


default search action
IC2E 2019: Prague, Czech Republic
- IEEE International Conference on Cloud Engineering, IC2E 2019, Prague, Czech Republic, June 24-27, 2019. IEEE 2019, ISBN 978-1-7281-0218-4

Session 1: Application/AI
- Moysis Symeonides, Demetris Trihinas, Zacharias Georgiou, George Pallis, Marios D. Dikaiakos:

Query-Driven Descriptive Analytics for IoT and Edge Computing. 1-11 - Benjamin Heintz, Rankyung Hong, Shivangi Singh, Gaurav Khandelwal, Corey Tesdahl, Abhishek Chandra:

MESH: A Flexible Distributed Hypergraph Processing System. 12-22 - Anirban Bhattacharjee

, Ajay Dev Chhokra
, Zhuangwei Kang
, Hongyang Sun, Aniruddha Gokhale
, Gabor Karsai
:
BARISTA: Efficient and Scalable Serverless Serving System for Deep Learning Prediction Services. 23-33
Session 2: Cloud Control
- Ridwan Rashid Noel, Rohit Mehra, Palden Lama:

Towards Self-Managing Cloud Storage with Reinforcement Learning. 34-44 - Chaojie Zhang, Varun Gupta, Andrew A. Chien:

Information Models: Creating and Preserving Value in Volatile Cloud Resources. 45-55 - Ying-Feng Hsu, Hayato Kuwahara, Kazuhiro Matsuda, Morito Matsuoka:

Toward a Workload Allocation Optimizer for Power Saving in Data Centers. 56-66
Session 3: Invited papers A
- Ioan Petri

, Omer F. Rana
, Ali Reza Zamani, Yacine Rezgui
:
Edge-Cloud Orchestration: Strategies for Service Placement and Enactment. 67-75 - Abdelrahman Fahim, Ajaya Neupane, Evangelos E. Papalexakis

, Lance M. Kaplan, Srikanth V. Krishnamurthy
, Tarek F. Abdelzaher:
Edge-Assisted Detection and Summarization of Key Global Events from Distributed Crowd-Sensed Data. 76-85 - Thomas Rausch

, Schahram Dustdar
:
Edge Intelligence: The Convergence of Humans, Things, and AI. 86-96
Session 4: Future of Computing
- Aleksander Slominski

, Vinod Muthusamy, Vatche Ishakian:
The Future of Computing is Boring (and that is exciting!). 97-101 - Hani Nemati, Seyed Vahid Azhari, Michel R. Dagenais:

Host Hypervisor Trace Mining for Virtual Machine Workload Characterization. 102-112 - Waldemar Hummer, Vinod Muthusamy, Thomas Rausch

, Parijat Dube, Kaoutar El Maghraoui
, Anupama Murthi, Punleuk Oum:
ModelOps: Cloud-Based Lifecycle Management for Reliable and Trusted AI. 113-120
Session 5: Cloud testing
- Olufogorehan Tunde-Onadele

, Jingzhu He, Ting Dai
, Xiaohui Gu:
A Study on Container Vulnerability Exploit Detection. 121-127 - Hui Lu, Abhinav Srivastava, Yu Sun:

ShadeNF: Testing Online Network Functions. 128-138
Session 6: Invited papers B
- Zoran Dimitrijevic, Cetin Sahin, Christian Tinnefeld, Jozsef Patvarczki:

Importance of Application-Level Resource Management in Multi-Cloud Deployments. 139-144 - Pradeep Ambati, David E. Irwin, Prashant J. Shenoy

, Lixin Gao, Ahmed Ali-Eldin, Jeannie R. Albrecht:
Understanding Synchronization Costs for Distributed ML on Transient Cloud Resources. 145-155 - Ketan Bhardwaj, Ada Gavrilovska, Vlad Kolesnikov, Matt Saunders, Hobin Yoon, Mugdha Bondre, Meghana Babu, Jacob Walsh:

Addressing the Fragmentation Problem in Distributed and Decentralized Edge Computing: A Vision. 156-167
Session 7: Cloud workload management and scheduling
- Tatsuhiro Chiba, Rina Nakazawa, Hiroshi Horii, Sahil Suneja, Seetharami Seelam:

ConfAdvisor: A Performance-centric Configuration Tuning Framework for Containers on Kubernetes. 168-178 - Shingo Okuno

, Fumi Iikura, Yukihiro Watanabe:
Maintenance Scheduling for Cloud Infrastructure with Timing Constraints of Live Migration. 179-189 - Tianlin Li, Kartik Gopalan

, Ping Yang:
ContainerVisor: Customized Control of Container Resources. 190-199
Session 8: Performance management
- Joy Rahman, Palden Lama:

Predicting the End-to-End Tail Latency of Containerized Microservices in the Cloud. 200-210 - Yogesh D. Barve

, Shashank Shekhar
, Ajay Chhokra
, Shweta Khare, Anirban Bhattacharjee
, Zhuangwei Kang
, Hongyang Sun, Aniruddha Gokhale
:
FECBench: A Holistic Interference-aware Approach for Application Performance Modeling. 211-221 - Gareth George, Rich Wolski, Chandra Krintz, John Brevik:

Analyzing AWS Spot Instance Pricing. 222-228
SQUEET 2019 Workshop
- Massimo Ficco:

Detecting IoT Malware by Markov Chain Behavioral Models. 229-234 - Aniket Anand, Antonino Galletta, Antonio Celesti, Maria Fazio, Massimo Villari:

A secure inter-domain communication for IoT devices. 235-240 - Martin Grambow, Fabian Lehmann

, David Bermbach:
Continuous Benchmarking: Using System Benchmarking in Build Pipelines. 241-246 - Salvatore Venticinque:

Benchmarking physical and virtual IoT platforms. 247-252

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














