Editorial
Mirjana Ivanovic, Milos Radovanovic
2021
Computer Science and Information Systems
and we hope that their new articles will also be highly cited in the future. Last but not least, acknowledge the diligence and hard work of all our authors and reviewers, without whom the current issue, and journal publication in general, would not be possible. The regular paper section starts with "Throughput Prediction based on ExtraTree for Stream Processing Tasks" by Zheng Chu et al, where the problem of large volumes of streaming data is tackled by proposing a volatility detection
more »
... , a selection algorithm, and a throughput prediction method based on the ExtraTree ensemble learning algorithm. Experimental results demonstrate good accuracy and efficiency of the proposed approach. The second article, "Multi-Objective Optimization of Container-Based Microservice Scheduling in Edge Computing" by Guisheng Fan el al. formulates container-based microservice scheduling as a multi-objective optimization problem, and proposes a latency, reliability and load balancing aware scheduling (LRLBAS) algorithm to determine the container-based microservice deployment in edge computing, based on particle swarm optimization. Simulation experiments showcase the effectiveness and efficiency of the proposed algorithm. "PureEdgeSim: A Simulation Framework for Performance Evaluation of Cloud, Edge and Mist Computing Environments" by Charafeddine Mechalikh et al. presents PureEd-geSim, a simulation toolkit that enables the simulation of cloud, edge, and mist computing environments and the evaluation of the adopted resources management strategies, in terms of delays, energy consumption, resources utilization, and tasks success rate. Evaluation on the introduced case study demonstrates the effectiveness of the proposed framework modeling complex and dynamic environments. In the article entitled "DroidClone: Attack of the Android Malware Clones -A Step Towards Stopping Them," Shahid Alam and Ibrahim Sogukpinar propose DroidClone, an approach for detection of code clones (segments of code that are similar) in Android applications to help detect malware. DroidClone uses control flow patterns for reducing the effect of obfuscations and detecting clones that are syntactically different but semantically similar enough, and is independent of the underlying programming language. Evaluation incorporating real malware demonstrated good accuracy, as well as a reasonable degree of resistance to obfuscations.
doi:10.2298/csis210100ii
fatcat:4mkpxvshmna33h5p6ad3mx4ztq