Results 61 to 70 of about 13,830 (202)

Kubernetes application performance benchmarking on heterogeneous CPU architecture: An experimental review

open access: yesHigh-Confidence Computing
With the rapid advancement of cloud technologies, cloud services have enormously contributed to the cloud community for application development life-cycle.
Jannatun Noor   +5 more
doaj   +1 more source

Guardians of the Network: An Ensemble Learning Framework With Adversarial Alignment for Evasive Cyber Threat Detection

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin   +2 more
wiley   +1 more source

Studying collective animal behaviour with drones and computer vision

open access: yesMethods in Ecology and Evolution, Volume 16, Issue 10, Page 2229-2259, October 2025.
Abstract Drones are increasingly popular for collecting behaviour data of group‐living animals, offering inexpensive and minimally disruptive observation methods. Imagery collected by drones can be rapidly analysed using computer vision techniques to extract information, including behaviour classification, habitat analysis and identification of ...
Jenna Kline   +9 more
wiley   +1 more source

Visual Search at eBay

open access: yes, 2017
In this paper, we propose a novel end-to-end approach for scalable visual search infrastructure. We discuss the challenges we faced for a massive volatile inventory like at eBay and present our solution to overcome those.
Bubnov, Yury   +6 more
core   +1 more source

Semi‐Automated Detection of Right Whales (Eubalaena spp.) in Very High‐Resolution Satellite Imagery

open access: yesMarine Mammal Science, Volume 41, Issue 4, October 2025.
ABSTRACT Space‐based detection of whales is proliferating because it shows promise as a monitoring tool, yet tests of its application across taxa and environments are rare. The objective of this study was to develop an end‐to‐end, semi‐automated procedure for detecting two right whale species ( Eubalaena glacialis and E.
Kimberley T. A. Davies   +7 more
wiley   +1 more source

Monitoring Keamanan Runtime pada Kubernetes Menggunakan Falco

open access: yesJournal of Internet and Software Engineering
Penggunaan Kubernetes sebagai platform manajemen kontainer telah semakin meluas dalam beberapa tahun terakhir. Seiring dengan pertumbuhan penggunaan Kubernetes, keamanan menjadi isu krusial yang perlu diperhatikan secara serius.
Ryan Fadhillah, Nur Rohman Rosyid
doaj   +1 more source

Open‐source AI at scale: Establishing an enterprise AI strategy through modular frameworks

open access: yesAI Magazine, Volume 46, Issue 3, Fall 2025.
Abstract We present a comprehensive enterprise AI strategy developed within the AI Center of Excellence at Fidelity Investments, emphasizing the strategic integration of open‐source AI frameworks into scalable, modular, and reproducible enterprise‐grade solutions.
Serdar Kadıoğlu
wiley   +1 more source

Analisis Perbandingan Kinerja Container Network Interface Flannel dan Cilium sebagai Interface Utama pada Multus CNI dalam Jaringan Klaster Kubernetes

open access: yesJournal of Internet and Software Engineering
Container menjadi alternatif virtualisasi infrastruktur layanan internet berkat efisiensi penggunaan sumber daya. Infrastruktur IT dapat terdiri dari beragam container, dengan Kubernetes berperan sebagai Container Orchestration.
Bayu Agung Prakoso   +1 more
doaj   +1 more source

Clinical validation of a real‐time machine learning‐based system for the detection of acute myeloid leukemia by flow cytometry

open access: yesCytometry Part B: Clinical Cytometry, Volume 108, Issue 5, Page 392-403, September 2025.
Abstract Machine‐learning (ML) models in flow cytometry have the potential to reduce error rates, increase reproducibility, and boost the efficiency of clinical labs. While numerous ML models for flow cytometry data have been proposed, few studies have described the clinical deployment of such models.
Lauren M. Zuromski   +10 more
wiley   +1 more source

K8sidecar: A Modular Kubernetes Chain of Sidecar Proxies for Microservices and Serverless Architectures

open access: yesSoftware: Practice and Experience, Volume 55, Issue 8, Page 1305-1319, August 2025.
ABSTRACT Background Modern microservice architectures demand not only modularity, scalability, and maintainability but also adaptation to dynamic requirements. For applications deployed on Kubernetes, sidecar proxies have been used to separate the operational features (such as security, networking, or monitoring) from the application business logic by ...
Andoni Salcedo‐Navarro   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy