Filters








10,770 Hits in 4.5 sec

Microservices: Migration of a Mission Critical System [article]

Nicola Dragoni, Schahram Dustdar, Stephan T. Larsen, Manuel Mazzara
2017 arXiv   pre-print
One of the foundational characteristics of this new promising paradigm, compared for instance to monolithic architectures, is scalability.  ...  In this paper, we present a real world case study in order to demonstrate how scalability is positively affected by re-implementing a monolithic architecture into microservices.  ...  Docker Swarm also allows for management of storage volumes, which are spread across the cluster nodes and are used to persist data from databases and RabbitMQ.  ... 
arXiv:1704.04173v1 fatcat:cotaf77m2vbhzoxannfdh6pxfy

Done Yet? A Critical Introspective of the Cloud Management Toolbox

Mark Leznik, Simon Volpert, Frank Griesinger, Daniel Seybold, Jorg Domaschka
2018 2018 IEEE International Conference on Engineering, Technology and Innovation (ICE/ITMC)  
In this work, we present the current state of the art in monitoring, storage, analysis and adaptation approaches for the data produced by cloud computing environments, to enable proactive, dynamic resource  ...  This has opened up the need for automated capacity planning strategies in heterogeneous cloud computing environments.  ...  We then describe the components in the pipeline, starting from the data acquisition, described in Section III and provide an overview of cloud-based databases allowing the storage of the collected monitoring  ... 
doi:10.1109/ice.2018.8436348 dblp:conf/ice-itmc/LeznikVGSD18 fatcat:c6cmwlsmtnhxni77vxwcff3ds4

Model-Driven Engineering for Mission-Critical IoT Systems

Federico Ciccozzi, Ivica Crnkovic, Davide Di Ruscio, Ivano Malavolta, Patrizio Pelliccione, Romina Spalazzese
2017 IEEE Software  
, every element can be critical, from the simple RFID tag to a database or even a robot.  ...  So, it might not be feasible to manually identify critical sections or sequences of program instructions that only one subsystem might be executing at a particular time.  ... 
doi:10.1109/ms.2017.1 fatcat:eqi23edf6bb4hlpvnv6tsdgqby

Critical analysis of Big Data challenges and analytical methods

Uthayasankar Sivarajah, Muhammad Mustafa Kamal, Zahir Irani, Vishanth Weerakkody
2017 Journal of Business Research  
Therefore, prior to hasty use and buying costly BD tools, there is a need for organizations to first understand the BDA landscape.  ...  to trace the implementation of BD strategies, a profiling method is employed to analyze articles (published in English-speaking peer-reviewed journals between 1996 and 2015) extracted from the Scopus database  ...  Journal of Multimedia and Ubiquitous Engineering. 5(1), 235-244. SLR_13 Chen. Z. Xiao. N. & Liu. F. 2013. An SSD-based accelerator for directory parsins in storage systems containing massive files.  ... 
doi:10.1016/j.jbusres.2016.08.001 fatcat:btg4l5txqzflbelneexeymflmy

Big data, bigger dilemmas: A critical review

Hamid Ekbia, Michael Mattioli, Inna Kouper, G. Arave, Ali Ghazinejad, Timothy Bowman, Venkata Ratandeep Suri, Andrew Tsou, Scott Weingart, Cassidy R. Sugimoto
2014 Journal of the Association for Information Science and Technology  
It also demonstrates the need for a critical synthesis of the conceptual and practical dilemmas surrounding Big Data.  ...  In bringing these diverse literatures together, we aim to shed light on the common underlying issues that concern and affect all of these areas.  ...  These issues become doubly critical when personal data are involved on a large scale and "de-identification" turns into a key concern-issues that are further exacerbated by the potential for "re-identification  ... 
doi:10.1002/asi.23294 fatcat:rjpdmywn35g2razmclw5pd3lja

Critical infrastructure protection: Requirements and challenges for the 21st century

Cristina Alcaraz, Sherali Zeadally
2015 International Journal of Critical Infrastructure Protection  
Today, the reliability, high performance, continuous operation, safety, maintenance and protection of these critical infrastructures are national priorities for many countries around the world.  ...  We explore the various vulnerabilities and threats currently present in critical infrastructures and describe protection measures that can be deployed to mitigate those threats.  ...  Many of the threats are managed by public databases, such as the British Columbia Institute of Technology (BCIT), Industrial Security Incident Database (ISID), the Computer Emergency Response Teams (CERT  ... 
doi:10.1016/j.ijcip.2014.12.002 fatcat:w5dkbi46sbdapgwiqnrrnclpte

Big data, bigger dilemmas: A critical review [article]

Hamid Ekbia, Michael Mattioli, Inna Kouper, G. Arave, Ali Ghazinejad, Timothy Bowman, Venkata Ratandeep Suri, Andrew Tsou, Scott Weingart, and Cassidy R. Sugimoto
2015 arXiv   pre-print
It also demonstrates the need for a critical synthesis of the conceptual and practical dilemmas surrounding Big Data.  ...  In bringing these diverse literatures together, we aim to shed light on the common underlying issues that concern and affect all of these areas.  ...  These issues become doubly critical when personal data are involved on a large scale and "de-identification" turns into a key concern-issues that are further exacerbated by the potential for "re-identification  ... 
arXiv:1509.00909v1 fatcat:rkt5vfu4q5d5hpc7vz6z4xduym

