A review of microservices autoscaling with formal verification perspective

SNA Jawaddi, MH Johari… - Software: Practice and …, 2022 - Wiley Online Library
The process of scaling microservices is a challenging task, especially in maintaining
optimum resource provisioning while respecting QoS constraints and SLA. Many research …

5G multi-access edge computing: A survey on security, dependability, and performance

G Nencioni, RG Garroppo, RF Olimid - IEEE Access, 2023 - ieeexplore.ieee.org
The Fifth Generation (5G) of mobile networks offers new and advanced services with stricter
requirements. Multi-access Edge Computing (MEC) is a key technology that enables these …

Health monitoring and diagnosis for geo-distributed edge ecosystem in smart city

W Wen, U Demirbaga, A Singh, A **dal… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
With the increasing number of Internet of Things (IoT) devices being deployed and used in
daily life, the load on computational devices has grown exponentially. This situation is more …

SHIELD: A secure heuristic integrated environment for load distribution in rural-AI

A Kaushal, O Almurshed, O Almoghamis… - Future Generation …, 2024 - Elsevier
The increasing adoption of edge computing in rural areas is leading to a substantial rise in
data generation, necessitating the need for development of advanced load balancing …

A blockchain-based privacy sensitive data acquisition scheme during pandemic through the facilitation of federated learning

A Islam, SY Shin - 2022 13th international conference on …, 2022 - ieeexplore.ieee.org
New diseases (eg, monkeypox) are showing up and taking the form of a pandemic within a
short time. Early detection can assist in reducing the spread. However, because of privacy …

On applicability of imagery-based CNN to computational offloading location selection

A Ometov, A Mezina, J Nurmi - IEEE Access, 2022 - ieeexplore.ieee.org
The progress in computational offloading is heavily pushing the development of the modern
Information and Communications Technology domain. The growth in resource-constrained …

A survey of faults and fault-injection techniques in edge computing systems

M Pourreza, P Narasimhan - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Edge computing has emerged in recent years to reduce latency, conserve bandwidth, and
enhance privacy for applications. As more edge computing applications are being deployed …

Adaptive service placement for multi-access edge computing: A formal methods approach

K Ray - 2023 IEEE International Conference on Web Services …, 2023 - ieeexplore.ieee.org
Multi-Access Edge Computing (MEC) is increasingly growing in prominence as the de facto
enabler for ultra-low latency access to services. MEC averts the high network latencies often …

Formal dependability analysis of fault tolerant Virtual Machine allocation strategies in Cloud Radio Access Network

S Younes, M Idi - Journal of Network and Computer Applications, 2024 - Elsevier
Abstract Cloud Radio Access Network (C-RAN) has been proposed as a fifth generation
(5G) cellular network that is designed to physically separate the Baseband Units (BBUs) …

Cost-Effective Edge Data Caching with Failure Tolerance and Popularity Awareness

R Luo, Z Zhang, Q He, M Xu, F Chen… - IEEE Transactions …, 2025 - ieeexplore.ieee.org
In the mobile edge computing environment, caching data in edge storage systems can
significantly reduce data retrieval latency for users while saving the costs incurred by cloud …