A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Microservices: Migration of a Mission Critical System
[article]
2017
arXiv
pre-print
One of the foundational characteristics of this new promising paradigm, compared for instance to monolithic architectures, is scalability. ...
In this paper, we present a real world case study in order to demonstrate how scalability is positively affected by re-implementing a monolithic architecture into microservices. ...
Docker Swarm also allows for management of storage volumes, which are spread across the cluster nodes and are used to persist data from databases and RabbitMQ. ...
arXiv:1704.04173v1
fatcat:cotaf77m2vbhzoxannfdh6pxfy
Done Yet? A Critical Introspective of the Cloud Management Toolbox
2018
2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC)
In this work, we present the current state of the art in monitoring, storage, analysis and adaptation approaches for the data produced by cloud computing environments, to enable proactive, dynamic resource ...
This has opened up the need for automated capacity planning strategies in heterogeneous cloud computing environments. ...
We then describe the components in the pipeline, starting from the data acquisition, described in Section III and provide an overview of cloud-based databases allowing the storage of the collected monitoring ...
doi:10.1109/ice.2018.8436348
dblp:conf/ice-itmc/LeznikVGSD18
fatcat:c6cmwlsmtnhxni77vxwcff3ds4
Model-Driven Engineering for Mission-Critical IoT Systems
2017
IEEE Software
, every element can be critical, from the simple RFID tag to a database or even a robot. ...
So, it might not be feasible to manually identify critical sections or sequences of program instructions that only one subsystem might be executing at a particular time. ...
doi:10.1109/ms.2017.1
fatcat:eqi23edf6bb4hlpvnv6tsdgqby
Critical analysis of Big Data challenges and analytical methods
2017
Journal of Business Research
Therefore, prior to hasty use and buying costly BD tools, there is a need for organizations to first understand the BDA landscape. ...
to trace the implementation of BD strategies, a profiling method is employed to analyze articles (published in English-speaking peer-reviewed journals between 1996 and 2015) extracted from the Scopus database ...
Journal of Multimedia and Ubiquitous Engineering. 5(1), 235-244. SLR_13 Chen. Z. Xiao. N. & Liu. F. 2013. An SSD-based accelerator for directory parsins in storage systems containing massive files. ...
doi:10.1016/j.jbusres.2016.08.001
fatcat:btg4l5txqzflbelneexeymflmy
Big data, bigger dilemmas: A critical review
2014
Journal of the Association for Information Science and Technology
It also demonstrates the need for a critical synthesis of the conceptual and practical dilemmas surrounding Big Data. ...
In bringing these diverse literatures together, we aim to shed light on the common underlying issues that concern and affect all of these areas. ...
These issues become doubly critical when personal data are involved on a large scale and "de-identification" turns into a key concern-issues that are further exacerbated by the potential for "re-identification ...
doi:10.1002/asi.23294
fatcat:rjpdmywn35g2razmclw5pd3lja
Critical infrastructure protection: Requirements and challenges for the 21st century
2015
International Journal of Critical Infrastructure Protection
Today, the reliability, high performance, continuous operation, safety, maintenance and protection of these critical infrastructures are national priorities for many countries around the world. ...
We explore the various vulnerabilities and threats currently present in critical infrastructures and describe protection measures that can be deployed to mitigate those threats. ...
Many of the threats are managed by public databases, such as the British Columbia Institute of Technology (BCIT), Industrial Security Incident Database (ISID), the Computer Emergency Response Teams (CERT ...
doi:10.1016/j.ijcip.2014.12.002
fatcat:w5dkbi46sbdapgwiqnrrnclpte
Big data, bigger dilemmas: A critical review
[article]
2015
arXiv
pre-print
It also demonstrates the need for a critical synthesis of the conceptual and practical dilemmas surrounding Big Data. ...
In bringing these diverse literatures together, we aim to shed light on the common underlying issues that concern and affect all of these areas. ...
These issues become doubly critical when personal data are involved on a large scale and "de-identification" turns into a key concern-issues that are further exacerbated by the potential for "re-identification ...
arXiv:1509.00909v1
fatcat:rkt5vfu4q5d5hpc7vz6z4xduym
Meeting the Challenges of Critical and Extreme Dependability and Security
2017
2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC)
The world is becoming an immense critical information infrastructure, with the fast and increasing entanglement of utilities, telecommunications, Internet, cloud, and the emerging IoT tissue. ...
We predict an increase in very sophisticated targeted attacks, or advanced persistent threats (APT), and claim that this calls for expanding the frontier of security and dependability methods and techniques ...
