Results 1 to 10 of about 7,544 (121)

Mitigating Cold Start Problem in Serverless Computing with Function Fusion [PDF]

open access: yesSensors, 2021
As Artificial Intelligence (AI) is becoming ubiquitous in many applications, serverless computing is also emerging as a building block for developing cloud-based AI services.
Seungjun Lee   +3 more
doaj   +2 more sources

Heuristically enhanced multi-head attention based recurrent neural network for denial of wallet attacks detection on serverless computing environment [PDF]

open access: yesScientific Reports
Denial of Wallet (DoW) attacks are a cyber threat designed to utilize and deplete an organization’s financial resources by generating excessive prices or charges in their cloud computing (CC) and serverless computing platforms.
Sarah A. Alzakari   +7 more
doaj   +2 more sources

Democratising high performance computing for bioinformatics through serverless cloud computing: A case study on CRISPR-Cas9 guide RNA design with Crackling Cloud. [PDF]

open access: yesPLoS Computational Biology
Organisations are challenged when meeting the computational requirements of large-scale bioinformatics analyses using their own resources. Cloud computing has democratised large-scale resources, and to reduce the barriers of working with large-scale ...
Jacob Bradford   +7 more
doaj   +2 more sources

Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications [PDF]

open access: yesScientific Reports
Denial of Wallet (DoW) attacks are one kind of cyberattack whose goal is to develop and expand the financial sources of a group by causing extreme costs in their serverless computing or cloud environments.
Amal K. Alkhalifa   +7 more
doaj   +2 more sources

FunDa: scalable serverless data analytics and in situ query processing [PDF]

open access: yesJournal of Big Data
The pay-what-you-use model of serverless Cloud computing (or serverless, for short) offers significant benefits to the users. This computing paradigm is ideal for short running ephemeral tasks, however, it is not suitable for stateful long running tasks,
Elyes Lounissi   +5 more
doaj   +2 more sources

Generation of a dataset for DoW attack detection in serverless architectures [PDF]

open access: yesData in Brief
Denial of Wallet (DoW) attacks refers to a type of cyberattack that aims to exploit and exhaust the financial resources of an organization by triggering excessive costs or charges within their cloud or serverless computing environment.
José Manuel Ortega Candel   +2 more
doaj   +2 more sources

AI edge cloud service provisioning for knowledge management smart applications [PDF]

open access: yesScientific Reports
This paper investigates a serverless edge-cloud architecture to support knowledge management processes within smart cities, which align with the goals of Society 5.0 to create human-centered, data-driven urban environments.
Antonio Maciá-Lillo   +4 more
doaj   +2 more sources

On the Analysis of Inter-Relationship between Auto-Scaling Policy and QoS of FaaS Workloads [PDF]

open access: yesSensors
A recent development in cloud computing has introduced serverless technology, enabling the convenient and flexible management of cloud-native applications.
Sara Hong   +3 more
doaj   +2 more sources

Analisis Perbandingan Serverless Computing Pada Google Cloud Platform

open access: yesJurnal Teknologi Informatika & Komputer, 2021
Serverless computing menjadi paradigma tren baru di cloud komputasi, memungkinkan pengembang untuk fokus pada aplikasi inti logika dan aplikasi prototipe cepat. Serverless computing memiliki biaya yang lebih rendah dan kenyamanan yang diberikannya kepada
Ilmi Barokah, Asriyanik Asriyanik
doaj   +1 more source

Performance Evaluation of Open-Source Serverless Platforms for Kubernetes

open access: yesAlgorithms, 2022
Serverless computing has grown massively in popularity over the last few years, and has provided developers with a way to deploy function-sized code units without having to take care of the actual servers or deal with logging, monitoring, and scaling of ...
Jonathan Decker   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy