Extreme-scale workflows: A perspective from the JLESC international community
Abstract The Joint Laboratory for Extreme-Scale Computing (JLESC) focuses on software
challenges in high-performance computing systems to meet the needs of today's science …
challenges in high-performance computing systems to meet the needs of today's science …
Caching strategy for Web application–a systematic literature review
Purpose Internet users and Web-based applications continue to grow every day. The
response time on a Web application really determines the convenience of its users. Caching …
response time on a Web application really determines the convenience of its users. Caching …
Enabling dynamic and intelligent workflows for HPC, data analytics, and AI convergence
Abstract The evolution of High-Performance Computing (HPC) platforms enables the design
and execution of progressively larger and more complex workflow applications in these …
and execution of progressively larger and more complex workflow applications in these …
DS2PM: A data-sharing privacy protection model based on blockchain and federated learning
Y Chen, J Li, F Wang, K Yue, Y Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
With the development of big data and blockchain, an increasing number of scholars have
begun to study blockchain for data sharing. By studying data sharing models that are based …
begun to study blockchain for data sharing. By studying data sharing models that are based …
Managing the cloud continuum: Lessons learnt from a real fog-to-cloud deployment
X Masip-Bruin, E Marín-Tordera, S Sánchez-López… - Sensors, 2021 - mdpi.com
The wide adoption of the recently coined fog and edge computing paradigms alongside
conventional cloud computing creates a novel scenario, known as the cloud continuum …
conventional cloud computing creates a novel scenario, known as the cloud continuum …
Colony: Parallel functions as a service on the cloud-edge continuum
Although smart devices markets are increasing their sales figures, their computing
capabilities are not sufficient to provide good-enough-quality services. This paper proposes …
capabilities are not sufficient to provide good-enough-quality services. This paper proposes …
[HTML][HTML] A Security-Oriented Data-Sharing Scheme Based on Blockchain
W Ma, X Wei, L Wang - Applied Sciences, 2024 - mdpi.com
Data sharing serves to maximize the efficiency of data resources by facilitating their full
utilization and reducing associated costs. However, existing data-sharing schemes are …
utilization and reducing associated costs. However, existing data-sharing schemes are …
A survey on the Distributed Computing stack
In this paper, we review the background and the state of the art of the Distributed Computing
software stack. We aim to provide the readers with a comprehensive overview of this area by …
software stack. We aim to provide the readers with a comprehensive overview of this area by …
mF2C: towards a coordinated management of the IoT-fog-cloud continuum
Fog computing enables location dependent resource allocation and low latency services,
while fostering novel market and business opportunities in the cloud sector. Aligned to this …
while fostering novel market and business opportunities in the cloud sector. Aligned to this …
Enhancing iteration performance on distributed task-based workflows
Task-based programming models have proven to be a robust and versatile way to approach
development of applications for distributed environments. They provide natural …
development of applications for distributed environments. They provide natural …