Modeling and automated deployment of serverless applications using tosca
The serverless computing paradigm brings multiple benefits to application developers who
are interested in consuming computing resources as services without the need to manage …
are interested in consuming computing resources as services without the need to manage …
Enabling role-based orchestration for cloud applications
Y Wang, C Lee, S Ren, E Kim, S Chung - Applied Sciences, 2021 - mdpi.com
With the rapidly growing popularity of cloud services, the cloud computing faces critical
challenges to orchestrate the deployment and operation of cloud applications on …
challenges to orchestrate the deployment and operation of cloud applications on …
Describing and processing topology and quality of service parameters of applications in the cloud
G Pierantoni, T Kiss, G Terstyanszky… - Journal of Grid …, 2020 - Springer
Typical cloud applications require high-level policy driven orchestration to achieve efficient
resource utilisation and robust security to support different types of users and user …
resource utilisation and robust security to support different types of users and user …
Modeling and automated execution of application deployment tests
In recent years, many deployment systems have been developed that process deployment
models to automatically provision applications. The main objective of these systems is to …
models to automatically provision applications. The main objective of these systems is to …
[PDF][PDF] Deployment enforcement rules for TOSCA-based applications
M Zimmermann, U Breitenbücher… - Proceedings of The …, 2018 - iaas.uni-stuttgart.de
In the context of Industry 4.0, gathering sensor data and using data analysis software can
lead to actionable insights, for example, enabling predictive maintenance. Since developing …
lead to actionable insights, for example, enabling predictive maintenance. Since developing …
Semantic clone detection: Can source code comments help?
A Ghosh, SK Kuttal - … on Visual Languages and Human-Centric …, 2018 - ieeexplore.ieee.org
Programmers reuse code to increase their productivity, which leads to large fragments of
duplicate or near-duplicate code in the code base. The current code clone detection …
duplicate or near-duplicate code in the code base. The current code clone detection …
Application threat modeling and automated VNF selection for mitigation using TOSCA
K Saatkamp, C Krieger, F Leymann… - 2019 International …, 2019 - ieeexplore.ieee.org
In the era of Internet of Things (IoT) the interconnectedness of devices, and thus the need to
protect them against threats increased. The widely used threat modeling method STRIDE …
protect them against threats increased. The widely used threat modeling method STRIDE …
Adversarial generation of defensive trajectories in basketball games
In this paper, we present a method to generate realistic trajectories of defensive players in a
basketball game based on the ball and the offensive team's movements. We train on the …
basketball game based on the ball and the offensive team's movements. We train on the …
[PDF][PDF] The SmartOrchestra Platform: A Configurable Smart Service Platform for IoT Systems
A Liebing, L Ashauer, U Breitenbücher… - … Summer School on …, 2018 - iaas.uni-stuttgart.de
The Internet of Things is growing rapidly while still missing a universal operating and
management platform for multiple diverse use cases. Such a platform should provide all …
management platform for multiple diverse use cases. Such a platform should provide all …
[PDF][PDF] Versioning of applications modeled in TOSCA
L Harzenetter - 2018 - d-nb.info
Cloud applications are subject to frequent changes to enable fast feedback on user requests
about problems and features, or to provide security updates. In both cases, the topology of a …
about problems and features, or to provide security updates. In both cases, the topology of a …