Results 1 to 10 of about 13,956 (198)

Serverless on Machine Learning: A Systematic Mapping Study [PDF]

open access: goldIEEE Access, 2022
Machine Learning Operations (MLOps) is an approach to managing the entire lifecycle of a machine learning model. It has evolved over the last years and has started attracting many people in research and businesses in the industry.
Amine Barrak   +2 more
doaj   +2 more sources

FunDa: scalable serverless data analytics and in situ query processing [PDF]

open access: yesJournal of Big Data
The pay-what-you-use model of serverless Cloud computing (or serverless, for short) offers significant benefits to the users. This computing paradigm is ideal for short running ephemeral tasks, however, it is not suitable for stateful long running tasks,
Elyes Lounissi   +5 more
doaj   +2 more sources

FireFace: Leveraging Internal Function Features for Configuration of Functions on Serverless Edge Platforms [PDF]

open access: yesSensors, 2023
The emerging serverless computing has become a captivating paradigm for deploying cloud applications, alleviating developers’ concerns about infrastructure resource management by configuring necessary parameters such as latency and memory constraints ...
Ming Li   +4 more
doaj   +2 more sources

Serverless Computing: Current Trends and Open Problems [PDF]

open access: green, 2017
Serverless computing has emerged as a new compelling paradigm for the deployment of applications and services. It represents an evolution of cloud programming models, abstractions, and platforms, and is a testament to the maturity and wide adoption of ...
Baldini, Ioana   +10 more
core   +2 more sources

Energy-Aware Duty Cycle Management for Solar-Powered IoT Devices [PDF]

open access: yesSensors
IoT devices with sensors and actuators are frequently deployed in environments without access to the power grid. These devices are battery powered and might make use of energy harvesting if battery lifetime is too limited.
Michael Gerndt   +3 more
doaj   +2 more sources

Democratising high performance computing for bioinformatics through serverless cloud computing: A case study on CRISPR-Cas9 guide RNA design with Crackling Cloud. [PDF]

open access: yesPLoS Computational Biology
Organisations are challenged when meeting the computational requirements of large-scale bioinformatics analyses using their own resources. Cloud computing has democratised large-scale resources, and to reduce the barriers of working with large-scale ...
Jacob Bradford   +7 more
doaj   +2 more sources

Heuristically enhanced multi-head attention based recurrent neural network for denial of wallet attacks detection on serverless computing environment [PDF]

open access: yesScientific Reports
Denial of Wallet (DoW) attacks are a cyber threat designed to utilize and deplete an organization’s financial resources by generating excessive prices or charges in their cloud computing (CC) and serverless computing platforms.
Sarah A. Alzakari   +7 more
doaj   +2 more sources

Generation of a dataset for DoW attack detection in serverless architectures [PDF]

open access: yesData in Brief
Denial of Wallet (DoW) attacks refers to a type of cyberattack that aims to exploit and exhaust the financial resources of an organization by triggering excessive costs or charges within their cloud or serverless computing environment.
José Manuel Ortega Candel   +2 more
doaj   +2 more sources

Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications [PDF]

open access: yesScientific Reports
Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments.
Amal K. Alkhalifa   +7 more
doaj   +2 more sources

Serverless computing: a security perspective

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
In this article we review the current serverless architectures, abstract and categorize their founding principles, and provide an in-depth security analysis.
Eduard Marin   +2 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy