Cause-effect graphs (CEGs) are usually applied for black-box testing of complex industrial systems. The specification process is time-consuming and can result in many errors. In this work, machine learning methods wer...
详细信息
It is well-known that Information Security Risk Management (ISRM) activities can be challenging to perform and that tool support could provide support in different ways, for example, by automating tasks, guiding the u...
详细信息
The importance of accurate flood forecasting is rising as climate change makes it more difficult to predict when and where floods will occur. Flood predictions use supervised machine learning models, and flood levels ...
详细信息
Kubernetes,a container orchestrator for cloud-deployed applications,allows the application provider to scale automatically to match thefluctuating intensity of processing *** cluster technology is used to encapsulate,...
详细信息
Kubernetes,a container orchestrator for cloud-deployed applications,allows the application provider to scale automatically to match thefluctuating intensity of processing *** cluster technology is used to encapsulate,isolate,and deploy applications,addressing the issue of low system reliability due to interlocking ***-based platforms usually entail users define application resource supplies for eco container *** is a constant problem of over-service in data centers for cloud service *** operating costs and incompetent resource utilization can occur in a waste of *** revolutionized the orchestration of the container in the cloud-native *** can adaptively manage resources and schedule containers,which provide real-time status of the cluster at runtime without the user’s *** clusters face unpredictable traffic,and the cluster performs manual expansion configuration by the *** to operational delays,the system will become unstable,and the service will be *** work proposed an RBACS that vigorously amended the distribution of containers operating in the entire Kubernetes *** allocation pattern is analyzed with the Kubernetes *** estimate the overall cost of RBACS,we use several scientific benchmarks comparing the accomplishment of container to remote node migration and on-site *** experiments ran on the simulations to show the method’s effectiveness yielded high precision in the real-time deployment of resources in eco *** to the default baseline,Kubernetes results in much fewer dropped requests with only slightly more supplied resources.
Collusive Interest Flooding Attack (CIFA) is a denial of service (DoS) attack in Named Data Networking (NDN) networks. Using a fake server, this attack develops the Interest Flooding Attack (IFA) attack. The attacker ...
详细信息
Uncertainty estimation is an important task for critical problems, such as robotics and autonomous driving, because it allows creating statistically better perception models and signaling the model's certainty in ...
详细信息
The cybersecurity landscape is increasingly challenged by the growing digital footprint and the sophistication of cyber threats, necessitating experts to stay updated and extract actionable insights from a deluge of C...
详细信息
The Internet of Things (IoT) involves complex, interconnected systems and devices that depend on context-sharing platforms for interoperability and information exchange. These platforms are, therefore, critical compon...
详细信息
Speech processing, the field of analysing input speech signals and methods of processing them has emerged in the recent days. Additionally, the development of a speech processing system involves several components in ...
详细信息
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis...
详细信息
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the existing literature on offshore outsourcing deals with the outsourcing of software development *** frameworks have been developed focusing on guiding software systemmanagers concerning offshore software ***,none of these studies delivered comprehensive guidelines for managing the whole process of *** is a considerable lack of research working on managing OSMO from a vendor’s ***,to find the best practices for managing an OSMO process,it is necessary to further investigate such complex and multifaceted phenomena from the vendor’s *** study validated the preliminary OSMO process model via a case study research *** results showed that the OSMO process model is applicable in an industrial setting with few *** industrial data collected during the case study enabled this paper to extend the preliminary OSMO process *** refined version of the OSMO processmodel has four major phases including(i)Project Assessment,(ii)SLA(iii)Execution,and(iv)Risk.
暂无评论