Results 61 to 70 of about 20,635 (205)

Automated Microservices Identification Through Business Process Analysis: A Semantic-Driven Clustering Approach

open access: yesIEEE Access
The rise of microservice architectures has further evolved software development practices, building upon the foundation established by web services in breaking down monolithic systems, while offering more finely detailed, coherent, and loosely ...
Idris Oumoussa, Rajaa Saidi
doaj   +1 more source

ECLYPSE: A Python Framework for Simulation and Emulation of the Cloud‐Edge Continuum

open access: yesJournal of Software: Evolution and Process, Volume 38, Issue 1, January 2026.
ABSTRACT The Cloud‐Edge continuum enhances application performance by bringing computation closer to data sources. However, it presents considerable challenges in managing resources and determining application service placement, as these tasks require analyzing diverse, dynamic environments characterized by fluctuating network conditions.
Jacopo Massa   +5 more
wiley   +1 more source

Cohesion Metrics for Microservices

open access: yesIEEE Access
Software development requires new technologies, such as service-oriented architectures, that resolve quality problems such as maintenance and costs, which promote improvements in software development.
C. Rojas-Perez Juan   +2 more
doaj   +1 more source

Project Templating and Onboarding With Cookiecutter: Foundations, Uses, and Guidelines

open access: yesSoftware: Practice and Experience, Volume 56, Issue 1, Page 42-63, January 2026.
ABSTRACT Objectives Cookiecutter is a popular, mature open‐source Python library for automating the creation of customized projects from templates. This kind of scaffolding is useful for enabling reuse, encapsulating expertise, achieve uniformity, and facilitating project creation for a range of languages and domains, including microservices, web ...
Juergen Dingel   +5 more
wiley   +1 more source

Containerized Microservices Orchestration and Provisioning in Cloud Computing: A Conceptual Framework and Future Perspectives

open access: yesApplied Sciences, 2022
Cloud computing is a rapidly growing paradigm which has evolved from having a monolithic to microservices architecture. The importance of cloud data centers has expanded dramatically in the previous decade, and they are now regarded as the backbone of ...
Abdul Saboor   +6 more
doaj   +1 more source

Digital‐Twin‐Enabled, Time‐Aware Anomaly Detection for Industrial Cyber‐Physical Systems

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The graphical abstract (Graphical Abstract figure) summarises the proposed pipeline: multivariate ICS data streams are windowed and normalised, fed into a temporal LSTM–DNN encoder and per‐sensor operating‐envelope learner, combined via calibrated fusion and finally surfaced through an operator‐facing digital twin that provides event timelines, top ...
Wulfran Fendzi Mbasso   +5 more
wiley   +1 more source

Intrusion Tolerance Scheduling Algorithm for Microservice Workflow Based on Deep Reinforcement Learning [PDF]

open access: yesJisuanji kexue
With the rapid development of microservices and container technology,applications executed in the cloud can be completed by multiple microservices with dependencies.However,microservices for container clouds face many security threats due to shared ...
LI Yuanbo, HU Hongchao, YANG Xiaohan, GUO Wei, LIU Wenyan
doaj   +1 more source

Design of a Digital Twin System for Deepwater Installation Systems

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
A digital twin‐based system is proposed to enhance the safety and efficiency of deepwater subsea installation by enabling real‐time monitoring, predictive analysis and intelligent decision‐making. The system integrates simulation, sensing and VR interaction to support planning and operations in complex offshore environments.
Song Chen   +6 more
wiley   +1 more source

Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 27-28, 25 December 2025.
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley   +1 more source

A Microservices Model to Enhance the Availability of Data for Building Energy Efficiency Management Services

open access: yesEnergies, 2019
In the Internet of Things (IoT)-supported energy data management infrastructure, objects from various energy generation and consumption terminals in buildings produce a tremendous amount of data. However, this data is not useful unless it is available on-
Muhammad Aslam Jarwar   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy