|
|
|
Daniel Spiekermann and Jörg Keller
While network forensics has matured over the decades and even made progress in the last 10 years when deployed in virtual networks, network forensics in fog and edge computing is still not progressed to that level despite the now widespread use of these ...
ver más
|
|
|
|
|
|
Igor Kabashkin
With the evolution towards the interconnected future internet spanning satellites, aerial systems, terrestrial infrastructure, and oceanic networks, availability modeling becomes imperative to ensure reliable service. This paper presents a methodology to...
ver más
|
|
|
|
|
|
Vasilios Patsias, Petros Amanatidis, Dimitris Karampatzakis, Thomas Lagkas, Kalliopi Michalakopoulou and Alexandros Nikitas
Task allocation in edge computing refers to the process of distributing tasks among the various nodes in an edge computing network. The main challenges in task allocation include determining the optimal location for each task based on the requirements su...
ver más
|
|
|
|
|
|
Eddy Truyen, Hongjie Xie and Wouter Joosen
Kubernetes (K8s) defines standardized APIs for container-based cluster orchestration such that it becomes possible for application managers to deploy their applications in a portable and interopable manner. However, a practical problem arises when the sa...
ver más
|
|
|
|
|
|
Yousef-Awwad Daraghmi, Mamoun Abu Helou, Eman-Yasser Daraghmi and Waheeb Abu-ulbeh
The violation traffic laws by driving at high speeds, the overloading of passengers, and the unfastening of seatbelts are of high risk and can be fatal in the event of any accident. Several systems have been proposed to improve passenger safety, and the ...
ver más
|
|
|