14 research outputs found
Microservices-based IoT Applications Scheduling in Edge and Fog Computing: A Taxonomy and Future Directions
Edge and Fog computing paradigms utilise distributed, heterogeneous and
resource-constrained devices at the edge of the network for efficient
deployment of latency-critical and bandwidth-hungry IoT application services.
Moreover, MicroService Architecture (MSA) is increasingly adopted to keep up
with the rapid development and deployment needs of the fast-evolving IoT
applications. Due to the fine-grained modularity of the microservices along
with their independently deployable and scalable nature, MSA exhibits great
potential in harnessing both Fog and Cloud resources to meet diverse QoS
requirements of the IoT application services, thus giving rise to novel
paradigms like Osmotic computing. However, efficient and scalable scheduling
algorithms are required to utilise the said characteristics of the MSA while
overcoming novel challenges introduced by the architecture. To this end, we
present a comprehensive taxonomy of recent literature on microservices-based
IoT applications scheduling in Edge and Fog computing environments.
Furthermore, we organise multiple taxonomies to capture the main aspects of the
scheduling problem, analyse and classify related works, identify research gaps
within each category, and discuss future research directions.Comment: 35 pages, 10 figures, submitted to ACM Computing Survey
Revenue optimization of service compositions using conditional request retries
Due to the inherent stochastic nature of services execution environment within service oriented systems, a runtime adaptation of the given composition may be required. The authors investigate a runtime service adaptation mechanism based on conditional retries for orchestrated web services. The conditional retry may be issued while a concrete service within composition is executed. The retry could either invoke the same concrete service or a functionally equivalent web service that implements the same task. The authors use dynamic programming to determine the optimal time instances at which the current request should be terminated before request replication. The calculation takes into account different QoS parameters like services' response-time distributions and cost-related parameters, and the solution optimizes the expected revenue of the composite service provider. The authors illustrate the benefits of their approach by numerical calculations, and discuss the impact of considered QoS parameters to the solution at hand
Combining SOA and BPM Technologies for Cross-System Process Automation
This paper summarizes the results of an industry case study that introduced a cross-system business process automation solution based on a combination of SOA and BPM standard technologies (i.e., BPMN, BPEL, WSDL). Besides discussing major weaknesses of the existing, custom-built, solution and comparing them against experiences with the developed prototype, the paper presents a course of action for transforming the current solution into the proposed solution. This includes a general approach, consisting of four distinct steps, as well as specific action items that are to be performed for every step. The discussion also covers language and tool support and challenges arising from the transformation
Standard Interfaces and Protocols at Sensor Network and Cloud Level Definition
In this paper we presented full design of the system for monitoring forest which consists of cloud platform, sensor networks and mobile (drone) technologies for data collection and cameras. We first present the advanced design and structural model of an advanced system for monitoring of forest area. This model integrate sensor networks and mobile (drone) technologies for data collection and acquisition of those data at existing Crisis Management Information Systems (CMIS). Then we demonstrate the possibility to map different technological solutions and the main result was the definition of the set of standard interfaces and protocols for network interoperability
End-userApplication for Early Forest Fire Detection and Prevention
n this paper, we describe a Web application that has been designed and implemented by Fulda University of Applied Sciences in the context of the ASPires project. The application extends the functionality available to Crisis Management Centers (CMC). Actual readings from sensors installed in the test areas, for example national parks, are made available to CMC personnel, as well as pictures from cameras that are either mounted on stationary observation towers or taken by Unmanned Aerial Vehicles (UAVs) in the area of an actual of supposed forest fire. Data are transmitted to the Aspires cloud and delivered swiftly to the Web application via an open interface. Furthermore, fire alarms raised by novel detection algorithms are forwarded automatically to the application. This clearly improves the potential for the early detection of forest fires in rural areas
Computer Aided Verification
This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verification to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications