amid fluctuating ...
Vahid Mirzaebrahim Mostofi +3 more
doaj +1 more source
ABSTRACT Background Pediatric patients with extracranial solid tumors (ST) receiving chemotherapy are at an increased risk for Pneumocystis jirovecii pneumonia (PJP). However, evidence guiding prophylaxis practices in this population is limited. A PJP‐related fatality at our institution highlighted inconsistent prescribing approaches and concerns about
Kriti Kumar +8 more
wiley +1 more source

