A review of microservices autoscaling with formal verification perspective
SNA Jawaddi, MH Johari… - Software: Practice and …, 2022 - Wiley Online Library
The process of scaling microservices is a challenging task, especially in maintaining
optimum resource provisioning while respecting QoS constraints and SLA. Many research …
optimum resource provisioning while respecting QoS constraints and SLA. Many research …
5G multi-access edge computing: A survey on security, dependability, and performance
The Fifth Generation (5G) of mobile networks offers new and advanced services with stricter
requirements. Multi-access Edge Computing (MEC) is a key technology that enables these …
requirements. Multi-access Edge Computing (MEC) is a key technology that enables these …
Health monitoring and diagnosis for geo-distributed edge ecosystem in smart city
With the increasing number of Internet of Things (IoT) devices being deployed and used in
daily life, the load on computational devices has grown exponentially. This situation is more …
daily life, the load on computational devices has grown exponentially. This situation is more …
SHIELD: A secure heuristic integrated environment for load distribution in rural-AI
The increasing adoption of edge computing in rural areas is leading to a substantial rise in
data generation, necessitating the need for development of advanced load balancing …
data generation, necessitating the need for development of advanced load balancing …
A blockchain-based privacy sensitive data acquisition scheme during pandemic through the facilitation of federated learning
New diseases (eg, monkeypox) are showing up and taking the form of a pandemic within a
short time. Early detection can assist in reducing the spread. However, because of privacy …
short time. Early detection can assist in reducing the spread. However, because of privacy …
On applicability of imagery-based CNN to computational offloading location selection
The progress in computational offloading is heavily pushing the development of the modern
Information and Communications Technology domain. The growth in resource-constrained …
Information and Communications Technology domain. The growth in resource-constrained …
A survey of faults and fault-injection techniques in edge computing systems
Edge computing has emerged in recent years to reduce latency, conserve bandwidth, and
enhance privacy for applications. As more edge computing applications are being deployed …
enhance privacy for applications. As more edge computing applications are being deployed …
Adaptive service placement for multi-access edge computing: A formal methods approach
K Ray - 2023 IEEE International Conference on Web Services …, 2023 - ieeexplore.ieee.org
Multi-Access Edge Computing (MEC) is increasingly growing in prominence as the de facto
enabler for ultra-low latency access to services. MEC averts the high network latencies often …
enabler for ultra-low latency access to services. MEC averts the high network latencies often …
Formal dependability analysis of fault tolerant Virtual Machine allocation strategies in Cloud Radio Access Network
S Younes, M Idi - Journal of Network and Computer Applications, 2024 - Elsevier
Abstract Cloud Radio Access Network (C-RAN) has been proposed as a fifth generation
(5G) cellular network that is designed to physically separate the Baseband Units (BBUs) …
(5G) cellular network that is designed to physically separate the Baseband Units (BBUs) …
Cost-Effective Edge Data Caching with Failure Tolerance and Popularity Awareness
In the mobile edge computing environment, caching data in edge storage systems can
significantly reduce data retrieval latency for users while saving the costs incurred by cloud …
significantly reduce data retrieval latency for users while saving the costs incurred by cloud …