Results 41 to 50 of about 13,830 (202)
Security Hardening and Compliance Assessment of Kubernetes Control Plane and Workloads
Containerized applications are pivotal to contemporary cloud-native architectures, yet they present novel security challenges. Kubernetes, a prevalent open-source platform for container orchestration, provides robust automation but lacks inherent ...
Zlatan Morić +2 more
doaj +1 more source
Traffic-Aware Horizontal Pod Autoscaler in Kubernetes-Based Edge Computing Infrastructure
Container-based Internet of Things (IoT) applications in an edge computing environment require autoscaling to dynamically adapt to fluctuations in IoT device requests.
Le Hoang Phuc, Linh-An Phan, Taehong Kim
doaj +1 more source
Scalable System Scheduling for HPC and Big Data
In the rapidly expanding field of parallel processing, job schedulers are the "operating systems" of modern big data architectures and supercomputing systems.
Arcand, William +10 more
core +1 more source
ECLYPSE: A Python Framework for Simulation and Emulation of the Cloud‐Edge Continuum
ABSTRACT The Cloud‐Edge continuum enhances application performance by bringing computation closer to data sources. However, it presents considerable challenges in managing resources and determining application service placement, as these tasks require analyzing diverse, dynamic environments characterized by fluctuating network conditions.
Jacopo Massa +5 more
wiley +1 more source
PVA: The Persistent Volume Autoscaler for Stateful Applications in Kubernetes
With the evolution of container technology, there has been increasing interest in the operation of stateful applications in cloud environments. Kubernetes supports the management and scaling of stateful applications using features, such as StatefulSets ...
Ji-Hyun Na +6 more
doaj +1 more source
Phishing URL Detection and Interpretability With Machine Learning: A Cross‐Dataset Approach
ABSTRACT Phishing attacks pose a significant security threat, particularly through deceptive emails designed to trick users into clicking on malicious links, with phishing URLs often serving as the primary indicator of such attacks. This paper presents a machine learning approach for detecting phishing email attacks by analyzing the URLs embedded ...
Liyan Yi +2 more
wiley +1 more source
Intelligent Parking Service Integration for Dynamic Urban Areas
• Parking has become a major issue, leading to traffic congestion, environmental pollution and wasted time in urban areas, especially in developing countries. • This work proposes a comprehensive intelligent parking service framework that incorporates edge–cloud data architecture, business process modelling and predictive analytics embedded within ...
Quang Tran Minh +3 more
wiley +1 more source
On-Demand Virtual Research Environments using Microservices
The computational demands for scientific applications are continuously increasing. The emergence of cloud computing has enabled on-demand resource allocation.
Capuccini, Marco +7 more
core +1 more source
Formal Verification for Preventing Misconfigured Access Policies in Kubernetes Clusters
Kubernetes clusters now underpin the bulk of modern production workloads, recent 2024 Cloud Native Computing Foundation surveys report >96% enterprise adoption, stretching from 5G edge nodes and AI/ML pipelines to heavily-regulated fintech and ...
Aditya Sissodiya +3 more
doaj +1 more source
Architecture of the higher vocational English knowledge graph. ABSTRACT Aiming at the problem of insufficient individualization and dynamic demand in higher vocational English learning, this paper proposes a dynamic learning path recommendation method based on real‐time knowledge graph updates.
Fengna Zhang, Xinxin Li
wiley +1 more source