Meeting the Challenges of Critical and Extreme Dependability and Security

Paulo Esteves-Verissimo, Marcus Volp, Jeremie Decouchant, Vincent Rahli, Francisco Rocha
2017 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC)  
The world is becoming an immense critical information infrastructure, with the fast and increasing entanglement of utilities, telecommunications, Internet, cloud, and the emerging IoT tissue.  ...  We predict an increase in very sophisticated targeted attacks, or advanced persistent threats (APT), and claim that this calls for expanding the frontier of security and dependability methods and techniques  ...  [20] managed to re-identify 13.1% of the deidentified 1000-Genomes project database.  ... 
doi:10.1109/prdc.2017.21 dblp:conf/prdc/VerissimoVDRR17 fatcat:zztmil6xojgztdfrrfhkyv5dzy

Addressing IT Security for Critical Control Systems

Martin Naedele
2007 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)  
Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet.  ...  This paper addresses the key challenges commonly mentioned in the context of control system security (also referred to as "SCADA security") and discusses feasible solutions for most of them.  ...  It combines the scalability of user maintenance of centralized schemes like Kerberos with the ability to provide access to off-line devices and the storage space and engineering properties of conventional  ... 
doi:10.1109/hicss.2007.48 dblp:conf/hicss/Naedele07 fatcat:6ptfxjvx5vftznweiwhov6pnvq

NewSQL: Towards Next-Generation Scalable RDBMS for Online Transaction Processing (OLTP) for Big Data Management

A. B. M. Moniruzzaman
2014 International Journal of Database Theory and Application  
NewSQL is a class of modern relational database management systems (RDBMS) that provide the same scalable performance of NoSQL systems for online transaction processing (OLTP) read-write workloads while  ...  One of the key advances in resolving the "big-data" problem has been the emergence of an alternative database technology.  ...  New MySQL storage engines: The second category are highly optimized storage engines for SQL. MySQL is part of the LAMP stack and is used extensively in OLTP.  ... 
doi:10.14257/ijdta.2014.7.6.11 fatcat:hbyj4wfjbjewvmrufh3n2lmu54

Hosting critical infrastructure services in the cloud environment considerations

Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat
2015 International Journal of Critical Infrastructures  
Authenticity and non-repudiation are also important security requirements for critical infrastructure systems.  ...  This paper provides an overview of critical infrastructure and the cloud computing relationship, whilst detailing security concerns and existing protection methods.  ...  It is a re-engineered version of Snort, which is an open-source network intrusion prevention and detection system (IDS/IPS).  ... 
doi:10.1504/ijcis.2015.073843 fatcat:5diauulhbrfcpl3i7tvh52uehe

NewSQL: Towards Next-Generation Scalable RDBMS for Online Transaction Processing (OLTP) for Big Data Management [article]

A B M Moniruzzaman
2014 arXiv   pre-print
NewSQL is a class of modern relational database management systems (RDBMS) that provide the same scalable performance of NoSQL systems for online transaction processing (OLTP) read-write workloads while  ...  One of the key advances in resolving the big-data problem has been the emergence of an alternative database technology.  ...  New MySQL storage engines: The second category are highly optimized storage engines for SQL. MySQL is part of the LAMP stack and is used extensively in OLTP.  ... 
arXiv:1411.7343v1 fatcat:d2k3yangbjae5k5246ah6bwhxq

The Role of Critical Zone Observatories in Critical Zone Science [chapter]

Timothy White, Susan Brantley, Steve Banwart, Jon Chorover, William Dietrich, Lou Derry, Kathleen Lohse, Suzanne Anderson, Anthony Aufdendkampe, Roger Bales, Praveen Kumar, Dan Richter (+1 others)
2015 Developments in Earth Surface Processes  
In fact, the RCEW is intended to provide a springboard for complimentary re search.  ...  Anthropo genic management of the landscape has reduced storage and residence times, and the emergent patterns of connectivity, dynamics, and responses reflect this change in the residence times.  ... 
doi:10.1016/b978-0-444-63369-9.00002-1 fatcat:dgcmspx2fjep3fo5cpoq3duwxq

DIFFERENTIAL PRIVACY FOR IOT-ENABLED CRITICAL INFRASTRUCTURE: A COMPREHENSIVE SURVEY

Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, Robin Doss, Mike J. Ryan
2021 IEEE Access  
Therefore, Dwork's differential privacy has emerged as the most viable privacy preservation strategy for IoT-enabled critical infrastructure.  ...  However, for various reasons, those proposed solutions are not well suited for modern IoT-enabled critical infrastructure.  ...  This architecture, as depicted in Figure 4 offers flexibility and scalability of various resources such as data storage, robust infrastructure for development, analytical software and tools, etc [71  ... 
doi:10.1109/access.2021.3124309 fatcat:vejtyjyrwffeffi7ob2o2svyja

Knowledge Extraction and Discovery Based on BIM: A Critical Review and Future Directions

Zhen-Zhong Hu, Shuo Leng, Jia-Rui Lin, Sun-Wei Li, Ya-Qi Xiao
2021 Archives of Computational Methods in Engineering  
AbstractIn the past, knowledge in the fields of Architecture, Engineering and Construction (AEC) industries mainly come from experiences and are documented in hard copies or specific electronic databases  ...  on literature reviews, this article summarizes the latest achievements in the fields of knowledge science and BIM, in the aspects of (1) knowledge description, (2) knowledge discovery, (3) knowledge storage  ...  In the central database framework, researchers adopted all kinds of databases including relational database, object-oriented database, key-value database and relational-object database as their storage  ... 
doi:10.1007/s11831-021-09576-9 fatcat:mrjkc2y6qzaufgjrusif3d27ja
« Previous Showing results 1 — 15 out of 10,770 results