Results 41 to 50 of about 13,988 (200)

PVA: The Persistent Volume Autoscaler for Stateful Applications in Kubernetes

open access: yesIEEE Access
With the evolution of container technology, there has been increasing interest in the operation of stateful applications in cloud environments. Kubernetes supports the management and scaling of stateful applications using features, such as StatefulSets ...
Ji-Hyun Na   +6 more
doaj   +1 more source

Zeus: Improving Resource Efficiency via Workload Colocation for Massive Kubernetes Clusters

open access: yesIEEE Access, 2021
With the popularity of container-based microservices and cloud-native architectures, Kubernetes has established itself as the de facto standard for container orchestration.
Xiaolong Zhang   +4 more
doaj   +1 more source

MolViewStories: Interactive molecular storytelling

open access: yesProtein Science, Volume 35, Issue 4, April 2026.
Abstract Effectively communicating knowledge related to molecular structures and their associated data remains a challenge, as traditional static figures limit interactivity and professional visualization tools often require substantial expertise. MolViewStories addresses these limitations by providing an open‐source, web‐based platform for creating ...
Terézia Slanináková   +13 more
wiley   +1 more source

On-Demand Virtual Research Environments using Microservices

open access: yes, 2019
The computational demands for scientific applications are continuously increasing. The emergence of cloud computing has enabled on-demand resource allocation.
Capuccini, Marco   +7 more
core   +1 more source

ECLYPSE: A Python Framework for Simulation and Emulation of the Cloud‐Edge Continuum

open access: yesJournal of Software: Evolution and Process, Volume 38, Issue 1, January 2026.
ABSTRACT The Cloud‐Edge continuum enhances application performance by bringing computation closer to data sources. However, it presents considerable challenges in managing resources and determining application service placement, as these tasks require analyzing diverse, dynamic environments characterized by fluctuating network conditions.
Jacopo Massa   +5 more
wiley   +1 more source

Scalable System Scheduling for HPC and Big Data

open access: yes, 2017
In the rapidly expanding field of parallel processing, job schedulers are the "operating systems" of modern big data architectures and supercomputing systems.
Arcand, William   +10 more
core   +1 more source

Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi   +2 more
wiley   +1 more source

Formal Verification for Preventing Misconfigured Access Policies in Kubernetes Clusters

open access: yesIEEE Access
Kubernetes clusters now underpin the bulk of modern production workloads, recent 2024 Cloud Native Computing Foundation surveys report >96% enterprise adoption, stretching from 5G edge nodes and AI/ML pipelines to heavily-regulated fintech and ...
Aditya Sissodiya   +3 more
doaj   +1 more source

Traffic-Aware Horizontal Pod Autoscaler in Kubernetes-Based Edge Computing Infrastructure

open access: yesIEEE Access, 2022
Container-based Internet of Things (IoT) applications in an edge computing environment require autoscaling to dynamically adapt to fluctuations in IoT device requests.
Le Hoang Phuc, Linh-An Phan, Taehong Kim
doaj   +1 more source

Enhancing Rail Transit Safety: Edge Computing‐Based Driver State Monitoring System

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This article presents an edge computing‐based driver state monitoring system designed to enhance rail transit safety by analyzing real‐time data on driver identity, posture, and behavior. Leveraging facial recognition and AI‐driven detection methods, the system integrates edge and cloud computing to promptly identify unsafe conditions, enabling ...
Yiqing Liu   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy