Folgen
Amjad Ullah
Titel
Zitiert von
Zitiert von
Jahr
Micado-edge: Towards an application-level orchestrator for the cloud-to-edge computing continuum
A Ullah, H Dagdeviren, RC Ariyattu, J DesLauriers, T Kiss, J Bowden
Journal of Grid Computing 19 (4), 47, 2021
602021
A control theoretical view of cloud elasticity: taxonomy, survey and challenges
A Ullah, J Li, Y Shen, A Hussain
Cluster Computing 21, 1735-1764, 2018
512018
Cloud apps to‐go: Cloud portability with TOSCA and MiCADO
J DesLauriers, T Kiss, RC Ariyattu, HV Dang, A Ullah, J Bowden, ...
Concurrency and Computation: Practice and Experience 33 (19), e6093, 2021
252021
Orchestration in the Cloud-to-Things compute continuum: taxonomy, survey and future directions
A Ullah, T Kiss, J Kovács, F Tusa, J Deslauriers, H Dagdeviren, R Arjun, ...
Journal of Cloud Computing 12 (1), 135, 2023
242023
(f) unctional sifting: A privacy-preserving reputation system through multi-input functional encryption
A Bakas, A Michalas, A Ullah
Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event …, 2021
162021
Genetic optimization of fuzzy membership functions for cloud resource provisioning
A Ullah, J Li, A Hussain, Y Shen
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016
102016
Towards a biologically inspired soft switching approach for cloud resource provisioning
A Ullah, J Li, A Hussain, E Yang
Cognitive Computation 8, 992-1005, 2016
92016
Toward a reference architecture based science gateway framework with embedded e‐learning support
G Pierantoni, T Kiss, A Bolotov, D Kagialis, J DesLauriers, A Ullah, ...
Concurrency and Computation: Practice and Experience 35 (18), e6872, 2023
82023
Attribute-based symmetric searchable encryption
HV Dang, A Ullah, A Bakas, A Michalas
Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite …, 2020
52020
Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach
A Ullah, J Li, A Hussain
International Journal of High Performance Computing and Networking 12 (1), 13-25, 2018
42018
Swarmchestrate: Towards a Fully Decentralised Framework for Orchestrating Applications in the Cloud-to-Edge Continuum
T Kiss, A Ullah, G Terstyanszky, O Kao, S Becker, Y Verginadis, ...
International Conference on Advanced Information Networking and Applications …, 2024
32024
Footsteps in the fog: Certificateless fog-based access control
E Frimpong, A Michalas, A Ullah
Computers & Security 121, 102866, 2022
32022
Design and evaluation of a biologically-inspired cloud elasticity framework
A Ullah, J Li, A Hussain
Cluster Computing 23, 3095-3117, 2020
22020
Towards a novel biologically-inspired cloud elasticity framework
A Ullah
University of Stirling, 2017
22017
Image Encryption Using A Novel Orbital-Extraction Permutation Technique and Chaotic Key Generation
S Khan, S Ullah, J Ahmad, A Ullah, A Arshad, MS Khan
2024 IEEE 7th International Conference on Advanced Technologies, Signal and …, 2024
12024
Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology
MS Khan, J Ahmad, A Al-Dubai, N Pitropakis, B Ghaleb, A Ullah, MA Khan, ...
IEEE Transactions on Consumer Electronics, 2024
12024
YASF: A Vendor-Agnostic Framework for Serverless Computing
M Giacomini, A Ullah
Scitepress Digital Library, 2023
12023
Automated generation of deployment descriptors for managing microservices-based applications in the cloud to edge continuum
J DesLauriers, J Kovacs, T Kiss, A Stork, SP Serna, A Ullah
Future Generation Computer Systems 166, 107628, 2025
2025
Towards cloud-based and federated A-Synchronous Speech enhancement using Deep Neuro-fuzzy Models: Review, Challenges & Future Directions
RU Amin, M Gogate, K Dashtipour, A Hussain, T Arslan, A Ullah, F Doctor, ...
Proc. AVSEC 2024, 79-81, 2024
2024
Attribute-Based Symmetric Searchable Encryption
H Van Dang, A Ullah, A Bakas, A Michalas
Applied Cryptography and Network Security Workshops, 2020
2020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20