Articles
- Vol.23, No.1, 2025
- Vol.22, No.6, 2024
- Vol.22, No.5, 2024
- Vol.22, No.4, 2024
- Vol.22, No.3, 2024
- Vol.22, No.2, 2024
- Vol.22, No.1, 2024
- Vol.21, No.6, 2023
- Vol.21, No.5, 2023
- Vol.21, No.4, 2023
- Vol.21, No.3, 2023
- Vol.21, No.2, 2023
- Vol.21, No.1, 2023
- Vol.20, No.6, 2022
- Vol.20, No.5, 2022
- Vol.20, No.4, 2022
- Vol.20, No.3, 2022
- Vol.20, No.2, 2022
- Vol.20, No.1, 2022
- Vol.19, No.6, 2021
- Vol.19, No.5, 2021
- Vol.19, No.4, 2021
- Vol.19, No.3, 2021
- Vol.19, No.2, 2021
- Vol.19, No.1, 2021
This paper presents a latency-aware microservice management technique that dynamically rebalances containers across cloud availability zones. It minimizes cross-zone communication delays by leveraging telemetry feedback and real-time node scoring for adaptive workload placement.
Damien Luca Whitaker, Chen Yu Han, Krish Devendra Ranganathan, Sophie Aurora Grant, Pedro Luis Velasquez
Paper ID: 92119301 | ✅ Access Request |
This research presents an AI-augmented defense system that detects APTs in DevOps environments. It leverages cloud telemetry and behavioral signatures, enabling early-stage mitigation and continuous learning against novel security attack patterns during application development and deployment.
Everett Sean Mallory, Jiang Mei Zhou, Abhinav Tej Venkatesan, Brielle Nova Franklin, Luciano Tomas Espinoza
Paper ID: 92119302 | ✅ Access Request |
This paper proposes a privacy-preserving federated learning system that trains ML models across cloud edge nodes without exposing raw data. Differential privacy and encrypted parameter aggregation ensure data confidentiality while maintaining model accuracy and deployment speed.
Trevor Blake Dorsey, Zhang Ming Lei, Adarsh Vinayak Rao, Isla Camille Lambert, Tomas Enrique Morales
Paper ID: 92119303 | ✅ Access Request |
This study presents a long-term temporal clustering approach to forecast elastic load demands in smart cloud infrastructures. It adapts resource provisioning based on historical usage patterns and predicted burst frequencies to minimize overprovisioning and underutilization.
Lincoln Jonah Rowe, Xu Zhen Yu, Sanjana Rishi Nair, Emily Harper Calloway, Leonardo Mateo Chavez
Paper ID: 92119304 | ✅ Access Request |
This research introduces a zero-trust cloud access model leveraging adaptive context-aware authentication. By continuously evaluating device posture, geolocation, and access behavior, the system enables real-time access control without relying on static trust boundaries in dynamic cloud settings.
Warren Elliot Griffin, Liang Xue Feng, Neelakshi Dev Acharya, Ava Marie Thornton, Raul Esteban Dominguez
Paper ID: 92119305 | ✅ Access Request |
This paper introduces a policy-driven orchestration system that manages stateful application workflows in hybrid cloud-edge infrastructures. Intent-aware rules enable real-time redirection and restoration, maintaining service continuity during node failures or latency disruptions across the network.
Brandon Xavier Langston, Wu Jie Heng, Arjun Nandakumar Sethi, Charlotte Leigh Monroe, Felipe Alonso Navarro
Paper ID: 92119306 | ✅ Access Request |
This study presents a self-healing framework for Kubernetes platforms that detects faults using telemetry patterns and heals affected pods autonomously. Pattern feedback loops improve system resilience by learning from repeated failures and refining response strategies over time.
Mitchell Jordan Prescott, Shen Yan Lin, Anika Raghavendran Desai, Zoe Cassandra Palmer, Ricardo Tomas Espinosa
Paper ID: 92119307 | ✅ Access Request |
Back