Nome |
# |
A Formal Approach to Microservice Architecture Deployment, file e1dcb335-9df7-7715-e053-1705fe0a6cc9
|
202
|
Guess Who’s Coming: Runtime Inclusion of Participants in Choreographies, file e1dcb333-b806-7715-e053-1705fe0a6cc9
|
174
|
The Servers of Serverless Computing: A Formal Revisitation of Functions as a Service, file e1dcb336-42aa-7715-e053-1705fe0a6cc9
|
66
|
Microservice security: a systematic literature review, file e1dcb338-c33c-7715-e053-1705fe0a6cc9
|
66
|
Optimal and automated deployment for microservices, file e1dcb338-0281-7715-e053-1705fe0a6cc9
|
65
|
Joint Post-proceedings of the First and Second International Conference on Microservices (Microservices 2017/2019), file e1dcb336-429c-7715-e053-1705fe0a6cc9
|
57
|
A Declarative Approach to Topology-Aware Serverless Function-Execution Scheduling, file 7a799a3e-fa40-48fc-898e-2800dfd30a47
|
54
|
Serverless Scheduling Policies based on Cost Analysis, file 7e4e580a-96ff-4b92-a3e7-a06139c7dde9
|
37
|
Allocation Priority Policies for Serverless Function-Execution Scheduling Optimisation, file 731c7f27-920b-49eb-a308-bda999d253b3
|
25
|
Programming adaptive microservice applications: An AIOCJ tutorial, file 7a067959-cbfc-437d-a295-e0cda57967b7
|
24
|
Ephemeral data handling in microservices with Tquery, file bb95ce7e-bf25-42f9-b1a7-6fdc2afb7731
|
23
|
Dynamic Choreographies: Theory And Implementation, file e1dcb330-c7c1-7715-e053-1705fe0a6cc9
|
17
|
Data Flooding against Ransomware: Concepts and Implementations, file 93def72a-f3c7-41d3-b709-32fc2a9f49cb
|
16
|
Microservice Dynamic Architecture-Level Deployment Orchestration, file 5907d516-4d95-4679-a082-831ed5029bf8
|
13
|
Insider Threats in Emerging Mobility-as-a-Service Scenarios, file e1dcb32f-d0a3-7715-e053-1705fe0a6cc9
|
13
|
Dynamic Choreographies: Theory And Implementation, file e1dcb337-863c-7715-e053-1705fe0a6cc9
|
13
|
Virtualization Costs: Benchmarking Containers and Virtual Machines Against Bare-Metal, file 6ee1117e-c9ac-41de-b689-e9668066428a
|
12
|
Ranflood: A mitigation tool based on the principles of data flooding against ransomware, file bd43c3d9-2a5f-4276-8bc8-0c904eb411e6
|
12
|
Multiparty Languages: The Choreographic and Multitier Cases, file e1dcb337-ddc6-7715-e053-1705fe0a6cc9
|
10
|
Proactive-Reactive Global Scaling, with Analytics, file 5f6036cf-21c7-45ad-a008-df19fddd3e7b
|
9
|
No more, no less: A formal model for serverless computing, file e1dcb333-04fc-7715-e053-1705fe0a6cc9
|
9
|
Custom Serverless Function Scheduling Policies: An APP Tutorial, file 0eb19549-2683-4fc7-b4c0-794177d8ea27
|
8
|
Jolie and LEMMA: Model-Driven Engineering and Programming Languages Meet on Microservices, file 08fe98ae-8b37-4654-a7da-8397fb2c615c
|
7
|
Federated Platooning: Insider Threats and Mitigations, file e1dcb333-33df-7715-e053-1705fe0a6cc9
|
7
|
Linguistic Abstractions for Interoperability of IoT Platforms, file e1dcb333-3f40-7715-e053-1705fe0a6cc9
|
7
|
Virtualization Costs: Benchmarking Containers and Virtual Machines Against Bare-Metal, file e1dcb337-eb63-7715-e053-1705fe0a6cc9
|
7
|
Constraint programming for flexible service function chaining deployment, file e1dcb331-f9a7-7715-e053-1705fe0a6cc9
|
6
|
Formally Verifying Function Scheduling Properties in Serverless Applications, file c5196976-148a-471b-864a-f16aacface1c
|
5
|
AIOCJ: A choreographic framework for safe adaptive distributed applications, file e1dcb32c-e3ac-7715-e053-1705fe0a6cc9
|
5
|
null, file e1dcb330-952e-7715-e053-1705fe0a6cc9
|
5
|
Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective, file e1dcb331-4ec5-7715-e053-1705fe0a6cc9
|
5
|
null, file e1dcb332-5ad5-7715-e053-1705fe0a6cc9
|
5
|
Developing correct, distributed, adaptive software, file e1dcb32c-e95a-7715-e053-1705fe0a6cc9
|
4
|
Programming adaptive microservice applications: An AIOCJ tutorial, file fa8dd8b9-c2d5-41fa-9265-c2154efcdca3
|
4
|
Model-Driven Code Generation for Microservices: Service Models, file 78788103-ede2-41f8-bb9d-130ddfbe687e
|
3
|
A Declarative Approach to Topology-Aware Serverless Function-Execution Scheduling, file 928a4968-3a77-4008-8424-4180b5b731cf
|
3
|
Data security issues in MaaS-enabling platforms, file e1dcb32e-9a78-7715-e053-1705fe0a6cc9
|
3
|
ChIP: A choreographic integration process, file e1dcb331-acc0-7715-e053-1705fe0a6cc9
|
3
|
Guess Who’s Coming: Runtime Inclusion of Participants in Choreographies, file e1dcb333-795e-7715-e053-1705fe0a6cc9
|
3
|
Model-Driven Generation of Microservice Interfaces: From LEMMA Domain Models to Jolie APIs, file a65ce356-d7a5-4a7e-99bf-b10e8b14e10b
|
2
|
null, file e1dcb330-9da0-7715-e053-1705fe0a6cc9
|
2
|
Microservices: Yesterday, Today, and Tomorrow, file e1dcb333-035f-7715-e053-1705fe0a6cc9
|
2
|
Microservice Dynamic Architecture-Level Deployment Orchestration, file 38f3e60e-a7b7-4953-bc8d-9aa045bff197
|
1
|
Allocation Priority Policies for Serverless Function-Execution Scheduling Optimisation, file 4980aaff-4106-4355-bdfe-2af71a517953
|
1
|
JoT: A Jolie Framework for Testing Microservices, file a9c2670c-ddb1-446c-985d-2d4e417f4121
|
1
|
JoT: A Jolie Framework for Testing Microservices, file b699f60e-51d6-482a-bc5f-4087d47d9ec3
|
1
|
Ephemeral data handling in microservices, file e1dcb333-6574-7715-e053-1705fe0a6cc9
|
1
|
Choral: Object-Oriented Choreographic Programming, file e2900d7b-32e1-4001-b662-87ef00a12173
|
1
|
Totale |
1.019 |