[20] managed to re-identify 13.1% of the deidentified 1000-Genomes project database. ...
doi:10.1109/prdc.2017.21
dblp:conf/prdc/VerissimoVDRR17
fatcat:zztmil6xojgztdfrrfhkyv5dzy
Addressing IT Security for Critical Control Systems
2007
2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)
Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. ...
This paper addresses the key challenges commonly mentioned in the context of control system security (also referred to as "SCADA security") and discusses feasible solutions for most of them. ...
It combines the scalability of user maintenance of centralized schemes like Kerberos with the ability to provide access to off-line devices and the storage space and engineering properties of conventional ...
doi:10.1109/hicss.2007.48
dblp:conf/hicss/Naedele07
fatcat:6ptfxjvx5vftznweiwhov6pnvq
NewSQL: Towards Next-Generation Scalable RDBMS for Online Transaction Processing (OLTP) for Big Data Management
2014
International Journal of Database Theory and Application
NewSQL is a class of modern relational database management systems (RDBMS) that provide the same scalable performance of NoSQL systems for online transaction processing (OLTP) read-write workloads while ...
One of the key advances in resolving the "big-data" problem has been the emergence of an alternative database technology. ...
New MySQL storage engines: The second category are highly optimized storage engines for SQL. MySQL is part of the LAMP stack and is used extensively in OLTP. ...
doi:10.14257/ijdta.2014.7.6.11
fatcat:hbyj4wfjbjewvmrufh3n2lmu54
Hosting critical infrastructure services in the cloud environment considerations
2015
International Journal of Critical Infrastructures
Authenticity and non-repudiation are also important security requirements for critical infrastructure systems. ...
This paper provides an overview of critical infrastructure and the cloud computing relationship, whilst detailing security concerns and existing protection methods. ...
It is a re-engineered version of Snort, which is an open-source network intrusion prevention and detection system (IDS/IPS). ...
doi:10.1504/ijcis.2015.073843
fatcat:5diauulhbrfcpl3i7tvh52uehe
NewSQL: Towards Next-Generation Scalable RDBMS for Online Transaction Processing (OLTP) for Big Data Management
[article]
2014
arXiv
pre-print
NewSQL is a class of modern relational database management systems (RDBMS) that provide the same scalable performance of NoSQL systems for online transaction processing (OLTP) read-write workloads while ...
One of the key advances in resolving the big-data problem has been the emergence of an alternative database technology. ...
New MySQL storage engines: The second category are highly optimized storage engines for SQL. MySQL is part of the LAMP stack and is used extensively in OLTP. ...
arXiv:1411.7343v1
fatcat:d2k3yangbjae5k5246ah6bwhxq
The Role of Critical Zone Observatories in Critical Zone Science
[chapter]
2015
Developments in Earth Surface Processes
In fact, the RCEW is intended to provide a springboard for complimentary re search. ...
Anthropo genic management of the landscape has reduced storage and residence times, and the emergent patterns of connectivity, dynamics, and responses reflect this change in the residence times. ...
doi:10.1016/b978-0-444-63369-9.00002-1
fatcat:dgcmspx2fjep3fo5cpoq3duwxq
DIFFERENTIAL PRIVACY FOR IOT-ENABLED CRITICAL INFRASTRUCTURE: A COMPREHENSIVE SURVEY
2021
IEEE Access
Therefore, Dwork's differential privacy has emerged as the most viable privacy preservation strategy for IoT-enabled critical infrastructure. ...
However, for various reasons, those proposed solutions are not well suited for modern IoT-enabled critical infrastructure. ...
This architecture, as depicted in Figure 4 offers flexibility and scalability of various resources such as data storage, robust infrastructure for development, analytical software and tools, etc [71 ...
doi:10.1109/access.2021.3124309
fatcat:vejtyjyrwffeffi7ob2o2svyja
Knowledge Extraction and Discovery Based on BIM: A Critical Review and Future Directions
2021
Archives of Computational Methods in Engineering
AbstractIn the past, knowledge in the fields of Architecture, Engineering and Construction (AEC) industries mainly come from experiences and are documented in hard copies or specific electronic databases ...
on literature reviews, this article summarizes the latest achievements in the fields of knowledge science and BIM, in the aspects of (1) knowledge description, (2) knowledge discovery, (3) knowledge storage ...
In the central database framework, researchers adopted all kinds of databases including relational database, object-oriented database, key-value database and relational-object database as their storage ...
doi:10.1007/s11831-021-09576-9
fatcat:mrjkc2y6qzaufgjrusif3d27ja
« Previous
Showing results 1 — 15 out of 10,770 results