Abstract is missing.
- On Kubernetes-aided Federated Database SystemsZheng Li 0001, Nicolás Saldías-Vallejos, María Andrea Rodríguez, Austen Rainer. 1-8 [doi]
- FVMM: Fast VM Migration for Virtualization-based Fault Tolerance Using TemplatesWen-Hsiu Tsai, Po-Jui Tsao, Che-Rung Lee. 9-16 [doi]
- HPA: Hierarchical Placement Algorithm for Multi-Cloud Microservices ApplicationsHanTing Liang, Jerry Chou 0001. 17-24 [doi]
- Scalable Containerized Pipeline for Real-time Big Data AnalyticsRana Aurangzaib, Waheed Iqbal, Muhammad Abdullah 0004, Faisal Bukhari, Faheem Ullah, Abdelkarim Erradi. 25-32 [doi]
- A Survey on Autonomic Multi-cloud ComputingDiego Cananea Nobrega De Azevedo, Carlos André Guimarães Ferraz. 33-40 [doi]
- Quality of Information Matters: Recommending Web Services for Performance and UtilityZheng Song 0001, Owen Rowader, Zhengquan Li, Maryam Tello, Eli Tilevich. 41-48 [doi]
- A Note on the Determination of the Processing Capacity in a Multiserver Job System as a Model of Cloud DatacentersAlexandre Brandwajn, Thomas Begin. 49-52 [doi]
- Blockchain-based Cross-organizational Workflow PlatformJiahui Geng, Ali Akbar Rehman, Yongli Mou, Stefan Decker, Chunming Rong. 53-59 [doi]
- A Survey on Infrastructure-as-Code Solutions for Cloud DevelopmentHåkon Teppan, Lars Halvdan Flå, Martin Gilje Jaatun. 60-65 [doi]
- meQ: Selecting MEC Resources by Considering Service Communication RequirementsMatthias Frei, Reinhard German, Anatoli Djanatliev. 66-73 [doi]
- Blockchain Empowered and Self-sovereign Access Control SystemHanif Tadjik, Jiahui Geng, Martin Gilje Jaatun, Chunming Rong. 74-82 [doi]
- FLOMD: Fast and Low Overhead Memory Deduplication for Edge NodesGuann-Ling Shen, Che-Rung Lee. 83-90 [doi]
- Knowledge Graphs and interoperability techniques for hybrid-cloud deployment of FaaS applicationsGeorgios Fatouros, Yannis Poulakis, Ariana Polyviou, Stylianos Tsarsitalidis, Georgios Makridis, John Soldatos 0001, George Kousiouris, Michael Filippakis, Dimosthenis Kyriazis. 91-96 [doi]
- NFT as a proof of Digital Ownership-reward system integrated to a Secure Distributed Computing Blockchain FrameworkAsahi Cantu, Jiahui Geng, Chunming Rong. 97-104 [doi]
- CSM-DBEN: Container Storage Manager for Data Backup on Edge NodesWei-Cheng Hung, Che-Rung Lee. 105-112 [doi]
- A Survey on Cybersecurity Barrier Management in Process Control EnvironmentsKnut Øien, Stein Hauge, Martin Gilje Jaatun, Lars Halvdan Flå, Lars Bodsberg. 113-120 [doi]
- FedTeams: Towards Trust-Based and Resource-Aware Federated LearningDorde Popovic, Hend K. Gedawy, Khaled A. Harras. 121-128 [doi]
- Performance Analysis of HElib on a Privacy Preserving Search for Genome Information with Fully Homomorphic EncryptionArisa Tsuji, Masato Oguchi. 129-136 [doi]
- Consensus latency of PoW blockchainsKe Wang, Hyong S. Kim. 137-147 [doi]
- Internet of Wearables: Fog Extrapolation for Reduced Data Collection and Expanded Capture Volume in Real-Time Motion Capture Edge DevicesShaun Stevens, Paulo Garcia, Hyong Kim. 148-153 [doi]
- Consideration of a Supercomputing System with Cloud Bursting Functionality from an Operational PerspectiveArata Endo, Shinji Yoshida, Shuichi Gojuki, Hiroaki Kataoka, Yoshihiko Sato, Akihiro Musa, Susumu Date. 154-161 [doi]
- 5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network FunctionsA. S. M. Asadujjaman, Mohammad Ekramul Kabir, Hinddeep Purohit, Suryadipta Majumdar, Lingyu Wang 0001, Yosr Jarraya, Makan Pourzandi. 162-169 [doi]
- GPU Performance Tuning and Power Efficiency on the DGX A100 ClusterKhanin Udomchoksakul, Orathai Sangpetch, Akkarit Sangpetch. 170-177 [doi]
- A Hybrid Decision-making Approach to Security Metrics Aggregation in Cloud EnvironmentsMing Lei, Lianying Zhao, Makan Pourzandi, Fereydoun Farrahi Moghaddam. 178-185 [doi]
- Supporting Confidential Workloads in SPIREEduardo De Lucena Falcão, Matteus Sthefano Leite da Silva, Ariel Luz, Andrey Brito. 186-193 [doi]
- 2SFGL: A Simple And Robust Protocol For Graph-Based Fraud DetectionZhirui Pan, Guangzhong Wang, Zhaoning Li, Lifeng Chen, Yang Bian, Zhongyuan Lai. 194-201 [doi]
- How to confirm blocks in PoW blockchainsKe Wang, Hyong S. Kim. 202-213 [doi]
- Software Vulnerability Assessment: Vendor, Scanner, and User AnalysisKietthibhum Boonchuay, Wachirawich Siripaktanakon, Orathai Sangpetch, Akkarit Sangpetch. 214-221 [doi]
- Yet Another Blockchain-based Privacy-friendly Social NetworkLars Andreassen Jaatun, Anders Ringen, Martin Gilje Jaatun. 222-229 [doi]
- Privacy and security challenges for autonomous agents : A study of two social humanoid service robotsDennis Biström, Magnus Westerlund, Bob Duncan, Martin Gilje Jaatun. 230-237 [doi]
- Decentralizing Machine Learning Operations using Web3 for IoT PlatformsJohn Wickström, Magnus Westerlund, Emmanuel Raj. 238-245 [doi]
- Managing Digital Objects with Decentralised Identifiers based on NFT-like schemaChunming Rong, Jiahui Geng, Martin Gilje Jaatun. 246-251 [doi]