default search action
CloudCom 2023: Naples, Italy
- IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2023, Naples, Italy, December 4-6, 2023. IEEE 2023, ISBN 979-8-3503-3982-6
- Hend K. Gedawy, Khaled A. Harras, Temoor Tanveer, Thang Bui:
Bridging the Chasm Between Ideal and Realistic Federated Learning: A Measurements Study. 1-9 - Vlad-Ioan Luca, Madalina Erascu:
SAGE - A Tool for Optimal Deployments in Kubernetes Clusters. 10-17 - Alf-Andre Walla, Paal E. Engelstad:
Introducing TinyKVM for High-Performance CDN Edge Services. 18-25 - Mina Morcos, Ibrahim Matta:
Inverse Response Time Ratio Scheduler: Optimizing Throughput and Response Time for Serverless Computing. 26-33 - Chia-Chang Li, Po-Cheng Wu, Che-Rung Lee:
GSLAC: GPU Software Level Access Control for Information Isolation on Cloud Platforms. 34-41 - Roberto Beraldi, Gabriele Proietti Mattia:
A Load Balancing Algorithm For Long-Life Green Edge Systems. 42-51 - Qiushi Guo, Yifan Chen, Shisha Liao:
Enhancing Mobile Privacy and Security: A Face Skin Patch-Based Anti-Spoofing Approach. 52-57 - Guang Yang, Lorena-Alina Alexandru, Marius Storheim:
A Blockchain-based Online Trading Platform: TrustTrade. 58-62 - Yu Liu, Aitor Hernandez Herranz:
Enabling 5G QoS configuration capabilities for IoT applications on container orchestration platform. 63-68 - Raj Narendra Shah, Sameer Ahmed Mohamed, Asif Imran, Tevfik Kosar:
CloudScent: A Model for Code Smell Analysis in Open-Source Cloud. 69-75 - Rui Esteves, Håvard Moe Jacobsen, Ola Andrè Flotve:
Recommendation engine for optimal Spark delta tables partitioning. 76-81 - Qiangfeng Shen, Paul Chow:
A Lightweight Routing Layer Using a Reliable Link-Layer Protocol. 82-90 - Enrico Bravi, Diana Gratiela Berbecaru, Antonio Lioy:
A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures. 91-98 - Felipe Albuquerque Portella, Paulo J. B. Estrela, Renzo Q. Malini, Luan Teylo, Josep Lluís Berral, Lúcia M. A. Drummond:
MScheduler: Leveraging Spot Instances for High-Performance Reservoir Simulation in the Cloud. 99-106 - Kerem Çelik, Samridhi Maheshwari, Shereen ElSayed, Markus Mock, Chandra Krintz, Rich Wolski:
Depot: Dependency-Eager Platform of Transformations. 107-114 - Marlon H. Schweigert, Diego E. G. C. de Oliveira, Guilherme P. Koslovski, Maurício A. Pillon, Charles Christian Miers:
Experimental analysis of microservices architectures for hosting cloud-based Massive Multiplayer Online Role-Playing Game (MMORPG). 115-122 - David Fernández Blanco, Frédéric Le Mouël, Trista Lin, Amir Rekik:
Can Software Containerisation Fit The Car On-Board Systems ? 123-130 - Sugunakumar Arunan, Gayashan Amarasinghe, Indika Perera:
Cost-optimized scheduling for Microservices in Kubernetes. 131-138 - Marco Abbadini, Michele Beretta, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi:
Lightweight Cloud Application Sandboxing. 139-146 - Jiahe Xu, Jing Fu, Jingjin Wu, Moshe Zukerman:
Energy-Efficient Offloading in Edge Slicing with Non-Linear Power Functions. 147-154 - Joao Henrique Faes Battisti, Vitor E. Batista, Guilherme P. Koslovski, Maurício A. Pillon, Charles Christian Miers, Marco A. Marques, Marcos A. Simplício Jr., Diego Kreutz:
Performance analysis of the Raft consensus algorithm on Hyperledger Fabric and Ethereum on cloud. 155-160 - Demetris Trihinas, Moysis Symeonides, Joanna Georgiou, George Pallis, Marios D. Dikaiakos:
Energy-Aware Streaming Analytics Job Scheduling for Edge Computing. 161-168 - Gabriel P. Fernandez, Andrey Brito, Christof Fetzer:
Triad: Trusted Timestamps in Untrusted Environments. 169-176 - Georgios Fatouros, George Kousiouris, Georgios Makridis, John Soldatos, Michael Filippakis, Dimosthenis Kyriazis:
Enhanced Runtime-Adaptable Routing for Serverless Functions based on Performance and Cost Tradeoffs in Hybrid Cloud Settings. 177-184 - Siqi Zhang, Minjie Cai, Mengyuan Zhang, Lianying Zhao, Xavier de Carné de Carnavalet:
