Results 61 to 70 of about 13,988 (200)

Kubernetes application performance benchmarking on heterogeneous CPU architecture: An experimental review

open access: yesHigh-Confidence Computing
With the rapid advancement of cloud technologies, cloud services have enormously contributed to the cloud community for application development life-cycle.
Jannatun Noor   +5 more
doaj   +1 more source

A Comprehensive Survey on LLM‐Based Network Management and Operations

open access: yesInternational Journal of Network Management, Volume 35, Issue 6, November/December 2025.
ABSTRACT The growing demands for network capacity and the increasing complexities of modern network environments pose significant challenges for effective network management and operations. In response, network operators and administrators are moving beyond traditional manual and rule‐based methods, adopting advanced artificial intelligence (AI)‐driven
Jibum Hong   +2 more
wiley   +1 more source

A Method for the Quality‐Aware Automated Selection of Deployment Technologies

open access: yesSoftware: Practice and Experience, Volume 55, Issue 11, Page 1855-1876, November 2025.
ABSTRACT Domain The deployment of distributed multi‐component cloud applications typically requires a combination of multiple heterogeneous deployment technologies. A different combination of deployment technologies should be chosen due to varying deployment qualities, such as the functional suitability and reliability of the deployment technologies ...
Miles Stötzner   +7 more
wiley   +1 more source

Monitoring Keamanan Runtime pada Kubernetes Menggunakan Falco

open access: yesJournal of Internet and Software Engineering
Penggunaan Kubernetes sebagai platform manajemen kontainer telah semakin meluas dalam beberapa tahun terakhir. Seiring dengan pertumbuhan penggunaan Kubernetes, keamanan menjadi isu krusial yang perlu diperhatikan secara serius.
Ryan Fadhillah, Nur Rohman Rosyid
doaj   +1 more source

Guardians of the Network: An Ensemble Learning Framework With Adversarial Alignment for Evasive Cyber Threat Detection

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin   +2 more
wiley   +1 more source

Studying collective animal behaviour with drones and computer vision

open access: yesMethods in Ecology and Evolution, Volume 16, Issue 10, Page 2229-2259, October 2025.
Abstract Drones are increasingly popular for collecting behaviour data of group‐living animals, offering inexpensive and minimally disruptive observation methods. Imagery collected by drones can be rapidly analysed using computer vision techniques to extract information, including behaviour classification, habitat analysis and identification of ...
Jenna Kline   +9 more
wiley   +1 more source

Analisis Perbandingan Kinerja Container Network Interface Flannel dan Cilium sebagai Interface Utama pada Multus CNI dalam Jaringan Klaster Kubernetes

open access: yesJournal of Internet and Software Engineering
Container menjadi alternatif virtualisasi infrastruktur layanan internet berkat efisiensi penggunaan sumber daya. Infrastruktur IT dapat terdiri dari beragam container, dengan Kubernetes berperan sebagai Container Orchestration.
Bayu Agung Prakoso   +1 more
doaj   +1 more source

Semi‐Automated Detection of Right Whales (Eubalaena spp.) in Very High‐Resolution Satellite Imagery

open access: yesMarine Mammal Science, Volume 41, Issue 4, October 2025.
ABSTRACT Space‐based detection of whales is proliferating because it shows promise as a monitoring tool, yet tests of its application across taxa and environments are rare. The objective of this study was to develop an end‐to‐end, semi‐automated procedure for detecting two right whale species ( Eubalaena glacialis and E.
Kimberley T. A. Davies   +7 more
wiley   +1 more source

Optimizing Cloud Service Efficiency With Infrastructure-Aware Scheduling

open access: yesIEEE Access
With the rapid development of cloud-native computing technologies, containers have become an integral part of cloud infrastructure. At the same time, Kubernetes has positioned itself as a solid foundation for cloud-native orchestration platforms. However,
Chengzhi Piao, Eunsam Kim, Choonhwa Lee
doaj   +1 more source

Sistema distribuido para la ejecución controlada de código arbitrario [PDF]

open access: yes, 2017
La motivación original de este proyecto es la mitigación de riesgos en el uso de un juez virtual, que es una aplicación que facilita el envío, ejecución y evaluación de ejercicios prácticos vía Internet.
Sánchez Paredes, Jonathan   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy