No abstract available.
Proceeding Downloads
Game-theoretic modeling of DDoS attacks in cloud computing
The benefits of cloud computing have attracted many organizations to migrate their IT infrastructures into the cloud. In an infrastructure as a service (IaaS) model, the cloud service provider offers services to multiple consumers using shared physical ...
Distributed federated service chaining for heterogeneous network environments
Future networks are expected to support cross-domain, cost-aware and fine-grained services in an efficient and flexible manner. Service Function Chaining (SFC) has been introduced as a promising approach to deliver these services. In the literature, ...
System-aware dynamic partitioning for batch and streaming workloads
When processing data streams with highly skewed and nonstationary key distributions, we often observe overloaded partitions when the hash partitioning fails to balance data correctly. To avoid slow tasks that delay the completion of the whole stage of ...
Automated detection of design patterns in declarative deployment models
In recent years, many different deployment automation technologies have been developed to automatically deploy cloud applications. Most of these technologies employ declarative deployment models to describe the deployment of a cloud application by ...
QUDOS: quorum-based cloud-edge distributed DNNs for security enhanced industry 4.0
Distributed machine learning algorithms that employ Deep Neural Networks (DNNs) are widely used in Industry 4.0 applications, such as smart manufacturing. The layers of a DNN can be mapped onto different nodes located in the cloud, edge and shop floor ...
MigSGX: a migration mechanism for containers including SGX applications
Recently, containers are widely used to process big data in clouds. To prevent information leakage from containers, applications in containers can protect sensitive information using enclaves provided by Intel SGX. The memory of enclaves is encrypted by ...
Exploring the cost and performance benefits of AWS step functions using a data processing pipeline
In traditional cloud computing, dedicated hardware is substituted by dynamically allocated, utility-oriented resources such as virtualized servers. While cloud services are following the pay-as-you-go pricing model, resources are billed based on ...
DMFE: did my function execute?
In this paper we present DMFE (did my function execute?), which is a concept capable of learning and recognizing functional-level events, states, and loads from low-level execution-data. DMFE-functions are not necessarily software functions, as in "my_...
Multi-cloud serverless function composition
Function-as-a-service (FaaS) is an emerging model based on serverless cloud computing technology. It builds on the microservice architecture, where developers implement specific functionality, deploy it to a cloud provider to be executed independently ...
Apollo: towards an efficient distributed orchestration of serverless function compositions in the cloud-edge continuum
This paper provides a first presentation of Apollo, an orchestration framework for serverless function compositions distributed across the cloud-edge continuum. Apollo has a modular design that enables a fine-grained decomposition of the runtime ...
Courier: delivering serverless functions within heterogeneous FaaS deployments
With the advent of serverless computing in different domains, there is a growing need for dynamic adaption to handle diverse and heterogeneous functions. However, serverless computing is currently limited to homogeneous Function-as-a-Service (FaaS) ...
FlyNet: a platform to support scientific workflows from the edge to the core for UAV applications
- Eric Lyons,
- Hakan Saplakoglu,
- Michael Zink,
- Komal Thareja,
- Anirban Mandal,
- Chengyi Qu,
- Songjie Wang,
- Prasad Calyam,
- George Papadimitriou,
- Ryan Tanaka,
- Ewa Deelman
Many Internet of Things (IoT) applications require compute resources that cannot be provided by the devices themselves. At the same time, processing of the data generated by IoT devices often has to be performed in real- or near real-time. Examples of ...
Accord: application-driven networking in the datacenter
- Seyed Hossein Mortazavi,
- Hossein Shafieirad,
- Mahmoud Bahnasy,
- Ali Munir,
- Yuanhui Cheng,
- Anudeep Das,
- Yashar Ganjali
Resource optimization algorithms in the cloud are ever more data-driven and decision-making has become reliant on more and more data flowing from different cloud components. Applications and the network control layer on the other hand mainly operate in ...
QoS-aware 5G component selection for content delivery in multi-access edge computing
The demand for content such as multimedia services with stringent latency requirements has proliferated significantly, posing heavy backhaul congestion in mobile networks. The integration of Multi-access Edge Computing (MEC) and 5G network is an ...
Concentrated isolation for container networks toward application-aware sandbox tailoring
Containers provide a lightweight and fine-grained isolation for computational resources such as CPUs, memory, storage, and networks, but their weak isolation raises security concerns. As a result, research and development efforts have focused on ...
Enforcing deployment latency SLA in edge infrastructures through multi-objective genetic scheduler
Edge Computing emerged as a solution to new applications, like augmented reality, natural language processing, and data aggregation that relies on requirements that the Cloud does not entirely fulfill. Given that necessity, the application deployment in ...
Amoeba: aligning stream processing operators with externally-managed state
Scalable stream processing systems (SPS) often require external storage systems for long-term storage of non-emphemeral state. Such state cannot be accommodated in the internal stores of SPSes that are mainly geared for fault tolerance of streaming jobs,...
RDS: a cloud-based metaservice for detecting data races in parallel programs
Data races are notorious concurrency bugs which can cause severe problems, including random crashes and corrupted execution results. However, existing data race detection tools are still challenging for users to use. It takes a significant amount of ...
VECTrust: trusted resource allocation in volunteer edge-cloud computing workflows
The unprecedented growth in edge resources (e.g., scientific instruments, edge servers, sensors) and related data sources has caused a data deluge in scientific application communities. The data processing is increasingly relying on algorithms that ...
Predictive auto-scaling with OpenStack Monasca
Cloud auto-scaling mechanisms are typically based on reactive automation rules that scale a cluster whenever some metric, e.g., the average CPU usage among instances, exceeds a predefined threshold. Tuning these rules becomes particularly cumbersome ...
Leveraging vCPU-utilization rates to select cost-efficient VMs for parallel workloads
The increasing use of cloud computing for parallel workloads involves, among many problems, resources wastage. When the application does not fully utilize the provisioned resource, the end-of-the-month bill is unnecessarily increased. This is mainly ...
Index Terms
- Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing