Challenges in integration of heterogeneous internet of things
Internet of Things (IoT) is considered the upcoming industrial and academic revolution in the
technological world having billions of things and devices connected to the Internet. These …
technological world having billions of things and devices connected to the Internet. These …
Cloud topology and orchestration using TOSCA: A systematic literature review
J Bellendorf, ZÁ Mann - Service-Oriented and Cloud Computing: 7th IFIP …, 2018 - Springer
Abstract Topology and Orchestration Specification for Cloud Applications (TOSCA) is a
standard for specifying the topology of cloud applications, their deployment on cloud …
standard for specifying the topology of cloud applications, their deployment on cloud …
Modeling and automated deployment of serverless applications using tosca
The serverless computing paradigm brings multiple benefits to application developers who
are interested in consuming computing resources as services without the need to manage …
are interested in consuming computing resources as services without the need to manage …
Modeling different deployment variants of a composite application in a single declarative deployment model
For automating the deployment of composite applications, typically, declarative deployment
models are used. Depending on the context, the deployment of an application has to fulfill …
models are used. Depending on the context, the deployment of an application has to fulfill …
Specification of cloud topologies and orchestration using TOSCA: a survey
J Bellendorf, ZÁ Mann - Computing, 2020 - Springer
Abstract Topology and Orchestration Specification for Cloud Applications (TOSCA) is an
OASIS standard for specifying the topology of cloud applications, their deployment on …
OASIS standard for specifying the topology of cloud applications, their deployment on …
Modeling and automated execution of application deployment tests
In recent years, many deployment systems have been developed that process deployment
models to automatically provision applications. The main objective of these systems is to …
models to automatically provision applications. The main objective of these systems is to …
Semantic clone detection: Can source code comments help?
A Ghosh, SK Kuttal - … on Visual Languages and Human-Centric …, 2018 - ieeexplore.ieee.org
Programmers reuse code to increase their productivity, which leads to large fragments of
duplicate or near-duplicate code in the code base. The current code clone detection …
duplicate or near-duplicate code in the code base. The current code clone detection …
Application threat modeling and automated VNF selection for mitigation using TOSCA
K Saatkamp, C Krieger, F Leymann… - 2019 International …, 2019 - ieeexplore.ieee.org
In the era of Internet of Things (IoT) the interconnectedness of devices, and thus the need to
protect them against threats increased. The widely used threat modeling method STRIDE …
protect them against threats increased. The widely used threat modeling method STRIDE …
Adversarial generation of defensive trajectories in basketball games
In this paper, we present a method to generate realistic trajectories of defensive players in a
basketball game based on the ball and the offensive team's movements. We train on the …
basketball game based on the ball and the offensive team's movements. We train on the …
[PDF][PDF] Original Research Article Heterogeneity issues in IoT-driven devices and services
ABSTRACT Internet of Things (IoT), which connects billions of devices and services to the
Internet, is viewed as the future industrial and intellectual revolution in technology. These …
Internet, is viewed as the future industrial and intellectual revolution in technology. These …