PVA: The Persistent Volume Autoscaler for Stateful Applications in Kubernetes
With the evolution of container technology, there has been increasing interest in the operation of stateful applications in cloud environments. Kubernetes supports the management and scaling of stateful applications using features, such as StatefulSets ...
Ji-Hyun Na +6 more
doaj +1 more source
Zeus: Improving Resource Efficiency via Workload Colocation for Massive Kubernetes Clusters
With the popularity of container-based microservices and cloud-native architectures, Kubernetes has established itself as the de facto standard for container orchestration.
Xiaolong Zhang +4 more
doaj +1 more source
MolViewStories: Interactive molecular storytelling
Abstract Effectively communicating knowledge related to molecular structures and their associated data remains a challenge, as traditional static figures limit interactivity and professional visualization tools often require substantial expertise. MolViewStories addresses these limitations by providing an open‐source, web‐based platform for creating ...
Terézia Slanináková +13 more
wiley +1 more source
On-Demand Virtual Research Environments using Microservices
The computational demands for scientific applications are continuously increasing. The emergence of cloud computing has enabled on-demand resource allocation.
Capuccini, Marco +7 more
core +1 more source
ECLYPSE: A Python Framework for Simulation and Emulation of the Cloud‐Edge Continuum
ABSTRACT The Cloud‐Edge continuum enhances application performance by bringing computation closer to data sources. However, it presents considerable challenges in managing resources and determining application service placement, as these tasks require analyzing diverse, dynamic environments characterized by fluctuating network conditions.
Jacopo Massa +5 more
wiley +1 more source
Scalable System Scheduling for HPC and Big Data
In the rapidly expanding field of parallel processing, job schedulers are the "operating systems" of modern big data architectures and supercomputing systems.
Arcand, William +10 more
core +1 more source
Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi +2 more
wiley +1 more source
Formal Verification for Preventing Misconfigured Access Policies in Kubernetes Clusters
Kubernetes clusters now underpin the bulk of modern production workloads, recent 2024 Cloud Native Computing Foundation surveys report >96% enterprise adoption, stretching from 5G edge nodes and AI/ML pipelines to heavily-regulated fintech and ...
Aditya Sissodiya +3 more
doaj +1 more source
Traffic-Aware Horizontal Pod Autoscaler in Kubernetes-Based Edge Computing Infrastructure
Container-based Internet of Things (IoT) applications in an edge computing environment require autoscaling to dynamically adapt to fluctuations in IoT device requests.
Le Hoang Phuc, Linh-An Phan, Taehong Kim
doaj +1 more source
Enhancing Rail Transit Safety: Edge Computing‐Based Driver State Monitoring System
This article presents an edge computing‐based driver state monitoring system designed to enhance rail transit safety by analyzing real‐time data on driver identity, posture, and behavior. Leveraging facial recognition and AI‐driven detection methods, the system integrates edge and cloud computing to promptly identify unsafe conditions, enabling ...
Yiqing Liu +7 more
wiley +1 more source

