• State-Aware Application Placement in Mobile Edge Clouds
  • ALASCA: Function-Driven Advanced Access Control for Big Cold Data
  • On Detecting Malicious Code Injection by Monitoring Multi-Level Container Activities
  • Feather: Lightweight Container Alternatives for Deploying Workloads in the Edge
  • Value for Money: An Experimental Comparison of Cloud Pricing and Performance
  • Pruning Modes for Deployment Models: From Manual Modeling to Automated Removal of Elements and Their Implications
  • Task Offloading in Edge-Cloud Computing Using a Q-Learning Algorithm
  • Creek: Leveraging Serverless for Online Machine Learning on Streaming Data
  • Service Weaver: A Promising Direction for Cloud-Native Systems?
  • Tail-Latency Aware and Resource-Efficient Bin Pack Autoscaling for Distributed Event Queues
  • IoT Devices Overhead: A Simulation Study of eHealth Solutions over a Hospitals’ Network
  • Enhancing SPIFFE/SPIRE Environment with a Nested Security Token Model
  • Visualizing the Information Security Maturity Level of Public Cloud Services Used by Public Administrations
  • Model-Driven End-to-End Resolution of Security Smells in Microservice Architectures
  • Hosting-Aware Pruning of Components in Deployment Models
  • Balancing Performance and Aging in Cloud Environments
  • CacheFlow: Enhancing Data Flow Efficiency in Serverless Computing by Local Caching
  • Towards a General Metric for Energy Efficiency in Cloud Computing Data Centres: A Proposal for Extending of the ISO/IEC 30134-4
  • Don't Train, Just Prompt: Towards a Prompt Engineering Approach for a More Generative Container Orchestration Management
  • Responsible Information Sharing in the Era of Big Data Analytics Facilitating Digital Economy Through the Use of Blockchain Technology and Observing GDPR
  • Optimizing Service Placement in Edge-to-Cloud AR/VR Systems Using a Multi-Objective Genetic Algorithm
  • Benefits of Dynamic Computational Offloading for Mobile Devices
  • On Maintainability and Microservice Dependencies: How Do Changes Propagate?
  • Towards Image-Based Network Traffic Pattern Detection for DDoS Attacks in Cloud Computing Environments: A Comparative Study
  • Improving Edge-AI Image Classification Through the Use of Better Building Blocks
  • Uncertainty Estimation in Multi-Agent Distributed Learning for AI-Enabled Edge Devices
  • A Logic Programming Approach to VM Placement
  • Systematic Threat Modelling of High-Performance Computing Systems: The V:HPCCRI Case Study
  • Towards a Cost-Benefit Analysis of Additive Manufacturing as a Service
  • Integrating Secure Multiparty Computation into Data Spaces
  • Lapse: Latency & Power-Aware Placement of Data Stream Applications on Edge Computing
  • Load-Aware Container Orchestration on Kubernetes Clusters
  • Towards a Cloud-Based Smart Office Solution for Shared Workplace Individualization
  • Harnessing the Computing Continuum Across Personalized Healthcare, Maintenance and Inspection, and Farming 4.0
  • Prediction of Resource Utilisation in Cloud Computing Using Machine Learning
  • Machine Learning Models with Fault Tree Analysis for Explainable Failure Detection in Cloud Computing
  • A Methodology for Web Cache Deception Vulnerability Discovery