We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,211 results
  1. Container-Level Auditing in Container Orchestrators with eBPF

    This paper examines the application of eBPF (extended Berkeley Packet Filter) for achieving more precise auditing at the container level in container...
    Fábio Junior Bertinatto, Daniel Arioza, ... Lisandro Zambenedetti Granville in Advanced Information Networking and Applications
    Conference paper 2024
  2. Container Load Prediction Based on Extended Berkeley Packet Filter

    The widespread use of container cloud puts forward higher requirements for the accuracy and real-time prediction of container resources. Aiming at...
    Conference paper 2023
  3. DockerWatch: a two-phase hybrid detection of malware using various static features in container cloud

    As an emerging virtualization technology, the Linux container provides a more lightweight, flexible, and high-performance operating-system-level...

    Yulong Wang, Qixu Wang, ... Run Yang in Soft Computing
    Article 05 October 2022
  4. Performance Evaluation of Virtual Machine and Container-Based Migration Technique

    The transformation from hypervisor to microservice-based virtualization, i.e., containerization, is gaining considerable attention. This is because...
    Aditya Bhardwaj, Amit Pratap Singh, ... Umesh Gupta in Proceedings of Data Analytics and Management
    Conference paper 2024
  5. Container Orchestration in Heterogeneous Edge Computing Environments

    The emerging latency-sensitive applications and Internet of Things technology have resulted in the development of Edge computing. Therefore,...
    Daghash K. Alqahtani, Adel N. Toosi in Resource Management in Distributed Systems
    Chapter 2024
  6. ESP32: QEMU Emulation Within a Docker Container

    The ESP32 is a popular microcontroller from Espressif that can be used in many embedded applications. Robotic joints, smart car chargers, beer vat...
    Conference paper 2023
  7. Container Network Performance Anomaly Detection Based on Extended Berkeley Packet Filter and Machine Learning

    In the face of massive application containerization scenarios, traditional network performance anomaly detection has been unable to meet the...
    **rong Liang, Lijun Chen, ... Jiaqing Bai in Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery
    Conference paper 2022
  8. Docker Container Orchestration Management: A Review

    Cloud Computing is online technology where computing resources like hardware, software and applications are available as per the user's needs. A...
    Conference paper 2022
  9. CFD Simulation of a container ship in random waves using a coupled level-set and volume of fluid method

    The coupled level-set and volume of fluid (CLSVOF) method is an advanced interface-capturing method that has been extended to handle overset grid...

    Hamn-Ching Chen, Chia-Rong Chen in Journal of Hydrodynamics
    Article 27 April 2023
  10. Analysis of Real-Time Execution Models for Container-Based Control Applications

    Software-defined Manufacturing (SDM) aims to enhance the flexibility of production systems. Classical automation systems are not a suitable...
    Conference paper Open access 2023
  11. A comprehensive evaluation of software-defined radio performance in virtualized environments for radio access networks

    Fifth-generation (5G) mobile networks offer flexibility to address various emerging use cases. Radio virtualization enhances flexibility by enabling...

    Govinda M. G. Bezerra, Nicollas R. de Oliveira, ... Diogo M. F. Mattos in Annals of Telecommunications
    Article 26 June 2024
  12. CO2 Emission Mitigation in Container-Based Cloud Computing by the Power of Resource Management

    The increasing amount of data processing through cloud systems leads to high energy costs and CO2 emissions challenges. Advanced monitoring tools are...
    Conference paper 2023
  13. CPU and Memory Resource Analysis of Kata and Runc Container

    As the development of container technologies, people pay more attention to the security problems of traditional containers. Among the solutions to...
    Conference paper 2022
  14. Container-Based Lab-as-a-Service Application

    In most of the Indian engineering and science educational institutions, variety of courses on problem-solving through programming and computer-aided...
    S. Thiruchadai Pandeeswari, S. Padmavathi, ... K. Sabari Priya in Internet of Things and Its Applications
    Conference paper 2022
  15. Heuristic Methods for the Container Stacking Problems: A Review

    Container stacking is a crucial task of the maritime container terminal management process. Any rearrangement of the containers in storage areas...
    Farah Al Kaderi, Rim Koulali, Mohamed Rida in Advances on Smart and Soft Computing
    Conference paper 2022
  16. Color Tracking Application Using AI-Based Docker Container Scheduling in Fog Computing

    This paper presents the real implementation of a fog computing environment for the execution of color tracking applications by using FogBus2...
    Rafal Chrobak, Sebastián García Galán, ... Adam Marchewka in Progress on Pattern Classification, Image Processing and Communications
    Conference paper 2023
  17. Kubernetes and Docker the Star Duo of Container Culture

    From the dawn of the computer age we are trying to improve our technologies as much as we can and this search for improvement lead us to a new domain...
    Conference paper 2022
  18. Virtual Machine and Container Live Migration Algorithms for Energy Optimization of Data Centre in Cloud Environment: A Research Review

    The growing pace of cloud computing technology needs to optimize the energy consumption of the data centres. Virtualization is one such technology...
    Conference paper 2023
  19. Container Orchestration in Edge and Fog Computing Environments for Real-Time IoT Applications

    Resource management is the principal factor to fully utilize the potential of Edge/Fog computing to execute real-time and critical IoT applications....
    Zhiyu Wang, Mohammad Goudarzi, ... Rajkumar Buyya in Computational Intelligence and Data Analytics
    Conference paper 2023
  20. Multipurpose Linux Tool for Wi-Fi Based Attack, Information Gathering and Web Vulnerability Scanning Automations

    Manual processes of various attacks or scanning are huge time killers for penetration testers and students. Penetration testers, Bug bounty hunters...
    Ceronmani Sharmila, J. Gopalakrishnan, ... Y. Daniel in Third International Conference on Image Processing and Capsule Networks
    Conference paper 2022
Did you find what you were looking for? Share feedback.