Results 41 to 50 of about 890,462 (337)
THE METHOD OF HYPERGRAPH CONTAINERS [PDF]
In this survey we describe a recently-developed technique for bounding the number (and controlling the typical structure) of finite objects with forbidden substructures.
J. Balogh, R. Morris, Wojciech Samotij
semanticscholar +1 more source
Trace-Driven Scaling of Microservice Applications
The containerized microservices architecture is being increasingly used to build complex applications. To minimize operating costs, service providers typically rely on an auto-scaler to “right size” their infrastructure amid fluctuating ...
Vahid Mirzaebrahim Mostofi +3 more
doaj +1 more source
On the Relation between Outdated Docker Containers, Severity Vulnerabilities, and Bugs [PDF]
Packaging software into containers is becoming a common practice when deploying services in cloud and other environments. Docker images are one of the most popular container technologies for building and deploying containers.
Ahmed Zerouali +3 more
semanticscholar +1 more source
Communication and Language Profiles of Children Treated for Posterior Fossa Brain Tumors
ABSTRACT Background Cognitive and language deficits are frequently reported sequelae of posterior fossa brain tumors (PFBT). Typically, delayed onset impedes prompt assessment and early intervention. This has devastating implications for quality of life.
Zara Sved +4 more
wiley +1 more source
Modeling and Characterizing Service Interference in Dynamic Infrastructures
Performance interference can occur when various services are executed over the same physical infrastructure in a cloud system. This can lead to performance degradation compared to the execution of services in isolation.
Victor Medel +4 more
doaj +1 more source
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski +59 more
wiley +1 more source
Megalos: A Scalable Architecture for the Virtualization of Large Network Scenarios
We introduce an open-source, scalable, and distributed architecture, called Megalos, that supports the implementation of virtual network scenarios consisting of virtual devices (VDs) where each VD may have several Layer 2 interfaces assigned to virtual ...
Mariano Scazzariello +3 more
doaj +1 more source
Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers
In this paper, we present the results of using bags of system calls for learning the behavior of Linux containers for use in anomaly-detection based intrusion detection system.
Abed, Amr S. +2 more
core +1 more source
ABSTRACT Introduction Characterizing stressful events reported by childhood cancer survivors experienced throughout the lifespan may help improve trauma‐informed care relevant to the survivor experience. Methods Participants included 2552 survivors (54% female; 34 years of age) and 469 community controls (62% female; 33 years of age) from the St.
Megan E. Ware +13 more
wiley +1 more source
Evaluation and monitoring of vegetation in urban areas is used for the management of natural resources and urban planning. This information has become more important than ever due to climate change.
Martín Pizano-Moreno +2 more
doaj +1 more source

