Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant

M Zhou, L Han, H Lu, C Fu - Computer Networks, 2020 - Elsevier
The characteristics of high mobility and rapid topology change of the Vehicle Ad Hoc
Network (VANET) makes it vulnerable to various malicious attacks. The adversary utilizes …

A fault-tolerant model for performance optimization of a fog computing system

P Zhang, Y Chen, M Zhou, G Xu… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
In a distributed heterogeneous fog environment, fog nodes may change their state at any
time. Their reliability changes accordingly. A dynamic analysis of state changes can help …

Data processing on edge and cloud: a performability evaluation and sensitivity analysis

L Santos, B Cunha, I Fé, M Vieira, FA Silva - Journal of Network and …, 2021 - Springer
Abstract Nowadays, the Internet of Things (IoT) allows monitoring and automation in diverse
contexts, such as hospitals, homes, or even smart cities, just to name a few examples. IoT …

[HTML][HTML] A method of value model convergence and profit optimization for crossover services

Z Liu, B Li, J Wang, Y Qiao - Journal of King Saud University-Computer and …, 2022 - Elsevier
Value models have been employed in value-based requirements engineering (RE) to
express value exchange relations between stakeholders. The value chain of crossover …

A guard-driven analysis approach of workflow net with data

D Xiang, GJ Liu, C Yan, CJ Jiang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The correctness of workflow systems is dependent on not only their control-flows but also
their data-flows. WFD-nets (Workflow net with data) can model both control-flow and data …

Proactive auto-scaling algorithm (pasa) for cloud application

MS Aslanpour, SE Dashti - International Journal of Grid and High …, 2017 - igi-global.com
Application providers (APs) leave their application hosting to cloud with the aim of reducing
infrastructure purchase and maintenance costs. However, variation in the arrival rate of user …

Model Checking ofWorkflow Nets with Tables and Constraints

J Song, G Liu - arXiv preprint arXiv:2307.03685, 2023 - arxiv.org
Many operations in workflow systems are dependent on database tables. The classical
workflow net and its extensions (eg, worflow net with data) cannot model these operations …

An event-driven and lightweight proactive auto-scaling architecture for cloud applications

U Akash, PP Paul, A Habib - International Journal of Grid …, 2023 - inderscienceonline.com
The cloud environment is used by the application providers (APs) to host their applications
in order to reduce procurement and management costs of the cloud resources. Moreover …

[PDF][PDF] Checking Data-Flow Errors Based on The Guard-Driven Reachability Graph of WFD-Net.

D Xiang, G Liu - Computing & Informatics, 2020 - researchgate.net
In order to guarantee the correctness of workflow systems, it is necessary to check their data-
flow errors, eg, missing data, inconsistent data, lost data and redundant data. The traditional …

[PDF][PDF] Cloud intelligent logistics service selection based on combinatorial optimization algorithm

Y Hou, ZJ Cao, SL Yang - Journal Européen des Systèmes …, 2019 - academia.edu
Accepted: 5 January 2019 The selection of intelligent logistics service model has become an
important factor in the competition of the entire social logistics industry. Using the …