|
|
|
Rafael Moreno-Vozmediano, Rubén S. Montero, Eduardo Huedo and Ignacio M. Llorente
The adoption of edge infrastructure in 5G environments stands out as a transformative technology aimed at meeting the increasing demands of latency-sensitive and data-intensive applications. This research paper presents a comprehensive study on the intel...
ver más
|
|
|
|
|
|
|
Alaa Albtoush, Farizah Yunus, Khaled Almi?ani and Noor Maizura Mohamad Noor
Scientific workflows consist of numerous tasks subject to constraints on data dependency. Effective workflow scheduling is perpetually necessary to efficiently utilize the provided resources to minimize workflow execution cost and time (makespan). Accord...
ver más
|
|
|
|
|
|
|
Mallu Shiva Rama Krishna and Sudheer Mangalampalli
Task scheduling poses a wide variety of challenges in the cloud computing paradigm, as heterogeneous tasks from a variety of resources come onto cloud platforms. The most important challenge in this paradigm is to avoid single points of failure, as tasks...
ver más
|
|
|
|
|
|
|
Prathamesh Lahande, Parag Kaveri and Jatinderkumar Saini
Cloud computing delivers robust computational services by processing tasks on its virtual machines (VMs) using resource-scheduling algorithms. The cloud?s existing algorithms provide limited results due to inappropriate resource scheduling. Additionally,...
ver más
|
|
|
|
|
|
|
Kyungwoon Lee, Jeongsu Kim, Ik-Hyeon Kwon, Hyunchan Park and Cheol-Ho Hong
Containers enable high performance and easy deployment due to their lightweight architecture, thus facilitating resource utilization in edge computing nodes. Secure container runtimes have attracted significant attention because of the necessity for over...
ver más
|
|
|
|
|
|
|
Guillermo Hauke and Jorge Lanzarote
This paper compares two strategies to compute buoyancy-driven flows using stabilized methods. Both formulations are based on a unified approach for solving compressible and incompressible flows, which solves the continuity, momentum, and total energy equ...
ver más
|
|
|
|
|
|
|
Haruna Umar Adoga and Dimitrios P. Pezaros
Network slicing has become a fundamental property for next-generation networks, especially because an inherent part of 5G standardisation is the ability for service providers to migrate some or all of their network services to a virtual network infrastru...
ver más
|
|
|
|
|
|
|
Abdulrahman K. Alnaim
Network Function Virtualization (NFV) is a virtual network model, the goal of which is a cost-efficient transition of the hardware infrastructure into a flexible and reliable software platform. However, this transition comes at the cost of more security ...
ver más
|
|
|
|
|
|
|
Jianchuan Ye, Jiang Wang and Peijian Lv
This paper studies the quadcopter?s mutual interference phenomenon. The flow field of the quadcopter at different flight speeds is simulated by solving the three-dimensional unsteady Reynolds averaged Navier-Stokes equations with sliding mesh methods. ?V...
ver más
|
|
|
|
|
|
|
Huseyn Huseynov, Tarek Saadawi and Kenichi Kourai
The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual l...
ver más
|
|
|
|