Modeling and automated deployment of serverless applications using tosca

M Wurster, U Breitenbücher, K Képes… - 2018 IEEE 11th …, 2018 - ieeexplore.ieee.org
The serverless computing paradigm brings multiple benefits to application developers who
are interested in consuming computing resources as services without the need to manage …

Enabling role-based orchestration for cloud applications

Y Wang, C Lee, S Ren, E Kim, S Chung - Applied Sciences, 2021 - mdpi.com
With the rapidly growing popularity of cloud services, the cloud computing faces critical
challenges to orchestrate the deployment and operation of cloud applications on …

Describing and processing topology and quality of service parameters of applications in the cloud

G Pierantoni, T Kiss, G Terstyanszky… - Journal of Grid …, 2020 - Springer
Typical cloud applications require high-level policy driven orchestration to achieve efficient
resource utilisation and robust security to support different types of users and user …

Modeling and automated execution of application deployment tests

M Wurster, U Breitenbücher, O Kopp… - 2018 IEEE 22nd …, 2018 - ieeexplore.ieee.org
In recent years, many deployment systems have been developed that process deployment
models to automatically provision applications. The main objective of these systems is to …

[PDF][PDF] Deployment enforcement rules for TOSCA-based applications

M Zimmermann, U Breitenbücher… - Proceedings of The …, 2018 - iaas.uni-stuttgart.de
In the context of Industry 4.0, gathering sensor data and using data analysis software can
lead to actionable insights, for example, enabling predictive maintenance. Since developing …

Semantic clone detection: Can source code comments help?

A Ghosh, SK Kuttal - … on Visual Languages and Human-Centric …, 2018 - ieeexplore.ieee.org
Programmers reuse code to increase their productivity, which leads to large fragments of
duplicate or near-duplicate code in the code base. The current code clone detection …

Application threat modeling and automated VNF selection for mitigation using TOSCA

K Saatkamp, C Krieger, F Leymann… - 2019 International …, 2019 - ieeexplore.ieee.org
In the era of Internet of Things (IoT) the interconnectedness of devices, and thus the need to
protect them against threats increased. The widely used threat modeling method STRIDE …

Adversarial generation of defensive trajectories in basketball games

CY Chen, W Lai, HY Hsieh, YS Wang… - … on Multimedia & …, 2018 - ieeexplore.ieee.org
In this paper, we present a method to generate realistic trajectories of defensive players in a
basketball game based on the ball and the offensive team's movements. We train on the …

[PDF][PDF] The SmartOrchestra Platform: A Configurable Smart Service Platform for IoT Systems

A Liebing, L Ashauer, U Breitenbücher… - … Summer School on …, 2018 - iaas.uni-stuttgart.de
The Internet of Things is growing rapidly while still missing a universal operating and
management platform for multiple diverse use cases. Such a platform should provide all …

[PDF][PDF] Versioning of applications modeled in TOSCA

L Harzenetter - 2018 - d-nb.info
Cloud applications are subject to frequent changes to enable fast feedback on user requests
about problems and features, or to provide security updates. In both cases, the topology of a …