The Flaw Within: Identifying CVSS Score Discrepancies in the NVD. 185-192 - Di Mo, Robert Cordingly, Donald Chinn, Wes Lloyd:
Addressing Serverless Computing Vendor Lock-In through Cloud Service Abstraction. 193-199 - Muhammad Anjum Malik, Tobias Pleuger, Stephan Recker:
Peer-to-Peer Approach for Edge Computing Services. 200-207 - Marta Catillo, Antonio Pecchia, Umberto Villano:
Traditional vs Federated Learning with Deep Autoencoders: a Study in IoT Intrusion Detection. 208-215 - Biagio Boi, Christian Esposito:
Decentralized Authentication in Microservice Architectures with SSI and DID in Blockchain. 216-223 - Fabrizio Messina, Miriana Russo, Corrado Santoro, Federico Fausto Santoro, Salvatore Riccobene:
PuppetStack: A tool for building high-availability private cloud infrastructures. 224-231 - Gennaro Pio Rimoli, Daniele Granata, Massimo Ficco:
Semi-Automatic PenTest Methodology based on Threat-Model: The IoT Brick Case Study. 232-237 - Jinwei Liu, Rui Gong, Wei Dai, Wei Zheng, Ying Mao, Wei Zhou, Feng Deng:
HCoop: A Cooperative and Hybrid Resource Scheduling for Heterogeneous Jobs in Clouds. 238-245 - Provakar Mondal, Eli Tilevich:
Undoing CRDT Operations Automatically. 246-251 - Bala Subramanyan, Arne Hollum, Giovanni Mazzeo, Matthew Ficke, Darshan Vaydia:
Enabling Trusted TEE-as-a-Service Models with Privacy Preserving Automatons. 252-260 - Lamees M. Al Qassem, Thanos Stouraitis, Ernesto Damiani, Ibrahim Abe M. Elfadel:
OSμS: An Open-Source Microservice Prototyping Platform. 261-268 - Valeria Valdés, Ana Rosa Cavalli, Fatiha Zaïdi, Wissam Mallouli:
Testing techniques to assess impact and cascading effects. 269-272 - Mario Barbareschi, Valentina Casola, Daniele Lombardi:
Ensuring End-to-End Security in Computing Continuum Exploiting Physical Unclonable Functions. 273-278 - Md. Mahbubul Islam, Tanwir Ahmad, Dragos Truscan:
An Evaluation of Transformer Models for Early Intrusion Detection in Cloud Continuum. 279-284 - Lorens Barraud, Francesco G. Caccavale, Jean-Baptiste Peyrat, Wissam Mallouli, Véronique Capdevielle, Hicham Khalife, Ana Rosa Cavalli:
5G SUCI Catcher: Attack and Detection. 285-290 - Eider Iturbe, Erkuden Rios, Nerea Toledo:
Towards trustworthy Artificial Intelligence: Security risk assessment methodology for Artificial Intelligence systems. 291-297 - Phu Hong Nguyen, Rustem Dautov, Hui Song, Angel Rego, Eider Iturbe, Erkuden Rios, Diego Sagasti, Gonzalo Nicolas, Valeria Valdés, Wissam Mallouli, Ana R. Cavalli, Nicolas Ferry:
Towards Smarter Security Orchestration and Automatic Response for CPS and IoT. 298-302 - Seung-Seok Lee, Sang-Joon Lee:
Design and Implementation of Web3-Based E-Commerce Cryptocurrency Payment System. 303-308 - Panagiotis I. Radoglou-Grammatikis, Elisavet Kioseoglou, Dimitrios Christos Asimopoulos, Miltiadis G. Siavvas, Ioannis Nanos, Thomas Lagkas, Vasileios Argyriou, Konstantinos E. Psannis, Sotirios K. Goudos, Panagiotis G. Sarigiannidis:
Surveying Cyber Threat Intelligence and Collaboration: A Concise Analysis of Current Landscape and Trends. 309-314 - Polina Minina, Andrey Sadovykh, Vladimir Ivanov:
Detecting Security Requirements in GitHub Issues -Novel Dataset and SmallBERT-based model. 315-318 - Lars Andreassen Jaatun, Silje Marie Sørlien, Ravishankar Borgaonkar, Steve Taylor, Martin Gilje Jaatun:
Software Bill of Materials in Critical Infrastructure. 319-324 - Bernadet Klein Wassink, Zhiming Zhao:
Increasing Robustness of Blockchain Peer-to-Peer Networks with Alternative Peer Initialization. 325-332 - Smruti Inamdar, Zhiming Zhao:
Decoding NFT Market Dynamics with Data. 333-340 - Jungwon Seo, Nan Zhang, Chunming Rong:
Flexible and Secure Code Deployment in Federated Learning using Large Language Models: Prompt Engineering to Enhance Malicious Code Detection. 341-349
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.